summaryrefslogtreecommitdiffstats
path: root/drivers/iommu (follow)
Commit message (Expand)AuthorAgeFilesLines
* iommu/vt-d: Avoid draining PRQ in sva mm release pathLu Baolu2024-12-131-1/+2
* iommu/vt-d: Fix qi_batch NULL pointer with nested parent domainYi Liu2024-12-131-7/+27
* iommu/vt-d: Remove cache tags before disabling ATSLu Baolu2024-12-131-1/+3
* Merge tag 'arm-smmu-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/w...Joerg Roedel2024-12-121-1/+1
|\
| * iommu/tegra241-cmdqv: do not use smp_processor_id in preemptible contextLuis Claudio R. Goncalves2024-12-101-1/+1
* | iommu/amd: Add lockdep asserts for domain->dev_listJason Gunthorpe2024-12-101-0/+5
* | iommu/amd: Put list_add/del(dev_data) back under the domain->lockJason Gunthorpe2024-12-101-1/+4
|/
* Merge tag 'for-linus-iommufd' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2024-12-061-2/+0
|\
| * iommufd: Fix out_fput in iommufd_fault_alloc()Nicolin Chen2024-12-031-2/+0
* | module: Convert symbol namespace to string literalPeter Zijlstra2024-12-028-38/+38
* | Get rid of 'remove_new' relic from platform driver structLinus Torvalds2024-12-0211-12/+12
|/
* Merge tag 'for-linus-iommufd' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2024-11-278-44/+41
|\
| * iommu: Rename ops->domain_alloc_user() to domain_alloc_paging_flags()Jason Gunthorpe2024-11-226-30/+20
| * iommu: Add ops->domain_alloc_nested()Jason Gunthorpe2024-11-225-17/+24
| * Merge tag 'iommu-updates-v6.13' of ssh://gitolite.kernel.org/pub/scm/linux/ke...Jason Gunthorpe2024-11-2242-1607/+4421
| |\
* | \ Merge tag 'mm-stable-2024-11-18-19-27' of git://git.kernel.org/pub/scm/linux/...Linus Torvalds2024-11-231-0/+6
|\ \ \
| * | | kmemleak: iommu/iova: fix transient kmemleak false positiveCatalin Marinas2024-11-121-0/+6
* | | | Merge tag 'iommu-updates-v6.13' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2024-11-2341-1602/+4414
|\ \ \ \ | | |_|/ | |/| |
| | | |
| | \ \
| | \ \
| | \ \
| *---. \ \ Merge branches 'intel/vt-d', 'amd/amd-vi' and 'iommufd/arm-smmuv3-nested' int...Joerg Roedel2024-11-1528-1233/+1413
| |\ \ \ \ \
| | | * | | | iommu/amd: Improve amd_iommu_release_device()Vasant Hegde2024-10-301-27/+6
| | | * | | | iommu/amd: Add ops->release_domainVasant Hegde2024-10-301-0/+9
| | | * | | | iommu/amd: Reorder attach device codeVasant Hegde2024-10-301-36/+29
| | | * | | | iommu/amd: Convert dev_data lock from spinlock to mutexVasant Hegde2024-10-302-8/+8
| | | * | | | iommu/amd: Rearrange attach device codeVasant Hegde2024-10-301-55/+36
| | | * | | | iommu/amd: Reduce domain lock scope in attach device pathVasant Hegde2024-10-301-22/+30
| | | * | | | iommu/amd: Do not detach devices in domain free pathVasant Hegde2024-10-301-25/+1
| | | * | | | iommu/amd: Remove unused amd_iommus variableVasant Hegde2024-10-302-12/+0
| | | * | | | iommu/amd: xarray to track protection_domain->iommu listVasant Hegde2024-10-302-20/+77
| | | * | | | iommu/amd: Remove protection_domain.dev_cnt variableVasant Hegde2024-10-302-7/+1
| | | * | | | iommu/amd: Use ida interface to manage protection domain IDVasant Hegde2024-10-303-58/+35
| | | * | | | iommu/amd/pgtbl_v2: Take protection domain lock before invalidating TLBVasant Hegde2024-10-301-0/+3
| | | * | | | Merge branch 'core' into amd/amd-viJoerg Roedel2024-10-306-179/+229
| | | |\ \ \ \
| | | * | | | | iommu/amd: Fix corruption when mapping large pages from 0Jason Gunthorpe2024-10-291-3/+8
| | | * | | | | iommu/amd: Do not try copy old DTE resume pathVasant Hegde2024-10-291-6/+2
| | | * | | | | iommu/amd: Use atomic64_inc_return() in iommu.cUros Bizjak2024-10-151-2/+2
| | * | | | | | iommu: Make set_dev_pasid op support domain replacementYi Liu2024-11-081-0/+3
| | * | | | | | iommu/arm-smmu-v3: Make set_dev_pasid() op support replaceJason Gunthorpe2024-11-083-8/+5
| | * | | | | | iommu/vt-d: Add set_dev_pasid callback for nested domainYi Liu2024-11-083-6/+57
| | * | | | | | iommu/vt-d: Make identity_domain_set_dev_pasid() to handle domain replacementYi Liu2024-11-081-1/+18
| | * | | | | | iommu/vt-d: Make intel_svm_set_dev_pasid() support domain replacementYi Liu2024-11-083-6/+12
| | * | | | | | iommu/vt-d: Limit intel_iommu_set_dev_pasid() for paging domainYi Liu2024-11-081-2/+4
| | * | | | | | iommu/vt-d: Make intel_iommu_set_dev_pasid() to handle domain replacementYi Liu2024-11-081-9/+37
| | * | | | | | iommu/vt-d: Add iommu_domain_did() to get didYi Liu2024-11-082-7/+16
| | * | | | | | iommu/vt-d: Consolidate the struct dev_pasid_info add/removeYi Liu2024-11-083-51/+74
| | * | | | | | iommu/vt-d: Add pasid replace helpersYi Liu2024-11-082-0/+205
| | * | | | | | iommu/vt-d: Refactor the pasid setup helpersYi Liu2024-11-081-64/+105
| | * | | | | | iommu/vt-d: Add a helper to flush cache for updating present pasid entryYi Liu2024-11-081-18/+34
| | * | | | | | iommu: Pass old domain to set_dev_pasid opYi Liu2024-11-087-8/+16
| | * | | | | | iommu/vt-d: Drain PRQs when domain removed from RIDLu Baolu2024-11-053-18/+10
| | * | | | | | iommu/vt-d: Drop pasid requirement for prq initializationKlaus Jensen2024-11-051-6/+4