Displaying 5 results from an estimated 5 matches for "new_bv".
Did you mean:
new_bh
2013 Nov 19
6
[PATCH 2/5] X86 architecture instruction set extension definiation
...& XSTATE_SSE)) ||
- ((xcr0_accum & XSTATE_YMM) && !(xcr0_accum & XSTATE_SSE)) )
+ !valid_xcr0(xcr0) ||
+ !valid_xcr0(xcr0_accum) )
return -EINVAL;
if ( xcr0_accum & ~xfeature_mask )
@@ -351,10 +364,7 @@ int handle_xsetbv(u32 index, u64 new_bv)
if ( index != XCR_XFEATURE_ENABLED_MASK )
return -EOPNOTSUPP;
- if ( (new_bv & ~xfeature_mask) || !(new_bv & XSTATE_FP) )
- return -EINVAL;
-
- if ( (new_bv & XSTATE_YMM) && !(new_bv & XSTATE_SSE) )
+ if ( (new_bv & ~xfeature_mask) || !va...
2013 Nov 25
0
[PATCH 2/4 V2] X86: enable support for new ISA extensions
...& XSTATE_SSE)) ||
- ((xcr0_accum & XSTATE_YMM) && !(xcr0_accum & XSTATE_SSE)) )
+ !valid_xcr0(xcr0) ||
+ !valid_xcr0(xcr0_accum) )
return -EINVAL;
if ( xcr0_accum & ~xfeature_mask )
@@ -351,10 +369,7 @@ int handle_xsetbv(u32 index, u64 new_bv)
if ( index != XCR_XFEATURE_ENABLED_MASK )
return -EOPNOTSUPP;
- if ( (new_bv & ~xfeature_mask) || !(new_bv & XSTATE_FP) )
- return -EINVAL;
-
- if ( (new_bv & XSTATE_YMM) && !(new_bv & XSTATE_SSE) )
+ if ( (new_bv & ~xfeature_mask) || !va...
2013 Jun 04
12
[PATCH 0/4] XSA-52..54 follow-up
The first patch really isn''t as much of a follow-up than what triggered
the security issues to be noticed in the first place.
1: x86: preserve FPU selectors for 32-bit guest code
2: x86: fix XCR0 handling
3: x86/xsave: adjust state management
4: x86/fxsave: bring in line with recent xsave adjustments
The first two I would see as candidates for 4.3 (as well as
subsequent backporting,
2012 May 24
11
[PATCH 0/3] XEN: fix vmx exception mistake
This series of patches fix the mistake for debug exception(#DB), overflow
exception(#OF) and INT3(#BP), INTn instruction emulation.
Introduce new function vmx_inject_sw_exception() which deliver the software
excetion, software interrupt and privileged software exception. Split hardware
exception as a seperate function(old function vmx_inject_hw_exception()).
Also Passed down intruction length
2012 May 30
12
[PATCH v2 0/4] XEN: fix vmx exception mistake
Changes from v1:
- Define new struct hvm_trap to represent information of trap, include
instruction length.
- Renames hvm_inject_exception to hvm_inject_trap. Then define a couple of
wrappers around that function for existing callers, so that their parameter
lists actually *shrink*.
This series of patches fix the mistake for debug exception(#DB), overflow
exception(#OF) and INT3(#BP),