tb [Wed, 29 Jun 2022 11:59:23 +0000 (11:59 +0000)]
missing blank line
bluhm [Wed, 29 Jun 2022 11:22:10 +0000 (11:22 +0000)]
Pass down the pointer to mbuf pointer into ip6_hbhchcheck(). This
allows to set the mbuf to NULL and keep it consistent in the caller,
instead of having dangling pointer after free.
OK sashan@
claudio [Wed, 29 Jun 2022 10:48:22 +0000 (10:48 +0000)]
Move the deep check back into the loop. There are ways that even though
we're deep the code will SSTOP and sleep and then on wakeup we need to
recheck the deep conditions.
Issue analyzed and OK by mpi@
Reported-by: syzbot+f7634539e73108238c2a@syzkaller.appspotmail.com
jsg [Wed, 29 Jun 2022 10:04:22 +0000 (10:04 +0000)]
drm/i915: Implement w/a
22010492432 for adl-s
From Ville Syrjala
0895a2235bae6671077c2de94268cccc346005d6 in linux 5.15.y/5.15.51
13bd259b64bb58ae130923ada42ebc19bf3f2fa2 in mainline linux
jsg [Wed, 29 Jun 2022 09:52:23 +0000 (09:52 +0000)]
correct vararg use in kasprintf/kvasprintf
fixes names of some encoders
sthen [Wed, 29 Jun 2022 09:33:18 +0000 (09:33 +0000)]
sync
martijn [Wed, 29 Jun 2022 09:10:13 +0000 (09:10 +0000)]
Use strncasecmp instead of strncmp when comparing the password scheme.
This change could theoretically affect some people who actually have one
of the scheme's in lower case in their password, but this is extremely
unlikely in the real world.
Pointed out by David Diggles (david <at> elven <dot> com <dot> au)
OK sthen@
mvs [Wed, 29 Jun 2022 09:08:07 +0000 (09:08 +0000)]
ether_input() called with shared netlock, but pppoe(4) wants it to be
exclusive. Do the pppoe(4) input within netisr handler with exclusive
netlok held and remove kernel lock hack from ether_input().
This is the step back, but it makes ether_input() path better then it
is now.
Tested by Hrvoje Popovski.
ok bluhm@ claudio@
mvs [Wed, 29 Jun 2022 09:01:48 +0000 (09:01 +0000)]
Nullify `ipsecflowinfo' when mbuf(9) has no ipsec flowinfo data.
Otherwise we use `ipsecflowinfo' obtained from previous packet.
ok claudio@
beck [Wed, 29 Jun 2022 08:56:44 +0000 (08:56 +0000)]
Refactor asn1 time parsing to use CBS - enforce valid times in ASN.1 parsing.
While we're here enforce valid days for months and leap years.
Inspired by same in boringssl.
ok jsing@
job [Wed, 29 Jun 2022 08:39:49 +0000 (08:39 +0000)]
Import ts(1) - a timestamp utility
A from scratch & pledged implementation of the perl 'ts' utility found
in the moreutils collection.
With help from florian@, tb@, and deraadt@
OK deraadt@
tb [Wed, 29 Jun 2022 08:39:08 +0000 (08:39 +0000)]
Also check the security level in SSL_get1_supported_ciphers
ok beck jsing
tb [Wed, 29 Jun 2022 08:38:01 +0000 (08:38 +0000)]
Check security level when convertin a cipher list to bytes
ok beck jsing
tb [Wed, 29 Jun 2022 08:37:18 +0000 (08:37 +0000)]
Also check the security level when choosing a shared cipher
ok beck jsing
tb [Wed, 29 Jun 2022 08:34:04 +0000 (08:34 +0000)]
There's tentacles, tentacles everywhere
ok beck jsing
tb [Wed, 29 Jun 2022 08:30:04 +0000 (08:30 +0000)]
Also check the security level of the 'tmp dh'
ok beck jsing
tb [Wed, 29 Jun 2022 08:27:51 +0000 (08:27 +0000)]
Check the security of DH key shares
ok beck, looks good to jsing
tb [Wed, 29 Jun 2022 07:59:14 +0000 (07:59 +0000)]
Rename one s to ssl for consistency
tb [Wed, 29 Jun 2022 07:55:59 +0000 (07:55 +0000)]
Check sigalg security level when selecting them.
