similar to: [RFC] virtio: expose for non-virtualization users too

Displaying 20 results from an estimated 700 matches similar to: "[RFC] virtio: expose for non-virtualization users too"

2009 Jan 09
0
[PATCH] ioemu: don''t expose MSI/MSI-X capabilities to IA64 HVM guest in ioemu.
At present IA64 Xen doesn''t support MSI for passthrough, so let''s not expose MSI/MSI-X capabilities to IA64 HVM guest for now. Thanks, -- Dexuan _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2011 Jul 04
0
[PATCH] Don''t expose CPUID time leaf when not using PVRDTSCP
# HG changeset patch # User Paul Durrant <paul.durrant@citrix.com> # Date 1309796247 -3600 # Node ID 6ce0dbc6f955707bf814d62a16a2b4382d957332 # Parent 7e4404a8f5f9bc111a80f15a2bce35378b39f2f1 Don''t expose CPUID time leaf when not using PVRDTSCP Some versions of Oracle''s Solaris PV drivers make a check that the maximal Xen hypervisor CPUID leaf is <= base leaf + 2 and
2000 Apr 12
0
Expose your business to the Internet
PUT EMAIL MARKETING TO WORK FOR YOU... Call NOW and receive 50,000 additional emails with your order for only $100. Thats 40,000 FREE emails!!! CALL NOW-702-248-1043 WE HAVE OPT-IN LISTS!!!! see below for removal. Special Ends Friday April 14, 2000 MLM'ers, We can build your downline. Imagine having a product or idea and selling it for only $10. Now imagine sending an ad for your
2017 Sep 14
0
GlusterFS don't expose iSCSI target for Window server
Hi all Question 1: I follow this instruction https://github.com/gluster/gluster-block, I use 2 gluster01 (192.168.101.110), gluster02 (192.168.101.111) and create one gluster volume (block-storage). And use gluster-block to create block storage (block-store/win) [root at gluster01 ~]# gluster-block create block-store/win ha 2 192.168.101.110,192.168.101.111 40GiB IQN:
2014 Aug 24
0
[PATCH 3/3] therm/nv84+: do not expose non-calibrated internal temp sensor
Signed-off-by: Martin Peres <martin.peres at free.fr> --- nvkm/subdev/therm/nv84.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/nvkm/subdev/therm/nv84.c b/nvkm/subdev/therm/nv84.c index 38b16d9..14e2e09 100644 --- a/nvkm/subdev/therm/nv84.c +++ b/nvkm/subdev/therm/nv84.c @@ -33,7 +33,12 @@ struct nv84_therm_priv { int nv84_temp_get(struct nouveau_therm *therm)
2000 Apr 01
1
Expose your business to the Internet
PUT EMAIL MARKETING TO WORK FOR YOU... Call NOW and receive 50,000 additional emails with your order for only $100. Thats 40,000 FREE emails!!! WE HAVE OPT-IN LISTS!!!! see below for removal. Special Ends Friday April 7, 2000 MLM'ers, We can build your downline. Imagine having a product or idea and selling it for only $10. Now imagine sending an ad for your product or idea to 25 million
2016 Oct 24
0
[PATCH 3/3] hwmon: expose power_max and power_crit
Signed-off-by: Karol Herbst <karolherbst at gmail.com> --- drm/nouveau/nouveau_hwmon.c | 44 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 44 insertions(+) diff --git a/drm/nouveau/nouveau_hwmon.c b/drm/nouveau/nouveau_hwmon.c index 71f764b..3d4672a 100644 --- a/drm/nouveau/nouveau_hwmon.c +++ b/drm/nouveau/nouveau_hwmon.c @@ -596,6 +596,32 @@
2019 Feb 17
0
[PATCH] gr/gf100-: correctly expose fecs methods for ctxsw start and stop
Allow fecs to potentially set both methods: - 0x38 STOP_CTXSW - 0x39 START_CTXSW At present the code only ever starts context swap, and never pauses it as appears to be the intent of one caller of gf100_gr_fecs_ctrl_ctxs(). Cc: Ben Skeggs <bskeggs at redhat.com> Fixes: 2642e0b5 ("gr/gf100-: expose fecs methods for pausing ctxsw") Signed-off-by: Rhys Kidd <rhyskidd at
2020 Mar 18
0
[PATCH 7/9] drm/nouveau/kms/nv50-: Expose nv50_outp_atom in disp.h
In order to make sure that we flush disable updates at the right time when disabling CRCs, we'll need to be able to look at the outp state to see if we're changing it at the same time that we're disabling CRCs. So, expose the struct in disp.h. Signed-off-by: Lyude Paul <lyude at redhat.com> --- drivers/gpu/drm/nouveau/dispnv50/disp.c | 18 ------------------
2020 Apr 17
0
[RFC v3 09/11] drm/nouveau/kms/nv50-: Expose nv50_outp_atom in disp.h
In order to make sure that we flush disable updates at the right time when disabling CRCs, we'll need to be able to look at the outp state to see if we're changing it at the same time that we're disabling CRCs. So, expose the struct in disp.h. Signed-off-by: Lyude Paul <lyude at redhat.com> --- drivers/gpu/drm/nouveau/dispnv50/disp.c | 18 ------------------
2020 May 08
0
[RFC v4 10/12] drm/nouveau/kms/nv50-: Expose nv50_outp_atom in disp.h
In order to make sure that we flush disable updates at the right time when disabling CRCs, we'll need to be able to look at the outp state to see if we're changing it at the same time that we're disabling CRCs. So, expose the struct in disp.h. Signed-off-by: Lyude Paul <lyude at redhat.com> --- drivers/gpu/drm/nouveau/dispnv50/disp.c | 18 ------------------
2017 Jan 13
0
[PATCH] virtio_mmio: expose header to userspace
On Thu, Jan 12, 2017 at 11:37:22PM +0200, Michael S. Tsirkin wrote: > It's handy for userspace emulators like QEMU. But it's not actually a userspace API - it's an on the write protocol. so: NAK.
