Automated report: NetBSD-current/i386 build failure
This is an automatically generated notice of a NetBSD-current/i386 build failure. The failure occurred on babylon5.netbsd.org, a NetBSD/amd64 host, using sources from CVS date 2016.04.11.02.04.14. An extract from the build.sh output follows: --- dependall-tests --- #create sys/t_bootblock.d CC=/tmp/bracket/build/2016.04.11.02.04.14-i386/tools/bin/i486--netbsdelf-gcc /tmp/bracket/build/2016.04.11.02.04.14-i386/tools/bin/nbmkdep -f t_bootblock.d.tmp -- -std=gnu99 --sysroot=/tmp/bracket/build/2016.04.11.02.04.14-i386/destdir /tmp/bracket/build/2016.04.11.02.04.14-i386/src/tests/include/sys/t_bootblock.c && mv t_bootblock.d.tmp t_bootblock.d --- dependall-sbin --- In file included from /tmp/bracket/build/2016.04.11.02.04.14-i386/src/sbin/brconfig/brconfig.c:56:0: /tmp/bracket/build/2016.04.11.02.04.14-i386/destdir/usr/include/net/if_bridgevar.h:82:24: fatal error: sys/pslist.h: No such file or directory compilation terminated. nbmkdep: compile failed. --- dependall-crypto/external --- --- ec.d --- --- dependall-sbin --- *** [brconfig.d] Error code 1 nbmake[6]: stopped in /tmp/bracket/build/2016.04.11.02.04.14-i386/src/sbin/brconfig 1 error The following commits were made between the last successful build and the failed build: 2016.04.11.02.04.14 ozaki-r src/sys/net/bridgestp.c,v 1.20 2016.04.11.02.04.14 ozaki-r src/sys/net/if_bridge.c,v 1.112 2016.04.11.02.04.14 ozaki-r src/sys/net/if_bridgevar.h,v 1.27 Log files can be found at: http://releng.NetBSD.org/b5reports/i386/commits-2016.04.html#2016.04.11.02.04.14
Re: A web interface for apropos: http://man-k.org/
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 10.04.2016 19:42, Abhinav Upadhyay wrote: > Thanks, I'm glad you find it useful :). > > And thanks for the pointer for netbsd-users, too. I will post a > note there as well. > > -- Abhinav > > On Sun, Apr 10, 2016 at 11:09 PM,wrote: >> Thanks for that! I'll definitely use it. >> >> (btw, the typical user list is netbsd-users) Thank you! I'm glad to see this page, I will definitely use and recommend it. -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBCAAGBQJXCrlBAAoJEEuzCOmwLnZsqcMP/3sVTS3NkUujN13PltRzdHlH Ty/4YZWpOu0MFwjiGXZebdWLKY7Hd+GLoX8W6Dh8Uxhp8g0hTaNk2R5sHb/xNorP 2SYQyB2f3O/0ULyzpkLw1j3qH5Qhkcp+HeuN3H7MYCl35lA3jomYg5PIL9gMROdY vKt4dnFLTQUPG3MGx9gGeIvA4sw5U5855r1N07pSyRL2pV+zyuBogtByyk7Erf6R iS4rBxUpUF+PNrX0rk0CGlnYp0Z8F94/sL1sP8kielTqZoTYHV6ZNVDMUAriCg9C AHTeMf8xTn3ABEuic9vMw+j6XD2r7gLR10ZogCGyQjjXQSfUBpJFBdH6d6OsmnxN fA6jz8O0XvOUOeyTkk/cnDvZ/GVHIRDdJvS0kvzWiYXxdn2zL2mdqVnEisP9ZqxN VFoprXOwKzyh1B8kcPQMWnVTewtXAm2/QfkXZH33+0jkNKY3BpJFbxep8bum5lPA OZ+CQWhzsSZlDr8vG2lKnP+Pqf40oXhWeQ4uuUR9Kwx54nTkc2BlRIhWiA7DIcNB 3ZCXJMwf5E0Qdd4CyXmdvkIkpKAdMIEy+rWUvrDiViDwclMPIIxYjqFHz2MrxrOv hF/x7IixyHlyJwD5LyxfonBxxNR37gZHZFgpqpqUReRjhmMS8Sm7UvMiQRb4BmB5 Y5DBsx67qqWeF9c9BJUY =gOBO -END PGP SIGNATURE-
Re: A web interface for apropos: http://man-k.org/
On Mon, Apr 11, 2016 at 12:02 AM, Mindaugas Rasiukeviciuswrote: > Abhinav Upadhyay wrote: >> Recently, I have been working on building a web interface for >> apropos(1). Although, there are still plenty of things to do but I >> think it is in a decent shape now and I wanted to share it with all of >> you. >> >> http://man-k.org/ >> >> I would appreciate any constructive feedback that you might have and I >> will try to implement it :-) > > That is convenient. Would you be able to add POSIX manuals? > > https://www.kernel.org/pub/linux/docs/man-pages/man-pages-posix/ > > Other systems would be handy too, e.g. illumos and some Linux distribution. Thanks. It should be possible to add the POSIX manuals, I will try and add them. Other systems' manual are tricky, there will be duplicates clashing with man pages from NetBSD. I need to figure out a way to specify the OS in the query perhaps. -- Abhinav
Re: A web interface for apropos: http://man-k.org/
Abhinav Upadhyaywrote: > Recently, I have been working on building a web interface for > apropos(1). Although, there are still plenty of things to do but I > think it is in a decent shape now and I wanted to share it with all of > you. > > http://man-k.org/ > > I would appreciate any constructive feedback that you might have and I > will try to implement it :-) That is convenient. Would you be able to add POSIX manuals? https://www.kernel.org/pub/linux/docs/man-pages/man-pages-posix/ Other systems would be handy too, e.g. illumos and some Linux distribution. -- Mindaugas
Re: A web interface for apropos: http://man-k.org/
Thanks, I'm glad you find it useful :). And thanks for the pointer for netbsd-users, too. I will post a note there as well. -- Abhinav On Sun, Apr 10, 2016 at 11:09 PM,wrote: > Thanks for that! I'll definitely use it. > > (btw, the typical user list is netbsd-users)
A web interface for apropos: http://man-k.org/
Hi All, Sorry, for cross posting. Recently, I have been working on building a web interface for apropos(1). Although, there are still plenty of things to do but I think it is in a decent shape now and I wanted to share it with all of you. http://man-k.org/ I would appreciate any constructive feedback that you might have and I will try to implement it :-) -- Abhinav
Re: PIE binaries and ASLR are on in the default build for amd64
On Sun, Apr 10, 2016 at 04:42:45PM +, Christos Zoulas wrote: > security.pax.aslr.global: Enable/disable ASLR default (you can > override this on individual binaries > via ELF notes) Hint: see paxctl(8). Other architectures will follow, but the code has a few hard coded amd64 assumptions right now and needs a bit more MI cleanup. Martin
Re: PIE binaries and ASLR are on in the default build for amd64
In article <20160410153633.1bb9817f...@rebar.astron.com>, Christos Zoulaswrote: In more detail: 1. MKPIE is now on, creating PIE binaries; this is done in bsd.own.mk. You can turn it by putting MKPIE=no in /etc/mk.conf. 2. The value of the sysctl security.pax.aslr.global has been set to 1. This means that by default all binaries are ran with ASLR on. (securiry.pax.aslr.enabled was already == 1). Sysctls of interest: security.pax.aslr.enabled: Enable/disable ASLR for everyone security.pax.aslr.global: Enable/disable ASLR default (you can override this on individual binaries via ELF notes) security.pax.aslr.debug:Enable/Disable printing of ASLR address handling. security.pax.aslr.flags:Bits set to 1 disable ASLR more granularly Turning bit 0 on disables stack randomization Turning bit 1 on disables mmap randomization christos
PIE binaries and ASLR are on in the default build for amd64
Please repoort any issues! Thanks, christos