Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (1h)  netbsd-8 (5d)  netbsd-10 (5d)  netbsd-9 (11d)  thorpej-ifq (175d)  thorpej-altq-separation (178d) 

2024-05-10 04:44:41 UTC Now

2023-07-07 08:39:24 UTC MAIN commitmail json YAML

2023-07-07 08:33:25 UTC MAIN commitmail json YAML

PR port-alpha/57511 Temporally disable secure PLT for alpha
until support is added to ld.elf_so(1).

(rin)

2023-07-07 07:22:18 UTC MAIN commitmail json YAML

Fix locking error when setting the multicast filter to accept all
multicast frames, pointed out by Lwazi Dube.

(martin)

2023-07-07 07:19:36 UTC MAIN commitmail json YAML

virtio(4): Fix byte order of DMA data for armeb in the same manner as
aarch64eb.

Fix comments to explain what is going on for {arm,aarch64}eb on QEMU.
This is not due to QEMU bugs; it correctly configures everything for
little-endian environment, and we forcibly change byte order only for
CPU cores during kernel bootstrap.

(rin)

2023-07-07 07:04:18 UTC MAIN commitmail json YAML

Remove extra whitespace inserted during merge. No binary changes.

(rin)

2023-07-07 07:02:59 UTC MAIN commitmail json YAML

Remove duplicate OpenBSD RCSID.

(rin)

2023-07-07 06:03:31 UTC MAIN commitmail json YAML

lint: only skip 'unused' warnings after errors, not other warnings

Previously, in -w mode, any warning suppressed further 'unused'
warnings, even though there was no need to do that.  This can be seen in
the test gcc_attribute_var.c, where only the last unused variable from a
function was marked as unused, the others slipped through.

Fixed by counting the errors and the warnings separately and only
combining them if actually desired.

(rillig)

2023-07-07 04:43:15 UTC MAIN commitmail json YAML

tprof(8): Add support for Skylake-X and Cascade Lake.

(msaitoh)

2023-07-07 04:37:03 UTC MAIN commitmail json YAML

Modify comment. No functional change.

(msaitoh)

2023-07-07 01:31:25 UTC MAIN commitmail json YAML

select(2), poll(2): Clarify return values.

(riastradh)

2023-07-07 00:25:23 UTC MAIN commitmail json YAML

tests/lint: test all combinations of {func,obj}_{decl,def}

For a non-static function definition that is not declared in a header,
lint doesn't currently warn.  The previous test didn't notice this.

(rillig)

2023-07-07 00:20:39 UTC MAIN commitmail json YAML

2023-07-06 21:10:15 UTC MAIN commitmail json YAML

+CAC - cryptographic access control

(jschauma)

2023-07-06 20:44:55 UTC MAIN commitmail json YAML

t_sig_backtrace: Flush stdout before writing to STDOUT_FILENO.

Avoids confusing ordering of output.

(riastradh)

2023-07-06 07:59:00 UTC MAIN commitmail json YAML

lint: add type safety for accessing properties of basic types

No functional change.

(rillig)

2023-07-06 07:33:36 UTC MAIN commitmail json YAML

tests/lint: ensure consistent preprocessor filenames in tests

The deviations often happen when copying or renaming tests.

(rillig)

2023-07-06 02:43:44 UTC MAIN commitmail json YAML

2023-07-06 01:32:52 UTC MAIN commitmail json YAML

bsdmalloc(3): fix malloc() signature

(uwe)

2023-07-05 22:42:48 UTC MAIN commitmail json YAML

src/distrib/sets/lists/debug/mi@1.406 / diff / nxr@1.406
src/distrib/sets/lists/debug/shl.mi@1.314 / diff / nxr@1.314
src/tests/libexec/ld.elf_so/helper.mk@1.1 / diff / nxr@1.1
src/tests/libexec/ld.elf_so/helper_abuse_dynamic/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_abuse_static/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_def_dynamic/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_def_static/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_dso1/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_dso2/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_dso3/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_ifunc_dso/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_onlyctor_dynamic/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_onlydef/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_onlydef_static/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_onlyuse_dynamic/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_onlyuse_static/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_symver_dso0/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_symver_dso1/Makefile@1.4 / diff / nxr@1.4
src/tests/libexec/ld.elf_so/helper_symver_dso2/Makefile@1.4 / diff / nxr@1.4
src/tests/libexec/ld.elf_so/helper_use_dynamic/Makefile@1.2 / diff / nxr@1.2
src/tests/libexec/ld.elf_so/helper_use_static/Makefile@1.3 / diff / nxr@1.3

tests/libexec/ld.elf_so: Fix helper library makefiles.

1. Consolidate logic into a single helper.mk to reduce duplication.
2. Set NO* variables, not MK* variables which are reserved for user.
3. Avoid eager X!= in favour of lazy ${X:sh}.
4. Mark _g.a set list entries obsolete.  Never should've been built!

PR misc/57462

(riastradh)

2023-07-05 22:13:20 UTC MAIN commitmail json YAML

libbsdmalloc: Use a multiply-overflow that clang supports too.

XXX pullup-10

(riastradh)

2023-07-05 16:41:13 UTC MAIN commitmail json YAML

2023-07-05 16:40:34 UTC MAIN commitmail json YAML

mk.conf(5): document rump variables

Update mk.conf(5) with the rump variables from
- lib/librumpuser/README.compileopts
- sys/rump/README.compileopts

Add cross-references back to mk.conf(5) in those files.

Ensure that the Default: is listed last in a description,
for consistency with the convention in this file.

(lukem)

2023-07-05 16:26:29 UTC MAIN commitmail json YAML

Update build instruction for Solaris 11.4 hosts

(palle)

2023-07-05 16:16:49 UTC netbsd-8 commitmail json YAML

2023-07-05 16:15:37 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #1849):

lib/libc/dlfcn/dlfcn_elf.c: revision 1.17

libc: Fix missing membar_consumer in dl_iterate_phdr.

Pairs with the existing membar_producer.

(martin)

2023-07-05 16:14:56 UTC netbsd-9 commitmail json YAML

2023-07-05 16:14:03 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #1662):

lib/libc/dlfcn/dlfcn_elf.c: revision 1.17

libc: Fix missing membar_consumer in dl_iterate_phdr.

Pairs with the existing membar_producer.

(martin)

2023-07-05 16:12:51 UTC netbsd-10 commitmail json YAML

2023-07-05 16:11:51 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #225):

lib/libc/dlfcn/dlfcn_elf.c: revision 1.17

libc: Fix missing membar_consumer in dl_iterate_phdr.

Pairs with the existing membar_producer.

(martin)

2023-07-05 16:09:50 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by abs in ticket #224):

sys/dev/wscons/wsdisplay_vconsvar.h: revision 1.34
sys/dev/wscons/wsdisplay_glyphcachevar.h: revision 1.6
sys/arch/sparc/dev/cgfourteen.c: revision 1.94
sys/arch/sparc/dev/cgfourteen.c: revision 1.95
sys/dev/sbus/mgx.c: revision 1.21
sys/dev/sbus/mgx.c: revision 1.22
sys/dev/sbus/mgx.c: revision 1.23
sys/dev/wscons/wsdisplay_vcons.c: revision 1.65
sys/dev/wscons/wsdisplay_vcons.c: revision 1.66
sys/dev/wscons/wsdisplay_glyphcache.c: revision 1.12
sys/arch/sparc/dev/sxvar.h: revision 1.5
sys/arch/sparc/dev/sx.c: revision 1.6
sys/arch/sparc/dev/sx.c: revision 1.7

make vcons_putchar_buffer() return a flag indicating if anything actually
changed, skip the actual drawing op if nothing did

add flags for drivers to requesr R2L bit/byte-ordered fonts, default to
L2R, chack them in vcons_load_font() instead of just trusting that we'd get
what we need

initialize the diagnostic register with the value suggested by the SunOS
header. This sets a bunch of undocumented bits and yields a 10% speed increase
when rendering antialiased text.

use macros compatible with xf86-video-suncg14 to issue SX instructions
much more readable, alignment weirdness is handled automatically and code is
interchangable

allow drivers to specify horizontal alignment of glyph cache cells
for things like SX which have alignment restrictions

add counter to periodically drain the instruction queue in order to avoid
stalling the MBus during long SX operations

adapted from xf86-video-suncg14
- use sx_wait() to avoid stalling the MBus
- request 32bit alignment for glyphcache cells

wait for the engine to go idle before issuing rectfill commands
we get occasional overlap with blit commands if we just wait for fifo slots
needs further investigation, it is possible that not all writes to drawing
engine registers are pipelined and of course we don't have docs

following a hunch...
- cache DEC and FG registers, only write them if the value actually changes
- wait for the engine to go idle before writing DEC
- wait for FIFO slots on everything else
with this we avoid waiting if possible and still avoid overlapping blit and
fill commands

(martin)

2023-07-05 12:09:39 UTC MAIN commitmail json YAML

t_posix_memalign: Simplify.

No functional change intended.

(riastradh)

2023-07-05 12:08:49 UTC MAIN commitmail json YAML

libbsdmalloc: Make aligned_alloc(A, S) actually align when A > S.

XXX pullup-10

(riastradh)

2023-07-05 12:07:21 UTC MAIN commitmail json YAML

Fix sysctl invocation testing for missing entropy.

(martin)

2023-07-05 11:55:46 UTC netbsd-9 commitmail json YAML

2023-07-05 11:55:04 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by wiz in ticket #1661):

external/bsd/mdocml/dist/st.c: revision 1.2

Really add -isoC-2018 (not just the docs).

(martin)

2023-07-05 11:43:05 UTC MAIN commitmail json YAML

t_posix_memalign: Fix this to reflect restriction lifted in C17.

(riastradh)

2023-07-05 11:42:14 UTC MAIN commitmail json YAML

2023-07-05 11:36:56 UTC MAIN commitmail json YAML

2023-07-05 10:59:08 UTC MAIN commitmail json YAML

Revert "fsck_ffs(8): Ensure A divides S before aligned_alloc(A, S)."

C17 lifted this restriction.

(riastradh)

2023-07-05 10:58:58 UTC MAIN commitmail json YAML

Revert "newfs(8): Ensure A divides S before aligned_alloc(A, S)."

C17 lifted this restriction.

(riastradh)

2023-07-05 10:58:47 UTC MAIN commitmail json YAML

Revert "nvmectl(8): Ensure A divides S before aligned_alloc(A, S)."

C17 lifted this restriction.

(riastradh)

2023-07-05 10:57:44 UTC MAIN commitmail json YAML

libbsdmalloc: Lift C11 divisibility restriction on aligned_alloc.

Restriction was lifted in C17.

XXX pullup-10

(riastradh)

2023-07-05 10:57:33 UTC MAIN commitmail json YAML

Revert "jemalloc: Enforce alignment-must-divide-size rule of aligned_alloc."

Apparently this restriction was lifted in C17, and this was even
documented in a part of the man page I didn't notice because I got
stuck at the incomplete sentence `The aligned_alloc function conforms
to.'.  Sorry for the noise, folks.

(riastradh)

2023-07-05 08:39:24 UTC MAIN commitmail json YAML

2023-07-05 08:39:10 UTC MAIN commitmail json YAML

2023-07-05 07:13:56 UTC MAIN commitmail json YAML

bsdmalloc.3: fix typos in function parameters

(rillig)

2023-07-05 02:54:37 UTC MAIN commitmail json YAML

CPU model 0x5a is not Atom E3500 but Atom Z3500.

(msaitoh)

2023-07-05 01:15:47 UTC MAIN commitmail json YAML

libbsdmalloc: Fix build with DEBUG.

Nix __P while here.

XXX pullup-10

(riastradh)

2023-07-05 00:26:38 UTC MAIN commitmail json YAML

2023-07-04 23:52:44 UTC MAIN commitmail json YAML

mdoc.local: fix libbsdmalloc string name

(uwe)

2023-07-04 20:40:53 UTC MAIN commitmail json YAML

2023-07-04 20:40:43 UTC MAIN commitmail json YAML

nvmectl(8): Ensure A divides S before aligned_alloc(A, S).

Required by C11 Sec. 7.22.3.1 The aligned_alloc function, para. 2,
p. 348:

  The value of alignment shall be a valid alignment supported by the
  implementation and the value of size shall be an integral multiple
  of alignment.

XXX pullup-10

(riastradh)

2023-07-04 20:40:34 UTC MAIN commitmail json YAML

newfs(8): Ensure A divides S before aligned_alloc(A, S).

Required by C11 Sec. 7.22.3.1 The aligned_alloc function, para. 2,
p. 348:

  The value of alignment shall be a valid alignment supported by the
  implementation and the value of size shall be an integral multiple
  of alignment.

XXX pullup-10

(riastradh)

2023-07-04 20:40:22 UTC MAIN commitmail json YAML

fsck_ffs(8): Ensure A divides S before aligned_alloc(A, S).

Required by C11 Sec. 7.22.3.1 The aligned_alloc function, para. 2,
p. 348:

  The value of alignment shall be a valid alignment supported by the
  implementation and the value of size shall be an integral multiple
  of alignment.

XXX pullup-10

(riastradh)

2023-07-04 19:24:25 UTC MAIN commitmail json YAML

libc: Fix missing membar_consumer in dl_iterate_phdr.

Pairs with the existing membar_producer.

XXX pullup-8
XXX pullup-9
XXX pullup-10

(riastradh)

2023-07-04 18:40:15 UTC MAIN commitmail json YAML

libbsdmalloc: Nix K&R definitions.  Bump WARNS to 3.

(riastradh)

2023-07-04 16:23:15 UTC MAIN commitmail json YAML

2023-07-04 16:22:11 UTC MAIN commitmail json YAML

2023-07-04 15:09:04 UTC MAIN commitmail json YAML

libbsdmalloc: Nix trailing whitespace.

No functional change intended.

XXX pullup-10

(riastradh)

2023-07-04 15:08:55 UTC MAIN commitmail json YAML

libbsdmalloc: Provide all allocator front ends and fork hooks.

