lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 6 Feb 2020 08:09:15 -0600
From:   Bjorn Helgaas <helgaas@...nel.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-pci@...r.kernel.org, linux-kernel@...r.kernel.org,
        Kuppuswamy Sathyanarayanan 
        <sathyanarayanan.kuppuswamy@...ux.intel.com>,
        "Jason A. Donenfeld" <Jason@...c4.com>,
        Randy Dunlap <rdunlap@...radead.org>
Subject: [GIT PULL] PCI fixes for v5.6

PCI fixes:

  - Define to_pci_sysdata() always to fix build breakage when
    !CONFIG_PCI (Jason A. Donenfeld)

  - Use PF PASID for VFs to fix VF IOMMU bind failures (Kuppuswamy
    Sathyanarayanan)


The following changes since commit d4e9056daedca3891414fe3c91de3449a5dad0f2:

  initramfs: do not show compression mode choice if INITRAMFS_SOURCE is empty (2020-02-03 17:31:43 +0000)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/helgaas/pci.git tags/pci-v5.6-fixes-1

for you to fetch changes up to 2e34673be0bd6bb0c6c496a861cbc3f7431e7ce3:

  PCI/ATS: Use PF PASID for VFs (2020-02-05 11:58:08 -0600)

----------------------------------------------------------------
pci-v5.6-fixes-1

----------------------------------------------------------------
Jason A. Donenfeld (1):
      x86/PCI: Define to_pci_sysdata() even when !CONFIG_PCI

Kuppuswamy Sathyanarayanan (1):
      PCI/ATS: Use PF PASID for VFs

 arch/x86/include/asm/pci.h | 4 ++--
 drivers/pci/ats.c          | 6 ++++--
 2 files changed, 6 insertions(+), 4 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