[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH 0/8] IOMMU: assorted follow-on to XSA-400


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Mon, 11 Apr 2022 11:34:02 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=vL+0lAdAy+jFrgQqabteiiHQd+v0n6xUZT0vrkZ128o=; b=cEfd7nlA9zmMBifiyco3Y52mX9kmeBPPHIt5xINOhOcgb+NtDnOAFFPFRIJGWdYim7joUhjhz4cm4dr70BDuTXbeQ5Y8iD+em/wbXkim/6vBj+zOqEZVq13dnxzs48X5HqM54MLYhT2EBRBTwoNLGy4a1VIMpXJBuK5c5gDs4lG/987c36XHJyt589xu7R1DxekHYtsnbQat1dSTl4/JvSx0yxQ3K35rVpW9JNcys/0PV0RJtqAawQS6PEHK+1tUfvVOACqh4KILHoZvEy4qN/rhqS4X9yPCVuU/AWp7F/padyvDgvZljHA3Uo69cz7yAYrY6bWN6dYjqc5VfsGF0w==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jIFr02GdJSiIq2zjPGGBcxbGQSXPQrVoRVDzNrgVMFzs+kri7ZTdFXDqpxnyc+Vb0DwZZ6eJ9Zs8aH2ReG9Xt2/UYhNsgb16PqPtT9VNmjCx9xOZgBvGtYV5HuUkUFmQ03GWxh1EOnD2yrGaXJKEtzJPz8/9cAfJtEE8MIGvqHDAJ3tF/w4kkDQt+9WeJsGHCFJlREYuHIQIQogrpgAxanJrsJ8utYHGm2xn9qc9KCplUevuOSrBFmgdjbxiI3pUjpSq+Uryny1AjstsOs8WrZDMZvfEI280TfCyGKWc0I1hmy+F3eWlcdcwfiOgwotbhFMHF3NRD2vLyuit+ChM3g==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Kevin Tian <kevin.tian@xxxxxxxxx>, Paul Durrant <paul@xxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Delivery-date: Mon, 11 Apr 2022 09:34:28 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Considering how long it took to get the XSA-400 series ready, it is
probably quite natural that in the course of doing so some further
items were found which want dealing with. There we go ...

1: IOMMU/x86: drop locking from quarantine_init() hooks
2: VT-d: drop ROOT_ENTRY_NR
3: VT-d: plug memory leaks in iommu_alloc()
4: VT-d: refuse to use IOMMU with reserved CAP.ND value
5: AMD/IOMMU: replace a few PCI_BDF2()
6: IOMMU: log appropriate SBDF
7: PCI: replace stray uses of PCI_{DEVFN,BDF}2()
8: PCI: replace "secondary" flavors of PCI_{DEVFN,BDF,SBDF}()

Jan




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.