Re: [PATCH] drm/i915/gvt: print actionable error message when gm runs out

2020-06-05 Thread Julian Stecklina
On Fri, 2020-06-05 at 12:54 +0800, Zhenyu Wang wrote: > On 2020.06.03 14:33:21 +0200, Julian Stecklina wrote: > > + gvt_err("vgpu%d: failed to allocate %s gm space from host\n", > > + vgpu->id, high_gm ? "high" : "low"); &

[PATCH] drm/i915/gvt: print actionable error message when gm runs out

2020-06-03 Thread Julian Stecklina
: Zhenyu Wang Signed-off-by: Julian Stecklina --- drivers/gpu/drm/i915/gvt/aperture_gm.c | 9 ++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/drivers/gpu/drm/i915/gvt/aperture_gm.c b/drivers/gpu/drm/i915/gvt/aperture_gm.c index 0d6d598713082..5c5c8e871dae2 100644

Re: [PATCH 1/2] x86/boot: fix KASL when memmap range manipulation is used

2019-02-11 Thread Julian Stecklina
Baoquan He writes: > On 01/30/19 at 05:40pm, Julian Stecklina wrote: >> diff --git a/arch/x86/boot/compressed/kaslr.c >> b/arch/x86/boot/compressed/kaslr.c >> index 9ed9709..5657e34 100644 >> --- a/arch/x86/boot/compressed/kaslr.c >> +++ b/arch/x86/boot/compre

Re: [RFC PATCH 7/8] KVM: i8254: Remove need for irq ack notifier

2019-02-06 Thread Julian Stecklina
Paolo Bonzini writes: > Alternatively, it is probably a good time to switch the default to split > irqchip > in QEMU. Split irqchip was introduced in kernel 4.5, which was released about > three years ago. I totally agree. At some point, the in-kernel PIT/PIC emulation should also be removed,

Re: [PATCH 2/2] x86/boot: increase maximum number of avoided KASLR regions

2019-02-06 Thread Julian Stecklina
Borislav Petkov writes: >> @@ -213,7 +213,7 @@ static void mem_avoid_memmap(char *str) >> i++; >> } >> >> -/* More than 4 memmaps, fail kaslr */ >> +/* Can't store all regions, fail kaslr */ >> if ((i >= MAX_MEMMAP_REGIONS) && str) >>

[PATCH 2/2] x86/boot: increase maximum number of avoided KASLR regions

2019-01-30 Thread Julian Stecklina
From: Julian Stecklina The boot code has a limit of 4 "non-standard" regions to avoid for KASLR. This limit is easy to reach when supplying memmap= parameters to the kernel. In this case, KASLR would be disabled. Increase the limit to avoid turning off KASLR even when the user

[PATCH 1/2] x86/boot: fix KASL when memmap range manipulation is used

2019-01-30 Thread Julian Stecklina
From: Julian Stecklina When the user passes a memmap=%-+ parameter to the kernel to reclassify some memory, this information is ignored during the randomization of the kernel base address. This in turn leads to cases where the kernel is unpacked to memory regions that the user marked as reserved

Re: [RFC] x86/speculation: add L1 Terminal Fault / Foreshadow demo

2019-01-22 Thread Julian Stecklina
Kees Cook writes: > On Tue, Jan 22, 2019 at 8:15 AM Greg KH wrote: >> >> On Mon, Jan 21, 2019 at 10:36:18AM -0800, Andi Kleen wrote: >> > > + /* Check the start address: needs to be page-aligned.. */ >> > > +- if (start & ~PAGE_MASK) >> > > ++ if (start & ~PAGE_MASK) { >> > > ++ >> > > ++

[RFC] x86/speculation: add L1 Terminal Fault / Foreshadow demo

2019-01-21 Thread Julian Stecklina
rvalds Cc: x...@kernel.org Cc: Kernel Hardening Cc: linux-kernel@vger.kernel.org Signed-off-by: Julian Stecklina --- ...of-of-concept-cache-load-gadget-in-mincor.patch | 53 +++ tools/testing/l1tf/Makefile| 20 ++ tools/testing/l1tf/README.md

