We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
io_uring
Here is a short description of why we abandoned io_uring for cvm-io.
In short, io_uring is too insecure for passthrough ; most is explained in https://lore.kernel.org/all/[email protected]/T/
[1] https://lore.kernel.org/all/[email protected]/T/ [2] https://static.sched.com/hosted_files/kvmforum2020/9c/KVMForum_2020_io_uring_passthrough_Stefano_Garzarella.pdf [3] https://security.googleblog.com/2023/06/learnings-from-kctf-vrps-42-linux.html
The text was updated successfully, but these errors were encountered:
@qafy this may interest you
Sorry, something went wrong.
No branches or pull requests
Here is a short description of why we abandoned
io_uring
for cvm-io.In short,
io_uring
is too insecure for passthrough ; most is explained in https://lore.kernel.org/all/[email protected]/T/io_uring
for Qemu VMs does not isolate VMsio_uring
passthrough implementation currently exists[1] https://lore.kernel.org/all/[email protected]/T/
[2] https://static.sched.com/hosted_files/kvmforum2020/9c/KVMForum_2020_io_uring_passthrough_Stefano_Garzarella.pdf
[3] https://security.googleblog.com/2023/06/learnings-from-kctf-vrps-42-linux.html
The text was updated successfully, but these errors were encountered: