summaryrefslogtreecommitdiff
path: root/drivers/iommu/omap-iopgtable.h
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@linux-foundation.org>2020-06-26 12:30:07 -0700
committerLinus Torvalds <torvalds@linux-foundation.org>2020-06-26 12:30:07 -0700
commitbd37cdf8ba1b56a968173560314398d5d3b2d37a (patch)
treeee66fa706f39c6d18b4f2d66a4cdca3f50d4dd71 /drivers/iommu/omap-iopgtable.h
parent6a6c9b220a7fb7c8285ad1739ac3c909584feb43 (diff)
parent48f0bcfb7aad2c6eb4c1e66476b58475aa14393e (diff)
Merge tag 'iommu-fixes-v5.8-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/joro/iommu
Pull iommu fixes from Joerg Roedel: "A couple of Intel VT-d fixes: - Make Intel SVM code 64bit only. The code uses pgd_t* and the IOMMU only supports long-mode page-table formats, so its broken on 32bit anyway. - Make sure GFX quirks in for Intel VT-d are not applied to untrusted devices. Those devices might gain full memory access otherwise. - Identity mapping setup fix. - Fix ACS enabling when Intel IOMMU is off and untrusted devices are detected. - Two smaller fixes for coherency and IO page-table setup" * tag 'iommu-fixes-v5.8-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/joro/iommu: iommu/vt-d: Fix misuse of iommu_domain_identity_map() iommu/vt-d: Update scalable mode paging structure coherency iommu/vt-d: Enable PCI ACS for platform opt in hint iommu/vt-d: Don't apply gfx quirks to untrusted devices iommu/vt-d: Set U/S bit in first level page table by default iommu/vt-d: Make Intel SVM code 64-bit only
Diffstat (limited to 'drivers/iommu/omap-iopgtable.h')
0 files changed, 0 insertions, 0 deletions