Displaying 20 results from an estimated 76 matches for "num_ident".
Did you mean:
num_ent
2019 Nov 02
0
[PATCH v2 2/9] iommu: Add dummy dev_iommu_fwspec_get() helper
From: Thierry Reding <treding at nvidia.com>
This dummy implementation is useful to avoid a dependency on the
IOMMU_API Kconfig symbol in drivers that can optionally use the IOMMU
API.
In order to fully use this, also move the struct iommu_fwspec definition
out of the IOMMU_API protected region.
Suggested-by: Ben Dooks <ben.dooks at codethink.co.uk>
Signed-off-by: Thierry Reding
2020 Mar 10
15
[PATCH 00/15 v2] iommu: Move iommu_fwspec out of 'struct device'
Hi,
here is a patch-set to rename iommu_param to dev_iommu and
establish it as a struct for generic per-device iommu-data.
Also move the iommu_fwspec pointer from struct device into
dev_iommu to have less iommu-related pointers in struct
device.
The bigger part of this patch-set moves the iommu_priv
pointer from struct iommu_fwspec to dev_iommu, making is
usable for iommu-drivers which do not
2004 Oct 20
1
Unable to handle kernel paging request at virtual address
Hi all:
I am getting this error message in my syslog after a few hours of running my QoS.
First i suposed it was a memory sims problem, but i have changed them and i have the same problem.
Here is the error message:
Oct 20 16:52:23 pototogorri /usr/bin/sudo: apache : TTY=unknown ; PWD=/var/www/html ; USER=root ; COMMAND=/sbin/iptables -t nat -D PREROUTI
Oct 20 16:52:23 pototogorri
2023 Apr 14
2
[PATCH] iommu/virtio: Detach domain on endpoint release
When an endpoint is released, for example a PCIe VF is disabled or a
function hot-unplugged, it should be detached from its domain. Send a
DETACH request.
Fixes: edcd69ab9a32 ("iommu: Add virtio-iommu driver")
Reported-by: Akihiko Odaki <akihiko.odaki at daynix.com>
Link: https://lore.kernel.org/all/15bf1b00-3aa0-973a-3a86-3fa5c4d41d2c at daynix.com/
Signed-off-by: Jean-Philippe
2023 Apr 14
2
[PATCH] iommu/virtio: Detach domain on endpoint release
When an endpoint is released, for example a PCIe VF is disabled or a
function hot-unplugged, it should be detached from its domain. Send a
DETACH request.
Fixes: edcd69ab9a32 ("iommu: Add virtio-iommu driver")
Reported-by: Akihiko Odaki <akihiko.odaki at daynix.com>
Link: https://lore.kernel.org/all/15bf1b00-3aa0-973a-3a86-3fa5c4d41d2c at daynix.com/
Signed-off-by: Jean-Philippe
2023 May 10
1
[PATCH] iommu/virtio: Detach domain on endpoint release
Hi Jean,
On 4/14/23 17:07, Jean-Philippe Brucker wrote:
> When an endpoint is released, for example a PCIe VF is disabled or a
> function hot-unplugged, it should be detached from its domain. Send a
> DETACH request.
>
> Fixes: edcd69ab9a32 ("iommu: Add virtio-iommu driver")
> Reported-by: Akihiko Odaki <akihiko.odaki at daynix.com>
> Link:
2017 Nov 14
2
winbind finds all domain users except Administrator
I tried mapping to root but I still get an ACCESS_DENIED when I try to
mount a share from the domain member.
I'd be very surprised if the samba admin account is the one and only
account that is intentionally denied from accessing shares on a member.
I'm pretty sure this is a bug. I tried this again with two clean installs
(4.7.1) on Linux, one in a VM. Compare this on the DC:
#
2004 Oct 17
2
poor 2 node performance
...ing at the node that is supposedly quiescent, I see that
kernel thread "events/0" is burning 100% of the CPU. Sure enough,
syslog is filling up rapidly with messages of the form:
Oct 17 22:01:13 breakout-0 kernel: process_vote: type: MODIFY, lockid: 2751426560, action: (11) <NULL>, num_ident: 1, alive: 1, write: 0, change2719924224, node=1, seqnum=551559, response=1
I guess I could disable the logging, but, I'm still rather
surprised about the amount of communication between the nodes.
Is this normal? I guess I was hoping that ocfs2 used some kind
of hierarchical read/write/exist...
2018 Jan 16
1
[RFC PATCH v2 2/5] iommu/virtio-iommu: Add probe request
Hi Jean-Philippe,
On 17/11/17 19:52, Jean-Philippe Brucker wrote:
> When the device offers the probe feature, send a probe request for each
> device managed by the IOMMU. Extract RESV_MEM information. When we
> encounter a MSI doorbell region, set it up as a IOMMU_RESV_MSI region.
