tb [Wed, 18 Oct 2023 06:30:40 +0000 (06:30 +0000)]
rfc3779: no need for err.h, but we do need asn1.h
jsg [Wed, 18 Oct 2023 01:52:20 +0000 (01:52 +0000)]
drm/amd: Fix logic error in sienna_cichlid_update_pcie_parameters()
From Mario Limonciello
d2894c4f473ab71cd68ef0f9b086148bb2c02132 in linux-6.1.y/6.1.57
2a1fe39a5be785e962e387146aed34fa9a829f3f in mainline linux
jsg [Wed, 18 Oct 2023 01:49:45 +0000 (01:49 +0000)]
drm/amd: Fix detection of _PR3 on the PCIe root port
From Mario Limonciello
c8bd3e12b3291e632ae189619169914743ba77d1 in linux-6.1.y/6.1.57
134b8c5d8674e7cde380f82e9aedfd46dcdd16f7 in mainline linux
afresh1 [Wed, 18 Oct 2023 01:49:26 +0000 (01:49 +0000)]
Increase max depth for termcaps
With the update to ncurses 6.4-
20230826 /etc/termcap now needs at
least a 36 deep search. Instead, we'll just bump to 64. It seems
32 has been enough since perl 5.001 in 1995, so hopefully this buys
us at least another 28 years.
"please commit that" deraadt@
jsg [Wed, 18 Oct 2023 01:47:42 +0000 (01:47 +0000)]
drm/amd/display: Adjust the MST resume flow
From Wayne Lin
71472872932b11ca2591104eb73255fecaae9d33 in linux-6.1.y/6.1.57
ec5fa9fcdeca69edf7dab5ca3b2e0ceb1c08fe9a in mainline linux
deraadt [Wed, 18 Oct 2023 01:45:42 +0000 (01:45 +0000)]
grow arm64 iso media space
claudio [Tue, 17 Oct 2023 17:59:59 +0000 (17:59 +0000)]
Neither sin_len nor sin6_len can be 0 so these checks are not needed.
Also reorder the RTF_HOST vs netmask check. RTF_HOST wins if both are set.
Makes the code a bit neater.
OK tb@
claudio [Tue, 17 Oct 2023 17:58:15 +0000 (17:58 +0000)]
Remove bogus plen != 0xff check
OK tb@
nicm [Tue, 17 Oct 2023 10:13:53 +0000 (10:13 +0000)]
sync, from sthen
nicm [Tue, 17 Oct 2023 10:05:46 +0000 (10:05 +0000)]
Update termtypes to 6.4-
20230424 with local changes.
nicm [Tue, 17 Oct 2023 09:55:32 +0000 (09:55 +0000)]
Switch to tiparm_s (added in ncurses 6.4-
20230424) instead of tparm,
which allows ncurses to validate the capabilities correctly.
nicm [Tue, 17 Oct 2023 09:52:08 +0000 (09:52 +0000)]
Update ncurses and associated libraries (form, panel, menu) to
6.4-
20230826 (from 5.7-
20081102).
Based on result from Thomas Dickey's ncu2openbsd script and then
modified. Switches to the upstream tput. Major bump for the ncurses
libraries and for libedit and libreadline.
Help from tb, millert.
ok deraadt sthen
cheloha [Tue, 17 Oct 2023 00:04:02 +0000 (00:04 +0000)]
clockintr: move callback-specific API behaviors to "clockrequest" namespace
The API's behavior when invoked from a callback function is impossible
to document. Move the special behavior into a distinct namespace,
"clockrequest".
- Add a 'struct clockrequest'. Basically a stripped-down 'struct clockintr'
for exclusive use during clockintr_dispatch().
- In clockintr_queue, replace the "cq_shadow" clockintr with a "cq_request"
clockrequest. They serve the same purpose.
- CLST_SHADOW_PENDING -> CR_RESCHEDULE; different namespace, same meaning.
- CLST_IGNORE_SHADOW -> CLST_IGNORE_REQUEST; same meaning.
- Move shadow branch in clockintr_advance() to clockrequest_advance().
- clockintr_request_random() becomes clockrequest_advance_random().
