Re: lang/* BTI breakage - lang/sbcl

2023-06-29 Thread Sebastien Marie
On Thu, Jun 29, 2023 at 11:19:50PM +0200, Christian Weisgerber wrote:
> Since BTI affects any and all compilers that generate executable code,
> I tried to build all lang/* ports on amd64 with BTI enabled.  Here's the
> list of failures:
> 
> [...]
> lang/sbcl

the 2.3.6 update (already on ports@) adresses it by using USE_NOBTCFI.

-- 
Sebastien Marie



aarch64 bulk build report

2023-06-29 Thread phessler
bulk build on arm64.ports.openbsd.org
started on  Tue Jun 27 10:49:45 MDT 2023
finished at Thu Jun 29 20:34:44 MDT 2023
lasted 2D09h44m
done with kern.version=OpenBSD 7.3-current (GENERIC.MP) #2176: Tue Jun 27 
03:12:23 MDT 2023

built packages:11674
Jun 27:3093
Jun 28:1043
Jun 29:7537


critical path missing pkgs:  
http://build-failures.rhaalovely.net/aarch64/2023-06-27/summary.log

build failures: 2
http://build-failures.rhaalovely.net/aarch64/2023-06-27/games/lwjgl3.log
http://build-failures.rhaalovely.net/aarch64/2023-06-27/x11/mate/utils.log

recurrent failures
 failures/games/lwjgl3.log
 failures/x11/mate/utils.log
new failures
+++ ls-failures Thu Jun 29 20:34:56 2023
resolved failures
--- ../old/aarch64/last//ls-failuresSat Jun 24 00:39:47 2023
-failures/devel/quirks.log



Re: emulators/retroarch breakage

2023-06-29 Thread Ryan Freeman
On Tue, Jun 27, 2023 at 02:49:45PM -0700, Nam Nguyen wrote:
> Marc Espie writes:
> 
> > I know you're not maintainer, but most of the relevant commits point back
> > to you:
> >
> > retroarch uses some ass-backwards build system  making it prefer system
> > includes to its own includes, with ludicrous breakage.
> >
> > Case in point: explodes with bright colors if libchdr is present.
> 
> Sorry. I should have pinged more for this since I imported libchdr. I'll
> repaste inline my proposal to turn off libchdr in retroarch.
> 
> Nam Nguyen writes:
> 
> > Nam Nguyen writes:
> >
> >> While testing consumers for vulkan ports, I found a build failure. To
> >> reproduce, install emulators/libchdr then build emulators/retroarch,
> >> which fails.
> >
> > ping
> >
> >>
> >> build log:
> >> https://namtsui.com/public/retroarch_chdr.txt
> >>
> >> There is a conflict between the bundled libchdr and emulators/libchdr,
> >> which was newly imported. In this diff, I propose setting HAVE_CHD =
> >> 0. Also, resync WANTLIB to remove z.
> >>
> >> There is minimal downside from my investigation. Retroarch relies on
> >> cores. The only core that uses CHD files is
> >> emulators/libretro-pcsx-rearmed. I will send an update for pcsx-rearmed,
> >> which has a new feature of using libchdr. To test, I was able to load
> >> CHD files through updated pcsx-rearmed even with this retroarch where
> >> CHD is toggled off. I also tested opening CHD files in emulators/flycast
> >> (which links against lchdr) and emulators/mame (viable alternative).
> >>
> >> It was a bit tricky to figure out the file structure as I was unfamiliar
> >> with mame. I found that pcsx chd files are standalone whereas in mame it
> >> needs to be structured like game.zip and game/game.chd. I also learned
> >> that CHD stands for "compressed hunks of data" and is a method of
> >> archiving CDs.
> >>
> >> Feedback and tests are welcome. OK?
> >>
> 
> Index: Makefile
> ===
> RCS file: /cvs/ports/emulators/retroarch/Makefile,v
> retrieving revision 1.25
> diff -u -p -u -p -r1.25 Makefile
> --- Makefile  23 Jun 2022 11:23:19 -  1.25
> +++ Makefile  10 May 2023 19:36:17 -
> @@ -5,7 +5,7 @@ PKGNAME = retroarch-${GH_TAGNAME:S/v//}
>  GH_ACCOUNT = libretro
>  GH_PROJECT = RetroArch
>  GH_TAGNAME = v1.10.3
> -REVISION =   0
> +REVISION =   1
>  
>  CATEGORIES = emulators
>  
> @@ -18,7 +18,7 @@ WANTLIB += ${COMPILER_LIBCXX} EGL GL Qt5
>  WANTLIB += Qt5Network Qt5Widgets SDL2 X11 X11-xcb Xext Xinerama
>  WANTLIB += Xrandr Xv Xxf86vm ass avcodec avformat avutil c crypto
>  WANTLIB += drm fontconfig freetype fribidi gbm m openal ssl swresample
> -WANTLIB += swscale usb-1.0 xcb xkbcommon z
> +WANTLIB += swscale usb-1.0 xcb xkbcommon
>  WANTLIB += mbedcrypto mbedtls mbedx509
>  
>  MODULES =x11/qt5
> @@ -34,6 +34,7 @@ LIB_DEPENDS =   audio/openal \
>  
>  MAKE_FLAGS = V=1 \
>   CXX="${CXX}" \
> + HAVE_CHD=0 \
>   HAVE_OSS=0 \
>   HAVE_OSS_BSD=0 \
>   OPTIMIZE_FLAG=

Hi!

This works ok, I got a successful build and things seem to work well.

I never actually used retroarch for MAME things, I have some psx games
but they aren't in CHD.  Everything else I quickly tested seems good.

Tested on recent amd64 snapshot.

Attached another diff with the REVISION bump as there was another bump
for turning off FLAC since you originally posted:
https://cvsweb.openbsd.org/cgi-bin/cvsweb/~checkout~/ports/emulators/retroarch/Makefile?rev=1.26&content-type=text/plain

Thanks!
-Ryan


Index: Makefile
===
RCS file: /cvs/ports/emulators/retroarch/Makefile,v
retrieving revision 1.26
diff -u -p -r1.26 Makefile
--- Makefile20 May 2023 20:13:12 -  1.26
+++ Makefile29 Jun 2023 22:33:30 -
@@ -5,7 +5,7 @@ PKGNAME =   retroarch-${GH_TAGNAME:S/v//}
 GH_ACCOUNT =   libretro
 GH_PROJECT =   RetroArch
 GH_TAGNAME =   v1.10.3
-REVISION = 1
+REVISION = 2
 
 CATEGORIES =   emulators
 
@@ -18,7 +18,7 @@ WANTLIB += ${COMPILER_LIBCXX} EGL GL Qt5
 WANTLIB += Qt5Network Qt5Widgets SDL2 X11 X11-xcb Xext Xinerama
 WANTLIB += Xrandr Xv Xxf86vm ass avcodec avformat avutil c crypto
 WANTLIB += drm fontconfig freetype fribidi gbm m openal ssl swresample
-WANTLIB += swscale usb-1.0 xcb xkbcommon z
+WANTLIB += swscale usb-1.0 xcb xkbcommon
 WANTLIB += mbedcrypto mbedtls mbedx509
 
 MODULES =  x11/qt5
@@ -34,6 +34,7 @@ LIB_DEPENDS = audio/openal \
 
 MAKE_FLAGS =   V=1 \
CXX="${CXX}" \
+   HAVE_CHD=0 \
HAVE_OSS=0 \
HAVE_OSS_BSD=0 \
OPTIMIZE_FLAG=



[update] security/osv-scanner to 1.3.5

2023-06-29 Thread Lucas Raab
Hello,

Here's an update for osv-scanner which has been working fine.

Other tests?

