lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1239258091.7279.22.camel@pasglop>
Date:	Thu, 09 Apr 2009 08:21:31 +0200
From:	Benjamin Herrenschmidt <benh@...nel.crashing.org>
To:	Kumar Gala <galak@...nel.crashing.org>
Cc:	Jesse Barnes <jbarnes@...tuousgeek.org>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	linux-pci@...r.kernel.org,
	Linux/PPC Development <linuxppc-dev@...abs.org>
Subject: Re: tracking of PCI address space

On Wed, 2009-04-08 at 15:53 -0500, Kumar Gala wrote:
> I was wondering if we have anything that tracks regions associated  
> with the "inbound" side of a pci_bus.
> 
> What I mean is on embedded PPC we have window/mapping registers for  
> both inbound (accessing memory on the SoC) and outbound (access PCI  
> device MMIO, IO etc).  The combination of the inbound & outbound  
> convey what exists in the PCI address space vs CPU physical address  
> space (and how to map from one to the other).  Today in the PPC land  
> we only attach outbound windows to the pci_bus.  So technically the  
> inbound side information (like what subset of physical memory is  
> visible on the PCI bus) seems to be lost.

On powerpc, we do keep track of the offset, but that's about it.

Tracking inbound ranges is very platform specific though. You can have
multiple inbound windows with different translations, in some cases some
via iommu and some not, or windows aliasing the same target memory but
with different attributes, etc...

I don't think there's that much interest in trying to create generic
code to keep track.

Ben.


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