Displaying 8 results from an estimated 8 matches for "471b".
Did you mean:
471
2018 Aug 30
2
Rewriting Intel PCI bridge prefetch base address bits solves nvidia graphics issues
On Tue, Aug 28, 2018 at 5:57 PM, Peter Wu <peter at lekensteyn.nl> wrote:
> Just to be sure, after "sleep", do both devices report "suspended" in
> /sys/bus/pci/devices/0000:00:1c.0/power/runtime_status
> /sys/bus/pci/devices/0000:01:00.0/power/runtime_status
>
> and was this reproduced with a recent mainline kernel with no special
> cmdline options? The
2004 Jul 01
1
Two possible vulnerabilities?
...t gzip 1.2.4, that is used in FreeBSD. According to the gzip page:
http://www.gzip.org - new official version will be posted soon....
Are there any plan to go forward gzip 1.3 ?
Best Regards,
Janos Mohacsi
Network Engineer, Research Associate
NIIF/HUNGARNET, HUNGARY
Key 00F9AF98: 8645 1312 D249 471B DBAE 21A2 9F52 0D1F 00F9 AF98
2018 Aug 30
0
Rewriting Intel PCI bridge prefetch base address bits solves nvidia graphics issues
...ps, it appears that you have to do at least two things:
- Ensure that the Subsystem Vendor/Product ID are set.
- Expose a _ROM ACPI method that provides VBIOS.
Perhaps you also need to provide a "_DSM" method that emulates at least
the "Optimus" interface for GUID a486d8f8-0bda-471b-a72b-6042a6b5bee0.
You probably lost interest here, but if you want to continue anyway this
is what allowed me to install the driver on the XPS 9560:
https://github.com/Lekensteyn/acpi-stuff/blob/master/d3test/fakedev.asl
If you adapt if for your environment, note:
- I have only tested this with...
2004 Aug 18
6
Report of collision-generation with MD5
Just got a pointer to this via ACM "TechNews Alert" for today:
http://www.acm.org/technews/articles/2004-6/0818w.html#item2
Seems that "... French computer scientist Antoine Joux reported on
Aug. 12 his discovery of a flaw in the MD5 algorithm, which is often
used with digital signatures...."
There's more in the article cited above.
Peace,
david
--
David H. Wolfskill
2004 Aug 13
6
sequences in the auth.log
Hi all,
I found similar sequences in the
/var/auth.log files of freebsd boxes, I supervise.:
Aug 13 13:56:08 www sshd[26091]: Illegal user test from 165.21.103.20
Aug 13 13:56:11 www sshd[26093]: Illegal user guest from 165.21.103.20
Aug 13 13:56:15 www sshd[26096]: Illegal user admin from 165.21.103.20
Aug 13 13:56:18 www sshd[26103]: Illegal user admin from 165.21.103.20
Aug 13 13:56:21 www
2017 Oct 26
0
not healing one file
Hey Richard,
Could you share the following informations please?
1. gluster volume info <volname>
2. getfattr output of that file from all the bricks
getfattr -d -e hex -m . <brickpath/filepath>
3. glustershd & glfsheal logs
Regards,
Karthik
On Thu, Oct 26, 2017 at 10:21 AM, Amar Tumballi <atumball at redhat.com> wrote:
> On a side note, try recently released health
2017 Oct 26
3
not healing one file
On a side note, try recently released health report tool, and see if it
does diagnose any issues in setup. Currently you may have to run it in all
the three machines.
On 26-Oct-2017 6:50 AM, "Amar Tumballi" <atumball at redhat.com> wrote:
> Thanks for this report. This week many of the developers are at Gluster
> Summit in Prague, will be checking this and respond next
2017 Oct 26
2
not healing one file
...8F75A3F17BE92DD (4b54e875-7ab9-4a27-b754-77b5d1c0c126) on home-client-2
[2017-10-25 10:14:02.111007] W [MSGID: 108015] [afr-self-heal-entry.c:56:afr_selfheal_entry_delete] 0-home-replicate-0: expunging file a3f5a769-8859-48e3-96ca-60a988eb9358/37382BE7B63E0159B6F429D4BFE04F76F341B33B (c37750b3-9d10-471b-bc98-3f2aa974e40b) on home-client-2
[2017-10-25 10:14:02.130576] W [MSGID: 108015] [afr-self-heal-entry.c:56:afr_selfheal_entry_delete] 0-home-replicate-0: expunging file a3f5a769-8859-48e3-96ca-60a988eb9358/315D5A2D320DF4FA250F2E139EB05FBA0BD4E288 (23ba4012-4cd9-40f6-b133-64d9aca75ded) on home-cli...