2017-05-04 02:11:47 |
Manoj Iyer |
bug |
|
|
added bug |
2017-05-04 02:30:12 |
Brad Figg |
linux (Ubuntu): status |
New |
Incomplete |
|
2017-05-04 02:35:41 |
Manoj Iyer |
description |
[Impact]
Have the SMMU come up in a passthrough configuration, and then allow subsequent translation for
things such as VFIO. Rather than do this in each SMMU driver, it's much cleaner to allow the default domain to be configured to be something other than DMA.
This patch series implements a command-line option to configure the default domain type. Currently, it supports "dma" and "identity" which is sufficient for the passthrough use-case.
[Fix]
The following patch series in linux-next adds this support to the kernel.
4a8d8a14c0d0 arm64: dma-mapping: Only swizzle DMA ops for IOMMU_DOMAIN_DMA
fccb4e3b8ab0 iommu: Allow default domain type to be set on the kernel command line
beb3c6a066bf iommu/arm-smmu-v3: Install bypass STEs for IOMMU_DOMAIN_IDENTITY domains
67560edcd8e5 iommu/arm-smmu-v3: Make arm_smmu_install_ste_for_dev return void
61bc671179f1 iommu/arm-smmu: Install bypass S2CRs for IOMMU_DOMAIN_IDENTITY domains
0834cc28fa56 iommu/arm-smmu: Restrict domain attributes to UNMANAGED domains |
[Impact]
Have the SMMU come up in a passthrough configuration, and then allow subsequent translation for
things such as VFIO. Rather than do this in each SMMU driver, it's much cleaner to allow the default domain to be configured to be something other than DMA.
This patch series implements a command-line option to configure the default domain type. Currently, it supports "dma" and "identity" which is sufficient for the passthrough use-case.
[Fix]
The following patch series in linux-next adds this support to the kernel.
4a8d8a14c0d0 arm64: dma-mapping: Only swizzle DMA ops for IOMMU_DOMAIN_DMA
fccb4e3b8ab0 iommu: Allow default domain type to be set on the kernel command line
beb3c6a066bf iommu/arm-smmu-v3: Install bypass STEs for IOMMU_DOMAIN_IDENTITY domains
9648cbc9625b iommu/arm-smmu: Make use of the iommu_register interface
67560edcd8e5 iommu/arm-smmu-v3: Make arm_smmu_install_ste_for_dev return void
61bc671179f1 iommu/arm-smmu: Install bypass S2CRs for IOMMU_DOMAIN_IDENTITY domains
0834cc28fa56 iommu/arm-smmu: Restrict domain attributes to UNMANAGED domains |
|
2017-05-04 02:53:29 |
Manoj Iyer |
description |
[Impact]
Have the SMMU come up in a passthrough configuration, and then allow subsequent translation for
things such as VFIO. Rather than do this in each SMMU driver, it's much cleaner to allow the default domain to be configured to be something other than DMA.
This patch series implements a command-line option to configure the default domain type. Currently, it supports "dma" and "identity" which is sufficient for the passthrough use-case.
[Fix]
The following patch series in linux-next adds this support to the kernel.
4a8d8a14c0d0 arm64: dma-mapping: Only swizzle DMA ops for IOMMU_DOMAIN_DMA
fccb4e3b8ab0 iommu: Allow default domain type to be set on the kernel command line
beb3c6a066bf iommu/arm-smmu-v3: Install bypass STEs for IOMMU_DOMAIN_IDENTITY domains
9648cbc9625b iommu/arm-smmu: Make use of the iommu_register interface
67560edcd8e5 iommu/arm-smmu-v3: Make arm_smmu_install_ste_for_dev return void
61bc671179f1 iommu/arm-smmu: Install bypass S2CRs for IOMMU_DOMAIN_IDENTITY domains
0834cc28fa56 iommu/arm-smmu: Restrict domain attributes to UNMANAGED domains |
[Impact]
Have the SMMU come up in a passthrough configuration, and then allow subsequent translation for things such as VFIO. Rather than do this in each SMMU driver, it's much cleaner to allow the default domain to be configured to be something other than DMA.
This patch series implements a command-line option to configure the default domain type. Currently, it supports "dma" and "identity" which is sufficient for the passthrough use-case.
[Fix]
The following patch series in linux-next adds this support to the kernel.