Thanks,
Lucas
diff refs/heads/master refs/heads/osv
commit - 20cf8735fbeddad90caa5253fa7cc06119f78a1e
commit + 19c94d7e61976ab21392163b018b5081557a7220
blob - afe7fd52e81fcf10048eac96797eedb68742f382
blob + 8d963684c86100d69c2a38e10b5952792241f864
--- security/osv-scanner/Makefile
+++ security/osv-scanner/Makefile
@@ -6,7 +6,7 @@ V = 1.3.4
 
 COMMENT =  scan your project's dependencies for vulnerabilities
 
-V =1.3.4
+V =1.3.5
 MODGO_MODNAME =github.com/google/osv-scanner
 MODGO_VERSION =v${V}
 
blob - 47d5658a20dd0904121303af1199b07dd7054dd0
blob + c6c5dfd352836e3e4985f7e1cc0c7db2e0b684f6
--- security/osv-scanner/distinfo
+++ security/osv-scanner/distinfo
@@ -1,7 +1,6 @@
 SHA256 (go_modules/github.com/!burnt!sushi/toml/@v/v0.3.1.mod) = 
KAIbQYClnDmTYHqVsY4jDdC8a+pSQv/o6ou/tPT3tNc=
-SHA256 (go_modules/github.com/!burnt!sushi/toml/@v/v1.2.1.mod) = 
JnfIL+dPIDdyiJpagBr7Mp2VF1UId92ssXIZFpurPt0=
-SHA256 (go_modules/github.com/!burnt!sushi/toml/@v/v1.3.0.mod) = 
JnfIL+dPIDdyiJpagBr7Mp2VF1UId92ssXIZFpurPt0=
-SHA256 (go_modules/github.com/!burnt!sushi/toml/@v/v1.3.0.zip) = 
z0XD4hoU47CW1crqHllrzjH+QY0ZeSPzR5H+wnw0AGc=
+SHA256 (go_modules/github.com/!burnt!sushi/toml/@v/v1.3.2.mod) = 
JnfIL+dPIDdyiJpagBr7Mp2VF1UId92ssXIZFpurPt0=
+SHA256 (go_modules/github.com/!burnt!sushi/toml/@v/v1.3.2.zip) = 
XeJGoMtMJW8/1dDbigihFPWK8MLhk7vwrZASEErbtrI=
 SHA256 (go_modules/github.com/!cyclone!d!x/cyclonedx-go/@v/v0.7.1.mod) = 
uqvhVbf1hOh1/U4bvuiQTjf0qn4QJl1WfdKYiAY/5oM=
 SHA256 (go_modules/github.com/!cyclone!d!x/cyclonedx-go/@v/v0.7.1.zip) = 
+D2ExgswC7p36y6FOYnFDHq/mMWWIPtaC24x2gd3aAU=
 SHA256 (go_modules/github.com/!microsoft/go-winio/@v/v0.5.2.mod) = 
Gbj76dRBkni7Hp0M8v1a7IeeQoKcU7o+/VZWuNGzWuc=
@@ -47,6 +46,10 @@ SHA256 (go_modules/github.com/golang/groupcache/@v/v0.
 SHA256 
(go_modules/github.com/go-git/go-git-fixtures/v4/@v/v4.3.2-0.20230305113008-0c11038e723f.zip)
 = VGUYT34LRmv9QlPdoE+76oPV2/QE59cfT/oUFGM=
 SHA256 (go_modules/github.com/go-git/go-git/v5/@v/v5.7.0.mod) = 
hiQXhmzSVCgs8EoVW8rKHPV6gygpVO/hjETig3U7q90=
 SHA256 (go_modules/github.com/go-git/go-git/v5/@v/v5.7.0.zip) = 
ffddu8q13gz+0DHENq4BeKF9l9cS998vbCSVOXPPBfw=
+SHA256 (go_modules/github.com/goark/errs/@v/v1.1.0.mod) = 
HdP0dfT4+GCMG+9lWyqNew4gr5jOusFXVZMrCapncEY=
+SHA256 (go_modules/github.com/goark/errs/@v/v1.1.0.zip) = 
i43JhykUlVOpgvOs4Xa3KJKpCCY6SiUpGux+Bz2ThBc=
+SHA256 (go_modules/github.com/goark/go-cvss/@v/v1.6.6.mod) = 
YOdemKeD2deEmjJAzwBtcCovyubv4HpxBv8bG+zMNn4=
+SHA256 (go_modules/github.com/goark/go-cvss/@v/v1.6.6.zip) = 
IkqCKDAhSMFmO5wZpleYQrJtjQD4xAqN24U7fvVpKOs=
 SHA256 
(go_modules/github.com/golang/groupcache/@v/v0.0.0-20210331224755-41bb18bfe9da.mod)
 = URfiu4bxzHzHSJ+fJYD6F7LvHjoKNGv2TtgGPKe4dmM=
 SHA256 
(go_modules/github.com/golang/groupcache/@v/v0.0.0-20210331224755-41bb18bfe9da.zip)
 = snA06PwBNidUPhrQmM/GUynyiW3z2lzzJmzJFm+T86U=
 SHA256 
(go_modules/github.com/google/go-cmdtest/@v/v0.4.1-0.20220921163831-55ab3332a786.mod)
 = YBCCwe/4ls1GJ8PCPRVrWD+85CRh5UhHNLZGe5ZOtk0=
@@ -83,8 +86,8 @@ SHA256 (go_modules/github.com/package-url/packageurl-g
 SHA256 (go_modules/github.com/mmcloughlin/avo/@v/v0.5.0.zip) = 
Yr553IwOXt9NTTmAFiMbtK2jCxnkmd30q5OF9Lb5FCo=
 SHA256 
(go_modules/github.com/niemeyer/pretty/@v/v0.0.0-20200227124842-a10e7caefd8e.mod)
 = jxQBiQgBFlu9PaF1jGyWQ48SqjJIZmrBWBwYqGQkTUc=
 SHA256 
(go_modules/github.com/niemeyer/pretty/@v/v0.0.0-20200227124842-a10e7caefd8e.zip)
 = LctwU/rxHCjK19hPz6Pdf5Pj0jaznYPP8JNPaR+GDXo=
-SHA256 (go_modules/github.com/package-url/packageurl-go/@v/v0.1.0.mod) = 
dRewXBS0JZJtI9XFqlk5cMumXf0FYeZSFfUOetMSct8=
-SHA256 (go_modules/github.com/package-url/packageurl-go/@v/v0.1.0.zip) = 
jUeNIwh+x3V5lx5eKmWuYNZypreYIFw+CGSJPEzu0G4=
+SHA256 (go_modules/github.com/package-url/packageurl-go/@v/v0.1.1.mod) = 
WtMu4++y8MyV5RLpaxj2GWiBXwXLTpBVYacq5IyrWtE=
+SHA256 (go_modules/github.com/package-url/packageurl-go/@v/v0.1.1.zip) = 
E4RHGgDw4CbF5F2fzMDaNj6UIyZ875M5jbFvzyS9uGA=
 SHA256 (go_modules/github.com/pjbgf/sha1cd/@v/v0.3.0.mod) = 
8Qo2tGIntPuz5pD2zHJtlGR18xZp7rxSxK1bLombToA=
 SHA256 (go_modules/github.com/pjbgf/sha1cd/@v/v0.3.0.zip) = 
rP7pbdL+jmrgiumGRQSDCknSNddMKrk996XfopqQpGE=
 SHA256 
(go_modules/github.com/pkg/diff/@v/v0.0.0-20210226163009-20ebb0f2a09e.mod) = 
XVuUVOLQIK8MdgNWjoaQS5m+/E1dZ8OoUF9hIVib0R8=
@@ -110,8 +113,8 @@ SHA256 (go_modules/github.com/spdx/tools-golang/@v/v0.
 SHA256 
(go_modules/github.com/spdx/gordf/@v/v0.0.0-2020095634-7098f93598fb.mod) = 
eKUongYQUXmwBVYtvFiYMNLnHrFgrEUV5RiQ5fFMgYk=
 SHA256 
(go_modules/github.com/spdx/gordf/@v/v0.0.0-20221230105357-b735bd5aac89.mod) = 
eKUongYQUXmwBVYtvFiYMNLnHrFgrEUV5RiQ5fFMgYk=
 SHA256 
(go_modules/github.com/spdx/gordf/@v/v0.0.0-20221230105357-b735bd5aac89.zip) = 
XxsMQLKthYlrDa14n8WZRd/FR93bivyiABl27UQYdtw=
-SHA256 (go_modules/github.com/spdx/tools-golang/@v/v0.5.1.mod) = 
aSS5w8etG/mpXeTWSCwA/p

Re: lang/sbcl: update to 2.3.6 (latest) and take MAINTAINER

2023-06-29 Thread Omar Polo
Hello,

On 2023/06/29 15:42:00 +0200, Sebastien Marie  wrote:
> Hi,
> 
> With latest changes on ecl, we are able to update sbcl to latest version 
> (2.3.6).
> 
> As maintainer systematically timeout since several years now, I am taking 
> over 
> the maintainership (and no reply on private mail asking about continuing or 
> not 
> to maintain lang/sbcl).
> 
> I have mostly rewritten the port to ease testing building it with several 
> bootstraps (ecl, clisp, sbcl) on one architecture, and drop some historical 
> parts.
> 
> Regarding the way to build sbcl, it defaults to using lang/ecl (which is 
> portable as written in C), and use clisp for some archs only (amd64 and 
> powerpc, 
> as currently) as it is more fast.
> 
> 
> The mail includes:
> - a proper tarball (as for a new port)
> - a diff (for braves diff readers)
> 
> I tested:
> - on amd64, building with clisp (default), ecl and sbcl (2.2.5p0 and 2.3.6)
> - on aarch64, building with ecl, and sbcl (2.3.6)
> - all dependencies are still building on amd64

I've only tested on amd64 with clisp, but runtime tested a few things,
including stumpwm.

