tb [Sun, 18 Dec 2022 12:31:57 +0000 (12:31 +0000)]
acme-client: check EC signature length
Make sure the size_t containing EC signature length is not truncated
when passing it to d2i_ECDSA_SIG() as a long. This won't happen, but
documents API quirks...
requested by jsing
tb [Sun, 18 Dec 2022 12:27:58 +0000 (12:27 +0000)]
acme-client: simplify elliptic curve signatures
We can get the correct size of the signature using EVP_PKEY_bits() which
uses the order instead of the (strictly speaking incorrect) degree. Grab
the (r, s) out of the ECDSA signature with ECDSA_SIG_get0_{r,s}(), which
is a saner interface than EVP_SIG_get0(). Finally, do the zero padding
using BN_bn2binpad() which is simpler than the currently rather fiddly
solution.
ok jsing
tb [Sun, 18 Dec 2022 12:22:30 +0000 (12:22 +0000)]
acme-client: switch op_sign() to EVP_DigestSign()
EVP_DigestSign() is a bit more ergonomic than the old EVP_Sign* family,
it takes size_t instead of int and and it also allows allocating the
memory needed instead of relying on some weird estimate. This again gets
rid of a few stupid else if.
ok jsing
tb [Sun, 18 Dec 2022 12:13:11 +0000 (12:13 +0000)]
acme-client: simplify op_thumbprint()
We can EVP_Digest() into an array on the stack rather than doing a long
dance and song with lots of ugly else if.
ok jsing
tb [Sun, 18 Dec 2022 12:08:49 +0000 (12:08 +0000)]
acme-client: inline a confusing and useless define
tb [Sun, 18 Dec 2022 12:04:55 +0000 (12:04 +0000)]
acme-client: encode unexpected SANs before printing
If a SAN isn't configured, it could be anything, so make printing it safe
using strvisx(). If it is configured but duplicate, printing it should be
fine, so don't bother. This removes two XXX added in the previous commit.
ok florian
kettenis [Sun, 18 Dec 2022 10:29:53 +0000 (10:29 +0000)]
regen
kettenis [Sun, 18 Dec 2022 10:29:28 +0000 (10:29 +0000)]
Add Union Memory NVMe devices.
ok jsg@
mglocker [Sun, 18 Dec 2022 10:00:53 +0000 (10:00 +0000)]
Disable the keyboard on the Samsung Galaxy Book Go until we can fix the
resulting interrupt storm. It's causing bad system performance, and breaks
the installer.
kn [Sun, 18 Dec 2022 05:51:14 +0000 (05:51 +0000)]
Do not try to create physical interfaces
vifscreate() always creates all virtual interfaces up-front.
To check whether a given interface exists, ifstart() uses ifcreate()
which tries to create nonexistent ones.
Virtual ones are guaranteed to be present and physical ones cannot be
created, so replace the ifcreate() call with a simpler ifconfig test and
clarify the comment.
OK martijn afresh1
tb [Sun, 18 Dec 2022 00:22:07 +0000 (00:22 +0000)]
Use volatile sig_atomic_t for flag set in signal handler
tb [Sat, 17 Dec 2022 23:41:29 +0000 (23:41 +0000)]
Switch to using BN_zero() instead of BN_zero_ex()
tb [Sat, 17 Dec 2022 22:31:10 +0000 (22:31 +0000)]
Move benchmark target up a bit and mark it phony
tb [Sat, 17 Dec 2022 22:30:39 +0000 (22:30 +0000)]
Zap some whitespace
tb [Sat, 17 Dec 2022 22:23:31 +0000 (22:23 +0000)]
Merge documentation of UI_null() from OpenSSL 1.1
jsing doesn't like it, but it's better than nothing.
ok jsing
schwarze [Sat, 17 Dec 2022 22:21:24 +0000 (22:21 +0000)]
Document BIO_set_flags(3), BIO_clear_flags(3), BIO_test_flags(3),
and BIO_get_flags(3).
tb [Sat, 17 Dec 2022 22:01:29 +0000 (22:01 +0000)]
Link ui_null.c to build
tb [Sat, 17 Dec 2022 21:59:39 +0000 (21:59 +0000)]
Prepare to provide UI_null()
xmlsec needs this, nothing else. Our linkers link libxmlsec1-openssl,
only warns and since nothing uses this library in ports, this wasn't
noticed for a long time.
