[Bug 267871] /usr/bin/rs compile fails after udate to c++

2022-11-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=267871

Herbert J. Skuhra  changed:

   What|Removed |Added

 CC||herb...@gojira.at

--- Comment #1 from Herbert J. Skuhra  ---
Is your src checkout in sync and clean? What's the output of 

git rev-parse HEAD
git status
git diff

in src? uname -a?

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 266879] fusefs, net/glusterfs: GlusterFS mount not handled as expected

2022-11-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=266879

--- Comment #26 from Alan Somers  ---
(In reply to David from comment #25)
As I explained before, you can do it by setting vfs.fusefs.data_cache_mode=0. 
But that only works for fusefs daemons using protocol level 7.22 or below.  For
higher protocol levels, the daemon must do it itself.

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 267871] /usr/bin/rs compile fails after udate to c++

2022-11-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=267871

--- Comment #2 from rkober...@gmail.com ---
(In reply to Herbert J. Skuhra from comment #1)
# git rev-parse HEAD
424bf1d5ca5bdba0597b546ec3931eb05bfabcab
# git status
On branch main
Your branch is up to date with 'origin/main'.

nothing to commit, working tree clean
# git diff
#

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 266145] [Intel Alder Lake] Crashes on CURRENT vfs

2022-11-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=266145

Konstantin Belousov  changed:

   What|Removed |Added

 CC||k...@freebsd.org

--- Comment #9 from Konstantin Belousov  ---
Created attachment 238192
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=238192&action=edit
Current experimental workaround

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 267871] /usr/bin/rs compile fails after udate to c++

2022-11-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=267871

--- Comment #3 from Herbert J. Skuhra  ---
Do you build with NO_CLEAN/WITHOUT_CLEAN?

Does it work if you run:

cd /usr/src/usr.bin/rs
make cleandir

or wipe /usr/obj?

Here it works:

--- rs.o ---
c++  -target x86_64-unknown-freebsd14.0
--sysroot=/usr/obj/usr/src/amd64.amd64/tmp
-B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin  -O2 -pipe -fno-common -fPIE
-mretpoline -MD -MF.depend.rs.o -MTrs.o -Wno-format-zero-length
-fstack-protector-strong -Wsystem-headers -Werror -Wall -Wno-format-y2k -W
-Wno-unused-parameter -Wpointer-arith -Wreturn-type -Wcast-qual -Wwrite-strings
-Wswitch -Wshadow -Wunused-parameter -Wcast-align -Wchar-subscripts
-Wmissing-variable-declarations -Wthread-safety -Wno-empty-body
-Wno-string-plus-int -Wno-unused-const-variable
-Wno-error=unused-but-set-variable -Qunused-arguments  -fPIE -mretpoline   
-Wno-c++11-extensions   -c /usr/src/usr.bin/rs/rs.cc -o rs.o

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 267871] /usr/bin/rs compile fails after udate to c++

2022-11-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=267871

--- Comment #4 from rkober...@gmail.com ---
(In reply to Herbert J. Skuhra from comment #3)
Build was "nice make -j12 buildworld" Did not delete existing /usr/obj.

Since last update on 11/8, I just did:
# git pull --ff-only
# nice make -j12 buildworld

Today, after cleandir in usr.bin/rs, I did:
# make -j12 -DNO_CLEAN buildworld

This completed successfully. No idea what the cleandir did, bur some depend or
config file must have survived the cleaning in the initial buildworld.

Unless there are additional reports in the next day or two, I'll close the
ticket.

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 259090] UFS: bad file descriptor: soft update journaling can not be enabled on some FreeBSD-provided disk images – failed to write updated cg

2022-11-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=259090

--- Comment #12 from commit-h...@freebsd.org ---
A commit in branch stable/13 references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=bca262f0f351e3881d478b7a9764c91ccb83c260

commit bca262f0f351e3881d478b7a9764c91ccb83c260
Author: Kirk McKusick 
AuthorDate: 2022-11-12 23:36:07 +
Commit: Kirk McKusick 
CommitDate: 2022-11-20 17:13:49 +

Fix for tunefs(8) unable to add a UFS/FFS soft update journal.

The reported bug is UFS: bad file descriptor: soft update journaling
can not be enabled on some FreeBSD-provided disk images – failed
to write updated cg.

The UFS library (libufs(3)) failed to reopen its disk descriptor
when first attempting to update a cylinder group. The error only
occurred when trying to add journaling to a filesystem whose first
cylinder group was too full to hold the journal.

PR:   259090
MFC after:1 week
Sponsored by: The FreeBSD Foundation

(cherry picked from commit 5c7ba6bdf83fda82cce70f384e2ec8218f13002e)

 lib/libufs/cgroup.c | 4 
 1 file changed, 4 insertions(+)

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 267654] UFS "cylinder checksum failed" on temporary storage or data disk on arm64 vm in Azure

2022-11-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=267654

--- Comment #11 from Kirk McKusick  ---
I do not have any better idea than the debugging idea that you are suggesting.
Of interest is verifying that the seek offset is correct and that the checksum
of what is written and what ends up on the disk match. Note that the checksum
is being calculated and the block written in the libufs routine
lib/libufs/cgroup.c. See functions cgwrite(), cgwrite1(), and where the work is
actually done cgput().

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 266145] [Intel Alder Lake] Crashes on CURRENT vfs

2022-11-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=266145

--- Comment #10 from rkober...@gmail.com ---
Can I assume that, with this patch, I should re-enable PCID?

Building new kernel now. Will report any issues I see.

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 259090] UFS: bad file descriptor: soft update journaling can not be enabled on some FreeBSD-provided disk images – failed to write updated cg

2022-11-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=259090

Kirk McKusick  changed:

   What|Removed |Added

 Resolution|--- |FIXED
 Status|In Progress |Closed

--- Comment #13 from Kirk McKusick  ---
Has been MFC'ed to 13.

Not relevant to 12.

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 102502] [netgraph] [patch] ifconfig name does't rename netgraph node in network.subr

2022-11-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=102502

Aleksandr Fedorov  changed:

   What|Removed |Added

 CC||afedo...@freebsd.org

--- Comment #7 from Aleksandr Fedorov  ---
I think thi bug should be closed.

root@xenon:/home/XeNoN # ifconfig tap create
tap0
root@xenon:/home/XeNoN # ngctl ls
There are 5 total nodes:
  Name: ngeth0  Type: eiface  ID: 0002   Num hooks: 1
  Name: ngeth1  Type: eiface  ID: 0004   Num hooks: 1
  Name: re0 Type: ether   ID: 0006   Num hooks: 0
  Name: tap0Type: ether   ID: 000a   Num hooks: 0
  Name: ngctl44711  Type: socket  ID: 000b   Num hooks: 0
root@xenon:/home/XeNoN # ifconfig tap0 name renamed0
renamed0
root@xenon:/home/XeNoN # ngctl ls
There are 5 total nodes:
  Name: ngeth0  Type: eiface  ID: 0002   Num hooks: 1
  Name: ngeth1  Type: eiface  ID: 0004   Num hooks: 1
  Name: re0 Type: ether   ID: 0006   Num hooks: 0
  Name: renamed0Type: ether   ID: 000a   Num hooks: 0
  Name: ngctl44841  Type: socket  ID: 000c   Num hooks: 0
root@xenon:/home/XeNoN # 

ng_ether:

*
 * Interface arrival notification handler.
 * The notification is produced in two cases:
 *  o a new interface arrives
 *  o an existing interface got renamed
 * Currently the first case is handled by ng_ether_attach via special
 * hook ng_ether_attach_p.
 */
static void
ng_ether_ifnet_arrival_event(void *arg __unused, struct ifnet *ifp)
{
char name[IFNAMSIZ];
node_p node;

/* Only ethernet interfaces are of interest. */
if (ifp->if_type != IFT_ETHER &&
ifp->if_type != IFT_L2VLAN &&
ifp->if_type != IFT_BRIDGE)
return;

/*
 * Just return if it's a new interface without an ng_ether companion.
 */
node = IFP2NG(ifp);
if (node == NULL)
return;

/* Try to give the node the same name as the new interface name */
ng_ether_sanitize_ifname(ifp->if_xname, name);
if (ng_name_node(node, name) != 0)
log(LOG_WARNING, "%s: can't re-name node %s\n", __func__,
name);
}

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 262492] Update resolv.conf(5) "not necessary" language

2022-11-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=262492

Pau Amma  changed:

   What|Removed |Added

 Status|New |Open
   Assignee|b...@freebsd.org|paua...@freebsd.org

-- 
You are receiving this mail because:
You are the assignee for the bug.


[Bug 267884] kadmind can read beyond the end of an incoming message's buffer

2022-11-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=267884

Bug ID: 267884
   Summary: kadmind can read beyond the end of an incoming
message's buffer
   Product: Base System
   Version: CURRENT
  Hardware: Any
OS: Any
Status: New
  Severity: Affects Some People
  Priority: ---
 Component: bin
  Assignee: b...@freebsd.org
  Reporter: r...@lcs.mit.edu
 Attachment #238198 text/plain
 mime type:

Created attachment 238198
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=238198&action=edit
send a non-null-terminated appl_version to kadmind

kadmind's handle_v5() calls krb_recvauth_match_version(), which
contains:

n = krb5_net_read (context, p_fd, &len, 4);
...;
len = ntohl(len);
her_appl_version = malloc (len);
if (krb5_net_read (context, p_fd, her_appl_version, len) != len
|| !(*match_appl_version)(match_data, her_appl_version)) {
repl = 2;
krb5_net_write (context, p_fd, &repl, 1);
krb5_set_error_message(context, KRB5_SENDAUTH_BADAPPLVERS,
   N_("wrong sendauth version (%s)", ""),
   her_appl_version);

The code does not check that the incoming message in her_appl_version
is null terminated, which can cause trouble for match_appl_version()'s
call to sscanf, and krb5_set_error_message's use of her_apply_version.

This is with CURRENT source from today (Nov 20 2022).

I've attached a demo. Since there's often a null somewhere soon after
the end of the allocated buffer, the problem is only reliably visible
with something like valgrind:

# /usr/libexec/kadmind --version
kadmind (Heimdal 1.5.2)
Copyright 1995-2011 Kungliga Tekniska Högskolan
Send bug-reports to heimdal-b...@h5l.org
# valgrind /usr/libexec/kadmind --debug &
# cc kadmind3a.c
# ./a.out
==67648== Memcheck, a memory error detector
==67648== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al.
==67648== Using Valgrind-3.19.0 and LibVEX; rerun with -h for copyright info
==67648== Command: /usr/libexec/kadmind --debug
==67648== 
==67648== Invalid read of size 1
==67648==at 0x4852EE9: strlen (in
/usr/local/libexec/valgrind/vgpreload_memcheck-amd64-freebsd.so)
==67648==by 0x4A596BC: vsscanf (in /lib/libc.so.7)
==67648==by 0x4A4C72C: sscanf (in /lib/libc.so.7)
==67648==by 0x112677: ??? (in /usr/libexec/kadmind)
==67648==by 0x4907BE6: krb5_recvauth_match_version (in
/usr/lib/libkrb5.so.11)
==67648==by 0x1114CD: ??? (in /usr/libexec/kadmind)
==67648==by 0x112978: ??? (in /usr/libexec/kadmind)
==67648==by 0x10D16C: ??? (in /usr/libexec/kadmind)
==67648==by 0x4823007: ???
==67648==  Address 0x5b463b6 is 0 bytes after a block of size 150 alloc'd
==67648==at 0x484C8A4: malloc (in
/usr/local/libexec/valgrind/vgpreload_memcheck-amd64-freebsd.so)
==67648==by 0x4907BA9: krb5_recvauth_match_version (in
/usr/lib/libkrb5.so.11)
==67648==by 0x1114CD: ??? (in /usr/libexec/kadmind)
==67648==by 0x112978: ??? (in /usr/libexec/kadmind)
==67648==by 0x10D16C: ??? (in /usr/libexec/kadmind)
==67648==by 0x4823007: ???

-- 
You are receiving this mail because:
You are the assignee for the bug.


Problem reports for b...@freebsd.org that need special attention

2022-11-20 Thread bugzilla-noreply
To view an individual PR, use:
  https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=(Bug Id).

The following is a listing of current problems submitted by FreeBSD users,
which need special attention. These represent problem reports covering
all versions including experimental development code and obsolete releases.

Status  |Bug Id | Description
+---+---
New |197876 | [devfs] an error in devfs leads to data loss and  
New |198797 | [PATCH] Added an option to install BSDstats to bs 
New |202362 | ntp: restore refclocks selection (10.2-RELEASE re 
New |202740 | vi/ex string substitution problem when there is m 
New |204097 | witness_initialize() does not perform bound check 
New |206336 | [patch] usr.sbin/freebsd-update allow proxy confi 
New |209213 | UEFI Loader shows only black screen with Nvidia G 
New |210804 | installerconfig - using ZFS create in custom scri 
New |223470 | freebsd-update: Cannot identify running kernel (/ 
New |230620 | "install -d" issue
New |235085 | [PATCH] Option to make rc.d/sysctl more verbose ( 
New |252123 | fetch(3): Fix wrong usage of proxy when request i 
Open|177821 | sysctl: Some security.jail nodes are funky, dupli 
Open|182466 | [headers] [patch] make  self-contained  
Open|183618 | [panic] Dell PowerEdge R620 -- PERC H710 Mini (mf 
Open|192573 | Add ps(1) option: Print process start time in sec 
Open|194925 | [pf] [ifconfig] interface group keywords do not w 
Open|197921 | scheduler: Allow non-migratable threads to bind t 
Open|206528 | Emulex LPe 16002 FC HBA Not Recognized by oce(4)  
Open|206649 | cyapa(4): Add common gestures for Cypress APA I2C 
Open|207940 | stand/efi/boot1: Add boot partition selection 
Open|212608 | sockstat(1) and lsof(8) can not identity the owne 
Open|220246 | syslogd does not send RFC3164-conformant messages 
Open|221305 | Mouse cursor loss when moving cursor while loadin 
Open|221550 | kern.bootfile returns only /kernel on mips64 (ERL 
Open|221854 | makefs: Reject UFS labels that are too long to fi 
Open|226893 | freebsd-update: Support patchlevel argument for f 
Open|231810 | [build] release always fails with "mkimg: partiti 
Open|233578 | Unprivileged local user can prevent other users l 
Open|233988 | freebsd-update: Improve progress output on termin 
Open|236718 | system panics with message: vm_fault_hold: fault  
Open|237287 | moused(8) ignores button release events in virtua 
Open|237924 | Possible infinite loop in function empty_aux_buff 
Open|238183 | cam/scsi/scsi_sa.c: warnings issued by static ana 
Open|238486 | Possible buffer overflow bug in sc_allocate_keybo 
Open|238550 | Touchpad (via SMBus) not working: Synaptics (SYN1 
Open|238638 | mfi: Remove unnecessary pointer printing in mfi.c 
Open|238837 | init: Remove P_SYSTEM flag from PID 1 to allow ea 
Open|241697 | i915kms: Kernel panic loading module on custom ke 
Open|247132 | Fix build error: use of undeclared identifier 'cp 
Open|248352 | mfi(4): Remove RAID map sync functionality
Open|257149 | CFLAGS not passed to whole build  
New |260138 | TPM2 Support in bootloader / kernel in order to r 
New |262957 | mpr(4), mps(4): change formally to formerly   
New |267537 | contrib/nvi: Fix core dump when tags file pattern 
Open|179832 | manual page of mac_from_text suggests incorrect f 

46 problems total for which you should take action.


[Bug 216111] Minor violation of style(9) in hash.h

2022-11-20 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=216111

--- Comment #1 from statistisches_avar...@simplelogin.com ---
Created attachment 238205
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=238205&action=edit
Proposed patch for 216111

-- 
You are receiving this mail because:
You are the assignee for the bug.