espie [Sat, 27 May 2023 10:00:48 +0000 (10:00 +0000)]
restore documentation: explain what ArcCheck does
espie [Sat, 27 May 2023 10:00:23 +0000 (10:00 +0000)]
cosmetic/comments improvement
espie [Sat, 27 May 2023 09:59:51 +0000 (09:59 +0000)]
- make the handling of interactive more regular by
delegating the choice of the class to a separate method
- zap/improve meaningless comments
- mark ntogo as a focus for improvements
espie [Sat, 27 May 2023 09:58:26 +0000 (09:58 +0000)]
prepare for 5.36, document methods in base class
jsing [Sat, 27 May 2023 09:18:17 +0000 (09:18 +0000)]
Clean up alignment handling for SHA-512.
This recommits r1.37 of sha512.c, however uses uint8_t * instead of void *
for the crypto_load_* functions and primarily uses const uint8_t * to track
input, only casting to const SHA_LONG64 * once we know that it is suitably
aligned. This prevents the compiler from implying alignment based on type.
Tested by tb@ and deraadt@ on platforms with gcc and strict alignment.
ok tb@
otto [Sat, 27 May 2023 04:33:00 +0000 (04:33 +0000)]
Remove malloc interposition, a workaround that was once needed for emacs
ok guenther@
claudio [Fri, 26 May 2023 14:57:38 +0000 (14:57 +0000)]
Properly account del_extra_files and add the value to the json header.
OK tb@ (from a larger diff)
tb [Fri, 26 May 2023 13:44:05 +0000 (13:44 +0000)]
Move verified_chain from SSL to SSL_HANDSHAKE
This is a better version of the fix for the missing pointer invalidation
but a bit larger, so errata got the minimal fix.
tested by jcs
ok jsing
kn [Fri, 26 May 2023 12:13:26 +0000 (12:13 +0000)]
Remove net lock from DIOC{S,G}ETLIMIT
Grab the pf lock for pf_pool_limits[] in pfsync such that all access is
covered by the pf lock; document accordingly.
Hard memory pool limits don't need the net lock for protection, pool(9)s
have their own internal lock and the pf lock fully covers limit values.
(pf_pool_limits[] access in DIOCXCOMMIT remains under pf *and net* lock
until the rest in there gets pulled out of the net lock.)
OK sashan
kn [Fri, 26 May 2023 11:41:50 +0000 (11:41 +0000)]
simplify yes/no answer handling
ask_yn() returns 0/1 on yes/no, so use the shorter '|| skip' found in
install.sub; no functional change.
OK solene
kurt [Thu, 25 May 2023 19:35:58 +0000 (19:35 +0000)]
Disable witness for mutexes created on the stack which allows
the ddb command 'show witness' to succeed without panicking.
Leaving witness enabled on these mutexes saves a pointer to
struct lock_type on the stack which gets clobbered resulting
in a panic in witness_ddb_display_descendants().
okay miod@
kurt [Thu, 25 May 2023 19:32:34 +0000 (19:32 +0000)]
Work around sparc64 WITNESS kernel failing to load by moving large witness
data structures from bss to be allocated in witness_initialize().
Tested on sparc64, amd64, arm64, i386, octeon. okay miod@
claudio [Thu, 25 May 2023 14:20:25 +0000 (14:20 +0000)]
In session_process_msg() recheck the validity of the rbuf before moving
the remaining data around.
There is an improbable case where a NOTIFICATION is received while also
reaching the MSG_PROCESS_LIMIT. In this case rbuf is NULL when breaking
out of the for loop and hitting this code.
sthen@ is the (un)lucky person to hit that improbable case
OK tb@ sthen@
claudio [Thu, 25 May 2023 12:52:56 +0000 (12:52 +0000)]
Update usage add -P epoch
claudio [Thu, 25 May 2023 12:49:39 +0000 (12:49 +0000)]
Fix repo_cleanup_entry() state machine so that the repository lookups
are done when the full repo path is available. Without this all repo
lookups returned NULL and the code did not work as intended.
OK tb@
op [Thu, 25 May 2023 11:37:58 +0000 (11:37 +0000)]
remove two unused defines
last PROC_COUNT use was removed with the switch to fork+exec by eric@ in
2016, CA_FILE with the removal of cert.c two years ago.
ok tb@, kn@
sthen [Thu, 25 May 2023 09:41:46 +0000 (09:41 +0000)]
After RFC 9110, the IANA services registry now lists both udp and tcp
for https (HTTP/3 over QUIC). Add it to /etc/services so that it's included
when /etc/rc populates sysctl net.inet.udp.baddynamic.
suggested by Renauld Allard, ok tb@
op [Thu, 25 May 2023 07:46:21 +0000 (07:46 +0000)]
Forcibly update the EVP_PKEY's internal key
To aid privilege separation, libtls maintains application-specific data
on the key inside the EVP_PKEY abstraction because the EVP API doesn't
provide a way to do that on the EVP_PKEY itself.
OpenSSL 3 changed behavior of EVP_PKEY_get1_RSA() and related functions.
These now return a struct from some cache. Thus, modifying the RSA will
no longer modify the EVP_PKEY like it did previously, which was clearly
implied to be the case in the older documentation.
This is a subtle breaking change that affects several applications.
While this is documented, no real solution is provided. The transition
plan from one OpenSSL major version to the next one tends to involve
many #ifdef in the ecosystem, and the only suggestion provided by the
new documentation is to switch to a completely unrelated, new API.
Instead, forcibly reset the internal key on EVP_PKEY after modification,
this way the change is picked up also by OpenSSL 3.
Fixes issue 1171 in OpenSMTPD-portable
ok tb@, jsing@
claudio [Thu, 25 May 2023 07:45:33 +0000 (07:45 +0000)]
Do not use wakeup_proc() outside of the sleep machinery. Just use
wakeup_one().
OK mpi@
djm [Wed, 24 May 2023 23:01:06 +0000 (23:01 +0000)]
fix AuthorizedPrincipalsCommand when AuthorizedKeysCommand appears
previously in configuration. Reported by John Meyers in bz3574
ok dtucker@
bluhm [Wed, 24 May 2023 20:31:49 +0000 (20:31 +0000)]
Skip tests if p5-BSD-Socket-Splice is not installed.
naddy [Wed, 24 May 2023 20:04:05 +0000 (20:04 +0000)]
replace "$(cat file)" with the ksh construct "$(<file)"
ok kn@ millert@
op [Wed, 24 May 2023 15:48:11 +0000 (15:48 +0000)]
mark S_ISVTX with Dv in sticky(8); makes `man -k any=S_ISVTX' more useful
ok millert@
millert [Wed, 24 May 2023 14:20:33 +0000 (14:20 +0000)]
ksh: make $(< filename) error output include the errno string.
This is more consistent with how bash, zsh and ksh93 behave and
makes $(< filename) more of a drop-in replacment for $(cat filename).
OK kn@ florian@
bluhm [Wed, 24 May 2023 11:52:30 +0000 (11:52 +0000)]
Default pf rule "block return; pass" interferes with test.
Use "block; pass" instead.
tb [Wed, 24 May 2023 09:57:50 +0000 (09:57 +0000)]
Update X509_VERIFY_PARAM_inherit() to reflect the change of behavior
in x509_vpm.c r1.39.
tb [Wed, 24 May 2023 09:15:14 +0000 (09:15 +0000)]
Copy the verify param hostflags independently of the host list
Without this, hostflags set on the SSL_CTX would not propagate to newly
created SSL. This is surprising behavior that was changed in OpenSSL 1.1
by Christian Heimes after the issue was flagged by Quentin Pradet:
https://bugs.python.org/issue43522
This is a version of the fix that landed in OpenSSL.
There used to be a workaround in place in urllib3, but that was removed at
some point. We haven't fixed this earlier since it wasn't reported. It only
showed up after recent fallout of extraordinarily strict library checking
in urllib3 coming from their own interpretation of the implications of
PEP 644.
ok jsing
tb [Wed, 24 May 2023 08:54:59 +0000 (08:54 +0000)]
Add a test to verify that an SSL inherits the hostflags from the SSL_CTX
This is currently an expected failure that will be fixed shortly.
tb [Wed, 24 May 2023 08:49:06 +0000 (08:49 +0000)]
Provide CRYPTO_INT for statically linking libcrypto for libssl regress
This will be needed for the ssl_verify_param test
tb [Wed, 24 May 2023 08:46:01 +0000 (08:46 +0000)]
Provide X509_VERIFY_PARAM_set_hostflags()
This is needed for an upcoming regress test that needs to access the
hostflag. This is public API in OpenSSL but since nothing seems to be
using this, this accessor will be kept internal-only for the time being.
ok jsing
denis [Tue, 23 May 2023 16:39:29 +0000 (16:39 +0000)]
Force comport initialization for some class of device
Some com@acpi devices will fail the comprobe1() check which can lead to
hang or reboot of the machine.
Input from deraadt@ kettenis@
OK miod@
denis [Tue, 23 May 2023 16:34:01 +0000 (16:34 +0000)]
regen
patrick [Tue, 23 May 2023 14:10:27 +0000 (14:10 +0000)]
Add qcaoss(4), a driver for the Always On Subsystem found on Qualcomm SoCs.
This subsystem typically provides an interface for clocks and regulators
not controlled via RPMH. We will use it to switch the load state of the
ADSP co-processor. Surprisingly, or maybe not, the interface uses ASCII
text that kind of looks like JSON.
ok kettenis@
claudio [Tue, 23 May 2023 13:57:14 +0000 (13:57 +0000)]
Replace ibuf_advance() with ibuf_reserve().
OK tobhe@ tb@ kn@
krw [Tue, 23 May 2023 13:20:31 +0000 (13:20 +0000)]
With the retirement of expert mode, get_fsize(), get_bsize() and
get_cpt() simply set a partition's p_fragblock/p_cpg to default
values. Replace them with a single function set_fragblock().
No functional change.
claudio [Tue, 23 May 2023 13:12:19 +0000 (13:12 +0000)]
Replace ibuf_release() with ibuf_free() since the former just calls the latter
OK kn@ tb@
claudio [Tue, 23 May 2023 12:43:26 +0000 (12:43 +0000)]
There is no need to ibuf_zero() or memset() any buffers.
More cleanup will follow.
OK tobhe@
claudio [Tue, 23 May 2023 12:41:28 +0000 (12:41 +0000)]
Avoid calling malloc with a zero length argument.
ibuf_open() will return an error in this case while ibuf_dynamic() accepts
a 0 len argument and just initialized the buffer and length to zero.
A later ibuf_realloc() call will take care of allocating the buffer.
Additionally switch from malloc() to calloc() when allocating the buffer
this way the buffer is initalized and in ibuf_reserve() an addtional
memset() is used to make sure that the reserved data is zeroed.
OK tb@
tb [Tue, 23 May 2023 11:51:12 +0000 (11:51 +0000)]
Simplify OBJ_obj2txt()
Instead of adding a NUL termination to OBJ_obj2txt(), move the aobj == NULL
or aobj->data == NULL checks to i2t_ASN1_OBJECT_internal(). The only other
caller, i2t_ASN1_OBJECT(), fails on aobj == NULL and aobj->length == 0, and
the latter condition is implied by aobj->data.
Cleaner solution for obj_dat.c r1.52
suggested by/ok jsing
tb [Tue, 23 May 2023 11:06:52 +0000 (11:06 +0000)]
Add empty line for consistency
tb [Tue, 23 May 2023 11:05:09 +0000 (11:05 +0000)]
Add regress coverage for obj_dat.c r1.52
tb [Tue, 23 May 2023 11:04:04 +0000 (11:04 +0000)]
Always NUL terminate buf in OBJ_obj2txt()
OBJ_obj2txt() is often called without error checking and is used for
reporting unexpected or malformed objects. As such, we should ensure
buf is a string even on failure. This had long been the case before it
was lost in a recent rewrite. If obj and obj->data are both non-NULL
this is already taken care of by i2t_ASN1_OBJECT_internal(), so many
callers were still safe.
ok miod
espie [Tue, 23 May 2023 10:02:46 +0000 (10:02 +0000)]
don't pass state, we get them from the progressmeter
kettenis [Tue, 23 May 2023 09:37:49 +0000 (09:37 +0000)]
Add IBT support to the retpoline PLTs. Since we use retpoline PLTs by
default on OpenBSD this will give us IBT support by default. Fixes
indirect function calls for functions in shared libraries.
This doesn't fix retpoline+znow PLTs yet; a fix for that will follow.
ok miod@, guenther@
claudio [Tue, 23 May 2023 09:32:37 +0000 (09:32 +0000)]
Don't use ibuf_open(0) as test. 0 lenght ibufs make little sense and
result in a malloc(0) call which is no bueno. Use ibuf_open(1) instead.
OK miod@
jan [Tue, 23 May 2023 09:16:16 +0000 (09:16 +0000)]
New counters for LRO packets from hardware TCP offloading.
With tweaks from patrick@ and bluhm@.
OK bluhm@
tb [Tue, 23 May 2023 06:55:31 +0000 (06:55 +0000)]
cms_asn1.c: zap stray tabs
tb [Tue, 23 May 2023 06:42:08 +0000 (06:42 +0000)]
Convert ASN1_INTEGER_get() to ASN1_INTEGER_get_uint64()
The former is broken by design and should not be used. The latter allows
for unambiguous error checking. Add a few casts to print uint64_t without
the PRIu64 monstrosity.
ok claudio
tb [Tue, 23 May 2023 06:39:31 +0000 (06:39 +0000)]
Simplify as_id_parse() using ASN1_INTEGER_get_uint64()
Instead of decoding an ASN1_INTEGER by hand because ASN1_INTEGER_get()
is broken by design and would report an error on LP32 architectures for
the reserved ASid UINT32_MAX, we can simplify this ugliness and use the
ASN1_INTEGER_get_uint64() API, available since LibreSSL 3.6.
ok claudio
kn [Mon, 22 May 2023 23:32:31 +0000 (23:32 +0000)]
Drop unused md_prep_fdisk() argument in disk crypto question handler
It takes just one, the disk; the second snuck from earlier development into
the intial r1.1231 commit.
tb [Mon, 22 May 2023 19:38:04 +0000 (19:38 +0000)]
Remove misplaced semicolons in .Fa
bluhm [Mon, 22 May 2023 16:08:34 +0000 (16:08 +0000)]
Fix TSO for traffic to a local address on a physical interface.
When sending TCP packets with software TSO to the local address of
a physical interface, the TCP checksum was miscalculated. As the
small MSS is taken from the physical interface, but the large MTU
of the loopback interface is used, large TSO packets are generated,
but sent directly to the loopback interface. There we need the
regular pseudo header checksum and not the modified without packet
length.
To avoid this confusion, use the same decision for checksum generation
in in_proto_cksum_out() as for using hardware TSO in tcp_if_output_tso().
bug reported and tested by robert@ bket@ Hrvoje Popovski
OK claudio@ jan@
tb [Mon, 22 May 2023 15:20:16 +0000 (15:20 +0000)]
Bye, bye, horrible reacharounds into libcrypto
Now that rpki-client no longer uses LibreSSL-specific ASN1_time_* API,
we can get rid of some of the gross hacks needed for testing against
OpenSSL in regress. This simplifies things greatly.
Unfortunately, the unistd.h hack needs to stay until someone unearths
their STACK_OF compat diffs.
tb [Mon, 22 May 2023 15:15:25 +0000 (15:15 +0000)]
Convert generalizedtime_to_tm() to ASN1_TIME_to_tm()
Second step of moving away from ASN1_time_parse(). Being an OpenSSL API,
ASN1_TIME_to_tm() supports a variety of things. In this specific case we
don't really want it to parse anything but a GeneralizedTime expressed in
Zulu time. Unfortunately, OpenSSL make this annoying. So punt on this and
only do checks for the correct type and length. LibreSSL only accepts Zulu
time, so there is no change of behavior.
ok claudio job
tb [Mon, 22 May 2023 15:07:02 +0000 (15:07 +0000)]
Convert x509_get_time() to ASN1_TIME_to_tm()
Instead of using the LibreSSL-specific ASN1_time_parse(), we can use
OpenSSL's ASN1_TIME_to_tm() which LibreSSL provides since 3.6.0. The
latter has a few API quirks such as silently falling back to being a
timegm() replacement if called with a NULL ASN1_TIME. We don't want
that, so just return an error instead.
rpki-client portable now needs LibreSSL >= 3.6. This is a small price
to pay for rather significant smiplifications in regress and portable
(which will be possible after the next commit).
Also adjust a couple of error strings.
ok claudio job
tb [Mon, 22 May 2023 14:56:00 +0000 (14:56 +0000)]
Avoid use of LibreSSL-specific ASN1_time_tm_cmp() API
We convert these struct tm into time_t in the next few lines, so we can
simply use > instead.
ok claudio job
denis [Mon, 22 May 2023 13:23:56 +0000 (13:23 +0000)]
Add EPYC Embedded 3000 10GbE NIC
Input by sthen@
OK miod@
tobhe [Mon, 22 May 2023 12:53:04 +0000 (12:53 +0000)]
Remove unused variable kerr.
ok bluhm@
bluhm [Mon, 22 May 2023 12:37:00 +0000 (12:37 +0000)]
Remove duplicate entries in kvars.
OK tobhe@
espie [Mon, 22 May 2023 12:05:57 +0000 (12:05 +0000)]
gc unused/old code
kn [Mon, 22 May 2023 09:29:54 +0000 (09:29 +0000)]
fix usage, name arg is optional
jmatthew [Mon, 22 May 2023 05:59:05 +0000 (05:59 +0000)]
Keep trying LDAP servers until we get full results from one, rather than
just until one accepts the TCP connection. In multi server environments,
this makes ypldap more resilient when some servers are misbehaving.
While here, add the server address to log messages relating to connection
errors to make it easier to identify which server is failing.
ok tb@
guenther [Mon, 22 May 2023 00:39:57 +0000 (00:39 +0000)]
The fp_ex_[st]w struct savefpu members were inherited from NetBSD where
they're used in the 32bit-compat support, which we dropped years ago.
Bye bye!
ok deraadt@
guenther [Mon, 22 May 2023 00:37:19 +0000 (00:37 +0000)]
NENTRY() doesn't provide an endbr64, so give memmove one in
case it ever gets called through a function pointer (with retpoline
disabled)
ok deraadt@
krw [Sun, 21 May 2023 17:29:33 +0000 (17:29 +0000)]
If an MBR partition start or end can be represented by CHS, set
both CHS and LBA values in the MBR partition.
Restores pre-7.0 initialization of MBR partition start/end, using
slightly less opaque code that retains the slightly different
initialization required by GPT protective MBR's.
Fixes booting from disks >8G on systems where the BIOS uses CHS.
Encountered by Paul de Weerd on his Alix.2 using BIOS 0.99.
Much diagnosis and testing by Paul of various iterations. Thanks!
krw [Sun, 21 May 2023 17:04:22 +0000 (17:04 +0000)]
Typo in comment. 'parititon' -> 'partition'.
espie [Sun, 21 May 2023 16:50:50 +0000 (16:50 +0000)]
missed one
espie [Sun, 21 May 2023 16:07:35 +0000 (16:07 +0000)]
move the interface to SharedLibs to be somewhat object oriented
accordingly, load it "just in time" in State.
Most calls get simplified, and we can save more state for later.
espie [Sun, 21 May 2023 13:44:56 +0000 (13:44 +0000)]
document how this is used... There's nothing that actually uses the
export part, and be explicit about how we call code refs.
espie [Sun, 21 May 2023 13:44:21 +0000 (13:44 +0000)]
"fix" for 5.36: pass the possible option value as an extra param
instead of defined/undefined, so that the code sub is called with
the right number of parameters.
claudio [Sun, 21 May 2023 12:47:54 +0000 (12:47 +0000)]
In sysctl_hwchargestop() check that hw_battery_setchargestop is set
and not hw_battery_setchargestart.
OK kettenis@
espie [Sun, 21 May 2023 08:06:03 +0000 (08:06 +0000)]
v5.36, trivial move
jmc [Sun, 21 May 2023 05:11:38 +0000 (05:11 +0000)]
zap extra word and some hyphens; ok guenther
kn [Sat, 20 May 2023 20:00:28 +0000 (20:00 +0000)]
typofix message in previous
kn [Sat, 20 May 2023 19:10:25 +0000 (19:10 +0000)]
Ask for disk crypto after root disk question
Encrypt the root disk? (disk, no or '?' for details) [no]
Which disk is the root disk? ('?' for details) [sdN]
becomes
Which disk is the root disk? ('?' for details) [sd0]
Encrypt the root disk? (yes, no or '?' for details) [no]
so that answering 'sd0' at this point during installation behaves the same
as before the new question: specifying the root disk.
Users no longer deal with two (softraid chunk sd0, root disk sd1), but just
one disk as before, while sdN are dealt with transparently.
Code also gets simpler and should enable more improvements soon.
Feedback OK afresh1
tb [Sat, 20 May 2023 16:00:22 +0000 (16:00 +0000)]
ecdhtest: Fix indent
tb [Sat, 20 May 2023 15:57:40 +0000 (15:57 +0000)]
Remove a space that I thought I had already deleted.
Makes mandoc -Tlint happier
krw [Sat, 20 May 2023 15:16:47 +0000 (15:16 +0000)]
p_fragblock = DISKLABELV1_FFS_FRAGBLOCK(0, 0) sets p_fragblock to
0. Just use p_fragblock = 0 as in all other initializations of
p_fragblock.
No functional change.
mpi [Sat, 20 May 2023 12:48:36 +0000 (12:48 +0000)]
Do not grab the `vmmaplk' recursively, prevent a self-deadlock.
Change the semantic of vm_map_busy() to be able to completely unlock the
`vmmaplk' instead of downgrading it to a read lock in mlock(2). This is
necessary because uvm_fault_wire() tries to re-grab the same lock.
We now keep track of the thread currently holding the vmmap busy to ensure
it can relock & unbusy the vmmap. The new pattern becomes:
....vm_map_lock(map);
....vm_map_busy(map); /* prevent other threads to grab an exclusive lock */
....vm_map_unlock(map);
....
..../*
.... * Do some stuff generally requiring a tsleep(9).
.... */
....
....vm_map_lock(map);
....vm_map_unbusy(map); /* allow other threads to make progress after unlock */
....vm_map_unlock(map);
Fix adapted from NetBSD's r1.249 of uvm/uvm_map.c. Issue reported by
Jacqueline Jolicoeur exposed by a "wallet refresh" of the Monero App.
Panic hand-copied below:
sleep_finish()
rw_enter()
uvmfault_lookup()
uvm_fault_check()
uvm_fault()
uvm_fault_wire()
uvm_map_pageable_wire()
sys_mlock()
This version skips bumping the map's timestamp if the lock is acquired by the
thread marked the VM map busy. This prevents a KASSERT() reported by bluhm@
triggered by regress/misc/posixtestsuite conformance/interfaces/mmap/18-1
ok kettenis@
tb [Sat, 20 May 2023 12:07:21 +0000 (12:07 +0000)]
Add a slow regress target that runs openssl speed with proper alignment
and with an unaligned offset. Let's see if all ciphers on our strict
alignment arches can deal with this.
tb [Sat, 20 May 2023 12:03:02 +0000 (12:03 +0000)]
openssl speed: add an '-unaligned n' option
All hashes and ciphers covered by speed should be able to handle unaligned
input and output. The buffers used in openssl speed are well aligned since
they are large, so will never exercise the more problematic unaligned case.
I wished something like this was available on various occasions. It would
have been useful to point more easily at OpenSSL's broken T4 assembly.
Yesterday there were two independent reasons for wanting it, so I sat down
and did it. It's trivial: make the allocations a bit larger and use buffers
starting at an offset inside these allocations. Despite the trivality, I
managed to have a stupid bug. Thanks miod.
discussed with jsing
ok miod
kettenis [Sat, 20 May 2023 12:02:46 +0000 (12:02 +0000)]
Implement battery charge control.
ok patrick@
tb [Sat, 20 May 2023 11:44:15 +0000 (11:44 +0000)]
openssl speed: minor style nits
This drops a bunch of unnecessary parentheses, makes the strcmp()
checks consistent and moves some "}\n\telse" to "} else".
