OpenBSD src changes summary for 2016-09-25
==========================================

distrib/miniroot                        distrib/sets
regress/gnu                             regress/usr.bin
share/man                               share/misc
share/snmp                              share/termtypes
sys/arch/alpha/alpha                    sys/arch/amd64/amd64
sys/arch/arm/arm                        sys/arch/hppa/hppa
sys/arch/i386/i386                      sys/arch/m88k/m88k
sys/arch/macppc/macppc                  sys/arch/mips64/mips64
sys/arch/sh/sh                          sys/arch/socppc/socppc
sys/arch/sparc64/include                sys/arch/sparc64/sparc64
sys/dev/pci                             sys/kern
sys/sys                                 usr.bin/tcpbench
usr.sbin/acpidump                       usr.sbin/kgmon
usr.sbin/procmap                        usr.sbin/pstat
usr.sbin/rtadvd                         usr.sbin/snmpd
usr.sbin/switchd                        usr.sbin/trpt

== distrib =========================================================== 01/06 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/distrib

miniroot

  ~ install.sub                           

  > Tweak addel(), rmel() and bsort() to not emit a leading/trailing blank.
  > OK tb krw (rpe@)

  ~ install.sub                           

  > Tweak/add comments.
  > with input from and OK tb
  > OK halex krw (rpe@)

sets

  ~ Makefile                              

  > Fix /usr/lib/locate/src.db owner for noperm release builds.
  > ok millert tb (natano@)

== regress =========================================================== 02/06 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/regress

gnu

  ~ egcs/gcc-builtins/Makefile            ~ egcs/gcc-builtins/sprintf-1.c.exp
  ~ egcs/gcc-builtins/sprintf-2.c.exp     ~ egcs/gcc-builtins/sprintf-3.c.exp
  ~ egcs/gcc-builtins/stpcpy-1.c.exp      ~ egcs/gcc-builtins/stpcpy-2.c.exp
  ~ egcs/gcc-builtins/strcat-1.c.exp      ~ egcs/gcc-builtins/strcat-2.c.exp
  ~ egcs/gcc-builtins/strcpy-1.c.exp      ~ egcs/gcc-builtins/strcpy-2.c.exp
  ~ egcs/gcc-builtins/vsprintf-1.c.exp    ~ egcs/gcc-builtins/vsprintf-2.c.exp
  ~ egcs/gcc-builtins/vsprintf-3.c.exp    ~ egcs/gcc-bounds/Makefile

  > Adapt more places where binutils-2.17 has changed the format of the
  > linker warning massages. (bluhm@)

usr.bin

  ~ Makefile                              

  > add ul (otto@)

== share ============================================================= 03/06 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/share

man

  ~ Makefile                              

  > Install the copyright notice as ${MANOWN}:${MANGRP} with ${MANMODE} and
  > use ${INSTALL_COPY}; chown root:wheel mandoc.db for noperm builds.
  > ok natano (tb@)

misc

  ~ pcvtfonts/Makefile                    

  > Some ownership fixes for /usr/share/.
  > feedback and tweaks rpe
  > ok tb (natano@)

snmp

  ~ Makefile                              

  > Some ownership fixes for /usr/share/.
  > feedback and tweaks rpe
  > ok tb (natano@)

termtypes

  ~ Makefile                              

  > Some ownership fixes for /usr/share/.
  > feedback and tweaks rpe
  > ok tb (natano@)

== sys =============================================================== 04/06 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys

arch/alpha/alpha

  ~ mem.c                                 

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

arch/amd64/amd64

  ~ vmm.c                                 

  > remove an extraneous vmcs flush (mlarkin@)

  ~ vmm.c                                 

  > refactor vmcs flush and reload into one function, and remove another
  > flush that wasn't needed (mlarkin@)

  ~ mem.c                                 

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

arch/arm/arm

  ~ mem.c                                 

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

arch/hppa/hppa

  ~ mem.c                                 

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

arch/i386/i386

  ~ mem.c                                 

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

arch/m88k/m88k

  ~ mem.c                                 

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

arch/macppc/macppc

  ~ mem.c                                 

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

arch/mips64/mips64

  ~ mem.c                                 

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

arch/sh/sh

  ~ mem.c                                 

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

arch/socppc/socppc

  ~ mem.c                                 

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

arch/sparc64/include

  ~ asm.h                                 

  > Remove more duplicated includes
  > OK jca@, deraadt@ (fcambus@)

arch/sparc64/sparc64

  ~ mem.c                                 

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

dev/pci

  ~ ixgbe.h                               

  > Remove more duplicated includes
  > OK jca@, deraadt@ (fcambus@)

kern

  ~ kern_sysctl.c                         

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

sys

  ~ sysctl.h                              

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

== usr.bin =========================================================== 05/06 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin

tcpbench

  ~ tcpbench.1                            

  > Document the dependency on sysctl kern.allowkmem
  > ok tb (deraadt@)

== usr.sbin ========================================================== 06/06 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin

acpidump

  ~ acpidump.8                            

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

kgmon

  ~ kgmon.8                               

  > Document the dependency on sysctl kern.allowkmem
  > ok tb (deraadt@)

procmap

  ~ procmap.1                             

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

pstat

  ~ pstat.8                               

  > Make a move towards ending 4 decades of kernel snooping.
  > Add sysctl kern.allowkmem (default 0) which controls the ability to open
  > /dev/mem or /dev/kmem at securelevel > 0.  Over 15 years we converted 99%
  > of utilities in the tree to operate on sysctl-nodes (either by themselves
  > or via code hiding in the guts of -lkvm).
  > pstat -d and -v & procmap are affected and continued use of them will
  > require kern.allowkmem=1 in /etc/sysctl.conf.  acpidump (and it's
  > buddy sendbug) are affected, but we'll work out a solution soon.
  > There will be some impact in ports.
  > ok kettenis guenther (deraadt@)

rtadvd

  ~ config.c                              ~ rtadvd.h

  > Interval calculations are perfectly fine with ints.
  > OK jca@ (florian@)

  ~ config.c                              ~ rtadvd.h

  > consistently use MAX_ prefix
  > OK jca (florian@)

snmpd

  ~ snmpd.h                               

  > Remove more duplicated includes
  > OK jca@, deraadt@ (fcambus@)

switchd

  ~ switchd.8                             ~ switchd.c

  > Correct the flag listing for switchd(8) and add a files section for the
  > configuration file.  Sync usage() with the result.
  > With feedback from and ok jmc@ (jsg@)

trpt

  ~ trpt.8                                

  > Document the dependency on sysctl kern.allowkmem
  > ok tb (deraadt@)

===============================================================================
_______________________________________________
odc mailing list
[email protected]
http://www.squish.net/mailman/listinfo/odc

Reply via email to