kern/187443: Impossible clean shutdown

2014-03-11 Thread Bykov Vladislav

>Number: 187443
>Category:   kern
>Synopsis:   Impossible clean shutdown
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Mar 11 11:10:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Bykov Vladislav
>Release:FreeBSD 9.2-RELEASE amd64
>Organization:
>Environment:
Current system: FreeBSD hellgate 9.2-RELEASE FreeBSD 9.2-RELEASE #0 r255898: 
Thu Sep 26 22:50:31 UTC 2013 
r...@bake.isc.freebsd.org:/usr/obj/usr/src/sys/GENERIC  amd64

Tested systems: 9.2-RELEASE, 10, 11-CURRENT

Machine: HP envy 4-1055er

>Description:
Broken ACPI support that causes in impossibility of clean shutdown (S5).

When entering ACPI S5 state everything goes okay, but the last part: turning 
off the power.

Mar 11 14:44:09 hellgate kernel: usbus2: Controller shutdown complete
Mar 11 14:44:09 hellgate kernel: ACPI Error: No handler for Region [RCM0] 
(0xfe0002b15900) [SystemCMOS] (20110527/evregion-421)
Mar 11 14:44:09 hellgate kernel: ACPI Error: Region SystemCMOS (ID=5) has no 
handler (20110527/exfldio-310)
Mar 11 14:44:09 hellgate kernel: ACPI Error: Method parse/execution failed 
[\_SB_.WMID.ESDT] (Node 0xfe0002af5800), AE_NOT_EXIST (20110527/psparse-560)
Mar 11 14:44:09 hellgate kernel: ACPI Error: Method parse/execution failed 
[\_PTS] (Node 0xfe0002af86c0), AE_NOT_EXIST (20110527/psparse-560)
Mar 11 14:44:09 hellgate kernel: acpi0: AcpiEnterSleepStatePrep failed - 
AE_NOT_EXIST
Mar 11 14:44:09 hellgate kernel: Rebooting...
>How-To-Repeat:
Entering in ACPI S5 state.
>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


kern/187451: Some vlans in bride + carp result hung server

2014-03-11 Thread Yuriy Tsilyk

>Number: 187451
>Category:   kern
>Synopsis:   Some vlans in bride + carp result hung server
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Mar 11 15:20:02 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Yuriy Tsilyk
>Release:RELEASE 10.0
>Organization:
Lantrace
>Environment:
FreeBSD olimp.lantrace.net 10.0-RELEASE FreeBSD 10.0-RELEASE #10 r262714: Tue 
Mar  4 14:31:52 EET 2014 
r...@olimp.lantrace.net:/usr/obj/usr/src/sys/olimpkernel  amd64
>Description:
On two servers (different hardware) created vlans 217-227 on Ethernet 
interfaces.
Servers connect via switch.
Vlans added in bridge.
On the bridge created carp option.
Client PC connected to servers in vlan 217.
Carp works fine. 
When client generate some traffic (something like ping) to Server the system 
hung without any log messages. 
>How-To-Repeat:
In server 1 setings /etc/rc.conf:
cloned_interfaces="vlan217 \
vlan218 \
vlan219 \
vlan220 \
vlan221 \
vlan222 \
vlan223 \
vlan224 \
vlan225 \
vlan226 \
vlan227 \
vlan500 \
bridge0"
internal_if="em0"
ifconfig_vlan217="vlan 217 vlandev ${internal_if}"
ifconfig_vlan218="vlan 218 vlandev ${internal_if}"
ifconfig_vlan219="vlan 219 vlandev ${internal_if}"
ifconfig_vlan220="vlan 220 vlandev ${internal_if}"
ifconfig_vlan221="vlan 221 vlandev ${internal_if}"
ifconfig_vlan222="vlan 222 vlandev ${internal_if}"
ifconfig_vlan223="vlan 223 vlandev ${internal_if}"
ifconfig_vlan224="vlan 224 vlandev ${internal_if}"
ifconfig_vlan225="vlan 225 vlandev ${internal_if}"
ifconfig_vlan226="vlan 226 vlandev ${internal_if}"
ifconfig_vlan227="vlan 227 vlandev ${internal_if}"
ifconfig_bridge0="inet 10.100.15.250 netmask 255.255.240.0 \
 addm vlan217 \
 addm vlan218 \
 addm vlan219 \
 addm vlan220 \
 addm vlan221 \
 addm vlan222 \
 addm vlan223 \
 addm vlan224 \
 addm vlan225 \
 addm vlan226 \
 addm vlan227 "
ifconfig_bridge0_alias0="inet vhid 202 pass password advbase 4 advskew 90 
10.100.15.254/32 add"

