lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20151014121843.GN27420@8bytes.org>
Date:	Wed, 14 Oct 2015 14:18:43 +0200
From:	Joerg Roedel <joro@...tes.org>
To:	Chen Feng <puck.chen@...ilicon.com>
Cc:	iommu@...ts.linux-foundation.org, linux-kernel@...r.kernel.org,
	robh+dt@...nel.org, pawel.moll@....com, haojian.zhuang@...aro.org,
	devicetree@...r.kernel.org, xuwei5@...ilicon.com,
	xuyiping@...ilicon.com, w.f@...wei.com,
	kong.kongxinwei@...ilicon.com, z.liuxinliang@...ilicon.com,
	yudongbin@...ilicon.com, weidong2@...ilicon.com,
	saberlily.xia@...ilicon.com, linuxarm@...wei.com,
	dan.zhao@...ilicon.com, peter.panshilin@...ilicon.com,
	qijiwen@...ilicon.com
Subject: Re: [PATCH 2/3] iommu/hisilicon: Add hi6220 iommu driver

On Thu, Oct 08, 2015 at 03:45:47PM +0800, Chen Feng wrote:
> +static int hi6220_smmu_attach_dev(struct iommu_domain *domain,
> +				  struct device *dev)
> +{
> +	struct hi6220_domain *m_domain = to_hi6220_domain(domain);
> +
> +	smmu_domain_prepare(m_domain);
> +	dev->archdata.iommu = &m_domain->smmu_dev->iova_allocator;
> +
> +	return 0;
> +}

What happens when you attach devices behind different smmus to one
domain? Will that overwrite the smmu_dev pointer in the domain?

> +static size_t hi6220_smmu_unmap(struct iommu_domain *domain, unsigned long iova,
> +				size_t size)
> +{
> +	struct hi6220_domain *m_domain = to_hi6220_domain(domain);
> +	size_t page_size = m_domain->smmu_dev->page_size;
> +	struct hi6220_smmu *smmu_dev = m_domain->smmu_dev;
> +	int *page_table = (unsigned int *)smmu_dev->pgtable_virt;
> +
> +	if (size != page_size) {
> +		pr_err("unmap size error, only support %zd\n", page_size);
> +		return 0;
> +	}
> +
> +	__clear_smmu_pte(page_table + IOVA_PFN(iova));
> +
> +	return page_size;
> +}

Don't you need a call to __invalid_smmu_tlb here too?



	Joerg

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