Front ends:

- aligned_alloc
- calloc
- posix_memalign

Fork hooks:

- _malloc_prefork
- _malloc_postfork
- _malloc_postfork_child

Otherwise these will pull in the jemalloc definitions from libc,
which (a) defeats the purpose, and (b) won't work correctly with
fork and threads.

Thanks to kre@ and the thread on tech-userlevel for pointing me in
the right direction to making this actually work to override
jemalloc:

https://mail-index.netbsd.org/tech-userlevel/2023/06/30/msg013957.html

Note: libbsdmalloc doesn't set errno=ENOMEM on malloc failure, but
these front ends do (even aligned_alloc, which is from C11, which
doesn't define ENOMEM at all, but this pacifies our aligned_alloc
tests in t_posix_memalign.c).  Might want to fix that.

XXX pullup-10

(riastradh)

2023-07-04 15:06:36 UTC MAIN commitmail json YAML

t_posix_memalign: Expand test cases and properties.

- Test cartesian product of a sampling of sizes and a sampling of
  alignments.

- Verify all the edge cases I could find in posix_memalign and
  aligned_alloc, including failure modes.

- Test an unreasonably large (but aligned) allocation size.

- Use ATF_CHECK_* instead of ATF_REQUIRE_* so all failures will be
  reported, not just the first one.

- While here, build with -fno-builtin-aligned_alloc and with
  -fno-builtin-posix_memalign to make sure the compiler doesn't try
  any shenanigans.

XXX pullup-10

(riastradh)

2023-07-04 15:06:28 UTC MAIN commitmail json YAML

jemalloc: Enforce alignment-must-divide-size rule of aligned_alloc.

C11, Sec. 7.22.3.1 The aligned_alloc function, paragraph 2, p. 348:

  The value of alignment shall be a valid alignment supported by the
  implementation and the value of size shall be an integral multiple
  of alignment.

posix_memalign does not appear to have any corresponding constraint.

XXX pullup-10

(riastradh)

2023-07-04 01:02:50 UTC MAIN commitmail json YAML

riscv: Fix (U)INT64_C suffix to match gcc's built-in idea of types.

XXX pullup-10

(riastradh)

2023-07-04 01:02:26 UTC MAIN commitmail json YAML

tpm(4): Switch tsleep to kpause.

Nothing is interrupt-driven here, so no need for condvars to allow
more prompt wakeups.

(riastradh)

2023-07-03 21:36:16 UTC MAIN commitmail json YAML

lint: consistently use portable type size in integer constraints

Since tree.c 1.546 from 2023-07-03, lint no longer warned about possible
loss of accuracy when converting from 'long' to 'int' on an ILP32
platform that uses 'unsigned long' for size_t, when run in portable mode
(-p), which is enabled by default in the NetBSD build.

The integer constraints avoid false-positive warnings by looking at the
actual values an expression can take.  The function can_represent is
guarded by a condition that uses the portable_size_in_bits, but then
internally used the opposite size_in_bits, which led to inconsistent
results.

The warning looks confusing though, as on an ILP32 platform, 'int' and
'long' have the same size and representation, therefore there cannot be
an actual loss of accuracy.  The warning may need to be reworded to
explicitly mention the portability mode, in which sizeof(int) is assumed
to be 3 instead of 4, to catch possible loss of accuracy on other
platforms.

(rillig)

2023-07-03 18:50:42 UTC MAIN commitmail json YAML

PR/57500: Palle Lyckegaard: include missing tools/compat/regex.h for
__{BEGIN,END}_DECLS.

(christos)

2023-07-03 17:05:11 UTC MAIN commitmail json YAML

Enable MEMORY_DISK_DYNAMIC & co. to match std.generic64

Allows loading of ramdisk.fs via u-boot initrd (to run sysinst)

(jakllsch)

2023-07-03 15:29:42 UTC MAIN commitmail json YAML

tests/lint: move platform-specific query tests to separate files

This fixes the tests on 'unsigned char' platforms.

Thanks martin@ for the notification.

(rillig)

2023-07-03 11:16:32 UTC MAIN commitmail json YAML

2023-07-03 10:23:12 UTC MAIN commitmail json YAML

2023-07-03 10:14:31 UTC MAIN commitmail json YAML

lint: remove redundant comments for command line flags

(rillig)

2023-07-03 09:40:29 UTC netbsd-10 commitmail json YAML

2023-07-03 09:39:39 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by hgutch in ticket #223):

tools/llvm-lib/libLLVMSupport/Makefile: revision 1.2
external/apache2/llvm/autoconf/include/llvm/Config/config.h.in: revision 1.3

Fix LLVM build with host gcc 13

Building LLVM with a host gcc 13 fails and suggests including <cstdint>
in external/apache2/llvm/dist/llvm/include/llvm/Support/Signals.h .

Instead of this, joerg@ suggested not modifying the llvm vendor branch
but instead working around this in our LLVM build infrastructure.

(martin)

2023-07-03 09:37:14 UTC MAIN commitmail json YAML

2023-07-03 09:33:07 UTC MAIN commitmail json YAML

lint: fix C11 mode to not allow C23 features (since yesterday)

(rillig)

2023-07-03 07:19:57 UTC MAIN commitmail json YAML

2023-07-03 07:03:20 UTC MAIN commitmail json YAML

2023-07-02 23:56:12 UTC MAIN commitmail json YAML

dri.old: disable lint again

(rillig)

2023-07-02 23:45:10 UTC MAIN commitmail json YAML

2023-07-02 23:40:23 UTC MAIN commitmail json YAML

2023-07-02 22:56:13 UTC MAIN commitmail json YAML

2023-07-02 22:50:18 UTC MAIN commitmail json YAML

tests/lint: demonstrate empty statement in GCC statement expression

Seen in external/mit/xorg/lib/dri.old.

(rillig)

2023-07-02 21:37:49 UTC MAIN commitmail json YAML

lint: eliminate redundant conditions

(rillig)

2023-07-02 18:28:15 UTC MAIN commitmail json YAML

2023-07-02 18:14:44 UTC MAIN commitmail json YAML

2023-07-02 17:41:30 UTC MAIN commitmail json YAML

lint: use unsigned int for struct alignment

This gets rid of 'unsigned short', which saved a few bytes of memory but
was inconvenient to deal with.

No functional change.

(rillig)

2023-07-02 13:25:52 UTC MAIN commitmail json YAML

getrandom(2): Reduce editorializing tone in man page.

XXX pullup-10

(riastradh)

2023-07-02 12:39:05 UTC MAIN commitmail json YAML

Fix typo in comment.

(nia)

2023-07-02 10:20:46 UTC MAIN commitmail json YAML

lint: extend debug logging for declaration levels

Indent the debug logging according to the declaration level.

Since there are a few cases where the enclosing declaration levels are
modified, log the whole declaration level stack whenever a level begins
or ends.

(rillig)

2023-07-02 10:02:09 UTC MAIN commitmail json YAML

Fix HTTPS through Proxy.

While a regular HTTP Proxy, requires the absolute URL with protocol
and host part, yyou must only send the relative URL through a
CONNECT tunnel (you are talking to the target server).

(mlelstv)

2023-07-02 09:40:25 UTC MAIN commitmail json YAML

lint: initialize unnamed member like an unnamed bit-field

See set_bit_field_width.

