lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 28 Dec 2018 11:34:44 -0800 (PST) From: David Miller <davem@...emloft.net> To: jasowang@...hat.com Cc: mst@...hat.com, kvm@...r.kernel.org, virtualization@...ts.linux-foundation.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [RFC PATCH V2 3/3] vhost: access vq metadata through kernel virtual address From: Jason Wang <jasowang@...hat.com> Date: Fri, 28 Dec 2018 15:55:37 +0800 > +static int vhost_invalidate_vmap(struct vhost_virtqueue *vq, > + struct vhost_vmap *map, > + unsigned long uaddr, > + unsigned long start, > + unsigned long end, > + bool blockable) > +{ > + if (start < uaddr && end >= uaddr) { > + if (!blockable) > + return -EAGAIN; > + mutex_lock(&vq->mutex); > + if (map->addr) > + vunmap(map->unmap_addr); > + map->addr = NULL; > + map->unmap_addr = NULL; > + mutex_unlock(&vq->mutex); > + } > + > + return 0; > +} What are the rules for these invalidate operations? Can there be partial overlaps? If so, wouldn't you need some way of keeping track of the partially overlapping unmaps so that once all of the invalidates covering the range occur you properly cleanup and do the vunmap()?
Powered by blists - more mailing lists