Reported by Thomas Mitterfellner
ok jsing
deraadt [Sat, 17 Dec 2022 19:59:03 +0000 (19:59 +0000)]
sync
jsing [Sat, 17 Dec 2022 17:18:46 +0000 (17:18 +0000)]
Provide regress coverage for BN shift functions.
Provide regress coverage for BN_lshift1(), BN_rshift1(), BN_lshift() and
BN_rshift(), along with basic benchmarking functionality (run via
'make benchmark').
jsing [Sat, 17 Dec 2022 16:05:28 +0000 (16:05 +0000)]
Revise cipher list regress coverage of SSL_set_security_level().
A SSL_set_security_level() call was added to the cipher list regress, which
expects a failure - however, it should succeed and fails for a completely
unrelated reason. Rework this regress so that it actually passes and tests
for the expected behaviour.
jsing [Sat, 17 Dec 2022 15:56:25 +0000 (15:56 +0000)]
Provide BN_zero()/BN_one() as functions and make BN_zero() always succeed.
BN_zero() is currently implemented using BN_set_word(), which means it can
fail, however almost nothing ever checks the return value. A long time
ago OpenSSL changed BN_zero() to always succeed and return void, however
kept BN_zero as a macro that calls a new BN_zero_ex() function, so that
it can be switched back to the "can fail" version.
Take a simpler approach - change BN_zero()/BN_one() to functions and make
BN_zero() always succeed. This will be exposed in the next bump, at which
point we can hopefully also remove the BN_zero_ex() function.
ok tb@
jmc [Sat, 17 Dec 2022 14:53:16 +0000 (14:53 +0000)]
add arch to Dt;
tb [Sat, 17 Dec 2022 13:53:38 +0000 (13:53 +0000)]
acme-client: fix SAN-handling insanity
The revoke process, which does a lot more than revoking a cert, wants to
know the SANs in the cert to be revoked or renewed and check them against
the ones configured in the config file.
To find out which ones are, it prints the SAN extension to a BIO using
X509V3_EXT_print(), slurps that into a buffer, tokenizes the undocumented
output string and plucks out the "DNS:" names. This is reminiscent of
node's hilarious CVE-2021-44532 and on about the same level of crazy, but
fortunately not security relevant.
Get the SAN extension as a GENERAL_NAMES from libcrypto, then we have an
actual data structure to work with, which allows us to access the DNS names
without problems. This simplifies things quite a bit, but the actual logic
in this file remains unmodified. Be careful about ASN1_IA5STRINGs and do
not assume they are C strings.
Tested by florian, millert, Renaud Allard, thanks!
ok florian jsing
kn [Sat, 17 Dec 2022 13:45:00 +0000 (13:45 +0000)]
regen after minherit(2) unlock
kn [Sat, 17 Dec 2022 13:42:59 +0000 (13:42 +0000)]
Unlock minherit(2)
struct uvm_map's .addr is protected by the map's lock and .{min,max}_offset
are immutable.
uvm_map_inherit() locks the VM map upon entry, sets the desired inheritance
mode for the given address range (validated outside the lock) and unlocks
the map itself.
fork(2), i.e. uvm_mapent_forkcopy(), first locks both old and new maps and
then copies entries over as per the inheritance type.
futex(2), another user of struct vm_map_entry's .inheritance member, also
locks the map accordingly.
