Tz-Huan Huang wrote:
On Sun, Jun 8, 2008 at 7:59 AM, Alan Cox [EMAIL PROTECTED] wrote:
You can download a patch from
http://www.cs.rice.edu/~alc/amd64_kvm_6GB.patch that increases amd64's
kernel virtual address space to 6GB. This patch also increases the default
for the kmem map to almost
On Sun, Jun 8, 2008 at 2:02 PM, Alan Cox [EMAIL PROTECTED] wrote:
Tz-Huan Huang wrote:
On Sun, Jun 8, 2008 at 7:59 AM, Alan Cox [EMAIL PROTECTED] wrote:
You can download a patch from
http://www.cs.rice.edu/~alc/amd64_kvm_6GB.patch that increases amd64's
kernel virtual address space to 6GB.
Anybody know why ntpd might not work in a jail?
I'm running an openntpd instance on the host machine, which syncs the
clock from the pool at pool.ntp.org. From the log output, ntpd claims to
be synced and the time does seem to be correct.
I'm then running another openntpd in a jail which doesn't
Hi,
Has anyone thought about implementing an option
to prepend all kernel console messages with timestamps,
like Linux and Solaris do?
Is it just a matter of hacking up the kernel printf() implementation?
Any possible caveats?
Regards,
Niki
___
On 20080608 12:19:23, Steven Hartland wrote:
I assume as it would effect the entire machine and hence should be run
on the base machine instead, not the jail?
I think you might've misunderstood.
The ntpd I'm running on the host syncs the clock (and therefore the whole
machine), the ntpd
I assume as it would effect the entire machine and hence should be run
on the base machine instead, not the jail?
- Original Message -
From: [EMAIL PROTECTED]
Anybody know why ntpd might not work in a jail?
This e.mail is private
Le Sat, 7 Jun 2008 06:18:55 +0200,
Pawel Jakub Dawidek [EMAIL PROTECTED] a écrit :
Well, it seems to work but i've got few problems to test the
module :
- How check the encryption/decryption ?
Openssl seems ok, i've got quite the same results as NetBSD on a
Soekris net5501 box.
On 2008-Jun-08 10:24:53 +0300, Niki Denev [EMAIL PROTECTED] wrote:
Has anyone thought about implementing an option
to prepend all kernel console messages with timestamps,
like Linux and Solaris do?
The only time I've seen Solaris do this is when the console message
is syslog'd - which FreeBSD
On 2008-Jun-08 11:32:54 +0100, [EMAIL PROTECTED] wrote:
I'm running an openntpd instance on the host machine, which syncs the
clock from the pool at pool.ntp.org. From the log output, ntpd claims to
be synced and the time does seem to be correct.
I'm then running another openntpd in a jail which
On Sun, Jun 8, 2008 at 2:59 PM, Peter Jeremy
[EMAIL PROTECTED] wrote:
On 2008-Jun-08 10:24:53 +0300, Niki Denev [EMAIL PROTECTED] wrote:
Has anyone thought about implementing an option
to prepend all kernel console messages with timestamps,
like Linux and Solaris do?
The only time I've seen
On 20080608 19:56:03, Eugene Grosbein wrote:
On Sun, Jun 08, 2008 at 12:25:00PM +0100, [EMAIL PROTECTED] wrote:
The problem is that the ntpd in the jail seems to believe that the host
clock is out of sync (from what I can gather), even though it isn't.
That's because ntpd won't blindly
On 20080608 22:10:27, Peter Jeremy wrote:
On 2008-Jun-08 11:32:54 +0100, [EMAIL PROTECTED] wrote:
I'm running an openntpd instance on the host machine, which syncs the
clock from the pool at pool.ntp.org. From the log output, ntpd claims to
be synced and the time does seem to be correct
On Sun, Jun 08, 2008 at 12:25:00PM +0100, [EMAIL PROTECTED] wrote:
The problem is that the ntpd in the jail seems to believe that the host
clock is out of sync (from what I can gather), even though it isn't.
That's because ntpd won't blindly assume that your host has right time.
If you make
On Sat, Jun 07, 2008 at 01:18:41PM -0400, Chuck Robey wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I can't seem to find how many /dev/usbN bus devices there can be. I'm writing
some code that scans them all looking for anything that has my device, but I
while I know to start at
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Bernd Walter wrote:
On Sat, Jun 07, 2008 at 01:18:41PM -0400, Chuck Robey wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I can't seem to find how many /dev/usbN bus devices there can be. I'm
writing
some code that scans them all looking
smbclient (and other samba utilities) do not refer to krb5.conf when
figuring out the kerberos realm.
you will have to put to your krb5.conf on both client and server:
[domain_realms]
cifs.example.com = realm.example.com
Otherwise it will just try to use example.com as the realm.
On
On Sun, Jun 08, 2008 at 10:16:26AM -0400, Chuck Robey wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Bernd Walter wrote:
On Sat, Jun 07, 2008 at 01:18:41PM -0400, Chuck Robey wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I can't seem to find how many /dev/usbN bus
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Bernd Walter wrote:
On Sun, Jun 08, 2008 at 10:16:26AM -0400, Chuck Robey wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Bernd Walter wrote:
On Sat, Jun 07, 2008 at 01:18:41PM -0400, Chuck Robey wrote:
-BEGIN PGP SIGNED MESSAGE-
Le Sun, 8 Jun 2008 13:58:46 +0200,
Patrick Lamaiziere [EMAIL PROTECTED] a écrit :
Thanks. I think it is ok for a review and test, i added the RNG stuff
since the last time and a manual page 'glxsb.4'
http://user.lamaiziere.net/patrick/glxsb.c
http://user.lamaiziere.net/patrick/glxsb.tar.gz
Le Sun, 8 Jun 2008 19:26:49 +0200,
Patrick Lamaizière [EMAIL PROTECTED] a écrit :
http://user.lamaiziere.net/patrick/glxsb.c
http://user.lamaiziere.net/patrick/glxsb.tar.gz (all the module)
All my apologies : this is not the good version :-(
I've made a 'tar xzf' instead a 'tar czf' and i've
Hi Kostik, hackers,
On Sat, May 17, 2008 at 08:46:37PM +0300, Kostik Belousov wrote:
On Sat, May 17, 2008 at 07:35:25PM +0200, Jeremie Le Hen wrote:
Hi,
On Sat, May 17, 2008 at 01:26:53PM +0300, Kostik Belousov wrote:
On Sat, May 17, 2008 at 11:17:40AM +0200, Jeremie Le Hen wrote:
Ivan Voras wrote:
Hi,
Im thinking again of the old idea of implementing poor man's file
replication system using kqueue to monitor changes on files.
I made something with the idea, available here:
http://ivoras.sharanet.org/stuff/adfs.tgz
It was hacked up over the weekend and probably
22 matches
Mail list logo