| 28b130244061 ("vfio: fix a missed vfio group put in vfio_pin_pages") |
| 95fc87b44104 ("vfio: Selective dirty page tracking if IOMMU backed device pins pages") |
| 331e33d2960c ("vfio iommu: Update UNMAP_DMA ioctl to get dirty bitmap before unmap") |
| d6a4c185660c ("vfio iommu: Implementation of ioctl for dirty pages tracking") |
| cade075f265b ("vfio iommu: Cache pgsize_bitmap in struct vfio_iommu") |
| 205323b8ceac ("vfio: checking of validity of user vaddr in vfio_dma_rw") |
| 40280cf7e8ca ("vfio: avoid inefficient operations on VFIO group in vfio_pin/unpin_pages") |
| 8d46c0cca5f4 ("vfio: introduce vfio_dma_rw to read/write a range of IOVAs") |
| b09d6e473974 ("vfio/type1: remove duplicate retrieval of reserved regions") |
| a717072007e8 ("vfio/type1: Add IOVA range capability support") |
| f45daadfe1ad ("vfio/type1: Update iova list on detach") |
| af029169b8fd ("vfio/type1: Check reserved region conflict and update iova list") |
| 1108696aecf0 ("vfio/type1: Introduce iova list and add iommu aperture validity check") |
| be068fa236c3 ("vfio/type1: Handle different mdev isolation type") |
| 7bd50f0cd2fd ("vfio/type1: Add domain at(de)taching group helpers") |
| 492855939bdb ("vfio/type1: Limit DMA mappings per container") |
| 58fec830fc19 ("vfio/type1: Fix unmap overflow off-by-one") |