search for: acens

Displaying 20 results from an estimated 55 matches for "acens".

Did you mean: cens
2001 Nov 26
1
EXT3 crash: ext3_free_blocks: bit already cleared
I had a failure over the weekend of my ext3 filesystems. Hardware: Dell 2550 (dual PIII 1 Ghz, 1GB ram, Acenic GigE card) Software: linux-2.4.14 ext3-2.4-0.9.15-2414 Trond's NFS patches (pathconf, tune,read,rpc_blk) The filesystem is RAID0 using LVM (1.0.1-rc4). The disks are connected using fiber channel (qlogic 2200, qlax00-4.27beta). I was generating high load on my nfs
2017 Dec 20
4
virt-customize error
Hi, I´m need to customize a debian qcow image, but I have this error virt-customize: error: no operating systems were found in the guest image The command that I´m trying is: virt-customize -v -x -a ./kvm_av_4_4_n0.qcow2 --attach ./one_context/packages.iso -root-password password:acens --run ./ctpd/pro/scripts/one_altavault.sh --firstboot-command "dpkg-reconfigure openssh-server I attach the log. I´m wondering if is possible to specify the partition. Please, can you provide some help? BR. ________________________________ Este mensaje y sus adjuntos se dirigen exclusi...
2004 Sep 20
1
ZapRTC loading problems
I finally got 2.4 recompiled with RTC as a module: Module Size Used by Not tainted autofs 13684 0 (autoclean) (unused) acenic 241092 0 (unused) iptable_filter 2412 0 (autoclean) (unused) ip_tables 15864 1 [iptable_filter] e100 62340 1 rtc 9084 0 (autoclean) Here is my
2000 Jun 21
0
[RHSA-2000:037-01] New Linux kernel fixes security bug
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: New Linux kernel fixes security bug Advisory ID: RHSA-2000:037-01 Issue date: 2000-06-20 Updated on: 2000-06-20 Product: Red Hat Linux Keywords: capabilities setuid suid agpgart 810 aacraid 3x90x MegaRAID Acenic Cross
2000 Jun 21
0
[RHSA-2000:037-02] New Linux kernel fixes security bug
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: New Linux kernel fixes security bug Advisory ID: RHSA-2000:037-01 Issue date: 2000-06-20 Updated on: 2000-06-20 Product: Red Hat Linux Keywords: capabilities setuid suid agpgart 810 aacraid 3x90x MegaRAID Acenic Cross
2005 Nov 22
2
RE: __ia64__ ifdef in xmalloc.c: "Fix ar.unat handling forfast paths"
>From: Rusty Russell >Sent: 2005年11月21日 12:53 >Hi all, > > While browsing the code, I noticed this in xmalloc.c: > >#ifndef __ia64__ > BUG_ON(align > SMP_CACHE_BYTES); >#endif > > This is clearly wrong: due to header alignment we cannot give you a >greater alignment than SMP_CACHE_BYTES. Overriding this will cause the >allocation to succeed, but not
2000 Jun 26
0
[RHSA-2000:037-05] New Linux kernel fixes security bug
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: New Linux kernel fixes security bug Advisory ID: RHSA-2000:037-05 Issue date: 2000-06-20 Updated on: 2000-06-26 Product: Red Hat Linux Keywords: capabilities setuid suid agpgart 810 aacraid 3x90x MegaRAID Acenic Cross
2003 Jul 28
1
Win2k - samba-2.2.8a - can't get above 4MB/sec
I'm trying to maximize throughput between my Samba server and my Win2k (SP3 and 4) clients. Samba's configured to allow up to 64k packets and the server is on a GigE network (3com card, acenic driver) with SCSI UW2 drives (software RAID1 and RAID5 volumes). All clients are 100MB/sec FDX on a switched LAN. I can get sustained 35MB/sec transfers (read and write) on the disk subsystem
2007 Apr 18
1
[Bridge] Performance problem with linux bridge ... compare kernel 2.6.13.4 to 2.6.15.1
With kernel 2.6.13.4 linux bridge with traffic management for 4000users and 20.4 MB/s(tx)/22.4 MB/s(rx) data load of CPU is max 50% With kernel 2.6.15.1 the same linux bridge with the same traffic has 100% CPU load and in top I have ksoftirqd proccess. The machine is P4 3.2 GHz with 1GB of ram and 4 NetGear 620 cards The config is: /sbin/modprobe acenic link=0x0100,0x0100,0x0100,0x0100
2007 Apr 18
0
[Bridge] My hotmail login issue is fixed!!
