Age | Commit message (Collapse) | Author |
|
Default tests (USE_SOFTRAID=No, NDISKS=1) pass except for 'vnd0 ./ofwboot'
as reported on tech@ (fix pending).
|
|
Currently, ts(1) reparses the user format string every time it prints
a timestamp. This is wasteful.
If we isolate the parsing loop in fmtfmt() and move the rest of the
work into a new function, fmtprint(), we can cut some overhead out
of the hot loop.
We still need to update any microsecond substrings in the parsed
format string every time we print a timestamp. So during parsing in
fmtfmt() we build a list of pointers to locations in the parsed buffer
where the microsecond substring needs to be copied during fmtprint().
With input from deraadt@.
Link1: https://marc.info/?l=openbsd-tech&m=165769139318084&w=2
Link2: https://marc.info/?l=openbsd-tech&m=165910022501353&w=2
OK job@
|
|
Default tests (USE_SOFTRAID=Yes, NDISKS='1 2') pass except for '-r mnt',
as mentioned (fix pending).
USE_SOFTRAID=no and/or NDISKS=1 make '-r mnt' work.
|
|
This is mostly for architectures which don't have softraid(4) support
in installboot(8), but should also be useful in general to test different
setups and thus increase coverage.
Default to root on softraid on vnd on all architectures that support it:
amd64, arm64, i386 and sparc64; use root on vnd on others (yet to come).
|
|
strings, as the component name provided in the IORT might be
specified in a different way than our ACPI stack would do.
ok kettenis@
|
|
|
|
Not all architectures require/implement -p, but installboot(8) provides stubs,
so leave it to the program to (not) do something.
|
|
nudge from luka krmpotic
|
|
|
|
PRU_SENDOOB request always consumes passed `top' and `control' mbufs. To
avoid dummy m_freem(9) handlers for all protocols release passed mbufs
in the pru_sendoob() EOPNOTSUPP error path.
Also fix `control' mbuf(9) leak in the tcp(4) PRU_SENDOOB error path.
ok bluhm@
|
|
msdos".
Add some missing spaces after "=".
Constify the static strings.
Prodded a while ago by deraadt@, tweaks from kn@, ok kn@
|
|
EVP_PKEY_copy_parameters() will unconditionally fail if the pkey's ameth
has no copy_params(). Obviously this is indistinguishable from actual
failure...
ok jsing
|
|
mappings to reach a future SMMUv3 implementation.
ok kettenis@, mlarkin@
|
|
Up-front cleanup for a future diff to run directly on vnd(4) without softraid(4).
No functional change.
|
|
|
|
|
|
So handle this case in acpipci(4) and kill the hack to disable MSIs.
ok patrick@, mlarkin@, deraadt@
|
|
Another step towards more consistent behaviour across platforms.
This leaves only hppa and landisk **not** logging such copies,
but I can't test on those.
OK miod
|
|
OK miod
|
|
case install the first level bootstrap at the beginning of the of the wd0a
filesystem, rather than at the beginning of the disk.
Both locations work but the previous behaviour overwriting an existing MBR
is a violation of POLA.
tweaks & ok krw@
|
|
Only has one return value and it's never checked.
ok martijn@, tb@
|
|
found on the SC8280XP SoC. Together these drivers make the keyboard,
trackpoint and touchpad work on the x13s.
ok deraadt@
|
|
longer used. Also cleanup some hash sizes which are also no longer used.
OK tb@
|
|
ok jcs@
|
|
imsgs.
OK tb@
|
|
drivers implement support for the Dockchannel-base keyboard found on
Apple M2 laptops.
ok mlarkin@, patrick@
|
|
OK benno@ tb@
|
|
|
|
|
|
DSA_size() and ECDSA_size() have a very special hack. They fudge up an
ASN1_INTEGER with a size which is typically > 100 bytes, backed by a
buffer of size 4. This was "fine", however, since they set buf[0] = 0xff,
where the craziness that was i2c_ASN1_INTEGER() only looks at the first
octet (one may then ask why a buffer of size 4 was necessary...).
This changed with the rewrite of i2c_ASN1_INTEGER(), which doesn't
respect this particular hack and rightly assumes that it is fed an
actual ASN1_INTEGER...
Instead, create an appropriate signature and use i2d to determine its
size.
Fixes an out-of-bounds read flagged by ASAN and oss-fuzz.
ok jsing
|
|
CID 184043
|
|
|
|
ok sashan@
|
|
If a run takes to long drop the current update and wait for the next update.
OK benno@
|
|
|
|
|
|
|
|
The ASN.1 encoding of the modified ECDSA signature can grow in size due to
padding of the ASN.1 integers. Instead of reusing the same signature buffer
freshly allocate it. Avoids some buffer overflows caught by ASAN.
|
|
|
|
The ASN.1 encoding of the modified ECDSA signature can grow in size due to
padding of the ASN.1 integers. Instead of reusing the same signature buffer
freshly allocate it. Avoids some buffer overflows caught by ASAN.
|
|
Stolen from NetBSD.
ok jsg@
|
|
Mildly sad noises from Nick.
ok miod@ mlarkin@
|
|
The old one had a bug which allowed it to move backwards on overlapping
regions and also didn't always returned the optimal end position.
OK tb@
|
|
This is a continuation of this commit:
"Always acquire the `vmobjlock' before incrementing an object's reference."
Unfortuantely this created a race found by syzkaller manifesting as:
panic: kernel diagnostic assertion "uvn->u_obj.uo_refs == 0" failed:
file "sys/uvm/uvm_vnode.c", line 234
ok mpi@
Reported-by: syzbot+dd2d2684ad2818c927da@syzkaller.appspotmail.com
|
|
only warn about the start.
ok millert@
|
|
|
|
OK jsg@
|
|
sk_num() can return a negative value, in which case the upper bound is
SIZE_MAX, which results in a very long for loop.
CID 153997
ok jsing
|
|
Use EVP_PKEY_get0_EC_KEY() instead of the get1 version to avoid an
EVP_PKEY_free(). Check return values: if either EVP_PKEY_get0_EC_KEY()
or EC_KEY_get0_group() fail, a NULL dereference occurs.
CID 43289
ok jsing
|
|
Switch from X509_get_pubkey() to X509_get0_pubkey() to avoid an unnecessary
EVP_PKEY_free(). Check the return values of X509_get0_pubkey() and
EVP_PKEY_copy_parameters(). If the former returns NULL, the latter will
dereference NULL.
CID 25020
ok jsing
|