Re: faithd fcntl diff

2013-02-11 Thread Christiano F. Haesbaert
On 11 February 2013 07:05, Todd T. Fries t...@fries.net wrote:
 In light of nat64 in pf(4), what purpose does faithd(8) serve anymore?

 I played with it a bit over a decade ago, but don't recall having any use
 for it in the last number of years.

 I vote it gets tedu'ed.


I vote for it too, I remember suggesting it last year.

 Penned by David Hill on 20130209 12:53.51, we have:
 | Anyone want to OK and commit?
 |
 | On Sun, Jan 20, 2013 at 05:19:18PM -0500, David Hill wrote:
 | O_NONBLOCK is set with F_SETFL
 | 
 | Index: usr.sbin/faithd/tcp.c
 | ===
 | RCS file: /cvs/src/usr.sbin/faithd/tcp.c,v
 | retrieving revision 1.12
 | diff -N -u -p usr.sbin/faithd/tcp.c
 | --- usr.sbin/faithd/tcp.c8 Sep 2002 01:20:15 -   1.12
 | +++ usr.sbin/faithd/tcp.c20 Jan 2013 22:17:13 -
 | @@ -206,7 +206,7 @@ relay(int s_rcv, int s_snd, const char *service, int d
 |  FD_ZERO(readfds);
 |  FD_ZERO(writefds);
 |  FD_ZERO(exceptfds);
 | -fcntl(s_snd, F_SETFD, O_NONBLOCK);
 | +fcntl(s_snd, F_SETFL, O_NONBLOCK);
 |  oreadfds = readfds; owritefds = writefds; oexceptfds = exceptfds;
 |  if (s_rcv = FD_SETSIZE)
 |  exit_failure(descriptor too big);
 | 

 --
 Todd Fries .. t...@fries.net

  
 |\  1.636.410.0632 (voice)
 | Free Daemon Consulting, LLC\  1.405.227.9094 (voice)
 | http://FreeDaemonConsulting.com\  1.866.792.3418 (FAX)
 | PO Box 16169, Oklahoma City, OK 73113  \  sip:freedae...@ekiga.net
 | ..in support of free software solutions. \  sip:4052279...@ekiga.net
  \

   37E7 D3EB 74D0 8D66 A68D  B866 0326 204E 3F42 004A
 http://todd.fries.net/pgp.txt




Re: faithd fcntl diff

2013-02-11 Thread Stuart Henderson
On 2013/02/11 00:05, Todd T. Fries wrote:
 In light of nat64 in pf(4), what purpose does faithd(8) serve anymore?

ftp translation; but I doubt anyone uses that.

 I played with it a bit over a decade ago, but don't recall having any use
 for it in the last number of years.
 
 I vote it gets tedu'ed.

+1. don't forget the kernel parts!



Re: faithd fcntl diff

2013-02-11 Thread Mark Kettenis
 Date: Mon, 11 Feb 2013 00:05:29 -0600
 From: Todd T. Fries t...@fries.net
 
 In light of nat64 in pf(4), what purpose does faithd(8) serve anymore?
 
 I played with it a bit over a decade ago, but don't recall having any use
 for it in the last number of years.
 
 I vote it gets tedu'ed.

I fear it's too late in the game to do that now.

Bring this up again after unlock.  Meanwhile, perhaps that bug (if it
really is a bug) should be fixed?



Re: faithd fcntl diff

2013-02-11 Thread todd
Penned by Mark Kettenis on 20130211 10:00.08, we have:
|  Date: Mon, 11 Feb 2013 00:05:29 -0600
|  From: Todd T. Fries t...@fries.net
|  
|  In light of nat64 in pf(4), what purpose does faithd(8) serve anymore?
|  
|  I played with it a bit over a decade ago, but don't recall having any use
|  for it in the last number of years.
|  
|  I vote it gets tedu'ed.
| 
| I fear it's too late in the game to do that now.
| 
| Bring this up again after unlock.  Meanwhile, perhaps that bug (if it
| really is a bug) should be fixed?

I spoke with David Hill on irc and turns out it was found during
a O_CLOEXEC cleanup.

Since we strive for correct code everywhere, makes sense to me to commit the
fix, so we put better 'last version before teduing' code in the attic after
unlock.

