Displaying 20 results from an estimated 55 matches for "acens".
Did you mean:
cens
2001 Nov 26
1
EXT3 crash: ext3_free_blocks: bit already cleared
I had a failure over the weekend of
my ext3 filesystems.
Hardware:
Dell 2550 (dual PIII 1 Ghz, 1GB ram, Acenic GigE card)
Software:
linux-2.4.14
ext3-2.4-0.9.15-2414
Trond's NFS patches (pathconf, tune,read,rpc_blk)
The filesystem is RAID0 using LVM (1.0.1-rc4).
The disks are connected using fiber channel
(qlogic 2200, qlax00-4.27beta).
I was generating high load on my nfs
2017 Dec 20
4
virt-customize error
Hi,
I´m need to customize a debian qcow image, but I have this error virt-customize: error: no operating systems were found in the guest image
The command that I´m trying is:
virt-customize -v -x -a ./kvm_av_4_4_n0.qcow2 --attach ./one_context/packages.iso -root-password password:acens --run ./ctpd/pro/scripts/one_altavault.sh --firstboot-command "dpkg-reconfigure openssh-server
I attach the log. I´m wondering if is possible to specify the partition.
Please, can you provide some help?
BR.
________________________________
Este mensaje y sus adjuntos se dirigen exclusi...
2004 Sep 20
1
ZapRTC loading problems
I finally got 2.4 recompiled with RTC as a module:
Module Size Used by Not tainted
autofs 13684 0 (autoclean) (unused)
acenic 241092 0 (unused)
iptable_filter 2412 0 (autoclean) (unused)
ip_tables 15864 1 [iptable_filter]
e100 62340 1
rtc 9084 0 (autoclean)
Here is my
2000 Jun 21
0
[RHSA-2000:037-01] New Linux kernel fixes security bug
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New Linux kernel fixes security bug
Advisory ID: RHSA-2000:037-01
Issue date: 2000-06-20
Updated on: 2000-06-20
Product: Red Hat Linux
Keywords: capabilities setuid suid agpgart 810 aacraid 3x90x MegaRAID Acenic
Cross
2000 Jun 21
0
[RHSA-2000:037-02] New Linux kernel fixes security bug
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New Linux kernel fixes security bug
Advisory ID: RHSA-2000:037-01
Issue date: 2000-06-20
Updated on: 2000-06-20
Product: Red Hat Linux
Keywords: capabilities setuid suid agpgart 810 aacraid 3x90x MegaRAID Acenic
Cross
2005 Nov 22
2
RE: __ia64__ ifdef in xmalloc.c: "Fix ar.unat handling forfast paths"
>From: Rusty Russell
>Sent: 2005年11月21日 12:53
>Hi all,
>
> While browsing the code, I noticed this in xmalloc.c:
>
>#ifndef __ia64__
> BUG_ON(align > SMP_CACHE_BYTES);
>#endif
>
> This is clearly wrong: due to header alignment we cannot give you a
>greater alignment than SMP_CACHE_BYTES. Overriding this will cause the
>allocation to succeed, but not
2000 Jun 26
0
[RHSA-2000:037-05] New Linux kernel fixes security bug
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New Linux kernel fixes security bug
Advisory ID: RHSA-2000:037-05
Issue date: 2000-06-20
Updated on: 2000-06-26
Product: Red Hat Linux
Keywords: capabilities setuid suid agpgart 810 aacraid 3x90x MegaRAID Acenic
Cross
2003 Jul 28
1
Win2k - samba-2.2.8a - can't get above 4MB/sec
I'm trying to maximize throughput between my Samba server and my Win2k (SP3
and 4) clients. Samba's configured to allow up to 64k packets and the
server is on a GigE network (3com card, acenic driver) with SCSI UW2 drives
(software RAID1 and RAID5 volumes). All clients are 100MB/sec FDX on a
switched LAN.
I can get sustained 35MB/sec transfers (read and write) on the disk
subsystem
2007 Apr 18
1
[Bridge] Performance problem with linux bridge ... compare kernel 2.6.13.4 to 2.6.15.1
With kernel 2.6.13.4 linux bridge with traffic management for 4000users
and 20.4 MB/s(tx)/22.4 MB/s(rx) data load of CPU is max 50%
With kernel 2.6.15.1 the same linux bridge with the same traffic has
100% CPU load and in top I have ksoftirqd proccess.
The machine is P4 3.2 GHz with 1GB of ram and 4 NetGear 620 cards
The config is:
/sbin/modprobe acenic link=0x0100,0x0100,0x0100,0x0100
2007 Apr 18
0
[Bridge] My hotmail login issue is fixed!!
Hi All,
Today is a great day. My hotmail login error is fixed.
Following Peter's advice, I used e1000 card, don't change any MTU , the
hotmail login error went away! It is MTU issue, for VLAN tag traffice
going through the bridge, the NICs in the bridge need support VLAN tag,
e100/e1000 card can.