- Delete dead shadow branches in clockintr_cancel(), clockintr_schedule().
- Callback functions now get a clockrequest pointer instead of a special
clockintr pointer: update all prototypes, callers.
No functional change intended.
claudio [Mon, 16 Oct 2023 12:49:15 +0000 (12:49 +0000)]
Adjust lladdr test to use templates in rdomain1 (e.g. fe80::%pair11/64)
The code allready supports matching of templates with a scope id and
fe80::%pair11/64 and fe80::%gif11/64 are different to session_match_mask().
mpi [Mon, 16 Oct 2023 11:32:54 +0000 (11:32 +0000)]
Consider required constraint when moving pages from active to inactive lists.
Make sure low pages are deactivated first when there is a shortage of inactive
pages. Without this the system can have a ton of high pages on the active list
and never swapout anything if there's a shortage of low pages.
This prevents a deadlock on amd64 reported and tested by bluhm@.
ok kettenis@
claudio [Mon, 16 Oct 2023 10:26:51 +0000 (10:26 +0000)]
Add regress test to verify that IPv6 link-local addresses work
claudio [Mon, 16 Oct 2023 10:25:45 +0000 (10:25 +0000)]
Improve IPv6 link-local address handling
When a session is established determine the possible interface scope of that
session. The scope is only set when the remote address is directly connected.
This interface scope is passed to the RDE that uses this information when
link-local nexthops are received. Again checking that a link-local nexthop
is actually acceptable.
OK tb@
dtucker [Mon, 16 Oct 2023 08:40:00 +0000 (08:40 +0000)]
Move declaration of "len" into the block where it's used. This lets
us compile Portable with -Werror with when OpenSSL doesn't have
Ed25519
support.
op [Mon, 16 Oct 2023 08:33:16 +0000 (08:33 +0000)]
reinstate space-to-tabstop entry in the manpage
removed in rev 1.95 since was hidden behind NOTAB, and forgot to be
re-added when no-tab-mode was resurrected.
claudio [Mon, 16 Oct 2023 06:14:20 +0000 (06:14 +0000)]
Set fib-update no since the fib is not needed here.
cheloha [Sun, 15 Oct 2023 18:20:25 +0000 (18:20 +0000)]
time(1): miscellaneous style(9) tweaks
Use a space after keywords, binary operators require spaces, second-level
indents are four spaces, remove some extraneous parentheses and empty lines,
fill empty loop bodies with a "continue" statement.
No binary change.
chrisz [Sun, 15 Oct 2023 15:49:47 +0000 (15:49 +0000)]
audio(9): deprecate start_{output,input}
ok ratchov@, kn@
kn [Sun, 15 Oct 2023 09:49:57 +0000 (09:49 +0000)]
Pledge once with or without "proc exec", not twice
Spotted while comparing ktraces between 'tar -z' and 'gzcat | tar -f-'.
Only the former runs, e.g. gzip(1), but the latter also pledges theses promises
just to pledge again immediately afterwards without them.
Make the calls mutually exclusive so 'tar -f-' et al. skip the first pledge
and thus never have "proc exec" to begin wth.
"looks good to me" mbuhl
OK millert
kettenis [Sat, 14 Oct 2023 19:02:16 +0000 (19:02 +0000)]
Document the hw.battery sysctls.
ok benno@, jmc@, schwarze@
afresh1 [Sat, 14 Oct 2023 18:10:47 +0000 (18:10 +0000)]
Verify but don't overwrite SHA256.sig in fw_update(8)
Signify is happy to overwite the file with the signature stripped off.
However, if we do that, when downloading firmware we lose the ability
to check the signature before verifying checksums on the downloaded files.
Noticed by Thomas <exnihilo () fastmail ! org>
Right deraadt@
anton [Sat, 14 Oct 2023 13:05:43 +0000 (13:05 +0000)]
Suppress harmless EPIPE errors during test shutdown.
claudio [Sat, 14 Oct 2023 09:46:14 +0000 (09:46 +0000)]
Rewrite log_peer_info() and log_peer_warn[x]()
Passing the peer description as part of the format string was a bad idea
since the peer description may include some % signs (e.g. for link local
IPv6 addresses). So instead of asprintf a new fmt string use vasprintf
to get the message and then use logit("%s: %s", peer_info, msg).
OK tb@
jmc [Sat, 14 Oct 2023 06:29:11 +0000 (06:29 +0000)]
align the intel wifi entries with the other pci wifi entries; ok stsp
deraadt [Sat, 14 Oct 2023 05:07:05 +0000 (05:07 +0000)]
sync
jeremy [Fri, 13 Oct 2023 23:16:58 +0000 (23:16 +0000)]
Update lang/ruby module documentation for the removal of Ruby 3.0
anton [Fri, 13 Oct 2023 19:30:18 +0000 (19:30 +0000)]
Use a unique mount point rooted in /mnt in order to not conflict with other
tests.
anton [Fri, 13 Oct 2023 19:28:59 +0000 (19:28 +0000)]
Use the idiom in cleanup target like many others
in regress already does.
kettenis [Fri, 13 Oct 2023 15:41:25 +0000 (15:41 +0000)]
Add Allwinner D1 support.
ok mbuhl@, patrick@, dlg@
stsp [Fri, 13 Oct 2023 13:52:08 +0000 (13:52 +0000)]
enable dwqe(4) in RAMDISK_CD
reminded by jsg@, snapshot test build done by me
fcambus [Fri, 13 Oct 2023 13:28:02 +0000 (13:28 +0000)]
Remove bold8x16-iso1 font.
This font has been unlinked from the build in January 2019 when it was
replaced by Spleen 8x16.
OK mpi@
tb [Fri, 13 Oct 2023 12:12:05 +0000 (12:12 +0000)]
Adjust regress to cope with constraints
job [Fri, 13 Oct 2023 12:06:49 +0000 (12:06 +0000)]
Allow imposing constraints on RPKI trust anchors
The ability to constrain a RPKI Trust Anchor's effective signing
authority to a limited set of Internet Number Resources allows
Relying Parties to enjoy the potential benefits of assuming trust,
within a bounded scope.
Some examples: ARIN does not support inter-RIR IPv6 transfers, so
it wouldn't make any sense to see a ROA subordinate to ARIN's trust
anchor covering RIPE-managed IPv6 space. Conversely, it wouldn't
make sense to observe a ROA covering ARIN-managed IPv6 space under
APNIC's, LACNIC's, or RIPE's trust anchor - even if a derived trust
arc (a cryptographically valid certificate path) existed. Along these
same lines, AFRINIC doesn't support inter-RIR transfers of any kind,
and none of the RIRs have authority over private resources like
10.0.0.0/8 and 2001:db8::/32.
For more background see:
https://datatracker.ietf.org/doc/draft-snijders-constraining-rpki-trust-anchors/
https://mailman.nanog.org/pipermail/nanog/2023-September/223354.html
With and OK tb@, OK claudio@
claudio [Fri, 13 Oct 2023 07:55:57 +0000 (07:55 +0000)]
Force the router-id on all bgpd instances to make the expected output
predictable.
claudio [Fri, 13 Oct 2023 07:37:35 +0000 (07:37 +0000)]
Add missing Ns in argument list of announce (IPv4|IPv6) ...
tb [Fri, 13 Oct 2023 05:49:34 +0000 (05:49 +0000)]
Tweak previous by using the argument name, not its type
tb [Fri, 13 Oct 2023 05:47:35 +0000 (05:47 +0000)]
Improve the description of X509_ALGOR_dup(3)
The old description was vague, but strictly speaking a lie, so make it
more precise and turn the lie into a truth.
bluhm [Fri, 13 Oct 2023 00:00:51 +0000 (00:00 +0000)]
Remove ancient version of zlib bundled with GNU cvs.
Avoid false positive in security scan. Removal of embedded zlib
ensures that cvs is linked dynamically with /usr/lib/libz.so. We
do not want any zlib 1.1.3 from 2001 in our source tree.
no binary diff; OK millert@ deraadt@
bluhm [Thu, 12 Oct 2023 22:41:29 +0000 (22:41 +0000)]
Test retry after DNS lookup failure.
bluhm [Thu, 12 Oct 2023 22:36:54 +0000 (22:36 +0000)]
Retry DNS lookup for remote loghost.
If DNS lookup for a remote loghost configured in syslog.conf did
not work at startup, the entry was ignored. Better retry the lookup
in intervals until it succeeds. Improve debug output to print IP
address after resolution. Unify retry code that resolves DNS for
UDP and connects to TCP server.
testing and feedback from Paul de Weerd; OK deraadt@
bluhm [Thu, 12 Oct 2023 19:15:21 +0000 (19:15 +0000)]
pflog(4) logs packet dropped by default rule with block.
If a packet is malformed, it is dropped by pf(4). The rule referenced
in pflog(4) is the default rule. As the default rule is a pass
rule, tcpdump printed "pass" although the packet was actually
dropped. To avoid confusion, change the action to drop. Then
tcpdump prints "block".
OK sashan@ kn@
tb [Thu, 12 Oct 2023 17:14:17 +0000 (17:14 +0000)]
x509_algor: fix error message
anton [Thu, 12 Oct 2023 16:59:23 +0000 (16:59 +0000)]
Let vnconfig select an unused device as opposed of unconditionally
assume vnd0 is available.
deraadt [Thu, 12 Oct 2023 16:37:05 +0000 (16:37 +0000)]
Static binaries which do not call execve() were not calling
pinsyscall(SYS_execve, ...). Upon review, this is a fairly small
set of programs which either pledge() aggressively or don't usually
operate in a risky operating environment. We now point at a location
which is definately not a "syscall" instruction.
ok kettenis
cheloha [Thu, 12 Oct 2023 15:32:38 +0000 (15:32 +0000)]
timeout: add TIMEOUT_MPSAFE flag
Add a TIMEOUT_MPSAFE flag to signal that a timeout is safe to run
without the kernel lock. Currently, TIMEOUT_MPSAFE requires
TIMEOUT_PROC. When the softclock() is unlocked in the future this
dependency will be removed.
On MULTIPROCESSOR kernels, softclock() now shunts TIMEOUT_MPSAFE
timeouts to a dedicated "timeout_proc_mp" bucket for processing by the
dedicated softclock_thread_mp() kthread. Unlike softclock_thread(),
softclock_thread_mp() is not pinned to any CPU and runs run at IPL_NONE.
Prompted by bluhm@. Lots of input from bluhm@. Joint work with mvs@.
Prompt: https://marc.info/?l=openbsd-tech&m=
169646019109736&w=2
Thread: https://marc.info/?l=openbsd-tech&m=
169652212131109&w=2
ok mvs@
cheloha [Thu, 12 Oct 2023 15:16:44 +0000 (15:16 +0000)]
bt(5), btrace(8): add support for binary modulo operator ('%')
Link: https://marc.info/?l=openbsd-tech&m=169695435209410&w=2
ok mpi@
claudio [Thu, 12 Oct 2023 14:22:08 +0000 (14:22 +0000)]
Before calling rde_generate_updates() with EVAL_ALL ensure that the new
path is actually eligible. If this is not the case pass NULL instead.
This is an optimisation to bypass extra work if both old and new path
were ineligible.
OK tb@
claudio [Thu, 12 Oct 2023 14:16:28 +0000 (14:16 +0000)]
In up_generate_addpath_all() ensure that the new prefix is valid.
This should fix a fatal error reported by Arend Brouwer (arend at eritap com)
when "announce add-path send all" is used.
As a workaround "announce add-path send best plus 500" can used.
OK tb@
schwarze [Thu, 12 Oct 2023 12:56:26 +0000 (12:56 +0000)]
for a few sysctl nodes, mention standard or at least more widely
available libc API functions and utility programs that produce
equivalent output on OpenBSD;
OK deraadt@
kn [Thu, 12 Oct 2023 12:31:15 +0000 (12:31 +0000)]
Remove default sets answer
The autoinstall(8) response file contains only non-defaults, except for
Set name(s)? (or 'abort' or 'done') [done] done
which is the hardcoded default since 2009.
Added in 2019 r1.23 "Let sysupgrade(8) create auto_upgrade.conf file [...]"
with all others, remove the exception.
OK florian
claudio [Thu, 12 Oct 2023 09:18:56 +0000 (09:18 +0000)]
Add a fairly minimal ixp setup generated by arouteserver
This does a lot of community manipulation and also tests a few other
bits of code (prepends, roa, prefix-set).
tb [Thu, 12 Oct 2023 04:53:45 +0000 (04:53 +0000)]
x509_algor: add a few missing includes
djm [Thu, 12 Oct 2023 03:51:08 +0000 (03:51 +0000)]
typos and extra debug trace calls
djm [Thu, 12 Oct 2023 03:48:53 +0000 (03:48 +0000)]
ensure logs are owned by correct user; feedback/ok dtucker@
djm [Thu, 12 Oct 2023 03:36:32 +0000 (03:36 +0000)]
64 %-expansion keys ought to be enough for anybody; ok dtucker
(we just hit the previous limit in some cases)
djm [Thu, 12 Oct 2023 02:48:43 +0000 (02:48 +0000)]
don't dereference NULL pointer when hashing jumphost
djm [Thu, 12 Oct 2023 02:18:18 +0000 (02:18 +0000)]
add %j token that expands to the configured ProxyJump hostname (or
the empty string if this option is not being used).
bz3610, ok dtucker
djm [Thu, 12 Oct 2023 02:15:53 +0000 (02:15 +0000)]
release GSS OIDs only at end of authentication; bz2982, ok dtucker@
djm [Thu, 12 Oct 2023 02:12:53 +0000 (02:12 +0000)]
mask SIGINT/TERM/QUIT/HUP before checking quit_pending and use ppoll()
to unmask them in the mainloop. Avoids race condition between signaling
ssh to exit and polling. bz3531; ok dtucker
djm [Wed, 11 Oct 2023 23:23:58 +0000 (23:23 +0000)]
sync usage() with ssh.1; spotted by kn@
djm [Wed, 11 Oct 2023 23:14:33 +0000 (23:14 +0000)]
ssh -Q does not make sense with other command-line options, so give
it its own line in the manpage
djm [Wed, 11 Oct 2023 22:42:26 +0000 (22:42 +0000)]
add ChannelTimeout support to the client, mirroring the same option
in the server. ok markus@
djm [Wed, 11 Oct 2023 22:41:05 +0000 (22:41 +0000)]
add support for reading
ED25519 private keys in PEM PKCS8 format;
ok markus@ tb@
tobhe [Wed, 11 Oct 2023 22:13:16 +0000 (22:13 +0000)]
Prevent deref-after-free when tdb_timeout() fires on invalid new tdb.
When receiving a pfkeyv2 SADB_ADD message, a newly created tdb can
fail in tdb_init(), which causes the tdb to not get added to the
global tdb list and an immediate dereference. If a lifetime timeout
triggers on this tdb, it will unconditionally try to remove it from
the list and in the process deref once more than allowed,
causing a one bit corruption in the already freed up slot in the
tdb pool.
We resolve this issue by moving timeout_add() after tdb_init()
just before puttdb(). This means tdbs failing initialization
get discarded immediately as they only hold a single reference.
Valid tdbs get their timeouts activated just before we add them
to the tdb list, meaning the timeout can safely assume they are
linked.
Feedback from mvs@ and millert@
ok mvs@ mbuhl@
anton [Wed, 11 Oct 2023 18:07:56 +0000 (18:07 +0000)]
Check if loopback interfaces used are skipped by pf as opposed of
bailing out if any loopback interface is skipped other than lo0.
anton [Wed, 11 Oct 2023 18:07:15 +0000 (18:07 +0000)]
Infer rdomains from environment variables N1 and N2 like many others in
regress/sys/net already does. No functional change as the defaults
remains the same.
kn [Wed, 11 Oct 2023 17:53:52 +0000 (17:53 +0000)]
Remove dead CRYPTOCHUNK usage
install.sub r1.1245 "Ask for disk crypto after root disk question" got rid
of global CRYPTO* variables; no functional change.
cheloha [Wed, 11 Oct 2023 15:42:44 +0000 (15:42 +0000)]
kernel: expand fixed clock interrupt periods to 64-bit values
Technically, all the current fixed clock interrupt periods fit within
an unsigned 32-bit value. But 32-bit multiplication is an accident
waiting to happen. So, expand the fixed periods for hardclock,
statclock, profclock, and roundrobin to 64-bit values.
One exception: statclock_mask remains 32-bit because random(9) yields
32-bit values. Update the initclocks() comment to make it clear that
this is not an accident.
cheloha [Wed, 11 Oct 2023 15:07:04 +0000 (15:07 +0000)]
clockintr: move clockintr_schedule() into public API
Prototype clockintr_schedule() in <sys/clockintr.h>.
espie [Wed, 11 Oct 2023 13:54:43 +0000 (13:54 +0000)]
put "stub" within grasp of -DREGRESSION_TESTING.
Extend it slightly: do not stub quirks, so that caching mechanisms work
as usual even when using stubs.
espie [Wed, 11 Oct 2023 13:52:29 +0000 (13:52 +0000)]
missing state in locator call, surprised nobody else ran into that
tb [Wed, 11 Oct 2023 13:22:11 +0000 (13:22 +0000)]
Some housekeeping in x_algor
Fix includes and zap an empty line.
ok jsing
tb [Wed, 11 Oct 2023 13:20:18 +0000 (13:20 +0000)]
Rewrite X509_ALGOR_set0()
The current implementation is a complete mess. There are three cases:
1) ptype == V_ASN1_UNDEF: parameter must be freed and set to NULL.
2) ptype == 0: existing non-NULL parameters are left untouched, NULL
parameters are replaced with ASN1_TYPE_new()'s wacky defaults.
3) otherwise allocate new parameters if needed and set them to ptype/pval.
In all three cases free the algorithm and set it to aobj.
The challenge now is to implement this using nine if statements and one
else clause... We can do better. This preserves existing behavior. There
would be cleaner implementations possible, but they would change behavior.
There are many callers in the ecosystem that do not error check
X509_ALGOR_set0() since OpenSSL failed to do so. So this was carefully
rewritten to leave alg in a consisten state so that unchecking callers
don't encounter corrupted algs.
ok jsing
tb [Wed, 11 Oct 2023 13:13:25 +0000 (13:13 +0000)]
x509_algor: Turn expected failure into actual failure now that the API is
fixed.
tb [Wed, 11 Oct 2023 13:12:46 +0000 (13:12 +0000)]
Ensure that out_value is initialized even if out_type is NULL
This fixes the printf in the x509_algor regress.
ok jsing
tb [Wed, 11 Oct 2023 13:10:13 +0000 (13:10 +0000)]
Rewrite X509_ALGOR_get0()
Make the logic slightly less convoluted. Preserve the behavior that
*ppval remains unset if pptype == NULL for now. However, ensure that
*ppval is set to NULL if pptype is V_ASN1_UNDER.
ok jsing
tb [Wed, 11 Oct 2023 13:05:18 +0000 (13:05 +0000)]
Add internal version of X509_ALGOR_set_md()
X509_ALGOR_set_md() is a void function that cannot easily be error checked.
The caller has to jump through hoops to make sure this function doesn't
fail. Prepare replacing this internally with X509_ALGOR_set_evp_md(), which
allows error checking. There is one slight change of behavior: if the EVP_MD
object passed in does not have an OID known to the library, then this new
API fails.
It is unclear what the library should do with such an object and people
who use EVP_MD_meth_new() need to know what they are doing anyway and they
are better off teaching the lib about the OID if they're going to be
messing with certs.
Oh, and the prototype is in x509_local.h because the rest of this API is
in x509.h despite being implemented in asn1/.
ok jsing
tb [Wed, 11 Oct 2023 13:00:16 +0000 (13:00 +0000)]
Add preallocation dance for X509_ALGOR_set_md() as documented
stsp [Wed, 11 Oct 2023 12:57:53 +0000 (12:57 +0000)]
dwqe(4) may now attach via pci(4)
stsp [Wed, 11 Oct 2023 12:52:00 +0000 (12:52 +0000)]
Add initial support for Elkhart Lake ethernet to dwqe(4).
For now, only attach to PSE0/RGMII (device ID 0x4ba0) which is the
only device I have access to for testing.
There is a known problem where Tx throughput is lower than expected.
This is being looked into.
ok kettenis@
tb [Wed, 11 Oct 2023 12:51:07 +0000 (12:51 +0000)]
Clean up X509_ALGOR_cmp()
This is currently written in what is likely the most stupid way possible.
Rewrite this function in a more straightforward way.
ok jsing
tb [Wed, 11 Oct 2023 12:49:00 +0000 (12:49 +0000)]
Add regress coverage for X509_ALGOR_*
This covers the setters and getters. Serialization and deserialization as
well as comparison is already well covered by the pieces of regress using
certs.
There is currently one printf indicating failure. This will be fixed
shortly.
stsp [Wed, 11 Oct 2023 12:32:46 +0000 (12:32 +0000)]
fix bitmask of GMAC4 hwfeatures1 RX FIFO size
ok kettenis
tb [Wed, 11 Oct 2023 12:06:11 +0000 (12:06 +0000)]
I forgot that we now have ASN1_INTEGER_set_uint64()
claudio [Wed, 11 Oct 2023 07:05:11 +0000 (07:05 +0000)]
Extend rde_community_test to check various aspects of non-transitive
extended communities. Mainly that the non-transitive communities are
properly stripped.
Test fails without rev 1.14 of rde_community.c
djm [Wed, 11 Oct 2023 06:40:54 +0000 (06:40 +0000)]
mention "none" is a valid argument to IdentityFile; bz3080
claudio [Wed, 11 Oct 2023 06:30:10 +0000 (06:30 +0000)]
Bump version for -portable release
tb [Wed, 11 Oct 2023 06:08:57 +0000 (06:08 +0000)]
Be more precise about X509_ALGOR_get0()
djm [Wed, 11 Oct 2023 05:42:08 +0000 (05:42 +0000)]
in olde rcp/scp protocol mode, when rejecting a path from the server
as not matching the glob that the client sent, log (at debug level) the
received pathname as well as the list of possible expected paths expanded
from the glob. bz2966
djm [Wed, 11 Oct 2023 04:46:29 +0000 (04:46 +0000)]
s/%.100s/%s/ in SSH- banner construction as there's no reason to
limit its size: the version string bring included is a compile time
constant going into an allocated banner string.
cheloha [Wed, 11 Oct 2023 00:02:25 +0000 (00:02 +0000)]
clockintr_stagger: rename parameters: "n" -> "numer", "count" -> "denom"
Rename these parameters to align the code with the forthcoming
manpage. No functional change.
kettenis [Tue, 10 Oct 2023 19:06:42 +0000 (19:06 +0000)]
Correctly define GMAC_VERSION. Found by stsp@
ok stsp@
miod [Tue, 10 Oct 2023 18:40:34 +0000 (18:40 +0000)]
Ignore PCI MEM64 ranges over 4GB, since this 32-bit kernel can't use them;
this prevents a DIAGNOSTIC panic when running in qemu without option
"-M virt,highmem=off".
Reported by and ok jsg@
anton [Tue, 10 Oct 2023 18:18:05 +0000 (18:18 +0000)]
Fix timing issue in which one thread could be left hanging in
pipe_read().
anton [Tue, 10 Oct 2023 18:17:25 +0000 (18:17 +0000)]
Make it possible to run fileops tests in parallel by making use of a
unique mount point and vnd device.
bluhm [Tue, 10 Oct 2023 16:26:06 +0000 (16:26 +0000)]
pf(4) must not pass packet if state cannot be created.
The behavior of the PFRULE_SRCTRACK and max_states check was
unintentionally changed by commit revision 1.964. If the state was
not created due to some limit had been reached, pf still passed the
packet. Restore the old logic by setting action to pass later,
after the checks. In pf_test_rule() action is initialized to drop.
OK sashan@