OpenBSD src changes summary for 2016-09-25 ==========================================
distrib/miniroot distrib/sets regress/gnu regress/usr.bin share/man share/misc share/snmp share/termtypes sys/arch/alpha/alpha sys/arch/amd64/amd64 sys/arch/arm/arm sys/arch/hppa/hppa sys/arch/i386/i386 sys/arch/m88k/m88k sys/arch/macppc/macppc sys/arch/mips64/mips64 sys/arch/sh/sh sys/arch/socppc/socppc sys/arch/sparc64/include sys/arch/sparc64/sparc64 sys/dev/pci sys/kern sys/sys usr.bin/tcpbench usr.sbin/acpidump usr.sbin/kgmon usr.sbin/procmap usr.sbin/pstat usr.sbin/rtadvd usr.sbin/snmpd usr.sbin/switchd usr.sbin/trpt == distrib =========================================================== 01/06 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/distrib miniroot ~ install.sub > Tweak addel(), rmel() and bsort() to not emit a leading/trailing blank. > OK tb krw (rpe@) ~ install.sub > Tweak/add comments. > with input from and OK tb > OK halex krw (rpe@) sets ~ Makefile > Fix /usr/lib/locate/src.db owner for noperm release builds. > ok millert tb (natano@) == regress =========================================================== 02/06 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/regress gnu ~ egcs/gcc-builtins/Makefile ~ egcs/gcc-builtins/sprintf-1.c.exp ~ egcs/gcc-builtins/sprintf-2.c.exp ~ egcs/gcc-builtins/sprintf-3.c.exp ~ egcs/gcc-builtins/stpcpy-1.c.exp ~ egcs/gcc-builtins/stpcpy-2.c.exp ~ egcs/gcc-builtins/strcat-1.c.exp ~ egcs/gcc-builtins/strcat-2.c.exp ~ egcs/gcc-builtins/strcpy-1.c.exp ~ egcs/gcc-builtins/strcpy-2.c.exp ~ egcs/gcc-builtins/vsprintf-1.c.exp ~ egcs/gcc-builtins/vsprintf-2.c.exp ~ egcs/gcc-builtins/vsprintf-3.c.exp ~ egcs/gcc-bounds/Makefile > Adapt more places where binutils-2.17 has changed the format of the > linker warning massages. (bluhm@) usr.bin ~ Makefile > add ul (otto@) == share ============================================================= 03/06 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/share man ~ Makefile > Install the copyright notice as ${MANOWN}:${MANGRP} with ${MANMODE} and > use ${INSTALL_COPY}; chown root:wheel mandoc.db for noperm builds. > ok natano (tb@) misc ~ pcvtfonts/Makefile > Some ownership fixes for /usr/share/. > feedback and tweaks rpe > ok tb (natano@) snmp ~ Makefile > Some ownership fixes for /usr/share/. > feedback and tweaks rpe > ok tb (natano@) termtypes ~ Makefile > Some ownership fixes for /usr/share/. > feedback and tweaks rpe > ok tb (natano@) == sys =============================================================== 04/06 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys arch/alpha/alpha ~ mem.c > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) arch/amd64/amd64 ~ vmm.c > remove an extraneous vmcs flush (mlarkin@) ~ vmm.c > refactor vmcs flush and reload into one function, and remove another > flush that wasn't needed (mlarkin@) ~ mem.c > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) arch/arm/arm ~ mem.c > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) arch/hppa/hppa ~ mem.c > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) arch/i386/i386 ~ mem.c > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) arch/m88k/m88k ~ mem.c > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) arch/macppc/macppc ~ mem.c > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) arch/mips64/mips64 ~ mem.c > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) arch/sh/sh ~ mem.c > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) arch/socppc/socppc ~ mem.c > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) arch/sparc64/include ~ asm.h > Remove more duplicated includes > OK jca@, deraadt@ (fcambus@) arch/sparc64/sparc64 ~ mem.c > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) dev/pci ~ ixgbe.h > Remove more duplicated includes > OK jca@, deraadt@ (fcambus@) kern ~ kern_sysctl.c > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) sys ~ sysctl.h > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) == usr.bin =========================================================== 05/06 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin tcpbench ~ tcpbench.1 > Document the dependency on sysctl kern.allowkmem > ok tb (deraadt@) == usr.sbin ========================================================== 06/06 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin acpidump ~ acpidump.8 > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) kgmon ~ kgmon.8 > Document the dependency on sysctl kern.allowkmem > ok tb (deraadt@) procmap ~ procmap.1 > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) pstat ~ pstat.8 > Make a move towards ending 4 decades of kernel snooping. > Add sysctl kern.allowkmem (default 0) which controls the ability to open > /dev/mem or /dev/kmem at securelevel > 0. Over 15 years we converted 99% > of utilities in the tree to operate on sysctl-nodes (either by themselves > or via code hiding in the guts of -lkvm). > pstat -d and -v & procmap are affected and continued use of them will > require kern.allowkmem=1 in /etc/sysctl.conf. acpidump (and it's > buddy sendbug) are affected, but we'll work out a solution soon. > There will be some impact in ports. > ok kettenis guenther (deraadt@) rtadvd ~ config.c ~ rtadvd.h > Interval calculations are perfectly fine with ints. > OK jca@ (florian@) ~ config.c ~ rtadvd.h > consistently use MAX_ prefix > OK jca (florian@) snmpd ~ snmpd.h > Remove more duplicated includes > OK jca@, deraadt@ (fcambus@) switchd ~ switchd.8 ~ switchd.c > Correct the flag listing for switchd(8) and add a files section for the > configuration file. Sync usage() with the result. > With feedback from and ok jmc@ (jsg@) trpt ~ trpt.8 > Document the dependency on sysctl kern.allowkmem > ok tb (deraadt@) =============================================================================== _______________________________________________ odc mailing list [email protected] http://www.squish.net/mailman/listinfo/odc