(rillig)

2023-07-02 08:16:19 UTC MAIN commitmail json YAML

2023-07-02 00:52:04 UTC MAIN commitmail json YAML

libc/shlib_version: note that *rand48* should be punted to libcompat

(dholland)

2023-07-01 20:57:37 UTC MAIN commitmail json YAML

tests/lint: rework tests for type names

(rillig)

2023-07-01 15:16:46 UTC MAIN commitmail json YAML

dri.old: only disable lint for a single file

(rillig)

2023-07-01 13:37:48 UTC MAIN commitmail json YAML

2023-07-01 13:37:36 UTC MAIN commitmail json YAML

Add Realtek ALC671 to hdaudiodevs, seen on Fujitsu Futro S720 thin client

(nia)

2023-07-01 12:36:10 UTC MAIN commitmail json YAML

Don't call UP script when an IP address becomes deprecated.

(mlelstv)

2023-07-01 10:51:35 UTC MAIN commitmail json YAML

tetris(6): Support the informal standard of allowing setting NO_COLOR
in the environment to disable the use of color. (no-color.org)

(nia)

2023-07-01 10:47:12 UTC MAIN commitmail json YAML

Use ENVIRONMENT section

(nia)

2023-07-01 10:04:27 UTC MAIN commitmail json YAML

lint: constify, reduce indentation

No functional change.

(rillig)

2023-07-01 09:59:51 UTC MAIN commitmail json YAML

lint: clean up comments in lint1.h

(rillig)

2023-07-01 09:31:56 UTC MAIN commitmail json YAML

2023-07-01 09:21:48 UTC MAIN commitmail json YAML

doc/CHANGES: fix typos

(rillig)

2023-07-01 09:21:31 UTC MAIN commitmail json YAML

2023-07-01 09:06:34 UTC MAIN commitmail json YAML

tests/make: show how to use indirect conditions in the '?:' modifier

(rillig)

2023-07-01 07:10:13 UTC MAIN commitmail json YAML

Fix build when KERNHIST defined, but not UVMHIST

(skrll)

2023-07-01 06:29:14 UTC MAIN commitmail json YAML

jemalloc: enable lint again, it is no longer broken

Since today, lint handles unnamed struct/union correctly.

(rillig)

2023-07-01 06:09:24 UTC MAIN commitmail json YAML

2023-06-30 23:36:48 UTC MAIN commitmail json YAML

audioplay.1: fix sentence punctuation

(gutteridge)

2023-06-30 22:27:47 UTC MAIN commitmail json YAML

tests/lint: test initializing an unnamed union

(rillig)

2023-06-30 22:15:14 UTC MAIN commitmail json YAML

getentropy(3): use .Sx to xref CAVEATS

(uwe)

2023-06-30 21:48:15 UTC MAIN commitmail json YAML

2023-06-30 21:46:21 UTC MAIN commitmail json YAML

src/external/bsd/openpam/dist/bin/pamtest/pamtest.1@1.10 / diff / nxr@1.10
src/external/bsd/openpam/dist/bin/pamtest/pamtest.c@1.8 / diff / nxr@1.8
src/external/bsd/openpam/dist/bin/su/su.1@1.10 / diff / nxr@1.10
src/external/bsd/openpam/dist/bin/su/su.c@1.8 / diff / nxr@1.8
src/external/bsd/openpam/dist/config.guess@1.4 / diff / nxr@1.4
src/external/bsd/openpam/dist/config.sub@1.4 / diff / nxr@1.4
src/external/bsd/openpam/dist/doc/man/openpam.3@1.12 / diff / nxr@1.12
src/external/bsd/openpam/dist/doc/man/openpam_borrow_cred.3@1.9 / diff / nxr@1.9
src/external/bsd/openpam/dist/doc/man/openpam_free_data.3@1.9 / diff / nxr@1.9
src/external/bsd/openpam/dist/doc/man/openpam_free_envlist.3@1.10 / diff / nxr@1.10
src/external/bsd/openpam/dist/doc/man/openpam_get_feature.3@1.8 / diff / nxr@1.8
src/external/bsd/openpam/dist/doc/man/openpam_get_option.3@1.9 / diff / nxr@1.9
src/external/bsd/openpam/dist/doc/man/openpam_log.3@1.9 / diff / nxr@1.9
src/external/bsd/openpam/dist/doc/man/openpam_nullconv.3@1.9 / diff / nxr@1.9
src/external/bsd/openpam/dist/doc/man/openpam_readline.3@1.9 / diff / nxr@1.9
src/external/bsd/openpam/dist/doc/man/openpam_readlinev.3@1.8 / diff / nxr@1.8
src/external/bsd/openpam/dist/doc/man/openpam_readword.3@1.8 / diff / nxr@1.8
src/external/bsd/openpam/dist/doc/man/openpam_restore_cred.3@1.9 / diff / nxr@1.9
src/external/bsd/openpam/dist/doc/man/openpam_set_feature.3@1.8 / diff / nxr@1.8
src/external/bsd/openpam/dist/doc/man/openpam_set_option.3@1.9 / diff / nxr@1.9
      :
(more 136 files)
merge openpam ximenia

(christos)

2023-06-30 21:44:22 UTC MAIN commitmail json YAML

getrandom(2), getentropy(3): Rework man pages.

Make supportable promises.  Omit needless verbiage.  Give caveats
with cross-references to entropy(7).  Emphasize that security is
necessarily relative to system configuration.

XXX pullup-10

(riastradh)

2023-06-30 21:44:09 UTC MAIN commitmail json YAML

rc.conf(5): Set entropy=wait by default.

We no longer block indefinitely -- if nothing else, the hardclock
timer should yield enough samples to unblock /dev/random on all but
the most severely deterministic machines -- so it should be generally
safe for availability to set entropy=wait.

This doesn't guarantee that HWRNG/seed has been provided before you
run ssh-keygen or call getentropy(3) in a user application, but it
does raise the security above netbsd<=9.

PR security/55659
PR lib/56905

XXX pullup-10

(riastradh)

2023-06-30 21:42:29 UTC MAIN commitmail json YAML

security(5): Check kern.entropy.needed for confident entropy.

Don't test whether a non-blocking read from /dev/random would return
data.

For the sake of availability, /dev/random will unblock based on sources
like timer interrupts, which we can't confidently assert anything about
the actual unpredictability of.

Here, the goal is to highlight systems that have neither obtained
entropy from an HWRNG with a confident entropy assessment, nor been
seeded from a source the operator knows about.

XXX pullup-10

(riastradh)

2023-06-30 21:42:06 UTC MAIN commitmail json YAML

entropy(9): Reintroduce netbsd<=9 time-delta estimator for unblocking.

The system will (in a subsequent change) by default block for this
condition before almost all of userland is running (including
/etc/rc.d/sshd key generation).  That way, a never-blocking
getentropy(3) API will never return any data without at least
best-effort entropy like netbsd<=9 did to applications except in
single-user mode (where you have to be careful about everything
anyway) or in the few processes that run before a seed can even be
loaded (where blocking indefinitely, e.g. when generating a stack
protector cookie in libc, could pose a severe availability problem
that can't be configured away, but where the security impact is low).

However, (in another subsequent change) we will continue to use
_only_ HWRNG driver estimates and seed estimates, and _not_
time-delta estimator, for _warning_ about security in motd, daily
security report, etc.  And if HWRNG/seed provides enough entropy
before time-delta estimator does, that will unblock /dev/random too.

The result is:

- Machines with HWRNG or seed won't warn about entropy and will
  essentially never block -- even on first boot without a seed, it
  will take only as long as the fastest HWRNG to unblock.

- Machines with neither HWRNG nor seed:
  . will warn about entropy, giving feedback about security;
    and
  . will avoid returning anything more predictable than netbsd<=9;
    but
  . won't block (much) longer than netbsd<=9 would (and won't block
    again after blocking once, except with kern.entropy.depletion=1 for
    testing).

  (The threshold for unblocking is now somewhat higher than before:
  512 samples that pass the time-delta estimator, rather than 80 as
  it used to be.)

  And, of course, adding a seed (or HWRNG) will prevent both warnings
  and blocking.

The mechanism is:

1. /dev/random will block until _either_

  (a) enough bits of entropy (256) from reliable sources have been
      added to the pool, _or_

  (b) enough samples have been added from any sources (512), passing
      the old time-delta entropy estimator, that the possible
      security benefit doesn't justify holding up availability any
      longer (`best effort'), except on systems with higher security
      requirements like securelevel=2 which can disable non-HWRNG,
      non-seed sources with rndctl_flags in rc.conf(5).

2. dmesg will report `entropy: ready' when 1(a) is satisfied, but if
  1(b) is satisfied first, it will report `entropy: best effort', so
  the concise log messages will reflect the timing and whether in
  any period of time any of the system might be relying on best
  effort entropy.

3. The sysctl knob kern.entropy.needed (and the ioctl RNDGETPOOLSTAT
  variable rndpoolstat_t::added) still reflects the number of bits
  of entropy from reliable sources, so we can still use this to
  suggest regenerating ssh keys.

  This matters on platforms that can only be reached, after flashing
  an installation image, by sshing in over a (private) network, like
  small network appliances or remote virtual machines without
  (interactive) serial consoles.  If we blocked indefinitely at boot
  when generating ssh keys, such platforms would be unusable.  This
  way, platforms are usable, but operators can still be advised at
  login time to regenerate keys as soon as they can actually load
  entropy onto the system, e.g. with rndctl(8) on a seed file copied
  from a local machine over the (private) network.

4. On machines without HWRNG, using a seed file still suppresses
  warnings for users who need more confident security.  But it is no
  longer necessary for availability.

This is a compromise between availability and security:

- The security mechanism of blocking indefinitely on machines without
  HWRNG hurts availability too much, as painful experience over the
  multiple years since I made the mistake of introducing it have
  shown.  (Sorry!)

- The other main alternative, not having a blocking path at all (as I
  pushed for, and as OpenBSD has done for a long time) could
  potentially reduce security vs netbsd<=9, and would run against the
  expectations set by many popular operating systems to the severe
  detriment of public perception of NetBSD security.

Even though we can't _confidently_ assess enough entropy from, e.g.,
sampling interrupt timings, this is the traditional behaviour that
most operating systems provide -- and the result here is a net
nondecrease in security over netbsd<=9, because all paths from the
entropy pool to userland now have at least as high a standard before
returning data as they did in netbsd<=9.

PR kern/55641
PR pkg/55847
PR kern/57185
https://mail-index.netbsd.org/current-users/2020/09/02/msg039470.html
https://mail-index.netbsd.org/current-users/2020/11/21/msg039931.html
https://mail-index.netbsd.org/current-users/2020/12/05/msg040019.html

XXX pullup-10

(riastradh)

2023-06-30 21:39:54 UTC MAIN commitmail json YAML

lint: clean up names related to declaration levels

The previous prefix 'DK_' (declaration level kind) had a conflict with
the 'DK_' (designator kind) in init.c, so change the prefix to 'DLK_'.
The new name for dinfo_t is decl_level, which is more expressive.

No functional change.

(rillig)

2023-06-30 21:06:19 UTC MAIN commitmail json YAML

lint: fix handling of unnamed struct/union members

The support for unnamed struct/union members that was added in decl.c
1.60 from 2015-10-13 was simple but wrong. It didn't cover initializers
of these structures and computed wrong sizes for structures containing
anonymous unions. At that time, the handling of initializers was broken
as well, it was fixed 6 years later in init.c 1.229 from 2021-12-22.

Real-life examples for code that lint couldn't handle are:

* external/bsd/jemalloc/dist/src/jemalloc.c
* external/mit/xorg/lib/dri.old/Makefile

(rillig)

2023-06-30 19:43:01 UTC MAIN commitmail json YAML

lint: replace macro for unique identifiers with function

No functional change.

(rillig)

2023-06-30 19:10:49 UTC MAIN commitmail json YAML

2023-06-30 18:10:44 UTC netbsd-10 commitmail json YAML

2023-06-30 18:10:12 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by martin in ticket #220):
usr.bin/dc/bcode.c: revision 1.4
Make this compile when BIGNUM limbs (BN_ULONG) are not the same
size as "unsigned long" (e.g. in bn(64/32) configurations of openssl).

(bouyer)

2023-06-30 17:23:13 UTC netbsd-9 commitmail json YAML

2023-06-30 17:22:17 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by manu in ticket #1658):

sys/arch/i386/stand/bootxx/boot1.c: revision 1.22

Primary bootstrap is now able to read a GPT inside RAIDframe.

Previously, primary bootstrap was able to boot on RAID-1 RAIDframe set
with the limitation that the FFS filesystem had to start at bloc 0 in the
RAID. That allowed inner RAID partitionning with a disklabel, but not with
a GPT.

When booting on a RAID-1 RAIDframe, primary bootstrap now first try a
filesystem at bloc 0 of the RAID as before. On failure, it tries to
read a GPT and load secondary bootstrap from, by priority;
1) the first partition with the bootme attribute set
2) the first partition of type FFS, LFS, CCD or CGD
3) the first partition present in the GPT

(martin)

2023-06-30 17:21:33 UTC netbsd-10 commitmail json YAML

2023-06-30 17:20:28 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by manu in ticket #222):

sys/arch/i386/stand/bootxx/boot1.c: revision 1.22

Primary bootstrap is now able to read a GPT inside RAIDframe.

Previously, primary bootstrap was able to boot on RAID-1 RAIDframe set
with the limitation that the FFS filesystem had to start at bloc 0 in the
RAID. That allowed inner RAID partitionning with a disklabel, but not with
a GPT.

When booting on a RAID-1 RAIDframe, primary bootstrap now first try a
filesystem at bloc 0 of the RAID as before. On failure, it tries to
read a GPT and load secondary bootstrap from, by priority;
1) the first partition with the bootme attribute set
2) the first partition of type FFS, LFS, CCD or CGD
3) the first partition present in the GPT

(martin)

2023-06-30 17:13:50 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #221):

external/cddl/osnet/dist/tools/ctf/cvt/ctfmerge.c: revision 1.18
external/cddl/osnet/sys/sys/opentypes.h: revision 1.7
tools/compat/configure: revision 1.100
external/cddl/osnet/dist/tools/ctf/cvt/barrier.c: revision 1.6
external/cddl/osnet/dist/tools/ctf/cvt/barrier.h: revision 1.4
external/cddl/osnet/dist/tools/ctf/cvt/barrier.c: revision 1.7
external/cddl/osnet/dist/tools/ctf/cvt/barrier.c: revision 1.8
tools/compat/configure.ac: revision 1.100
external/cddl/osnet/dist/tools/ctf/cvt/tdata.c: revision 1.10
tools/compat/nbtool_config.h.in: revision 1.54

ctfmerge: error check sem_*() and pthread_*() APIs

terminate() if sem_*() returns -1 or pthread_*() returns != 0.
(Set errno from pthread_*() so terminate() prints the strerror message).

Note: Failing on errors instead of ignoring them helps identify
reasons for intermittent failures, such as those on macOS host builds:

  ERROR: nbctfmerge: barrier_init: sem_init(bar_sem): Function not implemented

ctfmerge: fix macOS semaphore implementation

Use dispatch_semaphore_create() if present instead of sem_init().
macOS doesn't actually implement sem_init() (et al)
(even though it provides the prototypes as deprecated).

This was detected by the previous commit to ctfmerge
that added error handling.

Implement ctfmerge's barrier operations in terms of
dispatch(3) APIs such as dispatch_semaphore_create() (et al).

Update tools/compat/configure.ac to find dispatch_semaphore_create().
Fixes ctfmerge on macOS hosts.

Inspired by https://stackoverflow.com/a/27847103

tools/compat: regen for dispatch_semaphore_create

ctfmerge: fix macOS semaphore implementation, part 2
dispatch_semaphore_signal() doesn't return an error, just an
indicator of whether a thread was woken or not, so there's
no need to fail on non-zero return.

osnet: on macOS, use <mach/boolean.h> for boolean_t
macOS/x86_64 defines boolean_t as 'unsigned int' not 'int',
which causes a build issue with tools/ctfmerge on that host
after my recent fixes for macOS semaphores.

So use the <mach/boolean.h> instead of a local typedef ifdef __APPLE__.
May fix a macOS/x86_64 build issue reported by cjep@.
Builds fine on NetBSD/amd64 or macOS/arm.

Note: this compat stuff is clunky, and based on the commit log,
annoyingly error prone. A newer sync of osnet from upstream /may/
improve a lot of these compat typedef workarounds for solaris types...

(martin)

2023-06-30 16:39:17 UTC MAIN commitmail json YAML

2023-06-30 15:19:10 UTC MAIN commitmail json YAML

lint: fix computation of bit-field width

When bit-fields in packed structs were added on 2009-10-02, lint assumed
that they would only use 'signed int' or 'unsigned int' as storage unit,
even though C99 also allows _Bool.

The cleanup commit for decl.c 1.225 from 2021-08-28 accidentally changed
the rounding mode for bit-field storage units from round-up to
round-down.

(rillig)

2023-06-30 14:39:24 UTC MAIN commitmail json YAML

lint: clean up packing of structs and unions

No functional change outside debug mode.

(rillig)

2023-06-30 12:21:25 UTC MAIN commitmail json YAML

2023-06-30 09:26:03 UTC MAIN commitmail json YAML

2023-06-30 09:21:53 UTC MAIN commitmail json YAML

2023-06-30 08:48:38 UTC MAIN commitmail json YAML

lint: use NULL for null pointer constants

No binary change.

(rillig)

2023-06-30 08:45:22 UTC MAIN commitmail json YAML

2023-06-30 08:03:02 UTC MAIN commitmail json YAML

2023-06-30 07:18:02 UTC MAIN commitmail json YAML

tests/lint: demonstrate bugs in anonymous struct/union handling

(rillig)

2023-06-30 02:03:59 UTC MAIN commitmail json YAML

PosixDaemon.c: restore NetBSD logging additions lost in merges

Restore part of local modifications r. 1.2 & 1.4 from tsarna@. One
aspect could not be carried forward, as Apple dropped the bug detection
query functionality that was formerly represented by the teststate
member of the DNSServer struct. Otherwise, reapplied almost verbatim,
except for minor consistency and style changes.

This was added again in part as an example should there be a need to
add further logging content for NetBSD's purposes. (DumpStateLog() has
changed further as of Apple's 1790.80.10 release, but should we roll
forward, our means here should still be viable.)

(gutteridge)

2023-06-30 01:59:45 UTC MAIN commitmail json YAML

PosixDaemon.c: convert tabs to spaces to match coding style

Match Apple's coding style for this project. (In part for those of us
who have tabs visually representing four spaces!)

(gutteridge)

2023-06-30 00:48:03 UTC MAIN commitmail json YAML

2023-06-29 23:59:43 UTC MAIN commitmail json YAML

prepare-import.sh: fix grammar in a comment

(gutteridge)

2023-06-29 23:52:50 UTC MAIN commitmail json YAML

3RDPARTY: note latest version of mDNSResponder

(gutteridge)

2023-06-29 23:20:02 UTC MAIN commitmail json YAML

npflog.4: add and adjust some details

Add details about the header structure (though the if_npflog.h file is
not presently installed and has a _KERNEL guard). Also adjust some
sentences (requested by riastradh@), and include the original OpenBSD
RCS ID, since much of this content shares that origin.

(gutteridge)

2023-06-29 22:52:44 UTC MAIN commitmail json YAML

2023-06-29 21:46:47 UTC MAIN commitmail json YAML

ch-ch-changes

(nia)

2023-06-29 21:01:21 UTC MAIN commitmail json YAML

s/determin /determine / in comment.

(andvar)

2023-06-29 19:06:54 UTC MAIN commitmail json YAML

aiomixer(1): Support the informal NO_COLOR standard.

When the NO_COLOR environment variable is set, no ANSI colours will
be displayed.

https://no-color.org/

(nia)

2023-06-29 16:11:31 UTC MAIN commitmail json YAML

vis(3): Avoid nonportable MIN in portable code.

(riastradh)

2023-06-29 14:18:58 UTC MAIN commitmail json YAML

Primary bootstrap is now able to read a GPT inside RAIDframe.

Previously, primary bootstrap was able to boot on RAID-1 RAIDframe set
with the limitation that the FFS filesystem had to start at bloc 0 in the
RAID. That allowed inner RAID partitionning with a disklabel, but not with
a GPT.

When booting on a RAID-1 RAIDframe, primary bootstrap now first try a
filesystem at bloc 0 of the RAID as before. On failure, it tries to
read a GPT and load secondary bootstrap from, by priority;
1) the first partition with the bootme attribute set
2) the first partition of type FFS, LFS, CCD or CGD
3) the first partition present in the GPT

(manu)

2023-06-29 12:52:07 UTC MAIN commitmail json YAML

2023-06-29 10:31:33 UTC MAIN commitmail json YAML

2023-06-29 09:58:36 UTC MAIN commitmail json YAML

2023-06-29 05:47:41 UTC MAIN commitmail json YAML

lint: enhance debug output for diagnostics

Only print the debug message if the diagnostic is active, which is
relevant for c99ism, c11ism and gnuism.

