From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754820AbbJHIqj (ORCPT ); Thu, 8 Oct 2015 04:46:39 -0400 Received: from mail-lb0-f182.google.com ([209.85.217.182]:34650 "EHLO mail-lb0-f182.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753960AbbJHIqg (ORCPT ); Thu, 8 Oct 2015 04:46:36 -0400 Subject: Re: [PATCH v3 2/3] uio_pci_generic: add MSI/MSI-X support To: "Michael S. Tsirkin" References: <20151006143821.GA11541@redhat.com> <5613DE26.1090202@cloudius-systems.com> <20151006174648-mutt-send-email-mst@redhat.com> <5613E75E.1040002@scylladb.com> <1444157480.4059.67.camel@redhat.com> <5614C11B.6090601@scylladb.com> <1444235464.4059.169.camel@redhat.com> <56154AB4.1050509@scylladb.com> <20151007230553-mutt-send-email-mst@redhat.com> <56160039.4090901@scylladb.com> <20151008073246.GA19331@redhat.com> Cc: Alex Williamson , Vlad Zolotarov , Greg KH , linux-kernel@vger.kernel.org, hjk@hansjkoch.de, corbet@lwn.net, bruce.richardson@intel.com, avi@cloudius-systems.com, gleb@cloudius-systems.com, stephen@networkplumber.org, alexander.duyck@gmail.com From: Avi Kivity Message-ID: <56162D66.2030205@scylladb.com> Date: Thu, 8 Oct 2015 11:46:30 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <20151008073246.GA19331@redhat.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/08/2015 10:32 AM, Michael S. Tsirkin wrote: > On Thu, Oct 08, 2015 at 08:33:45AM +0300, Avi Kivity wrote: >> It is good practice to defend against root oopsing the kernel, but in some >> cases it cannot be achieved. > Absolutely. That's one of the issues with these patches. They don't even > try where it's absolutely possible. > Are you referring to blocking the maps of the msix BAR areas? I think there is value in that. The value is small, because a corruption is more likely in the dynamic memory responsible for tens of millions of DMA operations per second, rather than a static 4K area, but it exists.