Hi,
In the BPF - Berkeley Packet Filter, when a file descriptor is associated to an
interface to send and receive packets, there is an ioctl parameter BIOCSSEESENT,
which is by default set to 1. Hence the packets both from remote systems and
locally generated are received.
If locally
Hi,
Maybe someone can help me ? This only happens with CURRENT.
Making: ../../unxfbsd.pro/misc/localedata_ascii.dpc
Making : Dependencies
touch ../../unxfbsd.pro/misc/localedata_ascii.dpc
cp
/usr/ports/editors/openoffice-work/work/oo_641c_src/solver/641/unxfbsd.pro/bin/applicat.rdb
--- Kris Kennaway [EMAIL PROTECTED] wrote:
As you are no doubt aware there are significant infrastructural
changes in -current relating to SMP scalability. It's in a very
interim state at the moment, and one of the downsides is increased
interrupt latency and lock contention for certain
On Mon, 11 Mar 2002, Rajesh P Jain wrote:
In the BPF - Berkeley Packet Filter, when a file descriptor is
associated to an interface to send and receive packets, there is an
ioctl parameter BIOCSSEESENT, which is by default set to 1. Hence the
packets both from remote systems and locally
Hi hachers,
where can I find a manual/reference for/to a BootFORTH language?
regards,
Vladimir
To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message
On Monday 11 March 2002 03:25 am, Kris Kennaway wrote:
| On Sun, Mar 10, 2002 at 09:05:28PM +0100, BOUWSMA Beery wrote:
| I built both a WITNESS and a WITNESSless kernel with more recent
| k0deZ, and in the case of playing an mp3 file with `mpg123', I
| saw practically no difference between
On Mon, Mar 11, 2002 at 08:23:38AM -0500, Brian T.Schellenberger wrote:
On Monday 11 March 2002 03:25 am, Kris Kennaway wrote:
| On Sun, Mar 10, 2002 at 09:05:28PM +0100, BOUWSMA Beery wrote:
| I built both a WITNESS and a WITNESSless kernel with more recent
| k0deZ, and in the case of
On Monday 11 March 2002 08:54 am, Kris Kennaway wrote:
| On Mon, Mar 11, 2002 at 08:23:38AM -0500, Brian T.Schellenberger wrote:
| On Monday 11 March 2002 03:25 am, Kris Kennaway wrote:
| | On Sun, Mar 10, 2002 at 09:05:28PM +0100, BOUWSMA Beery wrote:
| | I built both a WITNESS and a
As I already asked:
what compile time options were used in the two cases ?
They surely can make a huge difference.
cheers
luigi
On Mon, Mar 11, 2002 at 09:29:25AM -0500, Brian T.Schellenberger wrote:
Though the *system* time and *interrupt* time seem to track as one might
--- Luigi Rizzo [EMAIL PROTECTED] wrote:
As I already asked:
what compile time options were used in the two cases ?
They surely can make a huge difference.
cheers
luigi
Could it also be a possibility, that the NetBSD defaults differ from
the FreeBSD defaults, I think this
On Mon, 11 Mar 2002 07:10:31 -0800 (PST) Hiten Pandya [EMAIL PROTECTED] wrote:
--- Luigi Rizzo [EMAIL PROTECTED] wrote:
As I already asked:
what compile time options were used in the two cases ?
They surely can make a huge difference.
cheers
luigi
Could it also be a
On Mon, Mar 11, 2002 at 04:26:31PM +0100, Simon 'corecode' Schubert wrote:
On Mon, 11 Mar 2002 07:10:31 -0800 (PST) Hiten Pandya [EMAIL PROTECTED] wrote:
--- Luigi Rizzo [EMAIL PROTECTED] wrote:
As I already asked:
what compile time options were used in the two cases ?
They surely
vladimirt where can I find a manual/reference for/to a BootFORTH
vladimirt language?
BootFORTH is a derived work of ficl 2.05. You may want to check Ficl
documentation at URL:http://ficl.sourceforge.net/ficl.html.
And src/sys/boot is a good reference for you :-)
-- -
Makoto `MAR'
Vladimir Terziev wrote:
where can I find a manual/reference for/to a BootFORTH language?