Print more details about the diagnostic or query.

(rillig)

2023-06-29 05:03:03 UTC MAIN commitmail json YAML

lint: clean up completion of struct, union and enum declarations

No functional change.

(rillig)

2023-06-29 01:30:31 UTC MAIN commitmail json YAML

Avoid comparing signed and unsigned values (using signed here seems
safer than the usual unsigned when this happens).  Might fix build.

(kre)

2023-06-28 22:47:39 UTC MAIN commitmail json YAML

tmux: also set HAVE_REALLOCARRAY

(wiz)

2023-06-28 22:24:15 UTC MAIN commitmail json YAML

doc: note import of tmux 3.3a

(wiz)

2023-06-28 22:21:48 UTC MAIN commitmail json YAML

update build system for tmux 3.3a

(wiz)

2023-06-28 22:21:26 UTC MAIN commitmail json YAML

2023-06-28 21:41:27 UTC MAIN commitmail json YAML

tests/lint: demonstrate wrong size calculation in anonymous union

(rillig)

2023-06-28 20:51:31 UTC MAIN commitmail json YAML

tests/lint: do not overwrite expected files that only differ in spaces

(rillig)

2023-06-28 17:53:21 UTC MAIN commitmail json YAML

tests/lint: fix preprocessor line number validation

When running the tests via ATF, the filename was an absolute filename,
while the preprocessing line in the test file uses a relative filename.
These two didn't match.

(rillig)

2023-06-28 15:04:07 UTC MAIN commitmail json YAML

tests/lint: demonstrate wrong handling of nested initializer

Seen in external/bsd/jemalloc/dist/src/jemalloc.c, init_lock.

(rillig)

2023-06-28 13:50:47 UTC MAIN commitmail json YAML

lint: allow to keep the preprocessor output on success as well

(rillig)

2023-06-28 11:08:47 UTC MAIN commitmail json YAML

following a hunch...
- cache DEC and FG registers, only write them if the value actually changes
- wait for the engine to go idle before writing DEC
- wait for FIFO slots on everything else
with this we avoid waiting if possible and still avoid overlapping blit and
fill commands

(macallan)

2023-06-28 09:35:43 UTC MAIN commitmail json YAML

tests/lint: use standard form of ATF tests, test removing output file

(rillig)

2023-06-28 08:53:43 UTC MAIN commitmail json YAML

wait for the engine to go idle before issuing rectfill commands
we get occasional overlap with blit commands if we just wait for fifo slots
needs further investigation, it is possible that not all writes to drawing
engine registers are pipelined and of course we don't have docs

(macallan)

2023-06-28 08:11:52 UTC MAIN commitmail json YAML

fix tpyo - now the glyph cache can actually work...

(macallan)

2023-06-28 06:15:42 UTC MAIN commitmail json YAML

tests/make: extend test for the 'empty' function in conditions

(rillig)

2023-06-28 06:15:07 UTC MAIN commitmail json YAML

make.1: clean up wording, clarify scope of '!' in conditions

(rillig)

2023-06-27 21:43:58 UTC MAIN commitmail json YAML

correct register function annotation as it's for receive coalesce.

(nisimura)

2023-06-27 19:30:27 UTC MAIN commitmail json YAML

remove double/tripple o in comments, where it likely was not added on purpose.

(andvar)

2023-06-27 18:56:25 UTC netbsd-10 commitmail json YAML

2023-06-27 18:51:47 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by pho in ticket #219):

sys/kern/kern_timeout.c: revision 1.74
sys/kern/kern_timeout.c: revision 1.75
sys/kern/kern_timeout.c: revision 1.76

callout(9): Fix panic() in callout_destroy() (kern/57226)

The culprit was callout_halt(). "(c->c_flags & CALLOUT_FIRED) != 0" wasn't
the correct way to check if a callout is running. It failed to wait for a
running callout to finish in the following scenario:
1. cpu0 initializes a callout and schedules it.
2. cpu0 invokes callout_softlock() and fires the callout, setting the flag
    CALLOUT_FIRED.
3. The callout invokes callout_schedule() to re-schedule itself.
4. callout_schedule_locked() clears the flag CALLOUT_FIRED, and releases
    the lock.
5. Before the lock is re-acquired by callout_softlock(), cpu1 decides to
    destroy the callout. It first invokes callout_halt() to make sure the
    callout finishes running.
6. But since CALLOUT_FIRED has been cleared, callout_halt() thinks it's not
    running and therefore returns without invoking callout_wait().
7. cpu1 proceeds to invoke callout_destroy() while it's still running on
    cpu0. callout_destroy() detects that and panics.

callout(9): Tidy up the condition for "callout is running on another LWP"
No functional changes.

callout(9): Delete the unused member cc_cancel from struct callout_cpu
I see no reason why it should be there, and believe its a leftover from
some old code.

(martin)

2023-06-27 18:48:20 UTC netbsd-9 commitmail json YAML

2023-06-27 18:47:31 UTC netbsd-8 commitmail json YAML

2023-06-27 18:45:21 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by reinoud in ticket #1848):

sys/fs/nilfs/nilfs_subr.h: revision 1.5

Remove old prototypes from writing that shouldn't have been comitted at all!

(martin)

2023-06-27 18:44:05 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by reinoud in ticket #1657):

sys/fs/nilfs/nilfs_subr.h: revision 1.5

Remove old prototypes from writing that shouldn't have been comitted at all!

(martin)

2023-06-27 18:42:39 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by reinoud in ticket #218):

sys/fs/nilfs/nilfs_subr.h: revision 1.5

Remove old prototypes from writing that shouldn't have been comitted at all!

(martin)

2023-06-27 18:39:47 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by nia in ticket #217):

etc/root/dot.profile: revision 1.35

As with normal users, include /usr/games in the default PATH of root

(martin)

2023-06-27 18:36:54 UTC netbsd-8 commitmail json YAML

Pull up the following revisions, requested by msaitoh in #1847:

sys/dev/pci/if_wm.c 1.768-1.782 via patch
sys/dev/pci/if_wmreg.h 1.129-1.130
sys/dev/pci/if_wmvar.h 1.49

wm(4):
- Rework for event counters:
  - Fix calculation of GORC, GOTC, TOR and TOT counters correctly.
  - Rearrange the order of the registers so that they are roughly
    in ascending order.
  - Reorder evcnt_attach_dynamic(), WM_EVCNT_ADD() and evcnt_detach()
    to match.
  - IC{TX,RX}*C registers are for older than 82575.
  - Fix a bug that the transmit underrun counter is incorrectly
    counted.
  - Don't add "Count" for event counter's description.
  - Some statistics registers were replaced with new counters on newer
    chips. Treat 0x403c(CEXTERR->HTDPMC), 0x40fc(TSCTFC->CBRMPC),
    0x4124(ICRXOC->HTCBDPC) and from 0x4104 to 0x4124.
  - Add some new counters:
    - Circuit Breaker TX Manageability Packet
    - Circuit Breaker RX Dropped Packet
    - Host Good Octets RX
    - Host Good Octets TX
    - Length Errors
    - SerDes/SGMII Code Violation Packet
    - Header Redirection Missed Packet
    - EEE TX LPI
    - EEE RX LPI
  - Fix prc511's comment and description.
- Add SOICZIFDATA (ifconfig -z) support for evcnt(9).
- Use WM_IS_ICHPCH(). No functional change.
- Fix typo. s/ictxact/ictxatc/. No functional change.
- Add comment.

