search for: dev_nam

Displaying 20 results from an estimated 375 matches for "dev_nam".

Did you mean: dev_name
2013 Aug 22
2
[PATCH] tracing/events: Add bounce tracing to swiotbl-xen
...hen xen_swiotlb_map_page() doesn't stop after range_straddles_page_boundary(), but calls spinlock functions, memcpy() and xen_phys_to_bus() as well. This patch introduces the swiotlb-xen:bounced event, which also prints out the following informations to help you find out why bouncing happened: dev_name: 0000:08:00.0 dma_mask=ffffffffffffffff dev_addr=9149f000 size=32768 swiotlb_force=0 If (dev_addr + size + 1) > dma_mask, the buffer is out of the device's DMA range. If swiotlb_force == 1, you should really change the kernel parameters. Otherwise, the buffer is not contiguous in mfn space...
2013 Aug 22
2
[PATCH] tracing/events: Add bounce tracing to swiotbl-xen
...hen xen_swiotlb_map_page() doesn't stop after range_straddles_page_boundary(), but calls spinlock functions, memcpy() and xen_phys_to_bus() as well. This patch introduces the swiotlb-xen:bounced event, which also prints out the following informations to help you find out why bouncing happened: dev_name: 0000:08:00.0 dma_mask=ffffffffffffffff dev_addr=9149f000 size=32768 swiotlb_force=0 If (dev_addr + size + 1) > dma_mask, the buffer is out of the device's DMA range. If swiotlb_force == 1, you should really change the kernel parameters. Otherwise, the buffer is not contiguous in mfn space...
2013 Aug 22
2
[PATCH] tracing/events: Add bounce tracing to swiotbl-xen
...hen xen_swiotlb_map_page() doesn't stop after range_straddles_page_boundary(), but calls spinlock functions, memcpy() and xen_phys_to_bus() as well. This patch introduces the swiotlb-xen:bounced event, which also prints out the following informations to help you find out why bouncing happened: dev_name: 0000:08:00.0 dma_mask=ffffffffffffffff dev_addr=9149f000 size=32768 swiotlb_force=0 If (dev_addr + size + 1) > dma_mask, the buffer is out of the device's DMA range. If swiotlb_force == 1, you should really change the kernel parameters. Otherwise, the buffer is not contiguous in mfn space...
2013 Sep 04
1
[PATCHv2] tracing/events: Add bounce tracing to swiotbl
...xen_swiotlb_map_page() doesn't stop after range_straddles_page_boundary(), but calls spinlock functions, memcpy() and xen_phys_to_bus() as well. This patch introduces the swiotlb:swiotlb_bounced event, which also prints out the following informations to help you find out why bouncing happened: dev_name: 0000:08:00.0 dma_mask=ffffffffffffffff dev_addr=9149f000 size=32768 swiotlb_force=0 If you use Xen, and (dev_addr + size + 1) > dma_mask, the buffer is out of the device's DMA range. If swiotlb_force == 1, you should really change the kernel parameters. Otherwise, the buffer is not contig...
2013 Sep 04
1
[PATCHv2] tracing/events: Add bounce tracing to swiotbl
...xen_swiotlb_map_page() doesn't stop after range_straddles_page_boundary(), but calls spinlock functions, memcpy() and xen_phys_to_bus() as well. This patch introduces the swiotlb:swiotlb_bounced event, which also prints out the following informations to help you find out why bouncing happened: dev_name: 0000:08:00.0 dma_mask=ffffffffffffffff dev_addr=9149f000 size=32768 swiotlb_force=0 If you use Xen, and (dev_addr + size + 1) > dma_mask, the buffer is out of the device's DMA range. If swiotlb_force == 1, you should really change the kernel parameters. Otherwise, the buffer is not contig...
2013 Sep 04
1
[PATCHv2] tracing/events: Add bounce tracing to swiotbl
...xen_swiotlb_map_page() doesn't stop after range_straddles_page_boundary(), but calls spinlock functions, memcpy() and xen_phys_to_bus() as well. This patch introduces the swiotlb:swiotlb_bounced event, which also prints out the following informations to help you find out why bouncing happened: dev_name: 0000:08:00.0 dma_mask=ffffffffffffffff dev_addr=9149f000 size=32768 swiotlb_force=0 If you use Xen, and (dev_addr + size + 1) > dma_mask, the buffer is out of the device's DMA range. If swiotlb_force == 1, you should really change the kernel parameters. Otherwise, the buffer is not contig...
2010 Nov 14
0
freebsd oss sound dsp scheme
...sound from wine ( which is compiled in /compat/i386 ). ******** PATCH ******** diff -Nrua audio.c-orig audio.c --- audio.c-orig 2010-11-12 20:20:02.000000000 +0100 +++ audio.c 2010-11-14 13:43:41.000000000 +0100 @@ -1170,12 +1170,12 @@ } else { - WOutDev[0].ossdev.dev_name = WInDev[0].ossdev.dev_name = StrDup("/dev/dsp",NULL); + WOutDev[0].ossdev.dev_name = WInDev[0].ossdev.dev_name = StrDup("/dev/dsp0.0",NULL); WOutDev[0].ossdev.mixer_name = WInDev[0].ossdev.mixer_name = StrDup("/dev/mixer",NULL); for (i = 1; i...
