The UEFI specification states a watchdog should be armed for 5 minutes.
Stop this from resetting a system when in efiboot.
Index: amd64/stand/efiboot/efiboot.c
===
RCS file: /cvs/src/sys/arch/amd64/stand/efiboot/efiboot.c,v
retrieving
On Sun, Feb 11, 2018 at 12:51:57AM +0100, Peter Hessler wrote:
> My fingers have typed "vmctl show" instead of "vmctl status" for over a
> year now, so add it as an alias.
>
> OK?
>
>
> Index: main.c
> ===
> RCS file: /cvs/openbsd/s
Almost exactly a year ago (give or take an hour), we disabled AEN handling in
mfii(4)
because it didn't work on SAS2208 controllers. I finally got around to looking
into this
and found we were just missing one magical offset in one of the command
structures. The
diff below add this and re-enab
On Sun, Feb 11, 2018 at 02:17:38AM +0100, Sebastian Benoit wrote:
>
> Hi,
>
> here is the ospfd part again, now the socket option is set on reload as
> well.
>
> ok?
>
> (benno_route_priofilter_2_ospfd.diff)
>
> diff --git usr.sbin/ospfd/kroute.c usr.sbin/ospfd/kroute.c
> index 17febefbdcb..4f
On Sun, Feb 11, 2018 at 02:14:32AM +0100, Sebastian Benoit wrote:
> Stuart Henderson(s...@spacehopper.org) on 2018.02.10 10:41:11 +:
> > This comment needs fixing or removing, otherwise ok.
> > Feel free to use this accompanying manpage diff.
>
> Hi sthen, thanks
>
> updated diff,this is only
Hi,
here is the ospfd part again, now the socket option is set on reload as
well.
ok?
(benno_route_priofilter_2_ospfd.diff)
diff --git usr.sbin/ospfd/kroute.c usr.sbin/ospfd/kroute.c
index 17febefbdcb..4f6dc933a42 100644
--- usr.sbin/ospfd/kroute.c
+++ usr.sbin/ospfd/kroute.c
@@ -127,10 +127,1
Stuart Henderson(s...@spacehopper.org) on 2018.02.10 10:41:11 +:
> This comment needs fixing or removing, otherwise ok.
> Feel free to use this accompanying manpage diff.
Hi sthen, thanks
updated diff,this is only the kernel part + manpage.
I added the RTP constants to the manpage, as all the
Guilty.
On Feb 10, 2018 17:56, "Sebastian Benoit" wrote:
> Peter Hessler(phess...@openbsd.org) on 2018.02.11 00:51:57 +0100:
> > My fingers have typed "vmctl show" instead of "vmctl status" for over a
> > year now, so add it as an alias.
>
> oh yes please, i thought i was the only stupid one.
>
Peter Hessler(phess...@openbsd.org) on 2018.02.11 00:51:57 +0100:
> My fingers have typed "vmctl show" instead of "vmctl status" for over a
> year now, so add it as an alias.
oh yes please, i thought i was the only stupid one.
> OK?
ok
> Index: main.c
> =
My fingers have typed "vmctl show" instead of "vmctl status" for over a
year now, so add it as an alias.
OK?
Index: main.c
===
RCS file: /cvs/openbsd/src/usr.sbin/vmctl/main.c,v
retrieving revision 1.34
diff -u -p -u -p -r1.34 main.
Remove `sendmail' ism's from starttls.8
--- /usr/share/man/man8/starttls.8Tue Oct 3 22:13:42 2017
+++ starttls.8Sat Feb 10 15:57:06 2018
@@ -102,17 +102,6 @@
.Pp
.Dl # openssl x509 -in /etc/ssl/mail.example.com.crt -text
.Pp
-If you don't intend to use TLS for authentication (and if
On Sat, Feb 10, 2018 at 09:03:10PM +1000, David Gwynne wrote:
> ipv6 packets dont have a DF bit you can set in the header, you have
> to pass it as an option to ip6_output if you want that behaviour
> on output. however, ip6_send makes it hard to pass ip6 options to
> ip6_output because you give it
On Sat, Feb 10, 2018 at 02:51:55PM +1000, Jonathan Matthew wrote:
> It's hard to see exactly what the dv->dv_parent->etc. checks are doing.
> Before adding sdmmc I'd like to tidy up a bit.
>
> ok?
>
Reads ok to me, and thanks for the cleanup. ok mlarkin if you didn't
already commit this.
> Inde
Hello, Tech,
I am doing some hands-on with OpenBSD Kernel code especially with
"sys/kern/kern_sched.c".
I am trying to extract pledge information from kernel code for every process.
In below function, I am doing some modifications for that,
void
schedcpu(void *arg)
{
..
..
LIST_FO
I'd like to keep all locking code in the same file then slowly remove
the abstractions.
ok?
Index: kern/kern_lock.c
===
RCS file: /cvs/src/sys/kern/kern_lock.c,v
retrieving revision 1.56
diff -u -p -r1.56 kern_lock.c
--- kern/kern_lo
On Fri, Feb 09, 2018 at 11:11:18AM +0100, Matthieu Herrb wrote:
> Hi,
>
> I've recently setup a new pair of OpenBSD 6.2 pf firewalls (with carp)
> in my lab, and that's not performing very well.
>
> tcp-based NFS v3 and v4 traffic (between Linux clients and a NetApp
> server) through it is strugg
Diff below switches sparc64 to the MI mutex implementation. I've been
running this on my 16CPUs guest on a T5220 without issues.
I'm not removing the assembly code yet in case we spot an issue.
More tests and oks welcome :)
Index: arch/sparc64/conf/files.sparc64
So we've been working with the tls crowd to bring you decent https support.
The crux of the matter is that pkg_add does not handle https directly,
it does use ftp(1) to fetch every single file.
... which means a new connection for each single package it looks at.
with http, that's fairly okay. E
ipv6 packets dont have a DF bit you can set in the header, you have
to pass it as an option to ip6_output if you want that behaviour
on output. however, ip6_send makes it hard to pass ip6 options to
ip6_output because you give it an mbuf, and hope for the best in
the future.
to cope with this, im
On 2018/02/10 10:12, Sebastian Benoit wrote:
>
>
> - add ROUTE_PRIOFILTER
> - it has one argument that is interpreted as a route priority
> - all route updates with prio lower or equal will pass the filter,
> all with higher priority value will be filtered.
> - example use in ospfd
>
> comment
Nice feature
lots of real world use cases.
On 10 Feb 2018 9:19 AM, "Sebastian Benoit" wrote:
>
>
> - add ROUTE_PRIOFILTER
> - it has one argument that is interpreted as a route priority
> - all route updates with prio lower or equal will pass the filter,
> all with higher priority value will
- add ROUTE_PRIOFILTER
- it has one argument that is interpreted as a route priority
- all route updates with prio lower or equal will pass the filter,
all with higher priority value will be filtered.
- example use in ospfd
comments/oks?
(benno_ospfd_route_priofilter_1.diff)
diff --git sys/n
Similar to IPv4 this will inject all the magic reject routes for IPv6.
This includes the bad networks in the 6to4 range (2002::/16) and some
other magic.
Here it what you get:
Internet6:
DestinationGateway Flags Refs Use Mtu Prio Iface
::/96
23 matches
Mail list logo