Hi,
here is a patch which fixes an integer overflow in the computation of
adaptive timeouts. The effect of this integer overflow is that
depending on timeout values, legitimate established connection states
can be evicted immediately (although other states with shorter
timeouts would be available
On Mon, Mar 06, 2017 at 07:36:21AM +0200, Timo Myyrä wrote:
> Did some tcpbench testing and got following results:
> Each test run with: tcpbench -s || tcpbench -t 15 commands.
> Host AP: apu 2b4 with athn, client = thinkpad t430s with iwn (OpenBSD)
>
> channel 9 running old snapshot etc:
> 11n c
In sysctl_file() splnet() is no longer what we want. Arguably the
KERNEL_LOCK() should be enough, but since pf(4) is messing with these
tables, and nobody turned this part of pf(4) MP, let's require the
NET_LOCK().
ok?
Index: kern/kern_sysctl.c
===
On Fri, Mar 03, 2017 at 16:58 +0100, mathieu.bl...@cea.fr wrote:
> Hi,
>
> here is a patch which fixes an integer overflow in the computation of
> adaptive timeouts. The effect of this integer overflow is that
> depending on timeout values, legitimate established connection states
> can be evicted
After some refactoring, here's the updated diff to take the routing
sockets out of the NET_LOCK().
ok?
Index: net/raw_usrreq.c
===
RCS file: /cvs/src/sys/net/raw_usrreq.c,v
retrieving revision 1.29
diff -u -p -r1.29 raw_usrreq.c
---
On Mon, Mar 06, 2017 at 01:04:28PM +0100, Mike Belopuhov wrote:
> On Fri, Mar 03, 2017 at 16:58 +0100, mathieu.bl...@cea.fr wrote:
> > Hi,
> >
> > here is a patch which fixes an integer overflow in the computation of
> > adaptive timeouts. The effect of this integer overflow is that
> > depending
On Mon, Mar 06, 2017 at 14:46 +0100, Claudio Jeker wrote:
> On Mon, Mar 06, 2017 at 01:04:28PM +0100, Mike Belopuhov wrote:
> > On Fri, Mar 03, 2017 at 16:58 +0100, mathieu.bl...@cea.fr wrote:
> > > Hi,
> > >
> > > here is a patch which fixes an integer overflow in the computation of
> > > adaptiv
On Sun, Mar 05, 2017 at 12:22:57PM +0100, Claudio Jeker wrote:
> On Fri, Mar 03, 2017 at 08:16:43AM +0100, Martin Pieuchot wrote:
> > On 03/03/17(Fri) 01:40, Alexander Bluhm wrote:
> > > On Thu, Mar 02, 2017 at 10:55:41AM +0100, Martin Pieuchot wrote:
> > > > Actually the malloc(9) could be convert
On Mon, Mar 06, 2017 at 01:33:19PM +0100, Martin Pieuchot wrote:
> After some refactoring, here's the updated diff to take the routing
> sockets out of the NET_LOCK().
>
> ok?
OK bluhm@
>
> Index: net/raw_usrreq.c
> ===
> RCS file:
There's no need to overwrite original flow ID assigned on
input so that it remains stable throughout the life of a
packet. The rationale is that output processing may split,
encapsulate or obfuscate a single stream which makes the
changed flow ID useless for purposes of flow control, for
instance
On Sun, Mar 05, 2017 at 10:54:39AM +0100, Claudio Jeker wrote:
> Here is an updated version of the PRU_ATTACH diff. I looked at the pfkey
> code and decided to only do the minimum now. I will go in afterwards and
> kill the dynamic fiddling in there. There is no reason for all this
> complication s
On Mon, Mar 06, 2017 at 12:13:48PM +0100, Martin Pieuchot wrote:
> In sysctl_file() splnet() is no longer what we want. Arguably the
> KERNEL_LOCK() should be enough, but since pf(4) is messing with these
> tables, and nobody turned this part of pf(4) MP, let's require the
> NET_LOCK().
>
> ok?
While preparing and testing some changes in ubcmtp I found a bug in
wsconscomm that may affect two-finger touches on "noisy" MT devices, that
is, on devices that constantly report small deltas of the touch positions
even if there is no noticeable movement.
Whenever the contact count or the pointer
On Thu, Mar 02, 2017 at 14:23 +0100, Mike Belopuhov wrote:
> On Thu, Mar 02, 2017 at 10:35 +1000, David Gwynne wrote:
> > the current code has been very careful not to free an mbuf while
> > holding the ifq mutex. i would prefer to keep it that way.
> >
> > the least worst way to do that would be
Move it to tech@ from misc.. not libressl.. libressl is not special ;)
On Mon, Mar 6, 2017 at 3:21 PM, Kirill Miazine wrote:
> Moving to libressl@ from misc@, as it's a LibreSSL issue.