Re: [RFC PATCH v7 12/16] xpfo, mm: remove dependency on CONFIG_PAGE_EXTENSION

2019-01-16 Thread Julian Stecklina
Khalid Aziz writes: > From: Julian Stecklina > > Instead of using the page extension debug feature, encode all > information, we need for XPFO in struct page. This allows to get rid of > some checks in the hot paths and there are also no pages anymore that > are allocated befo

Re: [RFC PATCH v7 00/16] Add support for eXclusive Page Frame Ownership

2019-01-16 Thread Julian Stecklina
Khalid Aziz writes: > I am continuing to build on the work Juerg, Tycho and Julian have done > on XPFO. Awesome! > A rogue process can launch a ret2dir attack only from a CPU that has > dual mapping for its pages in physmap in its TLB. We can hence defer > TLB flush on a CPU until a process

[RFC RESEND PATCH 0/6] Process-local memory allocations

2018-11-22 Thread Julian Stecklina
. As far as testing goes, the KVM unit tests seem happy on Intel. AMD is only compile tested at the moment. [1] git://git.kernel.org/pub/scm/virt/kvm/kvm.git Julian Stecklina (6): kvm, vmx: move CR2 context switch out of assembly path kvm, vmx: move register clearing out of assembly path mm

[RFC RESEND PATCH 0/6] Process-local memory allocations

2018-11-22 Thread Julian Stecklina
. As far as testing goes, the KVM unit tests seem happy on Intel. AMD is only compile tested at the moment. [1] git://git.kernel.org/pub/scm/virt/kvm/kvm.git Julian Stecklina (6): kvm, vmx: move CR2 context switch out of assembly path kvm, vmx: move register clearing out of assembly path mm

[RFC RESEND PATCH 3/6] mm, x86: make __kernel_map_pages always available

2018-11-22 Thread Julian Stecklina
__kernel_map_pages is currently only enabled when CONFIG_DEBUG_PAGEALLOC is defined. Enable it unconditionally instead. Signed-off-by: Julian Stecklina --- arch/x86/mm/pageattr.c | 3 +-- include/linux/mm.h | 3 ++- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/arch/x86/mm

[RFC RESEND PATCH 1/6] kvm, vmx: move CR2 context switch out of assembly path

2018-11-22 Thread Julian Stecklina
PATCH] paravirt: header and stubs for paravirtualisation") Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan Miller Reviewed-by: Jim Mattson Reviewed-by: Sean Christopherson --- arch/x86/kvm/vmx.c | 15 +-- 1 file changed, 5 insertions(+), 1

[RFC RESEND PATCH 3/6] mm, x86: make __kernel_map_pages always available

2018-11-22 Thread Julian Stecklina
__kernel_map_pages is currently only enabled when CONFIG_DEBUG_PAGEALLOC is defined. Enable it unconditionally instead. Signed-off-by: Julian Stecklina --- arch/x86/mm/pageattr.c | 3 +-- include/linux/mm.h | 3 ++- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/arch/x86/mm

[RFC RESEND PATCH 1/6] kvm, vmx: move CR2 context switch out of assembly path

2018-11-22 Thread Julian Stecklina
PATCH] paravirt: header and stubs for paravirtualisation") Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan Miller Reviewed-by: Jim Mattson Reviewed-by: Sean Christopherson --- arch/x86/kvm/vmx.c | 15 +-- 1 file changed, 5 insertions(+), 1

[RFC RESEND PATCH 5/6] x86/speculation, kvm: move guest FPU state into process local memory

2018-11-22 Thread Julian Stecklina
context in the kernel. Signed-off-by: Julian Stecklina --- arch/x86/include/asm/kvm_host.h | 10 +++- arch/x86/kvm/x86.c | 42 ++--- 2 files changed, 37 insertions(+), 15 deletions(-) diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm

[RFC RESEND PATCH 5/6] x86/speculation, kvm: move guest FPU state into process local memory

