lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 08 May 2008 16:41:51 -0700
From:	Alexis Bruemmer <alexisb@...ibm.com>
To:	FUJITA Tomonori <fujita.tomonori@....ntt.co.jp>
Cc:	linux-kernel@...r.kernel.org, muli@...ibm.com
Subject: Re: [RFC][PATCH] x86 calgary: add fallback dma_ops]]

On Fri, 2008-05-09 at 08:13 +0900, FUJITA Tomonori wrote:
> On Thu, 08 May 2008 14:40:20 -0700
> Alexis Bruemmer <alexisb@...ibm.com> wrote:
> 
> > Currently the calgary code can give drivers addresses above 4GB which is
> > very bad for hardware that is only 32bit DMA addressable.  This patch
> > "teaches" calgary to fallback to the appropriate dma_ops when it
> > encounters a device/bus which is not behind the Calgary/CalIOC2.  I
> > believe there is a better way to do this and am open for ideas, but for
> > now this certainly fixes the badness.
> 
> I'm not sure that I correctly understand what you want. You mean that
> the Calgary IOMMU code ignores device's dma_mask and gives addresses
> above 4GB or the Calgary IOMMU code wrongly handles devices that are
> not behind the Calgary?
The real issue is the latter-- the Calgary IOMMU code does not properly
handle devices that are not behind the Calgary/CalIO2.
> 
> If you refers to the former problem, other IOMMU implementations do
> something like this.
> 
> 
> diff --git a/arch/x86/kernel/pci-calgary_64.c b/arch/x86/kernel/pci-calgary_64.c
> index e28ec49..2a977bc 100644
> --- a/arch/x86/kernel/pci-calgary_64.c
> +++ b/arch/x86/kernel/pci-calgary_64.c
> @@ -268,21 +268,37 @@ static unsigned long iommu_range_alloc(struct device *dev,
>  {
>  	unsigned long flags;
>  	unsigned long offset;
> +	unsigned long limit;
>  	unsigned long boundary_size;
> +	unsigned long start;
> +	unsigned long mask;
> 
>  	boundary_size = ALIGN(dma_get_seg_boundary(dev) + 1,
>  			      PAGE_SIZE) >> PAGE_SHIFT;
> 
>  	BUG_ON(npages == 0);
> 
> +	if (dev->dma_mask)
> +		mask = *dev->dma_mask >> PAGE_SHIFT;
> +	else
> +		mask = 0xfffffffful >> PAGE_SHIFT;
> +
> +	limit = tbl->it_size;
> +	start = tbl->it_hint;
> +
> +	if (limit > mask) {
> +		limit = mask + 1;
> +		start = tbl->it_hint & mask;
> +	}
> +
>  	spin_lock_irqsave(&tbl->it_lock, flags);
> 
> -	offset = iommu_area_alloc(tbl->it_map, tbl->it_size, tbl->it_hint,
> +	offset = iommu_area_alloc(tbl->it_map, limit, start,
>  				  npages, 0, boundary_size, 0);
>  	if (offset == ~0UL) {
>  		tbl->chip_ops->tce_cache_blast(tbl);
> 
> -		offset = iommu_area_alloc(tbl->it_map, tbl->it_size, 0,
> +		offset = iommu_area_alloc(tbl->it_map, limit, 0,
>  					  npages, 0, boundary_size, 0);
>  		if (offset == ~0UL) {
>  			printk(KERN_WARNING "Calgary: IOMMU full.\n");

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