jsg [Wed, 15 Aug 2018 02:07:35 +0000 (02:07 +0000)]
add cpuid and msr bits from
'Deep Dive: CPUID Enumeration and Architectural MSRs'
ok deraadt@
cheloha [Tue, 14 Aug 2018 18:13:11 +0000 (18:13 +0000)]
unveil(2) /etc/nologin.txt for reading
ok deraadt
schwarze [Tue, 14 Aug 2018 18:10:09 +0000 (18:10 +0000)]
Improve consistency of the substitution command further.
When the opening square bracket ('[') is abused as the delimiter, the regular
expression contains a bracket expression, and the bracket expression contains
another opening square bracket (sick! - i mean, sic!), then do not require
escaping that innermost bracket and treat a preceding backslash as a literal
backslash character, in accordance with POSIX:
$ printf 'x[x\\x\n' | sed 's[\[[][R[g'
xRx\x
$ printf 'x[x\\x\n' | sed 's[\[\[][R[g'
xRxRx
While here, also make the implementation more readable and insert
some comments.
Joint work with martijn@ (started during g2k18) and OK martijn@.
tb [Tue, 14 Aug 2018 17:59:26 +0000 (17:59 +0000)]
Add a comment that explains what the check is doing and why len >= 1.
Prompted by a remark by jsing
tb [Tue, 14 Aug 2018 17:51:36 +0000 (17:51 +0000)]
The UI_add_{input,verify}_string() functions want a length not including
the terminating NUL. EVP_read_pw_string_min() got this wrong, leading to
a one-byte buffer overrun in all callers of EVP_read_pw_string().
Found by mestre running 'openssl passwd' with MALLOC_OPTIONS including C.
Fix this by doing some basic sanity checking in EVP_read_pw_string_min().
Cap the len argument at BUFSIZ and ensure that min < len as well as
0 <= min and 1 <= len. The last two checks are important as these
numbers may end up in reallocarray().
ok bcook (on previous version), jsing, mestre
deraadt [Tue, 14 Aug 2018 16:43:02 +0000 (16:43 +0000)]
spelling error
jsing [Tue, 14 Aug 2018 16:31:02 +0000 (16:31 +0000)]
Remove now unused variable, that got left behind from a previous change.
jsing [Tue, 14 Aug 2018 16:19:06 +0000 (16:19 +0000)]
Actually check the return values for EVP_Sign* and EVP_Verify*.
ok bcook@ beck@ tb@
cheloha [Tue, 14 Aug 2018 15:25:04 +0000 (15:25 +0000)]
Don't fail by default in the -new case; ok tb jca
nicm [Tue, 14 Aug 2018 11:38:05 +0000 (11:38 +0000)]
Add size to arguments struct too.
nicm [Tue, 14 Aug 2018 11:31:34 +0000 (11:31 +0000)]
Some tidying, use a struct for arguments (there will be more later) and
add a helper function.
mestre [Tue, 14 Aug 2018 06:38:33 +0000 (06:38 +0000)]
Drop unnecessary pledge(2) promises on apm(8):
After we successfully connect to the unix socket created by apmd(8) all actions
occur over fds so we can drop only to pledge("stdio").
The code path in the case that the required action is GETSTATUS, and we couldn't
connect to the socket, then after open(2)/ioctl(2) the device /dev/apm directly
we can pledge("stdio") as well since from here on down we only need to
printf(3) messages.
OK deraadt@
jmatthew [Tue, 14 Aug 2018 05:22:21 +0000 (05:22 +0000)]
return ENOTTY rather than EINVAL to indicate an ioctl hasn't been handled
ok dlg@ deraadt@ kettenis@
schwarze [Tue, 14 Aug 2018 01:26:12 +0000 (01:26 +0000)]
support tail arguments on the .ME and .UE macros,
used for example in the ditroff(7) manual of the groff package
deraadt [Mon, 13 Aug 2018 23:13:02 +0000 (23:13 +0000)]
document new namei flags
deraadt [Mon, 13 Aug 2018 23:12:39 +0000 (23:12 +0000)]
Instead of using BYPASSUNVEIL at NDINIT time, use KERNELPATH to indicate
we want to skip all userland-related checks. Discussed with beck and
semarie, tested by stsp.
deraadt [Mon, 13 Aug 2018 23:11:44 +0000 (23:11 +0000)]
More clear version of previous namei/pledge/chroot solution. namei flag
KERNELPATH indicates this operation is being done on behalf of the kernel,
not a process, so ignore chroot of the current process context, start at /,
and skip unveil and pledge checks. Discussed with beck and semarie
deraadt [Mon, 13 Aug 2018 20:36:35 +0000 (20:36 +0000)]
in sys_statfs(), BYPASSUNVEIL can be passed to NDINIT in the "flags"
argument, rather than manually |= afterwards. Observed by semarie
deraadt [Mon, 13 Aug 2018 20:31:38 +0000 (20:31 +0000)]
The first panic in pledge_namei should only be for ni_pledge == 0
(the other cause is implausible, and crashes with a nice *NULL)
florian [Mon, 13 Aug 2018 16:54:50 +0000 (16:54 +0000)]
Make the owner of fcgi socket configurable.
Andrew Daugherity (andrew.daugherity AT gmail) pointed out that this
is helpful for his port to linux. For example on openSUSE nginx and
Apache run as different users so a compile time default user won't cut
it.
Man page tweaks jmc@
While here, consistently log users at debug level; from Andrew.
schwarze [Mon, 13 Aug 2018 16:37:56 +0000 (16:37 +0000)]
basic macro cleanup, break lines of excessive length, fix order of sections
visa [Mon, 13 Aug 2018 15:26:17 +0000 (15:26 +0000)]
Simplify the startup of the cleaner, reaper and update threads by
passing the main function directly to kthread_create(9). The start_*
functions are mere stepping stones nowadays and can be pruned.
They used to contain more logic in the pre-kthread era.
While here, set `cleanerproc' and `syncerproc' during the thread
creation rather than expect the threads to set the proc pointer.
Also, rename `sched_sync' to `syncer_thread' to reduce confusion
with the scheduler-related functions.
OK kettenis@, deraadt@, mpi@
rob [Mon, 13 Aug 2018 15:22:39 +0000 (15:22 +0000)]
Add more content. Tweaks from ingo. This man page is not yet hooked up to the
build and is still a work in progress. Tweaks and comments welcome.
stsp [Mon, 13 Aug 2018 15:19:52 +0000 (15:19 +0000)]
Add support for band-steering access points to net80211.
Some access points have a feature called "band steering" where they
will try to push clients from 2 GHz channels to 5 GHz channels.
If a client sends probe-requests on both 2 GHz and 5GHz channels, and
then attempts to authenticate on a 2 GHz channel, such APs will deny
authentication and hope that the client will come back on a 5 GHz channel.
So if we fail to AUTH for any reason, and if there is a different
AP with the same ESSID that we haven't tried yet, try that AP next.
Keep trying until no APs are left, and only then continue scanning.
APs with support for this feature were provided by Mischa Peters.
ok phessler@ mpi@
patrick [Mon, 13 Aug 2018 15:15:02 +0000 (15:15 +0000)]
Support CPU frequency scaling on NXP i.MX8M.
ok kettenis@
patrick [Mon, 13 Aug 2018 15:14:27 +0000 (15:14 +0000)]
Support GPIO-based voltage regulators.
ok kettenis@
stsp [Mon, 13 Aug 2018 15:05:31 +0000 (15:05 +0000)]
Prevent iwm(4) from writing back the former BSS channel
if the current BSS has been changed by ieee80211_input().
Needed for upcoming band-steering support in net80211.
ok phessler@ mpi@
mpi [Mon, 13 Aug 2018 14:36:54 +0000 (14:36 +0000)]
Print global IPsec counters.
ok markus@
mpi [Mon, 13 Aug 2018 14:35:29 +0000 (14:35 +0000)]
Make it possible to run pipe(2) and pipe2(2) mostly w/o KERNEL_LOCK():
- Update counters atomatically
- Use IPL_MPFLOOR for pipe's pool.
- Grab the KERNEL_LOCK() before calling km_alloc(9) & km_free(9)
Inputs from kettenis@, ok visa@
mpi [Mon, 13 Aug 2018 14:32:46 +0000 (14:32 +0000)]
Attach to Sierra Wireless MC7304/MC7354 & EM7455, from Denis Lapshin.
mpi [Mon, 13 Aug 2018 14:25:24 +0000 (14:25 +0000)]
regen
mpi [Mon, 13 Aug 2018 14:24:49 +0000 (14:24 +0000)]
Sierra Wireless MC7304/MC7354, from Denis Lapshin.
patrick [Mon, 13 Aug 2018 14:10:26 +0000 (14:10 +0000)]
The iterator i is not the option code, but simply the index for the
array that stores the option codes. Fixes the issue where it named
an incorrect option on error.
Found by Florian Kaiser
ok krw@
anton [Mon, 13 Aug 2018 06:36:29 +0000 (06:36 +0000)]
Add a test covering the recently fixed issue with dangling knote references upon
closing a kqueue file descriptor.
jmc [Mon, 13 Aug 2018 05:54:13 +0000 (05:54 +0000)]
consistent macros;
djm [Mon, 13 Aug 2018 02:41:05 +0000 (02:41 +0000)]
revert compat.[ch] section of the following change. It causes
double-free under some circumstances.
--
date: 2018/07/31 03:07:24; author: djm; state: Exp; lines: +33 -18; commitid: f7g4UI8eeOXReTPh;
fix some memory leaks spotted by Coverity via Jakub Jelen in bz#2366
feedback and ok dtucker@
ccardenas [Sun, 12 Aug 2018 23:50:31 +0000 (23:50 +0000)]
Add administrative options to LACP trunk implementation.
The trunk driver now has a new ioctl (SIOCxTRUNKOPTS), which for now only
has options for LACP:
* Mode - Active or Passive (default Active)
* Timeout - Fast or Slow (default Slow)
* System Priority - 1(high) to 65535(low) (default 32768/0x8000)
* Port Priority - 1(high) to 65535(low) (default 32768/0x8000)
* IFQ Priority - 0 to NUM_QUEUES (default 6)
At the moment, ifconfig only has options for lacpmode and lacptimeout
plumbed as those are the immediate need.
The approach taken for the options was to make them on a "trunk" vs a
"port" as what's typically seen on various NOSes (JunOS, NXOS, etc...)
as it's uncommon for a host to have one link "Passive" and the other
"Active" in a given trunk.
Just like on a NOS, when applying lacpmode or lacptimeout, the settings
are immediately applied to all existing ports in the trunk and to all
future ports brought into the trunk.
Tested by many on a plethora of NIC drivers and switches.
Ok remi@
rob [Sun, 12 Aug 2018 22:04:09 +0000 (22:04 +0000)]
Change ber_write_elements() to return ssize_t instead of int.
ok claudio@
djm [Sun, 12 Aug 2018 20:19:13 +0000 (20:19 +0000)]
better diagnosics on alg list assembly errors; ok deraadt@ markus@
kettenis [Sun, 12 Aug 2018 19:05:37 +0000 (19:05 +0000)]
Drop reference to dmabuf "file" as fnew() returns one that has two
references.
ok visa@, deraadt@
stsp [Sun, 12 Aug 2018 18:33:55 +0000 (18:33 +0000)]
Make ifconfig's -joinlist command work as advertised.
ok deraadt phessler
kettenis [Sun, 12 Aug 2018 18:32:18 +0000 (18:32 +0000)]
Really overwrite the major of com(4) instead of the hardcoded 12.
Should have been part of the earlier commit that unified armv7 and arm64.
mortimer [Sun, 12 Aug 2018 17:15:10 +0000 (17:15 +0000)]
Add retguard macros for arm64 asm and apply them in the straightforward
cases in kernel and libc.
ok deraadt@
mortimer [Sun, 12 Aug 2018 17:07:00 +0000 (17:07 +0000)]
Add retguard for arm64.
ok deraadt@
mortimer [Sun, 12 Aug 2018 16:59:31 +0000 (16:59 +0000)]
Refactor retguard to make adding additional arches easier.
jmc [Sun, 12 Aug 2018 12:40:25 +0000 (12:40 +0000)]
add missing markup;
deraadt [Sun, 12 Aug 2018 02:55:45 +0000 (02:55 +0000)]
Heydar Aliyev, Baku, Azerbaijan is GYD, not BAK
deraadt [Sat, 11 Aug 2018 23:18:39 +0000 (23:18 +0000)]
sync
kettenis [Sat, 11 Aug 2018 22:47:27 +0000 (22:47 +0000)]
Make legacy interrupts work in more cases.
kettenis [Sat, 11 Aug 2018 20:46:48 +0000 (20:46 +0000)]
Use IORT table to map requester ID into MSI sideband data.
krw [Sat, 11 Aug 2018 18:37:21 +0000 (18:37 +0000)]
Nuke stray/pointless 'volatile' for local var.
beck [Sat, 11 Aug 2018 16:16:07 +0000 (16:16 +0000)]
Get rid of PLEDGE_STAT, which was a hack used for unveil.
We use UNVEIL_INSPECT instead in the unveil flags for the same
purpose, and now add traversed vnodes of a path with UNVEIL_INSPECT
instead of with 0 flags and voodoo in unveil_flagmatch. This
allows us to uncontort the logic of unveil_flagmatch a bunch.
helpful review and ok from semarie@
cheloha [Sat, 11 Aug 2018 16:07:36 +0000 (16:07 +0000)]
Refactor the nearly identical benchmark loops into a single loop.
Move all of the benchmark code -- loop initialization, the loops, and
the report printing -- into a new function, benchmark(). Eliminates
lots of duplicate code.
Regressions to 1.20 caught by tb@ and inoguchi@. Tweaked by tb@.
ok tb@, jsing@
kettenis [Sat, 11 Aug 2018 16:04:49 +0000 (16:04 +0000)]
Match "ARMH0011".
kettenis [Sat, 11 Aug 2018 16:02:33 +0000 (16:02 +0000)]
Make GICv3 redistributor support actually work and add ITS support.
deraadt [Sat, 11 Aug 2018 15:43:44 +0000 (15:43 +0000)]
don't need 61 keys anymore
kettenis [Sat, 11 Aug 2018 14:00:33 +0000 (14:00 +0000)]
Bump MAXCPUS from 8 to 24.
ok jsg@
kettenis [Sat, 11 Aug 2018 11:16:43 +0000 (11:16 +0000)]
Fix a couple of bugs in the ITS support code:
- Don't dereference sc_prop if we're not handling an LPI. Fixes a crash
on qemu when emulating a GICv3 without ITS (and therefore no LPIs(.
- Use the true IPL when calculating the priority of an LPI. The old
code used a variable that still had the IPL_MPSAFE flag in it.
- Write to the right GITS_BASERn instead of ialways writing to GITS_BASER0.
- Flush the cache after initializing/modifying the in-memory tables. The
GICv3 on the SynQuacer isn't fully coherent and only supports the
"non-shareable" attribute for its in-memory tables. So we have to flush
the cache to the point of coherency to guarentee that the GIC sees our
changes to those tables. Throw in a full memory barrier for good measure.
Also add support for the SynQuacer pre-ITS.
ok jsg@, patrick@
mestre [Sat, 11 Aug 2018 11:04:26 +0000 (11:04 +0000)]
actually s/unveil/pledge on err(3), I missed it on previous commit.
mestre [Sat, 11 Aug 2018 11:01:37 +0000 (11:01 +0000)]
the only fs access kdump(1) needs is to the tracefile which by default is
ktrace.out unless argument -f is used. We can just unveil(2) that file with read
permissions before the pledge(2) call.
OK deraadt@
mestre [Sat, 11 Aug 2018 11:00:34 +0000 (11:00 +0000)]
look(1) will access /usr/share/dict/words to look for the string we want, or it
may access another file instead if we mention it via argument. In order to know
which file to unveil(2) we need to push down pledge(2) a little bit after
getopt(3) and now that we know the name of the file we can unveil(2) it only
with read permissions.
OK deraadt@
mestre [Sat, 11 Aug 2018 10:59:34 +0000 (10:59 +0000)]
Just like in mesg(1) in biff(1) we just need to push down pledge(2) a little
bit to get the tty name. After this we can unveil(2) the tty with rw access in
order to stat(2)/chmod(2) it, once this is done we can put back the same
pledge(2) just right afterwards.
OK deraadt@
stsp [Sat, 11 Aug 2018 10:58:39 +0000 (10:58 +0000)]
Add comment explaining why we read basic MCS set only from beacon/probereq.
requested by mpi@
mestre [Sat, 11 Aug 2018 10:58:39 +0000 (10:58 +0000)]
this one was my fault, when an error occurrs on mesg(1) it must exit with error
values >1 since the return value 1 is used to indicate that messages have been
disallowed. while here also s/unveil/pledge on err(3).
OK tb@ kn@ deraadt@
kettenis [Sat, 11 Aug 2018 10:42:42 +0000 (10:42 +0000)]
Use MAXCPUS as the number of elements for the array of per-cpu data.
ok jsg@, patrick@
kettenis [Sat, 11 Aug 2018 10:41:08 +0000 (10:41 +0000)]
Use MAXCPUS as the number of elements for the array of per-cpu data.
Fixes machines with more than 8 cores.
ok jsg@, patrick@
benno [Sat, 11 Aug 2018 09:18:49 +0000 (09:18 +0000)]
Fix problems ofthe ifconfig argument parser with "ifconfig <if> join".
Due to the way the parsing works, you cannot have an option that
accepts strings as argument or no argument, without side effects: for
example "join <nwid>" could only join networks that did not have a
nwid identical to another ifconfig option, i.e. "join mtu" or "join
join" would not work.
Solve this by making join always require an nwid. Listing all the
configured nwids for auto-join is moved to the new option "joinlist".
Removing _all_ auto-join configuration is moved to "-joinlist".
deraadt@ likes it and ok phessler@ stsp@
rob [Sat, 11 Aug 2018 04:31:57 +0000 (04:31 +0000)]
Prevent server side overflow for message id in snmp header.
ok sthen@, tb@
schwarze [Fri, 10 Aug 2018 22:12:40 +0000 (22:12 +0000)]
handle the non-portable GNU-style \[charNN], \[charNNN] character
escape sequences, used for example in the groff_char(7) manual page
schwarze [Fri, 10 Aug 2018 20:40:43 +0000 (20:40 +0000)]
The groff man-ext macros define fonts CB, CI, and CR,
and some groff manual pages actually use them in .ft requests.
It's easy enough to handle these .ft requests in mandoc, too.
deraadt [Fri, 10 Aug 2018 20:27:18 +0000 (20:27 +0000)]
sync
deraadt [Fri, 10 Aug 2018 20:27:01 +0000 (20:27 +0000)]
crank to 6.4-beta
jsing [Fri, 10 Aug 2018 17:52:35 +0000 (17:52 +0000)]
Simplify server key exchange signature verification.
Everything can go through the EVP_Verify* code path.
ok inoguchi@ tb@
jsing [Fri, 10 Aug 2018 17:44:16 +0000 (17:44 +0000)]
Simplify server kex exchange signature generation.
Everything can go through the single EVP_Sign* code path.
ok inoguchi@ tb@
jsing [Fri, 10 Aug 2018 17:30:29 +0000 (17:30 +0000)]
Add glue to EVP_md5_sha1() so that it can be used with EVP_Sign* and
EVP_Verify*.
ok tb@
jsing [Fri, 10 Aug 2018 17:28:48 +0000 (17:28 +0000)]
Add missing include to X25519 synopsis.
deraadt [Fri, 10 Aug 2018 17:15:22 +0000 (17:15 +0000)]
In typical swiss-army style, various modes and options cause
different unveils. Joint work with beck and florian.
Let us know if you hit any corner cases.
deraadt [Fri, 10 Aug 2018 17:03:26 +0000 (17:03 +0000)]
delete volatile intended to silence whiny old compilers around vfork.
This variable is only used in the parent context so there is no issue.
ok kettenis
jsing [Fri, 10 Aug 2018 16:43:54 +0000 (16:43 +0000)]
Bump boot loader versions for softraid passphrase handling change.
jsing [Fri, 10 Aug 2018 16:41:35 +0000 (16:41 +0000)]
Retry on incorrect passphrase for softraid crypto boot.
Historically, the softraid crypto support in the boot loaders has only
given one attempt to provide the correct passphrase. There were a
few reasons for this, including the fact that pkcs5_pbkdf2() allows an
empty passphrase and that returning EPERM allowed for another attempt.
With the event of KARL and the need for bsd.booted with hibernate resumption,
this becomes much more of an issue - if you get the passphrase wrong you
fail to resume. There are also other situations like using /etc/boot.conf
to switch serial console, but an incorrect passphrase results in the config
not being read. Also, bcrypt_pbkdf() does not permit empty passphrases.
This reworks the softraid crypto support in the boot loaders so that it
loops requesting a valid passphrase until one is provided, or an empty
passphrase is entered (at which point it will abort).
ok mortimer@ tb@
jsing [Fri, 10 Aug 2018 16:22:58 +0000 (16:22 +0000)]
Run the wycheproof ECDSA test vectors against libcrypto.
Skip the ecdsa_webcrypto_test.json vectors for the time being, as these
likely need some extra glue.
jsing [Fri, 10 Aug 2018 16:18:55 +0000 (16:18 +0000)]
Run the X25519 wycheproof test vectors against libcrypto.
jsing [Fri, 10 Aug 2018 16:14:40 +0000 (16:14 +0000)]
Rework regress so that it is easier to add additional test types.
jsing [Fri, 10 Aug 2018 16:12:19 +0000 (16:12 +0000)]
Use a table rather than a switch when converting strings to NIDs.
This will make it easier to extend.
jsing [Fri, 10 Aug 2018 15:58:16 +0000 (15:58 +0000)]
Add a regress test that checks file descriptor allocation across fork.
In particular, this checks the behaviour of kqueue fds being closed and
reallocated across a fork.
jsing [Fri, 10 Aug 2018 15:53:49 +0000 (15:53 +0000)]
Update fd_freefile when filtering/closing kqueue descriptors in fdcopy().
Prior to r1.153 of kern_descrip.c, the kqueue descriptors were removed
using fdremove(), which reset fd_freefile as appropriate. The new code
simply avoids adding the descriptor to the new table, however this means
that fd_freefile can be left with an incorrect value, resulting in a file
descriptor allocation "hole". Restore the previous behavour by lowering
fd_freefile as appropriate when dropping descriptors.
Issue found via golang regress tests.
ok deraadt@ mpi@ visa@
claudio [Fri, 10 Aug 2018 11:15:53 +0000 (11:15 +0000)]
Another place where we should handle AS_SET better. aspath_lenmatch()
should count through AS_SET boundaries, in other words the path
1 2 3 { 4 3 5 } 3 3 7 has an as-seq count of 4, before it was just 2.
OK benno@
claudio [Fri, 10 Aug 2018 11:13:01 +0000 (11:13 +0000)]
Make the AS_SET handling for source-as even simpler. It is enough to only
extract the rightmost AS of a segment if the segment is not an AS_SET.
Then if we hit the final segment as will contain the last aggregator AS.
This fixes a possible issue with a path like 1 2 3 { 4 5 } { 6 7 } which
should match for source-as 3.
OK benno@
kn [Fri, 10 Aug 2018 09:54:06 +0000 (09:54 +0000)]
Zap bits in host_v4(), use mask parameter
This avoids a duplicate strrchr() call and makes the function consistent
with host_v6() regarding mask handling.
While here, use the destination's size in memcpy instead of hardcoding its
type.
OK sashan
schwarze [Fri, 10 Aug 2018 04:41:21 +0000 (04:41 +0000)]
Implement the roff(7) .nop (no operation) request.
Examples of manual pages (ab)using it
include groff(7), chem(1), groff_mom(7), and groff_hdtbl(7).
dtucker [Fri, 10 Aug 2018 01:35:49 +0000 (01:35 +0000)]
The script that cooks up PuTTY format host keys does not understand
the new key format so convert back to old format to create the PuTTY
key and remove it once done.
djm [Fri, 10 Aug 2018 00:44:01 +0000 (00:44 +0000)]
improve
djm [Fri, 10 Aug 2018 00:42:29 +0000 (00:42 +0000)]
Describe pubkey format, prompted by bz#2853
While I'm here, describe and link to the remaining local PROTOCOL.*
docs that weren't already mentioned (PROTOCOL.key, PROTOCOL.krl and
PROTOCOL.mux)
djm [Fri, 10 Aug 2018 00:27:15 +0000 (00:27 +0000)]
fix numbering
claudio [Thu, 9 Aug 2018 21:12:33 +0000 (21:12 +0000)]
Improve handling of source-as when an AS_SET is rightmost. In that case
use the rightmost AS from the previous AS path segment. As suggested in
rfc6472. Also fix a long standing bug of AS 42 >< 4242 matching 43 - 4241
instead of 1-41 and 4243 and upwards. Last but not least pass the filter_as
struct to as_compare since that will make it easier to implement as-sets.
OK benno@, OK job@ on a previous version
schwarze [Thu, 9 Aug 2018 19:48:44 +0000 (19:48 +0000)]
Drop support for guessing an old-style class A, B, or C netmask from
a bare dot-notation IP address by counting trailing zero octets.
Instead, assume -host when neither -net nor -netmask nor -prefixlen is
given. Error out when -net is requested but no netmask is specified.
This removes the last use of the IN_CLASS* macros from this program.
OK claudio@ kn@, and many agreed with the general direction during g2k18.
mestre [Thu, 9 Aug 2018 17:51:22 +0000 (17:51 +0000)]
The game is playable without the need to access any files therefore we can
effectively disable all fs access by dropping "rpath wpath cpath" from
pledge(2) right at the beginning of the program.
"looks right" tb@
schwarze [Thu, 9 Aug 2018 17:23:21 +0000 (17:23 +0000)]
If somebody asks "man 3 chmod",
don't respond with the lie: "No entry for chmod in the manual."
Instead, say "No entry for chmod in section 3 of the manual."
Came up after a question from kn@; OK kn@.
visa [Thu, 9 Aug 2018 15:02:45 +0000 (15:02 +0000)]
Remove redundant "kq == kn->kn_kq" checks. The lists kq_knhash and
kq_knlist are dedicated to a single kqueue instance, which makes
the filtering by kn_kq unnecessary.
OK kettenis@, mpi@
patrick [Thu, 9 Aug 2018 14:43:17 +0000 (14:43 +0000)]
Hook up the rasops text emulation functions so we only write out
the characters that changed, and only when they change. This
replaces writing out the whole framebuffer every 100ms with a
partial update mechanism. Now the system stays responsive and
does not slow down anymore due to the periodic update.