Displaying 20 results from an estimated 55 matches for "unsiged".
Did you mean:
unsigned
2011 Mar 14
0
[LLVMdev] How to load a data from the address of unsiged long type
Hi Michael,
> Now I have an address that present in a unsigned long address like the
> following format:
> Value* addr = CONST(0xc0008000)
what is the type of addr? For that matter, what is CONST - what does it do?
Ciao, Duncan.
>
> But I do not know how to read the data from the above addr varaible. I
> tried the following three kind of code:
> 1. Code:
>
2011 Mar 14
2
[LLVMdev] How to load a data from the address of unsiged long type
Now I have an address that present in a unsigned long address like the
following format:
Value* addr = CONST(0xc0008000)
But I do not know how to read the data from the above addr varaible. I
tried the following three kind of code:
1. Code:
Value* addr = CONST(0xc0008000);
Value* data = new LoadInst(addr, "", false, bb);
Error:
Segmentation fault
2. Code(
2002 Jul 26
6
What tags are allowed in ogg files?
Hi,
I'm writing a tag-editor for ogg files.
What tags, besides ogg-tags, are allowed in ogg files (if any).
I'm thinking of id3v1, id3v2, ape tags and so on.
I have a (probably small) problem with writing a new "comment header". I
have tried opening a file with a valid header, and then simply moved some of
the comment tags position,
so that the total size and the count still
2007 Feb 14
2
[PATCH 8/8] 2.6.17: scan DMI early
While shuffling quite a few things around, this gets us closer to native,
which clearly had a reason to do the DMI scan early.
Signed-off-by: Jan Beulich <jbeulich@novell.com>
Index: head-2007-02-08/arch/i386/mm/ioremap-xen.c
===================================================================
--- head-2007-02-08.orig/arch/i386/mm/ioremap-xen.c 2007-02-08 17:07:13.000000000 +0100
+++
2013 Sep 23
11
[PATCH v4 0/4] x86/HVM: miscellaneous improvements
The first and third patches are cleaned up versions of an earlier v3
submission by Yang.
1: Nested VMX: check VMX capability before read VMX related MSRs
2: VMX: clean up capability checks
3: Nested VMX: fix IA32_VMX_CR4_FIXED1 msr emulation
4: x86: make hvm_cpuid() tolerate NULL pointers
Signed-off-by: Jan Beulich <jbeulich@suse.com>
2006 Sep 22
0
[XenPPC] Re: [PATCH] Fix BUG in alloc_heap_pages
This is an important find, it may require an audit of uses list_del
where its use is not immediately by some form of destruction of the
containing object.
-JX
On Sep 21, 2006, at 6:21 PM, Amos Waterland wrote:
> I believe it is the case that if the last element of a list is deleted
> with list_del(), and then the list is scanned with list_empty(),
> undefined results can occur. The
2007 Apr 30
0
[PATCH] lguest: properly kill guest userspace programs accessing kernel mem
Kernel pages on x86 are protected by not having the _PAGE_USER bit
set. When guest userspace accesses a kernel page, we didn't check
this, so we'd think we'd handled the fault and return to the guest,
causing the guest userspace program to loop instead of segfaulting.
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
---
drivers/lguest/core.c | 2 +-
2007 Apr 30
0
[PATCH] lguest: properly kill guest userspace programs accessing kernel mem
Kernel pages on x86 are protected by not having the _PAGE_USER bit
set. When guest userspace accesses a kernel page, we didn't check
this, so we'd think we'd handled the fault and return to the guest,
causing the guest userspace program to loop instead of segfaulting.
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
---
drivers/lguest/core.c | 2 +-
2006 May 17
1
RE: RE: [Xen-changelog] Fix MOVS instruction emulation for HVM MMIO.
> -----Original Message-----
> From: xen-devel-bounces@lists.xensource.com
> [mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of
> Gerd Hoffmann
> Sent: 17 May 2006 07:43
> To: Petersson, Mats
> Cc: xen-devel@lists.xensource.com; xen-changelog@lists.xensource.com
> Subject: Re: [Xen-devel] RE: [Xen-changelog] Fix MOVS
> instruction emulation for HVM MMIO.
>
2005 Feb 19
0
[PATCH] check read/write return values
The Fedora build system is in paranoid mode, and compiles everything
with -Werror. Additionally, it checks that the return values of calls
like read and write are checked.
The build exits with errors like:
xen/lowlevel/xc/xc.c: In function `pyxc_vmx_build'':
xen/lowlevel/xc/xc.c:464: warning: ignoring return value of `sscanf'', declared with attribute warn_unused_result
2009 Dec 16
0
[LLVMdev] [PATCH] Circular Buffered Debug Stream
...ay
> since it is fixed size.
Ok.
> Why is BufferSize needed with the vector? Isn't it always the size of
> BufferArray? Also, why is it signed?
Well, you need it with a new[]'d array. :)
It's signed because running loops with signed induction variables is better
than with unsiged induction variables. In this case it's moot because
::write_impl is passed a size_t anyway.
It's just learned habit by me to make anything having to do with induction
variables signed.
I'll make it unsigned.
> What does DelayOutput do? Even reading the code, I don't really...
2011 Nov 24
0
[PATCH 6/6] X86: implement PCID/INVPCID for hvm
X86: implement PCID/INVPCID for hvm
This patch handle PCID/INVPCID for hvm:
For hap hvm, we enable PCID/INVPCID, since no need to intercept INVPCID, and we just set INVPCID non-root behavior as running natively;
For shadow hvm, we disable PCID/INVPCID, otherwise we need to emulate INVPCID at vmm by setting INVPCID non-root behavior as vmexit.
Signed-off-by: Liu, Jinsong
2009 Dec 16
2
[LLVMdev] [PATCH] Circular Buffered Debug Stream
On Dec 16, 2009, at 8:12 AM, David Greene wrote:
>>>
>>> What, specifically, do you want reviewed before I start checking in?
>>> I'll be happy to prepare a patch that shows just that.
>>
>> I want a patch that does one thing (e.g. implements dbgs(),
>
> Ok, let's start with that. Here's the patch to add the circular raw_ostream.
This
2013 Oct 10
10
[PATCH 0/4] x86: XSA-67 follow-up
1: correct LDT checks
2: add address validity check to guest_map_l1e()
3: use {rd,wr}{fs,gs}base when available
4: check for canonical address before doing page walks
Signed-off-by: Jan Beulich <jbeulich@suse.com>
2007 Apr 18
1
[Bridge] [PATCH/RFC] Reduce call chain length in netfilter (take 2)
Hi,
This is a second try to fix the long chain call lengths in netfilter.
The difference with the previous patch is that I got rid of the extra
argument. I somehow didn't see it could be done without using the 'int
*ret2' argument.
A comment on the number of arguments to nf_hook_slow: I don't think the
number of arguments should be decreased. For the bridge-nf code, f.e.,
the
2007 Aug 09
0
[PATCH] x86/hvm: miscellaneous CPUID handling changes
- use __clear_bit() rather than clear_bit()
- use switch statements instead of long series of if-s
- eliminate pointless casts
(Applies cleanly only on top of the previously sent SVM/EFER patch.)
Signed-off-by: Jan Beulich <jbeulich@novell.com>
Index: 2007-08-08/xen/arch/x86/hvm/hvm.c
===================================================================
---
2007 Apr 18
0
[RFC/PATCH PV_OPS X86_64 08/17] paravirt_ops - memory managment
plain text document attachment (xx-paravirt-mm.patch)
Memory management for paravirt_ops.
Signed-off-by: Steven Rostedt srostedt@redhat.com
Signed-off-by: Glauber de Oliveira Costa <gcosta@redhat.com>
Index: clean-start/arch/x86_64/mm/fault.c
===================================================================
--- clean-start.orig/arch/x86_64/mm/fault.c
+++
2007 Apr 18
0
[RFC/PATCH PV_OPS X86_64 08/17] paravirt_ops - memory managment
plain text document attachment (xx-paravirt-mm.patch)
Memory management for paravirt_ops.
Signed-off-by: Steven Rostedt srostedt@redhat.com
Signed-off-by: Glauber de Oliveira Costa <gcosta@redhat.com>
Index: clean-start/arch/x86_64/mm/fault.c
===================================================================
--- clean-start.orig/arch/x86_64/mm/fault.c
+++
2006 Sep 29
0
[PATCH 2/6] xen: add per-node bucks to page allocator
This patch adds a per-node bucket to the heap structure in Xen. During
heap initialization the patch determines which bucket to place the
memory. We reserve guard pages between node boundaries in the case that
said boundary isn''t already guarded by the MAX_ORDER boundary to prevent
the buddy allocator from merging pages between nodes.
--
Ryan Harper
Software Engineer; Linux Technology
2007 Apr 18
3
[Bridge] Re: do_IRQ: stack overflow: 872..
On Fri, 07 Jan 2005 17:05:59 +0000
David Woodhouse <dwmw2@infradead.org> wrote:
> On Sat, 2004-12-18 at 08:50 +0100, Andi Kleen wrote:
> > It's not really an oops, just a warning that stack space got quiet
> > tight.
> >
> > The problem seems to be that the br netfilter code is nesting far too
> > deeply and recursing several times. Looks like a design