search for: maek

Displaying 9 results from an estimated 9 matches for "maek".

Did you mean: mae
2004 Jul 12
2
Vaseplots
In The American Statistician vol 42 (1988) pages 257 - 280, Yoav Benjamini investigates some variations on the box plot, including vaseplots, which maek the width of each box vary proportionally to he estimated density at a particular point. Has anyone implemented these in R ? Thanks as always Peter
2012 Nov 07
1
change colour of geom_step by scale_colour_manual
...cale_colour_discrete(name ="Group", breaks=c("ace", "ctrlAM","met"), labels=c("acetone", "untreated","methoprene"))+ theme_bw() + # maek background theme black and white opts(legend.justification=c(1,0),# legend justification needs to be in the (options) legend.position=c(1,0), panel.grid.major = theme_line...
2000 Mar 13
4
ssh works only as root
On my solaris 2.6 box, I get ssh moni ld.so.1: ssh: fatal: libz.so: open failed: No such file or directory Killed while as root, I have no problem. Note that echo $LD_LIBRARY_PATH /space/local/lib:/usr/local/lib:/usr/openwin/lib:/usr/lib:/opt/x11r5/lib ls -l /space/local/lib/libz.* -rwxr-xr-x 1 wierdlm faculty 70488 Mar 10 17:26 /space/local/lib/libz.a -rwxr-xr-x 1 bin bin
2018 Jul 19
0
[PATCH 3/3] [RFC V3] KVM: X86: Adding skeleton for Memory ROE
...the end of a hypercall + */ + rflags = kvm_get_rflags(vcpu); + iopl = (rflags >> 12) & 3; + if (iopl != 3) + return false; + return true; +} + +static int kvm_mroe(struct kvm_vcpu *vcpu, u64 gva) +{ + struct kvm *kvm = vcpu->kvm; + gpa_t gpa; + u64 hva; + + /* + * First we need to maek sure that we are running from something that + * isn't usermode + */ + if (kvm_mroe_userspace(vcpu)) + return -1;//I don't really know what to return + if (gva & ~PAGE_MASK) + return -EINVAL; + gpa = kvm_mmu_gva_to_gpa_system(vcpu, gva, NULL); + hva = gfn_to_hva(kvm, gpa >> PA...
2018 Jul 20
0
[PATCH RFC V4 3/3] KVM: X86: Adding skeleton for Memory ROE
...a hypercall + */ + rflags = kvm_get_rflags(vcpu); + iopl = (rflags >> 12) & 3; + if (iopl != 3) + return false; + return true; +} + +static int kvm_mroe(struct kvm_vcpu *vcpu, u64 gva, u64 npages) +{ + struct kvm *kvm = vcpu->kvm; + gpa_t gpa; + u64 hva; + + /* + * First we need to maek sure that we are running from something that + * isn't usermode + */ + if (kvm_mroe_userspace(vcpu)) + return -1;//I don't really know what to return + if (gva & ~PAGE_MASK) + return -EINVAL; + // We need to make sure that there will be no overflow + if ((npages << PAGE_SHIFT)...
2008 Jun 23
4
Ubuntu, Counterstrike Source, crashes after loading a game
Hello, Well, first let me say - I've looked in the APP database for this game. I've tried to trouble shoot everything I've read on the site. Here's my system: Ubuntu 64-bit 8.04 AMD 5800+ 4gb of Winsor Ram Nvidia 8500 GT Intel onboard sound Here's what's happening: Whenever I load up a game on CSS, it crashes after a gun shot. You can walk around, and everything just
2018 Jul 20
4
Memory Read Only Enforcement: VMM assisted kernel rootkit mitigation for KVM V4
Here is change log from V3 To V4: - Fixing spelling/grammar mistakes suggested by Randy Dunlap - Changing the hypercall interface to be able to process multiple pages per one hypercall also suggested by Randy Dunlap. It turns out that this will save lots of vmexist/memory slot flushes when protecting many pages. [PATCH RFC V4 1/3] KVM: X86: Memory ROE documentation [PATCH RFC V4 2/3] KVM:
2018 Jul 19
8
Memory Read Only Enforcement: VMM assisted kernel rootkit mitigation for KVM
Hi, This is my first set of patches that works as I would expect, and the third revision I sent to mailing lists. Following up with my previous discussions about kernel rootkit mitigation via placing R/O protection on critical data structure, static data, privileged registers with static content. These patches present the first part where it is only possible to place these protections on memory
2018 Jul 19
8
Memory Read Only Enforcement: VMM assisted kernel rootkit mitigation for KVM
Hi, This is my first set of patches that works as I would expect, and the third revision I sent to mailing lists. Following up with my previous discussions about kernel rootkit mitigation via placing R/O protection on critical data structure, static data, privileged registers with static content. These patches present the first part where it is only possible to place these protections on memory