2018 Jun 01
0
[PATCH v8 1/6] daemon: Changing the way that we detect if a device contains partitions.
Instead of using part_to_dev to find such devices we open the device's directory under /sys/block/<dev_name> and look for entries starting with <dev_name>, eg. /sys/block/sda/sda1. --- daemon/listfs.ml | 41 ++++++++++++++++++++++------------------- 1 file changed, 22 insertions(+), 19 deletions(-) diff --git a/daemon/listfs.ml b/daemon/listfs.ml index 56ebadeda..eced55bce 100644 --- a/daemon...
2007 Aug 23
2
give me some works
hello, Chris In the next several months, I will have a lot of spare time. I will be happy if you assign some work to me. I have learn linux kernel for years but only fix a few small bugs in IP stack. In the past few months, I read some EXT4/VFS codes. I began reading source of btrfs ten days ago and have read it twice now. Regards YZ
2013 Jan 17
1
[RFC] virtio_console: Add DRIVER and INTERFACE to uevent.
...port->portdev->vdev) + return 0; + + dev = &port->portdev->vdev->dev; + err = add_uevent_var(env, "DRIVER=%s", dev->driver->name); + if (err) + return err; + + return add_uevent_var(env, "INTERFACE=%s/%s/%s", + dev->parent->parent ? + dev_name(dev->parent->parent) : "", + dev->parent ? dev_name(dev->parent) : "", + dev_name(dev)); +} + static int __init init(void) { int err; @@ -2201,6 +2222,7 @@ static int __init init(void) return err; } + pdrvdata.class->dev_uevent = class_...
2013 Jan 17
1
[RFC] virtio_console: Add DRIVER and INTERFACE to uevent.
...port->portdev->vdev) + return 0; + + dev = &port->portdev->vdev->dev; + err = add_uevent_var(env, "DRIVER=%s", dev->driver->name); + if (err) + return err; + + return add_uevent_var(env, "INTERFACE=%s/%s/%s", + dev->parent->parent ? + dev_name(dev->parent->parent) : "", + dev->parent ? dev_name(dev->parent) : "", + dev_name(dev)); +} + static int __init init(void) { int err; @@ -2201,6 +2222,7 @@ static int __init init(void) return err; } + pdrvdata.class->dev_uevent = class_...
2010 Dec 09
0
[PATCH linux-2.6.18-xen] make netloop permanent
...afea93 drivers/xen/netback/loopback.c --- a/drivers/xen/netback/loopback.c Tue Dec 07 18:35:16 2010 +0000 +++ b/drivers/xen/netback/loopback.c Wed Dec 08 18:27:41 2010 +0100 @@ -290,23 +290,6 @@ return err; } -static void __exit clean_loopback(int i) -{ - struct net_device *dev1, *dev2; - char dev_name[IFNAMSIZ]; - - sprintf(dev_name, "vif0.%d", i); - dev1 = dev_get_by_name(dev_name); - sprintf(dev_name, "veth%d", i); - dev2 = dev_get_by_name(dev_name); - if (dev1 && dev2) { - unregister_netdev(dev2); - unregister_netdev(dev1); - free_netdev(dev2); - free_netdev(d...
2014 Oct 25
1
[RFC PATCH 2/2] Assign a new irq handler while irqfd enabled
...ed nvqs, struct virtqueue *vqs[], vq_callback_t *callbacks[], @@ -400,8 +425,13 @@ static int vm_find_vqs(struct virtio_device *vdev, unsigned nvqs, unsigned int irq = platform_get_irq(vm_dev->pdev, 0); int i, err; - err = request_irq(irq, vm_interrupt, IRQF_SHARED, - dev_name(&vdev->dev), vm_dev); + if (*vm_dev->isr_mem & VIRTIO_MMIO_F_IRQFD) { + err = request_irq(irq, vm_interrupt_irqfd, IRQF_SHARED, + dev_name(&vdev->dev), vm_dev); + } else { + err = request_irq(irq, vm_interrupt, IRQF_SHARED, + dev_name(&vdev->dev), vm_dev); +...
2014 Oct 25
1
[RFC PATCH 2/2] Assign a new irq handler while irqfd enabled
...ed nvqs, struct virtqueue *vqs[], vq_callback_t *callbacks[], @@ -400,8 +425,13 @@ static int vm_find_vqs(struct virtio_device *vdev, unsigned nvqs, unsigned int irq = platform_get_irq(vm_dev->pdev, 0); int i, err; - err = request_irq(irq, vm_interrupt, IRQF_SHARED, - dev_name(&vdev->dev), vm_dev); + if (*vm_dev->isr_mem & VIRTIO_MMIO_F_IRQFD) { + err = request_irq(irq, vm_interrupt_irqfd, IRQF_SHARED, + dev_name(&vdev->dev), vm_dev); + } else { + err = request_irq(irq, vm_interrupt, IRQF_SHARED, + dev_name(&vdev->dev), vm_dev); +...