OK mpi
tb [Sat, 17 Dec 2022 12:48:53 +0000 (12:48 +0000)]
X509_check_purpose.3: incorporate feedback from jsing
kettenis [Sat, 17 Dec 2022 12:02:00 +0000 (12:02 +0000)]
aplefuse(4)
kettenis [Sat, 17 Dec 2022 11:56:44 +0000 (11:56 +0000)]
Add aplefuse(4), a driver for the eFuses on Apple Silicon SoCs.
ok patrick@
kettenis [Sat, 17 Dec 2022 11:54:32 +0000 (11:54 +0000)]
Make nvmem_read_cell() and nvmem_write_cell() work for hardware that
requires word-sized access.
ok patrick@
schwarze [Fri, 16 Dec 2022 23:56:57 +0000 (23:56 +0000)]
In bio.h rev. 1.54, jsing@ and tb@ provided BIO_callback_fn_ex(3),
BIO_set_callback_ex(3), BIO_get_callback_ex(3), and BIO_callback_fn(3).
Document them, in part by merging from the OpenSSL 1.1.1 branch,
which is still under a free license,
but heavily tweaked by me, in particular:
* mention that BIO_set_callback_arg(3) is misnamed;
* keep our more detailed explanation of the "ret" argument;
* make the list of callback invocations more readable;
* and update the HISTORY section.
patrick [Fri, 16 Dec 2022 18:08:08 +0000 (18:08 +0000)]
qcpdc(4)'s establish routine needs to return the wrapped cookie, not the
cookie it received from establishing the interrupt.
tb [Fri, 16 Dec 2022 18:02:28 +0000 (18:02 +0000)]
Document extension caching of X509_check_purpose()
The overwhelming majority of callers of X509_check_purpose() in our tree
pass a purpose of -1. In this case X509_check_purpose() acts as a wrapper
of x509v3_cache_extensions() which makes sanity checks like non-negativity
of ASN.1 integers or canonicity of RFC 3779 extensions as well as checking
uniqueness of extensions.
from schwarze who beat an initial diff of mine into shape
kn [Fri, 16 Dec 2022 17:57:39 +0000 (17:57 +0000)]
zap double space and needless line break
tb [Fri, 16 Dec 2022 17:47:34 +0000 (17:47 +0000)]
drop a total of 93 trailing spaces from three lines
schwarze [Fri, 16 Dec 2022 16:02:17 +0000 (16:02 +0000)]
add a CAVEATS section warning the user to not create cycles;
OK tb@
cheloha [Fri, 16 Dec 2022 15:54:27 +0000 (15:54 +0000)]
top(1): always recount number of online CPUs
If hw.smt is toggled while top(1) is running in "combined" mode the
CPU count on the CPU state line is incorrect.
We always need to recount the number of online CPUs.
stsp [Fri, 16 Dec 2022 13:49:35 +0000 (13:49 +0000)]
Prevent KASSERT in iwm(4) if firmware image is missing or corrupt.
Same fix as for iwx(4) in CVS commit YakAvDYHWiUF3c4m, r1.113 if_iwx.c.
ok deraadt, mpi
schwarze [Fri, 16 Dec 2022 13:41:55 +0000 (13:41 +0000)]
Revert BIO_push(3) cycle prevention (bio_lib.c rev. 1.42).
jsing@ worries that cycle prevention might increase risk because
software that is not checking return values (and indeed, not checking
is likely common in practice) might silently behave incorrectly
with cycle prevention whereas without, it will likely either crash
right away through infinite recursion or at least hang in an infinite
loop when trying to use the cyclic chain, in both cases making it
likely that the bug will be found and fixed.
Besides, tb@ points out that BIO_set_next(3) ought to behave as
similarly as possible to BIO_push(3), but adding cycle prevention
to BIO_set_next(3) would be even less convincing because that
function does not provide a return value, encouraging users to
expect that it will always succeed. While a safe idiom for checking
the success of BIO_set_next(3) could easily be designed, let's be
realistic: application software would be highly unlikely to pick up
such an idiom.
jca [Fri, 16 Dec 2022 12:06:23 +0000 (12:06 +0000)]
Downgrade riscv64-specific LTO error to a warning
Error happens when mixing some PIC and non-PIC code in an LTO build/link
ld: error: linking module flags 'SmallDataLimit': IDs have conflicting values in '<REDACTED>.o' and 'ld-temp.o'
and affects a few ports now. Issue reported upstream where the proposed
fix uses llvm::Module::Min, which we don't have and would require
a backport. For now, work around this issue by downgrading to
a warning, which should have the intended effect in most cases (use the
value of the first module, which is smaller than the defaults value used
by ld-temp.o).
