messages from 2020-04-09 09:09:08 to 2020-04-14 16:00:46 UTC [more...]
[PATCH v2 0/3] IOMMU user API enhancement
2020-04-14 16:06 UTC (19+ messages)
` [PATCH v2 1/3] iommu/uapi: Define uapi version and capabilities
[RFC PATCH 00/34] iommu: Move iommu_group setup to IOMMU core code
2020-04-14 15:27 UTC (15+ messages)
` [RFC PATCH 11/34] iommu: Split off default domain allocation from group assignment
` [RFC PATCH 31/34] iommu/exynos: Create iommu_device in struct exynos_iommu_owner
` [PATCH] iommu/exynos: Get rid of 'struct exynos_iommu_owner' exynos_iommu_owner
` [PATCH] iommu/exynos: Rework intialization
` [RFC PATCH 33/34] iommu: Remove add_device()/remove_device() code-paths
[PATCH v1 0/2] vfio/pci: expose device's PASID capability to VMs
2020-04-14 15:24 UTC (21+ messages)
` [PATCH v1 2/2] vfio/pci: Emulate PASID/PRI capability for VFs
decruft the vmalloc API v2
2020-04-14 15:13 UTC (31+ messages)
` [PATCH 01/29] x86/hyperv: use vmalloc_exec for the hypercall page
` [PATCH 02/29] x86: fix vmap arguments in map_irq_stack
` [PATCH 03/29] staging: android: ion: use vmap instead of vm_map_ram
` [PATCH 04/29] staging: media: ipu3: use vmap instead of reimplementing it
` [PATCH 05/29] dma-mapping: use vmap insted "
` [PATCH 06/29] powerpc: add an ioremap_phb helper
` [PATCH 07/29] powerpc: remove __ioremap_at and __iounmap_at
` [PATCH 08/29] mm: remove __get_vm_area
` [PATCH 09/29] mm: unexport unmap_kernel_range_noflush
` [PATCH 10/29] mm: rename CONFIG_PGTABLE_MAPPING to CONFIG_ZSMALLOC_PGTABLE_MAPPING
` [PATCH 11/29] mm: only allow page table mappings for built-in zsmalloc
` [PATCH 12/29] mm: pass addr as unsigned long to vb_free
` [PATCH 13/29] mm: remove vmap_page_range_noflush and vunmap_page_range
` [PATCH 14/29] mm: rename vmap_page_range to map_kernel_range
` [PATCH 15/29] mm: don't return the number of pages from map_kernel_range{, _noflush}
` [PATCH 16/29] mm: remove map_vm_range
` [PATCH 17/29] mm: remove unmap_vmap_area
` [PATCH 18/29] mm: remove the prot argument from vm_map_ram
` [PATCH 19/29] mm: enforce that vmap can't map pages executable
` [PATCH 20/29] gpu/drm: remove the powerpc hack in drm_legacy_sg_alloc
` [PATCH 21/29] mm: remove the pgprot argument to __vmalloc
` [PATCH 22/29] mm: remove the prot argument to __vmalloc_node
` [PATCH 23/29] mm: remove both instances of __vmalloc_node_flags
` [PATCH 24/29] mm: remove __vmalloc_node_flags_caller
` [PATCH 25/29] mm: switch the test_vmalloc module to use __vmalloc_node
` [PATCH 26/29] mm: remove vmalloc_user_node_flags
` [PATCH 27/29] arm64: use __vmalloc_node in arch_alloc_vmap_stack
` [PATCH 28/29] powerpc: use __vmalloc_node in alloc_vm_stack
` [PATCH 29/29] s390: use __vmalloc_node in stack_alloc
[PATCH v11 00/13] SMMUv3 Nested Stage Setup (IOMMU part)
2020-04-14 15:06 UTC (14+ messages)
` [PATCH v11 01/13] iommu: Introduce attach/detach_pasid_table API
` [PATCH v11 02/13] iommu: Introduce bind/unbind_guest_msi
` [PATCH v11 03/13] iommu/arm-smmu-v3: Maintain a SID->device structure
` [PATCH v11 04/13] iommu/smmuv3: Dynamically allocate s1_cfg and s2_cfg
` [PATCH v11 05/13] iommu/smmuv3: Get prepared for nested stage support
` [PATCH v11 06/13] iommu/smmuv3: Implement attach/detach_pasid_table
` [PATCH v11 07/13] iommu/smmuv3: Allow stage 1 invalidation with unmanaged ASIDs
` [PATCH v11 08/13] iommu/smmuv3: Implement cache_invalidate
` [PATCH v11 09/13] dma-iommu: Implement NESTED_MSI cookie
` [PATCH v11 10/13] iommu/smmuv3: Nested mode single MSI doorbell per domain enforcement
` [PATCH v11 11/13] iommu/smmuv3: Enforce incompatibility between nested mode and HW MSI regions
` [PATCH v11 12/13] iommu/smmuv3: Implement bind/unbind_guest_msi
` [PATCH v11 13/13] iommu/smmuv3: Report non recoverable faults
[RFC PATCH 1/4] bus: fsl-mc: add custom .dma_configure implementation
2020-04-14 14:32 UTC (4+ messages)
[PATCH] iommu: spapr_tce: Disable compile testing to fix build on book3s_32 config
2020-04-14 14:26 UTC
[PATCH v2 00/33] iommu: Move iommu_group setup to IOMMU core code
2020-04-14 13:15 UTC (34+ messages)
` [PATCH v2 01/33] iommu: Move default domain allocation to separate function
` [PATCH v2 02/33] iommu: Add def_domain_type() callback in iommu_ops
` [PATCH v2 03/33] iommu/amd: Implement iommu_ops->def_domain_type call-back
` [PATCH v2 04/33] iommu/vt-d: Wire up iommu_ops->def_domain_type
` [PATCH v2 05/33] iommu/amd: Remove dma_mask check from check_device()
` [PATCH v2 06/33] iommu/amd: Return -ENODEV in add_device when device is not handled by IOMMU
` [PATCH v2 07/33] iommu: Add probe_device() and remove_device() call-backs
` [PATCH v2 08/33] iommu: Move default domain allocation to iommu_probe_device()
` [PATCH v2 09/33] iommu: Keep a list of allocated groups in __iommu_probe_device()
` [PATCH v2 10/33] iommu: Move new probe_device path to separate function
` [PATCH v2 11/33] iommu: Split off default domain allocation from group assignment
` [PATCH v2 12/33] iommu: Move iommu_group_create_direct_mappings() out of iommu_group_add_device()
` [PATCH v2 13/33] iommu: Export bus_iommu_probe() and make is safe for re-probing
` [PATCH v2 14/33] iommu/amd: Remove dev_data->passthrough
` [PATCH v2 15/33] iommu/amd: Convert to probe/release_device() call-backs
` [PATCH v2 16/33] iommu/vt-d: "
` [PATCH v2 17/33] iommu/arm-smmu: "
` [PATCH v2 18/33] iommu/pamu: "
` [PATCH v2 19/33] iommu/s390: "
` [PATCH v2 20/33] iommu/virtio: "
` [PATCH v2 21/33] iommu/msm: "
` [PATCH v2 22/33] iommu/mediatek: "
` [PATCH v2 23/33] iommu/mediatek-v1 "
` [PATCH v2 24/33] iommu/qcom: "
` [PATCH v2 25/33] iommu/rockchip: "
` [PATCH v2 26/33] iommu/tegra: "
` [PATCH v2 27/33] iommu/renesas: "
` [PATCH v2 28/33] iommu/omap: Remove orphan_dev tracking
` [PATCH v2 29/33] iommu/omap: Convert to probe/release_device() call-backs
` [PATCH v2 30/33] iommu/exynos: Use first SYSMMU in controllers list for IOMMU core
` [PATCH v2 31/33] iommu/exynos: Convert to probe/release_device() call-backs
` [PATCH v2 32/33] iommu: Remove add_device()/remove_device() code-paths
` [PATCH v2 33/33] iommu: Unexport iommu_group_get_for_dev()
generic DMA bypass flag v3
2020-04-14 12:47 UTC (6+ messages)
` [PATCH 1/4] dma-mapping: move the remaining DMA API calls out of line
` [PATCH 2/4] dma-mapping: inline the fast path dma-direct calls
` [PATCH 3/4] dma-mapping: add a dma_ops_bypass flag to struct device
` [PATCH 4/4] powerpc: use the generic dma_ops_bypass mode
[rfc] dma-mapping: preallocate unencrypted DMA atomic pool
2020-04-14 6:44 UTC (13+ messages)
` [rfc 0/6] unencrypted atomic DMA pools with dynamic expansion
` [rfc v2 "
` [rfc v2 1/6] dma-remap: separate DMA atomic pools from direct remap code
` [rfc v2 4/6] dma-direct: atomic allocations must come from atomic coherent pools
` [rfc v2 3/6] dma-pool: dynamically expanding atomic pools
