Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932247AbWHVNok (ORCPT ); Tue, 22 Aug 2006 09:44:40 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S932250AbWHVNok (ORCPT ); Tue, 22 Aug 2006 09:44:40 -0400 Received: from mail.suse.de ([195.135.220.2]:36064 "EHLO mx1.suse.de") by vger.kernel.org with ESMTP id S932247AbWHVNoj (ORCPT ); Tue, 22 Aug 2006 09:44:39 -0400 From: Andi Kleen To: virtualization@lists.osdl.org Subject: Re: [PATCH] paravirt.h Date: Tue, 22 Aug 2006 15:44:26 +0200 User-Agent: KMail/1.9.3 Cc: Alan Cox , Jeremy Fitzhardinge , Andrew Morton , Chris Wright , Linux Kernel Mailing List References: <1155202505.18420.5.camel@localhost.localdomain> <44DB7596.6010503@goop.org> <1156254965.27114.17.camel@localhost.localdomain> In-Reply-To: <1156254965.27114.17.camel@localhost.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200608221544.26989.ak@muc.de> Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1038 Lines: 28 I don't see why paravirt ops is that much more sensitive than most other kernel code. > It would be a lot safer if we could have the struct paravirt_ops in > protected read-only const memory space, set it up in the core kernel > early on in boot when we play "guess todays hypervisor" and then make > sure it stays in read only (even to kernel) space. By default we don't make anything read only because that would mess up the 2MB kernel mapping. In general i don't think making select code in the kernel read only is a good idea, because as long as you don't protect everything including stacks etc. there will be always attack points where supposedly protected code relies on unprotected state. If someone can write to kernel memory you already lost. And it adds TLB pressure. -Andi - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/