d979444049
file_ops: add missing break statement (harmless)
...
Change-Id: I97982c96623b571d94348fd4a3df6bb0aeb515e9
2018-07-26 05:06:16 +00:00
af22ce62d2
HFI1: clean up and eliminate dead code in user SDMA
2018-06-13 00:31:42 +09:00
2eca75ead8
HFI1: clean up dead code in file ops
2018-06-13 00:31:42 +09:00
b08da83a51
hfi1_file_ioctl(): execute HFI1_IOCTL_TID_INVAL_READ locally
2018-06-13 00:31:40 +09:00
7a1ad31183
HFI: call hfi1_map_device_addresses() at initialization time
...
Conflicts:
kernel/syscall.c
2018-06-13 00:31:38 +09:00
03fed4d1c8
automatically generate hfi structs from dwarf info
2018-06-13 00:31:38 +09:00
6959d5ead4
HFI: port to SFI driver version 10.5.1.0.2
2018-06-13 00:31:38 +09:00
15422d886f
hif1_file_ioctl(): use dkprintf()
2018-06-13 00:31:37 +09:00
662895c020
hfi1/user_exp_rcv: explicitely call hfi1_map_device_addresses
...
There were cases where nobody else did this mapping for us
2018-06-13 00:31:37 +09:00
0f8f88ca46
hfi1/user_exp_rcv/invalid: Remove function
...
user_exp_rcv_invalid is only used together with the mmu cache
(its purpose is the delayed freeing of tids that were invalidated in cache)
Since we do not use that cache, the function can go
2018-06-13 00:31:36 +09:00
23f178d718
hfi1/user_exp_rcv/clear: implement TID_FREE ioctl
2018-06-13 00:31:36 +09:00
159c18b98b
hfi1/ioctl: only forward ioctl if hfi1_file_ioctl didn't handle it
...
Conflicts:
kernel/syscall.c
2018-06-13 00:31:35 +09:00
e64d89cd48
hfi: bases for user_exp_rcv
...
This implements a skeleton setup function and call it on ioctl
Many missing points:
- missing pci mapping to make setup work
- no clear (passed to linux, so will likely bug out)
- missing locks/safe-guards
Conflicts:
kernel/Makefile.build.in
2018-06-13 00:31:35 +09:00
7366da4390
Fix other warnings
...
Most were harmless, but the change to ACCESS_ONCE from volatile
cast is probably useful.
Expanding macro, we basically went from:
m = (volatile struct sdma_vl_map *)dd->sdma_map;
to
m = *(volatile struct sdma_vl_map **)&(dd->sdma_map);
i.e. the explicit lookup is at a different level.
2018-06-13 00:31:35 +09:00
73cc07f98e
ioctl() investigation - TO RESET
2018-06-13 00:31:35 +09:00
62e438a0aa
HFI1: do device ioremap() mappings in per-process fashion
2018-06-13 00:31:32 +09:00
7f03c18d4d
Real run test version (update_tail, kregbase+offset crash)
2018-06-13 00:31:31 +09:00
640dba627f
Added debugging output. Bugfixes in user_sdma_send_pkts() and sdma_send_txreq().
2018-06-13 00:31:31 +09:00
076e6b9b12
Enabled _sdma_txadd_daddr()
2018-06-13 00:31:30 +09:00
74a636a612
Updated structs to use completion{} and wait_queue_head_t{} and added struct size checkes in hfi1_aio_write()
2018-06-13 00:31:30 +09:00
7005110697
Updated and confirmed struct iowait{} and struct hfi1_user_sdma_pkt_q {}
...
Conflicts:
kernel/include/hfi1/ihk_hfi1_common.h
2018-06-13 00:31:30 +09:00
c4ca4ae3ab
Updated struct hfi1_devdata and confirmed its size
2018-06-13 00:31:30 +09:00
b024a486b9
Updated hfi1_filedata {} and confirmed its size against the original on Linux
...
Conflicts:
kernel/include/hfi1/hfi.h
2018-06-13 00:31:30 +09:00
64e2639adc
* The relevant files have been modified in order to compile with McKernel.
...
Conflicts:
kernel/Makefile.build.in
2018-06-13 00:31:29 +09:00
14b360e867
* Added the original files of the driver as a basis for comparison
...
Conflicts:
kernel/include/hfi1/sdma.h
kernel/sdma.c
kernel/user_sdma.c
2018-06-13 00:31:29 +09:00