Displaying 20 results from an estimated 375 matches for "dev_nam".
Did you mean:
dev_name
2013 Aug 22
2
[PATCH] tracing/events: Add bounce tracing to swiotbl-xen
...hen
xen_swiotlb_map_page() doesn't stop after range_straddles_page_boundary(), but
calls spinlock functions, memcpy() and xen_phys_to_bus() as well. This patch
introduces the swiotlb-xen:bounced event, which also prints out the following
informations to help you find out why bouncing happened:
dev_name: 0000:08:00.0 dma_mask=ffffffffffffffff dev_addr=9149f000 size=32768
swiotlb_force=0
If (dev_addr + size + 1) > dma_mask, the buffer is out of the device's DMA
range. If swiotlb_force == 1, you should really change the kernel parameters.
Otherwise, the buffer is not contiguous in mfn space...
2013 Aug 22
2
[PATCH] tracing/events: Add bounce tracing to swiotbl-xen
...hen
xen_swiotlb_map_page() doesn't stop after range_straddles_page_boundary(), but
calls spinlock functions, memcpy() and xen_phys_to_bus() as well. This patch
introduces the swiotlb-xen:bounced event, which also prints out the following
informations to help you find out why bouncing happened:
dev_name: 0000:08:00.0 dma_mask=ffffffffffffffff dev_addr=9149f000 size=32768
swiotlb_force=0
If (dev_addr + size + 1) > dma_mask, the buffer is out of the device's DMA
range. If swiotlb_force == 1, you should really change the kernel parameters.
Otherwise, the buffer is not contiguous in mfn space...
2013 Aug 22
2
[PATCH] tracing/events: Add bounce tracing to swiotbl-xen
...hen
xen_swiotlb_map_page() doesn't stop after range_straddles_page_boundary(), but
calls spinlock functions, memcpy() and xen_phys_to_bus() as well. This patch
introduces the swiotlb-xen:bounced event, which also prints out the following
informations to help you find out why bouncing happened:
dev_name: 0000:08:00.0 dma_mask=ffffffffffffffff dev_addr=9149f000 size=32768
swiotlb_force=0
If (dev_addr + size + 1) > dma_mask, the buffer is out of the device's DMA
range. If swiotlb_force == 1, you should really change the kernel parameters.
Otherwise, the buffer is not contiguous in mfn space...
2013 Sep 04
1
[PATCHv2] tracing/events: Add bounce tracing to swiotbl
...xen_swiotlb_map_page() doesn't stop after range_straddles_page_boundary(), but
calls spinlock functions, memcpy() and xen_phys_to_bus() as well. This patch
introduces the swiotlb:swiotlb_bounced event, which also prints out the
following informations to help you find out why bouncing happened:
dev_name: 0000:08:00.0 dma_mask=ffffffffffffffff dev_addr=9149f000 size=32768
swiotlb_force=0
If you use Xen, and (dev_addr + size + 1) > dma_mask, the buffer is out of the
device's DMA range. If swiotlb_force == 1, you should really change the kernel
parameters. Otherwise, the buffer is not contig...
2013 Sep 04
1
[PATCHv2] tracing/events: Add bounce tracing to swiotbl
...xen_swiotlb_map_page() doesn't stop after range_straddles_page_boundary(), but
calls spinlock functions, memcpy() and xen_phys_to_bus() as well. This patch
introduces the swiotlb:swiotlb_bounced event, which also prints out the
following informations to help you find out why bouncing happened:
dev_name: 0000:08:00.0 dma_mask=ffffffffffffffff dev_addr=9149f000 size=32768
swiotlb_force=0
If you use Xen, and (dev_addr + size + 1) > dma_mask, the buffer is out of the
device's DMA range. If swiotlb_force == 1, you should really change the kernel
parameters. Otherwise, the buffer is not contig...
