lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 10 Dec 2008 17:01:06 -0700 From: Pete Zaitcev <zaitcev@...hat.com> To: Wu Fengguang <fengguang.wu@...el.com> Cc: Gilad Ben-Yossef <gilad@...efidence.com>, Laurent Pinchart <laurent.pinchart@...net.be>, LKML <linux-kernel@...r.kernel.org>, Greg Kroah-Hartman <gregkh@...e.de>, "linux-usb@...r.kernel.org" <linux-usb@...r.kernel.org>, zaitcev@...hat.com Subject: Re: [PATCH] USB: use stack allocation for struct usb_ctrlrequest On Wed, 10 Dec 2008 22:23:01 +0800, Wu Fengguang <fengguang.wu@...el.com> wrote: > For 64bit systems, we can easily go beyond 4GB physical memory. > So at least we should add GFP_DMA32 in addition to GFP_NOIO? I am afraid the situation is that we really screwed the pooch while creating the USB API. I may be wrong about this, but my understanding is that if we get an address above 4GB from kmalloc and then send it down to usb_submit_urb(), a random memory corruption is likely (this is because we forget to check the result of dma_map_single()). The code worked until now because most systems out in the field either a) had IOMMU, or b) had 4GB or RAM or less, but not both. The case (a) includes all AMD CPUs, all Itanium CPUs, and the Intel-based enterprise systems from big vendors, e.g. IBM Calgary, HP ZX-1, etc. Also, (a) covers Intel P4 class systems with swiotlb. So, we only blow up if a kernel with swiotlb disabled boots on an Intel box with more than 4GB of RAM. This is still far from ideal, but we kinda pretend not to notice. I heard that Intel has seen the error in their ways and is going to come out with IOMMU for all their chipsets, so in a few years this is going to be moot. -- Pete -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists