search for: stolen

Displaying 20 results from an estimated 666 matches for "stolen".

2004 Jun 11
4
Regression query
...ble. + strike.out * run + strike.out * hr + hit * free.agent.eligible + free.agent.eligible * run + hit * free.agent.1991 + strike.out * free.agent.1991 + free.agent.1991 * batting + free.agent.1991 * obp + arbitr.elgible. * run + batting * double + obp * run + obp * hr + walk * stolen.base + hit * arbitr.1991 + free.agent.eligible * double + arbitr.elgible. * double + strike.out * triple + triple * batting + triple * walk + triple * walk + hit * hr + rbi * hr + free.agent.eligible * hr + free.agent.1991 * hr + arbitr.elgible. * hr + hr * arbitr.1991 + hit * walk...
2004 Jun 11
1
Regression query : steps for model building
...t * run + strike.out * hr + hit * free.agent.eligible + > free.agent.eligible * run + hit * free.agent.1991 + strike.out * > free.agent.1991 + free.agent.1991 * batting + free.agent.1991 * > obp + arbitr.elgible. * run + batting * double + obp * run + > obp * hr + walk * stolen.base + hit * arbitr.1991 + free.agent.eligible > * > double + arbitr.elgible. * double + strike.out * triple + > triple * batting + triple * walk + triple * walk + hit * > hr + rbi * hr + free.agent.eligible * hr + free.agent.1991 * > hr + arbitr.elgible. * hr + hr *...
2006 Oct 19
2
track a stolen laptop via rsync
My wife's Windows XP laptop was stolen a couple days ago. Every night the computer automatically preforms an rsync to a Debian Linux computer (the dumb-dumbs didn't steal that). My question: if the laptop successfully connects to the Linux box can you think of anyway I can use this fact to track the computer (maybe an IP address f...
2007 Apr 18
2
[PATCH RFC] Change softlockup watchdog to ignore stolen time
The softlockup watchdog is currently a nuisance in a virtual machine, since the whole system could have the CPU stolen from it for a long period of time. While it would be unlikely for a guest domain to be denied timer interrupts for over 10s, it could happen and any softlockup message would be completely spurious. Earlier I proposed that sched_clock() return time in unstolen nanoseconds, which is how Xen and VMI...
2007 Apr 18
2
[PATCH RFC] Change softlockup watchdog to ignore stolen time
The softlockup watchdog is currently a nuisance in a virtual machine, since the whole system could have the CPU stolen from it for a long period of time. While it would be unlikely for a guest domain to be denied timer interrupts for over 10s, it could happen and any softlockup message would be completely spurious. Earlier I proposed that sched_clock() return time in unstolen nanoseconds, which is how Xen and VMI...
2009 Mar 06
1
Process accounting in interrupt diabled cases
...ke we do for NO_HZ restart_sched_tick case, where we account for multiple idle ticks. IOW, doesn't process accounting need to account for these cases when interrupts are disabled for more than one tick period? I stumbled across this while trying to find a solution to figure out the amount of stolen time from Linux, when it is running under a hypervisor. One of the solutions could be to ask the hypervisor directly for this info, but in my quest to find a generic solution I think the below would work too. The total process time accounted by the system on a cpu ( system, idle, wait and etc) when...
2009 Mar 06
1
Process accounting in interrupt diabled cases
...ke we do for NO_HZ restart_sched_tick case, where we account for multiple idle ticks. IOW, doesn't process accounting need to account for these cases when interrupts are disabled for more than one tick period? I stumbled across this while trying to find a solution to figure out the amount of stolen time from Linux, when it is running under a hypervisor. One of the solutions could be to ask the hypervisor directly for this info, but in my quest to find a generic solution I think the below would work too. The total process time accounted by the system on a cpu ( system, idle, wait and etc) when...
2012 Mar 08
5
Samba4 how to remove a machine from the domain
Hi How do I remove a machine which is o longer connected to the domain? e.g. the has been stolen or just moved without having unjoined before. I want to be able to replace the machine with with a new box with same hostname. Thanks, Steve
2012 Aug 09
1
[PATCH] drm/nouveau/nv50: Reclock when memory was stolen
Here's a quick-but-I-guess-tidy-fix for faulty behaviour someone reported in NVAF. I'm just not sure if the check for nvaa/nvac should still be in nv50_pm_clocks_pre... I believe this is wrong as they can reclock perfectly well (except the non-existing memory). Anyone has a definite answer to that?
2015 Feb 11
2
Another Fedora decision
...t clear: I recommended the book itself without pointing to > any source of it, and when pirate copy was mentioned by somebody else, I > had to say I do not recommend that source and would recommend to buy the > book on amazon. The person asserting the copy was "pirated" (meaning stolen) has no proof it was stolen. Just because someone jumps up and down shouting various things, can not in law make any of those things a fact. To prove something one needs FACTS which is also known as evidence. No evidence exists that the copy was stolen. Justice depends on factual information not...
2007 Jan 30
45
[PATCH] Fix softlockup issue after vcpu hotplug
Stamp softlockup thread earlier before do_timer, because the latter is the one to actually trigger lock warning for long-time offline. Or else, I obserevd softlockup warning easily at manual vcpu hot-remove/plug, or when suspend cancel into old context. One point here is to cover both stolen and blocked time to compare with offline threshold. vcpu hotplug falls into ''stolen'' case, but it''s not enough. Considering xen time model is tickless at idle, it''s possible that big block time is requested which also inflames softlockup thread. Signed-off-by Ke...
2014 May 08
2
[PATCH v10 09/19] qspinlock: Prepare for unfair lock support
On Wed, May 07, 2014 at 11:01:37AM -0400, Waiman Long wrote: > If unfair lock is supported, the lock acquisition loop at the end of > the queue_spin_lock_slowpath() function may need to detect the fact > the lock can be stolen. Code are added for the stolen lock detection. > > A new qhead macro is also defined as a shorthand for mcs.locked. NAK, unfair should be a pure test-and-set lock. > /** > * get_qlock - Set the lock bit and own the lock > - * @lock: Pointer to queue spinlock structure > + *...
2014 May 08
2
[PATCH v10 09/19] qspinlock: Prepare for unfair lock support
On Wed, May 07, 2014 at 11:01:37AM -0400, Waiman Long wrote: > If unfair lock is supported, the lock acquisition loop at the end of > the queue_spin_lock_slowpath() function may need to detect the fact > the lock can be stolen. Code are added for the stolen lock detection. > > A new qhead macro is also defined as a shorthand for mcs.locked. NAK, unfair should be a pure test-and-set lock. > /** > * get_qlock - Set the lock bit and own the lock > - * @lock: Pointer to queue spinlock structure > + *...
2018 Apr 18
4
[RFC PATCH net-next v6 2/4] net: Introduce generic bypass module
...; is also misleading. Both "active" and "backup" >> >> mean a *state* of slaves. This should be named differently. >> >> >> >> >> >> >> >> > With regards to alternate names for 'active', you suggested 'stolen', but i >> >> > am not too happy with it. >> >> > netvsc uses vf_netdev, are you OK with this? Or another option is 'passthru' >> >> No. The netdev could be any netdevice. It does not have to be a "VF". >> >> I think "...
2018 Apr 18
4
[RFC PATCH net-next v6 2/4] net: Introduce generic bypass module
...; is also misleading. Both "active" and "backup" >> >> mean a *state* of slaves. This should be named differently. >> >> >> >> >> >> >> >> > With regards to alternate names for 'active', you suggested 'stolen', but i >> >> > am not too happy with it. >> >> > netvsc uses vf_netdev, are you OK with this? Or another option is 'passthru' >> >> No. The netdev could be any netdevice. It does not have to be a "VF". >> >> I think "...
2013 May 08
12
[PATCH v3 0/4] xen/arm: CONFIG_PARAVIRT and stolen ticks accounting
Hi all, this patch series introduces stolen ticks accounting for Xen on ARM. Stolen ticks are clocksource ticks that have been "stolen" from the cpu, typically because Linux is running in a virtual machine and the vcpu has been descheduled. To account for these ticks we introduce CONFIG_PARAVIRT and pv_time_ops so that we can make...
2000 Sep 04
3
somebody's stolen my probabilities
gday gurus, could someone please help me with this one? Can't find it in the doco. summary of my lm object gives "Pr(>|t|)" but coef doesn't. How do I get hold of these probabilities within an object? There doesn't seem to be an appropriate attribute within the object - I was hoping for something like "my.lm$probabilies". I was hoping to grab the best t
2017 Nov 17
2
Blank console but X11 works on MCP79 - old regression since 3.8
Hello, I've just been hit by this old bug which is still present in 4.14: https://bugs.freedesktop.org/show_bug.cgi?id=80675 On MCP79 (ION), when stolen memory is set to 32MB in BIOS, console is blank but X11 works. When the stolen memory is increased to 64MB, console works fine. Bisected it to this: 4f6029da58ba9204c98e33f4f3737fe085c87a6f is the first bad commit commit 4f6029da58ba9204c98e33f4f3737fe085c87a6f Author: Ben Skeggs <bskeggs at...
2006 Jul 28
1
escape/unescape attribution
...t filing this as a bug, but simply as confusion. In the mongrel.rb, you have a comment that says this about the self.escape method: # Performs URI escaping so that you can construct proper # query strings faster. Use this rather than the cgi.rb # version since it''s faster. (Stolen from Camping). def self.escape(s) s.to_s.gsub(/([^ a-zA-Z0-9_.-]+)/n) { ''%''+$1.unpack(''H2''*$1.size).join(''%'').upcase }.tr('' '', ''+'') end That "Stolen from Camping" thing p...
2023 Feb 24
1
How to get a server listed in the IMAP Test wiki?
Something I can't quite place finger on here. Altogether too much Mafia, in the bulk email business generally, and I know Switzerland borders on Italy ... This sounds, (albeit vaguely,) altogether too much like the thieves I seem to have fallen amongst lately. Two stolen trucks, three stolen laptops, another one wrecked, three or four stolen cell phones, passwords GPG keys, city hall hookers and towers and parking masters took everything the first moment I turned my back on it. Smashed the windows, hot wired the ignition at 4am assaulted me, mugged me in the street...