[patch] touch(1) enhancement

2022-01-12 Thread Jamie Landeg-Jones
I've added an option to touch(1) - details here: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=260871 It adds "-R", which is like "-r", but in the case of a link, refers to the link itself. I'm not sure what the protocol is regarding adding "non-standard" options to standard commands, so ple

Re: The kyua in ASAN-built-world reports: the 65 __asan_report_{load4|store8|load8}_noabort examples

2022-01-12 Thread Mark Millard
On 2022-Jan-12, at 14:59, Mark Millard wrote: > # kyua report --verbose | grep _noabort >#7 0x227 in __asan_report_load4_noabort > /usr/main-src/contrib/llvm-project/compiler-rt/lib/asan/asan_rtl.cpp:122:1 >#7 0x63a in __asan_report_store8_noabort > /usr/main-src/contrib/llvm-p

The kyua in ASAN-built-world reports: the 65 __asan_report_{load4|store8|load8}_noabort examples

2022-01-12 Thread Mark Millard
# kyua report --verbose | grep _noabort #7 0x227 in __asan_report_load4_noabort /usr/main-src/contrib/llvm-project/compiler-rt/lib/asan/asan_rtl.cpp:122:1 #7 0x63a in __asan_report_store8_noabort /usr/main-src/contrib/llvm-project/compiler-rt/lib/asan/asan_rtl.cpp:128:1 . . .

Re: kyua run under WITH_ASAN= built world reports a global-buffer-overflow during cpio test.

2022-01-12 Thread Mark Millard
On 2022-Jan-12, at 01:54, Mark Millard wrote: > For the below it appears that the report from UBSAN is accurate. > > ==85511==ERROR: AddressSanitizer: global-buffer-overflow on address > 0x010753ca at pc 0x01139bda bp 0x7fffc2b0 sp 0x7fffc2a8 > READ of size 1 at 0x010753ca t

compressed TIME-WAIT to be decomissioned

2022-01-12 Thread Gleb Smirnoff
Hi! [crossposted to current@, but let's keep discussion at net@] I have already touched the topic with rrs@, jtl@, tuexen@, rscheff@ and Igor Sysoev (author of nginx). Now posting for wider discussion. TLDR: struct tcptw shall be decomissioned Longer version covers three topics: why does tcp

Re: UBSAN report for main [so: 14] /usr/bin/whatis: non-zero (48) and zero offsets from null pointer in qsort.c

2022-01-12 Thread Stefan Esser
Am 12.01.22 um 08:50 schrieb Jan Kokemüller: > On 11.01.22 22:08, Stefan Esser wrote: >> diff --git a/lib/libc/stdlib/qsort.c b/lib/libc/stdlib/qsort.c >> index 5016fff7895f..51c41e802330 100644 >> --- a/lib/libc/stdlib/qsort.c >> +++ b/lib/libc/stdlib/qsort.c >> @@ -108,6 +108,8 @@ local_qsort(voi

Re: UBSAN report for main [so: 14] /usr/bin/whatis: non-zero (48) and zero offsets from null pointer in qsort.c

2022-01-12 Thread Mark Millard
On 2022-Jan-11, at 23:50, Jan Kokemüller wrote: > On 11.01.22 22:08, Stefan Esser wrote: >> diff --git a/lib/libc/stdlib/qsort.c b/lib/libc/stdlib/qsort.c >> index 5016fff7895f..51c41e802330 100644 >> --- a/lib/libc/stdlib/qsort.c >> +++ b/lib/libc/stdlib/qsort.c >> @@ -108,6 +108,8 @@ local_qsor

kyua run under WITH_ASAN= built world reports a global-buffer-overflow during cpio test.

2022-01-12 Thread Mark Millard
For the below it appears that the report from UBSAN is accurate. ==85511==ERROR: AddressSanitizer: global-buffer-overflow on address 0x010753ca at pc 0x01139bda bp 0x7fffc2b0 sp 0x7fffc2a8 READ of size 1 at 0x010753ca thread T0 #0 0x1139bd9 in hexdump /usr/main-src/contri