lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 17 Aug 2009 15:15:09 -0700
From:	Suresh Siddha <suresh.b.siddha@...el.com>
To:	"H. Peter Anvin" <hpa@...or.com>
Cc:	"mingo@...e.hu" <mingo@...e.hu>,
	"tglx@...utronix.de" <tglx@...utronix.de>,
	"Pallipadi, Venkatesh" <venkatesh.pallipadi@...el.com>,
	"xam@...ian.org" <xam@...ian.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: [patch] x86, pat: allow ISA memory range uncacheable mapping
 requests

On Mon, 2009-08-17 at 14:11 -0700, H. Peter Anvin wrote:
> On 08/17/2009 01:23 PM, Suresh Siddha wrote:
> > Max Vozeler reported:
> >>  Bug 13877 -  bogl-term broken with CONFIG_X86_PAT=y, works with =n  
> >>
> >>  strace of bogl-term:
> >>  814   mmap2(NULL, 65536, PROT_READ|PROT_WRITE, MAP_SHARED, 4, 0)
> >> 				 = -1 EAGAIN (Resource temporarily unavailable)
> >>  814   write(2, "bogl: mmaping /dev/fb0: Resource temporarily unavailable\n",
> >> 	       57) = 57
> > 
> > PAT code maps the ISA memory range as WB in the PAT attribute, so that
> > fixed range MTRR registers define the actual memory type (UC/WC/WT etc).
> > 
> > But the upper level is_new_memtype_allowed() API checks are failing,
> > as the request here is for UC and the return tracked type is WB (Tracked type is
> > WB as MTRR type for this legacy range potentially will be different for each
> > 4k page).
> > 
> > Fix is_new_memtype_allowed() by always succeeding the ISA address range
> > checks, as the null PAT (WB) and def MTRR fixed range register settings
> > satisfy the memory type needs of the applications that map the ISA address
> > range.
> 
> This patch seems correct in that it matches the current behavior of the
> code.  I have, though, to ask what the logic behind treating the ISA
> region in this way is.

With the (legacy) applications mapping this ISA region we have observed

a) they typically map more than what they want. some of this might be
covering some RAM backed pages  which are at < 1MB

b) they really don't care about the requested attribute but some specify
uncached and some don't specify any attribute

And mapped ISA range can have different memory attributes (UC, WT, WP
etc) based on the MTRR fixed range registers.

> From a hardware perspective it makes sense --
> these addresses have the Legacy MTRRs which are like a
> physical-address-based PAT, but it seems somewhat odd that'd we would
> expect applications to use different APIs for this region.

We are using the same pat API but the API handles this legacy range
differently.

Atleast some of the special ISA checks can be simplified by tracking the
memory range page by page (based on the attribute set by mtrr etc) for
this region and not at the granularity of the user mapping request. But
we need to pass the per page attributes to the higher level API's like
ioremap() or remap_pfn_range()  who has to set different attributes for
these pfn's. Not sure if this is all worth for some legacy applications
which are not performance sensitive and all they want is to just access
those memory ranges.

thanks,
suresh

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