Displaying 20 results from an estimated 26 matches for "clac".
Did you mean:
cac
2019 Oct 26
3
Problems with NUT on Raspberry Pi
Hello,
I installed NUT on raspberry pi as a NUT-Server. It works fine so far with a
Cyberpower OR600ELCDRM1U (used driver: usbhid-ups). The Pi recognizes power
loss and shuts down itself and the ups as it should.
Problem: The UPS comes up immediately after shutting down. This is a big
issue because there is no power, the server (NUT-Slave) begins powering up
and the battery will drain
2019 Oct 26
3
Problems with NUT on Raspberry Pi
Hi, thanks for your reply.
>> The Unit is new, the battery drains because it went down to about 15
>> percent before NUT shuts it down.
>>
>> Yes, I can here a "clac". The problem is not the shutdown procedure,
>> it works quite good. After the Unit reaches 20 percent the NUT-Server
>> on the pi shuts down the system and the ups is turned off as well. The
>> problem is, it starts up immediately even though the unit is still on
>>...
2019 Jan 07
2
[RFC PATCH V3 0/5] Hi:
...through kernel virtual
>> address instead of copy_user() friends since they had too much
>> overheads like checks, spec barriers or even hardware feature
>> toggling.
> Will review, thanks!
> One questions that comes to mind is whether it's all about bypassing
> stac/clac. Could you please include a performance comparison with
> nosmap?
>
On machine without SMAP (Sandy Bridge):
Before: 4.8Mpps
After: 5.2Mpps
On machine with SMAP (Broadwell):
Before: 5.0Mpps
After: 6.1Mpps
No smap: 7.5Mpps
Thanks
2019 Jan 07
2
[RFC PATCH V3 0/5] Hi:
...through kernel virtual
>> address instead of copy_user() friends since they had too much
>> overheads like checks, spec barriers or even hardware feature
>> toggling.
> Will review, thanks!
> One questions that comes to mind is whether it's all about bypassing
> stac/clac. Could you please include a performance comparison with
> nosmap?
>
On machine without SMAP (Sandy Bridge):
Before: 4.8Mpps
After: 5.2Mpps
On machine with SMAP (Broadwell):
Before: 5.0Mpps
After: 6.1Mpps
No smap: 7.5Mpps
Thanks
2019 Jan 07
3
[RFC PATCH V3 0/5] Hi:
...instead of copy_user() friends since they had too much
>>>> overheads like checks, spec barriers or even hardware feature
>>>> toggling.
>>> Will review, thanks!
>>> One questions that comes to mind is whether it's all about bypassing
>>> stac/clac. Could you please include a performance comparison with
>>> nosmap?
>>>
>> On machine without SMAP (Sandy Bridge):
>>
>> Before: 4.8Mpps
>>
>> After: 5.2Mpps
> OK so would you say it's really unsafe versus safe accesses?
> Or would you say...
2019 Jan 07
3
[RFC PATCH V3 0/5] Hi:
...instead of copy_user() friends since they had too much
>>>> overheads like checks, spec barriers or even hardware feature
>>>> toggling.
>>> Will review, thanks!
>>> One questions that comes to mind is whether it's all about bypassing
>>> stac/clac. Could you please include a performance comparison with
>>> nosmap?
>>>
>> On machine without SMAP (Sandy Bridge):
>>
>> Before: 4.8Mpps
>>
>> After: 5.2Mpps
> OK so would you say it's really unsafe versus safe accesses?
> Or would you say...
2019 Oct 26
0
Problems with NUT on Raspberry Pi
On Sat, 26 Oct 2019, EP wrote:
> The Unit is new, the battery drains because it went down to about 15 percent
> before NUT shuts it down.
>
> Yes, I can here a "clac". The problem is not the shutdown procedure, it works
> quite good. After the Unit reaches 20 percent the NUT-Server on the pi shuts
> down the system and the ups is turned off as well. The problem is, it starts
> up immediately even though the unit is still on battery. That means...
2013 Jan 28
1
SMAP feature causing kernel alignment faults due to setting EFLAGS.AC
This appears to be the case in the recent messages in Debian bug #660425
[0] (thread starts at [1] and continues at [2]).
SMAP uses EFLAGS.AC in kernel mode to indicate whether accesses to
usermode pages should fault or not, which gets confused because under
64-bit Xen kernel == ring3. The obvious fix would be to clear SMAP from
the cpuid features (probably in kernel as well as hypervosr) but
2018 Nov 02
2
[PULL] vhost: cleanups and fixes
On Fri, Nov 02, 2018 at 11:46:36AM +0000, Mark Rutland wrote:
> On Thu, Nov 01, 2018 at 04:06:19PM -0700, Linus Torvalds wrote:
> > On Thu, Nov 1, 2018 at 4:00 PM Kees Cook <keescook at chromium.org> wrote:
> > >
> > > + memset(&rsp, 0, sizeof(rsp));
> > > + rsp.response = VIRTIO_SCSI_S_FUNCTION_REJECTED;
> > > + resp =
2018 Nov 02
2
[PULL] vhost: cleanups and fixes
On Fri, Nov 02, 2018 at 11:46:36AM +0000, Mark Rutland wrote:
> On Thu, Nov 01, 2018 at 04:06:19PM -0700, Linus Torvalds wrote:
> > On Thu, Nov 1, 2018 at 4:00 PM Kees Cook <keescook at chromium.org> wrote:
> > >
> > > + memset(&rsp, 0, sizeof(rsp));
> > > + rsp.response = VIRTIO_SCSI_S_FUNCTION_REJECTED;
> > > + resp =
2006 Apr 05
2
Problems in package management after Linux system upgrade
...BC","ROracle","rsprng","RWinEdt","taskPR")
#rejected because I subjectively think we don't need them
failPackages2 <-
c("aaMI","AlgDesign","bim","caMassClass","CGIwithR","CDNmoney","clac","clim.pact","compositions","cyclones","hapassoc","haplo.score","haplo.stats","hapsim","httpRequest",
"labdsv","kza","LMGene","Malmig","magic","negenes",&...
