On 3/6/2017 6:04 AM, Joerg Roedel wrote: > On Wed, Feb 22, 2017 at 05:39:44PM -0600, Bjorn Helgaas wrote: >> [+cc Joerg, iommu list] >> >> On Wed, Feb 22, 2017 at 03:44:53PM -0500, Sinan Kaya wrote: >>> On 2/22/2017 1:44 PM, Bjorn Helgaas wrote: >>>> There is no way for a driver to say "I only need this memory BAR and >>>> not the other ones." The reason is because the PCI_COMMAND_MEMORY bit >>>> enables *all* the memory BARs; there's no way to enable memory BARs >>>> selectively. If we enable memory BARs and one of them is unassigned, >>>> that unassigned BAR is enabled, and the device will respond at >>>> whatever address the register happens to contain, and that may cause >>>> conflicts. > > Hmm, maybe I am missing something, but isn't this only a problem if the > 'unassigned' BAR as an address configured that also falls into the > Bridge-Window of the parent bridge? Otherwise no requests should be > routed to the BAR anyway, right? Correct, in order for this to happen you need to have multiple devices under a bridge. One device sends a read request towards the system address that happens to overlap with the BAR address of the unassigned BAR. The device with unassigned resource will start responding. This is one of those P2P use cases. > >>> The problem is that according to PCI specification BAR addresses and >>> DMA addresses cannot overlap. >>> >>> From PCI-to-PCI Bridge Arch. spec.: "A bridge forwards PCI memory >>> transactions from its primary interface to its secondary interface >>> (downstream) if a memory address is in the range defined by the >>> Memory Base and Memory Limit registers (when the base is less than >>> or equal to the limit) as illustrated in Figure 4-3. Conversely, a >>> memory transaction on the secondary interface that is within this >>> address range will not be forwarded upstream to the primary >>> interface." >>> >>> To be specific, if your DMA address happens to be in >>> [0x80000000-0xffffffff] and root port's aperture includes this >>> range; the DMA will never make to the system memory. > > If there is no translation by an IOMMU this shouldn't be a problem, as > long as the bridge windows don't overlap with system ram. With > translation the IOMMU driver has to take care of that, which they > usually do. Correct, IOMMU drivers that I have reviewed all carve out the bridge windows out of the IOMMU driver allocatable address range in iova_reserve_pci_windows() function. > >> Hmmm. I guess SWIOTLB assumes there's no address translation in the >> DMA direction, right? If there's no address translation in the PIO >> direction, PCI bus BAR addresses are identical to the CPU-side >> addresses. In that case, there's no conflict because we already have >> to assign BARs so they never look like a system memory address. > > Yes, SWIOTLB assumes that IOVA == PA. > >> But if there *is* address translation in the PIO direction, we can >> have conflicts because the bridge can translate CPU-side PIO accesses >> to arbitrary PCI bus addresses. > > I am not aware of any hardware that does translation on the PIO space. > The IOMMUs I know of don't care about PIO at all. IOMMUs are used in the in inbound path mostly. Most of the HW has some sort of reserved address in the 4 GB whether with or without translation to support existing 32 bit only cards. We are talking about a problem in the outbound/PIO path. > > > > Joerg > > -- Sinan Kaya Qualcomm Datacenter Technologies, Inc. as an affiliate of Qualcomm Technologies, Inc. Qualcomm Technologies, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project.