2013 Sep 04
1
[PATCHv2] tracing/events: Add bounce tracing to swiotbl
...xen_swiotlb_map_page() doesn't stop after range_straddles_page_boundary(), but
calls spinlock functions, memcpy() and xen_phys_to_bus() as well. This patch
introduces the swiotlb:swiotlb_bounced event, which also prints out the
following informations to help you find out why bouncing happened:
dev_name: 0000:08:00.0 dma_mask=ffffffffffffffff dev_addr=9149f000 size=32768
swiotlb_force=0
If you use Xen, and (dev_addr + size + 1) > dma_mask, the buffer is out of the
device's DMA range. If swiotlb_force == 1, you should really change the kernel
parameters. Otherwise, the buffer is not contig...
2010 Nov 14
0
freebsd oss sound dsp scheme
...sound from wine ( which is compiled in /compat/i386 ).
******** PATCH ********
diff -Nrua audio.c-orig audio.c
--- audio.c-orig 2010-11-12 20:20:02.000000000 +0100
+++ audio.c 2010-11-14 13:43:41.000000000 +0100
@@ -1170,12 +1170,12 @@
}
else
{
- WOutDev[0].ossdev.dev_name = WInDev[0].ossdev.dev_name = StrDup("/dev/dsp",NULL);
+ WOutDev[0].ossdev.dev_name = WInDev[0].ossdev.dev_name = StrDup("/dev/dsp0.0",NULL);
WOutDev[0].ossdev.mixer_name = WInDev[0].ossdev.mixer_name = StrDup("/dev/mixer",NULL);
for (i = 1; i...
2018 Jun 01
0
[PATCH v8 1/6] daemon: Changing the way that we detect if a device contains partitions.
Instead of using part_to_dev to find such devices we open the device's
directory under /sys/block/<dev_name> and look for entries starting with
<dev_name>, eg. /sys/block/sda/sda1.
---
daemon/listfs.ml | 41 ++++++++++++++++++++++-------------------
1 file changed, 22 insertions(+), 19 deletions(-)
diff --git a/daemon/listfs.ml b/daemon/listfs.ml
index 56ebadeda..eced55bce 100644
--- a/daemon...
2007 Aug 23
2
give me some works
hello, Chris
In the next several months, I will have a lot of spare time. I will
be happy if you assign some work to me. I have learn linux kernel
for years but only fix a few small bugs in IP stack. In the past few
months, I read some EXT4/VFS codes. I began reading source of btrfs
ten days ago and have read it twice now.
Regards
YZ
2013 Jan 17
1
[RFC] virtio_console: Add DRIVER and INTERFACE to uevent.
...port->portdev->vdev)
+ return 0;
+
+ dev = &port->portdev->vdev->dev;
+ err = add_uevent_var(env, "DRIVER=%s", dev->driver->name);
+ if (err)
+ return err;
+
+ return add_uevent_var(env, "INTERFACE=%s/%s/%s",
+ dev->parent->parent ?
+ dev_name(dev->parent->parent) : "",
+ dev->parent ? dev_name(dev->parent) : "",
+ dev_name(dev));
+}
+
static int __init init(void)
{
int err;
@@ -2201,6 +2222,7 @@ static int __init init(void)
return err;
}
+ pdrvdata.class->dev_uevent = class_...
2013 Jan 17
1
[RFC] virtio_console: Add DRIVER and INTERFACE to uevent.
...port->portdev->vdev)
+ return 0;
+
+ dev = &port->portdev->vdev->dev;
+ err = add_uevent_var(env, "DRIVER=%s", dev->driver->name);
+ if (err)
+ return err;
+
+ return add_uevent_var(env, "INTERFACE=%s/%s/%s",
+ dev->parent->parent ?
+ dev_name(dev->parent->parent) : "",
+ dev->parent ? dev_name(dev->parent) : "",
+ dev_name(dev));
+}
+
static int __init init(void)
{
int err;
@@ -2201,6 +2222,7 @@ static int __init init(void)
return err;
}
+ pdrvdata.class->dev_uevent = class_...
