lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <m1tzw6yera.fsf@ebiederm.dsl.xmission.com>
Date:	Tue, 27 Mar 2007 07:53:13 -0600
From:	ebiederm@...ssion.com (Eric W. Biederman)
To:	Jeff Garzik <jeff@...zik.org>
Cc:	David Miller <davem@...emloft.net>, bunk@...sta.de, gregkh@...e.de,
	linux-kernel@...r.kernel.org, linux-pci@...ey.karlin.mff.cuni.cz
Subject: Re: [RFC: 2.6.21 patch] let PCI_MSI depend on EXPERIMENTAL

Jeff Garzik <jeff@...zik.org> writes:

> Eric W. Biederman wrote:
>> aka.  Drivers have started supporting MSI, People have started using
>> and testing MSI, and there has been MSI maintenance.  People care.
>
> Agreed, well put.
>
>
>> The most recent regressions involving MSI have been fixes propagating
>> their way through the kernel, and I can't think of a one of them
>> that was MSI specific.  Just that the bug didn't happen to show
>> up clearly without MSI enabled.
>
> Yep.
>
>
>> So default it to off, although I suspect we are approaching the
>> point where it would actually be safe to default it to on.  We
>> need a kernel release that doesn't have msi issues yet.
>
> Now that we are finally getting a handle on the MSI bumps-in-the-road, IMO it
> would be counterproductive to default it to 'off' now.

Let's see the Kconfig entry currently reads:

> config PCI_MSI
>         bool "Message Signaled Interrupts (MSI and MSI-X)"
>         depends on PCI
>         depends on (X86_LOCAL_APIC && X86_IO_APIC) || IA64 || SPARC64
>         help
>            This allows device drivers to enable MSI (Message Signaled
>            Interrupts).  Message Signaled Interrupts enable a device to
>            generate an interrupt using an inbound Memory Write on its
>            PCI bus instead of asserting a device IRQ pin.
> 
>            Use of PCI MSI interrupts can be disabled at kernel boot time
>            by using the 'pci=nomsi' option.  This disables MSI for the
>            entire system.
> 
>            If you don't know what to do here, say N.

So I don't know if we are defaulting it to off but we are advising it be
turned off.  So all of the bug reports are coming from people who presumably
know what they are doing and deliberately turn it on.

Once things quite down and we fix the chipset support detection then I think
we can default it to on.  Once that settles down we can remove the manual
option entirely except possibly under CONFIG_EMBEDDED.

We certainly don't have the question does this chipset support MSI handled
well enough to do better right now.  I think non-x86 might but we certainly
don't.

Eric

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