~pearl2-team/ubuntu/+source/linux:pearl2-4.15.0-24.26

Last commit made on 2018-06-13
Get this branch:
git clone -b pearl2-4.15.0-24.26 https://git.launchpad.net/~pearl2-team/ubuntu/+source/linux
Members of The Pearl2 Team can upload to this branch. Log in for directions.

Branch merges

Branch information

Name:
pearl2-4.15.0-24.26
Repository:
lp:~pearl2-team/ubuntu/+source/linux

Recent commits

82c0e91... by dann frazier

UBUNTU: Ubuntu-4.15.0-24.26+pearl2.1

Signed-off-by: dann frazier <email address hidden>

6532b08... by Xiang Chen <email address hidden>

scsi: hisi_sas: make SAS address of SATA disks unique

When directly connected with SATA disks in different SAS cores, fill SAS
address with scsi_host's id to make it's fake SAS address unique.

Signed-off-by: Xiang Chen <email address hidden>
Signed-off-by: John Garry <email address hidden>
Signed-off-by: Martin K. Petersen <email address hidden>
(cherry picked from commit 8b8d66531555006a18d1532546dadbea8d16df95)
Signed-off-by: dann frazier <email address hidden>

c5f6284... by Zhen Lei <email address hidden>

iommu/arm-smmu-v3: add support for non-strict mode

1. Add IOMMU_CAP_NON_STRICT capability.
2. Dynamic choose strict or non-strict mode base on the iommu domain type.

Signed-off-by: Zhen Lei <email address hidden>

8559fed... by Zhen Lei <email address hidden>

iommu/io-pgtable-arm: add support for non-strict mode

To support the non-strict mode, now we only tlbi and sync for the strict
mode. But for the non-leaf case, always follow strict mode.

Use the lowest bit of the iova parameter to pass the strict mode:
0, IOMMU_STRICT;
1, IOMMU_NON_STRICT;
Treat 0 as IOMMU_STRICT, so that the unmap operation can compatible with
other IOMMUs which still use strict mode.

Signed-off-by: Zhen Lei <email address hidden>

23b5e4a... by Vivek Gautam <email address hidden>

iommu/io-pgtable: Use size_t return type for all foo_unmap

Unmap returns a size_t all throughout the IOMMU framework.
Make io-pgtable match this convention.
Moreover, there isn't a need to have a signed int return type
as we return 0 in case of failures.

Signed-off-by: Vivek Gautam <email address hidden>
Acked-by: Robin Murphy <email address hidden>
Signed-off-by: Joerg Roedel <email address hidden>
(cherry picked from commit 193e67c00e33e188d68815fb78806317c77f156c)
Signed-off-by: dann frazier <email address hidden>

70e51f9... by Zhen Lei <email address hidden>

iommu/amd: use default branch to deal with all non-supported capabilities

Avoid below warning when new capabilities added:

drivers/iommu/amd_iommu.c: In function 'amd_iommu_capable':
drivers/iommu/amd_iommu.c:3053:2: warning: enumeration value 'IOMMU_CAP_NON_STRICT' not handled in switch [-Wswitch]
     switch (cap) {

Signed-off-by: Zhen Lei <email address hidden>

e226660... by Zhen Lei <email address hidden>

iommu/dma: add support for non-strict mode

1. Save the related domain pointer in struct iommu_dma_cookie, make iovad
   capable call domain->ops->flush_iotlb_all to flush TLB.
2. Add a new iommu capability: IOMMU_CAP_NON_STRICT, which used to indicate
   that the iommu domain support non-strict mode.
3. During the iommu domain initialization phase, call capable() to check
   whether it support non-strcit mode. If so, call init_iova_flush_queue
   to register iovad->flush_cb callback.
4. All unmap(contains iova-free) APIs will finally invoke __iommu_dma_unmap
   -->iommu_dma_free_iova. If the domain is non-strict, call queue_iova to
   put off iova freeing.

Signed-off-by: Zhen Lei <email address hidden>

88dabd1... by Zhen Lei <email address hidden>

iommu/arm-smmu-v3: fix the implementation of flush_iotlb_all hook

.flush_iotlb_all can not just wait for previous tlbi operations to be
completed, but should also invalid all TLBs of the related domain.

Signed-off-by: Zhen Lei <email address hidden>

3e8d374... by Shameer Kolothum <email address hidden>

vfio/type1: remove duplicate retrieval of reserved regions

As we now already have the reserved regions list, just pass that into
vfio_iommu_has_sw_msi() fn.

Signed-off-by: Shameer Kolothum <email address hidden>
(v4 submission)

3954222... by Shameer Kolothum <email address hidden>

vfio/type1: Add IOVA range capability support

This allows the user-space to retrieve the supported IOVA
range(s), excluding any reserved regions. The implementation
is based on capability chains, added to VFIO_IOMMU_GET_INFO ioctl.

Signed-off-by: Shameer Kolothum <email address hidden>
(v4 submission)