lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 11 Feb 2009 22:47:25 +0100
From:	Johannes Berg <johannes@...solutions.net>
To:	"Winkler, Tomas" <tomas.winkler@...el.com>
Cc:	"Yu, Fenghua" <fenghua.yu@...el.com>,
	David Woodhouse <dwmw2@...radead.org>,
	Ingo Molnar <mingo@...e.hu>,
	Stephen Rothwell <sfr@...b.auug.org.au>,
	"Grumbach, Emmanuel" <emmanuel.grumbach@...el.com>,
	"Zhu, Yi" <yi.zhu@...el.com>, Chris Wright <chrisw@...s-sol.org>,
	LKML <linux-kernel@...r.kernel.org>,
	"iommu@...ts.linux-foundation.org" <iommu@...ts.linux-foundation.org>
Subject: RE: [PATCH]iwlan dma mapping read and write changes


> >> Indeed the firmware/ucode write back to host memory to update retry
> >> counter for APMDU packets. I'm not sure if this is needed for legacy
> >> traffic, though.
> >
> >I don't think they can be seeing AMPDU packets since that is, well,
> >broken?
> 
> Currently I'm not aware of any other cases where memory is accessed
> back but I may have not complete info.  Will be back with the answer
> tomorrow.

I don't think it really matters, since AMPDU packets will be fixed soon,
and for those you know it's necessary (and the report says that under
some other circumstances it's also necessary). Unless there'd be some
benefit from using BIDI only when we know it'll be needed, and using
TODEV in the other cases?

johannes

Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