lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 25 Sep 2006 15:18:19 +0900
From:	Paul Mundt <lethal@...ux-sh.org>
To:	Robin Getz <rgetz@...ckfin.uclinux.org>
Cc:	linux-kernel@...r.kernel.org, Andrew Morton <akpm@...l.org>,
	Greg KH <gregkh@...e.de>, luke Yang <luke.adi@...il.com>
Subject: Re: [PATCH 3/3] [BFIN] Blackfin documents and MAINTAINER patch

On Mon, Sep 25, 2006 at 01:51:34AM -0400, Robin Getz wrote:
> Paul indicated:
> >This is a generic enough of a feature that I suspect we should hash out a 
> >common API for it rather than having people roll their own.
> 
> That sounds like a good idea. From the few people that use this, I think a 
> much simpler interface would be desirable.
> 
> For data, it is easy - something similar to the processor specific 
> xx_flush_range(start,end) - have a xxx_lock_range(start,end) would be good, 
> and easy to implement.
> 
Yes, xxx_lock_range() (and a corresponding xxx_unlock_range()) would be
ideal for this.

> The only thing I am not sure of - is how to force things into cache. For 
> data - it is easy - do a read, and then lock it. For instruction - for 
> those architectures which have separate instruction cache (like Blackfin) 
> it is much harder. The only way to get code into cache is to execute it. 
> (ergo the existing interface).
> 
I suppose the first question is to determine whether it's really worth
doing the I-cache locking or simply sticking with a simplistic interface
aimed more at D-cache locking.

The I-cache case is somewhat more problematic, the only way to do it in
an architecture-neutral fashion is likely to expose a code page that is
pre-loaded and kicked down to the lower levels to work out the actual
locking semantics.

> Because the algorithm is so specific to the hardware - I am not sure how to 
> make instruction as generic as data could be.
> 
> How does SH cache handle things like this?
> 
On SH both the I and D caches have MMIO access to the cache lines, so we
can jump to uncached space, clean the relevant cache, and then map the
data we want to lock directly in before jumping back to cached space.

So far we haven't done much with I-cache locking though.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