lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200906150115.GA29365@8bytes.org>
Date:   Sun, 6 Sep 2020 17:01:20 +0200
From:   Joerg Roedel <joro@...tes.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-kernel@...r.kernel.org, iommu@...ts.linux-foundation.org
Subject: [git pull] IOMMU Fixes for Linux v5.9-rc3

Hi Linus,

The following changes since commit f75aef392f869018f78cfedf3c320a6b3fcfda6b:

  Linux 5.9-rc3 (2020-08-30 16:01:54 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/joro/iommu.git tags/iommu-fixes-v5.9-rc3

for you to fetch changes up to 29aaebbca4abc4cceb38738483051abefafb6950:

  iommu/vt-d: Handle 36bit addressing for x86-32 (2020-09-04 12:14:28 +0200)

----------------------------------------------------------------
IOMMU Fixes for Linux v5.9-rc3

Including:

	- Three Intel VT-d fixes to fix address handling on 32bit, fix a
	  NULL pointer dereference bug and serialize a hardware register
	  access as required by the VT-d spec.

	- Two patches for AMD IOMMU to force AMD GPUs into translation mode
	  when memory encryption is active and disallow using IOMMUv2
	  functionality. This makes the AMDGPU driver working when
	  memory encryption is active.

	- Two more fixes for AMD IOMMU to fix updating the Interrupt
	  Remapping Table Entries.

	- MAINTAINERS file update for the Qualcom IOMMU driver.

----------------------------------------------------------------
Chris Wilson (1):
      iommu/vt-d: Handle 36bit addressing for x86-32

Joerg Roedel (2):
      iommu/amd: Do not force direct mapping when SME is active
      iommu/amd: Do not use IOMMUv2 functionality when SME is active

Lu Baolu (2):
      iommu/vt-d: Serialize IOMMU GCMD register modifications
      iommu/vt-d: Fix NULL pointer dereference in dev_iommu_priv_set()

Lukas Bulwahn (1):
      MAINTAINERS: Update QUALCOMM IOMMU after Arm SMMU drivers move

Suravee Suthikulpanit (2):
      iommu/amd: Restore IRTE.RemapEn bit after programming IRTE
      iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE

 MAINTAINERS                         |   2 +-
 drivers/iommu/amd/Kconfig           |   2 +-
 drivers/iommu/amd/init.c            |  21 ++++++-
 drivers/iommu/amd/iommu.c           |  26 ++++++--
 drivers/iommu/amd/iommu_v2.c        |   7 +++
 drivers/iommu/intel/iommu.c         | 114 ++++++++++++++++++++----------------
 drivers/iommu/intel/irq_remapping.c |  10 +++-
 7 files changed, 119 insertions(+), 63 deletions(-)

Please pull.

Thanks,

	Joerg

Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