Displaying 20 results from an estimated 4000 matches similar to: "nouveau current git/2.6.32rc8 git dma/iommu errors?"
2018 Jul 03
1
multiple devices in the same iommu group in L1 guest
Hi,
I have a guest enabled vIOMMU, but on the guest there are several devices
in the same iommu group.
Could someone help to check if I missed something?
Thank you very much!
1. guest xml:
# virsh edit q
...
<os>
<type arch='x86_64' machine='pc-q35-rhel7.5.0'>hvm</type>
<loader readonly='yes' secure='yes'
2020 Nov 02
1
[PATCH] vhost/vsock: add IOTLB API support
On Fri, Oct 30, 2020 at 07:44:43PM +0800, Jason Wang wrote:
>
>On 2020/10/30 ??6:54, Stefano Garzarella wrote:
>>On Fri, Oct 30, 2020 at 06:02:18PM +0800, Jason Wang wrote:
>>>
>>>On 2020/10/30 ??1:43, Stefano Garzarella wrote:
>>>>This patch enables the IOTLB API support for vhost-vsock devices,
>>>>allowing the userspace to emulate an IOMMU
2013 Oct 04
0
Re: ASMedia ASM1083/1085 rev3 and Xen DMA Failure
On 10/04/2013 06:29 PM, Bjorn Helgaas wrote:
> [+cc Konrad, xen-devel]
>
> On Wed, Oct 02, 2013 at 04:43:46PM -0400, Aaron Opfer wrote:
>> First time submitting the kernel dev list, so if I have demonstrated
>> gross incompetence in some way, please cut me some slack. :)
>>
>> I discussed with Clemens Ladisch an issue I was having that I thought
>> was
2012 Nov 28
2
[PATCH] VT-d: make scope parsing code type safe
Rather than requiring the scopes to be the first members of their
respective structures (so that casts can be used to switch between the
different views), properly use types and container_of().
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/xen/drivers/passthrough/vtd/dmar.c
+++ b/xen/drivers/passthrough/vtd/dmar.c
@@ -304,13 +304,15 @@ static int __init scope_device_count(con
2013 Jul 08
9
[Bug 66696] New: Nouveau does DMA to/from unexpected address
https://bugs.freedesktop.org/show_bug.cgi?id=66696
Priority: medium
Bug ID: 66696
Assignee: nouveau at lists.freedesktop.org
Summary: Nouveau does DMA to/from unexpected address
QA Contact: xorg-team at lists.x.org
Severity: major
Classification: Unclassified
OS: Linux (All)
Reporter: stijn+bugs at
2019 Dec 21
0
[PATCH 3/8] iommu/vt-d: Remove IOVA handling code from non-dma_ops path
Remove all IOVA handling code from the non-dma_ops path in the intel
iommu driver.
There's no need for the non-dma_ops path to keep track of IOVAs. The
whole point of the non-dma_ops path is that it allows the IOVAs to be
handled separately. The IOVA handling code removed in this patch is
pointless.
Signed-off-by: Tom Murphy <murphyt7 at tcd.ie>
---
drivers/iommu/intel-iommu.c | 89
2012 Apr 10
0
VT-d BIOS problem with DMAR/ACPI tables | Sabertooth X58
Hi,
I''m not able to activate VT-d on my PC due to a buggy BIOS. Xen fails
to parse ACPI DMAR table. There is a problem with RMRR address range.
My configuration is :
- Debian Weezy
- Xen version 4.1.2 (Debian 4.1.2-2)
- Sabertooth X58 with last bios (1304)
- i7 - 960
I have the following message :
(XEN) [VT-D]dmar.c:704: Host address width 39
(XEN) [VT-D]dmar.c:719: found
2012 Oct 24
5
[PATCH v3] IOMMU: keep disabled until iommu_setup() is called
The iommu is enabled by default when xen is booting and later disabled
in iommu_setup() when no iommu is present.
But under some circumstances iommu code can be called before
iommu_setup() is processed. If there is no iommu available xen crashes.
This can happen for example when panic(...) is called as introduced
with the patch "x86-64: detect processors subject to AMD erratum #121
and
2011 Jun 02
0
[PATCH] pci: Use pr_<level> and pr_fmt
Use the current logging message styles.
Convert the dbg and debug macros to alway have a terminating \n.
Remove err, warn, and info macros, use pr_<level>.
Add pr_fmt as appropriate.
Signed-off-by: Joe Perches <joe at perches.com>
---
drivers/pci/dmar.c | 116 ++++-----
drivers/pci/hotplug/acpi_pcihp.c | 36 ++--
drivers/pci/hotplug/acpiphp.h
2011 Jun 02
0
[PATCH] pci: Use pr_<level> and pr_fmt
Use the current logging message styles.
Convert the dbg and debug macros to alway have a terminating \n.
Remove err, warn, and info macros, use pr_<level>.
Add pr_fmt as appropriate.