2018-11-22 Thread Julian Stecklina
context in the kernel. Signed-off-by: Julian Stecklina --- arch/x86/include/asm/kvm_host.h | 10 +++- arch/x86/kvm/x86.c | 42 ++--- 2 files changed, 37 insertions(+), 15 deletions(-) diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm

[RFC RESEND PATCH 6/6] x86/speculation, kvm: move gprs to process local storage

2018-11-22 Thread Julian Stecklina
General-purpose registers (GPRs) contain guest data and must be protected from information leak vulnerabilities in the kernel. Move GPRs into process local memory and change the VMX and SVM world switch and related code accordingly. Note: Only Intel VMX support is tested. Signed-off-by: Julian

[RFC RESEND PATCH 6/6] x86/speculation, kvm: move gprs to process local storage

2018-11-22 Thread Julian Stecklina
General-purpose registers (GPRs) contain guest data and must be protected from information leak vulnerabilities in the kernel. Move GPRs into process local memory and change the VMX and SVM world switch and related code accordingly. Note: Only Intel VMX support is tested. Signed-off-by: Julian

[RFC RESEND PATCH 2/6] kvm, vmx: move register clearing out of assembly path

2018-11-22 Thread Julian Stecklina
Split the security related register clearing out of the large inline assembly VM entry path. This results in two slightly less complicated inline assembly statements, where it is clearer what each one does. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan

[RFC RESEND PATCH 4/6] x86/speculation, mm: add process local virtual memory region

2018-11-22 Thread Julian Stecklina
limitation and can be lifted by working on the page table allocation code. While memory is used for process-local allocations, it is unmapped from the linear mapping of physical memory. The code has some limitations that are spelled out in arch/x86/mm/proclocal.c. Signed-off-by: Julian Stecklina

[RFC RESEND PATCH 2/6] kvm, vmx: move register clearing out of assembly path

2018-11-22 Thread Julian Stecklina
Split the security related register clearing out of the large inline assembly VM entry path. This results in two slightly less complicated inline assembly statements, where it is clearer what each one does. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan

[RFC RESEND PATCH 4/6] x86/speculation, mm: add process local virtual memory region

2018-11-22 Thread Julian Stecklina
limitation and can be lifted by working on the page table allocation code. While memory is used for process-local allocations, it is unmapped from the linear mapping of physical memory. The code has some limitations that are spelled out in arch/x86/mm/proclocal.c. Signed-off-by: Julian Stecklina

[PATCH v3 1/3] kvm, vmx: move CR2 context switch out of assembly path

2018-11-01 Thread Julian Stecklina
PATCH] paravirt: header and stubs for paravirtualisation") Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan Miller Reviewed-by: Jim Mattson Reviewed-by: Sean Christopherson --- arch/x86/kvm/vmx.c | 15 +-- 1 file changed, 5 insertions(+), 1

[PATCH v3 2/3] kvm, vmx: move register clearing out of assembly path

2018-11-01 Thread Julian Stecklina
Split the security related register clearing out of the large inline assembly VM entry path. This results in two slightly less complicated inline assembly statements, where it is clearer what each one does. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan

[PATCH v3 1/3] kvm, vmx: move CR2 context switch out of assembly path

2018-11-01 Thread Julian Stecklina
PATCH] paravirt: header and stubs for paravirtualisation") Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan Miller Reviewed-by: Jim Mattson Reviewed-by: Sean Christopherson --- arch/x86/kvm/vmx.c | 15 +-- 1 file changed, 5 insertions(+), 1

[PATCH v3 2/3] kvm, vmx: move register clearing out of assembly path

2018-11-01 Thread Julian Stecklina
Split the security related register clearing out of the large inline assembly VM entry path. This results in two slightly less complicated inline assembly statements, where it is clearer what each one does. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan

[PATCH v3 3/3] kvm, vmx: fix __invvpid style

2018-11-01 Thread Julian Stecklina
The code violated the coding style. Fixed by using tabs instead of spaces. There are only whitespace changes here. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan Miller --- arch/x86/kvm/vmx.c | 20 ++-- 1 file changed, 10 insertions