> This will tell other subsystems that there is no need to map the MSI
> doorbell in the virtio-iommu,
2019 Nov 02
13
[PATCH v2 0/9] drm/nouveau: Various fixes for GP10B
From: Thierry Reding <treding at nvidia.com>
Hi Ben,
here's a revised subset of the patches I had sent out a couple of weeks
ago. I've reworked the BAR2 accesses in the way that you had suggested,
which at least for GP10B turned out to be fairly trivial to do. I have
not looked in detail at this for GV11B yet, but a cursory look showed
that BAR2 is accessed in more places, so the
2017 Nov 14
0
winbind finds all domain users except Administrator
On Tue, 14 Nov 2017 21:36:49 +0100
Fabian Fritz <fabianfuture at web.de> wrote:
> I tried mapping to root but I still get an ACCESS_DENIED when I try to
> mount a share from the domain member.
>
> I'd be very surprised if the samba admin account is the one and only
> account that is intentionally denied from accessing shares on a
> member.
>
> I'm pretty
2019 Dec 09
11
[PATCH v3 0/9] drm/nouveau: Various fixes for GP10B
From: Thierry Reding <treding at nvidia.com>
Hi Ben,
here's a revised subset of the patches I had sent out a couple of weeks
ago. I've reworked the BAR2 accesses in the way that you had suggested,
which at least for GP10B turned out to be fairly trivial to do. I have
not looked in detail at this for GV11B yet, but a cursory look showed
that BAR2 is accessed in more places, so the
2018 Nov 15
1
[PATCH v3 6/7] iommu/virtio: Add probe request
Hi Jean,
On 10/12/18 4:59 PM, Jean-Philippe Brucker wrote:
> When the device offers the probe feature, send a probe request for each
> device managed by the IOMMU. Extract RESV_MEM information. When we
> encounter a MSI doorbell region, set it up as a IOMMU_RESV_MSI region.
> This will tell other subsystems that there is no need to map the MSI
> doorbell in the virtio-iommu, because
2023 May 15
3
[PATCH v2 0/2] iommu/virtio: Fixes
One fix reported by Akihiko, and another found while going over the
driver.
Jean-Philippe Brucker (2):
iommu/virtio: Detach domain on endpoint release
iommu/virtio: Return size mapped for a detached domain
drivers/iommu/virtio-iommu.c | 57 ++++++++++++++++++++++++++----------
1 file changed, 41 insertions(+), 16 deletions(-)
--
2.40.0
2015 Jan 05
2
winbind backends ad and rfc2307 both with errors...
Hello,
I just set up a samba server (version 2:4.1.13+dfsg-4) on Debian 7.7,
being a member server of a Win2k8-Domain (before that, that server was
an old SuSE (10.4)-Samba with own user-management (standalone-server).
I would like to use winbind with the idmap backend "ad" or "rfc2307"
instead.
When using rfc2307 (like in my conf specified), I can do successfully:
wbinfo
2017 Nov 14
1
winbind finds all domain users except Administrator
Okay, right.
Is there anything that the Samba admininistrator account can do that the
users in the group domain admins can't (other than direct configurations on
the samba server)?
Also on a kind of unrelated note: I have several Unix servers that used NIS
up until now to get the users. I would prefer if they could get the
username like right now, without the MYDOM\ prefix. Is it possible to
2017 Oct 09
0
[virtio-dev] [RFC] virtio-iommu version 0.4
Hi Eric,
On 03/10/17 14:04, Auger Eric wrote:
> When rebasing the v0.4 driver on master I observe a regression: commands
> are not received properly by QEMU (typically an attach command is
> received with a type of 0). After a bisection of the guest kernel the
> first commit the problem appears is:
>
> commit e3067861ba6650a566a6273738c23c956ad55c02
> arm64: add basic
2018 Oct 12
0
[PATCH v3 6/7] iommu/virtio: Add probe request
When the device offers the probe feature, send a probe request for each
device managed by the IOMMU. Extract RESV_MEM information. When we
encounter a MSI doorbell region, set it up as a IOMMU_RESV_MSI region.
This will tell other subsystems that there is no need to map the MSI
doorbell in the virtio-iommu, because MSIs bypass it.
Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker at
2018 Jun 21
0
[PATCH v2 3/5] iommu/virtio: Add probe request
When the device offers the probe feature, send a probe request for each
device managed by the IOMMU. Extract RESV_MEM information. When we
encounter a MSI doorbell region, set it up as a IOMMU_RESV_MSI region.
This will tell other subsystems that there is no need to map the MSI
doorbell in the virtio-iommu, because MSIs bypass it.
Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker at
2018 Nov 15
0
[PATCH v4 6/7] iommu/virtio: Add probe request
When the device offers the probe feature, send a probe request for each
device managed by the IOMMU. Extract RESV_MEM information. When we
encounter a MSI doorbell region, set it up as a IOMMU_RESV_MSI region.
This will tell other subsystems that there is no need to map the MSI
doorbell in the virtio-iommu, because MSIs bypass it.
Signed-off-by: Jean-Philippe Brucker <jean-philippe.brucker at