diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2020-06-26 12:30:07 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2020-06-26 12:30:07 -0700 |
commit | bd37cdf8ba1b56a968173560314398d5d3b2d37a (patch) | |
tree | ee66fa706f39c6d18b4f2d66a4cdca3f50d4dd71 /drivers/block | |
parent | 6a6c9b220a7fb7c8285ad1739ac3c909584feb43 (diff) | |
parent | 48f0bcfb7aad2c6eb4c1e66476b58475aa14393e (diff) | |
download | linux-bd37cdf8ba1b56a968173560314398d5d3b2d37a.tar.bz2 |
Merge tag 'iommu-fixes-v5.8-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/joro/iommu
Pull iommu fixes from Joerg Roedel:
"A couple of Intel VT-d fixes:
- Make Intel SVM code 64bit only. The code uses pgd_t* and the IOMMU
only supports long-mode page-table formats, so its broken on 32bit
anyway.
- Make sure GFX quirks in for Intel VT-d are not applied to untrusted
devices. Those devices might gain full memory access otherwise.
- Identity mapping setup fix.
- Fix ACS enabling when Intel IOMMU is off and untrusted devices are
detected.
- Two smaller fixes for coherency and IO page-table setup"
* tag 'iommu-fixes-v5.8-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/joro/iommu:
iommu/vt-d: Fix misuse of iommu_domain_identity_map()
iommu/vt-d: Update scalable mode paging structure coherency
iommu/vt-d: Enable PCI ACS for platform opt in hint
iommu/vt-d: Don't apply gfx quirks to untrusted devices
iommu/vt-d: Set U/S bit in first level page table by default
iommu/vt-d: Make Intel SVM code 64-bit only
Diffstat (limited to 'drivers/block')
0 files changed, 0 insertions, 0 deletions