lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 15 Jan 2016 12:00:02 -0800 From: Andy Lutomirski <luto@...capital.net> To: Jean Delvare <jdelvare@...e.de> Cc: Pali Rohár <pali.rohar@...il.com>, Andy Lutomirski <luto@...nel.org>, platform-driver-x86@...r.kernel.org, linux-kernel <linux-kernel@...r.kernel.org>, stable <stable@...r.kernel.org> Subject: Re: [PATCH] dell-wmi: Stop storing pointers to DMI tables On Fri, Jan 15, 2016 at 9:53 AM, Jean Delvare <jdelvare@...e.de> wrote: > Hi Andy, > > Le Friday 15 January 2016 à 08:27 -0800, Andy Lutomirski a écrit : >> FWIW, especially if we consider mapping it persistently, maybe we >> should use ioremap_prot and map it both cached and ro. >> >> Actually, switching to a cached mapping regardless of persistence >> could noticeably help boot times. UC accesses are very, very slow. > > Sorry if it is obvious for everybody else, but what does "UC accesses" > mean? > Sorry, I sometimes have my head buried too far in the CPU :) UC means uncached. ioremap, on x86, asks for an uncached mapping, so every memory access (load or store) hits main memory individually. Assuming that the spec says that whatever physical memory the DMI tables live in is permitted to be used with cached accesses, asking for the CPU cache to be permitted on those accesses will make them a whole lot faster. If that isn't safe, you could also just copy each table out of the ioremap space into normal RAM as needed using MOVNTDQA. I forget what the helper for that is called, but it basically does a fast streaming IO read and then writes to normal RAM, memcpy style. Most modern CPUs support it. --Andy
Powered by blists - more mailing lists