lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 7 Jun 2021 18:21:02 +0100 From: Catalin Marinas <catalin.marinas@....com> To: Steven Price <steven.price@....com> Cc: Marc Zyngier <maz@...nel.org>, Will Deacon <will@...nel.org>, James Morse <james.morse@....com>, Julien Thierry <julien.thierry.kdev@...il.com>, Suzuki K Poulose <suzuki.poulose@....com>, kvmarm@...ts.cs.columbia.edu, linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org, Dave Martin <Dave.Martin@....com>, Mark Rutland <mark.rutland@....com>, Thomas Gleixner <tglx@...utronix.de>, qemu-devel@...gnu.org, Juan Quintela <quintela@...hat.com>, "Dr. David Alan Gilbert" <dgilbert@...hat.com>, Richard Henderson <richard.henderson@...aro.org>, Peter Maydell <peter.maydell@...aro.org>, Haibo Xu <Haibo.Xu@....com>, Andrew Jones <drjones@...hat.com> Subject: Re: [PATCH v14 7/8] KVM: arm64: ioctl to fetch/store tags in a guest On Mon, Jun 07, 2021 at 12:08:15PM +0100, Steven Price wrote: > The VMM may not wish to have it's own mapping of guest memory mapped > with PROT_MTE because this causes problems if the VMM has tag checking > enabled (the guest controls the tags in physical RAM and it's unlikely > the tags are correct for the VMM). > > Instead add a new ioctl which allows the VMM to easily read/write the > tags from guest memory, allowing the VMM's mapping to be non-PROT_MTE > while the VMM can still read/write the tags for the purpose of > migration. > > Signed-off-by: Steven Price <steven.price@....com> Reviewed-by: Catalin Marinas <catalin.marinas@....com>
Powered by blists - more mailing lists