2010 Dec 09
0
[PATCH linux-2.6.18-xen] make netloop permanent
...afea93 drivers/xen/netback/loopback.c
--- a/drivers/xen/netback/loopback.c Tue Dec 07 18:35:16 2010 +0000
+++ b/drivers/xen/netback/loopback.c Wed Dec 08 18:27:41 2010 +0100
@@ -290,23 +290,6 @@
return err;
}
-static void __exit clean_loopback(int i)
-{
- struct net_device *dev1, *dev2;
- char dev_name[IFNAMSIZ];
-
- sprintf(dev_name, "vif0.%d", i);
- dev1 = dev_get_by_name(dev_name);
- sprintf(dev_name, "veth%d", i);
- dev2 = dev_get_by_name(dev_name);
- if (dev1 && dev2) {
- unregister_netdev(dev2);
- unregister_netdev(dev1);
- free_netdev(dev2);
- free_netdev(d...
2014 Oct 25
1
[RFC PATCH 2/2] Assign a new irq handler while irqfd enabled
...ed nvqs,
struct virtqueue *vqs[],
vq_callback_t *callbacks[],
@@ -400,8 +425,13 @@ static int vm_find_vqs(struct virtio_device *vdev, unsigned nvqs,
unsigned int irq = platform_get_irq(vm_dev->pdev, 0);
int i, err;
- err = request_irq(irq, vm_interrupt, IRQF_SHARED,
- dev_name(&vdev->dev), vm_dev);
+ if (*vm_dev->isr_mem & VIRTIO_MMIO_F_IRQFD) {
+ err = request_irq(irq, vm_interrupt_irqfd, IRQF_SHARED,
+ dev_name(&vdev->dev), vm_dev);
+ } else {
+ err = request_irq(irq, vm_interrupt, IRQF_SHARED,
+ dev_name(&vdev->dev), vm_dev);
+...
2014 Oct 25
1
[RFC PATCH 2/2] Assign a new irq handler while irqfd enabled
...ed nvqs,
struct virtqueue *vqs[],
vq_callback_t *callbacks[],
@@ -400,8 +425,13 @@ static int vm_find_vqs(struct virtio_device *vdev, unsigned nvqs,
unsigned int irq = platform_get_irq(vm_dev->pdev, 0);
int i, err;
- err = request_irq(irq, vm_interrupt, IRQF_SHARED,
- dev_name(&vdev->dev), vm_dev);
+ if (*vm_dev->isr_mem & VIRTIO_MMIO_F_IRQFD) {
+ err = request_irq(irq, vm_interrupt_irqfd, IRQF_SHARED,
+ dev_name(&vdev->dev), vm_dev);
+ } else {
+ err = request_irq(irq, vm_interrupt, IRQF_SHARED,
+ dev_name(&vdev->dev), vm_dev);
+...
2014 Oct 27
1
[RFC PATCH 2/2] Assign a new irq handler while irqfd enabled
...vq_callback_t *callbacks[],
>> @@ -400,8 +425,13 @@ static int vm_find_vqs(struct virtio_device *vdev, unsigned nvqs,
>> unsigned int irq = platform_get_irq(vm_dev->pdev, 0);
>> int i, err;
>>
>> - err = request_irq(irq, vm_interrupt, IRQF_SHARED,
>> - dev_name(&vdev->dev), vm_dev);
>> + if (*vm_dev->isr_mem & VIRTIO_MMIO_F_IRQFD) {
>> + err = request_irq(irq, vm_interrupt_irqfd, IRQF_SHARED,
>> + dev_name(&vdev->dev), vm_dev);
>> + } else {
>> + err = request_irq(irq, vm_interrupt, IRQF_SHARED,
&...
