Displaying 20 results from an estimated 60 matches for "150,10".
Did you mean:
150,17
2015 Mar 11
4
[PATCH] virtio-pci: fix host notifiers on bi-endian architectures
...> + return virtio_is_big_endian(vdev) ? val : bswap16(val);
> > +}
> > +
> > static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > int n, bool assign, bool set_handler)
> > {
> > @@ -150,10 +155,12 @@ static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > }
> > virtio_queue_set_host_notifier_fd_handler(vq, true, set_handler);
> > memory_region_add_eventfd(&proxy->bar, VIRTIO_PCI_QUEUE_NOTIFY, 2,
> > -...
2015 Mar 11
4
[PATCH] virtio-pci: fix host notifiers on bi-endian architectures
...> + return virtio_is_big_endian(vdev) ? val : bswap16(val);
> > +}
> > +
> > static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > int n, bool assign, bool set_handler)
> > {
> > @@ -150,10 +155,12 @@ static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > }
> > virtio_queue_set_host_notifier_fd_handler(vq, true, set_handler);
> > memory_region_add_eventfd(&proxy->bar, VIRTIO_PCI_QUEUE_NOTIFY, 2,
> > -...
2015 Mar 11
1
[Qemu-ppc] [PATCH] virtio-pci: fix host notifiers on bi-endian architectures
...n" ^ "virtio endian" to cover all cases ?
Cheers,
Ben.
> > > static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > > int n, bool assign, bool set_handler)
> > > {
> > > @@ -150,10 +155,12 @@ static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > > }
> > > virtio_queue_set_host_notifier_fd_handler(vq, true, set_handler);
> > > memory_region_add_eventfd(&proxy->bar, VIRTIO_PCI_QUEUE_NOTIFY, 2,...
2015 Mar 11
1
[Qemu-ppc] [PATCH] virtio-pci: fix host notifiers on bi-endian architectures
...n" ^ "virtio endian" to cover all cases ?
Cheers,
Ben.
> > > static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > > int n, bool assign, bool set_handler)
> > > {
> > > @@ -150,10 +155,12 @@ static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > > }
> > > virtio_queue_set_host_notifier_fd_handler(vq, true, set_handler);
> > > memory_region_add_eventfd(&proxy->bar, VIRTIO_PCI_QUEUE_NOTIFY, 2,...
2015 Mar 11
2
[PATCH] virtio-pci: fix host notifiers on bi-endian architectures
...t16_t cpu_to_host_notifier16(VirtIODevice *vdev, uint16_t val)
+{
+ return virtio_is_big_endian(vdev) ? val : bswap16(val);
+}
+
static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
int n, bool assign, bool set_handler)
{
@@ -150,10 +155,12 @@ static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
}
virtio_queue_set_host_notifier_fd_handler(vq, true, set_handler);
memory_region_add_eventfd(&proxy->bar, VIRTIO_PCI_QUEUE_NOTIFY, 2,
- true, n,...
2015 Mar 11
2
[PATCH] virtio-pci: fix host notifiers on bi-endian architectures
...t16_t cpu_to_host_notifier16(VirtIODevice *vdev, uint16_t val)
+{
+ return virtio_is_big_endian(vdev) ? val : bswap16(val);
+}
+
static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
int n, bool assign, bool set_handler)
{
@@ -150,10 +155,12 @@ static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
}
virtio_queue_set_host_notifier_fd_handler(vq, true, set_handler);
memory_region_add_eventfd(&proxy->bar, VIRTIO_PCI_QUEUE_NOTIFY, 2,
- true, n,...
2004 Sep 17
3
Function some()
Dear R-devel list members,
Probably not an opportune time for this, given the immanent release of
2.0.0, but I was just reminded (while preparing a lecture) of a function
that I find useful and that I though might be a candidate for the utils
package: The function, which I call some(), behaves like head() and tail(),
from which it is adapted, except that it samples from an object (e.g., rows
of a
2018 Jul 18
3
Behavior of safe_realloc_add_2op_()
I'm looking at an issue reported by the Coverity static analyzer.