Thanks,
-- 
Todd Fries .. t...@fries.net

 
|\  1.636.410.0632 (voice)
| Free Daemon Consulting, LLC\  1.405.227.9094 (voice)
| http://FreeDaemonConsulting.com\  1.866.792.3418 (FAX)
| PO Box 16169, Oklahoma City, OK 73113  \  sip:freedae...@ekiga.net
| ..in support of free software solutions. \  sip:4052279...@ekiga.net
 \
 
  37E7 D3EB 74D0 8D66 A68D  B866 0326 204E 3F42 004A
http://todd.fries.net/pgp.txt



Re: add scan_ffs to fsck and fsck_ffs see also lists

2013-02-11 Thread Scott McEachern

On 02/10/13 21:42, Scott McEachern wrote:

I think these might be helpful:



Sorry, I didn't have a machine with the sources available when I sent 
that.  Is this more helpful or is it too late?



Index: fsck.8
===
RCS file: /cvs/src/sbin/fsck/fsck.8,v
retrieving revision 1.31
diff -u -p -r1.31 fsck.8
--- fsck.8  31 May 2007 19:19:44 -  1.31
+++ fsck.8  11 Feb 2013 16:39:49 -
@@ -176,4 +176,5 @@ file system table
 .Xr growfs 8 ,
 .Xr mount 8 ,
 .Xr newfs 8 ,
+.Xr scan_ffs 8 ,
 .Xr rc 8


Index: fsck_ffs.8
===
RCS file: /cvs/src/sbin/fsck_ffs/fsck_ffs.8,v
retrieving revision 1.22
diff -u -p -r1.22 fsck_ffs.8
--- fsck_ffs.8  3 Mar 2010 15:05:38 -   1.22
+++ fsck_ffs.8  11 Feb 2013 16:50:13 -
@@ -304,4 +304,5 @@ are fully enumerated and explained in Ap
 .Xr growfs 8 ,
 .Xr mount_ffs 8 ,
 .Xr newfs 8 ,
+.Xr scan_ffs 8 ,
 .Xr rc 8

--
Scott McEachern

https://www.blackstaff.ca



Re: add scan_ffs to fsck and fsck_ffs see also lists

2013-02-11 Thread Jason McIntyre
On Sun, Feb 10, 2013 at 09:42:58PM -0500, Scott McEachern wrote:
 I think these might be helpful:
 

i've just committed this. note (for future diffs ;) scan_ffs should be
listed after rc.

jmc

 --- fsck.8.orig Sun Feb 10 21:34:32 2013
 +++ fsck.8  Sun Feb 10 21:37:48 2013
 @@ -176,4 +176,5 @@ file system table
  .Xr growfs 8 ,
  .Xr mount 8 ,
  .Xr newfs 8 ,
 +.Xr scan_ffs 8 ,
  .Xr rc 8
 
 --- fsck_ffs.8.orig Sun Feb 10 21:32:34 2013
 +++ fsck_ffs.8  Sun Feb 10 21:39:17 2013
 @@ -304,4 +304,5 @@ are fully enumerated and explained in Appendix A of
  .Xr growfs 8 ,
  .Xr mount_ffs 8 ,
  .Xr newfs 8 ,
 +.Xr scan_ffs 8 ,
  .Xr rc 8
 
 -- 
 Scott McEachern
 
 https://www.blackstaff.ca
 



Re: faithd fcntl diff

2013-02-11 Thread Bob Beck


On Mon, Feb 11, 2013 at 05:00:08PM +0100, Mark Kettenis wrote:
  Date: Mon, 11 Feb 2013 00:05:29 -0600
  From: Todd T. Fries t...@fries.net
  
  In light of nat64 in pf(4), what purpose does faithd(8) serve anymore?
  
  I played with it a bit over a decade ago, but don't recall having any use
  for it in the last number of years.
  
  I vote it gets tedu'ed.
 
 I fear it's too late in the game to do that now.
 
 Bring this up again after unlock.  Meanwhile, perhaps that bug (if it
 really is a bug) should be fixed?

yeah, I'd probably shy away from tedu'ing it at this late stage
in the release cycle - make sure it's adequate for release, and then
get your inner ted out as soon as the tree unlocks after release...



Re: usermod: lock/unlock local password

2013-02-11 Thread André Stöbe
Antoine Jacoutot wrote:
 This diff adds 2 new options to usermod(8):
 -U to unlock a user's password
 -Z to lock a user's password

Today I was working with these two switches and really got confused.
I've tested the following with snapshots from Jan 11 and 5.3-beta.

I've got a user with 13 asterisks in the password field as described in
passwd(5):
test:*:1002:1002::0:0:,,,:/home/test:/bin/ksh

After locking the account with usermod -Z test:
test:*:1002:1002::0:0:,,,:/home/test:/bin/ksh-

After unlocking the account with usermod -U test:
test::1002:1002::0:0:,,,:/home/test:/bin

1) The login shell is broken.
2) The password field consists of 12 asterisks. I'd expect it to be just
the same as it was before unlocking the account. This propably makes
security(8) complain, and more importantly, it never adds an asterisk
when locking but always removes an asterisk when unlocking, so the
account would be accessible without a password after some lock-unlock
cycles (at least the shell is still broken):
test::1002:1002::0:0:,,,:/home/test:/bin

Can't tell if this problem relates to users with normal password
authentication. I did only test users with 13 asterisks in the password
field.

Regards
André



Re: usermod: lock/unlock local password

2013-02-11 Thread Antoine Jacoutot
On Mon, Feb 11, 2013 at 10:11:25PM +0100, André Stöbe wrote:
 Antoine Jacoutot wrote:
  This diff adds 2 new options to usermod(8):
  -U to unlock a user's password
  -Z to lock a user's password
 
 Today I was working with these two switches and really got confused.
 I've tested the following with snapshots from Jan 11 and 5.3-beta.
 
 I've got a user with 13 asterisks in the password field as described in
 passwd(5):
 test:*:1002:1002::0:0:,,,:/home/test:/bin/ksh
 
 After locking the account with usermod -Z test:
 test:*:1002:1002::0:0:,,,:/home/test:/bin/ksh-
 
 After unlocking the account with usermod -U test:
 test::1002:1002::0:0:,,,:/home/test:/bin
 
 1) The login shell is broken.
 2) The password field consists of 12 asterisks. I'd expect it to be just
 the same as it was before unlocking the account. This propably makes
 security(8) complain, and more importantly, it never adds an asterisk
 when locking but always removes an asterisk when unlocking, so the
 account would be accessible without a password after some lock-unlock
 cycles (at least the shell is still broken):
 test::1002:1002::0:0:,,,:/home/test:/bin
 
 Can't tell if this problem relates to users with normal password
 authentication. I did only test users with 13 asterisks in the password
 field.

I'll have a look.

-- 
Antoine



Re: usermod: lock/unlock local password

2013-02-11 Thread Jiri B
On Mon, Feb 11, 2013 at 10:57:46PM +0100, Antoine Jacoutot wrote:
 On Mon, Feb 11, 2013 at 10:11:25PM +0100, André Stöbe wrote:
  Antoine Jacoutot wrote:
   This diff adds 2 new options to usermod(8):
   -U to unlock a user's password
   -Z to lock a user's password
  
  Today I was working with these two switches and really got confused.
  I've tested the following with snapshots from Jan 11 and 5.3-beta.
  
  I've got a user with 13 asterisks in the password field as described in
  passwd(5):
  test:*:1002:1002::0:0:,,,:/home/test:/bin/ksh
  
  After locking the account with usermod -Z test:
  test:*:1002:1002::0:0:,,,:/home/test:/bin/ksh-
  
  After unlocking the account with usermod -U test:
  test::1002:1002::0:0:,,,:/home/test:/bin
  
  1) The login shell is broken.
  2) The password field consists of 12 asterisks. I'd expect it to be just
  the same as it was before unlocking the account. This propably makes
  security(8) complain, and more importantly, it never adds an asterisk
  when locking but always removes an asterisk when unlocking, so the
  account would be accessible without a password after some lock-unlock
  cycles (at least the shell is still broken):
  test::1002:1002::0:0:,,,:/home/test:/bin
  
  Can't tell if this problem relates to users with normal password
  authentication. I did only test users with 13 asterisks in the password
  field.
 
 I'll have a look.

OK, I was reading passwd(5) and now I'm asking myself - why the hell do
daemons from ports have 13 asterisks in password field (base daemons just
have single asterisk)?

_tor:*:566:566:daemon:0:0:tor:/nonexistent:/sbin/nologin

This is obviously not intended to be an account for logging in even via
some other authentication methods.

jirib



Re: Detect on-die temp sensor for Atom E6xx on amd64

2013-02-11 Thread Kurt Miller
On Wednesday 30 January 2013 3:49:34 am Mark Kettenis wrote:
  Date: Tue, 29 Jan 2013 17:35:13 -0500
  From: Matt Dainty m...@bodgit-n-scarper.com
  
  * Christian Weisgerber na...@mips.inka.de [2013-01-24 13:03:43]:
   I think it's dubious that we match the CPU brand name for this at
   all.  Shouldn't this be properly handled with CPUID?
  
  Here's a slightly simpler diff that checks the vendor rather than the
  CPU brand.
  
  I'm not sure if it's safe to check CPUID regardless of vendor, plus
  there is the CLFLUSH code in that block as well, I figure that's
  confined to Intel for a reason?
 
 Look at the equivalent i386 code.

Looking at the the equivalent i386 code shows that ci_cflushsz is
only set when the vendor is Intel and the cpu features has CFLUSH
set. Also core update sensors are only checked when vendor is
Intel and cpuid_level = 0x06. The following diff changes amd64
to follow these rules, allows the Atom E6XX sensors to attach and
brings amd64 closer to i386 for these items.

-Kurt

Index: sys/arch/amd64/amd64/identcpu.c
===
RCS file: /cvs/src/sys/arch/amd64/amd64/identcpu.c,v
retrieving revision 1.43
diff -u -p -r1.43 identcpu.c
--- sys/arch/amd64/amd64/identcpu.c 10 Nov 2012 09:45:05 -  1.43
+++ sys/arch/amd64/amd64/identcpu.c 12 Feb 2013 04:21:35 -
@@ -506,20 +506,24 @@ identifycpu(struct cpu_info *ci)
if (ci-ci_feature_sefflags  SEFF0EBX_SMAP)
replacesmap();
}
-   if (!strncmp(mycpu_model, Intel, 5)) {
-   u_int32_t cflushsz;
+   if (!strcmp(cpu_vendor, GenuineIntel)) {
+   if (ci-ci_feature_flags  CPUID_CFLUSH) {
+   u_int32_t cflushsz;
 
-   CPUID(0x01, dummy, cflushsz, dummy, dummy);
-   /* cflush cacheline size is equal to bits 15-8 of ebx * 8 */
-   ci-ci_cflushsz = ((cflushsz  8)  0xff) * 8;
-   CPUID(0x06, val, dummy, dummy, dummy);
-   if (val  0x1) {
-   strlcpy(ci-ci_sensordev.xname, ci-ci_dev-dv_xname,
-   sizeof(ci-ci_sensordev.xname));
-   ci-ci_sensor.type = SENSOR_TEMP;
-   sensor_task_register(ci, intelcore_update_sensor, 5);
-   sensor_attach(ci-ci_sensordev, ci-ci_sensor);
-   sensordev_install(ci-ci_sensordev);
+   CPUID(0x01, dummy, cflushsz, dummy, dummy);
+   /* cflush cacheline size is equal to bits 15-8 of ebx * 
8 */
+   ci-ci_cflushsz = ((cflushsz  8)  0xff) * 8;
+   }
+   if (cpuid_level = 0x06) {
+   CPUID(0x06, val, dummy, dummy, dummy);
+   if (val  0x1) {
+   strlcpy(ci-ci_sensordev.xname, 
ci-ci_dev-dv_xname,
+   sizeof(ci-ci_sensordev.xname));
+   ci-ci_sensor.type = SENSOR_TEMP;
+   sensor_task_register(ci, 
intelcore_update_sensor, 5);
+   sensor_attach(ci-ci_sensordev, 
ci-ci_sensor);
+   sensordev_install(ci-ci_sensordev);
+   }
}
}