Displaying 20 results from an estimated 25 matches for "group_list".
2020 Apr 14
0
[PATCH v2 32/33] iommu: Remove add_device()/remove_device() code-paths
...2 files changed, 29 insertions(+), 124 deletions(-)
diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c
index a2ff95424044..9a7120746b8e 100644
--- a/drivers/iommu/iommu.c
+++ b/drivers/iommu/iommu.c
@@ -220,7 +220,7 @@ static int __iommu_probe_device(struct device *dev, struct list_head *group_list
return ret;
}
-static int __iommu_probe_device_helper(struct device *dev)
+int iommu_probe_device(struct device *dev)
{
const struct iommu_ops *ops = dev->bus->iommu_ops;
struct iommu_group *group;
@@ -264,70 +264,17 @@ static int __iommu_probe_device_helper(struct device *dev)
}...
2006 May 29
0
using components to reuse code
...{session[:account_id]}
#{Group.find(session[:group_id]).owner_id}"
if (session[:account_id] == Group.find(session[:group_id]).owner_id)
Account.join_group(@account.id, session[:group_id])
# render_component (:controller => ''test/groups_man'', :action =>
''group_list'')
group_list
else
render :partial => ''group_error''
end
end
def group_list
@group = Group.find(session[:group_id])
@account = @group.accounts.find(:all)
render :partial => ''group_list''
end
the problem come when I want to re...
2020 Apr 14
0
[PATCH v2 11/33] iommu: Split off default domain allocation from group assignment
...+-
1 file changed, 151 insertions(+), 3 deletions(-)
diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c
index 8be047a4808f..7de0e29db333 100644
--- a/drivers/iommu/iommu.c
+++ b/drivers/iommu/iommu.c
@@ -199,7 +199,7 @@ static int __iommu_probe_device(struct device *dev, struct list_head *group_list
dev->iommu->iommu_dev = iommu_dev;
group = iommu_group_get_for_dev(dev);
- if (!IS_ERR(group)) {
+ if (IS_ERR(group)) {
ret = PTR_ERR(group);
goto out_release;
}
@@ -1599,6 +1599,37 @@ static int add_iommu_group(struct device *dev, void *data)
return ret;
}
+static int prob...
2011 Oct 18
1
Chanspy() not working with group in asterisk 1.4.42
...ke a group
with name of spy. Please help me where is the issue on that.
a) caller will call this number to join konference and spy group
exten => 43681111,1,Answer()
exten => 43681111,n,NoOp(****${CHANNEL}****)
exten => 43681111,n,Set(GROUP(${CHANNEL})=spy)
exten => 43681111,n,Set(a=${GROUP_LIST(spy)})
exten => 43681111,n,Set(b=${GROUP_LIST()})
exten => 43681111,n,Konference(VADSTR)
b) spy will dial it to spy the channels
exten => 43681156,1,Answer()
exten => 43681156,n,NoOp(***${SPYGROUP}****)
exten => 43681156,n,Set(SPYGROUP=spy)
exten => 43681156,n,NoOp(***${SPYGROUP...
2007 May 17
3
can't browser a samba server from a specific pc in the network
hello everyone,
i'm not even sure there is something wrong with samba here but im taking all
chances...
i have a linux samba server and 3 winXP prof pcs in my setup.
now from one of the winxp boxes i can not seem to access my shares on the
server. that is when i try to go through network neighborhood path.
the message that is returned is : \\stargaze is not accessible. You may not
have
2020 Apr 14
0
[PATCH v2 09/33] iommu: Keep a list of allocated groups in __iommu_probe_device()
...ct iommu_domain *domain;
+ struct list_head entry;
};
struct group_device {
@@ -184,7 +185,7 @@ static void dev_iommu_free(struct device *dev)
dev->iommu = NULL;
}
-static int __iommu_probe_device(struct device *dev)
+static int __iommu_probe_device(struct device *dev, struct list_head *group_list)
{
const struct iommu_ops *ops = dev->bus->iommu_ops;
struct iommu_device *iommu_dev;
@@ -204,6 +205,9 @@ static int __iommu_probe_device(struct device *dev)
}
iommu_group_put(group);
+ if (group_list && !group->default_domain && list_empty(&group->entry))...
2005 Oct 16
1
GROUP and GROUP_COUNT
I have a macro and when I call it I have something like this:
exten => s,1,NoOp(Group Count: ${GROUP_COUNT(MYGROUP)})
exten => s,n,Set(GROUP()=MYGROUP) ;Set Group
exten => s,n,NoOp(Group List: ${GROUP_LIST()})
exten => s,n,NoOp(Group Count: ${GROUP_COUNT(MYGROUP)})
The GROUP_COUNT returns zero before the call to GROUP but also returns 0 after
the call to GROUP.
If I make 2 calls then it returns 0 before and 1 after placing the 2nd call.
The weird portion is when I get incomming calls from th...
2020 Jul 12
3
[PATCH 2/7] kvm/vfio: detect assigned device via irqbypass manager
...*cons,
> diff --git a/virt/kvm/vfio.c b/virt/kvm/vfio.c
> index 8fcbc50..111da52 100644
> --- a/virt/kvm/vfio.c
> +++ b/virt/kvm/vfio.c
> @@ -226,7 +226,6 @@ static int kvm_vfio_set_group(struct kvm_device *dev, long attr, u64 arg)
> list_add_tail(&kvg->node, &kv->group_list);
> kvg->vfio_group = vfio_group;
>
> - kvm_arch_start_assignment(dev->kvm);
>
> mutex_unlock(&kv->lock);
>
> @@ -254,7 +253,6 @@ static int kvm_vfio_set_group(struct kvm_device *dev, long attr, u64 arg)
> continue;
>
> list_del(&am...
2020 Jul 12
3
[PATCH 2/7] kvm/vfio: detect assigned device via irqbypass manager
...*cons,
> diff --git a/virt/kvm/vfio.c b/virt/kvm/vfio.c
> index 8fcbc50..111da52 100644
> --- a/virt/kvm/vfio.c
> +++ b/virt/kvm/vfio.c
> @@ -226,7 +226,6 @@ static int kvm_vfio_set_group(struct kvm_device *dev, long attr, u64 arg)
> list_add_tail(&kvg->node, &kv->group_list);
> kvg->vfio_group = vfio_group;
>
> - kvm_arch_start_assignment(dev->kvm);
>
> mutex_unlock(&kv->lock);
>
> @@ -254,7 +253,6 @@ static int kvm_vfio_set_group(struct kvm_device *dev, long attr, u64 arg)
> continue;
>
> list_del(&am...
2020 Apr 29
35
[PATCH v3 00/34] iommu: Move iommu_group setup to IOMMU core code
Hi,
here is the third version of this patch-set. Older versions can be found
here:
v1: https://lore.kernel.org/lkml/20200407183742.4344-1-joro at 8bytes.org/
(Has some more introductory text)
v2: https://lore.kernel.org/lkml/20200414131542.25608-1-joro at 8bytes.org/
Changes v2 -> v3:
* Rebased v5.7-rc3
* Added a missing iommu_group_put() as reported by Lu Baolu.
* Added a
2005 Jun 05
0
Re: Bison, Flex, Conditional Expression
...ns the length of the argument given
REGEX REGEX("<regular expression>" <data> Regular Expression: Returns 1 if data matches regular expression.
FIELDQTY FIELDQTY(<varname>,<delim>) Count the fields, with an arbitrary delimiter
GROUP_LIST GROUP_LIST() Gets a list of the groups set on a channel.
GROUP GROUP([category]) Gets or sets the channel group.
GROUP_MATCH_COUNT GROUP_MATCH_COUNT(groupmatch[@categ Counts the number of channels in the groups matching the...
2010 Nov 05
1
GROUP_COUNT not counting correctly
Hello,
this is a test to add a channel to multiple GROUPs.
this is my dialplan :
exten => s,n,NoOp(groepcount = ${GROUP_COUNT(40)})
exten => s,n,Set(GROUP(40)=40)
exten => s,n,NoOp(This channel is member of : ${GROUP_LIST()})
exten => s,n,NoOp(groepcount = ${GROUP_COUNT(40)})
exten => s,n,NoOp(groepcount = ${GROUP_COUNT(40L)})
exten => s,n,Set(GROUP(40)=40L)
exten => s,n,NoOp(This channel is member of : ${GROUP_LIST()})
exten => s,n,NoOp(groepcount = ${GROUP_COUNT(40L)})
this is the output on a firs...
