search for: 298,6

Displaying 20 results from an estimated 113 matches for "298,6".

Did you mean: 293,6
2009 Feb 27
0
[LLVMdev] -fPIC warning on every compile on Cygwin
...LLVM_ON_WIN32) ? The only way I can think of this happening is if >> that's erroneously false. This works for me: Index: Makefile.rules =================================================================== --- Makefile.rules (revision 65633) +++ Makefile.rules (working copy) @@ -298,6 +298,8 @@ # Common symbols not allowed in dylib files CXX.Flags += -fno-common C.Flags += -fno-common + else ifeq ($(OS),Cygwin) + # Nothing. Cygwin defaults to PIC and warns when given -fPIC else # Linux and others; pass -fPIC CXX.Flags += -fPIC...
2009 Feb 27
3
[LLVMdev] -fPIC warning on every compile on Cygwin
> Could you please rig Makefile.rules or something to print out the value > of $(LLVM_ON_WIN32) ? The only way I can think of this happening is if > that's erroneously false. The configure script sets LLVM_ON_UNIX, not LLVM_ON_WIN32, for Cygwin: case $host in ... *-*-cygwin*) llvm_cv_link_all_option="-Wl,--whole-archive"
2015 Mar 31
2
[PATCH] virtio_config: reorder functions
...dhat.com> --- include/linux/virtio_config.h | 15 +++++++-------- 1 file changed, 7 insertions(+), 8 deletions(-) diff --git a/include/linux/virtio_config.h b/include/linux/virtio_config.h index ed1e0d5..1e306f7 100644 --- a/include/linux/virtio_config.h +++ b/include/linux/virtio_config.h @@ -298,13 +298,6 @@ static inline __virtio64 cpu_to_virtio64(struct virtio_device *vdev, u64 val) } \ } while(0) -static inline u8 virtio_cread8(struct virtio_device *vdev, unsigned int offset) -{ - u8 ret; - vdev->config->get(vdev, offset, &ret, sizeof(ret)); - return ret; -} - /*...
2015 Mar 31
2
[PATCH] virtio_config: reorder functions
...dhat.com> --- include/linux/virtio_config.h | 15 +++++++-------- 1 file changed, 7 insertions(+), 8 deletions(-) diff --git a/include/linux/virtio_config.h b/include/linux/virtio_config.h index ed1e0d5..1e306f7 100644 --- a/include/linux/virtio_config.h +++ b/include/linux/virtio_config.h @@ -298,13 +298,6 @@ static inline __virtio64 cpu_to_virtio64(struct virtio_device *vdev, u64 val) } \ } while(0) -static inline u8 virtio_cread8(struct virtio_device *vdev, unsigned int offset) -{ - u8 ret; - vdev->config->get(vdev, offset, &ret, sizeof(ret)); - return ret; -} - /*...
2009 Feb 27
4
[LLVMdev] -fPIC warning on every compile on Cygwin
...f this happening is if > >> that's erroneously false. > > This works for me: > > Index: Makefile.rules > =================================================================== > --- Makefile.rules (revision 65633) > +++ Makefile.rules (working copy) > @@ -298,6 +298,8 @@ > # Common symbols not allowed in dylib files > CXX.Flags += -fno-common > C.Flags += -fno-common > + else ifeq ($(OS),Cygwin) > + # Nothing. Cygwin defaults to PIC and warns when given -fPIC > else > # Linux and others; pass -f...
2019 Jan 23
2
[supermin PATCH 1/2] rpm: extend the Multiple_matches exception
Add the package that raised the issue, so it can be used to provide better diagnostic. --- src/librpm-c.c | 15 ++++++++++----- src/librpm.ml | 4 ++-- src/librpm.mli | 2 +- 3 files changed, 13 insertions(+), 8 deletions(-) diff --git a/src/librpm-c.c b/src/librpm-c.c index 3bd25a2..75ca4d7 100644 --- a/src/librpm-c.c +++ b/src/librpm-c.c @@ -66,10 +66,15 @@ librpm_handle_closed (void) }
2009 Feb 27
0
[LLVMdev] -fPIC warning on every compile on Cygwin
...> that's erroneously false. >> >> This works for me: >> >> Index: Makefile.rules >> =================================================================== >> --- Makefile.rules (revision 65633) >> +++ Makefile.rules (working copy) >> @@ -298,6 +298,8 @@ >> # Common symbols not allowed in dylib files >> CXX.Flags += -fno-common >> C.Flags += -fno-common >> + else ifeq ($(OS),Cygwin) >> + # Nothing. Cygwin defaults to PIC and warns when given -fPIC >> else >>...
