Displaying 20 results from an estimated 800 matches similar to: "VT-d BIOS problem with DMAR/ACPI tables | Sabertooth X58"
2009 Feb 13
12
VT-D RMRR is incorrect
I try pci pci passthrough with xen 3.3.1 and CentOS 5.2(64bit)
on a SUPERMICRO C7X58 board
I see the following the error in my boot log.
(XEN) [VT-D]dmar.c:372: RMRR is incorrect.
This problem is caused by this condition in dmr.c:372.
if ( rmrr->base_address >= rmrr->end_address )
{
dprintk(XENLOG_ERR VTDPREFIX, "RMRR is incorrect.\n");
return -EFAULT;
}
As an
2009 Feb 13
12
VT-D RMRR is incorrect
I try pci pci passthrough with xen 3.3.1 and CentOS 5.2(64bit)
on a SUPERMICRO C7X58 board
I see the following the error in my boot log.
(XEN) [VT-D]dmar.c:372: RMRR is incorrect.
This problem is caused by this condition in dmr.c:372.
if ( rmrr->base_address >= rmrr->end_address )
{
dprintk(XENLOG_ERR VTDPREFIX, "RMRR is incorrect.\n");
return -EFAULT;
}
As an
2010 Sep 17
27
Problem: Pattern with vertical colored lines on the dom0 screen
Hi list,
I have a problem with a new laptop (reproducable on other machines too) and the
xen hypervisor.
When the hypervisor gets booted with VESA mode 800x600 I see some messages and
then the screen contents is switched into a pattern of vertical colored lines
and never comes back.
In text mode all works well, but later the pattern appears when the X servers
starts.
I disabled VTd in the bios
2012 Nov 28
2
[PATCH] VT-d: make scope parsing code type safe
Rather than requiring the scopes to be the first members of their
respective structures (so that casts can be used to switch between the
different views), properly use types and container_of().
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/xen/drivers/passthrough/vtd/dmar.c
+++ b/xen/drivers/passthrough/vtd/dmar.c
@@ -304,13 +304,15 @@ static int __init scope_device_count(con
2009 Mar 04
1
pv_ops kernel 2.6.29-rc6 boot failure
Hi,
I did a git pull on pv_ops tree this morning and now get a crash when
eth0 is started, here is the full boot log:
Booting ''Xen 3.4 / Linux 2.6.29-rc6-tip''
root (hd0,0)
Filesystem type is ext2fs, partition type 0x83
kernel /xen.gz com1=115200,8n1 console=com1,vga iommu=1
[Multiboot-elf, <0x100000:0x131748:0x8e8b8>, shtab=0x2c0078, entry=0x100000]
module
2008 Dec 23
1
DQ35JO (Q35 chipset), Q6600, xen-unstable (~12/21), RMRR/DMAR error
Purchased DQ35JO on Vt-d/PCI passthrough wiki''s recommendations. Built
latest xen-unstable and am getting the following via ''xm dmesg'':
(XEN) [VT-D]dmar.c:374: RMRR error: base_addr d0000000 end_address
cfffffff
(XEN) Failed to parse ACPI DMAR. Disabling VT-d.
My grub.conf looks like this:
kernel /xen.gz vga=mode-0x0317 vtd=1 iommu=1
2013 Nov 12
0
InfiniBand Passthrough not working
2008 Jul 23
0
[PATCH] [VTD] Add RMRR check in DMAR parsing
During parsing DMAR table, if find RMRR is incorrect, return error.
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2013 Dec 07
0
DMAR Problem since 6.5
Hello List,
I updated my server to CentOS 6.5. When i boot the system with the new
kernel: 2.6.32-431.el6.x86_64 I get repeating the following message:
dmar: DRHD: handling fault status reg 3
dmar: DMAR:[DMA Read] Request device [00:02.0] fault addr 1fc00000
DMAR:[fault reason 06] PTE Read access is not set
I use a Intel Core i5-3550 CPU with vt-d enabled to use a DVB-S Card
inside a Windows
2013 Jan 15
14
[PATCH] VTD/Intremap: Disable Intremap on Chipset 5500/5520/X58 due to errata
http://www.intel.com/content/www/us/en/chipsets/5520-and-5500-chipset-ioh-specification-update.html
Stepping B-3 has two errata (#47 and #53) related to Interrupt
remapping, to which the workaround is for the BIOS to completely disable
interrupt remapping. These errata are fixed in stepping C-2.
Unfortunately this chipset is very common and many BIOSes are not
disabling remapping. We can
2008 Aug 05
18
RE: Xen-3.2.1 VT-d Support (NOT SURE WHETHER IT''S A BUG OR...)
