summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2023-11-10regenJonathan Gray
2023-11-10add "Phoenix 2" APU device idJonathan Gray
Phoenix 2 parts include both Zen4 and Zen4c cores used by Ryzen Z1, Ryzen 5 7545U, Ryzen 3 7440U with cpuid 19-78-00
2023-11-10Give ober_printf_elements() a ber_element array, similar toMartijn van Duren
ober_scanf_elements(). This allows us to move down and back up multiple levels in with nested sequences and sets. While here, on failure, make sure we free (and unlink if needed) all elements we created. OK claudio@, tb@
2023-11-10accept numerical user IDsKlemens Nanni
Turn [-U username] into [-U user] to match top(1)/pgrep(1)/fstat(1) -U/-u taking both "root" and "0". Feedback OK millert
2023-11-10Always prefer group from initial KE payload as responder if supported.Tobias Heider
from markus@
2023-11-10Make further use of netcat server close barrier in regress to reduceAnton Lindqvist
flakiness.
2023-11-10MNT_SOFTDEP and mount -o softdep no longer have any effectIngo Schwarze
OK kn@ jmc@
2023-11-09Run arp timeout without kernel lock.Alexander Bluhm
Since cheloha@ has implemented timeout processes that do not grab the kernel lock, start using TIMEOUT_MPSAFE for arptimer(). OK kn@ mvs@
2023-11-09Forgot to fix the RFC number in the new commentTheo Buehler
2023-11-09Convert PKCS7_SIGNER_INFO_set() to X509_ALGOR_set0_by_nid()Theo Buehler
This is a straightforward conversion because I'm not going to start a cleanup here. Explain why this is not using X509_ALGOR_set_md(). See below. ok jca Let me include a beautiful note from RFC 5754 in its entirety: NOTE: There are two possible encodings for the AlgorithmIdentifier parameters field associated with these object identifiers. The two alternatives arise from the loss of the OPTIONAL associated with the algorithm identifier parameters when the 1988 syntax for AlgorithmIdentifier was translated into the 1997 syntax. Later, the OPTIONAL was recovered via a defect report, but by then many people thought that algorithm parameters were mandatory. Because of this history, some implementations encode parameters as a NULL element while others omit them entirely. The correct encoding is to omit the parameters field; however, when some uses of these algorithms were defined, it was done using the NULL parameters rather than absent parameters. For example, PKCS#1 [RFC3447] requires that the padding used for RSA signatures (EMSA-PKCS1-v1_5) MUST use SHA2 AlgorithmIdentifiers with NULL parameters (to clarify, the requirement "MUST generate SHA2 AlgorithmIdentifiers with absent parameters" in the previous paragraph does not apply to this padding).
2023-11-09Tighten pledge in List and Append mode:Klemens Nanni
Drop "wpath cpath fattr dpath" in read-only: - cpio -i -t < test.tar - pax < test.tar - tar -t -f test.tar Drop "cpath fattr dpath" in read-write: - echo foo | cpio -o -A -H ustar -O test.tar - tar -r -f test.tar foo - pax -w -a -f test.tar foo Other modes remain unchanged and thus can create or modify files. Feedback OK millert
2023-11-09avoid restartable syscalls with siginterrupt() against all our handlers.David Gwynne
pflogd uses blocking bpf reads, but installs a bunch of signal handlers to handle cleanly closing and (re)opening the log file. signal() by default sets the handlers up so they're restartable. this has the effect that when pflogd receives a signal while waiting in bpfread, the signal handler runs and sets a flag saying the file should be rotated or closed or whatever, but then the kernel restarts the read. when pflogd used a bpf read timeout, pflogd would run it's "event" loop every time the read timeout expired. this meant even though the bpf read was restarted, by having the read timeout expire every 500ms the flag the signal handlers set would be processed in a relatively short period of time. after moving bpf to a wait timeout, pflogd basically has to wait for a packet to be captured before the bpf read will return. if you're trying to kill pflogd on an idle firewall then you're basically stuck. making the signal handlers not restartable allows bpfread to fail with EINTR so pflogd can go around it's even loop and exit as expected. reported by Mikhail on bugs@ ok claudio@ pflogd needs a rewrite though.
2023-11-09-C/resume without "proc exec"Klemens Nanni
ftp(1) has "proc exec" to run sh(1) on interactive ! commands and filenames starting with "|"; this is orthogonal to continuing transfers using the existing file size as offsets. There seems to be no case where a) the argument is an URL, i.e. we pledge, and b) a shell is spawned somehow, so avoid these promises when resuming. bsd.port.mk(5) FETCH_CMD uses -C by default. OK millert
2023-11-09Add [-P progam] to filter dumps by basenameKlemens Nanni
[-p pid] requires knowing the PIDs beforehand, sieving through big dumps by argv[0] strings is more ergonomic. OK deraadt
2023-11-09Finish clean up of old 6.7 softraid migration codeKlemens Nanni
All combos of no/CRYPTO softraid, old/new ofwboot, old/new kernel do boot. OK stsp
2023-11-09get rid of the ioctl whitelist that bio will tunnel for other devs.David Gwynne
this will allow bio(4) to be used with other (non raid) related devices. ok krw@ kn@
2023-11-09sort .xr after previous; from jmcKlemens Nanni
2023-11-09link to showmount(8); OK deraadtKlemens Nanni
2023-11-09vmctl(8): avoid abort when given an invalid "kernel" file.Dave Voutila
The vmctl `start` command allows the user to pass an optional "kernel" file (either a ramdisk kernel or a SeaBIOS image). This file is opened by vmctl and the descriptor passed via imsg. If the file provided isn't a regular file, the attempt to send the start message to vmd(8)'s control socket will fail and results in a the vmctl process aborting. Check the file type after open and fail gracefully if not a regular file. reported by and ok gnezdo@
2023-11-09Convert ecx_item_sign() to X509_ALGOR_set0_by_nid()Theo Buehler
ok jca
2023-11-09Convert asn1_item_sign() to X509_ALGOR_set0_by_nid()Theo Buehler
ok jca
2023-11-09missing full stopJasper Lievisse Adriaanse
2023-11-09Remove delayed timeout(9) initialization. timeout_set*() only assignVitaliy Makkoveev
members of passed timeout structure, this delayed initialization provides nothing but makes code weird. ok kn
2023-11-09Fix X509_ALGOR_set0() usage in rsa_alg_set_oaep_padding()Theo Buehler
Replace X509_ALGOR_set0() with X509_ALGOR_set0_by_nid(). This way there is no missing error checking for OBJ_nid2obj() and no nested functions. Slightly more importantly, this plugs two long standing potential leaks in this function (or previously rsa_cms_encrypt()) due to missing error checking: in the unlikely event that X509_ALGOR_set0() failed, astr/ostr would leak. ok jsing
2023-11-09Use X509_ALGOR_set0_by_nid() in rsa_mgf1md_to_maskGenAlgorithm()Theo Buehler
ok jsing
2023-11-09drm/amdgpu: Reserve fences for VM updateJonathan Gray
From Felix Kuehling ff86d69b2e5004ec256a9301990acdaa282a777c in linux-6.1.y/6.1.62 316baf09d355aec1179981b6dfe28eba50c5ee5b in mainline linux
2023-11-09gpu/drm: Eliminate DRM_SCHED_PRIORITY_UNSETJonathan Gray
From Luben Tuikov 9f9b2ec53aca630783493a2ccc3bab0794052133 in linux-6.1.y/6.1.62 fa8391ad68c16716e2c06ada397e99ceed2fb647 in mainline linux
2023-11-09drm/amdgpu: Unset context priority is now invalidJonathan Gray
From Luben Tuikov cafa191b27dd3c6199529f36a6dfddb707c240c0 in linux-6.1.y/6.1.62 eab0261967aeab528db4d0a51806df8209aec179 in mainline linux
2023-11-09drm/ttm: Reorder sys manager cleanup stepJonathan Gray
From Karolina Stolarek 6a87b333ba4784ba23c1e74693f5c1b0268ac137 in linux-6.1.y/6.1.62 3b401e30c249849d803de6c332dad2a595a58658 in mainline linux
2023-11-08Don't do the time window check if we're noAuthNoPriv. It's only neededMartijn van Duren