ok beck jsing
tb [Wed, 29 Jun 2022 07:54:54 +0000 (07:54 +0000)]
Check the security bits of the sigalgs' pkey
ok beck jsing
tb [Wed, 29 Jun 2022 07:53:58 +0000 (07:53 +0000)]
Check the security level when building sigalgs
ok beck jsing
tb [Wed, 29 Jun 2022 07:53:00 +0000 (07:53 +0000)]
Annotate sigalgs with their security level.
ok beck jsing
kettenis [Wed, 29 Jun 2022 07:51:54 +0000 (07:51 +0000)]
Add support for using non-standard UARTs (such as the Synopsys DesignWare
UART found on AMD's Ryzen Embedded V1000 family) as an early console.
This requires additional parameters to be passed by the bootloader to the
kernel so it changes the struct for the BOOTARG_CONSDEV boot argument.
The old struct will still be supported until OpenBSD 7.3 has been released
such that new kernels boot with the old bootloader.
ok anton@, deraadt@
kettenis [Wed, 29 Jun 2022 07:44:10 +0000 (07:44 +0000)]
Make bus_space_map(9) work before the pmap is initialized for addresses
below 4G by using the direct map.
ok anton@, deraadt@
anton [Wed, 29 Jun 2022 04:49:51 +0000 (04:49 +0000)]
cope with rtentry refcnt changes
jsg [Wed, 29 Jun 2022 01:05:18 +0000 (01:05 +0000)]
match on Alder Lake-P
ok deraadt@ kettenis@
naddy [Tue, 28 Jun 2022 23:43:12 +0000 (23:43 +0000)]
constify miscellaneous arm64 pin and clock tables
ok miod@
tb [Tue, 28 Jun 2022 21:14:32 +0000 (21:14 +0000)]
Add prototypes for ssl{_ctx,}_security()
ok beck jsing sthen
kettenis [Tue, 28 Jun 2022 21:02:14 +0000 (21:02 +0000)]
Add support for the Synopsys DesignWare UART found on the Ryzen Embedded
V1000 SoCs.
ok anton@
tb [Tue, 28 Jun 2022 20:57:33 +0000 (20:57 +0000)]
Add error code defins
ok beck jsing sthen
tb [Tue, 28 Jun 2022 20:54:16 +0000 (20:54 +0000)]
Add a period to a comment
Pointed out by jsing
tb [Tue, 28 Jun 2022 20:53:32 +0000 (20:53 +0000)]
Security level >= 3 requires a ciphersuite with PFS
ok beck jsing sthen
tb [Tue, 28 Jun 2022 20:49:16 +0000 (20:49 +0000)]
Add a secop handler for tmp_dh
This disallows DHE keys weaker than 1024 bits at level 0 to match
OpenSSL behavior.
ok beck jsing sthen
tb [Tue, 28 Jun 2022 20:46:45 +0000 (20:46 +0000)]
Add security level related error codes.
ok beck jsing sthen
tb [Tue, 28 Jun 2022 20:46:05 +0000 (20:46 +0000)]
Sort error strings
ok beck jsing sthen
tb [Tue, 28 Jun 2022 20:44:49 +0000 (20:44 +0000)]
Implement ssl{,_ctx}_security()
ok beck jsing sthen
tb [Tue, 28 Jun 2022 20:43:21 +0000 (20:43 +0000)]
Copy the security level stuff in ssl_cert_dup()
ok beck jsing sthen
tb [Tue, 28 Jun 2022 20:42:22 +0000 (20:42 +0000)]
Set up the default callback in SSL_CERT
ok beck jsing sthen
tb [Tue, 28 Jun 2022 20:40:24 +0000 (20:40 +0000)]
Implement the default security level callback
And here is where the fun starts. The tentacles will grow everywhere.
