[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-id: <46ED692B.3010004@shaw.ca>
Date: Sun, 16 Sep 2007 11:34:35 -0600
From: Robert Hancock <hancockr@...w.ca>
To: Ivan Kokshaysky <ink@...assic.park.msu.ru>
Cc: Greg KH <gregkh@...e.de>, Matthew Wilcox <matthew@....cx>,
Shaohua Li <shaohua.li@...el.com>,
lkml <linux-kernel@...r.kernel.org>,
linux-pci <linux-pci@...ey.karlin.mff.cuni.cz>,
Andrew Morton <akpm@...ux-foundation.org>,
Jesse Barnes <jbarnes@...tuousgeek.org>
Subject: Re: [PATCH]PCI:disable resource decode in PCI BAR detection
Ivan Kokshaysky wrote:
> On Fri, Sep 14, 2007 at 05:53:58PM -0600, Robert Hancock wrote:
>> In the first one, Linus talks about a USB controller whose SMM code
>> chokes on the BAR being disabled. That explanation seems odd to me. If
>> it chokes on the BAR disabled, how doesn't it choke on the BAR being
>> moved to a different location, which is unavoidable during probing?
>
> Here is an article with detailed explanation of that USB issue:
>
> http://support.microsoft.com/kb/250635
>
> The most interesting fact there is that windows *does not* clear
> PCI_COMMAND_MEMORY bits during PCI bus enumeration, so BIOS writers
> have to rely on that. Yet another reason why your patch is unsafe.
Windows 98 doesn't, it says. That doesn't say anything about what newer
versions of Windows are doing (like Vista, which is the first to
actually use MMCONFIG).
>
>> Also, I think we do USB handoff from the BIOS much earlier than we used
>> to, which likely prevents these issues.
>
> I don't think so. This can only be done in USB driver, which cannot run
> before PCI device discovery.
Check the code. We have a quirk to handle this, in
drivers/usb/host/pci-quirks.c
>
>> In the second one, he mentions that "So the secondary rule to "don't
>> turnoff MEM or IO accesses" is "never allocate real PCI BAR resources at
>> the top of memory". Well, unfortunately, the second one isn't possible
>> to meet given that we have boards with the MMCONFIG up there, so
>> disabling the decode is the only thing we can do. That whole discussion
>> was also based on the fact that it wasn't necessary to solve problems.
>> This is no longer a theoretical problem. We now have real problems that
>> we need this in order to solve.
>
> I have suggested a *practical* solution that disables the decode only
> when it's unavoidable. If it's not sufficient for some machines, it
> can be extended quite easily.
>
>>> No, it's impossible for several reasons. Most obvious one is that a PCI-E
>>> bridge does isolate stuff quite nicely.
>> It's not impossible at all. In fact I'm quite sure (Jesse can confirm)
>> that in the case of the board he was using, it was an add-in graphics
>> card where he saw this problem.
>
> Again, it's impossible with AGP or PCI-E cards, which are always separated
> from the root bus by AGP or PCI-E bridge. The bridge does decode in the
> first place, so when you write the BAR with all ones, you move it outside
> the bridge decoding window. Address collision isn't possible in this
> case in principle.
And yet, something was clearly happening to cause this. Jesse, what were
the bridge decode windows (shown in lspci -v) on one of those boards
that was having issues?
>
>> The fact is that in the case of MMCONFIG overlap with PCI BARs, which
>> one takes priority is completely undefined. In the case of this Intel
>> chipset, clearly the PCI Express device connected to the northbridge had
>> higher decode priority than the MMCONFIG aperture.
>
> Another possible solution is not to use mmconfig for bar sizing at all,
> if it's *that* broken. It would be more complicated though, since it
> probably requires changes to all architectures.
It's not broken at all, it just requires that we not do silly things
like stick enabled decode regions over top of the aperture.
--
Robert Hancock Saskatoon, SK, Canada
To email, remove "nospam" from hancockr@...pamshaw.ca
Home Page: http://www.roberthancock.com/
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists