similar to: [Bug 66696] New: Nouveau does DMA to/from unexpected address

Displaying 20 results from an estimated 2000 matches similar to: "[Bug 66696] New: Nouveau does DMA to/from unexpected address"

2012 Nov 28
2
[PATCH] VT-d: make scope parsing code type safe
Rather than requiring the scopes to be the first members of their respective structures (so that casts can be used to switch between the different views), properly use types and container_of(). Signed-off-by: Jan Beulich <jbeulich@suse.com> --- a/xen/drivers/passthrough/vtd/dmar.c +++ b/xen/drivers/passthrough/vtd/dmar.c @@ -304,13 +304,15 @@ static int __init scope_device_count(con
2012 Apr 10
0
VT-d BIOS problem with DMAR/ACPI tables | Sabertooth X58
Hi, I''m not able to activate VT-d on my PC due to a buggy BIOS. Xen fails to parse ACPI DMAR table. There is a problem with RMRR address range. My configuration is : - Debian Weezy - Xen version 4.1.2 (Debian 4.1.2-2) - Sabertooth X58 with last bios (1304) - i7 - 960 I have the following message : (XEN) [VT-D]dmar.c:704: Host address width 39 (XEN) [VT-D]dmar.c:719: found
2018 Jul 03
1
multiple devices in the same iommu group in L1 guest
Hi, I have a guest enabled vIOMMU, but on the guest there are several devices in the same iommu group. Could someone help to check if I missed something? Thank you very much! 1. guest xml: # virsh edit q ... <os> <type arch='x86_64' machine='pc-q35-rhel7.5.0'>hvm</type> <loader readonly='yes' secure='yes'
2020 Nov 02
1
[PATCH] vhost/vsock: add IOTLB API support
On Fri, Oct 30, 2020 at 07:44:43PM +0800, Jason Wang wrote: > >On 2020/10/30 ??6:54, Stefano Garzarella wrote: >>On Fri, Oct 30, 2020 at 06:02:18PM +0800, Jason Wang wrote: >>> >>>On 2020/10/30 ??1:43, Stefano Garzarella wrote: >>>>This patch enables the IOTLB API support for vhost-vsock devices, >>>>allowing the userspace to emulate an IOMMU
2010 Mar 11
0
[PATCH] VT-d: various initialization fixes
Detect invalid/unsupported configurations in iommu_alloc() - offsets read from hardware must not lead to exceeding a single page (since only that much gets mapped). This covers the apparently not uncommon case of the address pointed to by a DMAR reading as all ones (Linux for example also checks for this). Further correct error handling of that function: Without storing the allocated "struct
2013 Dec 07
0
DMAR Problem since 6.5
Hello List, I updated my server to CentOS 6.5. When i boot the system with the new kernel: 2.6.32-431.el6.x86_64 I get repeating the following message: dmar: DRHD: handling fault status reg 3 dmar: DMAR:[DMA Read] Request device [00:02.0] fault addr 1fc00000 DMAR:[fault reason 06] PTE Read access is not set I use a Intel Core i5-3550 CPU with vt-d enabled to use a DVB-S Card inside a Windows
2013 Oct 04
0
Re: ASMedia ASM1083/1085 rev3 and Xen DMA Failure
[+cc Konrad, xen-devel] On Wed, Oct 02, 2013 at 04:43:46PM -0400, Aaron Opfer wrote: > First time submitting the kernel dev list, so if I have demonstrated > gross incompetence in some way, please cut me some slack. :) > > I discussed with Clemens Ladisch an issue I was having that I thought > was related to the driver he authored for my soundcard, but on his > suggestion I
2013 Oct 04
0
Re: ASMedia ASM1083/1085 rev3 and Xen DMA Failure
On 10/04/2013 06:29 PM, Bjorn Helgaas wrote: > [+cc Konrad, xen-devel] > > On Wed, Oct 02, 2013 at 04:43:46PM -0400, Aaron Opfer wrote: >> First time submitting the kernel dev list, so if I have demonstrated >> gross incompetence in some way, please cut me some slack. :) >> >> I discussed with Clemens Ladisch an issue I was having that I thought >> was
2012 Oct 24
5
[PATCH v3] IOMMU: keep disabled until iommu_setup() is called
The iommu is enabled by default when xen is booting and later disabled in iommu_setup() when no iommu is present. But under some circumstances iommu code can be called before iommu_setup() is processed. If there is no iommu available xen crashes. This can happen for example when panic(...) is called as introduced with the patch "x86-64: detect processors subject to AMD erratum #121 and
2013 Jul 24
2
[acooks@gmail.com: Re: [RFC PATCH v2 1/2] pci: Create PCIe requester ID interface]
Does it make sense to integrate these PCI ids as part of the phantom device? Right now we have a parameter where one can specify them, but this is a nice complete list of the actual devices. ----- Forwarded message from Andrew Cooks <acooks@gmail.com> ----- Date: Wed, 24 Jul 2013 23:03:37 +0800 From: Andrew Cooks <acooks@gmail.com> To: Alex Williamson
2011 Jun 02
0
[PATCH] pci: Use pr_<level> and pr_fmt
Use the current logging message styles. Convert the dbg and debug macros to alway have a terminating \n. Remove err, warn, and info macros, use pr_<level>. Add pr_fmt as appropriate. Signed-off-by: Joe Perches <joe at perches.com> --- drivers/pci/dmar.c | 116 ++++----- drivers/pci/hotplug/acpi_pcihp.c | 36 ++-- drivers/pci/hotplug/acpiphp.h
2011 Jun 02
0
[PATCH] pci: Use pr_<level> and pr_fmt
Use the current logging message styles. Convert the dbg and debug macros to alway have a terminating \n. Remove err, warn, and info macros, use pr_<level>. Add pr_fmt as appropriate. Signed-off-by: Joe Perches <joe at perches.com> --- drivers/pci/dmar.c | 116 ++++----- drivers/pci/hotplug/acpi_pcihp.c | 36 ++-- drivers/pci/hotplug/acpiphp.h
2011 Jun 02
0
[PATCH] pci: Use pr_<level> and pr_fmt
Use the current logging message styles. Convert the dbg and debug macros to alway have a terminating \n. Remove err, warn, and info macros, use pr_<level>. Add pr_fmt as appropriate. Signed-off-by: Joe Perches <joe at perches.com> --- drivers/pci/dmar.c | 116 ++++----- drivers/pci/hotplug/acpi_pcihp.c | 36 ++-- drivers/pci/hotplug/acpiphp.h
2009 Nov 24
0
nouveau current git/2.6.32rc8 git dma/iommu errors?
Hi, Newbie to this list. I've been using 2.6.32 & nouveau on F12. Things seem stable (although 3D performance is not great). I do see kernel error messages whenever I change window focus. The specific fault numbers vary, however the sequence is always: Nov 24 16:32:05 mail kernel: DRHD: handling fault status reg 702 Nov 24 16:32:05 mail kernel: DMAR:[DMA Read] Request device [02:00.0]
2017 Apr 21
1
[RFC 1/3] virtio-iommu: firmware description of the virtual topology
> From: Jean-Philippe Brucker [mailto:jean-philippe.brucker at arm.com] > Sent: Wednesday, April 19, 2017 2:41 AM > > On 18/04/17 10:51, Tian, Kevin wrote: > >> From: Jean-Philippe Brucker > >> Sent: Saturday, April 8, 2017 3:18 AM > >> > >> Unlike other virtio devices, the virtio-iommu doesn't work independently, > >> it is linked to
2017 Apr 21
1
[RFC 1/3] virtio-iommu: firmware description of the virtual topology
> From: Jean-Philippe Brucker [mailto:jean-philippe.brucker at arm.com] > Sent: Wednesday, April 19, 2017 2:41 AM > > On 18/04/17 10:51, Tian, Kevin wrote: > >> From: Jean-Philippe Brucker > >> Sent: Saturday, April 8, 2017 3:18 AM > >> > >> Unlike other virtio devices, the virtio-iommu doesn't work independently, > >> it is linked to
2014 Jan 19
2
PCI Passthrough
I'm trying to pass-through my VGA card to a guest session. I found: http://www.linux-kvm.org/page/How_to_assign_devices_with_VT-d_in_KVM - which is very frustrating because there's no date on the documentation. I suspect it's old. It does clearly say that you must have VT-d support for pci pass-through. It then goes on to say "Some work towards allowing this ["software
2010 Sep 17
27
Problem: Pattern with vertical colored lines on the dom0 screen
Hi list, I have a problem with a new laptop (reproducable on other machines too) and the xen hypervisor. When the hypervisor gets booted with VESA mode 800x600 I see some messages and then the screen contents is switched into a pattern of vertical colored lines and never comes back. In text mode all works well, but later the pattern appears when the X servers starts. I disabled VTd in the bios
2017 Apr 18
0
[RFC 1/3] virtio-iommu: firmware description of the virtual topology
On 18/04/17 10:51, Tian, Kevin wrote: >> From: Jean-Philippe Brucker >> Sent: Saturday, April 8, 2017 3:18 AM >> >> Unlike other virtio devices, the virtio-iommu doesn't work independently, >> it is linked to other virtual or assigned devices. So before jumping into >> device operations, we need to define a way for the guest to discover the >> virtual
2015 Jul 28
0
[PATCH v4 0/4] virtio: Clean up scatterlists and use the DMA API
On 28/07/2015 12:12, Benjamin Herrenschmidt wrote: >> > That is an experimental feature (it's x-iommu), so it can change. >> > >> > The plan was: >> > >> > - for PPC, virtio never honors IOMMU >> > >> > - for non-PPC, either have virtio always honor IOMMU, or enforce that >> > virtio is not under IOMMU. >> >