search for: unregister_virtio_driver

Displaying 20 results from an estimated 257 matches for "unregister_virtio_driver".

Did you mean: register_virtio_driver
2017 Jul 24
2
[PATCH] virtio-net: fix module unloading
...), 1 deletion(-) diff --git a/drivers/net/virtio_net.c b/drivers/net/virtio_net.c index 99a26a9efec1..f41ab0ea942a 100644 --- a/drivers/net/virtio_net.c +++ b/drivers/net/virtio_net.c @@ -2743,9 +2743,9 @@ module_init(virtio_net_driver_init); static __exit void virtio_net_driver_exit(void) { + unregister_virtio_driver(&virtio_net_driver); cpuhp_remove_multi_state(CPUHP_VIRT_NET_DEAD); cpuhp_remove_multi_state(virtionet_online); - unregister_virtio_driver(&virtio_net_driver); } module_exit(virtio_net_driver_exit); -- 2.13.3
2017 Jul 24
2
[PATCH] virtio-net: fix module unloading
...), 1 deletion(-) diff --git a/drivers/net/virtio_net.c b/drivers/net/virtio_net.c index 99a26a9efec1..f41ab0ea942a 100644 --- a/drivers/net/virtio_net.c +++ b/drivers/net/virtio_net.c @@ -2743,9 +2743,9 @@ module_init(virtio_net_driver_init); static __exit void virtio_net_driver_exit(void) { + unregister_virtio_driver(&virtio_net_driver); cpuhp_remove_multi_state(CPUHP_VIRT_NET_DEAD); cpuhp_remove_multi_state(virtionet_online); - unregister_virtio_driver(&virtio_net_driver); } module_exit(virtio_net_driver_exit); -- 2.13.3
2020 Jun 15
4
[PATCH v2 0/1] s390: virtio: let's arch choose to accept devices without IOMMU feature
An architecture protecting the guest memory against unauthorized host access may want to enforce VIRTIO I/O device protection through the use of VIRTIO_F_IOMMU_PLATFORM. Let's give a chance to the architecture to accept or not devices without VIRTIO_F_IOMMU_PLATFORM. Pierre Morel (1): s390: virtio: let arch accept devices without IOMMU feature arch/s390/mm/init.c | 6 ++++++
2007 Dec 21
1
[kvm-devel] [Virtio-for-kvm] [PATCH 12/13] [Mostly resend] virtio additions
...tio.c | 7 +++++++ drivers/virtio/virtio_pci.c | 7 +++++++ 2 files changed, 14 insertions(+), 0 deletions(-) diff --git a/drivers/virtio/virtio.c b/drivers/virtio/virtio.c index 303cb6f..212f4e3 100644 --- a/drivers/virtio/virtio.c +++ b/drivers/virtio/virtio.c @@ -123,6 +123,11 @@ void unregister_virtio_driver(struct virtio_driver *driver) } EXPORT_SYMBOL_GPL(unregister_virtio_driver); +static void virtio_device_release(struct device *_d) +{ + pr_debug("%s\n" , __FUNCTION__); +} + int register_virtio_device(struct virtio_device *dev) { int err; @@ -133,6 +138,8 @@ int register_vi...
2007 Dec 21
1
[kvm-devel] [Virtio-for-kvm] [PATCH 12/13] [Mostly resend] virtio additions
...tio.c | 7 +++++++ drivers/virtio/virtio_pci.c | 7 +++++++ 2 files changed, 14 insertions(+), 0 deletions(-) diff --git a/drivers/virtio/virtio.c b/drivers/virtio/virtio.c index 303cb6f..212f4e3 100644 --- a/drivers/virtio/virtio.c +++ b/drivers/virtio/virtio.c @@ -123,6 +123,11 @@ void unregister_virtio_driver(struct virtio_driver *driver) } EXPORT_SYMBOL_GPL(unregister_virtio_driver); +static void virtio_device_release(struct device *_d) +{ + pr_debug("%s\n" , __FUNCTION__); +} + int register_virtio_device(struct virtio_device *dev) { int err; @@ -133,6 +138,8 @@ int register_vi...
2020 Jun 17
6
[PATCH v3 0/1] s390: virtio: let arch choose to accept devices without IOMMU feature
An architecture protecting the guest memory against unauthorized host access may want to enforce VIRTIO I/O device protection through the use of VIRTIO_F_IOMMU_PLATFORM. Let's give a chance to the architecture to accept or not devices without VIRTIO_F_IOMMU_PLATFORM. Pierre Morel (1): s390: virtio: let arch accept devices without IOMMU feature arch/s390/mm/init.c | 6 ++++++
2020 Jun 16
2
[PATCH v2 1/1] s390: virtio: let arch accept devices without IOMMU feature
...->config->get_status(dev); > if (!(status & VIRTIO_CONFIG_S_FEATURES_OK)) { > diff --git a/include/linux/virtio.h b/include/linux/virtio.h > index a493eac08393..2c46b310c38c 100644 > --- a/include/linux/virtio.h > +++ b/include/linux/virtio.h > @@ -195,4 +195,6 @@ void unregister_virtio_driver(struct virtio_driver *drv); > #define module_virtio_driver(__virtio_driver) \ > module_driver(__virtio_driver, register_virtio_driver, \ > unregister_virtio_driver) > + > +int arch_needs_iommu_platform(struct virtio_device *dev); > #endif /* _LINUX_VIRTIO_H */ >
2020 Jun 16
2
[PATCH v2 1/1] s390: virtio: let arch accept devices without IOMMU feature
...->config->get_status(dev); > if (!(status & VIRTIO_CONFIG_S_FEATURES_OK)) { > diff --git a/include/linux/virtio.h b/include/linux/virtio.h > index a493eac08393..2c46b310c38c 100644 > --- a/include/linux/virtio.h > +++ b/include/linux/virtio.h > @@ -195,4 +195,6 @@ void unregister_virtio_driver(struct virtio_driver *drv); > #define module_virtio_driver(__virtio_driver) \ > module_driver(__virtio_driver, register_virtio_driver, \ > unregister_virtio_driver) > + > +int arch_needs_iommu_platform(struct virtio_device *dev); > #endif /* _LINUX_VIRTIO_H */ >
2007 Sep 20
3
[PATCH 0/6] virtio with config abstraction and ring implementation
Hi all, This patch series attempts to come closer to unifying kvm and lguest's usage of virtio. As these two are the first implementations we've seen, I hope making them closer will make future ones closer too. Drivers now unpack their own configuration: their probe() methods are uniform. The configuration mechanism is extensible and can be backed by PCI, a string of bytes, or
2007 Sep 20
3
[PATCH 0/6] virtio with config abstraction and ring implementation
Hi all, This patch series attempts to come closer to unifying kvm and lguest's usage of virtio. As these two are the first implementations we've seen, I hope making them closer will make future ones closer too. Drivers now unpack their own configuration: their probe() methods are uniform. The configuration mechanism is extensible and can be backed by PCI, a string of bytes, or
2019 May 01
0
[PATCH] vsock/virtio: Initialize core virtio vsock before registering the driver
...on another CPU? > if (ret) > goto out_wq; > > - ret = vsock_core_init(&virtio_transport.transport); > + ret = register_virtio_driver(&virtio_vsock_driver); > if (ret) > - goto out_vdr; > + goto out_vci; > > return 0; > > -out_vdr: > - unregister_virtio_driver(&virtio_vsock_driver); > +out_vci: > + vsock_core_exit(); > out_wq: > destroy_workqueue(virtio_vsock_workqueue); > return ret; > - > } > > static void __exit virtio_vsock_exit(void) > { > - vsock_core_exit(); > unregister_virtio_driver(&virtio...
2023 Feb 21
2
[PATCH vhost 07/10] virtio_ring: add api virtio_dma_map() for advance dma
...e <linux/mod_devicetable.h> > > > #include <linux/gfp.h> > > > +#include <linux/dma-mapping.h> > > > > > > /** > > > * struct virtqueue - a queue to register buffers for sending or receiving. > > > @@ -216,4 +217,12 @@ void unregister_virtio_driver(struct virtio_driver *drv); > > > #define module_virtio_driver(__virtio_driver) \ > > > module_driver(__virtio_driver, register_virtio_driver, \ > > > unregister_virtio_driver) > > > + > > > +dma_addr_t virtio_dma_map_pag...
2023 Feb 21
2
[PATCH vhost 07/10] virtio_ring: add api virtio_dma_map() for advance dma
...e <linux/mod_devicetable.h> > > > #include <linux/gfp.h> > > > +#include <linux/dma-mapping.h> > > > > > > /** > > > * struct virtqueue - a queue to register buffers for sending or receiving. > > > @@ -216,4 +217,12 @@ void unregister_virtio_driver(struct virtio_driver *drv); > > > #define module_virtio_driver(__virtio_driver) \ > > > module_driver(__virtio_driver, register_virtio_driver, \ > > > unregister_virtio_driver) > > > + > > > +dma_addr_t virtio_dma_map_pag...
