lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 24 Dec 2007 10:19:07 +1100 From: Benjamin Herrenschmidt <benh@...nel.crashing.org> To: Martin Mares <mj@....cz> Cc: Linus Torvalds <torvalds@...ux-foundation.org>, Jeff Garzik <jeff@...zik.org>, Arjan van de Ven <arjan@...radead.org>, linux-kernel@...r.kernel.org, gregkh@...e.de, linux-pci@...ey.karlin.mff.cuni.cz Subject: Re: [patch] Make MMCONFIG space (extended PCI config space) a driver opt-in issue On Mon, 2007-12-24 at 10:06 +1100, Benjamin Herrenschmidt wrote: > On Sun, 2007-12-23 at 22:15 +0100, Martin Mares wrote: > > Hello! > > > > > - During that probe, you set a flag if any device has capabilities that > > > extend beyond 0xff. > > > > Can this work? The extended capabilities are not linked to the normal > > ones in any way. > > Yeah, well, you set a flag if you have extended capabilities. I don't > have my spec at hand (or the code) but can't we know if there are any > based on some non-ext field ? Allright, I d/l the spec and you are right... Yet another massive Intel f*ckup in the definition of PCI... Argh. So that means you can't automatically detect that there's potentially stuff in the extended caps. You still can do the initial probe solely with type1, that would work around the problem with MMCONFIG overlapping sized BARs (ah, BAR sizing, yet another case where somebody at Intel should rather have broken an arm that day). I still don't believe much in the idea of drivers enabling MMCONFIG though. Ben., -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists