On Thu, May 05, 2022 at 04:49:10PM -0600, Aaron Bieber wrote:
>
>
> On Thu, May 5, 2022, at 4:46 PM, Antoine Jacoutot wrote:
> > Can you elaborate?
> > Do they need to start from a specific directory or from a directory
> > they have write access to?
> > Because we could cd /tmp unconditionally
On Thu, May 5, 2022, at 4:46 PM, Antoine Jacoutot wrote:
> Can you elaborate?
> Do they need to start from a specific directory or from a directory
> they have write access to?
> Because we could cd /tmp unconditionally
>
>From a specific directory. I can’t think of which ones off the top of
Can you elaborate?
Do they need to start from a specific directory or from a directory they have
write access to?
Because we could cd /tmp unconditionally
—
Antoine
> On 6 May 2022, at 00:43, Aaron Bieber wrote:
>
>
>
>> On Thu, May 5, 2022, at 3:24 PM, Antoine Jacoutot wrote:
>> Not a fan
On Thu, May 5, 2022, at 3:24 PM, Antoine Jacoutot wrote:
> Not a fan adding a knob for this.
> I don’t remember why amd needs to start from /etc/amd.
>
> —
> Antoine
There are a number of ports that would benefit from this as well.
>
>> On 5 May 2022, at 23:12, aisha wrote:
>>
>> Hi,
>>
Not a fan adding a knob for this.
I don’t remember why amd needs to start from /etc/amd.
—
Antoine
> On 5 May 2022, at 23:12, aisha wrote:
>
> Hi,
> I've attached a patch which allows setting the daemon start directory using
> the variable `daemon_startdir`.
> I think this is useful in the
> Date: Thu, 5 May 2022 22:41:01 +0200
> From: Alexander Bluhm
>
> Hi,
>
> The easiest way to make divert_packet() MP safe for now, is to
> protect sbappendaddr() with kernel lock.
All other invocations of sbappendaddr() run with the kernel lock held?
If so, maybe that should be asserted inside
Hi,
The easiest way to make divert_packet() MP safe for now, is to
protect sbappendaddr() with kernel lock.
ok?
bluhm
Index: netinet/ip_divert.c
===
RCS file: /data/mirror/openbsd/cvs/src/sys/netinet/ip_divert.c,v
retrieving revisi
Summary:
A bug in wsdisplay.c prevents the console screen blanker from being disabled
once it has been enabled.
Details:
The console code includes a screen blanker facility, controlled with wsconsctl:
# wsconsctl display.screen_off
display.screen_off=0
By default, the screen blanker is disab
In the old pkg_add model (prior to 7.1), we create tmp files anyway, so the
code is fine.
7.1 and later, we try to avoid creating temp files, so a better name matching
correspondence would be cool
What this patch does:
the old code creates a simple hash where we associate ONE packing-list elemen
Hi all,
Summary Question:
Broadly, I am trying to understand where a interrupt callback is specified if
not already specified by usbd_open_pipe_intr(9). Specifically, for the athn(4)
driver, I am trying to understand if/how athn_usb_intr() is executed for Tx
interrupts. This seems necessary ye
On Thu, May 05, 2022 at 10:16:23AM -0600, Bob Beck wrote:
> Ugh. You???re digging in the most perilous parts of the pile.
>
> I will go look with you??? sigh. (This is not yet an ok for that.)
>
> > On May 5, 2022, at 7:53 AM, Martin Pieuchot wrote:
> >
> > When considering the amount of free
An ok beck@ from me with my usual curmudgeonly mutterings
about the people who made this necessary for isalnum(), walls,
and revolutions...
> On May 5, 2022, at 7:57 AM, Florian Obser wrote:
>
> On 2022-05-04 13:21 +0430, Ali Farzanrad wrote:
>> OK, I've tested following diff on my own domain
On 2022-05-04 13:21 +0430, Ali Farzanrad wrote:
> OK, I've tested following diff on my own domain and it works.
> I did 2 modifications:
>
> 1. I explicitly call setlocate with "C" to ensure C locale,
I came to the conclusion that it's best to call setlocale in first thing
in main, that's what o
When considering the amount of free pages in the page daemon a small
amount is always kept for the buffer cache... except in one place.
The diff below gets rid of this exception. This is important because
uvmpd_scan() is called conditionally using the following check:
if (uvmexp.free - BUFPA
On 2022/05/05 15:28, Jeroen Massar wrote:
> Though they did it with 1.0.0.0/8 (though that is just a huge network
> telescope).
No this still does not work reliably
It is like you are trying to predict the next 20 years, but I'm sorry
I find it too confusing.
Jeroen Massar wrote:
> > On 5 May 2022, at 15:36, Theo de Raadt wrote:
> >
> > Jeroen Massar wrote:
> >
> >> I thus mostly see these odd prefixes (0/8, 127/8, 240/4) as extra RFC1918
> >> space
>
Jeroen Massar wrote:
> I thus mostly see these odd prefixes (0/8, 127/8, 240/4) as extra RFC1918
> space
> for those who do want to deploy more IPv4 as they can't be arsed after almost
> 30 years to finally do this IPv6 thing...