It is fairly standard FORTH. Just look for FORTH programming
information, and most of it will be applicable. It has some
minor strangenesses to do with quote interpretration, but it
is not
If you measure this using the 'time' command, what is the result? In
particular, how do the %user and %system vary between FreeBSD and NetBSD?
This could point us at differences in the sound infrastructure, if the
extra CPU you're seeing is a result of increased kernel activity. If it's
more
I've noticed that currently, violations of securelevel are aborted, but not
typically logged. It seems like in addition to aborting whichever calls are
in progress, logging an error might be beneficial. I recognize that this
goes along the same lines as logging file permission errors, but if a
Jeff Jirsa wrote:
I've noticed that currently, violations of securelevel are
aborted, but not
typically logged. It seems like in addition to aborting whichever
calls are
in progress, logging an error might be beneficial. I recognize that this
goes along the same lines as logging file
On Mon, 11 Mar 2002, Hiten Pandya wrote:
--- Kris Kennaway [EMAIL PROTECTED] wrote:
As you are no doubt aware there are significant infrastructural
changes in -current relating to SMP scalability. It's in a very
interim state at the moment, and one of the downsides is increased
I think this would be useful, but I would be concerned about the rate at
which these messages could come when someone is actively attacking a system.
Perhaps such messages could go through a rate limiter mechanism similar to
that now used by the network interfaces.
syslogd already has a last
While observing a tcpdump output of a diskless client booting over
a slow network, I noticed a few weird access patterns to the root
filesystem -- see the tcpdump below (sorry for the long lines):
+ /sbin/init, right before running /bin/sh, reads /etc/login.conf
and then attempts 4
Howdy,
I have been working on a cvsup/buildworld helper document
located at:
http://www.hiltonbsd.com/articles/buildworld.php
And could sure use some review from you hackers :-)
One of the areas that concerns me most is the instructions
regarding adopting your current src version, before
Let's say I am running in a jail, and say 5 other people are running in
other, seperate jails on the same machine.
Now lets say I start up pgp, and generate my keys, and generally use pgp
through the command line in my jail. Or, instead of pgp I do other crypto
related sensitive activities...
On 2002-03-11 22:00, Rogier R. Mulhuijzen wrote:
I think this would be useful, but I would be concerned about the rate at
which these messages could come when someone is actively attacking a
system.
Perhaps such messages could go through a rate limiter mechanism similar to
that now used
Hi all,
Here are my test news. The -O bug doesn't happen with
gcc295 from ports !
Previously I had stated before, the gcc295 from ports did
not work too. but it seems that that was a user error :-)
/usr/ports/devel/stlport (and the tests test/eh)
can be succesfully be made.
My staroffice
Vladimir Terziev wrote:
Hi hachers,
where can I find a manual/reference for/to a BootFORTH language?
Try www.fig.org and www.forth.org. You may also look at the FICL page on
sourceforge, though you are unlikely to find anything there.
You must complete this info with the
Hello. I'm building cdrom based program that uses
a memory file system for /var and /tmp. I'm using
RELEASE 4_5 kernel stock + IP_FIREWALL defined.
When a program crashes, it seems to take the whole
system with it... a second or two after the core dump
it drops down to the kernel debugger...
(hopefully this is not too mangled by M$. It should display ok in fixed
width fonts)
Proposed firewall structure
We are proposing to augment our firewalling as follows
and I would like advice on how to (re)setup our MPD
installation.
I see two options
(a) put MPD on the bastion host and allow
At 02:36 12-3-2002 +0200, Giorgos Keramidas wrote:
On 2002-03-11 22:00, Rogier R. Mulhuijzen wrote:
I think this would be useful, but I would be concerned about the rate at
which these messages could come when someone is actively attacking a
system.
Perhaps such messages could go
On Mon, 2002-03-11 at 18:03, Clark C . Evans wrote:
panic: pmap_enter: attempted pmap_enter on 4MB page
trace:
Debugger
panic
pmap_enter
vm_fault
trap_pfault
trap
calltrap
It seems to me that you are showing only the last part of the trace,
which shows where
On Mon, Mar 11, 2002 at 04:13:16PM -0800, Patrick Thomas wrote:
Let's say I am running in a jail, and say 5 other people are running in
other, seperate jails on the same machine.
Now lets say I start up pgp, and generate my keys, and generally use pgp
through the command line in my jail.
30 matches
Mail list logo