ok beck jsing sthen
tb [Tue, 28 Jun 2022 20:36:55 +0000 (20:36 +0000)]
Provide OPENSSL_TLS_SECURITY_LEVEL define
ok beck jsing sthen
tb [Tue, 28 Jun 2022 20:34:17 +0000 (20:34 +0000)]
Implement SSL_{CTX_}_{g,s}et_security_level(3)
ok beck jsing sthen
tb [Tue, 28 Jun 2022 20:31:43 +0000 (20:31 +0000)]
Add security callback, level and ex_data fields to SSL_CERT
ok beck jsing sthen
tb [Tue, 28 Jun 2022 20:29:27 +0000 (20:29 +0000)]
Add #defines and prototypes for security level API
This marks the start of one of the worst API additions in the history of
this library. And as everybody knows the bar is high. Very high.
ok beck jsing sthen
claudio [Tue, 28 Jun 2022 20:13:03 +0000 (20:13 +0000)]
Add missing colon. Noticed by jmc@
kettenis [Tue, 28 Jun 2022 19:55:22 +0000 (19:55 +0000)]
On the x13s, using the EfiLoaderData memory type for the memory block
that we load the kernel into doesn't work. But changing it to EfiLoaderCode
makes it work. Presumably the firmware creates a mapping with executable
permissions in that case, which is obviously needed for executing kernel
code.
ok patrick@, mlarkin@
kettenis [Tue, 28 Jun 2022 19:50:40 +0000 (19:50 +0000)]
The x13s uses Memory32Fixed() to describe the windows forwarded by the
host bridges. Add support for this.
ok mlarkin@, patrick@
jsing [Tue, 28 Jun 2022 19:44:28 +0000 (19:44 +0000)]
Negate unsigned then cast to signed.
Avoid undefined behaviour by negating the unsigned value, before casting
to int64_t, rather than casting to int64_t then negating.
Fixes oss-fuzz #48499
ok tb@
mpi [Tue, 28 Jun 2022 19:39:54 +0000 (19:39 +0000)]
Make sure uvm_swap_get() always sleep and do not return and error.
If no memory was immediately available to decrypt (bounce) a page from swap
an error was returned to the fault handler which would result in processes
dying when a lot of memory pressure was applied to a system.
Note that reading from swap is always done synchronously.
ok beck@, kettenis@
mpi [Tue, 28 Jun 2022 19:31:30 +0000 (19:31 +0000)]
Consider pmemrange regions when trying to free pages from the inactive list.
Instead of starting with the first page on the inactive list pick the first
one that fits in the range of a given pmemrange region.
Fix an issue where the page daemon would be hogging a CPU without freeing any
page because the global limits are satisfied.
The algorithm could certainly be revisited, the LRU is not really working and
there is a huge delay before recovering when the first pages need to be swapped and the system is in OOM situation but at least there is no starvation and the
system now recovers.
ok beck@, kettenis@
mpi [Tue, 28 Jun 2022 19:23:08 +0000 (19:23 +0000)]
Use new & shiny define for the maximum number of pages of a swap cluster.
ok beck@, kettenis@
mpi [Tue, 28 Jun 2022 19:19:34 +0000 (19:19 +0000)]
Pre-allocate pages in DMA-reachable region to ensure progress in the swapper.
Currently swap encryption is not done in place and some architectures need to
bounce pages into a DMA-reachable region for I/Os, for that uvm_swap_io() needs
to allocate at most 64K to write a swap cluster to disk. Pre-allocate such
amount of memory to be sure the page daemon can make progress in OOM situation.
Also introduce a sleeping point to wait for the previous asynchronous I/O
holding the pre-allocated pages, there's no point in building clusters if no
progress can be made.
ok beck@, kettenis@
mpi [Tue, 28 Jun 2022 19:07:40 +0000 (19:07 +0000)]
Reserve a second segment for the page daemon.