> The port is buildable on wider architectures range.
> 
> Comments or OK ?

ok op@

Thanks for updating sbcl! :)



lang/* BTI breakage

2023-06-29 Thread Christian Weisgerber
Since BTI affects any and all compilers that generate executable code,
I tried to build all lang/* ports on amd64 with BTI enabled.  Here's the
list of failures:

devel/jdk/1.8   # needs new bootstrap
lang/crystal
lang/fpc
lang/gcc/11
lang/ghc
lang/go # also fails on CPUs with advanced xsave
lang/gprolog
lang/ldc
lang/mono
lang/ocaml
lang/sbcl

Note that further ports may depend on some of the above.

-- 
Christian "naddy" Weisgerber  na...@mips.inka.de



Re: ncspot aborts on startup in -current

2023-06-29 Thread Matthias Schmidt
* Theo Buehler wrote:
> On Thu, Jun 29, 2023 at 11:30:10AM +0200, Theo Buehler wrote:
> > On Thu, Jun 29, 2023 at 11:25:20AM +0200, Theo Buehler wrote:
> > > On Thu, Jun 29, 2023 at 10:54:10AM +0200, Theo Buehler wrote:
> > > > On Thu, Jun 29, 2023 at 09:23:53AM +0100, Stuart Henderson wrote:
> > > > > Does the same happen if you build your own kernel rather than using a
> > > > > snap?
> > > > 
> > > > Someone will have to port the patches that add _CET_ENDBR from
> > > > security/boringssl/head to security/rust-ring.
> > > 
> > > Something like this should do the trick. Can't test it.  Build and
> > > install rust-ring with this patch, then build and install ncspot.
> > 
> > Ugh hold on. I missed something.
> 
> This one at least compiles.

Compiling rust code is so much fun. NOT.  I can confirm that your patch
fixes the SIGILL crash upon startup for ncspot.

Cheers and thanks

Matthias



Re: [PATCH] www/nginx -- add njs dynamic module

2023-06-29 Thread Sergey A. Osokin
On Thu, Jun 29, 2023 at 09:26:58AM +0100, Stuart Henderson wrote:
> I note you didn't cc the port maintainer on your original mail,
> was there a reason for that?

Thank you, Stuart, missed that point.

> I've cc'd and included the original mail. What are you thoughts
> on this please Robert?

Thanks in advance, Robert.

-- 
Sergey A. Osokin


lang/sbcl: update to 2.3.6 (latest) and take MAINTAINER

2023-06-29 Thread Sebastien Marie
Hi,

With latest changes on ecl, we are able to update sbcl to latest version 
(2.3.6).

As maintainer systematically timeout since several years now, I am taking over 
the maintainership (and no reply on private mail asking about continuing or not 
to maintain lang/sbcl).

I have mostly rewritten the port to ease testing building it with several 
bootstraps (ecl, clisp, sbcl) on one architecture, and drop some historical 
parts.

Regarding the way to build sbcl, it defaults to using lang/ecl (which is 
portable as written in C), and use clisp for some archs only (amd64 and 
powerpc, 
as currently) as it is more fast.


The mail includes:
- a proper tarball (as for a new port)
- a diff (for braves diff readers)

I tested:
- on amd64, building with clisp (default), ecl and sbcl (2.2.5p0 and 2.3.6)
- on aarch64, building with ecl, and sbcl (2.3.6)
- all dependencies are still building on amd64

The port is buildable on wider architectures range.

Comments or OK ?
-- 
Sebastien Marie


sbcl.tgz
Description: application/tar-gz
diff /home/semarie/repos/openbsd/ports
commit - 24a3e531fc9c9cadff194b5f9fdaf9c0a68c3156
path + /home/semarie/repos/openbsd/ports
blob - 9d85d7514131d6aef49aab9ea5719239bea069bc
file + lang/sbcl/Makefile
--- lang/sbcl/Makefile
+++ lang/sbcl/Makefile
@@ -1,98 +1,125 @@
-# not yet ported to other arches
-ONLY_FOR_ARCHS =   amd64 i386 powerpc
-USE_WXNEEDED = Yes
+COMMENT =  high performance Common Lisp compiler
 
-COMMENT=   compiler and runtime system for ANSI Common Lisp
+V =2.3.6
+DISTNAME = sbcl-${V}-source
+PKGNAME =  sbcl-${V}
 
-V =2.2.5
-REVISION = 0
-DISTNAME=  sbcl-${V}-source
-PKGNAME=   sbcl-${V}
-WRKDIST=   ${WRKDIR}/sbcl-${V}
-EXTRACT_SUFX=  .tar.bz2
+CATEGORIES =   lang
 
-CATEGORIES=lang
-HOMEPAGE=  http://www.sbcl.org/
-MAINTAINER =   Joshua Elsasser 
+HOMEPAGE = https://www.sbcl.org/
 
+MAINTAINER =   Sebastien Marie 
+
 # Public domain and BSD
-PERMIT_PACKAGE=Yes
+PERMIT_PACKAGE =   Yes
 
-MASTER_SITES=  ${MASTER_SITE_SOURCEFORGE:=sbcl/}
+WANTLIB += c m util zstd
 
-WANTLIB=   c m util z
+USE_WXNEEDED = Yes
+USE_NOEXECONLY =   Yes
+USE_NOBTCFI =  Yes
 
-PSEUDO_FLAVORS=native_bootstrap
+MASTER_SITES = ${MASTER_SITE_SOURCEFORGE:=sbcl/}
+EXTRACT_SUFX = .tar.bz2
+WRKDIST =  ${WRKDIR}/sbcl-${V}
 
-FLAVORS=   threads
-FLAVOR?=
+PSEUDO_FLAVORS =   native_bootstrap
+FLAVORS =  threads
+FLAVOR ?=
 
-MAKE_PARAMS =  --prefix=${PREFIX}
+# Supported bootstrap methods:
+# - "ecl"   : default (for portability)
+# - "clisp" : build might be faster than with ecl
+# - "sbcl"  : for native bootstrap
+#
+# For testing, it could be manually overrided by passing
+# BOOTSTRAP_METHOD=xxx on make command-line.
 
-.if ${FLAVOR:Mthreads}
-ONLY_FOR_ARCHS =   amd64 powerpc
-MAKE_PARAMS += --with-sb-thread
-WANTLIB+=  pthread
-.endif
-# enable features from --fancy other than :sb-thread
-MAKE_PARAMS += --with-sb-core-compression \
-   --with-sb-xref-for-internals
+BOOTSTRAP_METHOD-amd64 =   clisp
+BOOTSTRAP_METHOD-powerpc = clisp
+BOOTSTRAP_METHOD-${MACHINE_ARCH} ?=ecl
 
-# contrib/sb-capstone/test.lisp uses it at build-time if present
-BUILD_DEPENDS =devel/capstone/main
+BOOTSTRAP_METHOD ?=${BOOTSTRAP_METHOD-${MACHINE_ARCH}}
 
 .if ${FLAVOR:Mnative_bootstrap}
-BUILD_DEPENDS+=lang/sbcl
-BOOTSTRAP_CMD= ${LOCALBASE}/bin/sbcl \
-   --disable-debugger --no-sysinit --no-userinit
-.elif ${MACHINE_ARCH:Mi386}
-# ecl is slower but lang/clisp fails to build sbcl on i386
-BUILD_DEPENDS +=   lang/ecl
-BOOTSTRAP_CMD =${LOCALBASE}/bin/ecl -q --norc
-.else
+BOOTSTRAP_METHOD = sbcl
+.endif
+
+.if ${BOOTSTRAP_METHOD:Msbcl}
+BUILD_DEPENDS +=   lang/sbcl
+XCHOST_CMD =   ${LOCALBASE}/bin/sbcl \
+   --disable-debugger --no-sysinit --no-userinit
+
+.elif ${BOOTSTRAP_METHOD:Mclisp}
 BUILD_DEPENDS +=   lang/clisp
-BOOTSTRAP_CMD =${LOCALBASE}/bin/clisp -q -norc
+XCHOST_CMD =   ${LOCALBASE}/bin/clisp -q -norc
+
+.elif ${BOOTSTRAP_METHOD:Mecl}
+BUILD_DEPENDS +=   lang/ecl
+XCHOST_CMD =   ${LOCALBASE}/bin/ecl -q --norc
+
+.else
+ERRORS +=  "Fatal: unknown BOOTSTRAP_METHOD"
 .endif
-MAKE_PARAMS += --xc-host="${BOOTSTRAP_CMD}" ${EXTRA_PARAMS}
-TEST_DEPENDS = devel/gmp
 
-# base makeinfo chokes on sbcl texinfo files
+# sb-thread is available only on some architectures and required on others
+.if ${FLAVOR:Mthreads}
+ONLY_FOR_ARCHS +=  riscv64 powerpc powerpc64 i386 amd64 aarch64
+EXTRA_PARAMS +=--with-sb-thread
+WANTLIB += pthread
+.else
+NOT_FOR_ARCHS +=

UPDATE: net/wormhole-william to v1.0.6 and use go modules

2023-06-29 Thread Edd Barrett
Hi,

Update to version 1.0.6 and use go modules so that we don't have to vendor
tarballs any more.