Signed-off-by: Joe Perches <joe at perches.com>
---
drivers/pci/dmar.c | 116 ++++-----
drivers/pci/hotplug/acpi_pcihp.c | 36 ++--
drivers/pci/hotplug/acpiphp.h
2011 Jun 02
0
[PATCH] pci: Use pr_<level> and pr_fmt
Use the current logging message styles.
Convert the dbg and debug macros to alway have a terminating \n.
Remove err, warn, and info macros, use pr_<level>.
Add pr_fmt as appropriate.
Signed-off-by: Joe Perches <joe at perches.com>
---
drivers/pci/dmar.c | 116 ++++-----
drivers/pci/hotplug/acpi_pcihp.c | 36 ++--
drivers/pci/hotplug/acpiphp.h
2017 Apr 21
1
[RFC 1/3] virtio-iommu: firmware description of the virtual topology
> From: Jean-Philippe Brucker [mailto:jean-philippe.brucker at arm.com]
> Sent: Wednesday, April 19, 2017 2:41 AM
>
> On 18/04/17 10:51, Tian, Kevin wrote:
> >> From: Jean-Philippe Brucker
> >> Sent: Saturday, April 8, 2017 3:18 AM
> >>
> >> Unlike other virtio devices, the virtio-iommu doesn't work independently,
> >> it is linked to
2017 Apr 21
1
[RFC 1/3] virtio-iommu: firmware description of the virtual topology
> From: Jean-Philippe Brucker [mailto:jean-philippe.brucker at arm.com]
> Sent: Wednesday, April 19, 2017 2:41 AM
>
> On 18/04/17 10:51, Tian, Kevin wrote:
> >> From: Jean-Philippe Brucker
> >> Sent: Saturday, April 8, 2017 3:18 AM
> >>
> >> Unlike other virtio devices, the virtio-iommu doesn't work independently,
> >> it is linked to
2017 Apr 18
0
[RFC 1/3] virtio-iommu: firmware description of the virtual topology
On 18/04/17 10:51, Tian, Kevin wrote:
>> From: Jean-Philippe Brucker
>> Sent: Saturday, April 8, 2017 3:18 AM
>>
>> Unlike other virtio devices, the virtio-iommu doesn't work independently,
>> it is linked to other virtual or assigned devices. So before jumping into
>> device operations, we need to define a way for the guest to discover the
>> virtual
2010 Mar 11
0
[PATCH] VT-d: various initialization fixes
Detect invalid/unsupported configurations in iommu_alloc() - offsets
read from hardware must not lead to exceeding a single page (since
only that much gets mapped). This covers the apparently not uncommon
case of the address pointed to by a DMAR reading as all ones (Linux
for example also checks for this).
Further correct error handling of that function: Without storing the
allocated "struct
2009 Dec 05
2
git - compile error ratelimit - missing include <linux/ratelimit.h>
Building today in git - kernel 2.6.32 (git) + nouveau (git).
Failed as nouveau_irq.c doesn't include <linux/ratelimit.h>
Added the include to nouveau_irq.c and was able to compile... not sure
that's where it ought to go.
2013 Dec 07
0
DMAR Problem since 6.5
Hello List,
I updated my server to CentOS 6.5. When i boot the system with the new
kernel: 2.6.32-431.el6.x86_64 I get repeating the following message:
dmar: DRHD: handling fault status reg 3
dmar: DMAR:[DMA Read] Request device [00:02.0] fault addr 1fc00000
DMAR:[fault reason 06] PTE Read access is not set
I use a Intel Core i5-3550 CPU with vt-d enabled to use a DVB-S Card
inside a Windows
2016 Sep 14
0
Error doing PCI passthrough on CentOS 7.2
On Wed 14.Sep'16 at 7:17:45 -0600, Alex Williamson wrote:
> On Wed, 14 Sep 2016 15:00:37 +0200
> Paolo Bonzini <pbonzini at redhat.com> wrote:
>
> > On 14/09/2016 14:35, Sandro Bonazzola wrote:
> > > FYI
> > >
> > >
> > > ---------- Forwarded message ----------
> > > From: *C. L. Martinez* <carlopmart at gmail.com
2013 Oct 04
0
Re: ASMedia ASM1083/1085 rev3 and Xen DMA Failure
[+cc Konrad, xen-devel]
On Wed, Oct 02, 2013 at 04:43:46PM -0400, Aaron Opfer wrote:
> First time submitting the kernel dev list, so if I have demonstrated
> gross incompetence in some way, please cut me some slack. :)
>
> I discussed with Clemens Ladisch an issue I was having that I thought
> was related to the driver he authored for my soundcard, but on his
> suggestion I
2020 Apr 03
5
IOMMU and kernel
Hi.
Im trying to set intel_iommu=on on kernel parameters at grub but for
some reason it doesnt work.
I edit /etc/default/grub file and i add the parameter.
then i run grub2-mkconfig -o /boot/efi/EFI/centos/grub.cfg and then i
reboot.
when i run virt-host-validate i get
QEMU: Checking if IOMMU is enabled by kernel: WARN (IOMMU appears to be
disabled in kernel. Add intel_iommu=on to kernel