On Sat, 25 Oct 2025 16:49:26 +0200 Salvatore Bonaccorso wrote: [...] > On Sat, Oct 18, 2025 at 01:12:05PM +0200, Francesco Poli wrote: [...] > > Please let me know how to proceed. > > Thanks for your kind assistance! > > So we talked about your issue on the last team meeting, Thanks a lot, much appreciated! > and have not > much good steps forwward but the following. > > With intel_iommu=off check the full boot log if there are some hints > about swiotlb issues. > > https://docs.kernel.org/core-api/swiotlb.html OK, I tried to boot the current Debian Linux kernel in forky (linux-image-6.16.12+deb14+1-amd64/6.16.12-2) with intel_iommu=off. In the kern.log snippet corresponding to the boot time span I only see swiotlb mentioned once: $ cat /proc/cmdline BOOT_IMAGE=/boot/vmlinuz-6.16.12+deb14+1-amd64 root=UUID=a5d36947-d90d-4818-9184-7cda88ade7fd ro intel_iommu=off quiet $ grep -i swiotlb boot_kern.log kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Does this mean that there are issues with swiotlb? I am attaching the full kern.log snippet, in case you can see something I am missing... By the way, an important question: booting linux-image-6.16.12+deb14+1-amd64/6.16.12-2 with intel_iommu=off makes audio work, apparently. Is adding this kernel boot parameter a possible (temporary) workaround? > > But then here we would have expected to see for instance an overflow > warning (for which then could try playing around increasing the size). > > The second thing we were suggsting: In the boot log the BIOS version > shown is from 2014. Double check if there is an update available. If > so please upgrade to the latest available one, which might have fixed > underlying issue. I'll try and check whether there is a BIOS update available... although flashing this update (if any is indeed available) won't necessarily be an easy and trouble-free process... :-( -- http://www.inventati.org/frx/ There's not a second to spare! To the laboratory! ..................................................... Francesco Poli . GnuPG key fpr == CA01 1147 9CD2 EFDF FB82 3925 3E1C 27E1 1F69 BFFE
Attachment:
boot_kern.log.gz
Description: application/gzip
Attachment:
pgp1D1ch81dtB.pgp
Description: PGP signature