But that's the dangerous part.
If the operating systems suddenly
On Thu, May 05, 2022 at 03:08:39PM +0200, Claudio Jeker wrote:
> In total there are 6 rt_timer_queues in our kernel. 3 IPv4 and 3 IPv6.
> That number may be increased to 8 if arp and nd would use these timers as
> well. Because of this allocation the queue heads via pool(9) is overkill.
>
> Switch
This discussion relates to only one step of a number of potential increments.
I believe it is a bad idea to conflate all of these potential address
space recovery changes as the same singular discussion. Not all the
decisions being made on intranets are sane. Not all of these proposals
make sens
In total there are 6 rt_timer_queues in our kernel. 3 IPv4 and 3 IPv6.
That number may be increased to 8 if arp and nd would use these timers as
well. Because of this allocation the queue heads via pool(9) is overkill.
Switch rt_timer_queue_create to rt_timer_queue_init which just sets up the
stru
Diff below introduces a new wrapper to manipulate active/inactive page
queues.
ok?
Index: uvm/uvm_page.c
===
RCS file: /cvs/src/sys/uvm/uvm_page.c,v
retrieving revision 1.165
diff -u -p -r1.165 uvm_page.c
--- uvm/uvm_page.c 4 M
Errata patch for kernel IPsec has been released for OpenBSD 7.1.
Binary updates for the amd64, i386 and arm64 platform are available
via the syspatch utility. Source code patches can be found on the
respective errata page:
https://www.openbsd.org/errata71.html
ping?
OpenBSD-7.1 still occur this.
--
SASANO Takayoshi (JG1UAA)
On Sat, 16 Oct 2021 12:21:57 +0900,
SASANO Takayoshi wrote:
>
> Hi,
>
> At least 6.9 and 7.0 (and -current) sometimes shows a dmesg that:
>
> puc1 at pci1 dev 0 function 1 "ASIX AX99100" rev 0x00: ports: 16 com
> com5 at p
On Thu, May 05, 2022 at 12:34:33PM +0200, Frederic Cambus wrote:
> On Thu, May 05, 2022 at 08:04:16PM +1000, Jonathan Gray wrote:
> > On Thu, May 05, 2022 at 11:26:23AM +0200, Frederic Cambus wrote:
> > > Hi tech@,
> > >
> > > Here is a diff to add ID for the AMD Sensor Fusion Hub found on my
> >
On Thu, May 05, 2022 at 08:04:16PM +1000, Jonathan Gray wrote:
> On Thu, May 05, 2022 at 11:26:23AM +0200, Frederic Cambus wrote:
> > Hi tech@,
> >
> > Here is a diff to add ID for the AMD Sensor Fusion Hub found on my
> > Ryzen-based ZBOX CA621. Full dmesg below.
> >
> > Comments? OK?
>
> Can t
anyone?
On Sun, Apr 17, 2022 at 08:20:40PM +0200, Alexander Bluhm wrote:
> Hi,
>
> After fixing the kbd -l error handling, kbd set needs the same diff.
> While there, shorten long lines and avoid v--; v++; logic.
>
> $ ./kbd de
> kbd: /dev/wskbd0: Permission denied
>
> ok?
>
> bluhm
>
> Index
On Thu, May 05, 2022 at 11:26:23AM +0200, Frederic Cambus wrote:
> Hi tech@,
>
> Here is a diff to add ID for the AMD Sensor Fusion Hub found on my
> Ryzen-based ZBOX CA621. Full dmesg below.
>
> Comments? OK?
Can the string instead be "17h/1xh SFH"?
>
> Index: sys/dev/pci/pcidevs
> ==
So most routing daemons and other network daemons like pppd do not allow
240/4 as IPs because they check the IP against IN_BADCLASS().
I think it is time to remove this restriction.
Now there is another magical network 0.0.0.0/8 which is not allowed in
some but not all of the routing daemons. Not
Hi tech@,
Here is a diff to add ID for the AMD Sensor Fusion Hub found on my
Ryzen-based ZBOX CA621. Full dmesg below.
Comments? OK?
Index: sys/dev/pci/pcidevs
===
RCS file: /cvs/src/sys/dev/pci/pcidevs,v
retrieving revision 1.1988
On 2022/05/05 08:36, Claudio Jeker wrote:
>
> Agreed, there is also IN_BADCLASS() which is used by the routing daemons.
> IN_EXPERIMENTAL and IN_BADCLASS are the same definition.
>
> Looking at debian code search IN_EXPERIMENTAL() is still referenced in a
> bunch of packages. So I wonder if your
On Wed, May 04, 2022 at 06:48:14PM -0700, Seth David Schoen wrote:
> This has some odd consequences. For instance, if an OpenBSD system
> has an interface numbered with an address in 240/4, it can initiate
> and receive TCP connections using that address, and it can ping other
> hosts using that a
31 matches
Mail list logo