apmd status at suspend/resume

2018-11-29 Thread Ted Unangst
I would find it useful to know battery percentage at the time of suspend and resume. This makes it possible to see how much battery was consumed while sleeping. I don't think this is much noisier than things already are. Index: apmd.c

free(9) sizes for sysv_msg

2018-11-29 Thread Martin Pieuchot
Trivial one, ok? Index: kern/sysv_msg.c === RCS file: /cvs/src/sys/kern/sysv_msg.c,v retrieving revision 1.33 diff -u -p -r1.33 sysv_msg.c --- kern/sysv_msg.c 15 Sep 2016 02:00:16 - 1.33 +++ kern/sysv_msg.c 29 Nov

Re: fuse_opt.3 patch

2018-11-29 Thread Martin Pieuchot
On 29/11/18(Thu) 10:57, Edgar Pettijohn wrote: > Mostly just typos. Corrected the example some. However, please see below. I > don't > think the example works or I'm just doing something wrong. If we can fix the example, I'd say it's better to remove it. There are other places to find

Re: apmd status at suspend/resume

2018-11-29 Thread Ted Unangst
Klemens Nanni wrote: > On Thu, Nov 29, 2018 at 02:50:58PM -0500, Ted Unangst wrote: > > I would find it useful to know battery percentage at the time of suspend and > > resume. This makes it possible to see how much battery was consumed while > > sleeping. I don't think this is much noisier than

Re: apmd status at suspend/resume

2018-11-29 Thread Klemens Nanni
On Thu, Nov 29, 2018 at 02:50:58PM -0500, Ted Unangst wrote: > I would find it useful to know battery percentage at the time of suspend and > resume. This makes it possible to see how much battery was consumed while > sleeping. I don't think this is much noisier than things already are. Sounds

split ether_output up into resolution, encapsulation, and output

2018-11-29 Thread David Gwynne
i have a plan to allow virtual interfaces (eg, vlan, etherip, etc) to provide their own output functions so they can bypass the ifq machinery and push the packet onto the underlying layer directly. they'll still need to get an ethernet header though. vlan needs to get the ethernet header and put

Re: split ether_output up into resolution, encapsulation, and output

2018-11-29 Thread David Gwynne
On Fri, Nov 30, 2018 at 12:21:11PM +1000, David Gwynne wrote: > i have a plan to allow virtual interfaces (eg, vlan, etherip, etc) to > provide their own output functions so they can bypass the ifq machinery > and push the packet onto the underlying layer directly. > > they'll still need to get

Add ASN1_dup function prototype back to openssl/asn1.h

2018-11-29 Thread Jeremy Evans
The ASN1_dup function prototype was removed from libcrypto on October 24 when the major ASN1 cleanup happened. However, the function itself was not removed, it is still present in asn1/a_dup.c and the function is listed in Symbols.list. This results in issues if there is any code calling the

Re: simple MH_ALIGN -> m_align transformations

2018-11-29 Thread Alexander Bluhm
On Mon, Nov 26, 2018 at 11:40:28AM +0100, Claudio Jeker wrote: > Since M_ALIGN and MH_ALIGN are not streight calls to m_align() convert the > users to call directly m_align() so that the macros can be removed at a > later stage. > > This diff has the streight forward bits in it. > There is one

Re: free(9) sizes for sysv_msg

2018-11-29 Thread Alexandre Ratchov
On Thu, Nov 29, 2018 at 04:51:19PM -0200, Martin Pieuchot wrote: > Trivial one, ok? > > Index: kern/sysv_msg.c > === > RCS file: /cvs/src/sys/kern/sysv_msg.c,v > retrieving revision 1.33 > diff -u -p -r1.33 sysv_msg.c > ---

bgpd, fix RDE memory leak and crash

2018-11-29 Thread Claudio Jeker
There is a rather annoying memory leak when a peer goes down. In peer_down() most data is correctly removed but the Adj-RIB-Out was not properly flushed and so those entries lingered around. Also 'bgpctl show rib out nei $FOO' will blow up the rde because of a use-after-free access of the peer id.

Re: pvclock(4)

2018-11-29 Thread johnw
Reyk Floeter 於 2018-11-29 14:09 寫到: Do you have a full dmesg for me? Yes, attached dmesg.log, thanks. -- Key fingerprint: CDB3 6C62 254B C088 1E5D DD32 182C 97DB CF2C 80AC OpenBSD 6.4-current (GENERIC.MP) #447: Sun Nov 18 17:25:58 MST 2018

fix minor memory leak in bgpd

2018-11-29 Thread Claudio Jeker
When removing non-transitive extended communities from the attribute new memory is allocated. This memory needs to be freed in all cases. community_ext_delete_non_trans() will either return NULL (and nlen set to 0) or malloc new memory. After writing that memory to the UDPATE buffer it needs to be

Re: Idea forOpenBGPD RDE MP ... would this work to make RDE MP safe ?

2018-11-29 Thread Claudio Jeker
On Thu, Nov 29, 2018 at 05:28:53AM +, Tom Smyth wrote: > Hello, > before I begin... im just a sysadmin not a programmer > I appreciate the work you are doing on OpenBGPd :) and I use it and im > very happy > > > I saw Claudes presentation on openBGPd recently and how there was some > work on

dns over https for rebound

2018-11-29 Thread Ted Unangst
Greetings neighbor, have you heard the good news? DNS now comes with integrity and confidentiality. I refer, of course, to DNS over HTTPS. The patch below adds support to rebound. It seems to work with cloudflare's 1.1.1.1 service. It's quite preliminary, but it keeps the modifications to the

fuse_opt.3 patch

2018-11-29 Thread Edgar Pettijohn
Mostly just typos. Corrected the example some. However, please see below. I don't think the example works or I'm just doing something wrong. Index: fuse_opt.3 === RCS file: /cvs/src/lib/libfuse/fuse_opt.3,v retrieving revision 1.2