Displaying 20 results from an estimated 35 matches for "tasklet_kill".
2011 Mar 10
1
[PATCH 13/21] [PATCH 13/21] Staging: hv: Rename vmbus_driver_context structure
...vmbus_release_unattached_channels();
@@ -487,12 +483,12 @@ static void vmbus_bus_exit(void)
/* Unregister the root bus device */
root_device_unregister(root_dev);
- bus_unregister(&vmbus_drv_ctx->bus);
+ bus_unregister(&hv_bus.bus);
free_irq(hv_pci_dev->irq, hv_pci_dev);
- tasklet_kill(&vmbus_drv_ctx->msg_dpc);
- tasklet_kill(&vmbus_drv_ctx->event_dpc);
+ tasklet_kill(&hv_bus.msg_dpc);
+ tasklet_kill(&hv_bus.event_dpc);
}
@@ -515,7 +511,7 @@ int vmbus_child_driver_register(struct device_driver *drv)
drv, drv->name);
/* The child driver on...
2011 Mar 10
1
[PATCH 13/21] [PATCH 13/21] Staging: hv: Rename vmbus_driver_context structure
...vmbus_release_unattached_channels();
@@ -487,12 +483,12 @@ static void vmbus_bus_exit(void)
/* Unregister the root bus device */
root_device_unregister(root_dev);
- bus_unregister(&vmbus_drv_ctx->bus);
+ bus_unregister(&hv_bus.bus);
free_irq(hv_pci_dev->irq, hv_pci_dev);
- tasklet_kill(&vmbus_drv_ctx->msg_dpc);
- tasklet_kill(&vmbus_drv_ctx->event_dpc);
+ tasklet_kill(&hv_bus.msg_dpc);
+ tasklet_kill(&hv_bus.event_dpc);
}
@@ -515,7 +511,7 @@ int vmbus_child_driver_register(struct device_driver *drv)
drv, drv->name);
/* The child driver on...
2015 Jul 02
1
[RFC PATCH 1/1] mshyperv: fix recognition of Hyper-V guest crash MSR's
...EATURE_GUEST_CRASH_MSR_AVAILABLE) {
+ if (ms_hyperv.misc_features & HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE) {
atomic_notifier_chain_register(&panic_notifier_list,
&hyperv_panic_block);
}
@@ -1110,7 +1110,7 @@ static void __exit vmbus_exit(void)
hv_remove_vmbus_irq();
tasklet_kill(&msg_dpc);
vmbus_free_channels();
- if (ms_hyperv.features & HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE) {
+ if (ms_hyperv.misc_features & HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE) {
atomic_notifier_chain_unregister(&panic_notifier_list,
&hyperv_panic_block);
}
--
2.1.4
2015 Jul 02
1
[RFC PATCH 1/1] mshyperv: fix recognition of Hyper-V guest crash MSR's
...EATURE_GUEST_CRASH_MSR_AVAILABLE) {
+ if (ms_hyperv.misc_features & HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE) {
atomic_notifier_chain_register(&panic_notifier_list,
&hyperv_panic_block);
}
@@ -1110,7 +1110,7 @@ static void __exit vmbus_exit(void)
hv_remove_vmbus_irq();
tasklet_kill(&msg_dpc);
vmbus_free_channels();
- if (ms_hyperv.features & HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE) {
+ if (ms_hyperv.misc_features & HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE) {
atomic_notifier_chain_unregister(&panic_notifier_list,
&hyperv_panic_block);
}
--
2.1.4
2008 May 26
7
[PATCH 1/3] virtio: fix virtio_net xmit of freed skb bug
If we fail to transmit a packet, we assume the queue is full and put
the skb into last_xmit_skb. However, if more space frees up before we
xmit it, we loop, and the result can be transmitting the same skb twice.
Fix is simple: set skb to NULL if we've used it in some way, and check
before sending.
Signed-off-by: Rusty Russell <rusty at rustcorp.com.au>
---
drivers/net/virtio_net.c |
2008 May 26
7
[PATCH 1/3] virtio: fix virtio_net xmit of freed skb bug
If we fail to transmit a packet, we assume the queue is full and put
the skb into last_xmit_skb. However, if more space frees up before we
xmit it, we loop, and the result can be transmitting the same skb twice.
Fix is simple: set skb to NULL if we've used it in some way, and check
before sending.
Signed-off-by: Rusty Russell <rusty at rustcorp.com.au>
---
drivers/net/virtio_net.c |
2008 Dec 14
5
[PATCH] AF_VMCHANNEL address family for guest<->host communication.