OK?

-- 
Best Regards
Edd Barrett

https://www.theunixzoo.co.uk
Index: Makefile
===
RCS file: /cvs/ports/net/wormhole-william/Makefile,v
retrieving revision 1.5
diff -u -p -r1.5 Makefile
--- Makefile11 Mar 2022 19:48:14 -  1.5
+++ Makefile29 Jun 2023 08:45:34 -
@@ -1,23 +1,20 @@
 COMMENT =  magic wormhole implementation in Go
 
-V =1.0.4
-DISTNAME = wormhole-william-vendored-${V}
-PKGNAME =  wormhole-william-${V}
-REVISION = 0
-
-ALL_TARGET =   github.com/psanford/wormhole-william
+MODGO_MODNAME =github.com/psanford/wormhole-william
+MODGO_VERSION = v1.0.6
+DISTNAME = wormhole-william-${MODGO_VERSION}
 
 CATEGORIES =   net
 HOMEPAGE = https://github.com/psanford/wormhole-william
 
 MAINTAINER =   Edd Barrett 
+
 # MIT
 PERMIT_PACKAGE = Yes
 
 WANTLIB += c pthread
 
-MASTER_SITES = https://theunixzoo.co.uk/distfiles/
-
 MODULES =  lang/go
 
+.include "modules.inc"
 .include 
Index: distinfo
===
RCS file: /cvs/ports/net/wormhole-william/distinfo,v
retrieving revision 1.3
diff -u -p -r1.3 distinfo
--- distinfo21 Aug 2020 18:54:17 -  1.3
+++ distinfo29 Jun 2023 08:41:29 -
@@ -1,2 +1,1030 @@
-SHA256 (wormhole-william-vendored-1.0.4.tar.gz) = 
WusfJZqRpocPEQgq8Yr9HhTxIEcfCEWKu10wMSeuIIQ=
-SIZE (wormhole-william-vendored-1.0.4.tar.gz) = 1325656
+SHA256 (go_modules/cloud.google.com/go/@v/v0.26.0.mod) = 
IhijTyC5cbwZUhbUGV9XUgoqy9hd5/wxrPxEAmZwTBE=
+SHA256 (go_modules/cloud.google.com/go/@v/v0.34.0.mod) = 
IhijTyC5cbwZUhbUGV9XUgoqy9hd5/wxrPxEAmZwTBE=
+SHA256 (go_modules/cloud.google.com/go/@v/v0.38.0.mod) = 
IRVe7cPkx6CccZziPHA/vxTDSspC7QDcCHdN5uu+gAc=
+SHA256 (go_modules/cloud.google.com/go/@v/v0.44.1.mod) = 
0lFpfc+oXnGvn470xm+euU9mTDCz6WS6EyoXOXtrmXU=
+SHA256 (go_modules/cloud.google.com/go/@v/v0.44.2.mod) = 
mrgY5bGZiiX607YbwvI2E/hWzIXnF8Savu81REp166s=
+SHA256 (go_modules/cloud.google.com/go/@v/v0.45.1.mod) = 
8o6hRgc0Vf8GZWLxectMcrJa8hhEJt3PO/sa8SR3bdw=
+SHA256 (go_modules/cloud.google.com/go/@v/v0.46.3.mod) = 
ZPIDHVZNPVDrh3Pjhmsk4KCRp4biOJbjlHjOcH0lSOA=
+SHA256 (go_modules/cloud.google.com/go/@v/v0.46.3.zip) = 
CuZpDufZX5bTneML7FYEfR6Ruf+v0NVVCO9WTh38E7I=
+SHA256 (go_modules/cloud.google.com/go/bigquery/@v/v1.0.1.mod) = 
mSISTdoOJp78FTZOomO/maQgsac2OHEAfrHLwtGx3Hw=
+SHA256 (go_modules/cloud.google.com/go/bigquery/@v/v1.0.1.zip) = 
c40fcmziT2GO51Y/bJQZ5jB/iBRUj0WtiiJ8/7sUSMA=
+SHA256 (go_modules/cloud.google.com/go/datastore/@v/v1.0.0.mod) = 
A0xS+1OSg3+NsnVIX7DpXRDmzSUw3Ty2c9fTUJ4WsuY=
+SHA256 (go_modules/cloud.google.com/go/datastore/@v/v1.0.0.zip) = 
Qek+yVJq5YDakDANfkIabTnXnLYRjWKtHTwGQi2Kcb8=
+SHA256 (go_modules/cloud.google.com/go/firestore/@v/v1.1.0.mod) = 
nJQs6dfFXQTC1H4wb3ZOtc4RvmDSbI22rdTsoow+4ig=
+SHA256 (go_modules/cloud.google.com/go/firestore/@v/v1.1.0.zip) = 
QRVtIpxTxOXghFJPP+y7KnDQ7JrJivejBBPr2ejrSp4=
+SHA256 (go_modules/cloud.google.com/go/pubsub/@v/v1.0.1.mod) = 
SB+3lg2As4sxevbIrYOJhyGKfymA2RtC9sfhZohgzEk=
+SHA256 (go_modules/cloud.google.com/go/pubsub/@v/v1.0.1.zip) = 
i8pGp8Xw3NV20j+ppfEHlVMW1vDY8wbuHW+qfemcPSk=
+SHA256 (go_modules/cloud.google.com/go/storage/@v/v1.0.0.mod) = 
o0tc2WleqzSwH4fy2d46BdD0ffsrwSMJLdRRDJ7HEhU=
+SHA256 (go_modules/cloud.google.com/go/storage/@v/v1.0.0.zip) = 
uuxHVsVz7eWPGet65KyuvXrD8MVkE+y70hatRqWJpdo=
+SHA256 
(go_modules/dmitri.shuralyov.com/gpu/mtl/@v/v0.0.0-20190408044501-666a987793e9.mod)
 = +sTF2PaC+eyXchsvyf1TBiqxcLLSt/q4/8EK4YOhlR4=
+SHA256 
(go_modules/dmitri.shuralyov.com/gpu/mtl/@v/v0.0.0-20190408044501-666a987793e9.zip)
 = ylMwkB/NqD0JVTrDYldtGWxTEVe8nFAudrI3zKJitAA=
+SHA256 (go_modules/github.com/!burnt!sushi/toml/@v/v0.3.1.mod) = 
KAIbQYClnDmTYHqVsY4jDdC8a+pSQv/o6ou/tPT3tNc=
+SHA256 (go_modules/github.com/!burnt!sushi/toml/@v/v0.3.1.zip) = 
gVxuWUdF8tiEL/mksFacZpXmzf1eB+Wz2Y0GtyykHjw=
+SHA256 
(go_modules/github.com/!burnt!sushi/xgb/@v/v0.0.0-20160522181843-27f122750802.mod)
 = luveICsJL29NHzkwvAfPGKVpmZjd6lG5T+hYETspqNg=
+SHA256 
(go_modules/github.com/!burnt!sushi/xgb/@v/v0.0.0-20160522181843-27f122750802.zip)
 = 9Slix/vsqB6op3fR+LHx0lgD3EN/u0kPJTNEIyiEMo4=
+SHA256 (go_modules/github.com/!one!of!one/xxhash/@v/v1.2.2.mod) = 
l7ZeMrMlElrr6MN8KHCeMIxaHGZOGnfd98SxsLltdzs=
+SHA256 (go_modules/github.com/!one!of!one/xxhash/@v/v1.2.2.zip) = 
tKfU3QM+ljEsBrQ9QqZCXgCDfAJUdBvNVpyaCQmyb50=
+SHA256 (go_modules/github.com/!vivid!cortex/ewma/@v/v1.1.1.mod) = 
3qcgZM9b0EmfFqzs1BeItYegnmKl2a1c2NN4mCdhYTo=
+SHA256 (go_modules/github.com/!vivid!cortex/ewma/@v/v1.1.1.zip) = 
7r7nwPIOlqu9oWEe0qPSa0wsEDk8qmot/RYFdjpcGhI=
+SHA256 
(go_modules/github.com/alecthomas/template/@v/v0.0.0-20160405071501-a0175ee3bccc.mod)
 = wCGTza/yP3AiRZc5CDL1aCUK84T5jcQ3iutb+P7GkPw=
+SHA256 
(go_modules/github.com/alecthomas/template/@v/v0.0.0-20160405071501-a0175ee3b

[UPDATE] graphics/geeqie

2023-06-29 Thread Kirill Bychkov
Hi,
Attached diff updates geeqie to 2.1.
Changelog:
- Additional --selection remote commands
- Split view additional 3-image layout
- Many bug fixes
- Some progress in GTK4 migration
- Change source code from c to c++
- Much progress in making source code warning-free
- Updated language support

Tested on amd64.
OKs? Comments?

geeqie-2.1.diff
Description: Binary data


Re: ncspot aborts on startup in -current

2023-06-29 Thread Theo Buehler
On Thu, Jun 29, 2023 at 11:30:10AM +0200, Theo Buehler wrote:
> On Thu, Jun 29, 2023 at 11:25:20AM +0200, Theo Buehler wrote:
> > On Thu, Jun 29, 2023 at 10:54:10AM +0200, Theo Buehler wrote:
> > > On Thu, Jun 29, 2023 at 09:23:53AM +0100, Stuart Henderson wrote:
> > > > Does the same happen if you build your own kernel rather than using a
> > > > snap?
> > > 
> > > Someone will have to port the patches that add _CET_ENDBR from
> > > security/boringssl/head to security/rust-ring.
> > 
> > Something like this should do the trick. Can't test it.  Build and
> > install rust-ring with this patch, then build and install ncspot.
> 
> Ugh hold on. I missed something.