2017 Dec 17
6
[PATCH v3 0/5] proper cleanup if fail to register_virtio_device
Hi, Patch1 add a helper to get virtio_device's status which will be used later. Patch2~4: check virtio_device's status is RTIO_CONFIG_S_ACKNOWLEDGE or not, if so use put_device otherwise use kfree. Patch5: add comments for virtio_register_device help caller do a proper cleanup if got failure. weiping zhang (5): virtio: add helper virtio_get_status virtio_pci: don't kfree device
2017 Dec 17
6
[PATCH v3 0/5] proper cleanup if fail to register_virtio_device
Hi, Patch1 add a helper to get virtio_device's status which will be used later. Patch2~4: check virtio_device's status is RTIO_CONFIG_S_ACKNOWLEDGE or not, if so use put_device otherwise use kfree. Patch5: add comments for virtio_register_device help caller do a proper cleanup if got failure. weiping zhang (5): virtio: add helper virtio_get_status virtio_pci: don't kfree device
2013 Dec 05
9
[PATCH 0/2] virtio-net: Fix two bugs on unloading the module
They can be easy to reproduce, if you try to unload virtio-net Andrey Vagin (2): virtio-net: determine type of bufs correctly virtio: delete napi objects from netdev before releasing memory drivers/net/virtio_net.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) Cc: Rusty Russell <rusty at rustcorp.com.au> Cc: "Michael S. Tsirkin" <mst at redhat.com>
2013 Dec 05
9
[PATCH 0/2] virtio-net: Fix two bugs on unloading the module
They can be easy to reproduce, if you try to unload virtio-net Andrey Vagin (2): virtio-net: determine type of bufs correctly virtio: delete napi objects from netdev before releasing memory drivers/net/virtio_net.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) Cc: Rusty Russell <rusty at rustcorp.com.au> Cc: "Michael S. Tsirkin" <mst at redhat.com>
2019 May 01
3
[PATCH] vsock/virtio: Initialize core virtio vsock before registering the driver
...p;virtio_vsock_driver); + ret = vsock_core_init(&virtio_transport.transport); if (ret) goto out_wq; - ret = vsock_core_init(&virtio_transport.transport); + ret = register_virtio_driver(&virtio_vsock_driver); if (ret) - goto out_vdr; + goto out_vci; return 0; -out_vdr: - unregister_virtio_driver(&virtio_vsock_driver); +out_vci: + vsock_core_exit(); out_wq: destroy_workqueue(virtio_vsock_workqueue); return ret; - } static void __exit virtio_vsock_exit(void) { - vsock_core_exit(); unregister_virtio_driver(&virtio_vsock_driver); + vsock_core_exit(); destroy_workqueue(vir...
2019 May 01
3
[PATCH] vsock/virtio: Initialize core virtio vsock before registering the driver
...p;virtio_vsock_driver); + ret = vsock_core_init(&virtio_transport.transport); if (ret) goto out_wq; - ret = vsock_core_init(&virtio_transport.transport); + ret = register_virtio_driver(&virtio_vsock_driver); if (ret) - goto out_vdr; + goto out_vci; return 0; -out_vdr: - unregister_virtio_driver(&virtio_vsock_driver); +out_vci: + vsock_core_exit(); out_wq: destroy_workqueue(virtio_vsock_workqueue); return ret; - } static void __exit virtio_vsock_exit(void) { - vsock_core_exit(); unregister_virtio_driver(&virtio_vsock_driver); + vsock_core_exit(); destroy_workqueue(vir...
2023 Feb 20
1
[PATCH vhost 07/10] virtio_ring: add api virtio_dma_map() for advance dma
...evice.h> > > #include <linux/mod_devicetable.h> > > #include <linux/gfp.h> > > +#include <linux/dma-mapping.h> > > > > /** > > * struct virtqueue - a queue to register buffers for sending or receiving. > > @@ -216,4 +217,12 @@ void unregister_virtio_driver(struct virtio_driver *drv); > > #define module_virtio_driver(__virtio_driver) \ > > module_driver(__virtio_driver, register_virtio_driver, \ > > unregister_virtio_driver) > > + > > +dma_addr_t virtio_dma_map_page(struct device *dev, str...