In iconvert() in src/share/utf8/iconvert.c on line 152 there is
newbuf = safe_realloc_add_2op_(utfbuf, ...);
If the request size is not valid, the function will free utfbuf and
return 0. This is followed by goto fail and utfbuf is freed for the
second time. A simply fix would be to set utfbuf to 0 if newbuf is 0.
However, this
2015 Mar 11
0
[Qemu-ppc] [PATCH] virtio-pci: fix host notifiers on bi-endian architectures
...a v2.
Thanks.
--
G
> Cheers,
> Ben.
>
> > > > static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > > > int n, bool assign, bool set_handler)
> > > > {
> > > > @@ -150,10 +155,12 @@ static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > > > }
> > > > virtio_queue_set_host_notifier_fd_handler(vq, true, set_handler);
> > > > memory_region_add_eventfd(&proxy->bar, VIRTIO_PCI_Q...
2015 Mar 11
0
[Qemu-ppc] [PATCH] virtio-pci: fix host notifiers on bi-endian architectures
...a v2.
Thanks.
--
G
> Cheers,
> Ben.
>
> > > > static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > > > int n, bool assign, bool set_handler)
> > > > {
> > > > @@ -150,10 +155,12 @@ static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > > > }
> > > > virtio_queue_set_host_notifier_fd_handler(vq, true, set_handler);
> > > > memory_region_add_eventfd(&proxy->bar, VIRTIO_PCI_Q...
2015 Mar 11
0
[PATCH] virtio-pci: fix host notifiers on bi-endian architectures
...e *vdev, uint16_t val)
> +{
> + return virtio_is_big_endian(vdev) ? val : bswap16(val);
> +}
> +
> static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> int n, bool assign, bool set_handler)
> {
> @@ -150,10 +155,12 @@ static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> }
> virtio_queue_set_host_notifier_fd_handler(vq, true, set_handler);
> memory_region_add_eventfd(&proxy->bar, VIRTIO_PCI_QUEUE_NOTIFY, 2,
> -...
2015 Mar 11
0
[PATCH] virtio-pci: fix host notifiers on bi-endian architectures
...e *vdev, uint16_t val)
> +{
> + return virtio_is_big_endian(vdev) ? val : bswap16(val);
> +}
> +
> static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> int n, bool assign, bool set_handler)
> {
> @@ -150,10 +155,12 @@ static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> }
> virtio_queue_set_host_notifier_fd_handler(vq, true, set_handler);
> memory_region_add_eventfd(&proxy->bar, VIRTIO_PCI_QUEUE_NOTIFY, 2,
> -...
2011 Nov 18
3
Permutations
Hi all,
why factorial(150) shows the error out of range in 'gammafn'?
I have to calculate the number of subset formed by 150 samples taking 10 at
a time. How is this possible?
best
[[alternative HTML version deleted]]
2019 Jul 02
2
[PATCH v6 08/18] drm/virtio: rework virtio_gpu_execbuffer_ioctl fencing
...r_bo_handles = NULL;
- struct list_head validate_list;
- struct ttm_validate_buffer *buflist = NULL;
- int i;
- struct ww_acquire_ctx ticket;
+ struct virtio_gpu_object_array *buflist = NULL;
struct sync_file *sync_file;
int in_fence_fd = exbuf->fence_fd;
int out_fence_fd = -1;
@@ -155,15 +150,10 @@ static int virtio_gpu_execbuffer_ioctl(struct drm_device *dev, void *data,
return out_fence_fd;
}
- INIT_LIST_HEAD(&validate_list);
if (exbuf->num_bo_handles) {
-
bo_handles = kvmalloc_array(exbuf->num_bo_handles,
- sizeof(uint32_t), GFP_KERNEL);
- buflist = kvm...