[PATCH 1/2] dma-mapping: add a dma_ops_bypass flag to struct device
2020-04-14 6:30 UTC (14+ messages)
[RFC PATCH] iommu/amd: fix a race in fetch_pte()
2020-04-14 1:36 UTC (4+ messages)
[PATCH 0/2] iommu/arm-smmu: Allow client devices to select direct mapping
2020-04-13 23:12 UTC (7+ messages)
` [PATCH 2/2] "
[PATCH] of_device: removed #include that caused a recursion in included headers
2020-04-13 23:02 UTC (4+ messages)
[PATCH 00/10] IOASID extensions for guest SVA
2020-04-13 22:06 UTC (9+ messages)
` [PATCH 05/10] iommu/ioasid: Create an IOASID set for host SVA use
` [PATCH 08/10] iommu/ioasid: Introduce notifier APIs
decruft the vmalloc API
2020-04-13 20:03 UTC (27+ messages)
` [PATCH 01/28] x86/hyperv: use vmalloc_exec for the hypercall page
` [PATCH 09/28] mm: rename CONFIG_PGTABLE_MAPPING to CONFIG_ZSMALLOC_PGTABLE_MAPPING
` [PATCH 10/28] mm: only allow page table mappings for built-in zsmalloc
` [PATCH 19/28] gpu/drm: remove the powerpc hack in drm_legacy_sg_alloc
` [PATCH 20/28] mm: remove the pgprot argument to __vmalloc
` [PATCH 25/28] mm: remove vmalloc_user_node_flags
[PATCH 0/1] Real DMA dev DMA domain patch
2020-04-13 16:08 UTC (9+ messages)
` [PATCH 1/1] iommu/vt-d: use DMA domain for real DMA devices and subdevices
[PATCH v2 0/3] virtio-iommu on x86 and non-devicetree platforms
2020-04-13 13:22 UTC (3+ messages)
` [PATCH v2 1/3] iommu/virtio: Add topology description to virtio-iommu config space
[PATCH] dt-bndings: iommu: renesas, ipmmu-vmsa: convert to json-schema
2020-04-13 10:25 UTC
[GIT PULL] dma-mapping fixes for 5.7
2020-04-11 20:10 UTC (2+ messages)
[PATCH v1 0/8] vfio: expose virtual Shared Virtual Addressing to VMs
2020-04-11 5:52 UTC (25+ messages)
` [PATCH v1 5/8] vfio/type1: Report 1st-level/stage-1 format to userspace
` [PATCH v1 6/8] vfio/type1: Bind guest page tables to host
[PATCH v11 00/10] Nested Shared Virtual Address (SVA) VT-d support
2020-04-10 21:56 UTC (12+ messages)
` [PATCH v11 05/10] iommu/vt-d: Add bind guest PASID support
` [PATCH v11 07/10] iommu/vt-d: Add svm/sva invalidate function
` [PATCH v11 08/10] iommu/vt-d: Cache virtual command capability register
` [PATCH v11 10/10] iommu/vt-d: Add custom allocator for IOASID
[PATCH 0/2] iommu: Remove iommu_sva_ops::mm_exit()
2020-04-10 15:52 UTC (21+ messages)
` [PATCH 1/2] uacce: Remove mm_exit() op
[PATCH] netfilter: nft_fwd_netdev: Fix CONFIG_NET_CLS_ACT=n build
2020-04-10 14:31 UTC (2+ messages)
[PATCH] iommu: Fix MTK_IOMMU dependencies
2020-04-10 14:30 UTC
[PATCH AUTOSEL 5.4 13/46] dma-mapping: Fix dma_pgprot() for unencrypted coherent pages
2020-04-10 3:48 UTC
[PATCH AUTOSEL 5.5 19/56] dma-mapping: Fix dma_pgprot() for unencrypted coherent pages
2020-04-10 3:47 UTC
[PATCH AUTOSEL 5.6 28/68] dma-mapping: Fix dma_pgprot() for unencrypted coherent pages
2020-04-10 3:45 UTC
[PATCH v6 0/5] iommu/arm-smmu: Split pagetable support for arm-smmu-v2
2020-04-09 23:33 UTC (6+ messages)
` [PATCH v6 1/5] iommu: Add DOMAIN_ATTR_SPLIT_TABLES
` [PATCH v6 2/5] iommu/arm-smmu: Add support for TTBR1
` [PATCH v6 3/5] drm/msm: Attach the IOMMU device during initialization
` [PATCH v6 4/5] drm/msm: Refactor address space initialization
` [PATCH v6 5/5] drm/msm/a6xx: Support split pagetables
"DMAR hardware is malfunctioning" error when powering off
2020-04-09 12:01 UTC
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).