[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <45AC06B2.3060806@scientia.net>
Date: Mon, 15 Jan 2007 23:56:50 +0100
From: Christoph Anton Mitterer <calestyo@...entia.net>
To: Robert Hancock <hancockr@...w.ca>
CC: linux-kernel@...r.kernel.org, cw@...f.org, knweiss@....de,
ak@...e.de, andersen@...epoet.org, krader@...ibm.com,
lfriedman@...dia.com, linux-nforce-bugs@...dia.com
Subject: Re: data corruption with nvidia chipsets and IDE/SATA drives // memory
hole mapping related bug?!
Hi everybody.
Sorry again for my late reply...
Robert gave us the following interesting information some days ago:
Robert Hancock wrote:
> If this is related to some problem with using the GART IOMMU with memory
> hole remapping enabled, then 2.6.20-rc kernels may avoid this problem on
> nForce4 CK804/MCP04 chipsets as far as transfers to/from the SATA
> controller are concerned as the sata_nv driver now supports 64-bit DMA
> on these chipsets and so no longer requires the IOMMU.
>
I've just tested it with my "normal" BIOS settings, that is memhole
mapping = hardware, IOMMU = enabled and 64MB and _without_ (!)
iommu=soft as kernel parameters.
I only had the time for a small test (that is 3 passes with each 10
complete sha512sums cyles over about 30GB data)... but sofar, no
corruption occured.
It is surely far to eraly to tell that our issue was solved by
2.6.20-rc-something.... but I ask all of you that had systems that
suffered from the corruption to make _intensive_ tests with the most
recent rc of 2.6.20 (I've used 2.6.20-rc5) and report your results.
I'll do a extensive test tomorrow.
And of course (!!): Test without using iommu=soft and with enabled
memhole mapping (in the BIOS). (It won't make any sense to look if the
new kernel solves our problem while still applying one of our two
workarounds).
Please also note that there might be two completely data corruption
problems. The onle "solved" by iommu=soft and another reported by Kurtis
D. Rader.
I've asked him to clarify this in a post. :-)
Ok,... now if this (the new kernel) would really solve the issue... we
should try to find out what exactly was changed in the code, and if it
sounds logical that this solved the problem or not.
The new kernel could just make the corruption even more rare.
Best wishes,
Chris.
View attachment "calestyo.vcf" of type "text/x-vcard" (156 bytes)
Powered by blists - more mailing lists