2017 May 03
1
[PATCH v2] inspector: validate resulting XML files
...++ inspector/{test-virt-inspector.sh => test-virt-inspector.sh.in} | 2 ++ 3 files changed, 5 insertions(+) rename inspector/{test-virt-inspector.sh => test-virt-inspector.sh.in} (92%) diff --git a/.gitignore b/.gitignore index 152a400..89638f5 100644 --- a/.gitignore +++ b/.gitignore @@ -298,6 +298,7 @@ Makefile.in /haskell/Guestfs.hs /inspector/actual-*.xml /inspector/stamp-virt-inspector.pod +/inspector/test-virt-inspector.sh /inspector/test-xmllint.sh /inspector/virt-inspector /inspector/virt-inspector.1 diff --git a/configure.ac b/configure.ac index da7653e..a8d8127 100644 --...
2015 Jan 02
3
[PATCH 1/2] virtio_pci: double free and invalid memory access of device vqs
...at oracle.com> --- drivers/virtio/virtio_pci_legacy.c | 1 - 1 file changed, 1 deletion(-) diff --git a/drivers/virtio/virtio_pci_legacy.c b/drivers/virtio/virtio_pci_legacy.c index 6c76f0f..913ca23 100644 --- a/drivers/virtio/virtio_pci_legacy.c +++ b/drivers/virtio/virtio_pci_legacy.c @@ -298,7 +298,6 @@ void virtio_pci_legacy_remove(struct pci_dev *pci_dev) unregister_virtio_device(&vp_dev->vdev); - vp_del_vqs(&vp_dev->vdev); pci_iounmap(pci_dev, vp_dev->ioaddr); pci_release_regions(pci_dev); pci_disable_device(pci_dev); -- 1.7.10.4
2015 Jan 02
3
[PATCH 1/2] virtio_pci: double free and invalid memory access of device vqs
...at oracle.com> --- drivers/virtio/virtio_pci_legacy.c | 1 - 1 file changed, 1 deletion(-) diff --git a/drivers/virtio/virtio_pci_legacy.c b/drivers/virtio/virtio_pci_legacy.c index 6c76f0f..913ca23 100644 --- a/drivers/virtio/virtio_pci_legacy.c +++ b/drivers/virtio/virtio_pci_legacy.c @@ -298,7 +298,6 @@ void virtio_pci_legacy_remove(struct pci_dev *pci_dev) unregister_virtio_device(&vp_dev->vdev); - vp_del_vqs(&vp_dev->vdev); pci_iounmap(pci_dev, vp_dev->ioaddr); pci_release_regions(pci_dev); pci_disable_device(pci_dev); -- 1.7.10.4
2018 May 24
3
[PATCH] drm/nouveau/secboot/acr: Remove VLA usage
...ls_ucode_img_r367 *img = ls_ucode_img_r367(_img); const struct acr_r352_ls_func *ls_func = acr->func->ls_func[_img->falcon_id]; - u8 gdesc[ls_func->bl_desc_size]; nvkm_gpuobj_memcpy_to(wpr_blob, pos, &img->wpr_header, sizeof(img->wpr_header)); @@ -298,6 +310,8 @@ acr_r367_ls_write_wpr(struct acr_r352 *acr, struct list_head *imgs, nvkm_done(wpr_blob); + kfree(gdesc); + return 0; } -- 2.17.0 -- Kees Cook Pixel Security
2010 Dec 13
3
[PATCH 1/1] hv: Use only one receive buffer per channel and kmalloc on initialize
...f) { + printk(KERN_INFO + "Unable to allocate memory for receive buffer\n"); + return -ENOMEM; + } + hv_cb_utils[HV_SHUTDOWN_MSG].channel->onchannel_callback = &shutdown_onchannelcallback; hv_cb_utils[HV_SHUTDOWN_MSG].callback = &shutdown_onchannelcallback; @@ -298,6 +298,10 @@ static void exit_hyperv_utils(void) hv_cb_utils[HV_HEARTBEAT_MSG].channel->onchannel_callback = &chn_cb_negotiate; hv_cb_utils[HV_HEARTBEAT_MSG].callback = &chn_cb_negotiate; + + kfree(shut_txf_buf); + kfree(time_txf_buf); + kfree(hbeat_txf_buf); } module_init(ini...
2010 Dec 13
3
[PATCH 1/1] hv: Use only one receive buffer per channel and kmalloc on initialize
...f) { + printk(KERN_INFO + "Unable to allocate memory for receive buffer\n"); + return -ENOMEM; + } + hv_cb_utils[HV_SHUTDOWN_MSG].channel->onchannel_callback = &shutdown_onchannelcallback; hv_cb_utils[HV_SHUTDOWN_MSG].callback = &shutdown_onchannelcallback; @@ -298,6 +298,10 @@ static void exit_hyperv_utils(void) hv_cb_utils[HV_HEARTBEAT_MSG].channel->onchannel_callback = &chn_cb_negotiate; hv_cb_utils[HV_HEARTBEAT_MSG].callback = &chn_cb_negotiate; + + kfree(shut_txf_buf); + kfree(time_txf_buf); + kfree(hbeat_txf_buf); } module_init(ini...
