This is fixed in upstream by patch, will cherry-pick this patch and test
on intel system to fix this regression, and resubmit the sru.

commit 0ef7b235aeddf9b2f78889c7823a24745ebf0cf7
Author: Andy Shevchenko <andriy.shevche...@linux.intel.com>
Date:   Wed Feb 15 16:42:21 2017 +0200

    iommu/vt-d: Fix crash on boot when DMAR is disabled
    
    By default CONFIG_INTEL_IOMMU_DEFAULT_ON is not set and thus
    dmar_disabled variable is set.
    
    Intel IOMMU driver based on above doesn't set intel_iommu_enabled
    variable.
    
    The commit b0119e870837 ("iommu: Introduce new 'struct iommu_device'")
    mistakenly assumes it never happens and tries to unregister not ever
    registered resources, which crashes the kernel at boot time:

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1688158

Title:
  [SRU][Zesty] Support SMMU passthrough using the default domain

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  [Impact]
  Have the SMMU come up in a passthrough configuration, and then allow 
subsequent translation for things such as VFIO. Rather than do this in each 
SMMU driver, it's much cleaner to allow the default domain to be configured to 
be something other than DMA.

  This patch series implements a command-line option to configure the
  default domain type. Currently, it supports "dma" and "identity" which
  is sufficient for the passthrough use-case.

  [Fix]
  The following patch series in linux-next adds this support to the kernel.
  4a8d8a14c0d0 arm64: dma-mapping: Only swizzle DMA ops for IOMMU_DOMAIN_DMA
  fccb4e3b8ab0 iommu: Allow default domain type to be set on the kernel command 
line
  beb3c6a066bf iommu/arm-smmu-v3: Install bypass STEs for IOMMU_DOMAIN_IDENTITY 
domains
  67560edcd8e5 iommu/arm-smmu-v3: Make arm_smmu_install_ste_for_dev return void
  61bc671179f1 iommu/arm-smmu: Install bypass S2CRs for IOMMU_DOMAIN_IDENTITY 
domains
  0834cc28fa56 iommu/arm-smmu: Restrict domain attributes to UNMANAGED domains

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1688158/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to