Re: Fonts for console/fb for various locales: a proposal

2019-09-30 Thread Piotr Meyer
On Mon, Sep 30, 2019 at 11:01:51AM +0200, tlaro...@polynum.com wrote:
> On Mon, Sep 30, 2019 at 10:32:40AM +0200, Martin Husemann wrote:
> > I guess noone would object a metafont2wsfont converter tool.
> > Look at the true type tool Michael mentioned in xsrc/local and do something
> > similar for metafont.
> 
> I have already planed to re-start with the Hershey fonts, for reasons
> explained in my initial mail and for others and this will be combined
> with TeX (kerTeX). So there will probably be something in this
> line, at the end, even if it is only for my own use.

Sorry for late comment but I would like to suggest mlterm-fb as
- probably - easiest solution for Your case (if I understood problem
correctly, of course). mlterm running in framebuffer console is
capable to use wide range of standard X fonts[1] without hassle.

If You want to convert fonts to wsfont You may take a look at some
additional resources. In addition to already mentioned there is also
my small tool[2], created for my own work for bitmap terminus fonts
(see [3] for gallery) - it isn't useful for converting vectors, but
may provide a hints about your own methods of mapping from UTF codes
or Adobe names to particular code pages (wide range of definitions is
provided by original terminus package, for my case I made only one,
for cp437).

1 - https://www.mail-archive.com/netbsd-users@netbsd.org/msg10136.html
2 - https://github.com/aniou/bdf2wsfont
3 - http://smutek.pl/netbsd/wsfont/terminus/
4 - http://terminus-font.sourceforge.net/

-- 
Piotr 'aniou' Meyer


Re: Removing PF

2019-03-30 Thread Piotr Meyer
On Sat, Mar 30, 2019 at 10:55:23PM +0100, Michael van Elst wrote:

> Have you actually looked at these commits? He changed parts of the
> internal network API and had to adjust PF code to match these changes
> and keep compiling. You could call that 'maintenance' but hardly 'fixed
> real bugs'.
 
Yes, I did. :)

http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/dist/pf/net/pf.c?rev=1.78&content-type=text/x-cvsweb-markup&only_with_tag=MAIN

Regards,
-- 
Piotr 'aniou' Meyer


Re: Removing PF

2019-03-30 Thread Piotr Meyer
On Sat, Mar 30, 2019 at 08:26:23PM +0100, Michael van Elst wrote:
> On Sat, Mar 30, 2019 at 08:10:21PM +0100, Maxime Villard wrote:
> 
> > ... sure, meanwhile you didn't really answer to the core of the issue, which
> > I think was stated clearly by Sevan ...
> 
> The issue is that we need to work on npf before we can drop other code.
> 
> If you care about bugs in pf, open PRs, best with reproducable test
> cases, or just fix the bugs.

There are bugreports already, one with statement related to this
thread (from #50809[1], Feb 2016, three yars ago):

:  We really need to decide what to do with pf and ipf. People keep using
:  them but it seems that the versions in the tree have bit rotted and we
:  get kernel bugs that nobody seems to care about fixing. Particularly
:  in the pf case, the code is really old and should be really updated to
:  the latest pf if we want to maintain this packet filter in the tree.

Although there was conclusions that "NPF is the seemly lack of BRIDGE_IPF"
I found that Mindaugas wrote that it should work[2].

BTW: IMO Maxime's arguments are strengthen by fact that he ALREADY
fixed real bugs in PF, as commit history in [3] shows.

1 - https://gnats.netbsd.org/cgi-bin/query-pr-single.pl?number=50809
2 - https://mail-index.netbsd.org/tech-net/2017/03/23/msg006289.html
3 - http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/dist/pf/net/?only_with_tag=MAIN

Regards,
-- 
Piotr 'aniou' Meyer


Re: Removing PF

2019-03-30 Thread Piotr Meyer
On Sat, Mar 30, 2019 at 12:59:00PM -, Michael van Elst wrote:
> >Just to get the facts straight: NPF has a bigger market share *outside*
> >NetBSD, at least certainly for commercial users.  They also contribute.
> 
> Ironically, the same is also true for PF...

But contributions to PF are made against OpenBSD kernel, true? And the
essence of problem is that:
- NetBSD version of PF is too old to adapt them without ton of work,
- even current PF in OpenBSD doesn't fit very well into MP kernels 
  and that makes "fresh" import cumbersome and fruitless

I'm right?

Regards,
-- 
Piotr 'aniou' Meyer


Re: Removing PF

2019-03-30 Thread Piotr Meyer
On Sat, Mar 30, 2019 at 01:21:27PM +0100, Johnny Billquist wrote:

> Are you saying that NPF is not being updated or supported?
> Should we maybe remove it?
> Having broken code around for 8 years without anyone even much noticing
> (except you maybe) or fixing it would suggest the code is rather rotten, and
> little used.
> 
> Only half a :-) intended.

Do you think that there is any equality between remote-triggered 
crash and lack of specific feature? BTW: you joke makes strong 
argument against PF - there wasn't push for updating NPF features
because they already works in - as we NOW know - buggy and insecure
PF.

PS. Looks like Open, with larger userbase hasn't similar objections 
before pruning cumbersome code.

-- 
Piotr 'aniou' Meyer


Re: kernel frameworks for jumbo frame

2019-03-11 Thread Piotr Meyer
On Sun, Mar 10, 2019 at 08:33:43PM +0100, Gert Doering wrote:
[...]

> On a system that only has one ethernet card, it's highly annoying
> that I have to figure out if this is a "em0" or "igb0" - or an
> "eno1" vs. "enp0s25" (both "onboard ethernet 0", but BIOS tables
> leading udev to believing the second one isn't).  So "eth0, always"
> would be very convenient.  Or possibly "eth0" for "wired ethernet"
> and "wifi0" for wireless - as that's a common scenario.

Nowadays I'm pretty sure that so-called "predictable interface names",
dependent on physical layout of mainboard was a terrible mistake. 
Hardware itself doesn't guarantee consistent and dependable behaviour,
especially between different vendors.

Some examples: onboard ethernet card on my mainboard was identified as
enp0s25 but inserting SERIAL controller (four RS232 ports) into PCIe 
slot lead to renaming onboard interface to... enp16s0. Why? I have no 
clue.

Friend of mine has two-ports Intel card. Internally implemented as two
different PCIe functions and available as... enp0s0f0 and enp0s0f1d1
(but it is subject to change between different kernel versions 8-0).

With a brand-new mobo there is no chance to guess interface name without
test run. Classic Linux behaviour has two possibilities: simply "eth0" 
in any case or interface renaming based on MAC-addresses (fortunately
MAC addr is usually known). BSD names also gives us a chance - usually
we know something about network card manufacturer.

-- 
Piotr 'aniou' Meyer


Re: noatime mounts inhibiting atime updates via utime()

2018-12-05 Thread Piotr Meyer
On Tue, Dec 04, 2018 at 08:23:20PM -0800, Jason Thorpe wrote:
[...]

> Honestly, I think atime is one of the dumbest thing ever.  But if one
> must support it, then I think the following is a reasonable
> compromise:
> 
> -- If one is asked explicitly to set the atime by the user, then by
> all means, go for it.
> 
> -- Implicit atime updates made by the file system should NEVER trigger
> an I/O, but merely update the in-memory copy of the inode.  If, for
> some reason, that inode is pushed out to disk for some other reason,
> then by all means allow the atime field to be updated at the same
> time.

It looks like a behaviour similar to "lazytime", recently introduced 
in Linux, after some years of experiments like "relatime".

A short list of currently known behaviours (in different OS-es):
https://en.wikipedia.org/wiki/Stat_(system_call)#Criticism_of_atime

Regards,
-- 
Piotr 'aniou' Meyer


Re: amd64: svs

2018-01-07 Thread Piotr Meyer
On Sun, Jan 07, 2018 at 12:26:00PM +0900, cl...@csel.org wrote:
[..]

> The Redhat and Microsoft implicitly says "Intel will release microcode
> soon".  I hoped to it.
> 
> the Linux supported by the google goes to the KPTI, maybe,
> it means the Intel does not plan to mitigate by the new microcode.

According to [1] Intel had known about issue for months:

 Variants of this issue are known to affect many modern processors,
 including certain processors by Intel, AMD and ARM. For a few Intel and
 AMD CPU models, we have exploits that work against real software. We
 reported this issue to Intel, AMD and ARM on 2017-06-01 [1].

Lack of already available microcode updates, lack of release dates for
particular cores and that all PR (mis)statements from Intel makes me 
doubt about Intel's will and ability to control situation. Few days
ago even hardware manufacturers, like Cisco[2] wasn't sure about impact
of bug (so - no early disclosure from Intel at all, even for them?).
Today Cisco released additional informations - but take a look at "fix 
release date" for UCS Servers[2]! 


1 - 
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
2 - 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel

-- 
Piotr 'aniou' Meyer


Re: meltdown

2018-01-05 Thread Piotr Meyer
On Fri, Jan 05, 2018 at 02:48:11AM -0600, Dave Huang wrote:
> On Jan 4, 2018, at 15:22, Phil Nelson  wrote:
> > How about turning on the workaround for any process that ignores
> > or catches SEGV.Any process that is terminated by a SEGV should
> > be safe, shouldn't it?
> 
> Isn't there a suggested mitigation? Seems to me NetBSD should implement 
> it as suggested, rather than coming up with its own special criteria 
> for when to enable the workaround.

BTW: latest summary below:

https://security.googleblog.com/2018/01/more-details-about-mitigations-for-cpu_4.html

https://www.theregister.co.uk/2018/01/05/spectre_flaws_explained/

Regards,
-- 
Piotr 'aniou' Meyer