2019 Jul 02
2
[PATCH v6 08/18] drm/virtio: rework virtio_gpu_execbuffer_ioctl fencing
...r_bo_handles = NULL;
- struct list_head validate_list;
- struct ttm_validate_buffer *buflist = NULL;
- int i;
- struct ww_acquire_ctx ticket;
+ struct virtio_gpu_object_array *buflist = NULL;
struct sync_file *sync_file;
int in_fence_fd = exbuf->fence_fd;
int out_fence_fd = -1;
@@ -155,15 +150,10 @@ static int virtio_gpu_execbuffer_ioctl(struct drm_device *dev, void *data,
return out_fence_fd;
}
- INIT_LIST_HEAD(&validate_list);
if (exbuf->num_bo_handles) {
-
bo_handles = kvmalloc_array(exbuf->num_bo_handles,
- sizeof(uint32_t), GFP_KERNEL);
- buflist = kvm...
2015 Mar 12
0
[PATCH] virtio-pci: fix host notifiers on bi-endian architectures
...g_endian(vdev) ? val : bswap16(val);
> > > +}
> > > +
> > > static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > > int n, bool assign, bool set_handler)
> > > {
> > > @@ -150,10 +155,12 @@ static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > > }
> > > virtio_queue_set_host_notifier_fd_handler(vq, true, set_handler);
> > > memory_region_add_eventfd(&proxy->bar, VIRTIO_PCI_QUEUE_NOTIFY, 2,...
2015 Mar 12
0
[PATCH] virtio-pci: fix host notifiers on bi-endian architectures
...g_endian(vdev) ? val : bswap16(val);
> > > +}
> > > +
> > > static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > > int n, bool assign, bool set_handler)
> > > {
> > > @@ -150,10 +155,12 @@ static int virtio_pci_set_host_notifier_internal(VirtIOPCIProxy *proxy,
> > > }
> > > virtio_queue_set_host_notifier_fd_handler(vq, true, set_handler);
> > > memory_region_add_eventfd(&proxy->bar, VIRTIO_PCI_QUEUE_NOTIFY, 2,...
2014 Dec 31
0
[PATCH] nv50,nvc0: set vertex id base to index_bias
.../com9097.mme
@@ -227,6 +227,7 @@ locn_0f_ts:
/* NVC0_3D_MACRO_DRAW_ELEMENTS_INDIRECT
*
* NOTE: Saves and restores VB_ELEMENT,INSTANCE_BASE.
+ * Forcefully sets VERTEX_ID_BASE to the value of VB_ELEMENT_BASE.
*
* arg = mode
* parm[0] = count
@@ -247,6 +248,8 @@ locn_0f_ts:
maddr 0x150d /* VB_ELEMENT,INSTANCE_BASE */
send $r4
send $r5
+ maddr 0x446
+ send $r4
mov $r4 0x1
dei_again:
maddr 0x586 /* VERTEX_BEGIN_GL */
@@ -258,8 +261,10 @@ dei_again:
branz $r2 #dei_again
mov $r1 (extrinsrt $r1 $r4 0 1 26) /* set INSTANCE_NEXT */
maddr 0x150d /* VB_ELE...
2016 Oct 05
4
[PATCH v4 0/2] Improve OVA manifest parsing
This series fixes and enhances parsing of the OVA manifest file.
The changes are:
- Added mandatory space to the regexp
- Process all lines in the file, not just one
- Warn on improperly formated lines
- Support SHA256 hashes
v1 -> v2: rebased on to master to make use of the Checksums module
v2 -> v3:
- changed debug/warning messages in first patch according to Richard's
suggestions
2010 Feb 18
2
[PATCH 1/2] ESX: Look harder for potential transfer failures
...uot;, error => $@->stringify())));
}
+ $self->{_v2v_received} = 0;
my $r = $self->SUPER::get($url,
':content_cb' => sub { $self->handle_data(@_); },
':read_size_hint' => 64 * 1024);
@@ -150,10 +151,18 @@ sub get_volume
die($died) if (defined($died));
# Close the volume file descriptor
- close($self->{_v2v_volfh});
+ close($self->{_v2v_volfh})
+ or die(user_message(__x("Error closing volume handle: {error}",
+...