From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932613AbcINHdr (ORCPT ); Wed, 14 Sep 2016 03:33:47 -0400 Received: from bombadil.infradead.org ([198.137.202.9]:58894 "EHLO bombadil.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932522AbcINHdm (ORCPT ); Wed, 14 Sep 2016 03:33:42 -0400 Date: Wed, 14 Sep 2016 00:33:40 -0700 From: Christoph Hellwig To: Juerg Haefliger Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, kernel-hardening@lists.openwall.com, linux-x86_64@vger.kernel.org, vpk@cs.columbia.edu Subject: Re: [RFC PATCH v2 3/3] block: Always use a bounce buffer when XPFO is enabled Message-ID: <20160914073340.GA28090@infradead.org> References: <20160902113909.32631-1-juerg.haefliger@hpe.com> <20160914071901.8127-1-juerg.haefliger@hpe.com> <20160914071901.8127-4-juerg.haefliger@hpe.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20160914071901.8127-4-juerg.haefliger@hpe.com> User-Agent: Mutt/1.6.1 (2016-04-27) X-SRS-Rewrite: SMTP reverse-path rewritten from by bombadil.infradead.org. See http://www.infradead.org/rpr.html Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Sep 14, 2016 at 09:19:01AM +0200, Juerg Haefliger wrote: > This is a temporary hack to prevent the use of bio_map_user_iov() > which causes XPFO page faults. > > Signed-off-by: Juerg Haefliger Sorry, but if your scheme doesn't support get_user_pages access to user memory is't a steaming pile of crap and entirely unacceptable.