Displaying 3 results from an estimated 3 matches for "xcr0_accum".
2013 Nov 19
6
[PATCH 2/5] X86 architecture instruction set extension definiation
...I_ZMM) )
+ {
+ if ( !(xcr0 & XSTATE_YMM) )
+ return 0;
+
+ if ( ~xcr0 & (XSTATE_OPMASK | XSTATE_ZMM | XSTATE_HI_ZMM) )
+ return 0;
+ }
+
+ return !(xcr0 & XSTATE_BNDREGS) == !(xcr0 & XSTATE_BNDCSR);
+}
+
int validate_xstate(u64 xcr0, u64 xcr0_accum, u64 xstate_bv, u64 xfeat_mask)
{
if ( (xcr0_accum & ~xfeat_mask) ||
(xstate_bv & ~xcr0_accum) ||
(xcr0 & ~xcr0_accum) ||
- !(xcr0 & XSTATE_FP) ||
- ((xcr0 & XSTATE_YMM) && !(xcr0 & XSTATE_SSE)) ||
- ((xcr0_accum &...
2013 Nov 25
0
[PATCH 2/4 V2] X86: enable support for new ISA extensions
..., and HI_ZMM must be the same. */
+ if ( ~xcr0 & (XSTATE_OPMASK | XSTATE_ZMM | XSTATE_HI_ZMM) )
+ return 0;
+ }
+
+ /* BNDREGS and BNDCSR must be the same. */
+ return !(xcr0 & XSTATE_BNDREGS) == !(xcr0 & XSTATE_BNDCSR);
+}
+
int validate_xstate(u64 xcr0, u64 xcr0_accum, u64 xstate_bv, u64 xfeat_mask)
{
if ( (xcr0_accum & ~xfeat_mask) ||
(xstate_bv & ~xcr0_accum) ||
(xcr0 & ~xcr0_accum) ||
- !(xcr0 & XSTATE_FP) ||
- ((xcr0 & XSTATE_YMM) && !(xcr0 & XSTATE_SSE)) ||
- ((xcr0_accum &...
2013 Jun 04
12
[PATCH 0/4] XSA-52..54 follow-up
The first patch really isn''t as much of a follow-up than what triggered
the security issues to be noticed in the first place.
1: x86: preserve FPU selectors for 32-bit guest code
2: x86: fix XCR0 handling
3: x86/xsave: adjust state management
4: x86/fxsave: bring in line with recent xsave adjustments
The first two I would see as candidates for 4.3 (as well as
subsequent backporting,