This one at least compiles.

Index: Makefile
===
RCS file: /cvs/ports/security/rust-ring/Makefile,v
retrieving revision 1.10
diff -u -p -r1.10 Makefile
--- Makefile12 Apr 2023 18:43:01 -  1.10
+++ Makefile29 Jun 2023 09:22:34 -
@@ -4,7 +4,7 @@ COMMENT =   ring crate source patched for
 VERSION =  0.16.20
 DISTNAME = ring-${VERSION}
 PKGNAME =  rust-${DISTNAME}
-REVISION = 6
+REVISION = 7
 
 SUBST_VARS =   VERSION
 
Index: patches/patch-pregenerated_aesni-gcm-x86_64-elf_S
===
RCS file: 
/cvs/ports/security/rust-ring/patches/patch-pregenerated_aesni-gcm-x86_64-elf_S,v
retrieving revision 1.2
diff -u -p -r1.2 patch-pregenerated_aesni-gcm-x86_64-elf_S
--- patches/patch-pregenerated_aesni-gcm-x86_64-elf_S   24 Feb 2023 08:09:50 
-  1.2
+++ patches/patch-pregenerated_aesni-gcm-x86_64-elf_S   29 Jun 2023 09:36:56 
-
@@ -1,7 +1,36 @@
 Index: pregenerated/aesni-gcm-x86_64-elf.S
 --- pregenerated/aesni-gcm-x86_64-elf.S.orig
 +++ pregenerated/aesni-gcm-x86_64-elf.S
-@@ -827,6 +827,7 @@ GFp_aesni_gcm_encrypt:
+@@ -1,6 +1,12 @@
+ # This file is generated from a similarly-named Perl script in the BoringSSL
+ # source tree. Do not edit by hand.
+ 
++#if defined(__CET__)
++#include 
++#else
++#define _CET_ENDBR
++#endif
++
+ #if defined(__has_feature)
+ #if __has_feature(memory_sanitizer) && !defined(OPENSSL_NO_ASM)
+ #define OPENSSL_NO_ASM
+@@ -346,6 +352,7 @@ _aesni_ctr32_ghash_6x:
+ .align32
+ GFp_aesni_gcm_decrypt:
+ .cfi_startproc
++  _CET_ENDBR
+   xorq%r10,%r10
+ 
+ 
+@@ -553,6 +560,7 @@ _aesni_ctr32_6x:
+ .align32
+ GFp_aesni_gcm_encrypt:
+ .cfi_startproc
++  _CET_ENDBR
+   xorq%r10,%r10
+ 
+ 
+@@ -827,6 +835,7 @@ GFp_aesni_gcm_encrypt:
.byte   0xf3,0xc3
  .cfi_endproc  
  .size GFp_aesni_gcm_encrypt,.-GFp_aesni_gcm_encrypt
@@ -9,7 +38,7 @@ Index: pregenerated/aesni-gcm-x86_64-elf
  .align64
  .Lbswap_mask:
  .byte 15,14,13,12,11,10,9,8,7,6,5,4,3,2,1,0
-@@ -839,6 +840,7 @@ GFp_aesni_gcm_encrypt:
+@@ -839,6 +848,7 @@ GFp_aesni_gcm_encrypt:
  .Lone_lsb:
  .byte 1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
  .byte 
65,69,83,45,78,73,32,71,67,77,32,109,111,100,117,108,101,32,102,111,114,32,120,56,54,95,54,52,44,32,67,82,89,80,84,79,71,65,77,83,32,98,121,32,60,97,112,112,114,111,64,111,112,101,110,115,115,108,46,111,114,103,62,0
Index: patches/patch-pregenerated_aesni-x86_64-elf_S
===
RCS file: 
/cvs/ports/security/rust-ring/patches/patch-pregenerated_aesni-x86_64-elf_S,v
retrieving revision 1.2
diff -u -p -r1.2 patch-pregenerated_aesni-x86_64-elf_S
--- patches/patch-pregenerated_aesni-x86_64-elf_S   24 Feb 2023 08:09:50 
-  1.2
+++ patches/patch-pregenerated_aesni-x86_64-elf_S   29 Jun 2023 09:36:55 
-
@@ -1,7 +1,44 @@
 Index: pregenerated/aesni-x86_64-elf.S
 --- pregenerated/aesni-x86_64-elf.S.orig
 +++ pregenerated/aesni-x86_64-elf.S
-@@ -1157,6 +1157,7 @@ __aesni_set_encrypt_key:
+@@ -1,6 +1,12 @@
+ # This file is generated from a similarly-named Perl script in the BoringSSL
+ # source tree. Do not edit by hand.
+ 
++#if defined(__CET__)
++#include 
++#else
++#define _CET_ENDBR
++#endif
++
+ #if defined(__has_feature)
+ #if __has_feature(memory_sanitizer) && !defined(OPENSSL_NO_ASM)
+ #define OPENSSL_NO_ASM
+@@ -17,6 +23,7 @@
+ .align16
+ GFp_aes_hw_encrypt:
+ .cfi_startproc
++  _CET_ENDBR
+   movups  (%rdi),%xmm2
+   movl240(%rdx),%eax
+   movups  (%rdx),%xmm0
+@@ -274,6 +281,7 @@ _aesni_encrypt8:
+ .align16
+ GFp_aes_hw_ctr32_encrypt_blocks:
+ .cfi_startproc
++  _CET_ENDBR
+   cmpq$1,%rdx
+   jne .Lctr32_bulk
+ 
+@@ -856,6 +864,7 @@ GFp_aes_hw_ctr32_encrypt_blocks:
+ GFp_aes_hw_set_encrypt_key:
+ __aesni_set_encrypt_key:
+ .cfi_startproc
++  _CET_ENDBR
+ .byte 0x48,0x83,0xEC,0x08
+ .cfi_adjust_cfa_offset8
+   movq$-1,%rax
+@@ -1157,6 +1166,7 @@ __aesni_set_encrypt_key:
.byte   0xf3,0xc3
  .size GFp_aes_hw_set_encrypt_key,.-GFp_aes_hw_set_encrypt_key
  .size __aesni_set_encry

Re: ncspot aborts on startup in -current

2023-06-29 Thread Theo Buehler
On Thu, Jun 29, 2023 at 11:25:20AM +0200, Theo Buehler wrote:
> On Thu, Jun 29, 2023 at 10:54:10AM +0200, Theo Buehler wrote:
> > On Thu, Jun 29, 2023 at 09:23:53AM +0100, Stuart Henderson wrote:
> > > Does the same happen if you build your own kernel rather than using a
> > > snap?
> > 
> > Someone will have to port the patches that add _CET_ENDBR from
> > security/boringssl/head to security/rust-ring.
> 
> Something like this should do the trick. Can't test it.  Build and
> install rust-ring with this patch, then build and install ncspot.

Ugh hold on. I missed something.



Re: ncspot aborts on startup in -current

2023-06-29 Thread Theo Buehler
On Thu, Jun 29, 2023 at 10:54:10AM +0200, Theo Buehler wrote:
> On Thu, Jun 29, 2023 at 09:23:53AM +0100, Stuart Henderson wrote:
> > Does the same happen if you build your own kernel rather than using a
> > snap?
> 
> Someone will have to port the patches that add _CET_ENDBR from
> security/boringssl/head to security/rust-ring.

Something like this should do the trick. Can't test it.  Build and
install rust-ring with this patch, then build and install ncspot.

