lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 12 Oct 2009 16:14:49 -0600
From:	Bjorn Helgaas <bjorn.helgaas@...com>
To:	"Undisclosed.Recipients:"@domain.invalid
Cc:	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"linux-pci@...r.kernel.org" <linux-pci@...r.kernel.org>
Subject: Re: [PATCH] x86/pci: intel bus root res with IOH reading -v2

[Resending to linux-kernel and linux-pci because I fat-fingered
something and introduced HTML, so the lists bounced it.]

On Monday 12 October 2009 02:34:53 pm Ingo Molnar wrote:
> 
> * Bjorn Helgaas <bjorn.helgaas@...com> wrote:
> 
> > On Tuesday 06 October 2009 11:51:22 am Yinghai Lu wrote:
> > > Bjorn Helgaas wrote:
> > > > On Sunday 04 October 2009 10:54:24 pm Yinghai Lu wrote:
> > > >> for intel system with multi IOH. we could read peer root resource from PCI conf,
> > > >> and don't trust _CRS again for root bus
> > > > 
> > > > Ugh.  Are we going to end up with amd_bus.c, intel_bus.c, nvidia_bus.c,
> > > > broadcom_bus.c, serverworks_bus.c, etc.?
> > > only needed when you have muti ...
> > 
> > I think that translates to "yes, we will need all those bits as soon 
> > as those vendors support larger systems with multiple IOHs."  And I 
> > think that's the wrong answer.
> 
> Why is having cleanly separated per vendor information/driver wrong? I 
> think it's the right answer in most cases. _Especially_ when the other 
> option is to 'rely on the firmware'.

For the patch in question, we don't even have a root cause for the bug
(or at least, I couldn't decipher it from the changelog).  There's a
reference to _CRS being wrong, but we don't currently use _CRS for
x86 host bridges.

But in general, my objection is that even if BIOS provides perfectly
valid information about host bridge apertures, the the fact that Linux
ignores that information means we have to add this sort of vendor-
specific code every time we trip over something.  And we're tripping
over things quite often.

Windows consumes this _CRS information, so while I grant there are
certainly BIOS bugs there, I think most of the bugs are actually in
Linux.

> > > again we should trust HW conf than BIOS.
> > 
> > Certainly there's a tradeoff between a generic driver that relies on 
> > the BIOS, and a platform-specific driver that uses only the hardware. 
> > The first leaves us vulnerable to BIOS bugs, but the second leads to a 
> > plethora of drivers that require updates as hardware changes.
> 
> We do that quite well in Linux - it's one of our main strengths.
> 
> Why should we have to rely on correct firmware? Why is it wrong to know 
> about the hw's structure, to query the hardware and ignore the firmware 
> if the hardware state tells us otherwise?

If we need to learn something useful about the HW that the generic
description isn't expressive enough to tell us, that's fine.  But
that's not the case here -- all we need is the very simple description
of the bridge apertures.  I object to the idea that "new machine X
comes out, it has a correct ACPI description of the host bridges,
let's go write some X-specific code so Linux can run on it."

I *like* the idea of "new machine X comes out, oops, the BIOS is
broken, let's write a quirk to work around the BIOS defect so Linux
can run on it."  But I think this is actually less common than many
people think, simply because most machines are tested with Windows,
and that shakes out the most egregious BIOS bugs.

Bjorn
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