lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <d2c5ee4a-e72b-672e-ae30-7b3cd5a43c63@molgen.mpg.de>
Date:   Mon, 23 Jul 2018 12:09:37 +0200
From:   Paul Menzel <pmenzel+linux-iommu@...gen.mpg.de>
To:     Jörg Rödel <joro@...tes.org>
Cc:     iommu@...ts.linux-foundation.org, linux-kernel@...r.kernel.org
Subject: Re: MSI B350M MORTAR: `AMD-Vi: Unable to write to IOMMU perf
 counter.` and `pci 0000:00:00.2: can't derive routing for PCI INT A`

Dear Jörg,


On 07/20/18 14:31, Jörg Rödel wrote:

> On Tue, Jul 17, 2018 at 06:02:07PM +0200, Paul Menzel wrote:
>> $ dmesg
>> […]
>> [    0.145696] calling  pci_iommu_init+0x0/0x3f @ 1
>> [    0.145719] AMD-Vi: Unable to write to IOMMU perf counter.
> 
> This is likely a firmware issue. Either the IVRS ACPI table is incorrect

Please find the output from

    sudo iasl -d -p /dev/shm/ivrs.dsl /sys/firmware/acpi/tables/IVRS

attached.

[    0.000000] ACPI: IVRS 0x000000009D3D8588 0000D0 (v02 AMD    AMD IVRS 00000001 AMD  00000000)

> or the BIOS did not enable the performance counter feature in the IOMMU
> hardware.

Is it possible to check that from the OS side?

> Are you running on the latest BIOS?

Yes, I am even using a “beta“ one from [1].

DMI: MSI MS-7A37/B350M MORTAR (MS-7A37), BIOS 1.G1 05/17/2018


Kind regards,

Paul


[1]: http://msi-ftp.de:8080/main.html?download&weblink=99df4e98c25ca3dcf0f6e7f8366cc1c7&realfilename=7A37_1g1.zip

View attachment "ivrs.dsl" of type "text/x-dsl" (4661 bytes)

Download attachment "smime.p7s" of type "application/pkcs7-signature" (5174 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