...d_init(&vmc_dev.rx_skbuff_q);
+ skb_queue_head_init(&vmc_dev.tx_skbuff_q);
+ tasklet_init(&vmc_dev.rx_tasklet, vmchannel_rx, 0);
+ tasklet_init(&vmc_dev.tx_tasklet, vmchannel_tx, 0);
+ atomic_set(&vmc_dev.recv_posted, 0);
+ if (try_fill_recvq())
+ return 0;
+
+ r = -ENOMEM;
+
+ tasklet_kill(&vmc_dev.rx_tasklet);
+ tasklet_kill(&vmc_dev.tx_tasklet);
+ sock_unregister(PF_VMCHANNEL);
+out_proto:
+ proto_unregister(&vmchannel_proto);
+out:
+ if (vmc_dev.sq)
+ vdev->config->del_vq(vmc_dev.sq);
+ if (vmc_dev.rq)
+ vdev->config->del_vq(vmc_dev.rq);
+
+ for (i = 0; i...
2008 Dec 14
5
[PATCH] AF_VMCHANNEL address family for guest<->host communication.
...d_init(&vmc_dev.rx_skbuff_q);
+ skb_queue_head_init(&vmc_dev.tx_skbuff_q);
+ tasklet_init(&vmc_dev.rx_tasklet, vmchannel_rx, 0);
+ tasklet_init(&vmc_dev.tx_tasklet, vmchannel_tx, 0);
+ atomic_set(&vmc_dev.recv_posted, 0);
+ if (try_fill_recvq())
+ return 0;
+
+ r = -ENOMEM;
+
+ tasklet_kill(&vmc_dev.rx_tasklet);
+ tasklet_kill(&vmc_dev.tx_tasklet);
+ sock_unregister(PF_VMCHANNEL);
+out_proto:
+ proto_unregister(&vmchannel_proto);
+out:
+ if (vmc_dev.sq)
+ vdev->config->del_vq(vmc_dev.sq);
+ if (vmc_dev.rq)
+ vdev->config->del_vq(vmc_dev.rq);
+
+ for (i = 0; i...
2006 Dec 28
0
Compiling Zaptel 1.4.0 on SuSE 10.0
...1.4.0/ztdummy.c:275: error: implicit declaration of function
?tasklet_init?
/tmp/zaptel-1.4.0/ztdummy.c: In function ?cleanup_module?:
/tmp/zaptel-1.4.0/ztdummy.c:315: error: implicit declaration of function
?tasklet_disable?
/tmp/zaptel-1.4.0/ztdummy.c:316: error: implicit declaration of function
?tasklet_kill?
make[2]: *** [/tmp/zaptel-1.4.0/ztdummy.o] Error 1
make[1]: *** [_module_/tmp/zaptel-1.4.0] Error 2
make[1]: Leaving directory `/usr/src/linux-2.6.13-15'
make: *** [linux26] Error 2
hawk:/tmp/zaptel-1.4.0 #
As far as I can tell, it's trying to use functions from softirq.h?
softirq was ap...
2011 Mar 15
16
[PATCH 00/12] Staging: hv: Cleanup vmbus driver - Phase II
This patch-set fixes the following issues in the vmbus driver (vmbus_drv.c):
Make vmbus driver a platform pci device and cleanup
root device management and irq allocation
(patches 1/12 through 3/12):
1) Make vmbus driver a platform pci driver.
2) Cleanup root device management.
3) Leverage the pci model for allocating irq.
General cleanup of vmbus driver (patches 4/12 though 12/12):
1)
2011 Mar 15
16
[PATCH 00/12] Staging: hv: Cleanup vmbus driver - Phase II
This patch-set fixes the following issues in the vmbus driver (vmbus_drv.c):
Make vmbus driver a platform pci device and cleanup
root device management and irq allocation
(patches 1/12 through 3/12):
1) Make vmbus driver a platform pci driver.
2) Cleanup root device management.
3) Leverage the pci model for allocating irq.
General cleanup of vmbus driver (patches 4/12 though 12/12):
1)
2017 Feb 01
15
[PATCH 00/14] hyperv: vmbus related patches
This is a rebase/resend of earlier patches. I skipped the pure
cosmetic patches for now. Mostly this is consolidation earlier
changes, removing dead code etc. The important part is the
change for allowing a vmbus channel to get callback directly
in interrupt mode; this is necessary for NAPI support.
Stephen Hemminger (14):
vmbus: use kernel bitops for traversing interrupt mask
vmbus: drop
2017 Feb 01
15
[PATCH 00/14] hyperv: vmbus related patches
This is a rebase/resend of earlier patches. I skipped the pure
cosmetic patches for now. Mostly this is consolidation earlier
changes, removing dead code etc. The important part is the
change for allowing a vmbus channel to get callback directly
in interrupt mode; this is necessary for NAPI support.
