summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-06-28some old signing code was still aroundMarc Espie
2022-06-28Only asn1time needs to be static for now.Theo Buehler
2022-06-28Make this regress test link staticly and use internal symbolsBob Beck
so that it works and compiles during the tb@ pre-bump shuffle(tm).
2022-06-28The ip6_hbhchcheck() function never reads the nxtp parameter, itAlexander Bluhm
only sets its value. It is more obvious to return the next protocol or IPPROTO_DONE to signal error. All IP protocol functions do that. OK sashan@ florian@
2022-06-28parse pkgpath further, so that we know the subpackage component, if any,Marc Espie
and flag multiple subpackages as an error
2022-06-28Add hardware ID for EHCI-compliant USB controller with standard debug.Mark Kettenis
ok jsg@
2022-06-28Add hardware ID for XHCI-compliant USB controller without standard debug.Mark Kettenis
ok jsg@
2022-06-28Introduce `pipexoutq' mbuf(9) queue, and put outgoing pipex(4) relatedVitaliy Makkoveev
PPPOE packets within. Do (*if_output)() calls within netisr handler with netlock held. We can't predict netlock state when pipex(4) related (*if_qstart)() handlers called. This means we can't use netlock within pppac_qstart() and pppx_if_qstart() handlers. ok bluhm@
2022-06-28Fix the legacy verifier callback behaviour for untrusted certs.Bob Beck
The verifier callback is used by mutt to do a form of certificate pinning where the callback gets fired and depending on a cert saved to a file will decide to accept an untrusted cert. This corrects two problems that affected this. The callback was not getting the correct depth and chain for the error where mutt would save the certificate in the first place, and then the callback was not getting fired to allow it to override the failing certificate validation. thanks to Avon Robertson <avon.r@xtra.co.nz> for the report and sthen@ for analysis. "The callback is not an API, it's a gordian knot - tb@" ok jsing@
2022-06-28tparm %l should push strlen(pop) onto the stack not insert it into theNicholas Marriott
result, from ncurses 5.9 patch 20130126: + change %l behavior in tparm to push the string length onto the stack rather than saving the formatted length into the output buffer (report by Roy Marples, cf: 980620). ok millert
2022-06-28reflect the update to -D arg name in usage();Jason McIntyre
2022-06-28Unbreak tree: add log_policy() implementation missing from previous commit.Theo Buehler
2022-06-28spellingJonathan Gray
2022-06-28Remove superfluous 'any'Job Snijders
2022-06-28transistion -> transitionJonathan Gray
2022-06-28Entensions -> ExtensionsJonathan Gray
2022-06-27allow arguments to sftp -D option, e.g.Damien Miller
sftp -D "/usr/libexec/sftp-server -el debug3" ok markus@
2022-06-27Rework the rttimer code. Instead of a global queue and a global timeoutClaudio Jeker
use a per rttimer struct timeout. On enqueue the struct rttimer belongs to the timeout, in case the route is removed before the timer fires cleanup based on the timeout_del() return value. If the timeout currently running then just clear the rtt_rt pointer and let the timeout handle the cleanup. This should hopefully fix the icmp_pmtu_timeout crashes reported by some people. OK bluhm@
2022-06-27Push the kernel lock down into arpresolve(). We still need it toAlexander Bluhm
prevent concurrent access to rt_llinfo from rtrequest_delete(). But the common case, when the MAC address is already known, works without lock. tested by Hrvoje Popovski; OK mvs@
2022-06-27Revert 1.44; that slow getsecs() workaround had been added for the sake ofMiod Vallat
an i386 system noone remembers details about and which is unlikely to be relevant those days, and has been found to misbehave on some modern systems, such as the OnLogic Helix 500, or RPi4 with glass console.
2022-06-27Fix comment.Miod Vallat
2022-06-27Fix white space and wrap long lines.Alexander Bluhm
2022-06-27zap extraneous .PpJason McIntyre
2022-06-27tweak the tso text a little;Jason McIntyre
2022-06-27Delete the ancient "hold Shift key to force CHS" code. Noone has neededTheo de Raadt
this in decades. ok sthen krw
2022-06-27vmm: move ept pointer configuration to vcpu_init_vmxDave Voutila
No need to be twiddling eptp in vcpu_reset_regs. ok mlarkin@
2022-06-27Introduce Large Receive Offloading of TCP segment offloading for ix(4). It isJan Klemkow
disabled by default. Also add a tso option to ifconfig(8) to enable and disable this feature. ok deraadt
2022-06-27vmm: zero virtual addresses of vcpu state pages after freeingDave Voutila
Consolidate the km_free calls while at it. ok mlarkin@
2022-06-27Correct misleading comment for URI parsingBob Beck
ok jsing@
2022-06-27kbind(2): unlock syscall, push kernel lock down to binding loopScott Soule Cheloha
- Rearrange the security check code in sys_kbind() so that we only need to take the kernel lock once if we need to raise SIGILL. - Protect process.ps_kbind_addr and process.ps_kbind_cookie with process.ps_mtx. This is easier to do after the aforementioned rearrangement. Under normal circumstances this isn't necessary: the process is single-threaded when we initialize kbind(2). But in stranger situations this brief mutex ensures that the first thread to reach sys_kbind() initializes both variables. - Wrap the binding loop with the kernel lock. We need to carefully confirm that uvm_unmap_remove(), uvm_map_extract(), and uvm_unmap_detach() are MP-safe in a subsequent patch before completely removing the kernel lock from sys_kbind(). - Remove the kernel lock from kbind(2) in syscalls.master. Prompted by mpi@, dlg@, and deraadt@. Current patch workshopped with deraadt@. Based on a patch from dlg@. With input from dlg@, bluhm@, mpi@, kettenis@, deraadt@, and guenther@. Thread: https://marc.info/?l=openbsd-tech&m=165274831829349&w=2 ok deraadt@ kettenis@ mpi@
2022-06-27Add function to free all of the issuer cache.Bob Beck
ok jsing@
2022-06-27Remove switch(4) leftovers.Visa Hankala
OK deraadt@ mpi@ claudio@ miod@
2022-06-27Allow security_level to mestastasize into the verifierTheo Buehler
The tentacles are everywhere. This checks that all certs in a chain have keys and signature algorithms matching the requirements of the security_level configured in the verify parameters. ok beck jsing
2022-06-27Prepare to provide X509_VERIFY_PARAM_set_auth_level()Theo Buehler
For some unknown reason this needed a different name than security_level, both internally and in the public API. Obviously it is exactly the same garbage. ok beck jsing
2022-06-27Add new time manipulation funcitons that OpenSSL has exposed thatBob Beck
the world seems to be using. Symbols.list changes and exposure to wait for minor bump ok jsing@ jca@
2022-06-27install script no longer creates a dhclient.conf under any circumstances,Theo de Raadt
so we do not need to copy it to the new system.
2022-06-27Fix lock order reversal in nfs_inactive()Visa Hankala
Make the silly file removal happen after the vnode has been unlocked. This avoids a file-directory reversal in the vnode locking order. OK jca@
2022-06-27kqueue: Clear task when closing kqueueVisa Hankala
When closing a kqueue, block until any pending wakeup task has finished. Otherwise, if a pending task progressed slowly, the kqueue could stay alive longer than the associated file descriptor table, causing a use-after-free in KQRELE(). This also fixes a failed assertion "p->p_kq->kq_refcnt.r_refs == 1" in kqpoll_exit(). The use-after-free bug had existed since the introduction of kqueue_task() (the bug could occur if fdplock() blocked in KQRELE()). However, the issue became worse when the task was allowed to run without the kernel lock in sys/kern/kern_event.c r1.187. Prompted by a report from Mikhail on bugs@. OK mpi@ Reported-by: syzbot+fca7e4fa773c90886819@syzkaller.appspotmail.com
2022-06-27Regress test for the open policy role capability. Make sure it properlyClaudio Jeker
fails when enforced or there is a missmatch and that the session is accepeted if the roles match.
2022-06-27bgpctl bits for RFC 9234 support.Claudio Jeker
OK tb@
2022-06-27Add support for RFC 9234 - Route Leak Prevention and Detection Using RolesClaudio Jeker
With this it is possible to send a role in the OPEN message and if that was successful the RDE will add the new OTC attribute if necessary. OK tb@
2022-06-27Remember the error of ucomreadcb() for the next ucomread() call and returns anJan Klemkow
EIO. Thus the userland notices the error and closes the device. We forget the error on reopen and the device works again. Ok mbuhl
2022-06-27Allow the pluart(4) baud rate to be changed.Anton Lindqvist
It's most likely that users have the wrong baud rate in /etc/ttys as this was corrected in revision 1.11 of sys/dev/ic/pluart.c. Make sure to change the console baud rate from 38400 to 115200 in /etc/ttys before upgrading. ok visa@
2022-06-27Instead of calling getuptime() all the time in ARP code, do it onlyAlexander Bluhm
once per function. This gives a more consistent time value. OK claudio@ miod@ mvs@
2022-06-27Prepare to provide EVP_PKEY_security_bits()Theo Buehler
This also provides a pkey_security_bits member to the PKEY ASN.1 methods and a corresponding setter EVP_PKEY_asn1_set_security_bits(). ok beck jsing
2022-06-27Prepare to provide DH_security_bits()Theo Buehler
ok beck jsing
2022-06-27Prepare to provide RSA_security_bits()Theo Buehler
ok beck jsing
2022-06-27Prepare to provide DSA_security_bits()Theo Buehler
ok beck jsing
2022-06-27Prepare to provide BN_security_bits()Theo Buehler
ok beck jsing
2022-06-27Move rc.firsttime additions before some slower jobs run from install.sub.Stuart Henderson
Reduces the risk of post-upgrade steps (sysmerge -b etc) being missed if there was some issue with those jobs e.g. fw_update or reorder_kernel triggering watchdog or an impatient admin to reboot the system. ok florian@