In server 2 setings /etc/rc.conf:
cloned_interfaces="vlan217 \
vlan218 \
vlan219 \
vlan220 \
vlan221 \
vlan222 \
vlan223 \
vlan224 \
vlan225 \
vlan226 \
vlan227 \
vlan500 \
bridge0"
internal_if="igb1"
ifconfig_vlan217="vlan 217 vlandev ${internal_if}"
ifconfig_vlan218="vlan 218 vlandev ${internal_if}"
ifconfig_vlan219="vlan 219 vlandev ${internal_if}"
ifconfig_vlan220="vlan 220 vlandev ${internal_if}"
ifconfig_vlan221="vlan 221 vlandev ${internal_if}"
ifconfig_vlan222="vlan 222 vlandev ${internal_if}"
ifconfig_vlan223="vlan 223 vlandev ${internal_if}"
ifconfig_vlan224="vlan 224 vlandev ${internal_if}"
ifconfig_vlan225="vlan 225 vlandev ${internal_if}"
ifconfig_vlan226="vlan 226 vlandev ${internal_if}"
ifconfig_vlan227="vlan 227 vlandev ${internal_if}"
ifconfig_bridge0="inet 10.100.15.251 netmask 255.255.240.0 \
 addm vlan217 \
 addm vlan218 \
 addm vlan219 \
 addm vlan220 \
 addm vlan221 \
 addm vlan222 \
 addm vlan223 \
 addm vlan224 \
 addm vlan225 \
 addm vlan226 \
 addm vlan227 "
ifconfig_bridge0_alias0="inet vhid 202 pass password advbase 2 advskew 50 
10.100.15.254/32 add"

In client PC setings:
IP: 10.100.0.100
Netmask: 255.255.240.0
Generate some traffic several minutes:
ping 10.100.15.254

>Fix:
do not know

>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/183666: Compiled-in bxe(4) breaks kgzip(1) kernel

2014-03-11 Thread edavis
Synopsis: Compiled-in bxe(4) breaks kgzip(1) kernel

State-Changed-From-To: open->analyzed
State-Changed-By: edavis
State-Changed-When: Tue Mar 11 18:33:31 UTC 2014
State-Changed-Why: 

The bxe driver has been re-written and committed. This new
driver contains support for many new devices thereby adding
a couple more very large firmware blob arrays embedded in
the driver.

bxe need to be modified to support the firmware(9) interface.


http://www.freebsd.org/cgi/query-pr.cgi?pr=183666
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/183666: Compiled-in bxe(4) breaks kgzip(1) kernel

2014-03-11 Thread edavis
Synopsis: Compiled-in bxe(4) breaks kgzip(1) kernel

Responsible-Changed-From-To: freebsd-bugs->freebsd-net
Responsible-Changed-By: edavis
Responsible-Changed-When: Tue Mar 11 18:38:38 UTC 2014
Responsible-Changed-Why: 

changed responsible to -net


http://www.freebsd.org/cgi/query-pr.cgi?pr=183666
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


RE: kern/185876: ipfw not matching incoming packets decapsulating ipsec. example l2tp/ipsec

2014-03-11 Thread Robert Sevat
Hey,

First off all, thanks for the patch, should we wait for FreeBSD 10.1, use 
10.0/stable or patch it our selves?

Or is this going to be issued as Errata patch for FreeBSD 10.0-Release? (which 
I think it should be)

Kind Regards,
Robert Sevat


> Subject: Re: kern/185876: ipfw not matching incoming packets decapsulating 
> ipsec. example l2tp/ipsec
> From: nico...@deffayet.com
> To: gamana...@gmail.com
> Date: Fri, 28 Feb 2014 23:36:44 +0100
> CC: an...@freebsd.org; melif...@freebsd.org; a.v.volob...@gmail.com; 
> freebsd-bugs@freebsd.org; bug-follo...@freebsd.org
> 
> The following patch seem to be the only working workaround for IPsec
> transport mode and tunnel mode. Please note the use of M_PROTO7 instead
> of M_PROTO5 as that is not used in netinet & netinet6. M_PROTO5 is used
> for another purpose and so using it may create a conflict like M_PROTO3.
> 
> ---
> Index: netinet/ip_var.h
> ===
> --- netinet/ip_var.h(revision 262470)
> +++ netinet/ip_var.h(working copy)
> @@ -167,7 +167,7 @@
>   */
> #defineM_FASTFWD_OURS  M_PROTO1/* changed dst to
> local */
> #defineM_IP_NEXTHOPM_PROTO2/* explicit ip
> nexthop */
> -#defineM_SKIP_FIREWALL M_PROTO3/* skip firewall
> processing,
> +#defineM_SKIP_FIREWALL M_PROTO7/* skip firewall
> processing,
>keep in sync with IP6
> */
> #defineM_IP_FRAG   M_PROTO4/* fragment
> reassembly */
> 
> Index: netinet6/ip6_var.h
> ===
> --- netinet6/ip6_var.h  (revision 262470)
> +++ netinet6/ip6_var.h  (working copy)
> @@ -297,7 +297,7 @@
>   * IPv6 protocol layer specific mbuf flags.
>   */
> #defineM_IP6_NEXTHOP   M_PROTO2/* explicit ip
> nexthop */
> -#defineM_SKIP_FIREWALL M_PROTO3/* skip firewall
> processing,
> +#defineM_SKIP_FIREWALL M_PROTO7/* skip firewall
> processing,
>keep in sync with
> IPv4 */
> 
> #ifdef __NO_STRICT_ALIGNMENT
> ---
> 
> 
> -- 
> Nicolas DEFFAYET
> 
> ___
> freebsd-bugs@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
> To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
  
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/185876: ipfw not matching incoming packets decapsulating ipsec. example l2tp/ipsec

2014-03-11 Thread Georgios Amanakis
Glebius is working on a patch. I hope it will be commited soon to stable.


On Tue, Mar 11, 2014 at 7:57 PM, Robert Sevat  wrote:

> Hey,
>
> First off all, thanks for the patch, should we wait for FreeBSD 10.1, use
> 10.0/stable or patch it our selves?
>
> Or is this going to be issued as Errata patch for FreeBSD 10.0-Release?
> (which I think it should be)
>
> Kind Regards,
> Robert Sevat
>
>
> > Subject: Re: kern/185876: ipfw not matching incoming packets
> decapsulating ipsec. example l2tp/ipsec
> > From: nico...@deffayet.com
> > To: gamana...@gmail.com
> > Date: Fri, 28 Feb 2014 23:36:44 +0100
> > CC: an...@freebsd.org; melif...@freebsd.org; a.v.volob...@gmail.com;
> freebsd-bugs@freebsd.org; bug-follo...@freebsd.org
>
> >
> > The following patch seem to be the only working workaround for IPsec
> > transport mode and tunnel mode. Please note the use of M_PROTO7 instead
> > of M_PROTO5 as that is not used in netinet & netinet6. M_PROTO5 is used
> > for another purpose and so using it may create a conflict like M_PROTO3.
> >
> > ---
> > Index: netinet/ip_var.h
> > ===
> > --- netinet/ip_var.h (revision 262470)
> > +++ netinet/ip_var.h (working copy)
> > @@ -167,7 +167,7 @@
> > */
> > #define M_FASTFWD_OURS M_PROTO1 /* changed dst to
> > local */
> > #define M_IP_NEXTHOP M_PROTO2 /* explicit ip
> > nexthop */
> > -#define M_SKIP_FIREWALL M_PROTO3 /* skip firewall
> > processing,
> > +#define M_SKIP_FIREWALL M_PROTO7 /* skip firewall
> > processing,
> > keep in sync with IP6
> > */
> > #define M_IP_FRAG M_PROTO4 /* fragment
> > reassembly */
> >
> > Index: netinet6/ip6_var.h
> > ===
> > --- netinet6/ip6_var.h (revision 262470)
> > +++ netinet6/ip6_var.h (working copy)
> > @@ -297,7 +297,7 @@
> > * IPv6 protocol layer specific mbuf flags.
> > */
> > #define M_IP6_NEXTHOP M_PROTO2 /* explicit ip
> > nexthop */
> > -#define M_SKIP_FIREWALL M_PROTO3 /* skip firewall
> > processing,
> > +#define M_SKIP_FIREWALL M_PROTO7 /* skip firewall
> > processing,
> > keep in sync with
> > IPv4 */
> >
> > #ifdef __NO_STRICT_ALIGNMENT
> > ---
> >
> >
> > --
> > Nicolas DEFFAYET
> >
> > ___
> > freebsd-bugs@freebsd.org mailing list
> > http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
> > To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
>
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


conf/187457: ifconfig IP range assignment too restrictive

2014-03-11 Thread Adam McDougall

>Number: 187457
>Category:   conf
>Synopsis:   ifconfig IP range assignment too restrictive
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  change-request
>Submitter-Id:   current-users
>Arrival-Date:   Tue Mar 11 22:10:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Adam McDougall
>Release:FreeBSD 10.0-STABLE
>Organization:
>Environment:
FreeBSD build10 10.0-STABLE FreeBSD 10.0-STABLE #0 r262298: Fri Feb 21 18:28:26 
EST 2014 root@build10:/usr/obj/usr/src/sys/BUILD10  amd64
>Description:
Recently I came up with the need to assign almost every IP in a /24 subnet to 
an interface.  I wanted to avoid 250+ lines in /etc/rc.conf so I read the 
rc.conf manpage and discovered the wonderful range feature where I thought I 
could use:
ifconfig_lagg0_alias0="inet 10.0.30.2-254/24"
I found out it only creates addresses up to around .34 and prints "Range 
specification is too large", all as an anti foot-shooting protection due to 
_IPEXPANDMAX=31 in /etc/network.subr.  Could the code be changed to allow for 
example a whole /24 to be created with a single range?

Looking at SVN, this appears to apply to 9 as well.

Workaround: define a bunch of smaller ranges:
ifconfig_lagg0_aliases="inet 10.0.30.2-31/24 inet 10.0.30.32-63/32 \
inet  etc etc"

>How-To-Repeat:
Try to set a large range in /etc/rc.conf and reboot.
ifconfig_interfacename0="up"
ifconfig_interfacename0_alias0="inet 10.0.30.2-254/24"
>Fix:
Raise _IPEXPANDMAX=31 in network.subr?  Untested but seems logical since the 
only apparent purpose is to prevent accidental misconfiguration.  It is easy to 
see if the range is defined too large then it might make a poor choice 
regarding broadcast IPs, oversized netmasks or something.  I didn't check 
exactly how many IPs it assigned, it should be near 32.  I was in a rush and 
had to settle for a workaround that evening.

>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


bin/187458: sysrc silently and unexpectedly bootstraps pkg

2014-03-11 Thread Adam McDougall

>Number: 187458
>Category:   bin
>Synopsis:   sysrc silently and unexpectedly bootstraps pkg
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Mar 11 22:40:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Adam McDougall
>Release:10.0-STABLE
>Organization:
>Environment:
FreeBSD build10 10.0-STABLE FreeBSD 10.0-STABLE #0 r262298: Fri Feb 21 18:28:26 
EST 2014 root@build10:/usr/obj/usr/src/sys/BUILD10  amd64
>Description:
Recently I began setting up some fresh FreeBSD installs and I used sysrc to 
enable some services in /etc/rc.conf that I would use later on.  From a fresh 
install, I have no ports or packages installed.  A few steps later I ran 'pkg 
bootstrap' and it told me pkg was already installed.  Huh?  The first time I 
thought I was crazy, the second time I tracked it down.  When sysrc runs, it 
runs some subroutines from /usr/share/bsdconfig/common.subr which runs  
"ASSUME_ALWAYS_YES=1 pkg -vv" which will bootstrap pkg silently if it can, 
because it is not installed and it was told to assume yes.  In my environment, 
the end result is not problematic but it is confusing and very unexpected, 
especially the brief delay during the first execution while it bootstraps.
>How-To-Repeat:
on a system without pkg installed but with sysrc, run:

script output.log sh -x `which sysrc` test=yes

In output.log you'll see sysrc call /usr/share/bsdconfig/common.subr which runs 
"ASSUME_ALWAYS_YES=1 pkg -vv"   which will bootstrap pkg silently.

to check status, but if pkg is not already bootstrapped, it will silently 
attempt to and continue on after a short delay if it succeeds.
>Fix:
No specific fix suggestion.  If there is a way to check if pkg is actually 
installed and not just the /usr/sbin/pkg stub, maybe the full 
"ASSUME_ALWAYS_YES=1 pkg -vv" execution could be avoided.  Checking for 
/usr/local/sbin/pkg may be insufficient if some has it in a custom path.

>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: bin/186793: fsck_ffs/ufs segmentation violation in SU J mode on SIGINT before check cycle

2014-03-11 Thread Oleg Ginzburg
The following reply was made to PR bin/186793; it has been noted by GNATS.

From: Oleg Ginzburg 
To: bug-follo...@freebsd.org, olev...@olevole.ru, Petr Lampa 
, mckus...@freebsd.org
Cc:  
Subject: Re: bin/186793: fsck_ffs/ufs segmentation violation in SU J mode on 
SIGINT before check cycle
Date: Wed, 12 Mar 2014 05:43:47 +0400

 Please close this PR due to r263062 / PR187221 solve this issue.
 
 
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


bin/187461: sysrc mishandles variable names containing a dot

2014-03-11 Thread Adam McDougall

>Number: 187461
>Category:   bin
>Synopsis:   sysrc mishandles variable names containing a dot
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Mar 11 23:10:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Adam McDougall
>Release:FreeBSD 10.0-STABLE
>Organization:
>Environment:
FreeBSD build10 10.0-STABLE FreeBSD 10.0-STABLE #0 r262298: Fri Feb 21 18:28:26 
EST 2014 root@build10:/usr/obj/usr/src/sys/BUILD10  amd64
>Description:
Recently I was trying to convert some "echo a.b.c=1 > /etc/sysctl.conf" type 
statements to use sysrc instead.  It appears if the variable contains one or 
more dots, sysrc will write the desired value, fail to read it, and it will 
always create a new entry if executed again.  This is inconvenient for editing 
values in /etc/sysctl.conf using the -f parameter because such entries almost 
always have a dot in the variable.

sysrc -f /etc/sysctl.conf

Symptoms are present on FreeBSD 9 too.
>How-To-Repeat:
root@build10:~ # grep a.b /etc/rc.conf
root@build10:~ # sysrc a.b=yes
a.b:  -> 
root@build10:~ # grep a.b /etc/rc.conf
a.b="yes"
root@build10:~ # sysrc a.b=yes
a.b:  -> 
root@build10:~ # grep a.b /etc/rc.conf
a.b="yes"
a.b="yes"

>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: bin/187461: sysrc mishandles variable names containing a dot

2014-03-11 Thread eadler
Synopsis: sysrc mishandles variable names containing a dot

Responsible-Changed-From-To: freebsd-bugs->dteske
Responsible-Changed-By: eadler
Responsible-Changed-When: Wed Mar 12 00:36:24 UTC 2014
Responsible-Changed-Why: 
Over to maintainer.

http://www.freebsd.org/cgi/query-pr.cgi?pr=187461
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: bin/187458: sysrc silently and unexpectedly bootstraps pkg

2014-03-11 Thread eadler
Synopsis: sysrc silently and unexpectedly bootstraps pkg

Responsible-Changed-From-To: freebsd-bugs->dteske
Responsible-Changed-By: eadler
Responsible-Changed-When: Tue Mar 11 23:07:09 UTC 2014
Responsible-Changed-Why: 
Over to maintainer.

http://www.freebsd.org/cgi/query-pr.cgi?pr=187458
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


bin/187470: [patch] Apple Wireless Keyboard (JIS)

2014-03-11 Thread Yuichiro NAITO

>Number: 187470
>Category:   bin
>Synopsis:   [patch] Apple Wireless Keyboard (JIS)
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  change-request
>Submitter-Id:   current-users
>Arrival-Date:   Wed Mar 12 02:30:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Yuichiro NAITO
>Release:FreeBSD 10.0-Release
>Organization:
>Environment:
FreeBSD pluto.local 10.0-RELEASE FreeBSD 10.0-RELEASE #0 r262241: Tue Feb 25 
13:52:12 JST 2014 root@pluto.local:/usr/obj/usr/src/sys/SLIM  amd64
>Description:
I'm using Apple Wireless Keyboard (JIS) for FreeBSD 10.0-R on amd64 machine.
This keyboard has "Kana" and "Eisu" keys that turns on/off input method.

I made a patch to handle these keys by bthidd (bluetooth hid daemon).

Usually "Zenkaku-Hankaku" key is used to toggle input method.
But Apple designed "Kana" key enables input method, and
"Eisu" key disables input method, and 
lost "Zenkaku-Hankaku" key.

This patch enables to send these key events to Xorg kbd driver.

>How-To-Repeat:
Using Apple Wireless Keyboard (JIS) on FreeBSD 10.0-R box.

>Fix:
Apply this patch.


Patch attached with submission follows:

diff --git usr.sbin/bluetooth/bthidd/kbd.c usr.sbin/bluetooth/bthidd/kbd.c
index 3e944f0..0b66b64 100644
--- usr.sbin/bluetooth/bthidd/kbd.c
+++ usr.sbin/bluetooth/bthidd/kbd.c
@@ -225,8 +225,8 @@ static int32_t constx[] =
 /* Keyboard Int'l 7 8D */ -1,   /* Unassigned */
 /* Keyboard Int'l 8 8E */ -1,   /* Unassigned */
 /* Keyboard Int'l 9 8F */ -1,   /* Unassigned */
-/* Keyboard Lang 1  90 */ NOBREAK|0xF2, /* None */
-/* Keyboard Lang 2  91 */ NOBREAK|0xF1, /* None */
+/* Keyboard Lang 1  90 */ 0x71, /* eisu */
+/* Keyboard Lang 2  91 */ 0x72, /* kana */
 /* Keyboard Lang 3  92 */ 0x78, /* F8 */
 /* Keyboard Lang 4  93 */ 0x77, /* F7 */
 /* Keyboard Lang 5  94 */ 0x76, /* F6 */


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"