(martin)

2023-06-27 18:32:46 UTC netbsd-9 commitmail json YAML

Pull up the following revisions, requested by msaitoh in #1656:

sys/dev/pci/if_wm.c 1.768-1.782 via patch
sys/dev/pci/if_wmreg.h 1.129-1.130
sys/dev/pci/if_wmvar.h 1.49

wm(4):
- Rework for event counters:
  - Fix calculation of GORC, GOTC, TOR and TOT counters correctly.
  - Rearrange the order of the registers so that they are roughly
    in ascending order.
  - Reorder evcnt_attach_dynamic(), WM_EVCNT_ADD() and evcnt_detach()
    to match.
  - IC{TX,RX}*C registers are for older than 82575.
  - Fix a bug that the transmit underrun counter is incorrectly
    counted.
  - Don't add "Count" for event counter's description.
  - Some statistics registers were replaced with new counters on newer
    chips. Treat 0x403c(CEXTERR->HTDPMC), 0x40fc(TSCTFC->CBRMPC),
    0x4124(ICRXOC->HTCBDPC) and from 0x4104 to 0x4124.
  - Add some new counters:
    - Circuit Breaker TX Manageability Packet
    - Circuit Breaker RX Dropped Packet
    - Host Good Octets RX
    - Host Good Octets TX
    - Length Errors
    - SerDes/SGMII Code Violation Packet
    - Header Redirection Missed Packet
    - EEE TX LPI
    - EEE RX LPI
  - Fix prc511's comment and description.
- Add SOICZIFDATA (ifconfig -z) support for evcnt(9).
- Use WM_IS_ICHPCH(). No functional change.
- Fix typo. s/ictxact/ictxatc/. No functional change.
- Add comment.

(martin)

2023-06-27 18:24:18 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by msaitoh in ticket #216):

sys/dev/pci/if_wm.c: revision 1.782

Add missing read to count Circuit Breaker Rx Dropped Packet correctly.

(martin)

2023-06-27 18:20:18 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by rin in ticket #215):

usr.sbin/paxctl/paxctl.8: revision 1.17
usr.sbin/paxctl/paxctl.8: revision 1.18
usr.bin/crunch/crunchgen/crunchgen.c: revision 1.95
usr.sbin/paxctl/paxctl.c: revision 1.13

paxctl(8): Introduce -0 option to clear all PaX flag bits in ELF note.
Part of PR toolchain/52675

crunchgen(1): Clear PaX flags instead of removing its ELF note section.
The latter results in zero-filled hole in ELF note segment for EARM,
where PaX section is not located the bottom of that segment (see
src/lib/csu/sysident.S). Fortunately, this hole does not cause real
harms for our in-kernel ELF note parser, except for noisy warnings on
DIAGNOSTIC kernels.

Bump CRUNCH_VERSION.

PR toolchain/52675

Use Fl for options.

(martin)

2023-06-27 18:12:09 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by hauke in ticket #1655):

usr.bin/vacation/vacation.c: revision 1.38
usr.bin/vacation/vacation.1: revision 1.33

Make vacation(1) check 'Auto-Submitted:' (RFC 3834) in addition to
'Precedence:' (RFC 2076), and set 'Precedence:' in addition to
'Auto-Submitted:'.

Update the man page accordingly.

(martin)

2023-06-27 18:09:44 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by hauke in ticket #214):

usr.bin/vacation/vacation.c: revision 1.38
usr.bin/vacation/vacation.1: revision 1.33

Make vacation(1) check 'Auto-Submitted:' (RFC 3834) in addition to
'Precedence:' (RFC 2076), and set 'Precedence:' in addition to
'Auto-Submitted:'.

Update the man page accordingly.

(martin)

2023-06-27 17:10:15 UTC MAIN commitmail json YAML

Note update to openresolv-3.13.2

(roy)

2023-06-27 17:07:53 UTC MAIN commitmail json YAML

2023-06-27 09:58:50 UTC MAIN commitmail json YAML

Convert UDF file system code from the depricated tsleep(9)/wakeup(9) to the MP
friendly condvar(9). No functional change intended.

(reinoud)

2023-06-27 09:10:25 UTC MAIN commitmail json YAML

isc timer API changed with the recent bind import - use isc_timer_destroy()
instead of isc_timer_detach()

(martin)

2023-06-27 07:31:37 UTC MAIN commitmail json YAML

PR 57472: adjust the BIGNUM configuration for sparc64 to match a native
openssl build [internally called bn(64/32)] and make the BN limbs be 32bit.
The sparc64 ASM code only deals with this layout.

Enable all sparc64 optimized asm code and define OPENSSL_NO_EC_NISTP_64_GCC_128
as this optimization is not valid on sparc64 (bigendian, alignement
critical) - again matching the native build.

Analyzed by Taylor and Harold, thanks!

(martin)

2023-06-27 07:27:31 UTC MAIN commitmail json YAML

2023-06-27 07:25:55 UTC MAIN commitmail json YAML

The sha512 generator perl script can output a sha256 version too, but
needs a special cased invocation to do so. Fix the regen script
and update the output.

(martin)

2023-06-27 04:41:23 UTC MAIN commitmail json YAML

2023-06-27 04:28:16 UTC MAIN commitmail json YAML

tests/indent: test the -badp option

(rillig)

2023-06-27 01:19:44 UTC MAIN commitmail json YAML

callout(9): Delete the unused member cc_cancel from struct callout_cpu

I see no reason why it should be there, and believe its a leftover from
some old code.

(pho)

2023-06-27 01:17:43 UTC MAIN commitmail json YAML

callout(9): Tidy up the condition for "callout is running on another LWP"

No functional changes.

(pho)

2023-06-27 01:15:22 UTC MAIN commitmail json YAML

callout(9): Fix panic() in callout_destroy() (kern/57226)

The culprit was callout_halt(). "(c->c_flags & CALLOUT_FIRED) != 0" wasn't
the correct way to check if a callout is running. It failed to wait for a
running callout to finish in the following scenario:

1. cpu0 initializes a callout and schedules it.
2. cpu0 invokes callout_softlock() and fires the callout, setting the flag
  CALLOUT_FIRED.
3. The callout invokes callout_schedule() to re-schedule itself.
4. callout_schedule_locked() clears the flag CALLOUT_FIRED, and releases
  the lock.
5. Before the lock is re-acquired by callout_softlock(), cpu1 decides to
  destroy the callout. It first invokes callout_halt() to make sure the
  callout finishes running.
6. But since CALLOUT_FIRED has been cleared, callout_halt() thinks it's not
  running and therefore returns without invoking callout_wait().
7. cpu1 proceeds to invoke callout_destroy() while it's still running on
  cpu0. callout_destroy() detects that and panics.

(pho)