lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <a60318ef-dc19-a146-5ac3-16eae38b8c37@huawei.com>
Date:   Mon, 6 Dec 2021 09:42:23 +0000
From:   John Garry <john.garry@...wei.com>
To:     <Ajish.Koshy@...rochip.com>, <jinpu.wang@...ud.ionos.com>,
        <jejb@...ux.ibm.com>, <martin.petersen@...cle.com>
CC:     <Viswas.G@...rochip.com>, <linux-scsi@...r.kernel.org>,
        <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] scsi: pm8001: Fix phys_to_virt() usage on dma_addr_t

On 29/11/2021 10:46, Ajish.Koshy@...rochip.com wrote:
> Thanks John for the update. Based on the given issue,
> we never tested on arm server.
> 
> Further arm testing will depend on the availability of
> the server.
> 
> Meanwhile will do further test on x86 and update
> on the observations.

Have you tested on x86 with the IOMMU enabled? From my limited 
experience, out of the box the IOMMU is disabled in the BIOS on x86 
machines - that is a very general statement. But this is not just an 
issue specific to arm64.

Thanks,
John

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