>
> * Joel Sing [2017-03-05 23:01]:
>
> On Thursday 02 March 2017 13:28:08 Kirill Miazine wrote:
>>
>>> Recentl
And as joel mentioned, a fix is already arriving for this - there was a bug
in SSLv2 compatible handshake initiation,
and Paypal still has it enabled... (yeeuch)
On Mon, Mar 6, 2017 at 3:48 PM, Bob Beck wrote:
>
> Move it to tech@ from misc.. not libressl.. libressl is not special ;)
>
> On
Hi,
Initially all inpcb, including the IPv6 ones, are hooked into the
IPv4 hash. They cannot be used before bind(2) and then they are
rehashed and rehooked, so this is not noticed. Nevertheless I think
this is a bug and they should go into the IPv6 hash from the
beginning.
ok?
bluhm
Index: ne
Thanks for moving the thread to the correct place!
* Bob Beck [2017-03-06 15:49]:
And as joel mentioned, a fix is already arriving for this - there was a bug
in SSLv2 compatible handshake initiation,
Joel sent me a patch which appeared here:
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/lib/li
> On 2 Mar 2017, at 21:19, Mike Belopuhov wrote:
>
> On Thu, Mar 02, 2017 at 10:11 +0100, Martin Pieuchot wrote:
>> On 02/03/17(Thu) 01:16, Mike Belopuhov wrote:
>>> On 2 March 2017 at 00:56, David Gwynne wrote:
> On 2 Mar 2017, at 06:43, Mike Belopuhov wrote:
>
> This conve
In case the DSDT provides interfaces for both a Smart Battery and a
normal one, probe for acpisbs first, if it attaches, make acpibat
not match.
Index: dev/acpi/acpi.c
===
RCS file: /cvs/src/sys/dev/acpi/acpi.c,v
retrieving revision
> On 7 Mar 2017, at 05:27, Mike Belopuhov wrote:
>
> There's no need to overwrite original flow ID assigned on
> input so that it remains stable throughout the life of a
> packet. The rationale is that output processing may split,
> encapsulate or obfuscate a single stream which makes the
> chan
Stefan Sperling writes:
> On Mon, Mar 06, 2017 at 07:36:21AM +0200, Timo Myyrä wrote:
>
>> Did some tcpbench testing and got following results:
>> Each test run with: tcpbench -s || tcpbench -t 15 commands.
>> Host AP: apu 2b4 with athn, client = thinkpad t430s with iwn (OpenBSD)
>>
>> channel
I have committed a similar diff, thanks.
--
jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF DDCC 0DFA 74AE 1524 E7EE
Setjmp, longjmp was converted from calling sigprocmask to invoking
sigprocmask directly. The ABI for the function call and the syscall
are not the same and the register manipulation code was not updated
in the change.
This diff moves the jmpbuf to x2 for the duration of the sigprocmask syscall
an
Alexander Bluhm writes:
> Hi,
>
> Initially all inpcb, including the IPv6 ones, are hooked into the
> IPv4 hash. They cannot be used before bind(2) and then they are
> rehashed and rehooked, so this is not noticed. Nevertheless I think
> this is a bug and they should go into the IPv6 hash from
David Hill writes:
> Hello -
>
> time_t *sec is unused in ntp_update_second.
> OK?
ok jca@
> Index: kern/kern_tc.c
> ===
> RCS file: /cvs/src/sys/kern/kern_tc.c,v
> retrieving revision 1.30
> diff -u -p -r1.30 kern_tc.c
> --- kern/
On Thu, Feb 23, 2017 at 01:03:57PM +1100, Jonathan Gray wrote:
> On Wed, Feb 22, 2017 at 06:45:52PM -0500, Dale Rahn wrote:
> > Add psci 2.0 features to spin up/down/suspend processors.
> >
> > This change uses extern weak symbols to determine if the platform supports
> > the cpu_on/cpu_off/cpu_su
Sunil Nimmagadda writes:
> Hi,
>
> tls_close() could return TLS_WANT_POLLIN, TLS_WANT_POLLOUT as well.
> This diff repeats the call immediately. Ok?
ok jca@
> cvs server: Diffing .
> Index: fetch.c
> ===
> RCS file: /cvs/src/usr.bi
On Tue, Mar 07, 2017 at 01:44:19AM -0500, Dale Rahn wrote:
> Setjmp, longjmp was converted from calling sigprocmask to invoking
> sigprocmask directly. The ABI for the function call and the syscall
> are not the same and the register manipulation code was not updated
> in the change.
>
> This dif
29 matches
Mail list logo