CVS: cvs.openbsd.org: src

2020-07-04 Thread Mark Kettenis
CVSROOT:/cvs
Module name:src
Changes by: kette...@cvs.openbsd.org2020/07/04 15:11:52

Modified files:
gnu/usr.bin: Makefile 

Log message:
Don't build gdb on powerpc64.



CVS: cvs.openbsd.org: src

2020-07-04 Thread Mark Kettenis
CVSROOT:/cvs
Module name:src
Changes by: kette...@cvs.openbsd.org2020/07/04 15:11:04

Modified files:
distrib: Makefile 
distrib/notes  : Makefile 
Added files:
distrib/powerpc64: Makefile 
distrib/powerpc64/ramdisk: Makefile install.md list 

Log message:
Installer bits for powerpc64.



CVS: cvs.openbsd.org: src

2020-07-04 Thread Mark Kettenis
CVSROOT:/cvs
Module name:src
Changes by: kette...@cvs.openbsd.org2020/07/04 15:09:14

src/distrib/powerpc64/ramdisk

Update of /cvs/src/distrib/powerpc64/ramdisk
In directory cvs.openbsd.org:/tmp/cvs-serv83064/ramdisk

Log Message:
Directory /cvs/src/distrib/powerpc64/ramdisk added to the repository



CVS: cvs.openbsd.org: src

2020-07-04 Thread Mark Kettenis
CVSROOT:/cvs
Module name:src
Changes by: kette...@cvs.openbsd.org2020/07/04 15:08:52

src/distrib/powerpc64

Update of /cvs/src/distrib/powerpc64
In directory cvs.openbsd.org:/tmp/cvs-serv48107/powerpc64

Log Message:
Directory /cvs/src/distrib/powerpc64 added to the repository



CVS: cvs.openbsd.org: src

2020-07-04 Thread Mark Kettenis
CVSROOT:/cvs
Module name:src
Changes by: kette...@cvs.openbsd.org2020/07/04 15:08:11

Modified files:
sys/arch/powerpc64/conf: RAMDISK 

Log message:
Bump the size of the ramdisk.



CVS: cvs.openbsd.org: src

2020-07-04 Thread Mark Kettenis
CVSROOT:/cvs
Module name:src
Changes by: kette...@cvs.openbsd.org2020/07/04 15:07:23

Modified files:
sys/arch/powerpc64/conf: files.powerpc64 

Log message:
Use block device numbers instead of character device numbers.



CVS: cvs.openbsd.org: src

2020-07-04 Thread George Koehler
CVSROOT:/cvs
Module name:src
Changes by: gkoeh...@cvs.openbsd.org2020/07/04 13:25:11

Modified files:
share/mk   : bsd.own.mk 

Log message:
Stop defining NOPIC on powerpc64.

ok kettenis@ drahn@



CVS: cvs.openbsd.org: src

2020-07-04 Thread Kenneth R Westerback
CVSROOT:/cvs
Module name:src
Changes by: k...@cvs.openbsd.org2020/07/04 12:50:55

Modified files:
sys/dev/isa: wds.c 

Log message:
Nestle all sc_link initialization near config_found() invocation.



CVS: cvs.openbsd.org: src

2020-07-04 Thread Antoine Jacoutot
CVSROOT:/cvs
Module name:src
Changes by: ajacou...@cvs.openbsd.org   2020/07/04 12:30:46

Modified files:
usr.sbin/syspatch: syspatch.sh 
usr.sbin/sysupgrade: sysupgrade.sh 

Log message:
Our old ksh(1) bug where eval()uating a || compound list would terminate the
shell has been fixed by benno@; remove workaround.

ok naddy@



CVS: cvs.openbsd.org: src

2020-07-04 Thread Mark Kettenis
CVSROOT:/cvs
Module name:src
Changes by: kette...@cvs.openbsd.org2020/07/04 10:49:21

Modified files:
sys/arch/powerpc64/powerpc64: autoconf.c 

Log message:
Fill in nam2blk array.



