Displaying 20 results from an estimated 2000 matches similar to: "Welcome to my hometown [#1503726]"
2004 Feb 21
0
A WinXP patch [#1503743]
Dear Sir/Madam,
Hello, and thank you for contacting eHarmony Customer Care.
This is an automated response to let you know that we received your email and are working to give you a thoughtful and informative reply.
Due to tremendous growth we are experiencing a high volume of inquiries. We will reply within 2-3 days. We want you to know that we are working hard to shorten this response time
2004 Mar 24
0
<AUTO> 'Getty=001-531-403'Notice again
Hello and thank you for your email. We strive to respond to all email inquiries within one business day. If your issue cannot wait that long, please call us at 877-438-8966. Our hours are 6:00 a.m. to 6:00 p.m. Pacific Standard Time, Monday through Friday.
For reference, your assigned case ID is:1531403
-----Original Message-----
From: r-help at hypatia.math.ethz.ch [r-help at
2015 Jun 05
3
how do I make my headset work
On Fri, 5 Jun 2015, g wrote:
> On 06/05/2015 03:43 PM, John R Pierce wrote:
>> On 6/5/2015 1:33 PM, Michael Hennebry wrote:
>>> It's a desktop in an old house.
>>> The outlets have ground-fault protection,
>>> but the third prong is ungrounded.
>>
>> not sure how GFI would function at all without a valid ground, unless
>> the GFI is wired
2015 Jun 05
0
how do I make my headset work
On 06/05/2015 03:43 PM, John R Pierce wrote:
> On 6/5/2015 1:33 PM, Michael Hennebry wrote:
>> It's a desktop in an old house.
>> The outlets have ground-fault protection,
>> but the third prong is ungrounded.
>
> not sure how GFI would function at all without a valid ground, unless
> the GFI is wired to neutral, which is dangerous on its own.
very. it defeats
2015 Jun 05
2
how do I make my headset work
On 6/5/2015 1:33 PM, Michael Hennebry wrote:
> It's a desktop in an old house.
> The outlets have ground-fault protection,
> but the third prong is ungrounded.
>
not sure how GFI would function at all without a valid ground, unless
the GFI is wired to neutral, which is dangerous on its own.
you might get a 3-prong-to-2-prong adapter and plug the PC into that,
leaving the ground
2007 Apr 20
1
POP3 log in failure after switch to dovecot from Cyrus
I can set up and access a dovecot pop3 account using outlook express fine. I can telnet into it fine. However, GFI FaxMaker is failing to log in.
I assisted a client in switching his web site, including email from one server (FreeBSD) which was using Cyrus to a Redhat 4.0 server using dovecot version 0.99.11
Here's the listing of dovecot -n:
dovecot -n
Usage: dovecot [-F] [-c <config
2004 Apr 12
3
cp -al issues
Hi,
I'm having some strange issues when using cp in my rsync script. It
seems there may be links breaking or something.
Before running the actual rsync I run the following command in my
script:
cp -al /backup/Current /backup/$prevday
Then I rsync from the source to /Current
So shouldn't all my previous days have hard links back to the original
/backup directory?
Sometimes the
2010 Sep 25
2
[LLVMdev] Strange exception in SelectionDAGBuilder
I'm working on the code to handle GC tracing of "intermediate values" (as
described in the GC doc), and I've run into a weird problem. (Note, this has
nothing to do with the patch I have proposed, this error occurs with regular
old pointer-allocas.)
The exception I am getting occurs in this code here in
SelectionDAGBuilder.cpp:
*case* *Intrinsic*::gcroot:
*if* (GFI) {
2010 Sep 26
0
[LLVMdev] Strange exception in SelectionDAGBuilder
Hi Talin,
I think that the framework for GC assumes llvm.gcroot to be in the first
block. If it is not the case in your example, it will break these
assumptions.
Nicolas
On Sun, Sep 26, 2010 at 1:38 AM, Talin <viridia at gmail.com> wrote:
> I'm working on the code to handle GC tracing of "intermediate values" (as
> described in the GC doc), and I've run into a
2019 Aug 09
0
[RFC PATCH v6 14/92] kvm: introspection: handle introspection commands before returning to guest
From: Mihai Don?u <mdontu at bitdefender.com>
The introspection requests (KVM_REQ_INTROSPECTION) are checked by any
introspected vCPU in two places:
* on its way to guest - vcpu_enter_guest()
* when halted - kvm_vcpu_block()
In kvm_vcpu_block(), we check to see if there are any introspection
requests during the swait loop, handle them outside of swait loop and
start swait again.
2019 Aug 09
0
[RFC PATCH v6 26/92] kvm: x86: add kvm_mmu_nested_pagefault()
From: Mihai Don?u <mdontu at bitdefender.com>
This is needed to filter #PF introspection events.
Signed-off-by: Mihai Don?u <mdontu at bitdefender.com>
Co-developed-by: Nicu?or C??u <ncitu at bitdefender.com>
Signed-off-by: Nicu?or C??u <ncitu at bitdefender.com>
Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com>
---
arch/x86/include/asm/kvm_host.h | 4 ++++
2020 Feb 07
0
[RFC PATCH v7 19/78] KVM: x86: add .control_msr_intercept()
From: Mihai Don?u <mdontu at bitdefender.com>
This is needed for the KVMI_EVENT_MSR event.
Signed-off-by: Mihai Don?u <mdontu at bitdefender.com>
Co-developed-by: Nicu?or C??u <ncitu at bitdefender.com>
Signed-off-by: Nicu?or C??u <ncitu at bitdefender.com>
Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com>
---
arch/x86/include/asm/kvm_host.h | 2 ++
2020 Jul 21
0
[PATCH v9 20/84] KVM: x86: add .control_msr_intercept()
From: Mihai Don?u <mdontu at bitdefender.com>
This is needed for the KVMI_EVENT_MSR event, which is used notify the
introspection tool about any change made to a MSR of interest.
Signed-off-by: Mihai Don?u <mdontu at bitdefender.com>
Co-developed-by: Nicu?or C??u <ncitu at bitdefender.com>
Signed-off-by: Nicu?or C??u <ncitu at bitdefender.com>
Signed-off-by: Adalbert
2010 Jan 20
0
need help with nested forms and habtm
Hi,
I''m currently stuck with a problem I just can''t find a clever solution
for. I checked every tutorial, issuetracker, API reference I could
find but found nothing to "enlighten" me --> I desperately need your
help :-).
My Question is: is it possible to use nested forms for habtm
associations?
--> Here some more info about what I wanted to do and what failed
2020 Jul 21
0
[PATCH v9 23/84] KVM: x86: add .fault_gla()
From: Mihai Don?u <mdontu at bitdefender.com>
This function is needed for kvmi_update_ad_flags()
and kvm_page_track_emulation_failure().
kvmi_update_ad_flags() uses the the existing guest page table walk code
to update the A/D bits and return to guest (on SPT page faults caused
by guest page table walks when the introspection tool write-protects
the guest page tables).
2020 Feb 07
0
[RFC PATCH v7 48/78] KVM: introspection: handle vCPU introspection requests
From: Mihai Don?u <mdontu at bitdefender.com>
The introspection requests (KVM_REQ_INTROSPECTION) are checked before
entering guest or when the vCPU is halted.
Signed-off-by: Mihai Don?u <mdontu at bitdefender.com>
Co-developed-by: Mircea C?rjaliu <mcirjaliu at bitdefender.com>
Signed-off-by: Mircea C?rjaliu <mcirjaliu at bitdefender.com>
Co-developed-by: Adalbert Laz?r
2020 Feb 07
0
[RFC PATCH v7 63/78] KVM: introspection: add KVMI_VM_GET_MAX_GFN
From: ?tefan ?icleru <ssicleru at bitdefender.com>
The introspection tool can use this to set access restrictions for a
wide range of guest addresses.
Signed-off-by: ?tefan ?icleru <ssicleru at bitdefender.com>
Co-developed-by: Nicu?or C??u <ncitu at bitdefender.com>
Signed-off-by: Nicu?or C??u <ncitu at bitdefender.com>
Signed-off-by: Adalbert Laz?r <alazar at
2020 Feb 07
0
[RFC PATCH v7 49/78] KVM: introspection: handle vCPU commands
From: Mihai Don?u <mdontu at bitdefender.com>
Based on the common structure (kvmi_vcpu_hdr) used for all vCPU commands,
the receiving thread validates and dispatches the message to the proper
vCPU (adding the handling function to its jobs list).
Signed-off-by: Mihai Don?u <mdontu at bitdefender.com>
Co-developed-by: Nicu?or C??u <ncitu at bitdefender.com>
Signed-off-by: Nicu?or
2020 Jul 21
0
[PATCH v9 50/84] KVM: introspection: handle vCPU commands
From: Mihai Don?u <mdontu at bitdefender.com>
Based on the common structure (kvmi_vcpu_hdr) used for all vCPU commands,
the receiving thread validates and dispatches the message to the proper
vCPU (adding the handling function to its jobs list).
Signed-off-by: Mihai Don?u <mdontu at bitdefender.com>
Co-developed-by: Nicu?or C??u <ncitu at bitdefender.com>
Signed-off-by: Nicu?or
2020 Jul 21
0
[PATCH v9 72/84] KVM: introspection: add KVMI_VCPU_GET_MTRR_TYPE
From: Mihai Don?u <mdontu at bitdefender.com>
This command returns the memory type for a guest physical address.
Signed-off-by: Mihai Don?u <mdontu at bitdefender.com>
Co-developed-by: Nicu?or C??u <ncitu at bitdefender.com>
Signed-off-by: Nicu?or C??u <ncitu at bitdefender.com>
Signed-off-by: Adalbert Laz?r <alazar at bitdefender.com>
---