2018 Nov 02
0
[PULL] vhost: cleanups and fixes
...ots of bugs because code bitrots.
And no, the access_ok() checks aren't expensive, not even in a loop.
They *used* to be somewhat expensive compared to the access, but that
simply isn't true any more. The real expense in copy_to_user and
friends are in the user access bit setting (STAC and CLAC on x86),
which easily an order of magnitude more expensive than access_ok().
So just get rid of the double-underscore version. It's basically
always a mis-optimization due to entirely historical reasons. I can
pretty much guarantee that it's not visible in profiles.
Linu...
2019 Jan 02
0
[RFC PATCH V3 0/5] Hi:
...access virtqueue metadata through kernel virtual
> address instead of copy_user() friends since they had too much
> overheads like checks, spec barriers or even hardware feature
> toggling.
Will review, thanks!
One questions that comes to mind is whether it's all about bypassing
stac/clac. Could you please include a performance comparison with
nosmap?
>
> Test shows about 24% improvement on TX PPS. It should benefit other
> cases as well.
>
> Changes from V2:
> - fix buggy range overlapping check
> - tear down MMU notifier during vhost ioctl to make sure inva...
2019 Jan 07
0
[RFC PATCH V3 0/5] Hi:
...> address instead of copy_user() friends since they had too much
> > > overheads like checks, spec barriers or even hardware feature
> > > toggling.
> > Will review, thanks!
> > One questions that comes to mind is whether it's all about bypassing
> > stac/clac. Could you please include a performance comparison with
> > nosmap?
> >
>
> On machine without SMAP (Sandy Bridge):
>
> Before: 4.8Mpps
>
> After: 5.2Mpps
OK so would you say it's really unsafe versus safe accesses?
Or would you say it's just a better wri...
2019 Jan 07
0
[RFC PATCH V3 0/5] Hi:
...they had too much
> > > > > overheads like checks, spec barriers or even hardware feature
> > > > > toggling.
> > > > Will review, thanks!
> > > > One questions that comes to mind is whether it's all about bypassing
> > > > stac/clac. Could you please include a performance comparison with
> > > > nosmap?
> > > >
> > > On machine without SMAP (Sandy Bridge):
> > >
> > > Before: 4.8Mpps
> > >
> > > After: 5.2Mpps
> > OK so would you say it's really...
2019 Jan 07
0
[RFC PATCH V3 1/5] vhost: generalize adding used elem
...; Signed-off-by: Jason Wang <jasowang at redhat.com>
>> I don't hve a problem with this patch but do you have
>> any idea how come removing what's supposed to be
>> an optimization speeds things up?
> With SMAP, the 2x vhost_put_user() will also mean an extra STAC/CLAC pair,
> which is probably slower than the overhead of CALL+RET to whatever flavor
> of copy_user_generic() gets used. CALL+RET is really the only overhead
> since all variants of copy_user_generic() unroll accesses smaller than
> 64 bytes, e.g. on a 64-bit system, __copy_to_user() will...
2018 Nov 02
3
[PULL] vhost: cleanups and fixes
...to/from_user.
> And no, the access_ok() checks aren't expensive, not even in a loop.
> They *used* to be somewhat expensive compared to the access, but that
> simply isn't true any more. The real expense in copy_to_user and
> friends are in the user access bit setting (STAC and CLAC on x86),
> which easily an order of magnitude more expensive than access_ok().
>
> So just get rid of the double-underscore version. It's basically
> always a mis-optimization due to entirely historical reasons. I can
> pretty much guarantee that it's not visible in profiles...
2018 Nov 02
3
[PULL] vhost: cleanups and fixes
...to/from_user.
> And no, the access_ok() checks aren't expensive, not even in a loop.
> They *used* to be somewhat expensive compared to the access, but that
> simply isn't true any more. The real expense in copy_to_user and
> friends are in the user access bit setting (STAC and CLAC on x86),
> which easily an order of magnitude more expensive than access_ok().
>
> So just get rid of the double-underscore version. It's basically
> always a mis-optimization due to entirely historical reasons. I can
> pretty much guarantee that it's not visible in profiles...
2018 Dec 10
1
[PATCH net 4/4] vhost: log dirty page correctly
...t
Cyclomatic Complexity 1 include/linux/slab.h:kmalloc_type
Cyclomatic Complexity 28 include/linux/slab.h:kmalloc_index
Cyclomatic Complexity 67 include/linux/slab.h:kmalloc_large
Cyclomatic Complexity 4 include/linux/slab.h:kmalloc
Cyclomatic Complexity 1 arch/x86/include/asm/smap.h:clac
Cyclomatic Complexity 1 arch/x86/include/asm/smap.h:stac
Cyclomatic Complexity 1 arch/x86/include/asm/uaccess.h:set_fs
Cyclomatic Complexity 1 arch/x86/include/asm/uaccess_32.h:raw_copy_to_user
Cyclomatic Complexity 5 arch/x86/include/asm/uaccess_32.h:raw_copy_from_user
Cyclomatic Co...
2007 Mar 26
1
Problem in loading all packages all at once
...t;,"caMassClass","car","cat","caTools","catspec","cba","cclust","CDNmoney","cfa","CGIwithR","changeLOS","chplot","chron","CircStats","circular","clac","class","classInt","classPP","clim.pact","climatol","clines","clue","cluster","clusterRepro","clustvarsel","cmprsk","cobs","CoCo","CoCoCg","CoCoCore...