lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20100826185938A.fujita.tomonori@lab.ntt.co.jp>
Date:	Thu, 26 Aug 2010 19:00:24 +0900
From:	FUJITA Tomonori <fujita.tomonori@....ntt.co.jp>
To:	u.kleine-koenig@...gutronix.de
Cc:	fujita.tomonori@....ntt.co.jp, g.liakhovetski@....de,
	mitov@...p.bas.bg, linux-kernel@...r.kernel.org,
	linux-media@...r.kernel.org, akpm@...ux-foundation.org,
	linux-arm-kernel@...ts.infradead.org, linux-sh@...r.kernel.org,
	philippe.retornaz@...l.ch, gregkh@...e.de, jkrzyszt@....icnet.pl
Subject: Re: [RFC][PATCH] add
	dma_reserve_coherent_memory()/dma_free_reserved_memory() API

On Thu, 26 Aug 2010 11:53:11 +0200
Uwe Kleine-K.$(D+S.(Bnig <u.kleine-koenig@...gutronix.de> wrote:

> > > We have currently a number of boards broken in the mainline. They must be 
> > > fixed for 2.6.36. I don't think the mentioned API will do this for us. So, 
> > > as I suggested earlier, we need either this or my patch series
> > > 
> > > http://thread.gmane.org/gmane.linux.ports.sh.devel/8595
> > > 
> > > for 2.6.36.
> > 
> > Why can't you revert a commit that causes the regression?
> > 
> > The related DMA API wasn't changed in 2.6.36-rc1. The DMA API is not
> > responsible for the regression. And the patchset even exnteds the
> > definition of the DMA API (dma_declare_coherent_memory). Such change
> > shouldn't applied after rc1. I think that DMA-API.txt says that
> > dma_declare_coherent_memory() handles coherent memory for a particular
> > device. It's not for the API that reserves coherent memory that can be
> > used for any device for a single device.
> The patch that made the problem obvious for ARM is
> 309caa9cc6ff39d261264ec4ff10e29489afc8f8 aka v2.6.36-rc1~591^2~2^4~12.
> So this went in before v2.6.36-rc1.  One of the "architectures which
> similar restrictions" is x86 BTW.
> 
> And no, we won't revert 309caa9cc6ff39d261264ec4ff10e29489afc8f8 as it
> addresses a hardware restriction.

How these drivers were able to work without hitting the hardware restriction?
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