ok kettenis@
nicm [Fri, 16 Dec 2022 08:22:05 +0000 (08:22 +0000)]
Do not escape tabs in output (iTerm2 needs them). GitHub issue 3414.
nicm [Fri, 16 Dec 2022 08:19:58 +0000 (08:19 +0000)]
Make U+FE0F VARIATION SELECTOR-16 change the width from 1 to 2. GitHub
issue 3409.
nicm [Fri, 16 Dec 2022 08:13:40 +0000 (08:13 +0000)]
Add send-keys -K to handle keys directly as if typed (so look up in key
table). GitHub issue 3361.
djm [Fri, 16 Dec 2022 07:13:22 +0000 (07:13 +0000)]
Mention that scp uses the SFTP protocol and remove reference to
legacy flag. Spotted by, feedback and ok jmc@
djm [Fri, 16 Dec 2022 06:56:47 +0000 (06:56 +0000)]
Clear signal mask early in main(); sshd may have been started with
one or more signals masked (sigprocmask(2) is not cleared on fork/exec)
and this could interfere with various things, e.g. the login grace timer.
Execution environments that fail to clear the signal mask before running
sshd are clearly broken, but apparently they do exist.
Reported by Sreedhar Balasubramanian; ok dtucker@
jmc [Fri, 16 Dec 2022 06:52:48 +0000 (06:52 +0000)]
add -X to usage();
afresh1 [Fri, 16 Dec 2022 04:04:25 +0000 (04:04 +0000)]
Prioritize lladdr over name/unit in hostname.if processing
When needed, lladdr is more precise and enduring.
Suggested by deraadt@
Many improvments and OK kn@
djm [Fri, 16 Dec 2022 03:40:03 +0000 (03:40 +0000)]
add a -X option to both scp(1) and sftp(1) to allow control over
some SFTP protocol knobs: the copy buffer length and the number of
inflight requests, both of which are used during upload/download.
Previously these could be controlled in sftp(1) using the -b/-R options.
This makes them available in both SFTP protocol clients using the same
option character sequence.
ok dtucker@
deraadt [Fri, 16 Dec 2022 03:14:52 +0000 (03:14 +0000)]
delete // debug comment chunks. If anyone wants to debug ld.so and runs
into a mimmutable related concern, you want to undo this revision to get
this debug back. I do not consider this suitable for hiding behind a
cpp macro.
dlg [Fri, 16 Dec 2022 02:05:44 +0000 (02:05 +0000)]
always keep pf_state_keys attached to pf_states.
pf_state structures don't contain ip addresses, protocols, ports,
etc. that information is stored in a pf_state_key struct, which is
used to wire a state into the state table. when things like pfsync
or the pf state ioctls want to export information about a state,
particularly the addresses on it, they needs the pf_state_key struct
to read from.
before this diff the code assumed that when a state was removed
from the state tables it could throw the pf_state_key structs away
as part of that removal. this code changes it so once pf_state_insert
succeeds, a pf_state will keep its references to the pf_state_key
structs until the pf_state struct itself is being destroyed.
this allows anything that holds a reference to a pf_state to also
look at the pf_state_key structs because they're now effectively
an immutable part of the pf_state struct.
this is by far the simplest and most straightforward fix for pfsync
crashing on pf_state_key dereferences we've come up with so far.
it has been made possible by the addition of reference counts to
pf_state and pf_state_key structs, which allows us to properly
account for this adjusted lifecycle for pf_state_keys on pf_state
structs.
sashan@ and i have been kicking this diff around for a couple of
weeks now.
ok sashan@ jmatthew@
millert [Thu, 15 Dec 2022 19:36:45 +0000 (19:36 +0000)]
priv_validgroup: do not read more than IF_NAMESIZE chars of name
Store the length locally instead of computing it multiple times.
