In D23050#505606, @mckusick wrote:My confusion is what "clusters" represent. Apparently a cluster is a 32KB block. Based on your clarification, I now agree with your calculation and printing of free space, but suggest that you clarify that clusters are 32KB blocks (either by replacing the word "clusters" with "32KB blocks", or if clusters is meaningful to administrators change it to "32KB clusters").
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Jan 8 2020
Jan 8 2020
Jan 7 2020
Jan 7 2020
In D23050#505431, @mckusick wrote:The current output is number of free blocks and number of bad blocks.
fsck_msdosfs.8: document -M.
Jan 6 2020
Jan 6 2020
Jan 3 2020
Jan 3 2020
finance/fava: update to 1.12.
Reduce memory footprint of fsck_msdosfs.
Jan 1 2020
Jan 1 2020
Revert r356249 for now as it broke GCC builds.
Reduce memory footprint of fsck_msdosfs.
Dec 31 2019
Dec 31 2019
Address some feedback from kevlo@ for style, avoid using unnecessary
brackets.
copyfat(): distinguish between failed read (fatal) and write (not fatal).
Use FSOK/FSFATAL/FSERROR for fat_flush_fat32_cache_entry instead of
0 and 1, suggested by kevlo@.
Dec 30 2019
Dec 30 2019
Dec 25 2019
Dec 25 2019
In D6442#502200, @pfg wrote:Hmm ...
When arc4random was introduced in OpenBSD the idea was to have one unique random algorithm to replace them all. This patch is old and reflects that idea. I am now thinking , that that is not the real objective for us.
Dec 22 2019
Dec 22 2019
Upgrade mediawiki LTS (www/mediawiki131) to 1.31.6;
Dec 20 2019
Dec 20 2019
Dec 18 2019
Dec 18 2019
In D22839#500542, @cem wrote:Moving unrelated discussion off the line comment.
@delphij wrote:
I do have some doubts with the benefit of performing reseeding upon root seed refresh. Effectively, it triggers an immediate reseed so applications that does arc4random(3) a lot would hammer the system entropy source in an hourly basis (with the existing code, they are relatively independent and only reseeds when arc4random(3) thinks necessary, either when we generated enough output, or have forked, whichever comes first). This seems to be a bad design choice for both security (the randomness caused by accumulated scheduling skews between arc4random(3) calls in the system are now gone) and performance (tends to do something computational intensive in hourly basis).
Applications that "hammer" arc4random already hammer system entropy much more frequently than hourly; arc4random will reseed every 5 minutes or 1kB today. arc4random(3) can generate 1kB buffers at 400 MB/s, reseeding 400,000 times per second already. A root version reseed only causes an additional reseed to occur that would not have occurred otherwise if the application was reading at a rate of less than 1kB / 5 minutes, or ~3.4 B/sec. That's a fairly low rate. The random device can emit 32-bit PRNG seeds to a single userspace thread at 80 MB/s (2,500,000 times per second), including syscall overhead. (All figures from an INVARIANTS test VM.) I think the performance concern in this particular hypothetical is not especially substantial.
I don't think the security concern is profound, either. We arguably lose a handful of bits of entropy from arc4random(3) syscalls within a few minutes of an hour boundary, sure. If those handful of bits are really all the entropy we're collecting, everything is broken, including Fortuna. Applications only reseed on-demand, when they actually invoke arc4random(3). In practice, this may be long after the root seed version has changed (it is possible for an application to observe the seed version jump by >1 between arc4random(3) reads). I think you are probably overweighing the entropy value of the particular scheduler skew.
Dec 17 2019
Dec 17 2019
delphij added inline comments to D22839: random(4) fenestrasX: Push root seed version to arc4random(3).
Fix a typo in startup script.
Dec 16 2019
Dec 16 2019
Add Pomerium, an identity-aware proxy that enables secure access to
Dec 15 2019
Dec 15 2019
Dec 14 2019
Dec 14 2019
MFC r355247: Reduce disk write load in /usr/libexec/save-entropy.
MFC r345744, r348122, r355247
Dec 12 2019
Dec 12 2019
www/grafana6: update to 6.5.1
Dec 11 2019
Dec 11 2019
MFC r340127,340133,355085: libbsdxml (expat) 2.2.9.
