From mboxrd@z Thu Jan 1 00:00:00 1970 From: Hannes Reinecke Subject: hpsa failure with 4.3.0-rc1 Date: Wed, 30 Sep 2015 09:40:50 +0200 Message-ID: <560B9202.9080703@suse.de> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: QUOTED-PRINTABLE Return-path: Received: from mx2.suse.de ([195.135.220.15]:42477 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753960AbbI3Hkw (ORCPT ); Wed, 30 Sep 2015 03:40:52 -0400 Sender: linux-scsi-owner@vger.kernel.org List-Id: linux-scsi@vger.kernel.org To: Don Brace , "linux-scsi@vger.kernel.org" Cc: Joerg Roedel , Borislav Petkov Hi all, trying to boot 4.3.0-rc1 on a system with hpsa results in a swiotlb failure: hpsa 0000:22:00.0: Logical aborts not supported hpsa 0000:22:00.0: HP SSD Smart Path aborts not supported hpsa 0000:22:00.0: swiotlb buffer is full (sz: 786432 bytes) swiotlb: coherent allocation failed for device 0000:22:00.0 size=3D 786432 CPU: 43 PID: 566 Comm: systemd-udevd Not tainted 4.3.0-rc1-default+ #35= 8 Hardware name: HP ProLiant BL660c Gen8, BIOS I32 08/20/2012 ffff88181c314098 ffff8810194cba40 ffffffff8138fad2 00000000000c0 ffff8810194cba80 ffffffff813ba3d9 ffff881000000008 0000000000000 220 ffff88181c314098 00000000000c0000 ffff8810184101e8 ffff881018410 000 Call Trace: [] dump_stack+0x4b/0x69 [] swiotlb_alloc_coherent+0x149/0x160 [] x86_swiotlb_alloc_coherent+0x3e/0x50 [] hpsa_init_one+0x915/0x1c90 [hpsa] [] ? rcu_read_lock_sched_held+0x8c/0xa0 [] local_pci_probe+0x40/0xa0 [] ? pci_match_device+0xdb/0x100 4.2.0-rc3 worked fine here. Needless to say, enabling IOMMU makes the problem go away :-) Cheers, Hannes --=20 Dr. Hannes Reinecke zSeries & Storage hare@suse.de +49 911 74053 688 SUSE LINUX GmbH, Maxfeldstr. 5, 90409 N=C3=BCrnberg GF: F. Imend=C3=B6rffer, J. Smithard, J. Guild, D. Upmanyu, G. Norton HRB 21284 (AG N=C3=BCrnberg) -- To unsubscribe from this list: send the line "unsubscribe linux-scsi" i= n the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html