OK dv@, previous version OK deraadt@
deraadt [Thu, 15 Dec 2022 18:20:39 +0000 (18:20 +0000)]
The idiomatic way of coping with signed char vs unsigned char (which
did not come from stdio read functions) in the presence of ctype
macros, is to always cast to (unsigned char). casting to (int) for
a "macro" which is documented to take int, is weird. And sadly wrong,
because of the sing extension risk..
same diff from florian
tb [Thu, 15 Dec 2022 17:36:56 +0000 (17:36 +0000)]
acme-client: use timegm() instead of mktime()
Times in certificates are all expressed in Zulu time, so calling the time
zone dependent mktime() on such a time and comparing it to time(NULL) is
wrong.
This means that the check of at least 30 days validity and deciding on
whether to renew or not might have been off by by half a day depending on
where you are. That should not matter since you (or cron) are supposed to
run acme-client way more often than once a month.
ok claudio millert
schwarze [Thu, 15 Dec 2022 17:20:48 +0000 (17:20 +0000)]
In curve25519.h rev. 1.4 to 1.7, tb@ and jsing@ provided
ED25519_keypair(3), ED25519_sign(3), and ED25519_verify(3).
Document them.
tb [Thu, 15 Dec 2022 16:59:04 +0000 (16:59 +0000)]
acme-client: use ASN1_TIME_to_tm()
There is a hand-rolled, only minimally checked implementation converting
an ASN1_TIME into a struc tm. beck has invested a lot of time improving
the time parsing inside libcrypto, so make use of that. That code is safer,
better vetted and more correct.
ok florian
dv [Thu, 15 Dec 2022 16:01:40 +0000 (16:01 +0000)]
Add explicit casts to ctype functions in vmd(8).
OK millert@
claudio [Thu, 15 Dec 2022 12:04:59 +0000 (12:04 +0000)]
Add shim functions for repo code introduced by the pre repo stats.
From tb@
claudio [Thu, 15 Dec 2022 12:02:29 +0000 (12:02 +0000)]
Rework statistic collection to be per repository and add metric output option
Many statistic values are now accounted by repository via repo_stat_inc()
At end of the run sum_stats() accumulates these stats per TAL and globally.
The new output file metrics is written when the -m output flag is specified.
The metrics file is written in OpenMetrics format (with a few tweaks to
allow node_exporter to parse the file as well). The ometric code is a copy
from bgpctl(8) and should be kept in sync.
OK tb@
florian [Thu, 15 Dec 2022 08:07:03 +0000 (08:07 +0000)]
The argument to ctype functions must be EOF or representable as an
unsigned char.
Casting to int is particularly useless because that's what the
compiler already does. We need to prevent sign extension, not write
down that we want sign extension.
OK deraadt, kn, miod, op
florian [Thu, 15 Dec 2022 08:06:13 +0000 (08:06 +0000)]
The argument to ctype functions must be EOF or representable as an
unsigned char.
Casting to int is particularly useless because that's what the
compiler already does. We need to prevent sign extension, not write
down that we want sign extension.
OK deraadt, kn, miod
jmc [Thu, 15 Dec 2022 06:39:05 +0000 (06:39 +0000)]
rework the text describing interface name;
feedback deraadt afresh kn
deraadt [Thu, 15 Dec 2022 04:03:51 +0000 (04:03 +0000)]
sync
jsg [Wed, 14 Dec 2022 23:50:31 +0000 (23:50 +0000)]
add __ctzdi2 to sparc64 kernel
If __builtin_ctzl() is used on sparc64, gcc 4.2 will emit a call to
__ctzdi2. For userland this is in libgcc or compiler-rt. In the kernel
we put these functions in libkern.
'looks good' deraadt@ miod@
jsg [Wed, 14 Dec 2022 23:29:09 +0000 (23:29 +0000)]
regen
jsg [Wed, 14 Dec 2022 23:28:31 +0000 (23:28 +0000)]
add id for Navi 31, Radeon RX 7900 XT/XTX (gfx1100, GC 11.0.0)
schwarze [Wed, 14 Dec 2022 22:37:07 +0000 (22:37 +0000)]
In evp.h rev. 1.109 and 1.112, jsing@ and tb@ provided
EVP_PKEY_new_raw_private_key(3), EVP_PKEY_new_raw_public_key(3),
EVP_PKEY_get_raw_private_key(3), and EVP_PKEY_get_raw_public_key(3).