2020 Apr 14
35
[PATCH v2 00/33] iommu: Move iommu_group setup to IOMMU core code
Hi,
here is the second version of this patch-set. The first version with
some more introductory text can be found here:
https://lore.kernel.org/lkml/20200407183742.4344-1-joro at 8bytes.org/
Changes v1->v2:
* Rebased to v5.7-rc1
* Re-wrote the arm-smmu changes as suggested by Robin Murphy
* Re-worked the Exynos patches to hopefully not break the
driver anymore
* Fixed a missing
2020 Apr 14
35
[PATCH v2 00/33] iommu: Move iommu_group setup to IOMMU core code
Hi,
here is the second version of this patch-set. The first version with
some more introductory text can be found here:
https://lore.kernel.org/lkml/20200407183742.4344-1-joro at 8bytes.org/
Changes v1->v2:
* Rebased to v5.7-rc1
* Re-wrote the arm-smmu changes as suggested by Robin Murphy
* Re-worked the Exynos patches to hopefully not break the
driver anymore
* Fixed a missing
2020 Jul 12
1
[PATCH 2/7] kvm/vfio: detect assigned device via irqbypass manager
...*cons,
> diff --git a/virt/kvm/vfio.c b/virt/kvm/vfio.c
> index 8fcbc50..111da52 100644
> --- a/virt/kvm/vfio.c
> +++ b/virt/kvm/vfio.c
> @@ -226,7 +226,6 @@ static int kvm_vfio_set_group(struct kvm_device *dev, long attr, u64 arg)
> list_add_tail(&kvg->node, &kv->group_list);
> kvg->vfio_group = vfio_group;
>
> - kvm_arch_start_assignment(dev->kvm);
>
> mutex_unlock(&kv->lock);
>
> @@ -254,7 +253,6 @@ static int kvm_vfio_set_group(struct kvm_device *dev, long attr, u64 arg)
> continue;
>
> list_del(&am...
2020 Apr 07
41
[RFC PATCH 00/34] iommu: Move iommu_group setup to IOMMU core code
Hi,
here is a patch-set to remove all calls of iommu_group_get_for_dev() from
the IOMMU drivers and move the per-device group setup and default domain
allocation into the IOMMU core code.
This eliminates some ugly back and forth between IOMMU core code and the
IOMMU drivers, where the driver called iommu_group_get_for_dev() which itself
called back into the driver.
The patch-set started as a
2020 Apr 07
41
[RFC PATCH 00/34] iommu: Move iommu_group setup to IOMMU core code
Hi,
here is a patch-set to remove all calls of iommu_group_get_for_dev() from
the IOMMU drivers and move the per-device group setup and default domain
allocation into the IOMMU core code.
This eliminates some ugly back and forth between IOMMU core code and the
IOMMU drivers, where the driver called iommu_group_get_for_dev() which itself
called back into the driver.
The patch-set started as a
2006 Aug 09
0
Bug in ActionPack
I have a controller named "guest_group" with an action "list" and a
controller named "guest" with an action "group_list". Internally the
views seem to be cached after converting the ''/'' in the path to ''_'' ->
there is a clash in my code were an erroneous view (of a previously
accessed action) is rendered.
Ugly as hell :-)
Is it a known bug? Where should I report it?
L...
2020 Apr 14
0
[PATCH v2 10/33] iommu: Move new probe_device path to separate function
...1 file changed, 46 insertions(+), 23 deletions(-)
diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c
index 18eb3623bd00..8be047a4808f 100644
--- a/drivers/iommu/iommu.c
+++ b/drivers/iommu/iommu.c
@@ -218,12 +218,55 @@ static int __iommu_probe_device(struct device *dev, struct list_head *group_list
return ret;
}
+static int __iommu_probe_device_helper(struct device *dev)
+{
+ const struct iommu_ops *ops = dev->bus->iommu_ops;
+ struct iommu_group *group;
+ int ret;
+
+ ret = __iommu_probe_device(dev, NULL);
+ if (ret)
+ goto err_out;
+
+ /*
+ * Try to allocate a default domain -...
2006 Jul 14
1
Samba 3.0.23 winbind use default domain = yes behaviour
Hello list,
I encountered a problem in Samba 3.0.23 regarding the winbind use default
domain = yes behaviour.
It only works for the users an NOT anymore for the Group. So this make
getent group to show NETBIOSDOMAINNAME/group which course mail squid
configuration to fail. My squid configuration allowed access based on the AD
groups, which are provided by Winbindd.
Tested distribution:
SuSE