On Sat, Jan 02, 2021 at 12:07:28AM +0100, Theo Buehler wrote:
> On Fri, Jan 01, 2021 at 11:38:32PM +0100, Claudio Jeker wrote:
> > On Fri, Jan 01, 2021 at 09:06:34PM +0100, Theo Buehler wrote:
> > > httpd(8) leaks resources when clients connect via TLS. The reason for
> > > this is that server_clo
On Fri, January 1, 2021 11:29 am, Matthieu Herrb wrote:
> Hi,
>
> the attached patch updates xterm to version 363 (from 351)
>
> Changelog can be found here:
> https://invisible-island.net/xterm/xterm.log.html
>
> To test, apply the patch in ${XSRCDIR}/app/xterm and rebuild xterm :
>
> cd ${XSRCDIR
On Sat, Jan 02, 2021 at 01:40:57AM +0300, Vitaliy Makkoveev wrote:
> Don't call if_deactivate() in switch_clone_destroy(). Following
> if_detach() will do this.
Yes, OK kn
On Sat, Jan 02, 2021 at 01:40:10AM +0300, Vitaliy Makkoveev wrote:
> Don't call if_deactivate() in bridge_clone_destroy(). Following
> if_detach() will do this.
Yes, OK kn
On Fri, Jan 01, 2021 at 11:38:32PM +0100, Claudio Jeker wrote:
> On Fri, Jan 01, 2021 at 09:06:34PM +0100, Theo Buehler wrote:
> > httpd(8) leaks resources when clients connect via TLS. The reason for
> > this is that server_close() closes the socket underlying the TLS
> > connection before callin
Don't call if_deactivate() in switch_clone_destroy(). Following
if_detach() will do this.
Index: sys/net/if_switch.c
===
RCS file: /cvs/src/sys/net/if_switch.c,v
retrieving revision 1.38
diff -u -p -r1.38 if_switch.c
--- sys/net/if_sw
Don't call if_deactivate() in bridge_clone_destroy(). Following
if_detach() will do this.
Index: sys/net/if_bridge.c
===
RCS file: /cvs/src/sys/net/if_bridge.c,v
retrieving revision 1.345
diff -u -p -r1.345 if_bridge.c
--- sys/net/if_
On Fri, Jan 01, 2021 at 09:06:34PM +0100, Theo Buehler wrote:
> httpd(8) leaks resources when clients connect via TLS. The reason for
> this is that server_close() closes the socket underlying the TLS
> connection before calling tls_close().
>
> The currently unchecked tls_close() call fails with
httpd(8) leaks resources when clients connect via TLS. The reason for
this is that server_close() closes the socket underlying the TLS
connection before calling tls_close().
The currently unchecked tls_close() call fails with EBADF when trying to
write out the close_notify in SSL_shutdown(). That
On Thu, Dec 31 2020, Lucas wrote:
> Weekly bump
chrisz@ had a similar diff, already ok'd by kn@ and me.
Christopher, would you mind committing it?
> Index: fetch.c
> ===
> RCS file: /home/cvs/src/usr.bin/ftp/fetch.c,v
> retrieving r
> Date: Fri, 1 Jan 2021 20:10:45 +1100
> From: Jonathan Gray
New diff at the end of this mail. Please test this one instead of the
previous one.
> On Thu, Dec 31, 2020 at 10:09:36PM +0100, Mark Kettenis wrote:
> > The diff below changes the emulated Linux memory allocation functions
> > a bit s
> Date: Fri, 1 Jan 2021 09:51:27 +0100
> From: Otto Moerbeek
>
> On Thu, Dec 31, 2020 at 10:09:36PM +0100, Mark Kettenis wrote:
>
> > The diff below changes the emulated Linux memory allocation functions
> > a bit such that they only use malloc(9) for allocations smaller than a
> > page. This r
On Wed, Dec 30, 2020 at 11:19:41AM -0300, Martin Pieuchot wrote:
> This has been extensively tested as part of the unlocking diff I sent to
> many developers. However, I'd appreciate if you could test again because
> this diff doesn't include WITNESS and do not unlock the fault handler.
Passed re
On Thu, Dec 31, 2020 at 10:09:36PM +0100, Mark Kettenis wrote:
> The diff below changes the emulated Linux memory allocation functions
> a bit such that they only use malloc(9) for allocations smaller than a
> page. This reduces pressure on the "interrupt safe" map and hopefully
> will avoid the
>
On Thu, Dec 31, 2020 at 10:09:36PM +0100, Mark Kettenis wrote:
> The diff below changes the emulated Linux memory allocation functions
> a bit such that they only use malloc(9) for allocations smaller than a
> page. This reduces pressure on the "interrupt safe" map and hopefully
> will avoid the
15 matches
Mail list logo