2020 Aug 04
3
[PATCH V5 1/6] vhost: introduce vhost_vring_call
...>>> ????????????? cb.private = vq; >>> ????????? } else { >>> diff --git a/drivers/vhost/vhost.c b/drivers/vhost/vhost.c >>> index d7b8df3edffc..9f1a845a9302 100644 >>> --- a/drivers/vhost/vhost.c >>> +++ b/drivers/vhost/vhost.c >>> @@ -298,6 +298,13 @@ static void vhost_vq_meta_reset(struct >>> vhost_dev *d) >>> ????????? __vhost_vq_meta_reset(d->vqs[i]); >>> ? } >>> ? +static void vhost_vring_call_reset(struct vhost_vring_call >>> *call_ctx) >>> +{ >>> +??? call_ctx...
2020 Aug 04
3
[PATCH V5 1/6] vhost: introduce vhost_vring_call
...>>> ????????????? cb.private = vq; >>> ????????? } else { >>> diff --git a/drivers/vhost/vhost.c b/drivers/vhost/vhost.c >>> index d7b8df3edffc..9f1a845a9302 100644 >>> --- a/drivers/vhost/vhost.c >>> +++ b/drivers/vhost/vhost.c >>> @@ -298,6 +298,13 @@ static void vhost_vq_meta_reset(struct >>> vhost_dev *d) >>> ????????? __vhost_vq_meta_reset(d->vqs[i]); >>> ? } >>> ? +static void vhost_vring_call_reset(struct vhost_vring_call >>> *call_ctx) >>> +{ >>> +??? call_ctx...
2009 Feb 27
1
[LLVMdev] -fPIC warning on every compile on Cygwin
...this happening is if >>> that's erroneously false. > > This works for me: > > Index: Makefile.rules > =================================================================== > --- Makefile.rules (revision 65633) > +++ Makefile.rules (working copy) > @@ -298,6 +298,8 @@ > # Common symbols not allowed in dylib files > CXX.Flags += -fno-common > C.Flags += -fno-common > + else ifeq ($(OS),Cygwin) > + # Nothing. Cygwin defaults to PIC and warns when given -fPIC > else > # Linux and others; pa...
2015 Apr 08
0
[PATCH] virtio_config: reorder functions
...tio_config.h | 15 +++++++-------- > 1 file changed, 7 insertions(+), 8 deletions(-) > > diff --git a/include/linux/virtio_config.h b/include/linux/virtio_config.h > index ed1e0d5..1e306f7 100644 > --- a/include/linux/virtio_config.h > +++ b/include/linux/virtio_config.h > @@ -298,13 +298,6 @@ static inline __virtio64 cpu_to_virtio64(struct virtio_device *vdev, u64 val) > } \ > } while(0) > > -static inline u8 virtio_cread8(struct virtio_device *vdev, unsigned int offset) > -{ > - u8 ret; > - vdev->config->get(vdev, offset, &ret, s...
2019 Jan 23
0
[supermin PATCH 2/2] Print Librpm.Multiple_matches exceptions
Print a better diagnostic for them, so it is more clear which package is detected as present multiple times. --- src/supermin.ml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/supermin.ml b/src/supermin.ml index f9798f9..71d8b64 100644 --- a/src/supermin.ml +++ b/src/supermin.ml @@ -298,6 +298,8 @@ let () = error "error: %s: %s: %s" fname (Unix.error_message code) param | Failure msg -> (* from failwith/failwithf *) error "failure: %s" msg + | Librpm.Multiple_matches (package, count) -> (* from librpm *) + error &quot...
2008 Apr 24
1
[PATCH] virtio-blk: fix remove oops
...tio_blk.c +++ b/drivers/block/virtio_blk.c @@ -289,7 +289,6 @@ out: static void virtblk_remove(struct virtio_device *vdev) { struct virtio_blk *vblk = vdev->priv; - int major = vblk->disk->major; /* Nothing should be pending. */ BUG_ON(!list_empty(&vblk->reqs)); @@ -299,7 +298,6 @@ static void virtblk_remove(struct virtio_device *vdev) blk_cleanup_queue(vblk->disk->queue); put_disk(vblk->disk); - unregister_blkdev(major, "virtblk"); mempool_destroy(vblk->pool); vdev->config->del_vq(vblk->vq); kfree(vblk);
2010 Sep 03
0
[PATCH] vhost: error handling fix
...ow up to Eric's patch - fixes error handling in a similar way. drivers/vhost/vhost.c | 1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/drivers/vhost/vhost.c b/drivers/vhost/vhost.c index 7c75dce..666aa36 100644 --- a/drivers/vhost/vhost.c +++ b/drivers/vhost/vhost.c @@ -298,6 +298,7 @@ static long vhost_dev_set_owner(struct vhost_dev *dev) return 0; err_cgroup: kthread_stop(worker); + dev->worker = NULL; err_worker: if (dev->mm) mmput(dev->mm); -- 1.7.2.rc0.14.g41c1c