2014 Oct 27
1
[RFC PATCH 2/2] Assign a new irq handler while irqfd enabled
...vq_callback_t *callbacks[],
>> @@ -400,8 +425,13 @@ static int vm_find_vqs(struct virtio_device *vdev, unsigned nvqs,
>> unsigned int irq = platform_get_irq(vm_dev->pdev, 0);
>> int i, err;
>>
>> - err = request_irq(irq, vm_interrupt, IRQF_SHARED,
>> - dev_name(&vdev->dev), vm_dev);
>> + if (*vm_dev->isr_mem & VIRTIO_MMIO_F_IRQFD) {
>> + err = request_irq(irq, vm_interrupt_irqfd, IRQF_SHARED,
>> + dev_name(&vdev->dev), vm_dev);
>> + } else {
>> + err = request_irq(irq, vm_interrupt, IRQF_SHARED,
&...
2014 Nov 06
2
[RFC PATCH] virtio-mmio: support for multiple irqs
...->pdev, i);
>> + if (irq == -ENXIO)
>> + goto error;
>> + }
>> +
>> + /* Set the irq used for configuration */
>> + v = vm_dev->used_irqs;
>> + snprintf(vm_dev->vm_vq_names[v], sizeof(*vm_dev->vm_vq_names),
>> + "%s-config", dev_name(&vdev->dev));
>> + irq = platform_get_irq(vm_dev->pdev, v);
>> + err = request_irq(irq, vm_config_changed, 0,
>> + vm_dev->vm_vq_names[v], vm_dev);
>> + ++vm_dev->used_irqs;
>> + if (err)
>> + goto error;
>> +
>> + if (!per_vq_irq)...
2014 Nov 06
2
[RFC PATCH] virtio-mmio: support for multiple irqs
...->pdev, i);
>> + if (irq == -ENXIO)
>> + goto error;
>> + }
>> +
>> + /* Set the irq used for configuration */
>> + v = vm_dev->used_irqs;
>> + snprintf(vm_dev->vm_vq_names[v], sizeof(*vm_dev->vm_vq_names),
>> + "%s-config", dev_name(&vdev->dev));
>> + irq = platform_get_irq(vm_dev->pdev, v);
>> + err = request_irq(irq, vm_config_changed, 0,
>> + vm_dev->vm_vq_names[v], vm_dev);
>> + ++vm_dev->used_irqs;
>> + if (err)
>> + goto error;
>> +
>> + if (!per_vq_irq)...
2012 Mar 21
2
[PATCH] xen: initialize platform_pci even if xen_emul_unplug=never
...-blkfront.c
index 2f22874..d5e1ab9 100644
--- a/drivers/block/xen-blkfront.c
+++ b/drivers/block/xen-blkfront.c
@@ -1475,6 +1475,9 @@ static int __init xlblk_init(void)
if (!xen_domain())
return -ENODEV;
+ if (!xen_platform_pci_unplug)
+ return -ENODEV;
+
if (register_blkdev(XENVBD_MAJOR, DEV_NAME)) {
printk(KERN_WARNING "xen_blk: can''t get major %d with name %s\n",
XENVBD_MAJOR, DEV_NAME);
diff --git a/drivers/net/xen-netfront.c b/drivers/net/xen-netfront.c
index b161750..663b32c 100644
--- a/drivers/net/xen-netfront.c
+++ b/drivers/net/xen-netfront.c
@@ -47...
2014 Nov 06
0
[RFC PATCH] virtio-mmio: support for multiple irqs
...+ irq = platform_get_irq(vm_dev->pdev, i);
> + if (irq == -ENXIO)
> + goto error;
> + }
> +
> + /* Set the irq used for configuration */
> + v = vm_dev->used_irqs;
> + snprintf(vm_dev->vm_vq_names[v], sizeof(*vm_dev->vm_vq_names),
> + "%s-config", dev_name(&vdev->dev));
> + irq = platform_get_irq(vm_dev->pdev, v);
> + err = request_irq(irq, vm_config_changed, 0,
> + vm_dev->vm_vq_names[v], vm_dev);
> + ++vm_dev->used_irqs;
> + if (err)
> + goto error;
> +
> + if (!per_vq_irq) {
> + /* Shared irq for all...