[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 02/17] x86: split __{get,put}_user() into "guest" and "unsafe" variants


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Date: Fri, 5 Feb 2021 16:43:00 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mH9yQkQE1fqjRRX8L2lFXDS47yVPfUw4NppaJ8wSLnQ=; b=ZFFWOZYOR96KtORLXVsmjIyN3wjWvt4RTfYGLOK67fpwB/6ZWXe13/TBuGC81t+XBEy4zG4dyjompOFARioaXpG/RxawzPMqE1kc08k3OITGzpGF/RzfSMXK+wNBfNWKxGtD6uak+8nSQX5Cb3nGVKvNvRJWQv93n0mYdkQAj9kOMEDYddbJ6hRg9OQYMwy+t7ekUhdF7TAuGhH47mpbhh2qhiVTa2pRa3cl2ioD1t/PWI5Q0COI/Ivqw1asD+FfBFuS5UHbLIFNcIgVWkiuNYlkClALivAWJ0XPY/JZDocLZ93IBP46wNxAPFKAONxveOoHJz5Z+pXiAyh4MYzZ/Q==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=T7HTzf18NmHFSRsfHxaZEztXkvhe/Zg0O2LoSPTOLltrGhyvK6FxgwJOSWQySld7Y1IlQGqm32fRuMuFIVUgyc7WrePJ2dTcslXQhB/zeWHTMb+0LxGN1Fr1Iu87OFLhW62cIgPKD4r/7rFsmhOr6XvwHx4sHEOBYJe3YPMWN+DcWjAgRmcJvA+NqBV3RGkgxfRalEQ5cLiBViTj+Y8WmJGLlH+klPL4omO69rAhdyu2WyDlluurZqe/NAkxCn/lKH5Tm0XlXJkr4ukVSMbXZ6M0EYj8ZImUMJr5sPnHazkdCxsOcI07DymR9if45ijQJP70wKYfCghvQWZ1KRcN8A==
  • Authentication-results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Tim Deegan <tim@xxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>
  • Delivery-date: Fri, 05 Feb 2021 15:43:20 +0000
  • Ironport-sdr: ex0bbkdtnMwWjLh7Ai9ZYX1H7X+eS1N3ddpcfTuagk1h9Jn+TF4RHi5vfO6ueSlXjX1pMoDH0i 9EJ6XEeeIog5yHFFC/mwgHciaiPCZctV68EQguM5+WhYUd217bZJj3gdtw2XyerGcPq4r4WyB1 dEecPA+ZnaJie3BHrs14wtDXNpoYAF2lVt/e70mMI+OdzFLkDK0J5j4htg/jpdW8zB+a3xL5TT rlEh4Nk7XzaV2KzRvhxyA57xAeYMqWuLqX3zVhbzewRuhSgpvDbOv2bDnCDeiVUm7aYhgOhslo kLg=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Thu, Jan 14, 2021 at 04:04:11PM +0100, Jan Beulich wrote:
> The "guest" variants are intended to work with (potentially) fully guest
> controlled addresses, while the "unsafe" variants are not.

Just to clarify, both work against user addresses, but guest variants
need to be more careful because the guest provided address can also be
modified?

I'm trying to understand the difference between "fully guest
controlled" and "guest controlled".

Maybe an example would help clarify.

Thanks, Roger.



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.