lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Thu, 19 Jan 2017 16:13:31 +0000
From:   Will Deacon <will.deacon@....com>
To:     Aleksey Makarov <aleksey.makarov@...aro.org>
Cc:     iommu@...ts.linux-foundation.org,
        linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org,
        Robin Murphy <robin.murphy@....com>,
        Tomasz Nowicki <tnowicki@...iumnetworks.com>,
        Joerg Roedel <joro@...tes.org>
Subject: Re: [PATCH v4] iommu/arm-smmu: Support for Extended Stream ID (16
 bit)

On Thu, Jan 19, 2017 at 05:36:36PM +0300, Aleksey Makarov wrote:
> It is the time we have the real 16-bit Stream ID user, which is the
> ThunderX. Its IO topology uses 1:1 map for Requester ID to Stream ID
> translation for each root complex which allows to get full 16-bit
> Stream ID.  Firmware assigns bus IDs that are greater than 128 (0x80)
> to some buses under PEM (external PCIe interface).  Eventually SMMU
> drops devices on that buses because their Stream ID is out of range:
> 
>   pci 0006:90:00.0: stream ID 0x9000 out of range for SMMU (0x7fff)
> 
> To fix above issue enable the Extended Stream ID optional feature
> when available.
> 
> Reviewed-by: Tomasz Nowicki <tomasz.nowicki@...iumnetworks.com>
> Signed-off-by: Aleksey Makarov <aleksey.makarov@...aro.org>
> Tested-by: Tomasz Nowicki <tomasz.nowicki@...iumnetworks.com>
> ---
> v4:
> change the commit message:
> - explain the reason why the warning happens (Tomasz Nowicki)
> - add 'Reviewed-by' and 'Tested-by' from Tomasz Nowicki

Thanks, I'll queue this for 4.11.

Will

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