lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 11 Dec 2012 22:28:53 +0000 From: Arnd Bergmann <arnd@...db.de> To: Alan Cox <alan@...rguk.ukuu.org.uk> Cc: "Russell King - ARM Linux" <linux@....linux.org.uk>, Thomas Petazzoni <thomas.petazzoni@...e-electrons.com>, Lior Amsalem <alior@...vell.com>, Andrew Lunn <andrew@...n.ch>, Yehuda Yitschak <yehuday@...vell.com>, Maen Suleiman <maen@...vell.com>, Jason Cooper <jason@...edaemon.net>, Tawfik Bayouk <tawfik@...vell.com>, Stephen Warren <swarren@...dotorg.org>, Thierry Reding <thierry.reding@...onic-design.de>, linux-kernel@...r.kernel.org, Jesse Barnes <jbarnes@...tuousgeek.org>, "Eran Ben-Avi" <benavi@...vell.com>, Nadav Haklai <nadavh@...vell.com>, Paul Gortmaker <paul.gortmaker@...driver.com>, Shadi Ammouri <shadi@...vell.com>, Gregory Clement <gregory.clement@...e-electrons.com>, Yinghai Lu <yinghai@...nel.org>, linux-arm-kernel@...ts.infradead.org Subject: Re: [RFC v1 01/16] lib: devres: don't enclose pcim_*() functions in CONFIG_HAS_IOPORT On Tuesday 11 December 2012, Alan Cox wrote: > > Plus, if you have IO space support, you must have some MMIO region for > > them to target - doing what many platforms have done to date and targetted > > ISA IO address 0 at virtual address 0 is just not on because as soon as > > you build a device driver which probes ISA addresses into your kernel, > > you will oops. > > There shouldn't really be anything poking around that is modern - this is > true of some PC stuff too. > > In general however if its because you have a window partly mapped you > could just catch the exception and load 0xFF for reads (and probably > whine with a backtrace so you know who to moan at). The problem that Russell refers to is that some platforms define a window that is 4GB large and starts at NULL. They then ioremap their PCI or PCMCIA I/O space window and use the virtual __iomem address as the offset into the 4GB I/O space window. Any driver (e.g. vgacon, /dev/port or some legacy alsa sound driver) that tries to access a low port number then ends up in user space memory, typically in an unmapped area there. We definitely don't want to catch and fixup those exceptions. The solution is to change the platforms so they actually use the proper I/O window at a virtual address that is not used for anything else. Arnd -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists