search for: virtio_block

Displaying 20 results from an estimated 53 matches for "virtio_block".

2017 Jan 09
3
[RFC PATCH] vring: Force use of DMA API for ARM-based systems
...>> >>> It used to work with 4.9, but since 9491ae4 ("mm: don't cap request size >>> based on read-ahead setting") unlocked read-ahead, we quickly run into >>> the limit of swiotlb and panic: >>> >>> [ 5.382359] virtio-mmio 1c130000.virtio_block: swiotlb buffer is full >>> (sz: 491520 bytes) >>> [ 5.382452] virtio-mmio 1c130000.virtio_block: DMA: Out of SW-IOMMU >>> space for 491520 bytes >>> [ 5.382531] Kernel panic - not syncing: DMA: Random memory could be >>> DMA written >>> ....
2017 Jan 09
3
[RFC PATCH] vring: Force use of DMA API for ARM-based systems
...>> >>> It used to work with 4.9, but since 9491ae4 ("mm: don't cap request size >>> based on read-ahead setting") unlocked read-ahead, we quickly run into >>> the limit of swiotlb and panic: >>> >>> [ 5.382359] virtio-mmio 1c130000.virtio_block: swiotlb buffer is full >>> (sz: 491520 bytes) >>> [ 5.382452] virtio-mmio 1c130000.virtio_block: DMA: Out of SW-IOMMU >>> space for 491520 bytes >>> [ 5.382531] Kernel panic - not syncing: DMA: Random memory could be >>> DMA written >>> ....
2008 Apr 24
0
[PATCH 5/6] virtio: de-structify virtio_block status byte
An embedded and charset-unspecified text was scrubbed... Name: not available Url: http://lists.linux-foundation.org/pipermail/virtualization/attachments/20080423/ea280a06/attachment.txt
2008 Apr 24
0
[PATCH 5/6] virtio: de-structify virtio_block status byte
An embedded and charset-unspecified text was scrubbed... Name: not available Url: http://lists.linux-foundation.org/pipermail/virtualization/attachments/20080423/ea280a06/attachment.txt
2017 Jan 06
2
[RFC PATCH] vring: Force use of DMA API for ARM-based systems
...which > limits the number of mappings. > > It used to work with 4.9, but since 9491ae4 ("mm: don't cap request size > based on read-ahead setting") unlocked read-ahead, we quickly run into > the limit of swiotlb and panic: > > [ 5.382359] virtio-mmio 1c130000.virtio_block: swiotlb buffer is full > (sz: 491520 bytes) > [ 5.382452] virtio-mmio 1c130000.virtio_block: DMA: Out of SW-IOMMU > space for 491520 bytes > [ 5.382531] Kernel panic - not syncing: DMA: Random memory could be > DMA written > ... > [ 5.383148] [<ffff0000083ad754>...
2017 Jan 06
2
[RFC PATCH] vring: Force use of DMA API for ARM-based systems
...which > limits the number of mappings. > > It used to work with 4.9, but since 9491ae4 ("mm: don't cap request size > based on read-ahead setting") unlocked read-ahead, we quickly run into > the limit of swiotlb and panic: > > [ 5.382359] virtio-mmio 1c130000.virtio_block: swiotlb buffer is full > (sz: 491520 bytes) > [ 5.382452] virtio-mmio 1c130000.virtio_block: DMA: Out of SW-IOMMU > space for 491520 bytes > [ 5.382531] Kernel panic - not syncing: DMA: Random memory could be > DMA written > ... > [ 5.383148] [<ffff0000083ad754>...
2017 Jan 09
0
[RFC PATCH] vring: Force use of DMA API for ARM-based systems
...; It used to work with 4.9, but since 9491ae4 ("mm: don't cap request size > >>> based on read-ahead setting") unlocked read-ahead, we quickly run into > >>> the limit of swiotlb and panic: > >>> > >>> [ 5.382359] virtio-mmio 1c130000.virtio_block: swiotlb buffer is full > >>> (sz: 491520 bytes) > >>> [ 5.382452] virtio-mmio 1c130000.virtio_block: DMA: Out of SW-IOMMU > >>> space for 491520 bytes > >>> [ 5.382531] Kernel panic - not syncing: DMA: Random memory could be > >>> D...
2016 Dec 20
4
[RFC PATCH] vring: Force use of DMA API for ARM-based systems
Booting Linux on an ARM fastmodel containing an SMMU emulation results in an unexpected I/O page fault from the legacy virtio-blk PCI device: [ 1.211721] arm-smmu-v3 2b400000.smmu: event 0x10 received: [ 1.211800] arm-smmu-v3 2b400000.smmu: 0x00000000fffff010 [ 1.211880] arm-smmu-v3 2b400000.smmu: 0x0000020800000000 [ 1.211959] arm-smmu-v3 2b400000.smmu: 0x00000008fa081002 [
2016 Dec 20
4
[RFC PATCH] vring: Force use of DMA API for ARM-based systems
Booting Linux on an ARM fastmodel containing an SMMU emulation results in an unexpected I/O page fault from the legacy virtio-blk PCI device: [ 1.211721] arm-smmu-v3 2b400000.smmu: event 0x10 received: [ 1.211800] arm-smmu-v3 2b400000.smmu: 0x00000000fffff010 [ 1.211880] arm-smmu-v3 2b400000.smmu: 0x0000020800000000 [ 1.211959] arm-smmu-v3 2b400000.smmu: 0x00000008fa081002 [
2017 Jan 06
0
[RFC PATCH] vring: Force use of DMA API for ARM-based systems
...number of mappings. >> >> It used to work with 4.9, but since 9491ae4 ("mm: don't cap request size >> based on read-ahead setting") unlocked read-ahead, we quickly run into >> the limit of swiotlb and panic: >> >> [ 5.382359] virtio-mmio 1c130000.virtio_block: swiotlb buffer is full >> (sz: 491520 bytes) >> [ 5.382452] virtio-mmio 1c130000.virtio_block: DMA: Out of SW-IOMMU >> space for 491520 bytes >> [ 5.382531] Kernel panic - not syncing: DMA: Random memory could be >> DMA written >> ... >> [ 5.38314...
2017 Jan 09
0
[RFC PATCH] vring: Force use of DMA API for ARM-based systems
...; It used to work with 4.9, but since 9491ae4 ("mm: don't cap request size > >>> based on read-ahead setting") unlocked read-ahead, we quickly run into > >>> the limit of swiotlb and panic: > >>> > >>> [ 5.382359] virtio-mmio 1c130000.virtio_block: swiotlb buffer is full > >>> (sz: 491520 bytes) > >>> [ 5.382452] virtio-mmio 1c130000.virtio_block: DMA: Out of SW-IOMMU > >>> space for 491520 bytes > >>> [ 5.382531] Kernel panic - not syncing: DMA: Random memory could be > >>> D...
2017 Jan 06
0
[RFC PATCH] vring: Force use of DMA API for ARM-based systems
...the DMA ops fall back to swiotlb, which limits the number of mappings. It used to work with 4.9, but since 9491ae4 ("mm: don't cap request size based on read-ahead setting") unlocked read-ahead, we quickly run into the limit of swiotlb and panic: [ 5.382359] virtio-mmio 1c130000.virtio_block: swiotlb buffer is full (sz: 491520 bytes) [ 5.382452] virtio-mmio 1c130000.virtio_block: DMA: Out of SW-IOMMU space for 491520 bytes [ 5.382531] Kernel panic - not syncing: DMA: Random memory could be DMA written ... [ 5.383148] [<ffff0000083ad754>] swiotlb_map_page+0x194/0x1a0 [...
2018 Jun 27
1
[PATCH v2 1/5] dt-bindings: virtio: Specify #iommu-cells value for a virtio-iommu
...;IOMMU master node" of iommu.txt sufficient? Since the > iommus property applies to any DMA master, not only virtio-mmio devices, > the canonical description in iommu.txt seems the best place for it, and > I'm not sure what to add in this file. Maybe a short example below the > virtio_block one? No, because somewhere we have to capture if 'iommus' is valid for 'virtio-mmio' or not. Hopefully soon we'll actually be able to validate that. Rob
2018 Jun 25
2
[PATCH v2 1/5] dt-bindings: virtio: Specify #iommu-cells value for a virtio-iommu
On Thu, Jun 21, 2018 at 08:06:51PM +0100, Jean-Philippe Brucker wrote: > A virtio-mmio node may represent a virtio-iommu device. This is discovered > by the virtio driver at probe time, but the DMA topology isn't > discoverable and must be described by firmware. For DT the standard IOMMU > description is used, as specified in bindings/iommu/iommu.txt and >
2018 Jun 25
2
[PATCH v2 1/5] dt-bindings: virtio: Specify #iommu-cells value for a virtio-iommu
On Thu, Jun 21, 2018 at 08:06:51PM +0100, Jean-Philippe Brucker wrote: > A virtio-mmio node may represent a virtio-iommu device. This is discovered > by the virtio driver at probe time, but the DMA topology isn't > discoverable and must be described by firmware. For DT the standard IOMMU > description is used, as specified in bindings/iommu/iommu.txt and >
2018 Jun 21
0
[PATCH v2 1/5] dt-bindings: virtio: Specify #iommu-cells value for a virtio-iommu
...u: + +- #iommu-cells: When the node describes a virtio-iommu device, it is + linked to DMA masters using the "iommus" property as + described in devicetree/bindings/iommu/iommu.txt. For + virtio-iommu #iommu-cells must be 1, each cell describing + a single endpoint ID. + Example: virtio_block at 3000 { -- 2.17.0
2018 Jun 26
0
[PATCH v2 1/5] dt-bindings: virtio: Specify #iommu-cells value for a virtio-iommu
...'t section "IOMMU master node" of iommu.txt sufficient? Since the iommus property applies to any DMA master, not only virtio-mmio devices, the canonical description in iommu.txt seems the best place for it, and I'm not sure what to add in this file. Maybe a short example below the virtio_block one? Thanks, Jean
2018 Oct 12
0
[PATCH v3 1/7] dt-bindings: virtio-mmio: Add IOMMU description
...evice accesses memory through an IOMMU, it should + have an "iommus" property [1]. Since virtio-iommu itself + does not access memory through an IOMMU, the "virtio,mmio" + node cannot have both an "#iommu-cells" and an "iommus" + property. + Example: virtio_block at 3000 { compatible = "virtio,mmio"; reg = <0x3000 0x100>; interrupts = <41>; + + /* Device has endpoint ID 23 */ + iommus = <&viommu 23> } + + viommu: virtio_iommu at 3100 { + compatible = "virtio,mmio"; + reg = <0x3100 0x100>; + int...
2008 May 02
0
[PULL] virtio & lguest changes for 2.6.26
...ace Harvey Harrison (1): virtio: fix sparse return void-valued expression warnings Marcelo Tosatti (1): virtio-blk: fix remove oops Rusty Russell (11): virtio: ignore corrupted virtqueues rather than spinning. virtio: fix tx_ stats in virtio_net virtio: de-structify virtio_block status byte virtio: fix scatterlist sizing in net driver. virtio: wean net driver off NETDEV_TX_BUSY virtio: finer-grained features for virtio_net virtio: change config to guest endian. virtio: explicit advertisement of driver features lguest: avoid using NR_CPUS...
2008 May 02
0
[PULL] virtio & lguest changes for 2.6.26
...ace Harvey Harrison (1): virtio: fix sparse return void-valued expression warnings Marcelo Tosatti (1): virtio-blk: fix remove oops Rusty Russell (11): virtio: ignore corrupted virtqueues rather than spinning. virtio: fix tx_ stats in virtio_net virtio: de-structify virtio_block status byte virtio: fix scatterlist sizing in net driver. virtio: wean net driver off NETDEV_TX_BUSY virtio: finer-grained features for virtio_net virtio: change config to guest endian. virtio: explicit advertisement of driver features lguest: avoid using NR_CPUS...