MFC r340127,340133,355085: libbsdxml (expat) 2.2.9.
Dec 8 2019
Dec 8 2019
Fix a couple of minor issues with newfs_msdos:
Dec 7 2019
Dec 7 2019
net/openldap24-server: back_mdb: use robust mutexes.
- Drop support of FreeBSD < 11.0
Perform sanity check of configuration at start.
MFC r349549: MFV r349535: less v551.
MFC r349549: MFV r349535: less v551.
Dec 3 2019
Dec 3 2019
Explicitly exit() instead of return in main().
newfs_msdos: -A is incompatible with -r, not -o.
Dec 1 2019
Dec 1 2019
Simplify code with strlcpy/strlcat.
Nov 30 2019
Nov 30 2019
Reduce disk write load in /usr/libexec/save-entropy.
(Note that the new revision also changed permission from 400 r-------- to 600 rw-------, and umask from 377 to 177, because the non-root user needs write permission to modify the inode).
Fix issues pointed out by cem@
Thanks for the review, please take another look.
delphij added reviewers for D22612: Reduce disk write load in /usr/libexec/save-entropy: emaste, gordon, cem.
net/openldap24-server: add support for pbkdf2 password hash
devel/py-pyasn1: update to 0.4.7
MFC r342876: Enable use of Capsicum sandbox when there is only one
delphij committed rS355221: MFC r345839, r345894, r345897, r345900-r345901, r345976, r346220, r348602….
MFC r345839, r345894, r345897, r345900-r345901, r345976, r346220, r348602…
MFC r355128: Update leap-seconds to leap-seconds.3676924800.
MFC r355128: Update leap-seconds to leap-seconds.3676924800.
Nov 27 2019
Nov 27 2019
Update leap-seconds to leap-seconds.3676924800.
Nov 25 2019
Nov 25 2019
MFV r355071: libbsdxml (expat) 2.2.9.
Nov 24 2019
Nov 24 2019
Vendor import of expat 2.2.9
Nov 22 2019
Nov 22 2019
(Note that the refactor is not really needed, but I don't have strong opinion here).
Looks reasonable to me.
I think the proposed change actually does change the code behavior slightly.
Nov 21 2019
Nov 21 2019
MFC r333923, r354595, r354802:
Nov 18 2019
Nov 18 2019
Nov 17 2019
Nov 17 2019
Nov 12 2019
Nov 12 2019
Nov 10 2019
Nov 10 2019
Remove redundant pidfile check.
Oct 24 2019
Oct 24 2019
Disable the .cn mirror entity for now, the service is offline for
Oct 15 2019
Oct 15 2019
I like the direction in general.
Oct 12 2019
Oct 12 2019
Return this to pool. I no longer use this port anymore.
Oct 11 2019
Oct 11 2019
Looks fine to me, but I no longer have the hardware to actually test the changes, iXsystems may be able to help with that.
Oct 2 2019
Oct 2 2019
x11/slim: Permit setting a default xsession from .xinitrc.
Oct 1 2019
Oct 1 2019
delphij added a reviewer for D21865: avoid compiling in hpt* drivers containing binary blobs: releng.
I'm mostly in favor of the change (smaller kernel size, etc.), but since we are removing driver from GENERIC, it's better if we can provide a mechanism to load the driver on demand, or a binary update can easily brick the system...
Why are we making this change? It was somewhat intentional to not enable SASL by default (to reduce attack surface, e.g. CVE-2019-13565), is this functionality being used by a lot of consumers?
Sep 30 2019
Sep 30 2019
delphij committed rS352890: MFC r351417: r351417: INVARIANTS: treat LA_LOCKED as the same of LA_XLOCKED.
MFC r351417: r351417: INVARIANTS: treat LA_LOCKED as the same of LA_XLOCKED
delphij committed rS352888: MFC r351501: MFV r351500: Fix CLEAR_HASH macro to be usable as a single.
MFC r351501: MFV r351500: Fix CLEAR_HASH macro to be usable as a single
Sep 29 2019
Sep 29 2019
Sep 26 2019
Sep 26 2019
Sep 25 2019
Sep 25 2019