4a8d8a14c0d0 arm64: dma-mapping: Only swizzle DMA ops for IOMMU_DOMAIN_DMA
fccb4e3b8ab0 iommu: Allow default domain type to be set on the kernel command line
beb3c6a066bf iommu/arm-smmu-v3: Install bypass STEs for IOMMU_DOMAIN_IDENTITY domains
9648cbc9625b iommu/arm-smmu: Make use of the iommu_register interface
67560edcd8e5 iommu/arm-smmu-v3: Make arm_smmu_install_ste_for_dev return void
61bc671179f1 iommu/arm-smmu: Install bypass S2CRs for IOMMU_DOMAIN_IDENTITY domains
0834cc28fa56 iommu/arm-smmu: Restrict domain attributes to UNMANAGED domains |
|
2017-05-04 03:44:56 |
Manoj Iyer |
description |
[Impact]
Have the SMMU come up in a passthrough configuration, and then allow subsequent translation for things such as VFIO. Rather than do this in each SMMU driver, it's much cleaner to allow the default domain to be configured to be something other than DMA.
This patch series implements a command-line option to configure the default domain type. Currently, it supports "dma" and "identity" which is sufficient for the passthrough use-case.
[Fix]
The following patch series in linux-next adds this support to the kernel.
4a8d8a14c0d0 arm64: dma-mapping: Only swizzle DMA ops for IOMMU_DOMAIN_DMA
fccb4e3b8ab0 iommu: Allow default domain type to be set on the kernel command line
beb3c6a066bf iommu/arm-smmu-v3: Install bypass STEs for IOMMU_DOMAIN_IDENTITY domains
9648cbc9625b iommu/arm-smmu: Make use of the iommu_register interface
67560edcd8e5 iommu/arm-smmu-v3: Make arm_smmu_install_ste_for_dev return void
61bc671179f1 iommu/arm-smmu: Install bypass S2CRs for IOMMU_DOMAIN_IDENTITY domains
0834cc28fa56 iommu/arm-smmu: Restrict domain attributes to UNMANAGED domains |
[Impact]
Have the SMMU come up in a passthrough configuration, and then allow subsequent translation for things such as VFIO. Rather than do this in each SMMU driver, it's much cleaner to allow the default domain to be configured to be something other than DMA.
This patch series implements a command-line option to configure the default domain type. Currently, it supports "dma" and "identity" which is sufficient for the passthrough use-case.
[Fix]
The following patch series in linux-next adds this support to the kernel.
4a8d8a14c0d0 arm64: dma-mapping: Only swizzle DMA ops for IOMMU_DOMAIN_DMA
fccb4e3b8ab0 iommu: Allow default domain type to be set on the kernel command line
beb3c6a066bf iommu/arm-smmu-v3: Install bypass STEs for IOMMU_DOMAIN_IDENTITY domains
67560edcd8e5 iommu/arm-smmu-v3: Make arm_smmu_install_ste_for_dev return void
61bc671179f1 iommu/arm-smmu: Install bypass S2CRs for IOMMU_DOMAIN_IDENTITY domains
0834cc28fa56 iommu/arm-smmu: Restrict domain attributes to UNMANAGED domains |
|
2017-05-10 14:42:46 |
Manoj Iyer |
tags |
|
qdf2400 |
|
2017-06-08 11:11:28 |
Kleber Sacilotto de Souza |
nominated for series |
|
Ubuntu Zesty |
|
2017-06-08 12:58:04 |
Seth Forshee |
bug task added |
|
linux (Ubuntu Zesty) |
|
2017-06-08 12:58:56 |
Seth Forshee |
linux (Ubuntu): status |
Incomplete |
Fix Committed |
|
2017-06-09 09:11:02 |
Stefan Bader |
linux (Ubuntu Zesty): status |
New |
Fix Committed |
|
2017-06-14 09:15:48 |
Kleber Sacilotto de Souza |
tags |
qdf2400 |
qdf2400 verification-needed-zesty |
|
2017-06-21 17:45:28 |
Jeffrey Hugo |
tags |
qdf2400 verification-needed-zesty |
qdf2400 verification-done-zesty |
|
2017-06-29 07:17:58 |
Launchpad Janitor |
linux (Ubuntu Zesty): status |
Fix Committed |
Fix Released |
|
2017-06-29 07:17:58 |
Launchpad Janitor |
cve linked |
|
2017-1000364 |
|
2017-06-29 07:17:58 |
Launchpad Janitor |
cve linked |
|
2017-100363 |
|
2017-06-29 07:17:58 |
Launchpad Janitor |
cve linked |
|
2017-8890 |
|
2017-06-29 07:17:58 |
Launchpad Janitor |
cve linked |
|
2017-9074 |
|
2017-06-29 07:17:58 |
Launchpad Janitor |
cve linked |
|
2017-9075 |
|
2017-06-29 07:17:58 |
Launchpad Janitor |
cve linked |
|
2017-9076 |
|
2017-06-29 07:17:58 |
Launchpad Janitor |
cve linked |
|
2017-9077 |
|
2017-06-29 07:17:58 |
Launchpad Janitor |
cve linked |
|
2017-9242 |
|
2017-06-30 17:19:06 |
Launchpad Janitor |
linux (Ubuntu): status |
Fix Committed |
Fix Released |
|