lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1e4f0642-e4e1-7602-3f50-37edc84ced50@linux.intel.com>
Date:   Sun, 9 Jun 2019 10:43:39 +0800
From:   Lu Baolu <baolu.lu@...ux.intel.com>
To:     Qian Cai <cai@....pw>
Cc:     baolu.lu@...ux.intel.com, James Sewart <jamessewart@...sta.com>,
        Joerg Roedel <jroedel@...e.de>,
        iommu@...ts.linux-foundation.org,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        Kashyap Desai <kashyap.desai@...adcom.com>,
        Sumit Saxena <sumit.saxena@...adcom.com>,
        Shivasharan S <shivasharan.srikanteshwara@...adcom.com>
Subject: Re: "iommu/vt-d: Delegate DMA domain to generic iommu" series breaks
 megaraid_sas

Hi Qian,

I just posted some fix patches. I cc'ed them in your email inbox as
well. Can you please check whether they happen to fix your issue?
If not, do you mind posting more debug messages?

Best regards,
Baolu


On 6/8/19 5:08 AM, Qian Cai wrote:
> The linux-next series "iommu/vt-d: Delegate DMA domain to generic iommu" [1]
> causes a system with the rootfs on megaraid_sas card unable to boot.
> 
> Reverted the whole series on the top of linux-next (next-20190607) fixed the
> issue.
> 
> The information regards this storage card is,
> 
> [  116.466810][  T324] megaraid_sas 0000:06:00.0: FW provided supportMaxExtLDs:
> 0	max_lds: 32
> [  116.476052][  T324] megaraid_sas 0000:06:00.0: controller type	:
> iMR(0MB)
> [  116.483646][  T324] megaraid_sas 0000:06:00.0: Online Controller Reset(OCR)	
> : Enabled
> [  116.492403][  T324] megaraid_sas 0000:06:00.0: Secure JBOD support	:
> Yes
> [  116.499887][  T324] megaraid_sas 0000:06:00.0: NVMe passthru support	:
> No
> [  116.507480][  T324] megaraid_sas 0000:06:00.0: FW provided
> [  116.612523][  T324] megaraid_sas 0000:06:00.0: NVME page size	: (0)
> [  116.629991][  T324] megaraid_sas 0000:06:00.0: INIT adapter done
> [  116.714789][  T324] megaraid_sas 0000:06:00.0: pci id		:
> (0x1000)/(0x0017)/(0x1d49)/(0x0500)
> [  116.724228][  T324] megaraid_sas 0000:06:00.0: unevenspan support	: no
> [  116.731518][  T324] megaraid_sas 0000:06:00.0: firmware crash dump	:
> no
> [  116.738981][  T324] megaraid_sas 0000:06:00.0: jbod sync map		:
> yes
> [  116.787433][  T324] scsi host0: Avago SAS based MegaRAID driver
> [  117.081088][  T324] scsi 0:0:0:0: Direct-
> Access     LENOVO   ST900MM0168      L587 PQ: 0 ANSI: 6
> 
> [1] https://lore.kernel.org/patchwork/cover/1078960/
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