Displaying 20 results from an estimated 45 matches for "outl".
Did you mean:
out
2013 Feb 18
3
DomU trying to write on an IO Port
...,
I am running xen-hypervisor over qemu. Now while running domU I want to
write on an IO port, which I''ll be handling inside Qemu. Basically, this is
a communication mechanism for me to communicate with qemu. I am writing on
port number ''0x378'' as a root user using "outl" function. But when I run
this code in domU, it does not reach qemu.
So my question is: Is there some mechanism in xen which handles writing on
IO ports and in case its not a valid IO Port then just discards the write.
--
Regards,
Nitin Gupta
_____________________________________________...
2008 Apr 10
8
[PATCH][RFC]Move PCI Configuration Spaces from Dom0 to Xen
Hi, Keir,
This patch will move reading and writing of PCI configuration spaces
from dom0 to Xen. It also changes VTD code, so that they can touch the
PCI configuration spaces with proper lock.
This will also benefit MSI support in Xen.
Can you give some comments? Thanks!
<<pci_conf_xen.patch>>
Best Regards
Haitao Shan
_______________________________________________
Xen-devel
2004 Jan 24
1
iopl()
...000100
eip:765e eax:0100 ebx:0000 ecx:0320 edx:de04 esi:03f5 edi:0087 ebp:0000
esp:6b62 cs:c000 ss:c000 es:0000 ds:c000 fs:0000 gs:0000 eflags:00000246
exception:
code at 0x000c7661: 66 ef 5a 59 66 58 9d c3 53 bb 02 00 e8 5e ff 5b
c3 53 bb 05 00 e8 55 ff 5b c3 53 bb 0d 00 e8 4c
outl(0xde04, 00000000)
eip:7663 eax:0000 ebx:0000 ecx:0320 edx:de04 esi:03f5 edi:0087 ebp:0000
esp:6b62 cs:c000 ss:c000 es:0000 ds:c000 fs:0000 gs:0000 eflags:00000246
exception:
code at 0x000c5ab6: 66 ef ba fc 0c 66 ed 9d c3 51 eb 12 51 32 c9 eb
0d 51 b1 01 eb 08 51 b1 02 eb 03 51 b...
2006 Jan 25
0
Interpolating spline problems and akima
...t;-dat.interp$y[j]
+ } }
but this does not....?
> day<-c(1,2,3,4,5,6,7,8,9,10)
> datfile<-c(17,6,29,22,90,72,20,4,4,NA)
> for (i in 1:10) {
+ dat<-datfile
+ dat.ok <- !is.na(dat)
+ dat2<-dat[dat.ok]
+ day2<-day[dat.ok]
+
+ dat.interp<-spline(day2,dat2,length(day))
+ outl<-rep(NA,length(day))
+ for (j in 1:length(dat.interp$x)) {
+ outl[j]<-dat.interp$y[j]
+ } }
...........................................................................
Dr Tom C Cameron office: 0113 34 32837 (10.23 Miall)
Ecology & Evolution Res. Group....
2014 Jan 16
2
Quitar outliers por condición
Hola buenos días,
ahora mismo estaba haciendo una función para quitar outlier por condición.
Pero lo cierto es que aunque la función consigue quitarlos creo que me ha
quedad bastante farragoso. Os dejo el codigo y si me dais algún consejo
para mejorarlo mejor que mejor. Mcuhas gracias
#############################################################•
# Ojo este script puede...
2008 Mar 07
1
Help with 'memory not mapped'
...t sometimes I get the error:
-------
*** caught segfault ***
address 0x1c404ec8, cause 'memory not mapped'
Traceback:
1: .Call("rrfunc", as.double(dx), as.integer(nrows), as.integer(ncols),
as.double(deltadt), as.character(binmaps), as.integer(ldd),
as.double(downst),as.integer(outl), as.double(maxinte), as.double(nmn))
2: rrfuncR(dx, nrows, ncols, delta.t,binmaps.pathed,ldd,downst,
out.index,interc,n.man)
3: eval.with.vis(expr, envir, enclos)
4: eval.with.vis(ei, envir)
5: source("rrprogv1_2.R")
6: eval.with.vis(expr, envir, enclos)
7: eval.with.vis(ei, envir)...
2016 Nov 02
0
v2.2.26.0 released
...L && !defined(LIBRESSL_VERSION_NUMBER)
ec = HMAC_Update(ctx->ctx, data, data_len);
#else
ec = HMAC_Update(&(ctx->ctx), data, data_len);
@@ -498,7 +498,7 @@ bool dcrypt_openssl_ctx_hmac_final(struct dcrypt_conte
int ec;
unsigned char buf[HMAC_MAX_MD_CBLOCK];
unsigned int outl;
-#if OPENSSL_VERSION_NUMBER >= 0x10100000L
+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
ec = HMAC_Final(ctx->ctx, buf, &outl);
HMAC_CTX_free(ctx->ctx);
ctx->ctx = NULL;
@@ -2133,7 +2133,7 @@ bool dcrypt_openssl_public_key_id_evp(E...
