> On 26. Feb 2021, at 05:42, Rodney W. Grimes wrote:
>
>>> On 23. Feb 2021, at 17:53, Jakob Alvermark wrote:
>>>
>>> On 2/23/21 12:27 PM, Toomas Soome via freebsd-current wrote:
hi!
I have done some work to make font pickup a bit smarter (hopefully
better;), but my own a
> > On 23. Feb 2021, at 17:53, Jakob Alvermark wrote:
> >
> > On 2/23/21 12:27 PM, Toomas Soome via freebsd-current wrote:
> >> hi!
> >>
> >> I have done some work to make font pickup a bit smarter (hopefully
> >> better;), but my own ability to test is limited to one bugged supermicro
> >> an
My understanding is that KTLS works very well with OpenSSL for sending, but
not as well for receiving, because there's nothing like a recvfile
syscall. However, it works great for both send and receive with NFS, where
all the data remains in the kernel. What about zfs recv? A very common
pattern
On Thursday, 25 February 2021 at 21:22:43 -0500, Ed Maste wrote:
> On Thu, 25 Feb 2021 at 19:23, John Kennedy wrote:
>>
>> Not sure if Ed Maste just wants to make sure that all the executables
>> are rebuilt as PIE (vs hit-and-miss) or there is a sneaker corner-case that
>> he knows about.
>
> T
On Thu, 25 Feb 2021 at 19:23, John Kennedy wrote:
>
> Not sure if Ed Maste just wants to make sure that all the executables
> are rebuilt as PIE (vs hit-and-miss) or there is a sneaker corner-case that
> he knows about.
The issue is that without a clean build you may have some .o files
left aro
On Thu, 25 Feb 2021 at 18:10, Greg 'groggy' Lehey wrote:
>
> This details worries me. How compatible are PIE executables with
> non-PIE executables? Can I run PIE executables on older systems? Can
> I run older executables on a PIE system?
There is no issue mixing PIE and non-PIE binaries, and
On Fri, Feb 26, 2021 at 10:10:28AM +1100, Greg 'groggy' Lehey wrote:
> On Thursday, 25 February 2021 at 15:58:07 -0500, Ed Maste wrote:
> > As of 9a227a2fd642 (main-n245052) base system binaries are now built
> > as position-independent executable (PIE) by default, for 64-bit
> > architectures. ...
On 2/11/21 9:59 AM, Hartmann, O. wrote:
On Wed, 10 Feb 2021 07:21:20 +0100
"Hartmann, O." wrote:
On Tue, 9 Feb 2021 15:15:38 -0800
John Baldwin wrote:
On 2/9/21 2:16 PM, Hartmann, O. wrote:
On Wed, 3 Feb 2021 17:34:24 +0100
Guido Falsi via freebsd-current wrote:
On 03/02/21 17:02,
On Thursday, 25 February 2021 at 15:58:07 -0500, Ed Maste wrote:
> As of 9a227a2fd642 (main-n245052) base system binaries are now built
> as position-independent executable (PIE) by default, for 64-bit
> architectures. PIE executables are used in conjunction with address
> randomization as a mitiga
As of 9a227a2fd642 (main-n245052) base system binaries are now built
as position-independent executable (PIE) by default, for 64-bit
architectures. PIE executables are used in conjunction with address
randomization as a mitigation for certain types of security
vulnerabilities.
If you track -CURREN
I have submitted a pull request to fix this in OpenZFS:
https://github.com/openzfs/zfs/pull/11653
On 25. 2. 2021 17:20, John Kennedy wrote:
On Thu, Feb 25, 2021 at 11:09:17AM -0300, Renato Botelho wrote:
I recently upgraded a CURRENT system to main-n244932-248a47a4c2f and
zpool status shows:
Looks like Ryan didn't think it all the way through in:
https://github.com/openzfs/zfs/commit/35ec51796f0aa8d4fe322b48e7d1d5a65e38a4ce
I am preparing a patch for OpenZFS.
On 25. 2. 2021 17:20, John Kennedy wrote:
On Thu, Feb 25, 2021 at 11:09:17AM -0300, Renato Botelho wrote:
I recently upgrad
On Thu, Feb 25, 2021 at 11:09:17AM -0300, Renato Botelho wrote:
> I recently upgraded a CURRENT system to main-n244932-248a47a4c2f and
> zpool status shows:
>
>pool: zroot
> state: ONLINE
> status: Some supported and requested features are not enabled on the pool.
> The pool can st
I recently upgraded a CURRENT system to main-n244932-248a47a4c2f and
zpool status shows:
pool: zroot
state: ONLINE
status: Some supported and requested features are not enabled on the pool.
The pool can still be used, but some features are unavailable.
action: Enable all features usin
14 matches
Mail list logo