This ensures uvm_swap_io() can succeeds even in OOM situations because two
uvm_pagermapin() allocations, requiring a segment each, are needed to bounce
or encrypt a swap cluster.
ok beck@, kettenis@
claudio [Tue, 28 Jun 2022 18:47:54 +0000 (18:47 +0000)]
Hook up bgplgd into the build
claudio [Tue, 28 Jun 2022 18:46:00 +0000 (18:46 +0000)]
Hook up bgplgd. Uses _bgplgd user with id 71:71 add a rc.d script and
all the other rc plumbing.
OK deraadt@
claudio [Tue, 28 Jun 2022 16:56:29 +0000 (16:56 +0000)]
Fix manpage from jmc@ but also fix the privdrop user to _bgplgd
anton [Tue, 28 Jun 2022 16:29:56 +0000 (16:29 +0000)]
A com_acpi_softc pointer is used as the interrupt callback cookie which
is later on interpreted as a com_softc pointer. This is not a problem in
practice as a com_softc structure is the first member of the
com_acpi_softc structure.
Using the actual types consistently yields a better symmetry in my
opinion between registering the interrupt and the corresponding
interrupt handler.
ok deraadt@ kettenis@
anton [Tue, 28 Jun 2022 16:29:03 +0000 (16:29 +0000)]
No need to pass a copy of the bcmdmac_channel structure to predicate
routines.
ok deraadt@ kettenis@
anton [Tue, 28 Jun 2022 16:28:08 +0000 (16:28 +0000)]
Remove commented out variables and excessive blank lines in
pluart_param().
claudio [Tue, 28 Jun 2022 16:11:30 +0000 (16:11 +0000)]
Add bgplgd a fastcgi daemon that provide a REST JSON api to bgpctl.
Most code stolen from slowcgi, it just exec bgpctl with -j.
Put it in tb@ deraadt@
mvs [Tue, 28 Jun 2022 16:10:43 +0000 (16:10 +0000)]
Don't call pipex_rele_session() when `session' is NULL.
Reported by Hrvoje Popovski. ok bluhm@
beck [Tue, 28 Jun 2022 16:05:42 +0000 (16:05 +0000)]
Take away bogus error assignment before callback call.
Keep the depth which was needed.
This went an error too far, and broke openssl-ruby's callback
and error code sensitivity in it's tests.
With this removed, both my newly committed regress to verify
the same error codes and depths in the callback, and
openssl-ruby's tests pass again.
ok tb@
bluhm [Tue, 28 Jun 2022 15:46:07 +0000 (15:46 +0000)]
Botan 2.19.2 has removed support for the OpenSSL crypto provider.
It was incompatible with OpenSSL 3.0. Remove the regression test
to check that LibreSSL crypto works with Botan tests. This is
better than to keep an outdated Botan in ports.
discussed with tb@ beck@
krw [Tue, 28 Jun 2022 15:35:24 +0000 (15:35 +0000)]
Move debug-only variable 'i' to be with the other debug-only
variables inside the #ifdef DEBUG block using them.
bluhm [Tue, 28 Jun 2022 15:17:23 +0000 (15:17 +0000)]
Adapt netstat kvm code to ref count change in struct rtentry.
found by otto@ the hard way
tb [Tue, 28 Jun 2022 14:51:37 +0000 (14:51 +0000)]
Free ciphers before assigning to them
While this is not a leak currently, it definitely looks like one.
Pointed out by jsing on review of a diff that touched the vicinity
a while ago.
ok jsing
visa [Tue, 28 Jun 2022 14:43:50 +0000 (14:43 +0000)]
Remove unused field d_poll from struct cdevsw.
OK miod@ mpi@
henning [Tue, 28 Jun 2022 13:48:06 +0000 (13:48 +0000)]
fix syncookies in conjunction with tcp fast port reuse.
This really pointed out that the place syncookies were hooked in was almost,
but not completely right. The way it was the special case for tcp fast port
reuse in pf_test_state wasn't hit, because the first packet
hitting that was the ACK from the peer finishing the 3WHS, and the
reconstructed SYN came after. We're now doing pf_find_state (and *only* that)
first, then syncookies, then going on so that the old state is thrown away
properly and we get a new one with the sequence number modulator set up
correctly
Bonus: -11 lines of code
tracked down (that took a while) + fixed under contract with Hush
Communications Canada; special thanks to Lyndon
ok sashan
florian [Tue, 28 Jun 2022 13:35:42 +0000 (13:35 +0000)]
unbreak build; found the hard way by stsp
deraadt [Tue, 28 Jun 2022 13:06:21 +0000 (13:06 +0000)]
sync
deraadt [Tue, 28 Jun 2022 13:05:42 +0000 (13:05 +0000)]
a start at qualcomm products
jsg [Tue, 28 Jun 2022 12:11:41 +0000 (12:11 +0000)]
rewrite amd64 printing of cache details
Previously we looked at cpuid 0x80000005 for L1/TLB details
which Intel documents as reserved.
And cpuid 0x80000006 for L2 details.
Intel also encode cache details in cpuid 4.
AMD have mostly the same encoding with cpuid 0x8000001d
0x80000005/0x80000006 is used as a fallback.
Prompted by Intel Tiger Lake and Alder Lake machines
returning an associativity value of 7 from cpuid 0x80000006.
The previous code would print "disabled L2 cache", 7 is
documented by Intel as "See CPUID leaf 04H, sub-leaf 2".
tested by Hrvoje Popovski on EPYC 7413, and myself on various machines
ok mlarkin@
mpi [Tue, 28 Jun 2022 12:10:37 +0000 (12:10 +0000)]
Move the guts of uvm_aio_aiodone() into a separate function.
This will help dealing with error cases.
No functionnal changes.
sthen [Tue, 28 Jun 2022 12:10:08 +0000 (12:10 +0000)]
Don't ask the vlan question unless another network interface exists. ok deraadt
Avoids a confusing question when no supported network devices is found, i.e.
"Available network interfaces are: vlan0.
Which network interface do you wish to configure? (or 'done') [vlan0]"
claudio [Tue, 28 Jun 2022 12:08:17 +0000 (12:08 +0000)]
Cleanup the sleep loop in single_thread_check_locked(). The deep checks
only matter on entry and the pr->ps_single check is done in the while body.
With and OK mpi@
claudio [Tue, 28 Jun 2022 11:52:24 +0000 (11:52 +0000)]
Try to document 'announce policy' and add RFC 9234 to the list in bgpd.8
How RFC 9234 support will work in the long run may still change but
for now at least tell people how to use it.
claudio [Tue, 28 Jun 2022 11:46:05 +0000 (11:46 +0000)]
The default state of enhanced refresh is no. So flip logic.
Fixes config regress. Found by anton@, discussed with tb@
claudio [Tue, 28 Jun 2022 11:42:41 +0000 (11:42 +0000)]
Check for entries in the suberror names arrays that are NULL. Handle them
like other unknown ones. Also KNF the code a bit.
Was OK tb@ some time ago
mpi [Tue, 28 Jun 2022 10:45:55 +0000 (10:45 +0000)]
Do not clean PG_BUSY before calling uvm_anon_release().
Fix an assertion reported by gkoehler@.
ok kettenis@
mpi [Tue, 28 Jun 2022 10:38:55 +0000 (10:38 +0000)]
Do not consider adjacent pages when doing a CoW.
Those pages should already be entered, this speeds up CoW faults.
Stolen from NetBSD.
ok miod@, kettenis@
bluhm [Tue, 28 Jun 2022 10:01:13 +0000 (10:01 +0000)]
Use refcnt API for struct rtentry instead of hand-crafted atomic
operations.
OK mvs@
jan [Tue, 28 Jun 2022 09:41:24 +0000 (09:41 +0000)]
ifconfig(8) return "Not supported" if you try to configure tso on a non-tso
supported interface.
pointed out by bluhm@
OK bluhm@
bluhm [Tue, 28 Jun 2022 09:32:27 +0000 (09:32 +0000)]
Use btrace(8) to debug reference counting. dt(4) provides a static
tracepoint for each type of refcnt we have. As a start, add inpcb
and tdb refcnt. When the counter changes, btrace may print the
actual object, the current counter, the change value and optionally
the stack trace.
discussed with visa@; OK mpi@
florian [Tue, 28 Jun 2022 09:21:58 +0000 (09:21 +0000)]
gc timeout_count, it's unused and I don't remember what I wanted to
use it for.
martijn [Tue, 28 Jun 2022 09:11:33 +0000 (09:11 +0000)]
Use smi_string2oid instead of ober_string2oid in parse.y's oid definition.