CVS: cvs.openbsd.org: src

2020-07-04 Thread Kenneth R Westerback
CVSROOT:/cvs
Module name:src
Changes by: k...@cvs.openbsd.org2020/07/04 10:41:23

Modified files:
sys/dev/ic : siop.c siop_common.c 

Log message:
Nestle all sc_c.sc_link initialization near config_found() invocation.



CVS: cvs.openbsd.org: src

2020-07-04 Thread Mark Kettenis
CVSROOT:/cvs
Module name:src
Changes by: kette...@cvs.openbsd.org2020/07/04 10:27:00

Modified files:
sys/arch/powerpc64/powerpc64: trap.c 

Log message:
Set dsisr member of the trapframe struct to a defined value before falling
through into the data storage interrupt when handing a data segment
interrupt.



CVS: cvs.openbsd.org: src

2020-07-04 Thread Nicholas Marriott
CVSROOT:/cvs
Module name:src
Changes by: n...@cvs.openbsd.org2020/07/04 08:24:02

Modified files:
usr.bin/tmux   : cmd-join-pane.c cmd-kill-window.c server-fn.c 
 tmux.h window-tree.c 

Log message:
kill-window -a cannot just walk the list of windows because if
renumber-windows is on, the window it wants to keep could be moved.
Change to renumber afterwards and also behave better if the window is
linked into the session twice. GitHub issue 2287.



CVS: cvs.openbsd.org: src

2020-07-04 Thread Antoine Jacoutot
CVSROOT:/cvs
Module name:src
Changes by: ajacou...@cvs.openbsd.org   2020/07/04 08:08:27

Modified files:
usr.sbin/syspatch: syspatch.sh 

Log message:
Small XXX.



CVS: cvs.openbsd.org: xenocara

2020-07-04 Thread Matthieu Herrb
CVSROOT:/cvs
Module name:xenocara
Changes by: matth...@cvs.openbsd.org2020/07/04 07:32:51

Modified files:
app/xenodm/config: Xsetup_0 

Log message:
Start xconsole after setting the background.
Fixes an issue that causes xconsole to crash reported and fix tested
by Joe Gidi. Thanks.



CVS: cvs.openbsd.org: src

2020-07-04 Thread Mark Kettenis
CVSROOT:/cvs
Module name:src
Changes by: kette...@cvs.openbsd.org2020/07/04 07:01:16

Modified files:
sys/arch/arm64/dev: efi.c mainbus.c 

Log message:
OF_finddevice() returns -1 upon failure.  Fix various checks of the return
value.  Makes things work again on the rpi3.

ok jsg@



CVS: cvs.openbsd.org: src

2020-07-04 Thread Klemens Nanni
CVSROOT:/cvs
Module name:src
Changes by: k...@cvs.openbsd.org2020/07/04 05:23:35

Modified files:
usr.bin/ftp: fetch.c 

Log message:
Avoid malloc(3) calls in signal handler

Fetch aborts through SIGINT (^C) print a message with fputs(3), but this
calls malloc() on its own, which is not supported from interrupt handler
context.

Fix it by using write(2) which avoids further memory allocations.
While here, merge abortfile() into the identical aborthttp() with a more
generic "fetch aborted." message for simplicity.

Spotted with vm.malloc_conf=SU and ^C on a port's "make fetch" causing

ftp(49660) in malloc(): recursive call
Abort trap (core dumped)

OK jca (who came up with using write(2) independently)



CVS: cvs.openbsd.org: src

2020-07-04 Thread Marcus Glocker
CVSROOT:/cvs
Module name:src
Changes by: mgloc...@cvs.openbsd.org2020/07/04 04:39:25

Modified files:
sys/dev/pckbc  : pms.c 

Log message:
Fix intermittent failing device initialization seen on some Synaptics
devices which has been re-introduced by pms.c revision 1.92.

ok tb@



CVS: cvs.openbsd.org: src

2020-07-04 Thread Martin Pieuchot
CVSROOT:/cvs
Module name:src
Changes by: m...@cvs.openbsd.org2020/07/04 04:19:09

Modified files:
sys/dev/dt : dt_prov_syscall.c dtvar.h 

Log message:
Do the same as libc, store "-1" in the return value when a syscall failed.

Simplify the logic by always exporting the return value and errno in the
syscall profiler.



CVS: cvs.openbsd.org: src

2020-07-04 Thread Jeremie Courreges-Anglas
CVSROOT:/cvs
Module name:src
Changes by: j...@cvs.openbsd.org2020/07/04 04:18:49

Modified files:
usr.bin/ftp: fetch.c 

Log message:
Fix a double free in error paths

Consistently disarm the SIGINT handler on error, else a SIGINT can lead
to taking twice the cleanup path.  Initial report by naddy@, ok tb@



CVS: cvs.openbsd.org: src

2020-07-04 Thread Martin Pieuchot
CVSROOT:/cvs
Module name:src
Changes by: m...@cvs.openbsd.org2020/07/04 04:16:15

Modified files:
usr.sbin/btrace: btrace.c btrace.h map.c 

Log message:
Print the correct register for syscall return value.

While here make it possible to store syscall return values in maps.



CVS: cvs.openbsd.org: src

2020-07-04 Thread Joel Sing
CVSROOT:/cvs
Module name:src
Changes by: js...@cvs.openbsd.org   2020/07/04 03:07:02

Modified files:
regress/lib/libtls/tls: tlstest.c 

Log message:
Add a missing circular_init() call in the TLS ordering test.

This makes the regress work correctly again - this was previously masked
by the fact that tls_close() (and hence SSL_shutdown()) was draining the
circular buffer, whereas now we're leaving data behind from a previous
test, resulting in the ordering test failing.



CVS: cvs.openbsd.org: src

2020-07-04 Thread Visa Hankala
CVSROOT:/cvs
Module name:src
Changes by: v...@cvs.openbsd.org2020/07/04 03:00:09

Modified files:
sys/arch/octeon/dev: cn30xxgmx.c cn30xxgmxvar.h if_cnmac.c 

Log message:
Remove no-op cn30xxgmx_reset_board().



CVS: cvs.openbsd.org: src

2020-07-04 Thread Visa Hankala
CVSROOT:/cvs
Module name:src
Changes by: v...@cvs.openbsd.org2020/07/04 02:33:43

Modified files:
sys/kern   : kern_event.c 

Log message:
Use klist_invalidate() in knote_processexit()

This leaves knote_remove() for kqueue's internal use. As a result,
knote_remove() is used to drop knotes from the knlist of a single
kqueue instance. klist_invalidate() clears knotes from a klist that
can contain entries from different kqueue instances.

Use FILTEROP_ISFD to control how klist_invalidate() treats knotes,
to preserve the current behaviour of knote_processexit(). All the
existing callers of klist_invalidate() are fd-based. The existing code
rewires and activates knotes to give userspace a clear indication that
the state of the fd has changed. In knote_processexit(), any remaining
knotes in ps_klist are non-fd-based (EVFILT_SIGNAL). Those are dropped
without notifying userspace.

OK mpi@



CVS: cvs.openbsd.org: src

2020-07-04 Thread Anton Lindqvist
CVSROOT:/cvs
Module name:src
Changes by: an...@cvs.openbsd.org   2020/07/04 02:06:08

Modified files:
sys/dev/dt : dt_dev.c dtvar.h 
sys/kern   : kern_tc.c kern_timeout.c 
sys/net: if_var.h 
sys/sys: filedesc.h proc.h timetc.h 

Log message:
It's been agreed upon that global locks should be expressed using
capital letters in locking annotations. Therefore harmonize the existing
annotations.

Also, if multiple locks are required they should be delimited using
commas.

ok mpi@



CVS: cvs.openbsd.org: src

2020-07-04 Thread Richard Procter
CVSROOT:/cvs
Module name:src
Changes by: proc...@cvs.openbsd.org 2020/07/04 00:06:16

Modified files:
sys/net: if_wg.c 

Log message:
Permit the stack to check transport and network checksums.  Although the link
provides stronger integrity checks, it needn't cover the end-to-end transport
path. And it is in any case a layer violation for one layer to disable the
checks of another. Skipping the network check saved ~2.4% +/- ~0.2% of cp_time
(sys+intr) on the forwarding path of a 1Ghz AMD G-T40N (apu1). Other checksum
speedups exist which do not skip the check.

ok claudio@ kn@ stsp@