2014 Oct 27
1
[RFC PATCH 2/2] Assign a new irq handler while irqfd enabled
...vq_callback_t *callbacks[], >> @@ -400,8 +425,13 @@ static int vm_find_vqs(struct virtio_device *vdev, unsigned nvqs, >> unsigned int irq = platform_get_irq(vm_dev->pdev, 0); >> int i, err; >> >> - err = request_irq(irq, vm_interrupt, IRQF_SHARED, >> - dev_name(&vdev->dev), vm_dev); >> + if (*vm_dev->isr_mem & VIRTIO_MMIO_F_IRQFD) { >> + err = request_irq(irq, vm_interrupt_irqfd, IRQF_SHARED, >> + dev_name(&vdev->dev), vm_dev); >> + } else { >> + err = request_irq(irq, vm_interrupt, IRQF_SHARED, &...
2014 Oct 27
1
[RFC PATCH 2/2] Assign a new irq handler while irqfd enabled
...vq_callback_t *callbacks[], >> @@ -400,8 +425,13 @@ static int vm_find_vqs(struct virtio_device *vdev, unsigned nvqs, >> unsigned int irq = platform_get_irq(vm_dev->pdev, 0); >> int i, err; >> >> - err = request_irq(irq, vm_interrupt, IRQF_SHARED, >> - dev_name(&vdev->dev), vm_dev); >> + if (*vm_dev->isr_mem & VIRTIO_MMIO_F_IRQFD) { >> + err = request_irq(irq, vm_interrupt_irqfd, IRQF_SHARED, >> + dev_name(&vdev->dev), vm_dev); >> + } else { >> + err = request_irq(irq, vm_interrupt, IRQF_SHARED, &...
2014 Nov 06
2
[RFC PATCH] virtio-mmio: support for multiple irqs
...->pdev, i); >> + if (irq == -ENXIO) >> + goto error; >> + } >> + >> + /* Set the irq used for configuration */ >> + v = vm_dev->used_irqs; >> + snprintf(vm_dev->vm_vq_names[v], sizeof(*vm_dev->vm_vq_names), >> + "%s-config", dev_name(&vdev->dev)); >> + irq = platform_get_irq(vm_dev->pdev, v); >> + err = request_irq(irq, vm_config_changed, 0, >> + vm_dev->vm_vq_names[v], vm_dev); >> + ++vm_dev->used_irqs; >> + if (err) >> + goto error; >> + >> + if (!per_vq_irq)...
2014 Nov 06
2
[RFC PATCH] virtio-mmio: support for multiple irqs
...->pdev, i); >> + if (irq == -ENXIO) >> + goto error; >> + } >> + >> + /* Set the irq used for configuration */ >> + v = vm_dev->used_irqs; >> + snprintf(vm_dev->vm_vq_names[v], sizeof(*vm_dev->vm_vq_names), >> + "%s-config", dev_name(&vdev->dev)); >> + irq = platform_get_irq(vm_dev->pdev, v); >> + err = request_irq(irq, vm_config_changed, 0, >> + vm_dev->vm_vq_names[v], vm_dev); >> + ++vm_dev->used_irqs; >> + if (err) >> + goto error; >> + >> + if (!per_vq_irq)...
2012 Mar 21
2
[PATCH] xen: initialize platform_pci even if xen_emul_unplug=never
...-blkfront.c index 2f22874..d5e1ab9 100644 --- a/drivers/block/xen-blkfront.c +++ b/drivers/block/xen-blkfront.c @@ -1475,6 +1475,9 @@ static int __init xlblk_init(void) if (!xen_domain()) return -ENODEV; + if (!xen_platform_pci_unplug) + return -ENODEV; + if (register_blkdev(XENVBD_MAJOR, DEV_NAME)) { printk(KERN_WARNING "xen_blk: can''t get major %d with name %s\n", XENVBD_MAJOR, DEV_NAME); diff --git a/drivers/net/xen-netfront.c b/drivers/net/xen-netfront.c index b161750..663b32c 100644 --- a/drivers/net/xen-netfront.c +++ b/drivers/net/xen-netfront.c @@ -47...
2014 Nov 06
0
[RFC PATCH] virtio-mmio: support for multiple irqs
...+ irq = platform_get_irq(vm_dev->pdev, i); > + if (irq == -ENXIO) > + goto error; > + } > + > + /* Set the irq used for configuration */ > + v = vm_dev->used_irqs; > + snprintf(vm_dev->vm_vq_names[v], sizeof(*vm_dev->vm_vq_names), > + "%s-config", dev_name(&vdev->dev)); > + irq = platform_get_irq(vm_dev->pdev, v); > + err = request_irq(irq, vm_config_changed, 0, > + vm_dev->vm_vq_names[v], vm_dev); > + ++vm_dev->used_irqs; > + if (err) > + goto error; > + > + if (!per_vq_irq) { > + /* Shared irq for all...