lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 13 Jan 2015 14:21:48 +0100 From: Daniel Borkmann <dborkman@...hat.com> To: Hannes Frederic Sowa <hannes@...essinduktion.org> CC: John Fastabend <john.fastabend@...il.com>, netdev@...r.kernel.org, danny.zhou@...el.com, nhorman@...driver.com, john.ronciak@...el.com, brouer@...hat.com Subject: Re: [RFC PATCH v2 1/2] net: af_packet support for direct ring access in user space On 01/13/2015 01:35 PM, Hannes Frederic Sowa wrote: > On Mo, 2015-01-12 at 20:35 -0800, John Fastabend wrote: ... >> +/* setsockopt takes addr, size ,direction parametner, getsockopt takes >> + * iova, size, direction. >> + * */ >> +struct tpacket_dma_mem_region { >> + void *addr; /* userspace virtual address */ >> + __u64 phys_addr; /* physical address */ >> + __u64 iova; /* IO virtual address used for DMA */ >> + unsigned long size; /* size of region */ >> + int direction; /* dma data direction */ >> +}; > > Have you tested this with with 32 bit user space and 32 bit kernel, too? > I don't have any problem with only supporting 64 bit kernels for this > feature, but looking through the code I wonder if we handle the __u64 > addresses correctly in all situations. Given this is placed into uapi and transferred via setsockopt(2), this would also need some form of compat handling, also for the case of mixed environments (e.g. 64 bit kernel, 32 bit user space). -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists