User Details
- User Since
- Jul 4 2018, 7:23 PM (394 w, 2 d)
Tue, Jan 20
This probably needs more of an explanation for the issue with this pattern on CHERI than we had downstream
Our pkg is old enough to predate that support, but we're also not doing pkgbase yet, so presumably once it's mature enough upstream for us to adopt it downstream we'll first update pkg.
Won’t that break the dependencies list if clang is itself 32-bit? This also introduces a new hard-coding of the set of compat libraries rather than using _ALL_libcompats.
Mon, Jan 19
the "extint-gpio1" check returned NULL
Sat, Jan 17
I don’t understand, other than it sounding like bear is broken
Thu, Jan 15
Wed, Jan 14
Mon, Jan 12
Fri, Jan 9
Switching from name ## _baseclasses to basevar ## _baseclasses to avoid the gross #defines you removed seems worthwhile, but I don't see the point of the churn for the rest. Especially since deprecating something that is the only thing being used is a foolish thing to do.
Thu, Jan 8
Inline them? There are only 5 calls in total.
Tue, Jan 6
Another minor issue is visual distinction between elements. The same colour and text styling (when not hovered over) are used for headings and links here:
Will you also be implementing this for csu for static binaries (often forgotten, including by me in the past)?
Mon, Jan 5
That's... unhelpful. Also not sure how I managed to miss testing that case :(
(Also this applies equally to Linux, and I believe also on FreeBSD with CROSS_TOOLCHAIN=, though the latter only gets noticed if the host's tools are old enough)
Wed, Dec 31
Tue, Dec 30
.gitattributes is a footgun and can give confusing behaviour. tools/build/checkstyle9.pl should enforce this for GitHub PRs already, and clang-format can (will?) normalise this too. There are significant downsides for this with little benefit that I can see.
Mon, Dec 29
Personally I would avoid confusing GNU C underaligned attributes and just write it in ISO C using memcpy. LLVM will inline the memcpy as load(s) based on the target's unaligned access support anyway. That is:
Dec 22 2025
On this point specifically:
Your response reads to me as dismissive, and this annoys me. Yes, it does not need to be perfect. However, it needs to be good enough, and the feedback I gave was for various aspects in which I do not believe it is good enough for the project. Once live, the world will have to see and deal with it. I have no clue how long it will take to fix the issues I see that make the site look unprofessional or be painful to navigate. This is compounded by the fact that there has been no recent attempt to solicit feedback and get buy-in from the developer community. This feels like it's being pushed forward whether we like it or not, and that is not a good way to build goodwill. I hope you rethink this strategy and don't continue to burn bridges with the developer community.
Dec 21 2025
Oh and what happened to the sidebar for various pages like https://freebsd.fortasse.cloud/where/? They feel rather lacking without that (pages of text and tables with a lot of empty space around them), and there are various pages on the site I've never known how to find without the sidebar...
Other bug reports (all on Safari):
Just looking at the homepage there is some very strange use of whitespace: specifically, there is a lot of extra vertical whitespace in various places that look unbalanced and make the content too spread out, and there is vertical whitespace lacking in the feed headings. See the attachments for before and after fixing these oddities that make the design feel more cohesive, polished and readable.
Dec 18 2025
Move INSTALLEXTRAKERNELS after NO_INSTALLEXTRAKERNELS is set. Hidden by testing originally on CheriBSD where we set NO_INSTALLEXTRAKERNELS to no early for Morello..
To avoid breaking existing users of distributekernel (which is what we
currently use to stage the kernel), reimplement stage-packages-kernel
to run make install itself rather than changing the existing behaviour
of distributekernel; this means release builds and other downstream
users are not affected by this change.
Dec 16 2025
So the current code tries 10 times to hit a failure, and will use the last value if all 10 reads succeeded, given the condition after the loop is correct? Importantly, there's no security issue here, because we didn't actually report a successful read when it failed?