Hello,
I''m also seeing this exact same problem. I''ve posted on xen-users, but did
not get an answer. Venkat seems to be experiencing the same problem as me. I
have the latest BIOS for my motherboard DQ35JO. (BIOS ver 933) I''m running a
Q6600 as well. It hangs at "Brought up 4 CPUs." I''ve tried all sorts of
combinations of Xen versions and kernels to
2012 Aug 04
2
wheezy VT-d passthrough test: DMAR:[fault reason 06h] PTE Read access is not set
lspci -vvv and -t attached
Serial console output: http://pastebin.ca/2177395
Main error appears to be:
(XEN) [VT-D]iommu.c:858: iommu_fault_status: Primary Pending Fault
(XEN) [VT-D]iommu.c:833: DMAR:[DMA Read] Request device [00:1e.0]
fault addr df8e5000, iommu reg = ffff82c3fff57000
(XEN) DMAR:[fault reason 06h] PTE Read access is not set
onboard nic on the same bus is going
2010 Jun 24
1
VGA passthrough - guest shows blank screen on startup
Greetings,
I''m attempting to do gfx_passthru with the primary graphics adapter
(03:00.0), passing it to a guest. I can unbind it from the host but when I
fire up the guest OS my monitor loses signal from the graphics card and
that''s that. The GFX card is dual DVI, I''ve tried both slots. Host is Linux
2.6.32.14-1.2.105.xendom0.fc12.x86_64, Guest is Windows 7. PC is an
2012 Mar 05
0
P6T RMRR clarification please
I''m using
(XEN) Xen version 4.1.2 (Debian 4.1.2-2) (waldi at debian dot org)
(gcc version 4.6.2 (Debian 4.6.2-6) ) Sat Dec 10 19:58:21 UTC 2011
With VT-d enabled in BIOS the ACPI Direct Memory Access remapping
(DMAR) in the P6T Deluxe V2 (BIOS 1202, 2011/10/10) reports
RMRR (Reserved Memory Region Reporting Structure) is bf7dc000 -
bf7dbfff
e820 table:
2010 May 12
44
Xen4 / Intel DX58SO Mobo / VT-d not working
Hello,
I''ve previously been successful with Xen4 and VT-d on other systems. I
am having trouble getting VT-d passthrough working to a WinXP domain
with DX58SO (Q45) motherboard and i7 930 CPU. VT-d is enabled in bios,
xm info shows hvm_directio capability, I have iommu=1 set, I have the
devices bound to pciback on dom0 cmdline, xm
pci-list-assignable-devices shows the devices as
2010 May 12
44
Xen4 / Intel DX58SO Mobo / VT-d not working
Hello,
I''ve previously been successful with Xen4 and VT-d on other systems. I
am having trouble getting VT-d passthrough working to a WinXP domain
with DX58SO (Q45) motherboard and i7 930 CPU. VT-d is enabled in bios,
xm info shows hvm_directio capability, I have iommu=1 set, I have the
devices bound to pciback on dom0 cmdline, xm
pci-list-assignable-devices shows the devices as
2018 Jul 03
1
multiple devices in the same iommu group in L1 guest
Hi,
I have a guest enabled vIOMMU, but on the guest there are several devices
in the same iommu group.
Could someone help to check if I missed something?
Thank you very much!
1. guest xml:
# virsh edit q
...
<os>
<type arch='x86_64' machine='pc-q35-rhel7.5.0'>hvm</type>
<loader readonly='yes' secure='yes'
2013 Nov 18
0
btrfs goes read only after balance
Hi everybody,
we are using a btrfs RAID 1 with four 2TB hard drives (WD Caviar green
and one Red) on a Debian 7.2 with Kernel 3.12.0
Last week I replaced a broken Harddrive with btrfs replace ...
After that I wanted to balance the filesystem and get a
''Speicherzugriffsfehler'' (Segmentation fault). After that I want to
reboot the system and nothing happens, it hangs at a btrfs
2008 Jul 25
0
[PATCH 0/4] Various VT-d code cleanup
The patches are as follows:
Patch 1: Map RMRR in intel_iommu_add_device() if the device has RMRR;
move domain_context_mapping() to be in front of list_move() in
reassign_device_ownership().
Patch 2: There is only one INCLUDE_ALL DMAR unit in system, but no
restriction on whether it''s the last unit.
Patch 3: Change code style of pci.c file, and add
spin_unlock(&pdev->lock) when
2010 Nov 29
13
VTD not working on Intel DX58SO w/ Xen 4.0.1
Hello,
I''m having problems with VTD on this board. The board/cpu/bios all
support vt-d and I think maybe I''m just missing something?
Any feedback would be much appreciated :)
Output below:
root@vm:~# xm create /etc/xen/vm-nine.cfg
Using config file "/etc/xen/vm-nine.cfg".
Error: Failed to assign device to IOMMU
(0000:05:00.0@100,msitranslate=1,power_mgmt=0)