2018 Feb 07
0
[PATCH v27 3/4] mm/page_poison: expose page_poisoning_enabled to kernel modules
In some usages, e.g. virtio-balloon, a kernel module needs to know if page poisoning is in use. This patch exposes the page_poisoning_enabled function to kernel modules. Signed-off-by: Wei Wang <wei.w.wang at intel.com> Cc: Andrew Morton <akpm at linux-foundation.org> Cc: Michal Hocko <mhocko at kernel.org> Cc: Michael S. Tsirkin <mst at redhat.com> --- mm/page_poison.c |
2018 Feb 08
0
[PATCH v27 3/4] mm/page_poison: expose page_poisoning_enabled to kernel modules
On 02/08/2018 02:34 AM, Michael S. Tsirkin wrote: > On Wed, Feb 07, 2018 at 02:54:30PM +0800, Wei Wang wrote: >> In some usages, e.g. virtio-balloon, a kernel module needs to know if >> page poisoning is in use. This patch exposes the page_poisoning_enabled >> function to kernel modules. >> >> Signed-off-by: Wei Wang <wei.w.wang at intel.com> >> Cc:
2018 Mar 26
0
[PATCH v29 3/4] mm/page_poison: expose page_poisoning_enabled to kernel modules
In some usages, e.g. virtio-balloon, a kernel module needs to know if page poisoning is in use. This patch exposes the page_poisoning_enabled function to kernel modules. Signed-off-by: Wei Wang <wei.w.wang at intel.com> Cc: Andrew Morton <akpm at linux-foundation.org> Cc: Michal Hocko <mhocko at kernel.org> Cc: Michael S. Tsirkin <mst at redhat.com> --- mm/page_poison.c |
2015 Jul 28
0
[PATCH 08/10] builder: expose Sigchecker.verifying_signatures
Useful to know whether a Sigchecker instance is verifying signatures, hence it is possible to decide whether download signed content or not. --- builder/sigchecker.ml | 3 +++ builder/sigchecker.mli | 4 ++++ 2 files changed, 7 insertions(+) diff --git a/builder/sigchecker.ml b/builder/sigchecker.ml index 06c60ae..86e60ac 100644 --- a/builder/sigchecker.ml +++ b/builder/sigchecker.ml @@ -163,6
2017 Apr 24
1
Re: [PATCH v7 1/7] daemon: expose file upload logic
On Sun, Apr 23, 2017 at 07:49:56PM +0300, Matteo Cafasso wrote: > + if (r == -1) { /* write error */ > + err = errno; > + r = cancel_receive (); You need to use ignore_value here, and it needs to be in a separate commit, as discussed previously. Rich. -- Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones Read my programming and virtualization blog:
2017 Nov 07
1
[PATCH] v2v: expose 'in-place' as machine-readable feature
Even if two years later, expose it for clients, so they can check its availability. Updates commit d0069559a939e47e5f29973ed9a69a13f0b58301. --- v2v/cmdline.ml | 1 + 1 file changed, 1 insertion(+) diff --git a/v2v/cmdline.ml b/v2v/cmdline.ml index 5578ed290..d9b706c3e 100644 --- a/v2v/cmdline.ml +++ b/v2v/cmdline.ml @@ -328,6 +328,7 @@ read the man page virt-v2v(1). printf
2019 Aug 30
1
Re: [nbdkit PATCH 1/2] include: Expose nbdkit version information to public
As we discussed on IRC, patch 1 is obvious and uncontroversial, let's do it. I think patch 2 is overkill really, and weird pointer tricks have a habit of breaking on big endian / 32 bit / obscure platforms. Why don't we just create a brand new filter API number (6 I think), reject everything with API != 6, and as a further test verify that strcmp (filter->version, PACKAGE_VERSION) ==
2020 Jul 24
0
[libnbd PATCH 3/3] nbdinfo: Expose block size constraints
Now that we have an API, it's time to put it to use. --- info/nbdinfo.pod | 6 ++++++ info/nbdinfo.c | 18 ++++++++++++++++++ 2 files changed, 24 insertions(+) diff --git a/info/nbdinfo.pod b/info/nbdinfo.pod index 9761551..d0d20a9 100644 --- a/info/nbdinfo.pod +++ b/info/nbdinfo.pod @@ -45,6 +45,9 @@ L<https://github.com/NetworkBlockDevice/nbd/blob/master/doc/uri.md>):