Merge the documentation from the OpenSSL 1.1.1 branch, which is
still under a free license. I tweaked the text somewhat for
conciseness, and argument names for uniformity.
schwarze [Wed, 14 Dec 2022 20:27:28 +0000 (20:27 +0000)]
In asn1.h rev. 1.71 and 1.72, jsing@ and tb@ provided ASN1_buf_print(3).
Document it.
florian [Wed, 14 Dec 2022 18:32:26 +0000 (18:32 +0000)]
The argument to ctype functions must be EOF or representable as an
unsigned char.
Casting to int is particularly useless because that's what the
compiler already does. We need to prevent sign extension, not write
down that we want sign extension.
OK deraadt, millert, kn
otto [Wed, 14 Dec 2022 15:44:13 +0000 (15:44 +0000)]
Continue loop if no match found; avoids an OOB write. ok florian@ tb@
claudio [Wed, 14 Dec 2022 15:19:16 +0000 (15:19 +0000)]
Optimize io_buf_read() a bit by calling read() again after the inital
header of the buf was read. This often saves a round-trip to the main
event loop and poll(2).
OK job@ tb@
tb [Wed, 14 Dec 2022 15:02:43 +0000 (15:02 +0000)]
Plug leak of ECDSA_SIG
ok sthen
claudio [Wed, 14 Dec 2022 14:16:20 +0000 (14:16 +0000)]
Do the IPv4 specific MP capability check only once per update/withdraw
instead of per prefix.
OK sthen@
kettenis [Wed, 14 Dec 2022 13:55:11 +0000 (13:55 +0000)]
Put an splhigh() at the start of cpu_configure() to prevent splasserts
trigger in autoconf. Matches what we do on (many) other architectures.
ok miod@
claudio [Wed, 14 Dec 2022 12:37:15 +0000 (12:37 +0000)]
Move some basic accessors of aspath to rde.h and make them static inline.
OK tb@
claudio [Wed, 14 Dec 2022 11:23:41 +0000 (11:23 +0000)]
Add missing type for OMT_INFO.
Changes output like this:
# HELP bgpd bgpd information
-# TYPE bgpd unknown
+# TYPE bgpd info
bgpd_info{nodename="xxx",domainname="xxx",release="7.7"} 1
job [Wed, 14 Dec 2022 10:45:34 +0000 (10:45 +0000)]
Always initialize b64sz
OK tb@
claudio [Wed, 14 Dec 2022 10:34:49 +0000 (10:34 +0000)]
Switch to struct timespec for collecting stats. This allows to use
clock_gettime(CLOCK_MONOTONIC) for runtime calculation.
OK tb@
job [Wed, 14 Dec 2022 08:46:58 +0000 (08:46 +0000)]
Print expiry moment in human-readable filemode in a consistent fashion across all object types
OK claudio@ tb@
job [Wed, 14 Dec 2022 02:34:32 +0000 (02:34 +0000)]
Print issuer & serial in filemode
OK tb@
claudio [Tue, 13 Dec 2022 18:10:55 +0000 (18:10 +0000)]
In tcp_now() switch from getnsecuptime() to getnsecruntime()
The tcp timer is not supposed to run during suspend but getnsecuptime() does
and because of this sessions with TCP_KEEPALIVE on reset after a few hours
of sleep.
Problem noticed by mlarkin@, investigation by yasuoka@ additional testing jca@
OK yasuoka@ jca@ cheloha@
cheloha [Tue, 13 Dec 2022 17:30:36 +0000 (17:30 +0000)]
timecounting: add getbinruntime(), getnsecruntime()
The networking people want a fast, monotonic clock that only advances
while the system is not suspended. The runtime clock satisfies most
of these requirements, so introduce getnsecruntime() to provide a fast
means for reading it.
