lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Z2KJ8SGMoTfx_t76@8bytes.org>
Date: Wed, 18 Dec 2024 09:38:09 +0100
From: Joerg Roedel <joro@...tes.org>
To: Suravee Suthikulpanit <suravee.suthikulpanit@....com>
Cc: linux-kernel@...r.kernel.org, iommu@...ts.linux.dev,
	robin.murphy@....com, vasant.hegde@....com, arnd@...db.de,
	ubizjak@...il.com, linux-arch@...r.kernel.org, jgg@...dia.com,
	kevin.tian@...el.com, jon.grimm@....com, santosh.shukla@....com,
	pandoh@...gle.com, kumaranand@...gle.com
Subject: Re: [PATCH v12 0/9] iommu/amd: Use 128-bit cmpxchg operation to
 update DTE

On Mon, Nov 18, 2024 at 05:49:28AM +0000, Suravee Suthikulpanit wrote:
> Suravee Suthikulpanit (9):
>   iommu/amd: Misc ACPI IVRS debug info clean up
>   iommu/amd: Disable AMD IOMMU if CMPXCHG16B feature is not supported
>   iommu/amd: Introduce struct ivhd_dte_flags to store persistent DTE
>     flags
>   iommu/amd: Introduce helper function to update 256-bit DTE
>   iommu/amd: Modify set_dte_entry() to use 256-bit DTE helpers
>   iommu/amd: Introduce helper function get_dte256()
>   iommu/amd: Modify clear_dte_entry() to avoid in-place update
>   iommu/amd: Lock DTE before updating the entry with WRITE_ONCE()
>   iommu/amd: Remove amd_iommu_apply_erratum_63()
> 
>  drivers/iommu/amd/amd_iommu.h       |   4 +-
>  drivers/iommu/amd/amd_iommu_types.h |  41 ++-
>  drivers/iommu/amd/init.c            | 229 +++++++++--------
>  drivers/iommu/amd/iommu.c           | 378 +++++++++++++++++++++-------
>  4 files changed, 440 insertions(+), 212 deletions(-)

Applied, thanks.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