Makes an upcoming commit smaller
espie [Sat, 20 May 2023 09:30:57 +0000 (09:30 +0000)]
Don't bother setting the effective group, it doesn't affect file creation
on a BSD system anyhow (duh moment, thx semarie@)
tb [Sat, 20 May 2023 05:42:57 +0000 (05:42 +0000)]
openssl speed: remove binary curve remnants
This wasn't properly hidden under OPENSSL_NO_EC2M, and all it does now
is producing ugly errors and useless "statistics". While looking at this,
I found that much of speed "has been pilfered from [Eric A. Young's]
libdes speed.c program". Apparently this was an precursor and ingredient
of SSLeay. Unfortunately, it seems that this piece of the history is lost.
ok miod
PS: If anyone is bored, a rewrite from scratch of the speed 'app' would
be a welcome contribution and may be an instructive rainy day project.
The current code was written in about the most stupid way possible so as
to maximize fragility and unmaintainability.
patrick [Fri, 19 May 2023 21:26:09 +0000 (21:26 +0000)]
Add qcsmptp(4), a driver to share 32-bit values between (co-)processors.
The inbound path is typically used as interrupt controller, e.g. to handle
handover and ready interrupts when a remoteproc boots. The outbound path
seems to be used to stop cores, but we don't do that yet.
ok kettenis@
patrick [Fri, 19 May 2023 21:15:16 +0000 (21:15 +0000)]
Have mainbus attach nodes under /reserved-memory, so that qcsmem(4) shows
up.
ok kettenis@ drahn@
patrick [Fri, 19 May 2023 21:13:49 +0000 (21:13 +0000)]
Add qcsmem(4), a driver for the shared memory table on Qualcomm SoCs
used to establish data communication channels with co-processors.
ok kettenis@ drahn@
patrick [Fri, 19 May 2023 20:54:55 +0000 (20:54 +0000)]
Clear interrupt before executing the interrupt handler as we otherwise
risk losing an interrupt for the same pin. This can happen when a second
interrupt occurs between the interrupt handler's execution and us clearing
the interrupt.
ok kettenis@
guenther [Fri, 19 May 2023 18:43:16 +0000 (18:43 +0000)]
uvm_coredump(9) was removed in 2015 (commitid dNPv28CJI5BxtRGW) as
real processes have been dumped using uvm_coredump_walkmap(9) since
2009-03-05Z19:52:24. Document the current API.
tb [Fri, 19 May 2023 17:31:20 +0000 (17:31 +0000)]
Add missing rsa_security_bit() handler to the RSA-PSS ASN1_METHOD
Prompted by a report by Steffen Ullrich on libressl@openbsd.org
ok jsing
op [Fri, 19 May 2023 15:18:06 +0000 (15:18 +0000)]
fix markup for `maildir' in smtpd.conf(5)
pathname and junk are both optional, but indipendently so.
ok aisha, millert
nicm [Fri, 19 May 2023 07:46:34 +0000 (07:46 +0000)]
Add format for server_sessions, from Magnus Gross.
espie [Fri, 19 May 2023 07:37:11 +0000 (07:37 +0000)]
make Paths fully OO, as it makes some things simpler
espie [Fri, 19 May 2023 07:30:40 +0000 (07:30 +0000)]
this parameter does not exist
espie [Fri, 19 May 2023 07:25:16 +0000 (07:25 +0000)]
remove indirect calls
guenther [Fri, 19 May 2023 01:12:23 +0000 (01:12 +0000)]
Since waitid(2) shares code with wait4(2) and doesn't expose any
non-trivial new information or code-paths over wait4(), include
it in pledge("stdio")
discussed with deraadt@
guenther [Fri, 19 May 2023 01:04:39 +0000 (01:04 +0000)]
Move tcp_info structure to be under '#if __BSD_VISIBLE' to repair
compliance with POSIX/SUS restrictions on <netinet/tcp.h>
ok bluhm@
ports testing and ok sthen@
deraadt [Fri, 19 May 2023 00:54:27 +0000 (00:54 +0000)]
backout alignment changes (breaking at least two architectures)
millert [Thu, 18 May 2023 18:29:28 +0000 (18:29 +0000)]
user: handle paths with whitespace / metacharacters
Use execv(3) instead of system(3) to run external commands.
This avoids problems with whitespace and shell metacharacters
in path names. OK op@