2014 Aug 29
2
[LLVMdev] The problem of densemap and loop
...!F->isDeclaration()){}
else{
LoopInfo *LI = &getAnalysis<LoopInfo>(*F);
WCETInfo *WI = &getAnalysis<WCETInfo>(); //WI is the ImmutablePass which contains the dense map
for(LoopInfo::iterator i=LI->begin(); i!=LI->end(); ++i) {
Loop *L = *i;
int lb=0;
lb=WI->outls(L); // the method: return ls.find(L)->second;
}
}
} "
Thank you
Sincerely,
Hanbing
----- Mail original -----
> De: "John Criswell" <jtcriswel at gmail.com>
> À: "Hanbing Li" <hanbing.li at inria.fr>, llvmdev at cs.uiuc.edu
> Envoyé: J...
2014 Nov 15
0
Processed: tagging 659642
Processing commands for control at bugs.debian.org:
> tags 659642 + moreinfo
Bug #659642 [xen-hypervisor-4.0-amd64] xen-hypervisor-4.0-amd64: outl segfaults when restoring monitor from sleep with DPMS
Added tag(s) moreinfo.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
659642: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659642
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
2014 Nov 24
0
Processed: closing 659642
Processing commands for control at bugs.debian.org:
> close 659642
Bug #659642 [xen-hypervisor-4.0-amd64] xen-hypervisor-4.0-amd64: outl segfaults when restoring monitor from sleep with DPMS
Marked Bug as done
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
659642: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659642
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
2012 Aug 30
1
[PATCH 04/11] vmci_driver.patch: VMCI device driver.
...capabilities |= VMCI_CAPS_NOTIFICATIONS;
+ }
+ } else {
+ capabilities = VMCI_CAPS_DATAGRAM;
+ }
+ pr_info("Using capabilities 0x%x.", capabilities);
+
+ /* Let the host know which capabilities we intend to use. */
+ outl(capabilities, ioaddr + VMCI_CAPS_ADDR);
+
+ /* Device struct initialization. */
+ mutex_lock(&vmci_dev.lock);
+ if (vmci_dev.enabled) {
+ pr_err("Device already enabled.");
+ goto unlock;
+ }
+
+ vmci_dev.ioaddr = ioaddr;
+...
2012 Aug 30
1
[PATCH 04/11] vmci_driver.patch: VMCI device driver.
...capabilities |= VMCI_CAPS_NOTIFICATIONS;
+ }
+ } else {
+ capabilities = VMCI_CAPS_DATAGRAM;
+ }
+ pr_info("Using capabilities 0x%x.", capabilities);
+
+ /* Let the host know which capabilities we intend to use. */
+ outl(capabilities, ioaddr + VMCI_CAPS_ADDR);
+
+ /* Device struct initialization. */
+ mutex_lock(&vmci_dev.lock);
+ if (vmci_dev.enabled) {
+ pr_err("Device already enabled.");
+ goto unlock;
+ }
+
+ vmci_dev.ioaddr = ioaddr;
+...
2016 Nov 02
2
v2.2.26.0 released
If the standard way works, I am happy to include the original patch I
sent, amended so that it checks for presence of LIBRESSL_VERSION_NUMBER.
If they keep this promise, then we should have no worries about things
breaking up.
Aki
On 02.11.2016 14:24, Michael A. Peters wrote:
> Indeed, which is why I use it.
>
> But it also is in the minority which is why I find it acceptable for
2012 Jul 12
0
Processed: tagging 430778, tagging 430676, tagging 603366, tagging 602378, tagging 675266, tagging 600241 ...
...entation issue?)
Added tag(s) upstream.
> tags 658263 + upstream
Bug #658263 [xen-hypervisor-4.0-amd64] xen-hypervisor-4.0-amd64: Different network traffic values from dom0 vs domU
Added tag(s) upstream.
> tags 659642 + upstream
Bug #659642 [xen-hypervisor-4.0-amd64] xen-hypervisor-4.0-amd64: outl segfaults when restoring monitor from sleep with DPMS
Added tag(s) upstream.
> tags 603391 + upstream
Bug #603391 [xen-utils-4.0] pygrub: unintelligible error messages
Added tag(s) upstream.
> tags 614101 + upstream
Bug #614101 [xen-hypervisor-4.0-amd64] Debian 6.0 amd64 doesn't boot with...
2016 Apr 13
0
[PATCH 1/1] x32 support
...ine__ void outb(__u8 __v, __u16 __p)
+{
+ asm volatile ("outb %0,%1" : : "a" (__v), "dN"(__p));
+}
+
+static __inline__ void outw(__u16 __v, __u16 __p)
+{
+ asm volatile ("outw %0,%1" : : "a" (__v), "dN"(__p));
+}
+
+static __inline__ void outl(__u32 __v, __u16 __p)
+{
+ asm volatile ("outl %0,%1" : : "a" (__v), "dN"(__p));
+}
+
+static __inline__ __u8 inb(__u16 __p)
+{
+ __u8 __v;
+ asm volatile ("inb %1,%0" : "=a" (__v) : "dN"(__p));
+ return __v;
+}
+
+static __inline__ __u16...
2012 Feb 12
0
Bug#659642: xen-hypervisor-4.0-amd64: outl segfaults when restoring monitor from sleep with DPMS
...sr/bin/Xorg (0x400000+0x4c734) [0x44c734]
11: /usr/bin/Xorg (0x400000+0x25c35) [0x425c35]
12: /lib/libc.so.6 (__libc_start_main+0xfd) [0x7f889b52ac8d]
13: /usr/bin/Xorg (0x400000+0x257e9) [0x4257e9]
Segmentation fault at address (nil)
and debugging Xorg with gdb reveals:
#0 0x00007f88988ec775 in outl (port=61440, val=323652) at
.../../../../hw/xfree86/common/compiler.h:438
#1 x_outl (port=61440, val=323652) at
.../../../../hw/xfree86/int10/helper_exec.c:423
#2 0x00007f88988f3613 in x86emuOp_out_word_DX_AX (op1=<value optimized out>)
at ../../../../hw/xfree86/int10/../x86emu/ops.c:98...
2006 Jun 26
0
[klibc 37/43] x86_64 support for klibc
...nsigned short __p)
+{
+ asm volatile ("outb %0,%1" : : "a" (__v), "dN"(__p));
+}
+
+static __inline__ void outw(unsigned short __v, unsigned short __p)
+{
+ asm volatile ("outw %0,%1" : : "a" (__v), "dN"(__p));
+}
+
+static __inline__ void outl(unsigned int __v, unsigned short __p)
+{
+ asm volatile ("outl %0,%1" : : "a" (__v), "dN"(__p));
+}
+
+static __inline__ unsigned char inb(unsigned short __p)
+{
+ unsigned char __v;
+ asm volatile ("inb %1,%0" : "=a" (__v) : "dN"(__p));
+...
2009 Apr 26
5
Problems installing NfS2
...8 0x004011e0 in _ins0432._mp (+0x11e0) (0x0033fe3c)
9 0x00401824 in _ins0432._mp (+0x1824) (0x0033fe74)
10 0x00487edd in _ins0432._mp (+0x87edd) (0x0033ff08)
11 0x7b878828 in kernel32 (+0x58828) (0x0033ffe8)
12 0xb7f1fd37 wine_switch_to_stack+0x17() in libwine.so.1 (0x00000000)
0x003a3723: outl %eax,%dx
Modules:
Module Address Debug info Name (83 modules)
PE 340000- 34e000 Deferred _wutl95
PE 3a0000- 3b1000 Export shell
PE 400000- 4ae000 Export _ins0432._mp
PE 10000000-1002f000 Deferred a3c
ELF 7b800000-7b93d000 Export kernel32<elf>...
2015 Oct 26
3
[kvm-unit-tests PATCH] x86: hyperv_synic: Hyper-V SynIC test
...ILABLE;
+}
+
+static void synic_sint_auto_eoi_isr(isr_regs_t *regs)
+{
+ atomic_inc(&isr_enter_count[smp_id()]);
+}
+
+static void synic_sint_isr(isr_regs_t *regs)
+{
+ atomic_inc(&isr_enter_count[smp_id()]);
+ eoi();
+}
+
+static void synic_ctl(u8 ctl, u8 vcpu_id, u8 sint)
+{
+ outl((ctl << 16)|((vcpu_id) << 8)|sint, 0x3000);
+}
+
+struct sint_vec_entry {
+ int vec;
+ bool auto_eoi;
+};
+
+struct sint_vec_entry sint_vecs[HV_SYNIC_SINT_COUNT] = {
+ {0xB0, false},
+ {0xB1, false},
+ {0xB2, false},
+ {0xB3, true},
+ {0xB4, false},
+ {0xB5, fals...
2015 Oct 26
3
[kvm-unit-tests PATCH] x86: hyperv_synic: Hyper-V SynIC test
...ILABLE;
+}
+
+static void synic_sint_auto_eoi_isr(isr_regs_t *regs)
+{
+ atomic_inc(&isr_enter_count[smp_id()]);
+}
+
+static void synic_sint_isr(isr_regs_t *regs)
+{
+ atomic_inc(&isr_enter_count[smp_id()]);
+ eoi();
+}
+
+static void synic_ctl(u8 ctl, u8 vcpu_id, u8 sint)
+{
+ outl((ctl << 16)|((vcpu_id) << 8)|sint, 0x3000);
+}
+
+struct sint_vec_entry {
+ int vec;
+ bool auto_eoi;
+};
+
+struct sint_vec_entry sint_vecs[HV_SYNIC_SINT_COUNT] = {
+ {0xB0, false},
+ {0xB1, false},
+ {0xB2, false},
+ {0xB3, true},
+ {0xB4, false},
+ {0xB5, fals...