if we're authenticating according to RFC3414 section 2.3. OK tb@
2023-11-08Let usm_make_report() utilize appl_report(). usm_make_report utilizedMartijn van Duren
mps_getstr(), which after moving the SNMPv2-SMI::snmpV2 into application_internal returned a noSuchObject. This doesn't seem to have broken any tools that I'm aware of, but this returns the correct result. OK tb@
2023-11-08Let appl_report() collect its own metrics. This simplifies the interfaceMartijn van Duren
and gives us a free report-pdu log line in debug mode. OK tb@
2023-11-08Don't rely on aru_pdu to rebuild the original varbindlist on error.Martijn van Duren
Now that we have avi_origid it's not needed anymore and aru_pdu needs to go. OK tb@
2023-11-08Don't use aru_pdu for determining the requesttype. It's owned byMartijn van Duren
snmp_message and getting rid of it is also needed for appl_report() to gather its own information. OK tb@
2023-11-08On second thought let's not overwrite sm_pdutype with a hardcoded valueMartijn van Duren
after just setting it, it's a silly idea. OK tb@
2023-11-08export SNMP-TARGET-MIB::{snmpUnavailableContexts,snmpUnknownContexts}Martijn van Duren
via application_internal. OK tb@
2023-11-08Hook up snmpTargetMIB to MIB_TREE.Martijn van Duren
OK tb@
2023-11-08More minor cleanup in rsa_alg_set_oaep_padding()Theo Buehler
Test and assign one more instance replace a useless comment by an empty line.
2023-11-08Avoid a NULL dereference when handling a malformed fastcgi request.Todd C. Miller
Rework the hack to avoid a use-after-free in the fastcgi code. Since server_fcgi() can be called by server_read_httpcontent() we can't set clt_fcgi_error to NULL. Instead, we implement a simple reference count to track when a fastcgi session is in progress to avoid closing the http session prematurely on fastcgi error. Based on a diff from and OK by tb@. Reported by Ben Kallus.
2023-11-08Prepare further fixes of X509_ALGOR_set0() misuseTheo Buehler
In rsa_alg_set_oaep_padding() rename los to ostr for consistency with astr, make it have function scope, free ostr in the error path and assume X509_ALGOR_set0() success. ok jca
2023-11-08Increase NKMEMPAGES_MAX_DEFAULT to same value as on amd64.Marcus Glocker
OK deraadt@
2023-11-08zap a stray spaceTheo Buehler
2023-11-08Rename os into astr in rsa_alg_set_oaep_padding()Theo Buehler
2023-11-08Rename pkctx to pkey_ctx in rsa_alg_set_oaep_padding() and rsa_cms_encrypt()Theo Buehler
2023-11-08Some simple cosmetics in rsa_alg_set_oaep_padding()Theo Buehler
Rename rv into ret and split it on its own line, move labellen a bit down add some empty lines. To match style elsewhere. Most of this was requested by jsing
2023-11-08Split OAEP padding handling into a helper functionTheo Buehler
This matches what is done for PKCS#1 1.5 and PSS. This function needs a lot of work still, but it's easier to do that without having to tiptoe around a lot of other garbage. ok jsing
2023-11-08libc, librthread: _twait: fully validate absolute timeoutScott Soule Cheloha
Use timespecisvalid(3) to check both bounds for tv_nsec. Link: https://marc.info/?l=openbsd-tech&m=169913314230496&w=2 ok miod@
2023-11-08Allow Xen to use backing store devices with 4K-byte sectors.Kenneth R Westerback
Problem reported and much testing by Christian Kujau. Thanks! Roughly equivalent to bouyer@NetBSD changes prompted by Christian. ok mlarkin@ dlg@
2023-11-08remove accidental double spaceTheo de Raadt
2023-11-08pkg_add: sort flags in usage messageCaspar Schutijser
OK espie@