Index: Makefile
===
RCS file: /cvs/ports/security/rust-ring/Makefile,v
retrieving revision 1.10
diff -u -p -r1.10 Makefile
--- Makefile12 Apr 2023 18:43:01 -  1.10
+++ Makefile29 Jun 2023 09:22:34 -
@@ -4,7 +4,7 @@ COMMENT =   ring crate source patched for
 VERSION =  0.16.20
 DISTNAME = ring-${VERSION}
 PKGNAME =  rust-${DISTNAME}
-REVISION = 6
+REVISION = 7
 
 SUBST_VARS =   VERSION
 
Index: patches/patch-pregenerated_aesni-gcm-x86_64-elf_S
===
RCS file: 
/cvs/ports/security/rust-ring/patches/patch-pregenerated_aesni-gcm-x86_64-elf_S,v
retrieving revision 1.2
diff -u -p -r1.2 patch-pregenerated_aesni-gcm-x86_64-elf_S
--- patches/patch-pregenerated_aesni-gcm-x86_64-elf_S   24 Feb 2023 08:09:50 
-  1.2
+++ patches/patch-pregenerated_aesni-gcm-x86_64-elf_S   29 Jun 2023 09:17:43 
-
@@ -1,7 +1,23 @@
 Index: pregenerated/aesni-gcm-x86_64-elf.S
 --- pregenerated/aesni-gcm-x86_64-elf.S.orig
 +++ pregenerated/aesni-gcm-x86_64-elf.S
-@@ -827,6 +827,7 @@ GFp_aesni_gcm_encrypt:
+@@ -346,6 +346,7 @@ _aesni_ctr32_ghash_6x:
+ .align32
+ GFp_aesni_gcm_decrypt:
+ .cfi_startproc
++  _CET_ENDBR
+   xorq%r10,%r10
+ 
+ 
+@@ -553,6 +554,7 @@ _aesni_ctr32_6x:
+ .align32
+ GFp_aesni_gcm_encrypt:
+ .cfi_startproc
++  _CET_ENDBR
+   xorq%r10,%r10
+ 
+ 
+@@ -827,6 +829,7 @@ GFp_aesni_gcm_encrypt:
.byte   0xf3,0xc3
  .cfi_endproc  
  .size GFp_aesni_gcm_encrypt,.-GFp_aesni_gcm_encrypt
@@ -9,7 +25,7 @@ Index: pregenerated/aesni-gcm-x86_64-elf
  .align64
  .Lbswap_mask:
  .byte 15,14,13,12,11,10,9,8,7,6,5,4,3,2,1,0
-@@ -839,6 +840,7 @@ GFp_aesni_gcm_encrypt:
+@@ -839,6 +842,7 @@ GFp_aesni_gcm_encrypt:
  .Lone_lsb:
  .byte 1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
  .byte 
65,69,83,45,78,73,32,71,67,77,32,109,111,100,117,108,101,32,102,111,114,32,120,56,54,95,54,52,44,32,67,82,89,80,84,79,71,65,77,83,32,98,121,32,60,97,112,112,114,111,64,111,112,101,110,115,115,108,46,111,114,103,62,0
Index: patches/patch-pregenerated_aesni-x86_64-elf_S
===
RCS file: 
/cvs/ports/security/rust-ring/patches/patch-pregenerated_aesni-x86_64-elf_S,v
retrieving revision 1.2
diff -u -p -r1.2 patch-pregenerated_aesni-x86_64-elf_S
--- patches/patch-pregenerated_aesni-x86_64-elf_S   24 Feb 2023 08:09:50 
-  1.2
+++ patches/patch-pregenerated_aesni-x86_64-elf_S   29 Jun 2023 09:17:43 
-
@@ -1,7 +1,31 @@
 Index: pregenerated/aesni-x86_64-elf.S
 --- pregenerated/aesni-x86_64-elf.S.orig
 +++ pregenerated/aesni-x86_64-elf.S
-@@ -1157,6 +1157,7 @@ __aesni_set_encrypt_key:
+@@ -17,6 +17,7 @@
+ .align16
+ GFp_aes_hw_encrypt:
+ .cfi_startproc
++  _CET_ENDBR
+   movups  (%rdi),%xmm2
+   movl240(%rdx),%eax
+   movups  (%rdx),%xmm0
+@@ -274,6 +275,7 @@ _aesni_encrypt8:
+ .align16
+ GFp_aes_hw_ctr32_encrypt_blocks:
+ .cfi_startproc
++  _CET_ENDBR
+   cmpq$1,%rdx
+   jne .Lctr32_bulk
+ 
+@@ -856,6 +858,7 @@ GFp_aes_hw_ctr32_encrypt_blocks:
+ GFp_aes_hw_set_encrypt_key:
+ __aesni_set_encrypt_key:
+ .cfi_startproc
++  _CET_ENDBR
+ .byte 0x48,0x83,0xEC,0x08
+ .cfi_adjust_cfa_offset8
+   movq$-1,%rax
+@@ -1157,6 +1160,7 @@ __aesni_set_encrypt_key:
.byte   0xf3,0xc3
  .size GFp_aes_hw_set_encrypt_key,.-GFp_aes_hw_set_encrypt_key
  .size __aesni_set_encrypt_key,.-__aesni_set_encrypt_key
@@ -9,7 +33,7 @@ Index: pregenerated/aesni-x86_64-elf.S
  .align64
  .Lbswap_mask:
  .byte 15,14,13,12,11,10,9,8,7,6,5,4,3,2,1,0
-@@ -1177,5 +1178,6 @@ __aesni_set_encrypt_key:
+@@ -1177,5 +1181,6 @@ __aesni_set_encrypt_key:
  
  .byte 
65,69,83,32,102,111,114,32,73,110,116,101,108,32,65,69,83,45,78,73,44,32,67,82,89,80,84,79,71,65,77,83,32,98,121,32,60,97,112,112,114,111,64,111,112,101,110,115,115,108,46,111,114,103,62,0
  .align64
Index: patches/patch-pregenerated_chacha-x86_64-elf_S
===
RCS file: 
/cvs/ports/security/rust-ring/patches/patch-pregenerated_chacha-x86_64-elf_S,v
retrieving revision 1.2
diff -u -p -r1.2 patch-pregenerated_chacha-x86_64-elf_S
--- patches/patch-pregenerated_chacha-x86_64-elf_S  24 Feb 2023 08:09:50 
-  1.2
+++ patches/patch-pregenerated

Re: ncspot aborts on startup in -current

2023-06-29 Thread Theo Buehler
On Thu, Jun 29, 2023 at 09:23:53AM +0100, Stuart Henderson wrote:
> Does the same happen if you build your own kernel rather than using a
> snap?

Someone will have to port the patches that add _CET_ENDBR from
security/boringssl/head to security/rust-ring.



Re: ncspot aborts on startup in -current

2023-06-29 Thread Matthias Schmidt
* Stuart Henderson wrote:
> Does the same happen if you build your own kernel rather than using a
> snap?

No, it works when running a self-compiled kernel.  So it seems it is
related to BTCFI.

Cheers

Matthias



Re: [PATCH] www/nginx -- add njs dynamic module

2023-06-29 Thread Stuart Henderson
(oops, resending, i screwed up the mail headers)

On 2023/06/29 00:49, Sergey A. Osokin wrote:
> Hi,
> 
> On Mon, Jun 19, 2023 at 03:25:42PM +, Sergey A. Osokin wrote:
> > On Thu, Jun 08, 2023 at 11:30:57PM +, Sergey A. Osokin wrote:
> > > On Wed, May 24, 2023 at 04:14:34PM +, Sergey A. Osokin wrote:
> > > > 
> > > > I'd like to extend the nginx functionality with nginx javascript
> > > > module, so here's the patch to add the module to the www/nginx
> > > > port.
> > > > Please let me know your thoughts.
> 
> Is there any updates on this?
> Thank you.
> 
> -- 
> Sergey A. Osokin

I note you didn't cc the port maintainer on your original mail,
was there a reason for that?

I've cc'd and included the original mail. What are you thoughts
on this please Robert?


- Forwarded message from "Sergey A. Osokin"  -

From: "Sergey A. Osokin" 
Date: Wed, 24 May 2023 16:14:34 +
To: ports@openbsd.org
Subject: [PATCH] www/nginx -- add njs dynamic module

Hi,

I'd like to extend the nginx functionality with nginx javascript
module, so here's the patch to add the module to the www/nginx
port.
Please let me know your thoughts.

Thank you.