Based on patches from jca@ and claudio@.
ok yasuoka@
deraadt [Tue, 13 Dec 2022 17:19:02 +0000 (17:19 +0000)]
sync
jmc [Tue, 13 Dec 2022 07:08:17 +0000 (07:08 +0000)]
remove advent entry 11/SunLast and leave 12/SunFirst, to avoid getting
two "First Sunday of Advent" entries;
jmc [Tue, 13 Dec 2022 06:58:03 +0000 (06:58 +0000)]
add tipd(4);
jmc [Tue, 13 Dec 2022 06:56:06 +0000 (06:56 +0000)]
consistently put the Xr in "made obsolete by" in symbolic,
as sigvec already does; remove the one inconsistent colon
from creat(3) in this same text
original diff from josiah frentsos
guenther [Tue, 13 Dec 2022 02:50:01 +0000 (02:50 +0000)]
The C compiler -rdynamic argument is not specific to gcc, so just say 'cc'
queried by and ok jcw@
yasuoka [Tue, 13 Dec 2022 00:59:53 +0000 (00:59 +0000)]
Clarify the default is to require message authentication.
kettenis [Mon, 12 Dec 2022 22:06:40 +0000 (22:06 +0000)]
Enable tipd(4) on RAMDISK kernels as well.
ok deraadt@
kettenis [Mon, 12 Dec 2022 20:44:00 +0000 (20:44 +0000)]
Fix typo.
kettenis [Mon, 12 Dec 2022 19:25:49 +0000 (19:25 +0000)]
tipd(4)
kettenis [Mon, 12 Dec 2022 19:18:25 +0000 (19:18 +0000)]
Fix USB hotplug on type-C connectors of Apple Silicon hardware. The USB
controller on these machines does not see connection events. Instead we
need to rely on the USB PD controllers to notify us of a new connection
and reset the USB controller. This diff implements this by adding a new
tipd(4) driver and infrastructure to notify xhci(4) of new connections.
ok patrick@
kettenis [Mon, 12 Dec 2022 18:45:01 +0000 (18:45 +0000)]
Improve range check to protect against overflow.
ok patrick@
tb [Mon, 12 Dec 2022 14:16:58 +0000 (14:16 +0000)]
Bump to LibreSSL 3.7.1
claudio [Mon, 12 Dec 2022 09:51:04 +0000 (09:51 +0000)]
Since bgpctl uses clock_gettime() and struct timespec switch ometric code
over to handle struct timespec instead of struct timeval. This way no
extra conversion is needed.
OK tb@
tb [Mon, 12 Dec 2022 08:30:22 +0000 (08:30 +0000)]
Revert sb_state changes to unbreak tree.
afresh1 [Mon, 12 Dec 2022 02:30:51 +0000 (02:30 +0000)]
Remove extra : in parameter substitution
From Rob Whitlock <rwhitlock22 () gmail ! com>
mvs [Sun, 11 Dec 2022 21:19:08 +0000 (21:19 +0000)]
This time, socket's buffer lock requires solock() to be held. As a part of
socket buffers standalone locking work, move socket state bits which
represent its buffers state to per buffer state. Introduce `sb_state' and
turn SS_CANTSENDMORE to SBS_CANTSENDMORE. This bit will be processed on
`so_snd' buffer only.
Move SS_CANTRCVMORE and SS_RCVATMARK bits with separate diff to make
review easier and exclude possible so_rcv/so_snd mistypes.
Also, don't adjust the remaining SS_* bits right now.
ok millert@
tb [Sun, 11 Dec 2022 20:53:27 +0000 (20:53 +0000)]
Add a small blurb on @SECLEVEL=n
otto [Sun, 11 Dec 2022 10:47:37 +0000 (10:47 +0000)]
Balance a getifaddrs() with a freeifaddrs(); plugs a leak seen by
florian@ and myself. ok florian@
visa [Sun, 11 Dec 2022 05:31:05 +0000 (05:31 +0000)]
Use evcount_percpu() with platform interrupt counters on octeon.