Stephen Hemminger (14):
vmbus: use kernel bitops for traversing interrupt mask
vmbus: drop
2013 Feb 12
3
[PATCHv2 vringh 0/3] Introduce CAIF Virtio driver
From: Sjur Br?ndeland <sjur.brandeland at stericsson.com>
This driver depends on Rusty's new host virtio ring implementation,
so this patch-set is based on the vringh branch in Rusty's git.
Changes since V1:
- Use the new iov helper functions, and simplify iov handling.
However this triggers compile warnings, as it takes struct iov
while kernel api uses struct kiov
- Introduced
2013 Feb 12
3
[PATCHv2 vringh 0/3] Introduce CAIF Virtio driver
From: Sjur Br?ndeland <sjur.brandeland at stericsson.com>
This driver depends on Rusty's new host virtio ring implementation,
so this patch-set is based on the vringh branch in Rusty's git.
Changes since V1:
- Use the new iov helper functions, and simplify iov handling.
However this triggers compile warnings, as it takes struct iov
while kernel api uses struct kiov
- Introduced
2011 Feb 24
4
[PATCH ] Staging: hv: Hyper-V driver cleanup
...->cleanup)
+ hv_drv->cleanup(hv_drv);
/* Unregister the root bus device */
- device_unregister(&dev_ctx->device);
+ device_unregister(&hv_dev->device);
- bus_unregister(&vmbus_drv_ctx->bus);
+ bus_unregister(&vmb_drv->bus);
free_irq(vmbus_irq, NULL);
- tasklet_kill(&vmbus_drv_ctx->msg_dpc);
- tasklet_kill(&vmbus_drv_ctx->event_dpc);
+ tasklet_kill(&vmb_drv->msg_dpc);
+ tasklet_kill(&vmb_drv->event_dpc);
}
/**
* vmbus_child_driver_register() - Register a vmbus's child driver
- * @driver_ctx: Pointer to driver stru...
2011 Feb 24
4
[PATCH ] Staging: hv: Hyper-V driver cleanup
...->cleanup)
+ hv_drv->cleanup(hv_drv);
/* Unregister the root bus device */
- device_unregister(&dev_ctx->device);
+ device_unregister(&hv_dev->device);
- bus_unregister(&vmbus_drv_ctx->bus);
+ bus_unregister(&vmb_drv->bus);
free_irq(vmbus_irq, NULL);
- tasklet_kill(&vmbus_drv_ctx->msg_dpc);
- tasklet_kill(&vmbus_drv_ctx->event_dpc);
+ tasklet_kill(&vmb_drv->msg_dpc);
+ tasklet_kill(&vmb_drv->event_dpc);
}
/**
* vmbus_child_driver_register() - Register a vmbus's child driver
- * @driver_ctx: Pointer to driver stru...
2011 Apr 29
17
[RESEND] [PATCH 00/18] Staging: hv: Cleanup vmbus driver code
This is a resend of the patches yet to be applied.
This patch-set addresses some of the bus/driver model cleanup that
Greg sugested over the last couple of days. In this patch-set we
deal with the following issues:
1) Cleanup error handling in the vmbus_probe() and
vmbus_child_device_register() functions. Fixed a
bug in the probe failure path as part of this cleanup.
2) The Windows
2011 Apr 29
17
[RESEND] [PATCH 00/18] Staging: hv: Cleanup vmbus driver code
This is a resend of the patches yet to be applied.
This patch-set addresses some of the bus/driver model cleanup that
Greg sugested over the last couple of days. In this patch-set we
deal with the following issues:
1) Cleanup error handling in the vmbus_probe() and
vmbus_child_device_register() functions. Fixed a
bug in the probe failure path as part of this cleanup.
2) The Windows
2020 Jun 16
0
[PATCH v5 2/2] mm, treewide: Rename kzfree() to kfree_sensitive()
...n.c b/drivers/crypto/cavium/cpt/cptvf_main.c
index 0f72e9abdefe..a15245992cf9 100644
--- a/drivers/crypto/cavium/cpt/cptvf_main.c
+++ b/drivers/crypto/cavium/cpt/cptvf_main.c
@@ -74,7 +74,7 @@ static void cleanup_worker_threads(struct cpt_vf *cptvf)
for (i = 0; i < cptvf->nr_queues; i++)
tasklet_kill(&cwqe_info->vq_wqe[i].twork);
- kzfree(cwqe_info);
+ kfree_sensitive(cwqe_info);
cptvf->wqe_info = NULL;
}
@@ -88,7 +88,7 @@ static void free_pending_queues(struct pending_qinfo *pqinfo)
continue;
/* free single queue */
- kzfree((queue->head));
+ kfree_sensitive((que...