lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <YK/dheM2NZz6KOkb@8bytes.org>
Date:   Thu, 27 May 2021 19:57:25 +0200
From:   Joerg Roedel <joro@...tes.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     Will Deacon <will@...nel.org>, linux-kernel@...r.kernel.org,
        iommu@...ts.linux-foundation.org
Subject: [git pull] IOMMU Fixes for Linux v5.13-rc3

Hi Linus,

The following changes since commit d07f6ca923ea0927a1024dfccafc5b53b61cfecc:

  Linux 5.13-rc2 (2021-05-16 15:27:44 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/joro/iommu.git tags/iommu-fixes-v5.13-rc3

for you to fetch changes up to 0ee74d5a48635c848c20f152d0d488bf84641304:

  iommu/vt-d: Fix sysfs leak in alloc_iommu() (2021-05-27 16:07:08 +0200)

----------------------------------------------------------------
IOMMU Fixes for Linux v5.13-rc3

Including:

	- Important fix for the AMD IOMMU driver in the recently added
	  page-specific invalidation code to fix a calculation.

	- Fix a NULL-ptr dereference in the AMD IOMMU driver when a
	  device switches domain types.

	- Fixes for the Intel VT-d driver to check for allocation
	  failure and do correct cleanup.

	- Another fix for Intel VT-d to not allow supervisor page
	  requests from devices when using second level page
	  translation.

	- Add a MODULE_DEVICE_TABLE to the VIRTIO IOMMU driver

----------------------------------------------------------------
Bixuan Cui (1):
      iommu/virtio: Add missing MODULE_DEVICE_TABLE

Dan Carpenter (1):
      iommu/vt-d: Check for allocation failure in aux_detach_device()

Jean-Philippe Brucker (1):
      iommu/amd: Clear DMA ops when switching domain

Lu Baolu (1):
      iommu/vt-d: Use user privilege for RID2PASID translation

Nadav Amit (1):
      iommu/amd: Fix wrong parentheses on page-specific invalidations

Rolf Eike Beer (1):
      iommu/vt-d: Fix sysfs leak in alloc_iommu()

 drivers/iommu/amd/iommu.c    | 4 +++-
 drivers/iommu/intel/dmar.c   | 4 +++-
 drivers/iommu/intel/iommu.c  | 9 +++++++--
 drivers/iommu/intel/pasid.c  | 3 ++-
 drivers/iommu/virtio-iommu.c | 1 +
 5 files changed, 16 insertions(+), 5 deletions(-)

Please pull.

Thanks,

	Joerg

Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