search for: opreation

Displaying 20 results from an estimated 27 matches for "opreation".

Did you mean: operation
2010 Jul 09
3
R crashes with large vectors
...tors in R. Specifically, I am using XTS of length of minimum 120k elements. My problem is that I cannot display the vector (otherwise R crashes), I cannot plot it either (otherwise R crashes). That could be solved by reducing the amount of points. However, I have been performing some statistical opreations on is and even sd(myXTS) crashes R. By "crashes", I mean shuts down without any warning whatsoever. I use R 2.11.1 (64). Has anyone had the same kind of problem? Can we solve this? Best, -- Jeremie [[alternative HTML version deleted]]
2019 May 30
1
[PATCH net-next 0/6] vhost: accelerate metadata access
On Thu, May 30, 2019 at 11:07:30AM -0700, David Miller wrote: > From: Jason Wang <jasowang at redhat.com> > Date: Fri, 24 May 2019 04:12:12 -0400 > > > This series tries to access virtqueue metadata through kernel virtual > > address instead of copy_user() friends since they had too much > > overheads like checks, spec barriers or even hardware feature > >
2009 Nov 15
1
JGR GUI for R-2.10.0 "Help" "Print"
I have updated R 2.9.1 to 2.10.0. and JGR GUI 1.7. I am running Windows XP. I can't seem to get the JGR "Print" or "Help" functions to work. The system locks and requires me to "stop the process". In the past I have preferred the opreation and "feel" of JGR GUI. I realize that this help forum is for R; but, I am hoping that some other R-user is a JGR GUI user and might have a hint about this. At one point I received the following: **************************************************** Loading required package: rJava Load...
2019 Apr 25
2
[PATCH net] vhost_net: fix possible infinite loop
...t(&msg.msg_iter, READ, vq->iov, 1, 1); err = sock->ops->recvmsg(sock, &msg, 1, MSG_DONTWAIT | MSG_TRUNC); pr_debug("Discarded rx packet: len %zd\n", sock_len); continue; } ... } This makes it possible to trigger a infinite while..continue loop through the co-opreation of two VMs like: 1) Malicious VM1 allocate 1 byte rx buffer and try to slow down the vhost process as much as possible e.g using indirect descriptors or other. 2) Malicious VM2 generate packets to VM1 as fast as possible Fixing this by checking against weight at the end of RX and TX loop. T...
2019 Apr 25
2
[PATCH net] vhost_net: fix possible infinite loop
...t(&msg.msg_iter, READ, vq->iov, 1, 1); err = sock->ops->recvmsg(sock, &msg, 1, MSG_DONTWAIT | MSG_TRUNC); pr_debug("Discarded rx packet: len %zd\n", sock_len); continue; } ... } This makes it possible to trigger a infinite while..continue loop through the co-opreation of two VMs like: 1) Malicious VM1 allocate 1 byte rx buffer and try to slow down the vhost process as much as possible e.g using indirect descriptors or other. 2) Malicious VM2 generate packets to VM1 as fast as possible Fixing this by checking against weight at the end of RX and TX loop. T...
2019 May 30
0
[PATCH net-next 0/6] vhost: accelerate metadata access
From: Jason Wang <jasowang at redhat.com> Date: Fri, 24 May 2019 04:12:12 -0400 > This series tries to access virtqueue metadata through kernel virtual > address instead of copy_user() friends since they had too much > overheads like checks, spec barriers or even hardware feature > toggling like SMAP. This is done through setup kernel address through > direct mapping and
2019 Jun 05
0
[PATCH net-next 0/6] vhost: accelerate metadata access
On Fri, May 24, 2019 at 04:12:12AM -0400, Jason Wang wrote: > Hi: > > This series tries to access virtqueue metadata through kernel virtual > address instead of copy_user() friends since they had too much > overheads like checks, spec barriers or even hardware feature > toggling like SMAP. This is done through setup kernel address through > direct mapping and co-opreate VM
2019 May 24
10
[PATCH net-next 0/6] vhost: accelerate metadata access
Hi: This series tries to access virtqueue metadata through kernel virtual address instead of copy_user() friends since they had too much overheads like checks, spec barriers or even hardware feature toggling like SMAP. This is done through setup kernel address through direct mapping and co-opreate VM management with MMU notifiers. Test shows about 23% improvement on TX PPS. TCP_STREAM
2019 May 24
10
[PATCH net-next 0/6] vhost: accelerate metadata access
Hi: This series tries to access virtqueue metadata through kernel virtual address instead of copy_user() friends since they had too much overheads like checks, spec barriers or even hardware feature toggling like SMAP. This is done through setup kernel address through direct mapping and co-opreate VM management with MMU notifiers. Test shows about 23% improvement on TX PPS. TCP_STREAM
2011 Mar 30
4
How to define new operator in R?
Hello, everyone! Does anyone know how make some symbols have special means in R? For example, we know that "+" in R means the sum of the two operand on its left and right. I want to define some operators in R by myself. Is this possible? Regards! -- Chuanlong Du Department of Statistcis Iowa State University Ames, IA, US 50011 [[alternative HTML version deleted]]
2019 Apr 26
2
[PATCH net] vhost_net: fix possible infinite loop
...ock, &msg, >> 1, MSG_DONTWAIT | MSG_TRUNC); >> pr_debug("Discarded rx packet: len %zd\n", sock_len); >> continue; >> } >> ... >> } >> >> This makes it possible to trigger a infinite while..continue loop >> through the co-opreation of two VMs like: >> >> 1) Malicious VM1 allocate 1 byte rx buffer and try to slow down the >> vhost process as much as possible e.g using indirect descriptors or >> other. >> 2) Malicious VM2 generate packets to VM1 as fast as possible >> >> Fixing...
2019 Apr 26
2
[PATCH net] vhost_net: fix possible infinite loop
...ock, &msg, >> 1, MSG_DONTWAIT | MSG_TRUNC); >> pr_debug("Discarded rx packet: len %zd\n", sock_len); >> continue; >> } >> ... >> } >> >> This makes it possible to trigger a infinite while..continue loop >> through the co-opreation of two VMs like: >> >> 1) Malicious VM1 allocate 1 byte rx buffer and try to slow down the >> vhost process as much as possible e.g using indirect descriptors or >> other. >> 2) Malicious VM2 generate packets to VM1 as fast as possible >> >> Fixing...
2013 Mar 29
8
[PATCH 0/3] virtio/vhost: Add checks for uninitialized VQs
From: Nicholas Bellinger <nab at linux-iscsi.org> Hi folks, This series adds a virtio_queue_valid() for use by virtio-pci code in order to prevent opreations upon uninitialized VQs, that is currently expected to occur during seabios setup of virtio-scsi. This also includes a vhost specific check for uninitialized VQs in vhost_verify_ring_mappings() to avoid this same case. Please review. --nab Michael S. Tsirkin (1): virtio: add API to check that...
2013 Mar 29
8
[PATCH 0/3] virtio/vhost: Add checks for uninitialized VQs
From: Nicholas Bellinger <nab at linux-iscsi.org> Hi folks, This series adds a virtio_queue_valid() for use by virtio-pci code in order to prevent opreations upon uninitialized VQs, that is currently expected to occur during seabios setup of virtio-scsi. This also includes a vhost specific check for uninitialized VQs in vhost_verify_ring_mappings() to avoid this same case. Please review. --nab Michael S. Tsirkin (1): virtio: add API to check that...
2019 May 12
2
[PATCH net] vhost_net: fix possible infinite loop
...iscarded rx packet: len %zd\n", sock_len); > > > > ??????? continue; > > > > ????} > > > > ... > > > > } > > > > > > > > This makes it possible to trigger a infinite while..continue loop > > > > through the co-opreation of two VMs like: > > > > > > > > 1) Malicious VM1 allocate 1 byte rx buffer and try to slow down the > > > > ??? vhost process as much as possible e.g using indirect descriptors or > > > > ??? other. > > > > 2) Malicious VM2 generate pack...
2019 May 12
2
[PATCH net] vhost_net: fix possible infinite loop
...iscarded rx packet: len %zd\n", sock_len); > > > > ??????? continue; > > > > ????} > > > > ... > > > > } > > > > > > > > This makes it possible to trigger a infinite while..continue loop > > > > through the co-opreation of two VMs like: > > > > > > > > 1) Malicious VM1 allocate 1 byte rx buffer and try to slow down the > > > > ??? vhost process as much as possible e.g using indirect descriptors or > > > > ??? other. > > > > 2) Malicious VM2 generate pack...
2006 Oct 01
2
[LLVMdev] Instruction descriptions question
...checked by isSameSize predicate). More over, in very many cases, the operation (e.g. OR) itself affects only the encoding of the operation inside the opcode and of course the description of the effect and assembler syntax e.g. [(store (or (load addr:$dst), GR8:$src), addr:$dst)]. For OR insn the opreation should be or, and for AND insn - obviously and. But operands and operand combinations have the same limitations and descriptions also for many other operations, e.g. XOR, AND, etc. Wouldn't it make sense to provide an easier way to describe it? For example, one would describe operands combinati...
2019 Apr 25
0
[PATCH net] vhost_net: fix possible infinite loop
...err = sock->ops->recvmsg(sock, &msg, > 1, MSG_DONTWAIT | MSG_TRUNC); > pr_debug("Discarded rx packet: len %zd\n", sock_len); > continue; > } > ... > } > > This makes it possible to trigger a infinite while..continue loop > through the co-opreation of two VMs like: > > 1) Malicious VM1 allocate 1 byte rx buffer and try to slow down the > vhost process as much as possible e.g using indirect descriptors or > other. > 2) Malicious VM2 generate packets to VM1 as fast as possible > > Fixing this by checking against wei...
2019 May 05
0
[PATCH net] vhost_net: fix possible infinite loop
...MSG_TRUNC); >>> ??????? pr_debug("Discarded rx packet: len %zd\n", sock_len); >>> ??????? continue; >>> ????} >>> ... >>> } >>> >>> This makes it possible to trigger a infinite while..continue loop >>> through the co-opreation of two VMs like: >>> >>> 1) Malicious VM1 allocate 1 byte rx buffer and try to slow down the >>> ??? vhost process as much as possible e.g using indirect descriptors or >>> ??? other. >>> 2) Malicious VM2 generate packets to VM1 as fast as possible >&...
2019 May 13
0
[PATCH net] vhost_net: fix possible infinite loop
...rx packet: len %zd\n", sock_len); >>>>> ??????? continue; >>>>> ????} >>>>> ... >>>>> } >>>>> >>>>> This makes it possible to trigger a infinite while..continue loop >>>>> through the co-opreation of two VMs like: >>>>> >>>>> 1) Malicious VM1 allocate 1 byte rx buffer and try to slow down the >>>>> ??? vhost process as much as possible e.g using indirect descriptors or >>>>> ??? other. >>>>> 2) Malicious VM2 generat...