[PATCH v3 3/3] kvm, vmx: fix __invvpid style

2018-11-01 Thread Julian Stecklina
The code violated the coding style. Fixed by using tabs instead of spaces. There are only whitespace changes here. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan Miller --- arch/x86/kvm/vmx.c | 20 ++-- 1 file changed, 10 insertions

[PATCH v2 2/3] kvm, vmx: move register clearing out of assembly path

2018-10-29 Thread Julian Stecklina
Split the security related register clearing out of the large inline assembly VM entry path. This results in two slightly less complicated inline assembly statements, where it is clearer what each one does. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan

[PATCH v2 2/3] kvm, vmx: move register clearing out of assembly path

2018-10-29 Thread Julian Stecklina
Split the security related register clearing out of the large inline assembly VM entry path. This results in two slightly less complicated inline assembly statements, where it is clearer what each one does. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan

[PATCH v2 3/3] kvm, vmx: fix __invvpid style

2018-10-29 Thread Julian Stecklina
The code violated the coding style. Fixed by using tabs instead of spaces. There are only whitespace changes here. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan Miller --- arch/x86/kvm/vmx.c | 20 ++-- 1 file changed, 10 insertions

[PATCH v2 3/3] kvm, vmx: fix __invvpid style

2018-10-29 Thread Julian Stecklina
The code violated the coding style. Fixed by using tabs instead of spaces. There are only whitespace changes here. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan Miller --- arch/x86/kvm/vmx.c | 20 ++-- 1 file changed, 10 insertions

[PATCH v2 1/3] kvm, vmx: move CR2 context switch out of assembly path

2018-10-29 Thread Julian Stecklina
The VM entry/exit path is a giant inline assembly statement. Simplify it by doing CR2 context switching in plain C. Move CR2 restore behind IBRS clearing, so we reduce the amount of code we execute with IBRS on. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad

[PATCH v2 1/3] kvm, vmx: move CR2 context switch out of assembly path

2018-10-29 Thread Julian Stecklina
The VM entry/exit path is a giant inline assembly statement. Simplify it by doing CR2 context switching in plain C. Move CR2 restore behind IBRS clearing, so we reduce the amount of code we execute with IBRS on. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad

[PATCH 2/4] kvm, vmx: move register clearing out of assembly path

2018-10-24 Thread Julian Stecklina
Split the security related register clearing out of the large inline assembly VM entry path. This results in two slightly less complicated inline assembly statements, where it is clearer what each one does. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan

[PATCH 2/4] kvm, vmx: move register clearing out of assembly path

2018-10-24 Thread Julian Stecklina
Split the security related register clearing out of the large inline assembly VM entry path. This results in two slightly less complicated inline assembly statements, where it is clearer what each one does. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan

[PATCH 3/4] kvm, vmx: fix __invvpid style

2018-10-24 Thread Julian Stecklina
The code violated the coding style. Fixed by using tabs instead of spaces. There are only whitespace changes here. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan Miller --- arch/x86/kvm/vmx.c | 22 +++--- 1 file changed, 11 insertions

[PATCH 3/4] kvm, vmx: fix __invvpid style

2018-10-24 Thread Julian Stecklina
The code violated the coding style. Fixed by using tabs instead of spaces. There are only whitespace changes here. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan Miller --- arch/x86/kvm/vmx.c | 22 +++--- 1 file changed, 11 insertions

[PATCH 4/4] kvm, vmx: remove manually coded vmx instructions

2018-10-24 Thread Julian Stecklina
with the proper inline assembly. This improves code generation (and source code readability). According to the bloat-o-meter this change removes ~1300 bytes from the text segment. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan Miller Reviewed-by: Razvan-Alin

[PATCH 1/4] kvm, vmx: move CR2 context switch out of assembly path

2018-10-24 Thread Julian Stecklina
The VM entry/exit path is a giant inline assembly statement. Simplify it by doing CR2 context switching in plain C. Move CR2 restore behind IBRS clearing, so we reduce the amount of code we execute with IBRS on. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad

[PATCH 4/4] kvm, vmx: remove manually coded vmx instructions

2018-10-24 Thread Julian Stecklina
with the proper inline assembly. This improves code generation (and source code readability). According to the bloat-o-meter this change removes ~1300 bytes from the text segment. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad Jan Miller Reviewed-by: Razvan-Alin

[PATCH 1/4] kvm, vmx: move CR2 context switch out of assembly path

2018-10-24 Thread Julian Stecklina
The VM entry/exit path is a giant inline assembly statement. Simplify it by doing CR2 context switching in plain C. Move CR2 restore behind IBRS clearing, so we reduce the amount of code we execute with IBRS on. Signed-off-by: Julian Stecklina Reviewed-by: Jan H. Schönherr Reviewed-by: Konrad

Re: Redoing eXclusive Page Frame Ownership (XPFO) with isolated CPUs in mind (for KVM to isolate its guests per CPU)

2018-09-17 Thread Julian Stecklina
Juerg Haefliger writes: >> I've updated my XPFO branch[1] to make some of the debugging optional >> and also integrated the XPFO bookkeeping with struct page, instead of >> requiring CONFIG_PAGE_EXTENSION, which removes some checks in the hot >> path. > > FWIW, that was my original design but

Re: Redoing eXclusive Page Frame Ownership (XPFO) with isolated CPUs in mind (for KVM to isolate its guests per CPU)

2018-09-17 Thread Julian Stecklina
Juerg Haefliger writes: >> I've updated my XPFO branch[1] to make some of the debugging optional >> and also integrated the XPFO bookkeeping with struct page, instead of >> requiring CONFIG_PAGE_EXTENSION, which removes some checks in the hot >> path. > > FWIW, that was my original design but

Re: Redoing eXclusive Page Frame Ownership (XPFO) with isolated CPUs in mind (for KVM to isolate its guests per CPU)

2018-09-17 Thread Julian Stecklina
Khalid Aziz writes: > I ran tests with your updated code and gathered lock statistics. Change in > system time for "make -j60" was in the noise margin (It actually went up by > about 2%). There is some contention on xpfo_lock. Average wait time does not > look high compared to other locks. Max

Re: Redoing eXclusive Page Frame Ownership (XPFO) with isolated CPUs in mind (for KVM to isolate its guests per CPU)

2018-09-17 Thread Julian Stecklina
Khalid Aziz writes: > I ran tests with your updated code and gathered lock statistics. Change in > system time for "make -j60" was in the noise margin (It actually went up by > about 2%). There is some contention on xpfo_lock. Average wait time does not > look high compared to other locks. Max

Re: Redoing eXclusive Page Frame Ownership (XPFO) with isolated CPUs in mind (for KVM to isolate its guests per CPU)

2018-09-12 Thread Julian Stecklina
Julian Stecklina writes: > Linus Torvalds writes: > >> On Fri, Aug 31, 2018 at 12:45 AM Julian Stecklina wrote: >>> >>> I've been spending some cycles on the XPFO patch set this week. For the >>> patch set as it was posted for v4.13, the performance o

Re: Redoing eXclusive Page Frame Ownership (XPFO) with isolated CPUs in mind (for KVM to isolate its guests per CPU)

2018-09-12 Thread Julian Stecklina
Julian Stecklina writes: > Linus Torvalds writes: > >> On Fri, Aug 31, 2018 at 12:45 AM Julian Stecklina wrote: >>> >>> I've been spending some cycles on the XPFO patch set this week. For the >>> patch set as it was posted for v4.13, the performance o

Re: Redoing eXclusive Page Frame Ownership (XPFO) with isolated CPUs in mind (for KVM to isolate its guests per CPU)

2018-09-04 Thread Julian Stecklina
Andi Kleen writes: > On Sat, Sep 01, 2018 at 02:38:43PM -0700, Linus Torvalds wrote: >> On Fri, Aug 31, 2018 at 12:45 AM Julian Stecklina wrote: >> > >> > I've been spending some cycles on the XPFO patch set this week. For the >> > patch set as it was posted

Re: Redoing eXclusive Page Frame Ownership (XPFO) with isolated CPUs in mind (for KVM to isolate its guests per CPU)

