Hi
I have exactly the same problem and it is 'solved' just by removing the RPZ
option.
options {
directory /etc/bind;
dnssec-enable no;
dnssec-validation no;
allow-recursion { internals; };
allow-query { internals; };
allow-query-cache {
Hi Xen Developpers,
Mauro confirmed that He didn't had any problem that last days with this patch
installed,
what would be done that it would be 'officialized' / intergrated in the next
version in Debian ?
Thanks and regards
Philippe
-Original Message-
From: Ian Campbell
-Original Message-
From: Ian Campbell [mailto:i...@hellion.org.uk]
Sent: Thursday, November 08, 2012 3:29 PM
To: Simonet Philippe, ITS-OUS-OP-IFM-NW-IPE
Cc: mrsan...@gmail.com; 599...@bugs.debian.org; xen-
de...@lists.xen.org; k...@xen.org; jbeul...@suse.com
Subject: Re:
Hi Mauro,
that's a question for you :
Philippe, could you clarify again what CPU model(s) this is being observed on
(the long times between individual steps forward with this problem perhaps
warrant repeating the basics each time, as it's otherwise quite cumbersome
to always look up old
Hi Ian
i compiled a patched hypervisor for Mauro, it is running since many days and
the overflow occured,
without clock jumps
(XEN) XXX plt_overflow: plt_now=5ece12d34128 plt_wrap=5ece12d09306
now=5ece12d16292 old_stamp=35c7c new_stamp=800366a5
plt_stamp64=15b800366a5 plt_mask=
5 matches
Mail list logo