lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 22 Mar 2019 23:37:19 +0200 From: Mike Rapoport <rppt@...ux.ibm.com> To: Peter Xu <peterx@...hat.com> Cc: linux-mm@...ck.org, linux-kernel@...r.kernel.org, David Hildenbrand <david@...hat.com>, Hugh Dickins <hughd@...gle.com>, Maya Gokhale <gokhale2@...l.gov>, Jerome Glisse <jglisse@...hat.com>, Pavel Emelyanov <xemul@...tuozzo.com>, Johannes Weiner <hannes@...xchg.org>, Martin Cracauer <cracauer@...s.org>, Shaohua Li <shli@...com>, Andrea Arcangeli <aarcange@...hat.com>, Mike Kravetz <mike.kravetz@...cle.com>, Denis Plotnikov <dplotnikov@...tuozzo.com>, Mike Rapoport <rppt@...ux.vnet.ibm.com>, Marty McFadden <mcfadden8@...l.gov>, Mel Gorman <mgorman@...e.de>, "Kirill A . Shutemov" <kirill@...temov.name>, "Dr . David Alan Gilbert" <dgilbert@...hat.com>, Pavel Emelyanov <xemul@...allels.com>, Rik van Riel <riel@...hat.com> Subject: Re: [PATCH v3 22/28] userfaultfd: wp: enabled write protection in userfaultfd API On Wed, Mar 20, 2019 at 10:06:36AM +0800, Peter Xu wrote: > From: Shaohua Li <shli@...com> > > Now it's safe to enable write protection in userfaultfd API > > Cc: Andrea Arcangeli <aarcange@...hat.com> > Cc: Pavel Emelyanov <xemul@...allels.com> > Cc: Rik van Riel <riel@...hat.com> > Cc: Kirill A. Shutemov <kirill@...temov.name> > Cc: Mel Gorman <mgorman@...e.de> > Cc: Hugh Dickins <hughd@...gle.com> > Cc: Johannes Weiner <hannes@...xchg.org> > Signed-off-by: Shaohua Li <shli@...com> > Signed-off-by: Andrea Arcangeli <aarcange@...hat.com> > Reviewed-by: Jerome Glisse <jglisse@...hat.com> > Signed-off-by: Peter Xu <peterx@...hat.com> Reviewed-by: Mike Rapoport <rppt@...ux.ibm.com> > --- > include/uapi/linux/userfaultfd.h | 6 ++++-- > 1 file changed, 4 insertions(+), 2 deletions(-) > > diff --git a/include/uapi/linux/userfaultfd.h b/include/uapi/linux/userfaultfd.h > index 95c4a160e5f8..e7e98bde221f 100644 > --- a/include/uapi/linux/userfaultfd.h > +++ b/include/uapi/linux/userfaultfd.h > @@ -19,7 +19,8 @@ > * means the userland is reading). > */ > #define UFFD_API ((__u64)0xAA) > -#define UFFD_API_FEATURES (UFFD_FEATURE_EVENT_FORK | \ > +#define UFFD_API_FEATURES (UFFD_FEATURE_PAGEFAULT_FLAG_WP | \ > + UFFD_FEATURE_EVENT_FORK | \ > UFFD_FEATURE_EVENT_REMAP | \ > UFFD_FEATURE_EVENT_REMOVE | \ > UFFD_FEATURE_EVENT_UNMAP | \ > @@ -34,7 +35,8 @@ > #define UFFD_API_RANGE_IOCTLS \ > ((__u64)1 << _UFFDIO_WAKE | \ > (__u64)1 << _UFFDIO_COPY | \ > - (__u64)1 << _UFFDIO_ZEROPAGE) > + (__u64)1 << _UFFDIO_ZEROPAGE | \ > + (__u64)1 << _UFFDIO_WRITEPROTECT) > #define UFFD_API_RANGE_IOCTLS_BASIC \ > ((__u64)1 << _UFFDIO_WAKE | \ > (__u64)1 << _UFFDIO_COPY) > -- > 2.17.1 > -- Sincerely yours, Mike.
Powered by blists - more mailing lists