search for: outl

Displaying 20 results from an estimated 45 matches for "outl".

Did you mean: out
2013 Feb 18
3
DomU trying to write on an IO Port
..., I am running xen-hypervisor over qemu. Now while running domU I want to write on an IO port, which I''ll be handling inside Qemu. Basically, this is a communication mechanism for me to communicate with qemu. I am writing on port number ''0x378'' as a root user using "outl" function. But when I run this code in domU, it does not reach qemu. So my question is: Is there some mechanism in xen which handles writing on IO ports and in case its not a valid IO Port then just discards the write. -- Regards, Nitin Gupta _____________________________________________...
2008 Apr 10
8
[PATCH][RFC]Move PCI Configuration Spaces from Dom0 to Xen
Hi, Keir, This patch will move reading and writing of PCI configuration spaces from dom0 to Xen. It also changes VTD code, so that they can touch the PCI configuration spaces with proper lock. This will also benefit MSI support in Xen. Can you give some comments? Thanks! <<pci_conf_xen.patch>> Best Regards Haitao Shan _______________________________________________ Xen-devel
2004 Jan 24
1
iopl()
...000100 eip:765e eax:0100 ebx:0000 ecx:0320 edx:de04 esi:03f5 edi:0087 ebp:0000 esp:6b62 cs:c000 ss:c000 es:0000 ds:c000 fs:0000 gs:0000 eflags:00000246 exception: code at 0x000c7661: 66 ef 5a 59 66 58 9d c3 53 bb 02 00 e8 5e ff 5b c3 53 bb 05 00 e8 55 ff 5b c3 53 bb 0d 00 e8 4c outl(0xde04, 00000000) eip:7663 eax:0000 ebx:0000 ecx:0320 edx:de04 esi:03f5 edi:0087 ebp:0000 esp:6b62 cs:c000 ss:c000 es:0000 ds:c000 fs:0000 gs:0000 eflags:00000246 exception: code at 0x000c5ab6: 66 ef ba fc 0c 66 ed 9d c3 51 eb 12 51 32 c9 eb 0d 51 b1 01 eb 08 51 b1 02 eb 03 51 b...
2006 Jan 25
0
Interpolating spline problems and akima
...t;-dat.interp$y[j] + } } but this does not....? > day<-c(1,2,3,4,5,6,7,8,9,10) > datfile<-c(17,6,29,22,90,72,20,4,4,NA) > for (i in 1:10) { + dat<-datfile + dat.ok <- !is.na(dat) + dat2<-dat[dat.ok] + day2<-day[dat.ok] + + dat.interp<-spline(day2,dat2,length(day)) + outl<-rep(NA,length(day)) + for (j in 1:length(dat.interp$x)) { + outl[j]<-dat.interp$y[j] + } } ........................................................................... Dr Tom C Cameron office: 0113 34 32837 (10.23 Miall) Ecology & Evolution Res. Group....
2014 Jan 16
2
Quitar outliers por condición
Hola buenos días, ahora mismo estaba haciendo una función para quitar outlier por condición. Pero lo cierto es que aunque la función consigue quitarlos creo que me ha quedad bastante farragoso. Os dejo el codigo y si me dais algún consejo para mejorarlo mejor que mejor. Mcuhas gracias #############################################################• # Ojo este script puede...
2008 Mar 07
1
Help with 'memory not mapped'
...t sometimes I get the error: ------- *** caught segfault *** address 0x1c404ec8, cause 'memory not mapped' Traceback: 1: .Call("rrfunc", as.double(dx), as.integer(nrows), as.integer(ncols), as.double(deltadt), as.character(binmaps), as.integer(ldd), as.double(downst),as.integer(outl), as.double(maxinte), as.double(nmn)) 2: rrfuncR(dx, nrows, ncols, delta.t,binmaps.pathed,ldd,downst, out.index,interc,n.man) 3: eval.with.vis(expr, envir, enclos) 4: eval.with.vis(ei, envir) 5: source("rrprogv1_2.R") 6: eval.with.vis(expr, envir, enclos) 7: eval.with.vis(ei, envir)...
2016 Nov 02
0
v2.2.26.0 released
...L && !defined(LIBRESSL_VERSION_NUMBER) ec = HMAC_Update(ctx->ctx, data, data_len); #else ec = HMAC_Update(&(ctx->ctx), data, data_len); @@ -498,7 +498,7 @@ bool dcrypt_openssl_ctx_hmac_final(struct dcrypt_conte int ec; unsigned char buf[HMAC_MAX_MD_CBLOCK]; unsigned int outl; -#if OPENSSL_VERSION_NUMBER >= 0x10100000L +#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ec = HMAC_Final(ctx->ctx, buf, &outl); HMAC_CTX_free(ctx->ctx); ctx->ctx = NULL; @@ -2133,7 +2133,7 @@ bool dcrypt_openssl_public_key_id_evp(E...
2014 Aug 29
2
[LLVMdev] The problem of densemap and loop
...!F->isDeclaration()){} else{ LoopInfo *LI = &getAnalysis<LoopInfo>(*F); WCETInfo *WI = &getAnalysis<WCETInfo>(); //WI is the ImmutablePass which contains the dense map for(LoopInfo::iterator i=LI->begin(); i!=LI->end(); ++i) { Loop *L = *i; int lb=0; lb=WI->outls(L); // the method: return ls.find(L)->second; } } } " Thank you Sincerely, Hanbing ----- Mail original ----- > De: "John Criswell" <jtcriswel at gmail.com> > À: "Hanbing Li" <hanbing.li at inria.fr>, llvmdev at cs.uiuc.edu > Envoyé: J...
2014 Nov 15
0
Processed: tagging 659642
Processing commands for control at bugs.debian.org: > tags 659642 + moreinfo Bug #659642 [xen-hypervisor-4.0-amd64] xen-hypervisor-4.0-amd64: outl segfaults when restoring monitor from sleep with DPMS Added tag(s) moreinfo. > thanks Stopping processing here. Please contact me if you need assistance. -- 659642: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659642 Debian Bug Tracking System Contact owner at bugs.debian.org with problems
2014 Nov 24
0
Processed: closing 659642
Processing commands for control at bugs.debian.org: > close 659642 Bug #659642 [xen-hypervisor-4.0-amd64] xen-hypervisor-4.0-amd64: outl segfaults when restoring monitor from sleep with DPMS Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 659642: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659642 Debian Bug Tracking System Contact owner at bugs.debian.org with problems
2012 Aug 30
1
[PATCH 04/11] vmci_driver.patch: VMCI device driver.
...capabilities |= VMCI_CAPS_NOTIFICATIONS; + } + } else { + capabilities = VMCI_CAPS_DATAGRAM; + } + pr_info("Using capabilities 0x%x.", capabilities); + + /* Let the host know which capabilities we intend to use. */ + outl(capabilities, ioaddr + VMCI_CAPS_ADDR); + + /* Device struct initialization. */ + mutex_lock(&vmci_dev.lock); + if (vmci_dev.enabled) { + pr_err("Device already enabled."); + goto unlock; + } + + vmci_dev.ioaddr = ioaddr; +...
2012 Aug 30
1
[PATCH 04/11] vmci_driver.patch: VMCI device driver.
...capabilities |= VMCI_CAPS_NOTIFICATIONS; + } + } else { + capabilities = VMCI_CAPS_DATAGRAM; + } + pr_info("Using capabilities 0x%x.", capabilities); + + /* Let the host know which capabilities we intend to use. */ + outl(capabilities, ioaddr + VMCI_CAPS_ADDR); + + /* Device struct initialization. */ + mutex_lock(&vmci_dev.lock); + if (vmci_dev.enabled) { + pr_err("Device already enabled."); + goto unlock; + } + + vmci_dev.ioaddr = ioaddr; +...
2016 Nov 02
2
v2.2.26.0 released
If the standard way works, I am happy to include the original patch I sent, amended so that it checks for presence of LIBRESSL_VERSION_NUMBER. If they keep this promise, then we should have no worries about things breaking up. Aki On 02.11.2016 14:24, Michael A. Peters wrote: > Indeed, which is why I use it. > > But it also is in the minority which is why I find it acceptable for
2012 Jul 12
0
Processed: tagging 430778, tagging 430676, tagging 603366, tagging 602378, tagging 675266, tagging 600241 ...
...entation issue?) Added tag(s) upstream. > tags 658263 + upstream Bug #658263 [xen-hypervisor-4.0-amd64] xen-hypervisor-4.0-amd64: Different network traffic values from dom0 vs domU Added tag(s) upstream. > tags 659642 + upstream Bug #659642 [xen-hypervisor-4.0-amd64] xen-hypervisor-4.0-amd64: outl segfaults when restoring monitor from sleep with DPMS Added tag(s) upstream. > tags 603391 + upstream Bug #603391 [xen-utils-4.0] pygrub: unintelligible error messages Added tag(s) upstream. > tags 614101 + upstream Bug #614101 [xen-hypervisor-4.0-amd64] Debian 6.0 amd64 doesn't boot with...
2016 Apr 13
0
[PATCH 1/1] x32 support
...ine__ void outb(__u8 __v, __u16 __p) +{ + asm volatile ("outb %0,%1" : : "a" (__v), "dN"(__p)); +} + +static __inline__ void outw(__u16 __v, __u16 __p) +{ + asm volatile ("outw %0,%1" : : "a" (__v), "dN"(__p)); +} + +static __inline__ void outl(__u32 __v, __u16 __p) +{ + asm volatile ("outl %0,%1" : : "a" (__v), "dN"(__p)); +} + +static __inline__ __u8 inb(__u16 __p) +{ + __u8 __v; + asm volatile ("inb %1,%0" : "=a" (__v) : "dN"(__p)); + return __v; +} + +static __inline__ __u16...
2012 Feb 12
0
Bug#659642: xen-hypervisor-4.0-amd64: outl segfaults when restoring monitor from sleep with DPMS
...sr/bin/Xorg (0x400000+0x4c734) [0x44c734] 11: /usr/bin/Xorg (0x400000+0x25c35) [0x425c35] 12: /lib/libc.so.6 (__libc_start_main+0xfd) [0x7f889b52ac8d] 13: /usr/bin/Xorg (0x400000+0x257e9) [0x4257e9] Segmentation fault at address (nil) and debugging Xorg with gdb reveals: #0 0x00007f88988ec775 in outl (port=61440, val=323652) at .../../../../hw/xfree86/common/compiler.h:438 #1 x_outl (port=61440, val=323652) at .../../../../hw/xfree86/int10/helper_exec.c:423 #2 0x00007f88988f3613 in x86emuOp_out_word_DX_AX (op1=<value optimized out>) at ../../../../hw/xfree86/int10/../x86emu/ops.c:98...
2006 Jun 26
0
[klibc 37/43] x86_64 support for klibc
...nsigned short __p) +{ + asm volatile ("outb %0,%1" : : "a" (__v), "dN"(__p)); +} + +static __inline__ void outw(unsigned short __v, unsigned short __p) +{ + asm volatile ("outw %0,%1" : : "a" (__v), "dN"(__p)); +} + +static __inline__ void outl(unsigned int __v, unsigned short __p) +{ + asm volatile ("outl %0,%1" : : "a" (__v), "dN"(__p)); +} + +static __inline__ unsigned char inb(unsigned short __p) +{ + unsigned char __v; + asm volatile ("inb %1,%0" : "=a" (__v) : "dN"(__p)); +...
2009 Apr 26
5
Problems installing NfS2
...8 0x004011e0 in _ins0432._mp (+0x11e0) (0x0033fe3c) 9 0x00401824 in _ins0432._mp (+0x1824) (0x0033fe74) 10 0x00487edd in _ins0432._mp (+0x87edd) (0x0033ff08) 11 0x7b878828 in kernel32 (+0x58828) (0x0033ffe8) 12 0xb7f1fd37 wine_switch_to_stack+0x17() in libwine.so.1 (0x00000000) 0x003a3723: outl %eax,%dx Modules: Module Address Debug info Name (83 modules) PE 340000- 34e000 Deferred _wutl95 PE 3a0000- 3b1000 Export shell PE 400000- 4ae000 Export _ins0432._mp PE 10000000-1002f000 Deferred a3c ELF 7b800000-7b93d000 Export kernel32<elf&gt...
2015 Oct 26
3
[kvm-unit-tests PATCH] x86: hyperv_synic: Hyper-V SynIC test
...ILABLE; +} + +static void synic_sint_auto_eoi_isr(isr_regs_t *regs) +{ + atomic_inc(&isr_enter_count[smp_id()]); +} + +static void synic_sint_isr(isr_regs_t *regs) +{ + atomic_inc(&isr_enter_count[smp_id()]); + eoi(); +} + +static void synic_ctl(u8 ctl, u8 vcpu_id, u8 sint) +{ + outl((ctl << 16)|((vcpu_id) << 8)|sint, 0x3000); +} + +struct sint_vec_entry { + int vec; + bool auto_eoi; +}; + +struct sint_vec_entry sint_vecs[HV_SYNIC_SINT_COUNT] = { + {0xB0, false}, + {0xB1, false}, + {0xB2, false}, + {0xB3, true}, + {0xB4, false}, + {0xB5, fals...
2015 Oct 26
3
[kvm-unit-tests PATCH] x86: hyperv_synic: Hyper-V SynIC test
...ILABLE; +} + +static void synic_sint_auto_eoi_isr(isr_regs_t *regs) +{ + atomic_inc(&isr_enter_count[smp_id()]); +} + +static void synic_sint_isr(isr_regs_t *regs) +{ + atomic_inc(&isr_enter_count[smp_id()]); + eoi(); +} + +static void synic_ctl(u8 ctl, u8 vcpu_id, u8 sint) +{ + outl((ctl << 16)|((vcpu_id) << 8)|sint, 0x3000); +} + +struct sint_vec_entry { + int vec; + bool auto_eoi; +}; + +struct sint_vec_entry sint_vecs[HV_SYNIC_SINT_COUNT] = { + {0xB0, false}, + {0xB1, false}, + {0xB2, false}, + {0xB3, true}, + {0xB4, false}, + {0xB5, fals...