Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753408AbbKJN1j (ORCPT ); Tue, 10 Nov 2015 08:27:39 -0500 Received: from 8bytes.org ([81.169.241.247]:35412 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753256AbbKJN1R (ORCPT ); Tue, 10 Nov 2015 08:27:17 -0500 From: Joerg Roedel To: iommu@lists.linux-foundation.org Cc: Oded Gabbay , David Woodhouse , Linus Torvalds , linux-kernel@vger.kernel.org, Joerg Roedel Subject: [PATCH 0/4] Implement access checks in iommu page fault paths Date: Tue, 10 Nov 2015 14:26:42 +0100 Message-Id: <1447162006-20672-1-git-send-email-joro@8bytes.org> X-Mailer: git-send-email 1.9.1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1121 Lines: 36 Hi, here is a patch-set that implement proper access checks into the io-page-fault handlers of the AMD IOMMU and Intel VT-d drivers. Two additional patches clean up the AMD part a bit further. Since I can't test this this code myself due to lack of hardware or software that utilizes it, I'd appreciate some external testing. Oded, David, would you two please test these patches and report back? Thanks a lot! Joerg Joerg Roedel (4): iommu/amd: Do proper access checking before calling handle_mm_fault() iommu/amd: Correctly set flags for handle_mm_fault call iommu/amd: Cleanup error handling in do_fault() iommu/vt-d: Do access checks before calling handle_mm_fault() drivers/iommu/amd_iommu_v2.c | 54 +++++++++++++++++++++++++++----------------- drivers/iommu/intel-svm.c | 11 +++++++++ 2 files changed, 44 insertions(+), 21 deletions(-) -- 1.9.1 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/