lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20210413014358.GB14309@zhen-hp.sh.intel.com>
Date:   Tue, 13 Apr 2021 09:43:58 +0800
From:   Zhenyu Wang <zhenyuw@...ux.intel.com>
To:     Alex Williamson <alex.williamson@...hat.com>
Cc:     zhenyuw@...ux.intel.com, zhi.a.wang@...el.com,
        intel-gvt-dev@...ts.freedesktop.org,
        intel-gfx@...ts.freedesktop.org, linux-kernel@...r.kernel.org,
        yan.y.zhao@...el.com
Subject: Re: Regression: gvt: vgpu 1: MI_LOAD_REGISTER_MEM handler error

On 2021.04.12 19:23:47 -0600, Alex Williamson wrote:
> On Mon, 12 Apr 2021 10:32:14 -0600
> Alex Williamson <alex.williamson@...hat.com> wrote:
> 
> > Running a Windows guest on a i915-GVTg_V4_2 from an HD 5500 IGD on
> > v5.12-rc6 results in host logs:
> > 
> > gvt: vgpu 1: lrm access to register (20c0)
> > gvt: vgpu 1: MI_LOAD_REGISTER_MEM handler error
> > gvt: vgpu 1: cmd parser error
> > 0x0 
> > 0x29 
> > 
> > gvt: vgpu 1: scan wa ctx error
> > gvt: vgpu 1: failed to submit desc 0
> > gvt: vgpu 1: fail submit workload on ring rcs0
> > gvt: vgpu 1: fail to emulate MMIO write 00002230 len 4
> > 
> > The guest goes into a boot loop triggering this error before reaching
> > the desktop and rebooting.  Guest using Intel driver 20.19.15.5171
> > dated 11/4/2020 (from driver file 15.40.5171).
> > 
> > This VM works well with the same guest and userspace software stack on
> > Fedora's kernel 5.11.11-200.fc33.x86_64.  Thanks,
> 
> Bisected to:

Looks we didn't hit this one on Broadwell with recent testing. I'll double
check, maybe Broadwell missed something after our cmd parser rework.

Thanks for reporting!

> 
> commit f18d417a57438498e0de481d3a0bc900c2b0e057
> Author: Yan Zhao <yan.y.zhao@...el.com>
> Date:   Wed Dec 23 11:45:08 2020 +0800
> 
>     drm/i915/gvt: filter cmds "srm" and "lrm" in cmd_handler
>     
>     do not allow "srm" and "lrm" except for GEN8_L3SQCREG4 and 0x21f0.
>     
>     Cc: Colin Xu <colin.xu@...el.com>
>     Cc: Kevin Tian <kevin.tian@...el.com>
>     Signed-off-by: Yan Zhao <yan.y.zhao@...el.com>
>     Signed-off-by: Zhenyu Wang <zhenyuw@...ux.intel.com>
>     Link: http://patchwork.freedesktop.org/patch/msgid/20201223034508.17031-1-yan.y.zhao@intel.com
>     Reviewed-by: Zhenyu Wang <zhenyuw@...ux.intel.com>
> 

Download attachment "signature.asc" of type "application/pgp-signature" (196 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