lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 12 Jul 2022 08:08:43 +0800
From:   Lu Baolu <baolu.lu@...ux.intel.com>
To:     Joerg Roedel <joro@...tes.org>
Cc:     iommu@...ts.linux.dev, linux-kernel@...r.kernel.org
Subject: [PATCH 00/25] [PULL REQUEST] Intel IOMMU updates for Linux v5.20

Hi Joerg,

This includes patches queued for v5.20. It includes:

 - Make intel-iommu.h private
 - Optimize the use of two locks
 - Extend the driver to support large-scale platforms
 - Cleanup some dead code

The whole series is also available at:
https://github.com/LuBaolu/intel-iommu/commits/vtd-update-for-v5.20

Please consider them for v5.20.

[The vt-d branch needs to include below fix patch:
 4140d77a02210 ("iommu/vt-d: Fix RID2PASID setup/teardown failure")
 before applying the patches.]

Best regards,
Baolu

Lu Baolu (25):
  iommu/vt-d: Move trace/events/intel_iommu.h under iommu
  agp/intel: Use per device iommu check
  iommu/vt-d: Remove unnecessary exported symbol
  drm/i915: Remove unnecessary include
  KVM: x86: Remove unnecessary include
  x86/boot/tboot: Move tboot_force_iommu() to Intel IOMMU
  iommu/vt-d: Move include/linux/intel-iommu.h under iommu
  iommu/vt-d: Remove unused iovad from dmar_domain
  iommu/vt-d: debugfs: Remove device_domain_lock usage
  iommu/vt-d: Remove clearing translation data in disable_dmar_iommu()
  iommu/vt-d: Use pci_get_domain_bus_and_slot() in pgtable_walk()
  iommu/vt-d: Unnecessary spinlock for root table alloc and free
  iommu/vt-d: Replace spin_lock_irqsave() with spin_lock()
  iommu/vt-d: Acquiring lock in domain ID allocation helpers
  iommu/vt-d: Acquiring lock in pasid manipulation helpers
  iommu/vt-d: Check device list of domain in domain free path
  iommu/vt-d: Fold __dmar_remove_one_dev_info() into its caller
  iommu/vt-d: Use device_domain_lock accurately
  iommu/vt-d: Convert global spinlock into per domain lock
  iommu/vt-d: Remove unused domain_get_iommu()
  iommu/vt-d: Use IDA interface to manage iommu sequence id
  iommu/vt-d: Refactor iommu information of each domain
  iommu/vt-d: Remove unnecessary check in intel_iommu_add()
  iommu/vt-d: Remove global g_iommus array
  iommu/vt-d: Make DMAR_UNITS_SUPPORTED default 1024

 include/linux/dmar.h                          |   6 +-
 include/linux/tboot.h                         |   2 -
 .../iommu/intel/iommu.h                       |  35 +-
 drivers/iommu/intel/pasid.h                   |   1 +
 .../iommu/intel/trace.h                       |   7 +-
 arch/x86/kernel/tboot.c                       |  15 -
 arch/x86/kvm/x86.c                            |   1 -
 drivers/char/agp/intel-gtt.c                  |  17 +-
 drivers/gpu/drm/i915/display/intel_display.c  |   1 -
 .../gpu/drm/i915/gem/i915_gem_execbuffer.c    |   1 -
 drivers/iommu/intel/cap_audit.c               |   2 +-
 drivers/iommu/intel/debugfs.c                 |  51 +-
 drivers/iommu/intel/dmar.c                    |  39 +-
 drivers/iommu/intel/iommu.c                   | 446 ++++++------------
 drivers/iommu/intel/irq_remapping.c           |   2 +-
 drivers/iommu/intel/pasid.c                   | 107 +++--
 drivers/iommu/intel/perf.c                    |   2 +-
 drivers/iommu/intel/svm.c                     |  11 +-
 drivers/iommu/intel/trace.c                   |   2 +-
 MAINTAINERS                                   |   1 -
 20 files changed, 297 insertions(+), 452 deletions(-)
 rename include/linux/intel-iommu.h => drivers/iommu/intel/iommu.h (97%)
 rename include/trace/events/intel_iommu.h => drivers/iommu/intel/trace.h (93%)

-- 
2.25.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