Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753999AbbKQPMk (ORCPT ); Tue, 17 Nov 2015 10:12:40 -0500 Received: from 8bytes.org ([81.169.241.247]:58318 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752819AbbKQPLu (ORCPT ); Tue, 17 Nov 2015 10:11:50 -0500 From: Joerg Roedel To: iommu@lists.linux-foundation.org Cc: Oded Gabbay , David Woodhouse , Jesse Barnes , Linus Torvalds , linux-kernel@vger.kernel.org, Joerg Roedel Subject: [PATCH 0/4 v2] Implement access checks in iommu page fault paths Date: Tue, 17 Nov 2015 16:11:35 +0100 Message-Id: <1447773099-2444-1-git-send-email-joro@8bytes.org> X-Mailer: git-send-email 1.9.1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1469 Lines: 46 Hi, here is the second version of the patch-set to implement proper access checks into the io-page-fault handlers of the AMD IOMMU and Intel VT-d drivers. Two additional patches clean up the AMD part a bit further. Since I can't test this this code myself due to lack of hardware or software that utilizes it, I'd appreciate some external testing. It took me a while to get these out, mostly because I tried to setup my own HSA test environment to at least test the AMD changes myself. That failed, so I am sending this out with another request for testing. Oded, Jesse, would you two please test these patches and report back? Thanks a lot! Joerg Changes since v1: * Updated the access_error functions based on Linus' feedback * Rebased to v4.4-rc1 Joerg Roedel (4): iommu/amd: Do proper access checking before calling handle_mm_fault() iommu/amd: Correctly set flags for handle_mm_fault call iommu/amd: Cleanup error handling in do_fault() iommu/vt-d: Do access checks before calling handle_mm_fault() drivers/iommu/amd_iommu_v2.c | 54 +++++++++++++++++++++++++++----------------- drivers/iommu/intel-svm.c | 20 ++++++++++++++++ 2 files changed, 53 insertions(+), 21 deletions(-) -- 1.9.1 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/