This allows admins to configure oids as pretty symbolic names, next to the
current numeric names.
OK sthen@
espie [Tue, 28 Jun 2022 09:01:45 +0000 (09:01 +0000)]
if we can't open the user db, don't try to read from a closed fh
espie [Tue, 28 Jun 2022 08:47:10 +0000 (08:47 +0000)]
some old signing code was still around
tb [Tue, 28 Jun 2022 08:44:26 +0000 (08:44 +0000)]
Only asn1time needs to be static for now.
beck [Tue, 28 Jun 2022 08:41:17 +0000 (08:41 +0000)]
Make this regress test link staticly and use internal symbols
so that it works and compiles during the tb@ pre-bump shuffle(tm).
bluhm [Tue, 28 Jun 2022 08:24:29 +0000 (08:24 +0000)]
The ip6_hbhchcheck() function never reads the nxtp parameter, it
only sets its value. It is more obvious to return the next protocol
or IPPROTO_DONE to signal error. All IP protocol functions do that.
OK sashan@ florian@
espie [Tue, 28 Jun 2022 08:15:43 +0000 (08:15 +0000)]
parse pkgpath further, so that we know the subpackage component, if any,
and flag multiple subpackages as an error
kettenis [Tue, 28 Jun 2022 08:15:04 +0000 (08:15 +0000)]
Add hardware ID for EHCI-compliant USB controller with standard debug.
ok jsg@
kettenis [Tue, 28 Jun 2022 08:14:03 +0000 (08:14 +0000)]
Add hardware ID for XHCI-compliant USB controller without standard debug.
ok jsg@
mvs [Tue, 28 Jun 2022 08:01:40 +0000 (08:01 +0000)]
Introduce `pipexoutq' mbuf(9) queue, and put outgoing pipex(4) related
PPPOE packets within. Do (*if_output)() calls within netisr handler with
netlock held.
We can't predict netlock state when pipex(4) related (*if_qstart)()
handlers called. This means we can't use netlock within pppac_qstart()
and pppx_if_qstart() handlers.
ok bluhm@
beck [Tue, 28 Jun 2022 07:56:34 +0000 (07:56 +0000)]
Fix the legacy verifier callback behaviour for untrusted certs.
The verifier callback is used by mutt to do a form of certificate
pinning where the callback gets fired and depending on a
cert saved to a file will decide to accept an untrusted cert.
This corrects two problems that affected this. The callback was not
getting the correct depth and chain for the error where mutt would
save the certificate in the first place, and then the callback was not
getting fired to allow it to override the failing certificate
validation.
thanks to Avon Robertson <avon.r@xtra.co.nz> for the report and
sthen@ for analysis.
"The callback is not an API, it's a gordian knot - tb@"
ok jsing@
nicm [Tue, 28 Jun 2022 07:36:52 +0000 (07:36 +0000)]
tparm %l should push strlen(pop) onto the stack not insert it into the
result, from ncurses 5.9 patch
20130126:
+ change %l behavior in tparm to push the string length onto the
stack rather than saving the formatted length into the output
buffer (report by Roy Marples, cf: 980620).
ok millert
jmc [Tue, 28 Jun 2022 06:09:14 +0000 (06:09 +0000)]
reflect the update to -D arg name in usage();
tb [Tue, 28 Jun 2022 05:49:05 +0000 (05:49 +0000)]
Unbreak tree: add log_policy() implementation missing from previous commit.
jsg [Tue, 28 Jun 2022 04:36:29 +0000 (04:36 +0000)]
spelling
job [Tue, 28 Jun 2022 01:40:29 +0000 (01:40 +0000)]
Remove superfluous 'any'
jsg [Tue, 28 Jun 2022 01:12:44 +0000 (01:12 +0000)]
transistion -> transition