lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 02 Dec 2011 12:16:36 +0900 From: Takuya Yoshikawa <yoshikawa.takuya@....ntt.co.jp> To: Sasha Levin <levinsasha928@...il.com> CC: linux-kernel@...r.kernel.org, Avi Kivity <avi@...hat.com>, Marcelo Tosatti <mtosatti@...hat.com>, kvm@...r.kernel.org, Takuya Yoshikawa <takuya.yoshikawa@...il.com> Subject: Re: [PATCH] KVM: Veirfy memory slot only for readability (2011/12/02 10:15), Takuya Yoshikawa wrote: > (2011/12/02 4:42), Sasha Levin wrote: >> It's enough for memory slot to be readable, as the comment above the check >> states. >> >> A user should be able to create read-only memory slot. Note: at that time, it looked to me that the API did not allow me to know which type was being registered. Do you want to create read only memory slots for kvm tool? Takuya > > I submitted the original patch like you to speed up page table walking, > a hot path in KVM, and Avi applied the patch with changing the VERIFY_READ > to VERIFY_WRITE: on x86, both do the same check. You can see that on the > commit. > > After that, Xiao started to write with __xxx_user() based on this check IIRC. > So you should keep the code as is and change the comment if you like! > > Thanks, > Takuya > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists