similar to: Avoiding Sweave formula cut's?

Displaying 20 results from an estimated 90 matches similar to: "Avoiding Sweave formula cut's?"

2016 May 02
0
Strange ID-Mapping behavior
In my case flushing the cache did not help. I had around an dozend of user accounts with uidNumbers assigned and left over (dynamic winbind) mappings in idmap.ldb. At first after an flush samba used the uidNumber but after an logoff/logon of the userd getent passwd [user] showed the mapping from idmap.ldb. After i deleted the mapping in idmap.ldb everythiing went back to normal. Under 4.1 the
2018 Jan 22
0
[Patches] AD Database corruption after upgrade from <= 4.6 to 4.7 (bug #13228)
Am 22.01.2018 um 22:12 schrieb Ralph Böhme: > On Mon, Jan 22, 2018 at 05:24:44PM +0100, Achim Gottinger via samba wrote: >> Am 22.01.2018 um 10:49 schrieb Stefan Metzmacher via samba: >>> Also DO NOT repair the following errors with samba-tool dbcheck! >>> "Remove duplicate links in attribute" >>> and >>> "ERROR: orphaned backlink"
2004 Apr 19
2
Need Help with Dial Plan
Let me lay it out for you.... Call comes in over a T1 - Signal is em_w. The extension is seen as *<callerid>*<last 4 digits of number being called>*. Which is fine in it self. I have my extension.conf file set up as follows... [did] ; Receive call as *<calling>*<called> exten => _.,1,Answer exten => _.,2,Cut(CALLING=EXTEN,*,2) exten =>
2006 Feb 17
1
index file vs. memory
Hello, we have a large base of mailbox users and while pop3-connections are usually closed after the download of all mails, I noticed hundrets of imap-connections kept idle by the users. This is surely according to the idea behind imap, but I'm a bit afraid of overwhelming memory consumption if there are too many imap-connections opened at the same time. Is the index file kept in memory
2016 May 02
4
Strange ID-Mapping behavior
Hey, id mapping is accessible from net command: net cache list you can also clean that cache: net cache flush After flushing the cache your users and groups having uidNumber and/or gidNumber should work as expected (ie using their AD declared uid/gid). Cheers, mathias 2016-05-02 15:18 GMT+02:00 Achim Gottinger <achim at ag-web.biz>: > Sounds like there is an old entry in idmap.ldb.
2008 Oct 16
3
Alternatives to programmatically calling the rsync binary a lot
Dear list, I'd like to have your expertise opinion on following issue. Out of a concrete need we developed an application that will rsync any changes on a local directory structure to a remove system the moment they happen using the linux kernel watch feature. This is in our opinion much more elegant compared to invoking rsync every x seconds/minutes from cron, or having to use a special
2010 Sep 26
0
Question?
:? I was wondering why everytime I install an mmo through wine why my sound cut's out of the game almost five minute's into play? Is it the computer or is it wine? Everything else is fine though.
2018 Jan 22
2
[Patches] AD Database corruption after upgrade from <= 4.6 to 4.7 (bug #13228)
On Mon, Jan 22, 2018 at 05:24:44PM +0100, Achim Gottinger via samba wrote: > Am 22.01.2018 um 10:49 schrieb Stefan Metzmacher via samba: > > Also DO NOT repair the following errors with samba-tool dbcheck! > > "Remove duplicate links in attribute" > > and > > "ERROR: orphaned backlink" > > as this removes the ability to repair the database >
2007 Nov 10
2
[PATCH] Change virtio_pci to use a shared memory area for config
This patch changes virtio_pci to use a shared memory area for virtio config info instead of using the PCI configuration space. This is closer semantically to what the virtio API exposes and is it a lot easier to implement on both ends. Signed-off-by: Anthony Liguori <aliguori@us.ibm.com> diff --git a/drivers/virtio/virtio_pci.c b/drivers/virtio/virtio_pci.c index eb9a8e0..7e6e453 100644
2007 Nov 10
2
[PATCH] Change virtio_pci to use a shared memory area for config
This patch changes virtio_pci to use a shared memory area for virtio config info instead of using the PCI configuration space. This is closer semantically to what the virtio API exposes and is it a lot easier to implement on both ends. Signed-off-by: Anthony Liguori <aliguori@us.ibm.com> diff --git a/drivers/virtio/virtio_pci.c b/drivers/virtio/virtio_pci.c index eb9a8e0..7e6e453 100644
2007 Aug 28
1
(slightly OT) syncing / migrating IMAP mailboxes
Hi! I fear this may be slightly off-topic but it's both related to IMAP and to dovecot: Is there any good and in paticular realiable program for synching / migrating one IMAP mailbox to another? The most important features for me is that a) no mails are lost / left out silently and b) the porgram is able to sync the complete mailbox including all folders without just giving up in the
2014 Jan 03
7
[Bug 73267] New: Nouveau: corrupted laptop screen's EDID info
https://bugs.freedesktop.org/show_bug.cgi?id=73267 Priority: medium Bug ID: 73267 Assignee: nouveau at lists.freedesktop.org Summary: Nouveau: corrupted laptop screen's EDID info QA Contact: xorg-team at lists.x.org Severity: normal Classification: Unclassified OS: Linux (All) Reporter: ezelspinguin at
2012 Dec 10
26
[PATCH 00/11] Add virtual EPT support Xen.
From: Zhang Xiantao <xiantao.zhang@intel.com> With virtual EPT support, L1 hyerpvisor can use EPT hardware for L2 guest''s memory virtualization. In this way, L2 guest''s performance can be improved sharply. According to our testing, some benchmarks can show > 5x performance gain. Signed-off-by: Zhang Xiantao <xiantao.zhang@intel.com> Zhang Xiantao (11):
2023 Jan 06
2
[PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
On Fri, Jan 06, 2023 at 05:15:28PM +0000, Robin Murphy wrote: > On 2023-01-06 16:42, Jason Gunthorpe wrote: > > The internal mechanisms support this, but instead of exposting the gfp to > > the caller it wrappers it into iommu_map() and iommu_map_atomic() > > > > Fix this instead of adding more variants for GFP_KERNEL_ACCOUNT. > > FWIW, since we *do* have two
2023 Jan 06
2
[PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
On Fri, Jan 06, 2023 at 05:15:28PM +0000, Robin Murphy wrote: > On 2023-01-06 16:42, Jason Gunthorpe wrote: > > The internal mechanisms support this, but instead of exposting the gfp to > > the caller it wrappers it into iommu_map() and iommu_map_atomic() > > > > Fix this instead of adding more variants for GFP_KERNEL_ACCOUNT. > > FWIW, since we *do* have two
2023 Jan 06
3
[PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
The internal mechanisms support this, but instead of exposting the gfp to the caller it wrappers it into iommu_map() and iommu_map_atomic() Fix this instead of adding more variants for GFP_KERNEL_ACCOUNT. Signed-off-by: Jason Gunthorpe <jgg at nvidia.com> --- arch/arm/mm/dma-mapping.c | 11 +++++++---- .../gpu/drm/nouveau/nvkm/subdev/instmem/gk20a.c | 3 ++-
2023 Jan 06
3
[PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
The internal mechanisms support this, but instead of exposting the gfp to the caller it wrappers it into iommu_map() and iommu_map_atomic() Fix this instead of adding more variants for GFP_KERNEL_ACCOUNT. Signed-off-by: Jason Gunthorpe <jgg at nvidia.com> --- arch/arm/mm/dma-mapping.c | 11 +++++++---- .../gpu/drm/nouveau/nvkm/subdev/instmem/gk20a.c | 3 ++-
2023 Jan 06
3
[PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
The internal mechanisms support this, but instead of exposting the gfp to the caller it wrappers it into iommu_map() and iommu_map_atomic() Fix this instead of adding more variants for GFP_KERNEL_ACCOUNT. Signed-off-by: Jason Gunthorpe <jgg at nvidia.com> --- arch/arm/mm/dma-mapping.c | 11 +++++++---- .../gpu/drm/nouveau/nvkm/subdev/instmem/gk20a.c | 3 ++-
2006 Oct 01
4
HEADS UP: FreeBSD 5.3, 5.4, 6.0 EoLs coming soon
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello Everyone, On October 31st, FreeBSD 5.3 and FreeBSD 5.4 will have reached their End of Life and will no longer be supported by the FreeBSD Security Team. Users of either of those FreeBSD releases are strongly encouraged to upgrade to FreeBSD 5.5 or FreeBSD 6.1 before that date. In addition, the FreeBSD 6.0 End of Life is presently scheduled
2023 Jan 06
8
[PATCH 0/8] Let iommufd charge IOPTE allocations to the memory cgroup
iommufd follows the same design as KVM and uses memory cgroups to limit the amount of kernel memory a iommufd file descriptor can pin down. The various internal data structures already use GFP_KERNEL_ACCOUNT to charge its own memory. However, one of the biggest consumers of kernel memory is the IOPTEs stored under the iommu_domain and these allocations are not tracked. This series is the first