Hi All, Today is a great day. My hotmail login error is fixed. Following Peter's advice, I used e1000 card, don't change any MTU , the hotmail login error went away! It is MTU issue, for VLAN tag traffice going through the bridge, the NICs in the bridge need support VLAN tag, e100/e1000 card can. Thanks to Peter, Stephen Hemminger, and All ! So far I know Intel e100/e1000 card can
2005 Jan 14
0
OT: zaptel kernel mod
I don't have any card specific modules loaded. I don't have chan_zap loaded. So how can the zaptel kernel module show usage? I just rebooted this server due to defunct asterisk process. How can I find out what 4 things are using zaptel? [root@asterisk localhost]# lsmod Module Size Used by Not tainted parport_pc 19204 1 (autoclean) lp
2002 Feb 12
1
2.4.17: BUG()at transaction.c:609
very modular 2.4.17; 2xPIII-800; no HIGHMEM; gcc-2.96-98; all ext3; modules loaded include autofs4, nfs, nfsd, eepro100, acenic, ipchains, unix, gdth. This happened during the dump (incrcp.pl is a custom backup script also happening at the time). Does ext3-0.9.17 fix this? kernel BUG at transaction.c:609! invalid operand: 0000 CPU: 1 EIP:
2003 Aug 16
1
update: Win2kPro's TCP/IP Stack is crippled!
I've been doing some testing between Windows 2000 Pro (SP4) and Windows 2000 Server (no SP and SP4) -- specifcally testing file transfers from a Samba 2.2.8a server. Samba server: P4/2.2GHz, ServerWorks chipset, SCSI UW2 disk subsystem (Bonnie++ tested to 35MB/sec), 3Com (acenic) gigabit ethernet Win2kPro: P3/700, 3Com Vortex 100mbit network card Win2kServer: P3/800, 3Com Vortex 100mbit
2000 Jun 23
1
Security Update: wu-ftpd vulnerability
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ Caldera Systems, Inc. Security Advisory Subject: wu-ftpd vulnerability Advisory number: CSSA-2000-020.0 Issue date: 2000 June, 23 Cross reference: ______________________________________________________________________________ 1. Problem Description There is
2000 Jun 14
0
Security Advisory: local ROOT exploit in BRU
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ______________________________________________________________________________ Caldera Systems, Inc. Security Advisory Subject: local ROOT exploit in BRU Advisory number: CSSA-2000-018.0 Issue date: 2000 June, 14 Cross reference: ______________________________________________________________________________ 1. Problem Description
2014 May 08
2
[PATCH] net: get rid of SET_ETHTOOL_OPS
Dave Miller mentioned he'd like to see SET_ETHTOOL_OPS gone. This does that. Compile tested only, but I'd seriously wonder if this broke anything. Suggested-by: Dave Miller <davem at davemloft.net> Signed-off-by: Wilfried Klaebe <w-lkml at lebenslange-mailadresse.de> --- Applies against v3.15-rc4. diff --git a/drivers/infiniband/ulp/ipoib/ipoib_ethtool.c
2014 May 08
2
[PATCH] net: get rid of SET_ETHTOOL_OPS
Dave Miller mentioned he'd like to see SET_ETHTOOL_OPS gone. This does that. Compile tested only, but I'd seriously wonder if this broke anything. Suggested-by: Dave Miller <davem at davemloft.net> Signed-off-by: Wilfried Klaebe <w-lkml at lebenslange-mailadresse.de> --- Applies against v3.15-rc4. diff --git a/drivers/infiniband/ulp/ipoib/ipoib_ethtool.c
2014 May 11
7
[PATCH] [resend] net: get rid of SET_ETHTOOL_OPS
net: get rid of SET_ETHTOOL_OPS Dave Miller mentioned he'd like to see SET_ETHTOOL_OPS gone. This does that. Mostly done via coccinelle script: @@ struct ethtool_ops *ops; struct net_device *dev; @@ - SET_ETHTOOL_OPS(dev, ops); + dev->ethtool_ops = ops; Compile tested only, but I'd seriously wonder if this broke anything. Suggested-by: Dave Miller <davem at
2014 May 11
7
[PATCH] [resend] net: get rid of SET_ETHTOOL_OPS
net: get rid of SET_ETHTOOL_OPS Dave Miller mentioned he'd like to see SET_ETHTOOL_OPS gone. This does that. Mostly done via coccinelle script: @@ struct ethtool_ops *ops; struct net_device *dev; @@ - SET_ETHTOOL_OPS(dev, ops); + dev->ethtool_ops = ops; Compile tested only, but I'd seriously wonder if this broke anything. Suggested-by: Dave Miller <davem at
2014 May 11
7
[PATCH] [resend] net: get rid of SET_ETHTOOL_OPS
net: get rid of SET_ETHTOOL_OPS Dave Miller mentioned he'd like to see SET_ETHTOOL_OPS gone. This does that. Mostly done via coccinelle script: @@ struct ethtool_ops *ops; struct net_device *dev; @@ - SET_ETHTOOL_OPS(dev, ops); + dev->ethtool_ops = ops; Compile tested only, but I'd seriously wonder if this broke anything. Suggested-by: Dave Miller <davem at