2018-09-04 Thread Julian Stecklina
Andi Kleen writes: > On Sat, Sep 01, 2018 at 02:38:43PM -0700, Linus Torvalds wrote: >> On Fri, Aug 31, 2018 at 12:45 AM Julian Stecklina wrote: >> > >> > I've been spending some cycles on the XPFO patch set this week. For the >> > patch set as it was posted

Re: Redoing eXclusive Page Frame Ownership (XPFO) with isolated CPUs in mind (for KVM to isolate its guests per CPU)

2018-09-03 Thread Julian Stecklina
Linus Torvalds writes: > On Fri, Aug 31, 2018 at 12:45 AM Julian Stecklina wrote: >> >> I've been spending some cycles on the XPFO patch set this week. For the >> patch set as it was posted for v4.13, the performance overhead of >> compiling a Linux kernel is ~40%

Re: Redoing eXclusive Page Frame Ownership (XPFO) with isolated CPUs in mind (for KVM to isolate its guests per CPU)

2018-09-03 Thread Julian Stecklina
Linus Torvalds writes: > On Fri, Aug 31, 2018 at 12:45 AM Julian Stecklina wrote: >> >> I've been spending some cycles on the XPFO patch set this week. For the >> patch set as it was posted for v4.13, the performance overhead of >> compiling a Linux kernel is ~40%

Re: Redoing eXclusive Page Frame Ownership (XPFO) with isolated CPUs in mind (for KVM to isolate its guests per CPU)

2018-08-31 Thread Julian Stecklina
Hey everyone, On Mon, 20 Aug 2018 15:27 Linus Torvalds wrote: > On Mon, Aug 20, 2018 at 3:02 PM Woodhouse, David wrote: >> >> It's the *kernel* we don't want being able to access those pages, >> because of the multitude of unfixable cache load gadgets. > > Ahh. > > I guess the proof is in the

Re: Redoing eXclusive Page Frame Ownership (XPFO) with isolated CPUs in mind (for KVM to isolate its guests per CPU)

2018-08-31 Thread Julian Stecklina
Hey everyone, On Mon, 20 Aug 2018 15:27 Linus Torvalds wrote: > On Mon, Aug 20, 2018 at 3:02 PM Woodhouse, David wrote: >> >> It's the *kernel* we don't want being able to access those pages, >> because of the multitude of unfixable cache load gadgets. > > Ahh. > > I guess the proof is in the

[PATCH] vfio, iommu: Fixed interaction of VFIO_IOMMU_MAP_DMA with IOMMU address limits

2013-10-09 Thread Julian Stecklina
and (correctly) return EFAULT to the user with a helpful warning message in the kernel log. Signed-off-by: Julian Stecklina Acked-by: Alex Williamson --- drivers/iommu/intel-iommu.c | 6 +- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu

[PATCH] vfio, iommu: Fixed interaction of VFIO_IOMMU_MAP_DMA with IOMMU address limits

2013-10-09 Thread Julian Stecklina
and (correctly) return EFAULT to the user with a helpful warning message in the kernel log. Signed-off-by: Julian Stecklina jstec...@os.inf.tu-dresden.de Acked-by: Alex Williamson alex.william...@redhat.com --- drivers/iommu/intel-iommu.c | 6 +- 1 file changed, 5 insertions(+), 1 deletion(-) diff

[PATCH] vfio, iommu: Fixed interaction of VFIO_IOMMU_MAP_DMA with IOMMU address limits

2013-08-27 Thread Julian Stecklina
and (correctly) return EFAULT to the user with a helpful warning message in the kernel log. Signed-off-by: Julian Stecklina --- drivers/iommu/intel-iommu.c | 6 +- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c index eec0d3e

[PATCH] vfio, iommu: Fixed interaction of VFIO_IOMMU_MAP_DMA with IOMMU address limits

2013-08-27 Thread Julian Stecklina
and (correctly) return EFAULT to the user with a helpful warning message in the kernel log. Signed-off-by: Julian Stecklina jstec...@os.inf.tu-dresden.de --- drivers/iommu/intel-iommu.c | 6 +- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu