From nobody Sun Apr 12 13:44:11 2026 X-Original-To: dev-commits-src-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4ftsG42PZ5z6ZM7t for ; Sun, 12 Apr 2026 13:44:12 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R12" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4ftsG40CBdz3kPd for ; Sun, 12 Apr 2026 13:44:12 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1776001452; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=HInYv2k7/2V4/amu9sI4R+wKc+VUDuBPkyivUmhkcSk=; b=b28vlsIqxUkJInPJ5cmgBgZx3WGS4PORPyn7SDWJ37J1uDJlQNcQtfUnUGBqH01TGGa6Cv ndeoxK9UgT/7Hcq2CXwHp69qXvdkV2CejjrjXH/aqUXdz0IbTtSrIcMuNRaYGgRb96V7cN No7C9CM9rzmjIFbpabGZTRCF5DqUEjNVw5wzDHc90/cF8zHhCwqOfyiVgnbgBv/0nxKQ2d HJcjE9M+AxQfeCOkOKYs4QsDO2jy7pNN/wZQOH9Dh+NNtOo/izRu5S+9ea5hG1O1O9H4wF CGEBX0VwI9bgI2TQv1tBrTc3AMXjQIv/zLqMZIcJdU/Vj8nbn3ATI684ai5grg== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1776001452; a=rsa-sha256; cv=none; b=wUuexqcTqzl9fnYUtvX6huKhBu2kFtvE81MUCRXWJMCaWt/F5cK4gb1qhehOoTJEKd6MeL LICN9VJD+NxcO8jzJNeFKSSnS9aEVkFfyVeEJtXcMfEJcUKW5t+SzjB+v2Yo0bTzF8SqzY /NENAIb9P9p1lEDxssHqMXSJnhEurHy+6xdX8Sr7fh1lEx+0Vl7b2tXFPAL9iwiZZdDKTM RI+dEs36kGPUx/Cjdx2mjbiBHhzGIyv9pvGHwIVx6WhcPCt2zi2N1nxE9fJ5A3wJ0SA6bK 62+Kdm68TSr07rObQNavr2R9D+OCdgaOc59eOmQp+JCmiolfaUz3sOeBxn7nVA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1776001452; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=HInYv2k7/2V4/amu9sI4R+wKc+VUDuBPkyivUmhkcSk=; b=OiwveorPJXFIDTDSCKrP2ufzdZhV+WHE2pwVl0/r0JIwwo6lMfYiRZoTvH7X0whisOORVw ENzsrwkz/22sYz3eqJx6+snnrxxyDUALJ8uBD4PlD5QTTxyJpfhTu6rs9cuxDL7zPZArjg NPORmzIVUZt4g+iIfkMVCvX/xDu7gq2dmPuSi/JKJ30PSZUOGHhQ0fgpioMwqi770xEID0 /pSsq5BOCk/8k3oABNgdRZIFFIBlqrPmqcxxZY2PeARh8mY/X8ZYJy4NyqH5caU/xA0dXQ PTyw/vDzQDdtSfplwW8Pn1ByxHkrK9tpik8iLF8FaW2KXvh+qNDf8rNW1mKZoA== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) by mxrelay.nyi.freebsd.org (Postfix) with ESMTP id 4ftsG36wg7z3jL for ; Sun, 12 Apr 2026 13:44:11 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from git (uid 1279) (envelope-from git@FreeBSD.org) id 4300d by gitrepo.freebsd.org (DragonFly Mail Agent v0.13+ on gitrepo.freebsd.org); Sun, 12 Apr 2026 13:44:11 +0000 To: src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-branches@FreeBSD.org From: Kyle Evans Subject: git: b00faab970c0 - stable/14 - stand: add a mechanism to avoid env var propagation to kenv List-Id: Commit messages for all branches of the src repository List-Archive: https://lists.freebsd.org/archives/dev-commits-src-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-src-all@freebsd.org Sender: owner-dev-commits-src-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: kevans X-Git-Repository: src X-Git-Refname: refs/heads/stable/14 X-Git-Reftype: branch X-Git-Commit: b00faab970c0e867b2c8197d7bb14abbb492932e Auto-Submitted: auto-generated Date: Sun, 12 Apr 2026 13:44:11 +0000 Message-Id: <69dba1ab.4300d.39fc068c@gitrepo.freebsd.org> The branch stable/14 has been updated by kevans: URL: https://cgit.FreeBSD.org/src/commit/?id=b00faab970c0e867b2c8197d7bb14abbb492932e commit b00faab970c0e867b2c8197d7bb14abbb492932e Author: Kyle Evans AuthorDate: 2025-08-22 03:48:14 +0000 Commit: Kyle Evans CommitDate: 2026-04-12 13:43:38 +0000 stand: add a mechanism to avoid env var propagation to kenv Our only user of this at the moment is teken.{fg,bg}_color. These are special because teken is a library common to both the kernel and the loader, and we want to avoid having special vars to control the loader vs. the kernel. Ideally, if a user wants a different set of console colors, then they set the appropriate teken variable and it Just Works(TM) everywhere. We can't just avoid setting the env vars, because we specifically want to install a hook to adjust how loader is drawn. This allows us to avoid breaking a kernel config(5) that has some default teken colors set with our defaults. That's a valid configuration, even if it might seem weird that they don't want to set colors in both loader and the kernel -- they may not anticipate spending any time in loader, and thus prefer to just let it do its default behavior. NOKENV is expected to be unset if the value is overwritten, rather than acting as a persistent marker that we do not want the value to persist under any circumstance. We can always add another flag bit later for persistence if we find a use for that, but most variables are fine to carry over. This is mostly needed for environment variables that we really just want to set a hook for. Future work could expand this to break it out to the scripted interfaces. We have discussed some options like a new built-in command, or adding a flag to the existing `set` command, but haven't really come up with a concrete plan to avoid confusion. Reviewed by: imp (cherry picked from commit 510e473ff3a6d4620c603c1b9ba06fb2bf5745fd) --- stand/common/gfx_fb.c | 9 ++++++++- stand/common/modinfo.c | 2 ++ stand/libsa/environment.c | 17 ++++++++++++++--- stand/libsa/stand.h | 1 + 4 files changed, 25 insertions(+), 4 deletions(-) diff --git a/stand/common/gfx_fb.c b/stand/common/gfx_fb.c index 687c081a1d5d..92abaed91f6b 100644 --- a/stand/common/gfx_fb.c +++ b/stand/common/gfx_fb.c @@ -233,6 +233,7 @@ gfx_fb_evalcolor(const char *envname, teken_color_t *cattr, { const char *ptr; char env[10]; + int eflags = EV_VOLATILE | EV_NOKENV; bool from_env = false; ptr = getenv(envname); @@ -248,10 +249,16 @@ gfx_fb_evalcolor(const char *envname, teken_color_t *cattr, if (unsetenv(envname) != 0) return (true); from_env = true; + + /* + * If we're carrying over an existing value, we *do* want that + * to propagate to the kenv. + */ + eflags &= ~EV_NOKENV; } snprintf(env, sizeof(env), "%d", *cattr); - env_setenv(envname, EV_VOLATILE, env, sethook, unsethook); + env_setenv(envname, eflags, env, sethook, unsethook); return (from_env); } diff --git a/stand/common/modinfo.c b/stand/common/modinfo.c index 381bd9dfd719..8c65bea2e759 100644 --- a/stand/common/modinfo.c +++ b/stand/common/modinfo.c @@ -167,6 +167,8 @@ md_copyenv(vm_offset_t start) /* Traverse the environment. */ for (ep = environ; ep != NULL; ep = ep->ev_next) { + if ((ep->ev_flags & EV_NOKENV) != 0) + continue; len = strlen(ep->ev_name); if ((size_t)archsw.arch_copyin(ep->ev_name, addr, len) != len) break; diff --git a/stand/libsa/environment.c b/stand/libsa/environment.c index 95ee1718f8d4..d139249a8e84 100644 --- a/stand/libsa/environment.c +++ b/stand/libsa/environment.c @@ -65,6 +65,17 @@ env_setenv(const char *name, int flags, const void *value, struct env_var *ev, *curr, *last; if ((ev = env_getenv(name)) != NULL) { + /* + * If the new value doesn't have NOKENV set, we'll drop the flag + * if it's set on the entry so that the override propagates + * correctly. We do this *before* sending it to the hook in + * case the hook declines to operate on it (e.g., because the + * value matches what was already set) -- we would still want + * the explicitly set value to propagate. + */ + if (!(flags & EV_NOKENV)) + ev->ev_flags &= ~EV_NOKENV; + /* * If there's a set hook, let it do the work * (unless we are working for one already). @@ -77,7 +88,6 @@ env_setenv(const char *name, int flags, const void *value, free(ev->ev_value); ev->ev_value = NULL; ev->ev_flags &= ~EV_DYNAMIC; - } else { /* @@ -123,12 +133,13 @@ env_setenv(const char *name, int flags, const void *value, /* If we have a new value, use it */ if (flags & EV_VOLATILE) { ev->ev_value = strdup(value); - ev->ev_flags |= EV_DYNAMIC; + flags |= EV_DYNAMIC; } else { ev->ev_value = (char *)value; - ev->ev_flags |= flags & EV_DYNAMIC; } + ev->ev_flags |= flags & (EV_DYNAMIC | EV_NOKENV); + return (0); } diff --git a/stand/libsa/stand.h b/stand/libsa/stand.h index 260defa3a33d..553f965e0ccd 100644 --- a/stand/libsa/stand.h +++ b/stand/libsa/stand.h @@ -339,6 +339,7 @@ extern int pager_file(const char *fname); #define EV_DYNAMIC (1<<0) /* value was dynamically allocated, free if changed/unset */ #define EV_VOLATILE (1<<1) /* value is volatile, make a copy of it */ #define EV_NOHOOK (1<<2) /* don't call hook when setting */ +#define EV_NOKENV (1<<3) /* don't add to kenv (loader-only) */ struct env_var; typedef char *(ev_format_t)(struct env_var *ev);