Thanks to Peter, Stephen Hemminger, and All !
So far I know Intel e100/e1000 card can
2005 Jan 14
0
OT: zaptel kernel mod
I don't have any card specific modules loaded. I don't have chan_zap loaded.
So how can the zaptel kernel module show usage? I just rebooted this server
due to defunct asterisk process.
How can I find out what 4 things are using zaptel?
[root@asterisk localhost]# lsmod
Module Size Used by Not tainted
parport_pc 19204 1 (autoclean)
lp
2002 Feb 12
1
2.4.17: BUG()at transaction.c:609
very modular 2.4.17; 2xPIII-800; no HIGHMEM; gcc-2.96-98; all ext3;
modules loaded include autofs4, nfs, nfsd, eepro100, acenic, ipchains,
unix, gdth. This happened during the dump (incrcp.pl is a custom backup
script also happening at the time).
Does ext3-0.9.17 fix this?
kernel BUG at transaction.c:609!
invalid operand: 0000
CPU: 1
EIP:
2003 Aug 16
1
update: Win2kPro's TCP/IP Stack is crippled!
I've been doing some testing between Windows 2000 Pro (SP4) and Windows 2000
Server (no SP and SP4) -- specifcally testing file transfers from a Samba
2.2.8a server.
Samba server: P4/2.2GHz, ServerWorks chipset, SCSI UW2 disk subsystem
(Bonnie++ tested to 35MB/sec), 3Com (acenic) gigabit ethernet
Win2kPro: P3/700, 3Com Vortex 100mbit network card
Win2kServer: P3/800, 3Com Vortex 100mbit
2000 Jun 23
1
Security Update: wu-ftpd vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: wu-ftpd vulnerability
Advisory number: CSSA-2000-020.0
Issue date: 2000 June, 23
Cross reference:
______________________________________________________________________________
1. Problem Description
There is
2000 Jun 14
0
Security Advisory: local ROOT exploit in BRU
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: local ROOT exploit in BRU
Advisory number: CSSA-2000-018.0
Issue date: 2000 June, 14
Cross reference:
______________________________________________________________________________
1. Problem Description
2014 May 08
2
[PATCH] net: get rid of SET_ETHTOOL_OPS
Dave Miller mentioned he'd like to see SET_ETHTOOL_OPS gone.
This does that.
Compile tested only, but I'd seriously wonder if this broke anything.
Suggested-by: Dave Miller <davem at davemloft.net>
Signed-off-by: Wilfried Klaebe <w-lkml at lebenslange-mailadresse.de>
---
Applies against v3.15-rc4.
diff --git a/drivers/infiniband/ulp/ipoib/ipoib_ethtool.c
2014 May 08
2
[PATCH] net: get rid of SET_ETHTOOL_OPS
Dave Miller mentioned he'd like to see SET_ETHTOOL_OPS gone.
This does that.
Compile tested only, but I'd seriously wonder if this broke anything.
Suggested-by: Dave Miller <davem at davemloft.net>
Signed-off-by: Wilfried Klaebe <w-lkml at lebenslange-mailadresse.de>
---
Applies against v3.15-rc4.
diff --git a/drivers/infiniband/ulp/ipoib/ipoib_ethtool.c
2014 May 11
7
[PATCH] [resend] net: get rid of SET_ETHTOOL_OPS
net: get rid of SET_ETHTOOL_OPS
Dave Miller mentioned he'd like to see SET_ETHTOOL_OPS gone.
This does that.
Mostly done via coccinelle script:
@@
struct ethtool_ops *ops;
struct net_device *dev;
@@
- SET_ETHTOOL_OPS(dev, ops);
+ dev->ethtool_ops = ops;
Compile tested only, but I'd seriously wonder if this broke anything.
Suggested-by: Dave Miller <davem at
2014 May 11
7
[PATCH] [resend] net: get rid of SET_ETHTOOL_OPS
net: get rid of SET_ETHTOOL_OPS
Dave Miller mentioned he'd like to see SET_ETHTOOL_OPS gone.
This does that.
Mostly done via coccinelle script:
@@
struct ethtool_ops *ops;
struct net_device *dev;
@@
- SET_ETHTOOL_OPS(dev, ops);
+ dev->ethtool_ops = ops;
Compile tested only, but I'd seriously wonder if this broke anything.
Suggested-by: Dave Miller <davem at
2014 May 11
7
[PATCH] [resend] net: get rid of SET_ETHTOOL_OPS
net: get rid of SET_ETHTOOL_OPS
Dave Miller mentioned he'd like to see SET_ETHTOOL_OPS gone.
This does that.
Mostly done via coccinelle script:
@@
struct ethtool_ops *ops;
struct net_device *dev;
@@
- SET_ETHTOOL_OPS(dev, ops);
+ dev->ethtool_ops = ops;
Compile tested only, but I'd seriously wonder if this broke anything.
Suggested-by: Dave Miller <davem at