-- 
Sergey A. Osokin

Index: Makefile
===
RCS file: /cvs/ports/www/nginx/Makefile,v
retrieving revision 1.165
diff -u -p -r1.165 Makefile
--- Makefile17 Apr 2023 17:36:58 -  1.165
+++ Makefile24 May 2023 16:07:23 -
@@ -11,6 +11,7 @@ COMMENT-ldap_auth=nginx LDAP authentica
 COMMENT-lua=   nginx lua scripting module
 COMMENT-headers_more=  nginx module for setting/adding/clearing headers
 COMMENT-perl=  nginx perl scripting module
+COMMENT-njs=   nginx javascript scripting module
 COMMENT-passenger= nginx passenger (ruby/python/nodejs) integration module
 COMMENT-rtmp=  nginx module for RTMP streaming
 COMMENT-securelink=nginx HMAC secure link module
@@ -18,7 +19,9 @@ COMMENT-securelink=   nginx HMAC secure li
 VERSION=   1.24.0
 DISTNAME=  nginx-${VERSION}
 CATEGORIES=www
+REVISION=  0
 
+VERSION-njs=   0.7.12
 VERSION-rtmp=  1.2.1
 
 PKGNAME-main=  ${DISTNAME}
@@ -32,6 +35,7 @@ PKGNAME-ldap_auth=nginx-ldap_auth-${VER
 PKGNAME-lua=   nginx-lua-${VERSION}
 PKGNAME-headers_more=  nginx-headers-more-${VERSION}
 PKGNAME-perl=  nginx-perl-${VERSION}
+PKGNAME-njs=   nginx-njs-${VERSION}
 PKGNAME-passenger= nginx-passenger-${VERSION}
 PKGNAME-rtmp=  nginx-rtmp-${VERSION}
 PKGNAME-securelink=nginx-securelink-${VERSION}
@@ -51,6 +55,7 @@ _GH_MODS= \
nbs-system  naxsi   
d714f1636ea49a9a9f4f06dba14aee003e970834 \
kvspb   nginx-auth-ldap 
83c059b73566c2ee9cbda920d91b66657cf120b7 \
arutnginx-rtmp-module   v${VERSION-rtmp} \
+   nginx   njs ${VERSION-njs} \
simpl   ngx_devel_kit   v0.3.0 \
leevngx_http_geoip2_module  3.3 \
nginx-modules   ngx_http_hmac_secure_link_module 
48c4625fbbf51ed5a95bfec23fa444f6c3702e50
@@ -70,7 +75,7 @@ MULTI_PACKAGES =  -main -naxsi -perl ${MO
 
 MODULE_PACKAGES =  -image_filter -geoip2 -xslt -mailproxy -stream \
-passenger -headers_more -ldap_auth -lua -rtmp \
-   -securelink
+   -securelink -njs
 
 FLAVOR ?=
 PSEUDO_FLAVORS =   no_lua no_passenger
@@ -85,6 +90,7 @@ WANTLIB-stream=
 WANTLIB-image_filter=  gd
 WANTLIB-geoip2=maxminddb
 WANTLIB-rtmp=
+WANTLIB-njs=   pcre2-8 crypto ssl xml2 z
 WANTLIB-xslt=  exslt xml2 xslt
 WANTLIB-naxsi=
 WANTLIB-ldap_auth= ldap
@@ -103,6 +109,8 @@ LIB_DEPENDS-ldap_auth=  databases/openlda
 LIB_DEPENDS-lua=   ${MODLUA_LIB_DEPENDS}
 LIB_DEPENDS-rtmp=
 LIB_DEPENDS-securelink=
+LIB_DEPENDS-njs=   devel/pcre2 \
+   textproc/libxml
 
 MODLUA_RUNDEP= No
 RUN_DEPENDS=   www/nginx,-main=${VERSION}
@@ -150,6 +158,10 @@ CONFIGURE_ARGS+=   --add-dynamic-module=${
 CONFIGURE_ARGS+=   
--add-dynamic-module=${WRKDIR}/nginx-rtmp-module-${VERSION-rtmp}/
 .endif
 
+.if ${BUILD_PACKAGES:M-njs}
+CONFIGURE_ARGS+=   --add-dynamic-module=${WRKSRC}/njs/nginx
+.endif
+
 CONFIGURE_ARGS+=   --prefix=${NGINX_DIR} \
--conf-path=${SYSCONFDIR}/nginx/nginx.conf \
--sbin-path=${PREFIX}/sbin/nginx \
@@ -193,7 +205,7 @@ NO_TEST=Yes
 ALL_TARGET=
 
 pre-patch:
-.for i in headers-more-nginx-module lua-nginx-module naxsi \
+.for i in headers-more-nginx-module lua-nginx-module naxsi njs \
nginx-auth-ldap ngx_devel_kit ngx_http_geoip2_module \
ngx_http_hmac_secure_link_module
cd ${WRKSRC} && mv ../$i-* $i
Index: distinfo
===
RCS file: /cvs/po

Re: ncspot aborts on startup in -current

2023-06-29 Thread Stuart Henderson
Does the same happen if you build your own kernel rather than using a
snap?


On 2023/06/29 10:14, Matthias Schmidt wrote:
> 
> Hi ports@,
> 
> ncspot on -current aborts on startup with SIGILL and complains about a
> missing assembler file in the ring crate.  I haven't used it in a while
> so I didn't know exactly when it stopped working.  My machine supports 
> BTCFI...
> 
> Let me know if you need more information.
> 
> Cheers
> 
>   Matthias
> 
> $ ncspot
> Connecting to Spotify..
> Illegal instruction (core dumped)
> 
> $ sysctl -n kern.version
> OpenBSD 7.3-current (GENERIC.MP) #1265: Tue Jun 27 22:39:43 MDT 2023
>  dera...@amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.MP
> 
> $ pkg_info -v ncspot
> [...]
> Size: 23923626
> Signature: 
> ncspot-0.13.3,10,@dbus-1.14.8v0,@portaudio-svn-1970p0,c++abi.6.0,c.97.0,crypto.51.0,curses.14.0,dbus-1.11.3,m.10.1,portaudio.1.2,pthread.27.0,ssl.54.0
> Packing-list:
> @name ncspot-0.13.3
> @url 
> https://cdn.openbsd.org/pub/OpenBSD/snapshots/packages/amd64/ncspot-0.13.3.tgz
> @version 10
> 
> $ egdb /usr/local/bin/ncspot ncspot.core
> Reading symbols from /usr/local/bin/ncspot...
> [New process 417810]
> [New process 424680]
> [New process 618649]
> [New process 135978]
> [New process 586465]
> [New process 113828]
> [New process 297150]
> [New process 132607]
> Core was generated by `ncspot'.
> Program terminated with signal SIGILL, Illegal instruction.
> #0  GFp_sha512_block_data_order () at 
> /usr/obj/ports/ncspot-0.13.3/ncspot-0.13.3/modcargo-crates/ring-0.16.20/pregenerated/sha512-x86_64-elf.S:21
> 21  
> /usr/obj/ports/ncspot-0.13.3/ncspot-0.13.3/modcargo-crates/ring-0.16.20/pregenerated/sha512-x86_64-elf.S:
>  No such file or directory.
> [Current thread is 1 (process 417810)]
> (gdb) bt
> #0  GFp_sha512_block_data_order () at 
> /usr/obj/ports/ncspot-0.13.3/ncspot-0.13.3/modcargo-crates/ring-0.16.20/pregenerated/sha512-x86_64-elf.S:21
> #1  0x0e2388c8b004 in ring::digest::Context::update ()
> #2  0x0e2388c74167 in rustls::hash_hs::HandshakeHashBuffer::start_hash ()
> #3  0x0e2388c7902e in  rustls::conn::State>::handle
>  ()
> #4  0x0e2388c79c0c in 
>  rustls::conn::State>::handle
>  ()
> #5  0x0e2388c39d36 in rustls::conn::CommonState::process_main_protocol ()
> #6  0x0e2388c3a5d5 in 
> rustls::conn::ConnectionCommon::process_new_packets ()
> #7  0x0e2388c39ed1 in rustls::conn::ConnectionCommon::complete_io ()
> #8  0x0e2388c1f8aa in ureq::rtls:: alloc::sync::Arc>::connect ()
> #9  0x0e2388c297ad in ureq::stream::connect_https ()
> #10 0x0e2388c33448 in ureq::unit::connect_socket ()
> #11 0x0e2388c31f3f in ureq::unit::connect_inner ()
> #12 0x0e2388c30d95 in ureq::unit::connect ()
> #13 0x0e2388c3d989 in ureq::request::Request::do_call::{{closure}} ()
> #14 0x0e2388c3d4e2 in ureq::request::Request::do_call ()
> #15 0x0e2388c3cc82 in ureq::request::Request::call ()
> #16 0x0e238865e2b6 in rspotify_http::ureq::UreqClient::request ()
> #17 0x0e23887c9d7a in rspotify::clients::base::BaseClient::api_get ()
> #18 0x0e23888128c9 in 
> ncspot::spotify_api::WebApi::current_user::{{closure}} ()
> #19 0x0e23888123f8 in ncspot::spotify_api::WebApi::current_user ()
> #20 0x0e238890bbf6 in ncspot::library::Library::new ()
> #21 0x0e23887ee779 in ncspot::application::Application::new ()
> #22 0x0e2388a2c58e in ncspot::main ()
> #23 0x0e238898edef in 
> std::sys_common::backtrace::__rust_begin_short_backtrace ()
> #24 0x0e2388854b39 in std::rt::lang_start::{{closure}} ()
> #25 0x0e238907d498 in std::panicking::try ()
> #26 0x0e2389097ef2 in std::rt::lang_start_internal ()
> #27 0x0e2388a45851 in main ()
> (gdb) 
> 
> 
> OpenBSD 7.3-current (GENERIC.MP) #1265: Tue Jun 27 22:39:43 MDT 2023
> dera...@amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.MP
> real mem = 34064420864 (32486MB)
> avail mem = 33012355072 (31483MB)
> random: good seed from bootblocks
> mpath0 at root
> scsibus0 at mpath0: 256 targets
> mainbus0 at root
> bios0 at mainbus0: SMBIOS rev. 3.3 @ 0x43ca1000 (119 entries)
> bios0: vendor American Megatrends International, LLC. version "N.1.15A09" 
> date 03/24/2022
> bios0: TUXEDO TUXEDO InfinityBook Pro 14 Gen6
> efi0 at bios0: UEFI 2.7
> efi0: American Megatrends rev 0x50013
> acpi0 at bios0: ACPI 6.2
> acpi0: sleep states S0 S3 S4 S5
> acpi0: tables DSDT FACP MCFG SSDT FIDT SSDT SSDT SSDT HPET APIC SSDT SSDT 
> NHLT UEFI LPIT SSDT SSDT DBGP DBG2 SSDT DMAR SSDT SSDT BGRT PTDT WSMT FPDT
> acpi0: wakeup devices PEGP(S4) PEGP(S4) PEGP(S4) PEG0(S4) PEGP(S4) RP01(S4) 
> PXSX(S4) RP02(S4) PXSX(S4) RP03(S4) PXSX(S4) RP04(S4) PXSX(S4) RP05(S4) 
> PXSX(S4) RP06(S4) [...]
> acpitimer0 at acpi0: 3579545 Hz, 24 bits
> acpimcfg0 at acpi0
> acpimcfg0: addr 0xc000, bus 0-255
> acpihpet0 at acpi0: 1920 Hz
> acpimadt0 at acpi0 addr 0xfee0: PC-AT compat
> cpu0 at mainbus0: apid 0 (boot processor)
> cpu0: 11th Gen Intel(R

ncspot aborts on startup in -current

2023-06-29 Thread Matthias Schmidt


Hi ports@,

ncspot on -current aborts on startup with SIGILL and complains about a
missing assembler file in the ring crate.  I haven't used it in a while
so I didn't know exactly when it stopped working.  My machine supports 
BTCFI...

Let me know if you need more information.

Cheers

Matthias

$ ncspot
Connecting to Spotify..
Illegal instruction (core dumped)

$ sysctl -n kern.version
OpenBSD 7.3-current (GENERIC.MP) #1265: Tue Jun 27 22:39:43 MDT 2023
 dera...@amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.MP

$ pkg_info -v ncspot
[...]
Size: 23923626
Signature: 
ncspot-0.13.3,10,@dbus-1.14.8v0,@portaudio-svn-1970p0,c++abi.6.0,c.97.0,crypto.51.0,curses.14.0,dbus-1.11.3,m.10.1,portaudio.1.2,pthread.27.0,ssl.54.0
Packing-list:
@name ncspot-0.13.3
@url 
https://cdn.openbsd.org/pub/OpenBSD/snapshots/packages/amd64/ncspot-0.13.3.tgz
@version 10

$ egdb /usr/local/bin/ncspot ncspot.core
Reading symbols from /usr/local/bin/ncspot...
[New process 417810]
[New process 424680]
[New process 618649]
[New process 135978]
[New process 586465]
[New process 113828]
[New process 297150]
[New process 132607]
Core was generated by `ncspot'.
Program terminated with signal SIGILL, Illegal instruction.
#0  GFp_sha512_block_data_order () at 
/usr/obj/ports/ncspot-0.13.3/ncspot-0.13.3/modcargo-crates/ring-0.16.20/pregenerated/sha512-x86_64-elf.S:21
21  
/usr/obj/ports/ncspot-0.13.3/ncspot-0.13.3/modcargo-crates/ring-0.16.20/pregenerated/sha512-x86_64-elf.S:
 No such file or directory.
[Current thread is 1 (process 417810)]
(gdb) bt
#0  GFp_sha512_block_data_order () at 
/usr/obj/ports/ncspot-0.13.3/ncspot-0.13.3/modcargo-crates/ring-0.16.20/pregenerated/sha512-x86_64-elf.S:21
#1  0x0e2388c8b004 in ring::digest::Context::update ()
#2  0x0e2388c74167 in rustls::hash_hs::HandshakeHashBuffer::start_hash ()
#3  0x0e2388c7902e in >::handle 
()
#4  0x0e2388c79c0c in 
>::handle 
()
#5  0x0e2388c39d36 in rustls::conn::CommonState::process_main_protocol ()
#6  0x0e2388c3a5d5 in 
rustls::conn::ConnectionCommon::process_new_packets ()
#7  0x0e2388c39ed1 in rustls::conn::ConnectionCommon::complete_io ()
#8  0x0e2388c1f8aa in ureq::rtls::>::connect ()
#9  0x0e2388c297ad in ureq::stream::connect_https ()
#10 0x0e2388c33448 in ureq::unit::connect_socket ()
#11 0x0e2388c31f3f in ureq::unit::connect_inner ()
#12 0x0e2388c30d95 in ureq::unit::connect ()
#13 0x0e2388c3d989 in ureq::request::Request::do_call::{{closure}} ()
#14 0x0e2388c3d4e2 in ureq::request::Request::do_call ()
#15 0x0e2388c3cc82 in ureq::request::Request::call ()
#16 0x0e238865e2b6 in rspotify_http::ureq::UreqClient::request ()
#17 0x0e23887c9d7a in rspotify::clients::base::BaseClient::api_get ()
#18 0x0e23888128c9 in 
ncspot::spotify_api::WebApi::current_user::{{closure}} ()
#19 0x0e23888123f8 in ncspot::spotify_api::WebApi::current_user ()
#20 0x0e238890bbf6 in ncspot::library::Library::new ()
#21 0x0e23887ee779 in ncspot::application::Application::new ()
#22 0x0e2388a2c58e in ncspot::main ()
#23 0x0e238898edef in 
std::sys_common::backtrace::__rust_begin_short_backtrace ()
#24 0x0e2388854b39 in std::rt::lang_start::{{closure}} ()
#25 0x0e238907d498 in std::panicking::try ()
#26 0x0e2389097ef2 in std::rt::lang_start_internal ()
#27 0x0e2388a45851 in main ()
(gdb) 


OpenBSD 7.3-current (GENERIC.MP) #1265: Tue Jun 27 22:39:43 MDT 2023
dera...@amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.MP
real mem = 34064420864 (32486MB)
avail mem = 33012355072 (31483MB)
random: good seed from bootblocks
mpath0 at root
scsibus0 at mpath0: 256 targets
mainbus0 at root
bios0 at mainbus0: SMBIOS rev. 3.3 @ 0x43ca1000 (119 entries)
bios0: vendor American Megatrends International, LLC. version "N.1.15A09" date 
03/24/2022
bios0: TUXEDO TUXEDO InfinityBook Pro 14 Gen6
efi0 at bios0: UEFI 2.7
efi0: American Megatrends rev 0x50013
acpi0 at bios0: ACPI 6.2
acpi0: sleep states S0 S3 S4 S5
acpi0: tables DSDT FACP MCFG SSDT FIDT SSDT SSDT SSDT HPET APIC SSDT SSDT NHLT 
UEFI LPIT SSDT SSDT DBGP DBG2 SSDT DMAR SSDT SSDT BGRT PTDT WSMT FPDT
acpi0: wakeup devices PEGP(S4) PEGP(S4) PEGP(S4) PEG0(S4) PEGP(S4) RP01(S4) 
PXSX(S4) RP02(S4) PXSX(S4) RP03(S4) PXSX(S4) RP04(S4) PXSX(S4) RP05(S4) 
PXSX(S4) RP06(S4) [...]
acpitimer0 at acpi0: 3579545 Hz, 24 bits
acpimcfg0 at acpi0
acpimcfg0: addr 0xc000, bus 0-255
acpihpet0 at acpi0: 1920 Hz
acpimadt0 at acpi0 addr 0xfee0: PC-AT compat
cpu0 at mainbus0: apid 0 (boot processor)
cpu0: 11th Gen Intel(R) Core(TM) i7-11370H @ 3.30GHz, 4788.96 MHz, 06-8c-01
cpu0: 
FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,DS,ACPI,MMX,FXSR,SSE,SSE2,SS,HTT,TM,PBE,SSE3,PCLMUL,DTES64,MWAIT,DS-CPL,VMX,EST,TM2,SSSE3,SDBG,FMA3,CX16,xTPR,PDCM,PCID,SSE4.1,SSE4.2,x2APIC,MOVBE,POPCNT,DEADLINE,AES,XSAVE,AVX,F16C,RDRAND,NXE,PAGE1GB,RDTSCP,LONG,LAHF,ABM,3DNOWP,PERF,ITSC,FSGSBASE,TSC_ADJUST,BMI1,AVX2,SMEP