summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2017-11-13add taskq_barrierDavid Gwynne
taskq_barrier guarantees that any task that was running on the taskq has finished by the time taskq_barrier returns. it is similar to intr_barrier. this is needed for use in ifq_barrier as part of an upcoming change.
2017-11-13Add support for the i2c controller variant found on the Allwinner A31 andMark Kettenis
above and enable the driver on arm64. From Artturi Alm. Tested by Stephen Graf.
2017-11-13Add i2c-related clocks for Allwinner H3/H5/A64.Mark Kettenis
From Artturi Alm. Tested by Stephen Graf.
2017-11-13Constrain MBR partition offsets to 0 .. disk.size - 1.Kenneth R Westerback
Issue reported by Alexi Malinin via bugs@. Thanks!
2017-11-13tweak previous;Jason McIntyre
2017-11-13Grab the KERNEL_LOCK() to iterate on the global list of PF_KEY sockets.Martin Pieuchot
It isn't safe to manipulate PF_KEY sockets without KERNEL_LOCK() because they aren't protected by the NET_LOCK(). I missed this in my previous audit and neither my tests, the regression tests nor the IPsec performance tests exposed the problem. Hopefully I added the right check to soassertlocked() a while back. Found the hardway by and ok sthen@
2017-11-13Remove useless comment about if_ioctl() & reduce grep noise.Martin Pieuchot
2017-11-13Do not call splassert_fail() if splassert_ctl is <= 0.Martin Pieuchot
This matches splassert(9)s behavior and prevent noise when a CPU panic(9) and set splassert_ctl to 0. Found the hardway by sthen@
2017-11-13When searching in copy mode, do not scroll if the result is already onNicholas Marriott
screen. GitHub issue 1150.
2017-11-13add a generic packet rate matching filter. allows things likeHenning Brauer
pass in proto icmp max-pkt-rate 100/10 all packets matching the rule in the direction the state was created are taken into consideration (typically: requests, but not replies). Just like with the other max-*, the rule stops matching if the maximum is reached, so in typical scenarios the default block rule would kick in then. with input from Holger Mikolon ok mikeb
2017-11-13Newer Allwinner SoCs (H3/H4/A64) use an "unconfigured" default state.Mark Kettenis
Recognize this state and allow user configuration of the pin if the pin is left into this state. tested by Stephen Graf.
2017-11-13Remove 18 year old #if 0.Martin Pieuchot
ok visa@, benno@
2017-11-13remove the ability for pf_ouraddr to say that a packet is forwarded.David Gwynne
having pf_ouraddr say a packet is forwarded let's in_ouraddr avoid doing a route lookup for the packet. however, because it is forwarded we need to do a route lookup in ip_output anyway to know where it goes. in_ouraddr does a bunch of extra checks on the result of the route lookup that ip_output does not do though, including special handling of ip_directedbroadcast and M_BCAST. if you have directed broadcast enabled and do not do these checks, the ethernet layer will loop a copy of broadcast packets back into the stack recursively which can blow the thread stack in the kernel. discussed with jmatthew@, sashan@, and henning@ ok mpi@ diagnosing this led to the enabling of a guard page on amd64 kernel stacks, which was necessary for correctly identifying this problem.
2017-11-12Remove HN_DIR variable and expand it in the only place it was used. ItTheo Buehler
currently serves no purpose. ok rpe, agreement from deraadt and halex
2017-11-12Only use a single taskq to process incoming network packets as soon asMartin Pieuchot
IPsec is enabled. This is currently a no-op since we still use a single taskq. But it will allows us to experiment with multiple forwarding threads and the PF_LOCK() without having to fix IPsec at the same time. ok sashan@, visa@
2017-11-12Clone epoch value in clone_lease(), not manually.Kenneth R Westerback
2017-11-11replace sloppy parsing of numeric values with strtonum (incr, decr, divert)Marc Espie
still use integers, so use the natural bounds for these. POSIX says m4 should error when these use non numeric values, and now they do. okay millert@
2017-11-11reads better as *an* rdomain, i think;Jason McIntyre
2017-11-11regress tests to match previous switch handling in vmd update.Mike Larkin
diff from carlos cardenas, thanks.
2017-11-11update switch handling in vmd(8). vmd now gets switch information (rdomain,Mike Larkin
etc) from underlying switch interface instead of handling this on its own. Diff from carlos cardenas, Thanks! ok reyk@
2017-11-11Fix a broken compilation when using SCSIDEBUG options(4).Mike Larkin
Diff from Carlos Cardenas, thanks! ok krw@
2017-11-10replace last instances of /dev/arandom with /dev/urandomChristian Weisgerber
2017-11-10Be less assertive when warning about a possible typo.Jeremie Courreges-Anglas
ok schwarze@ "good compromise" jmc@
2017-11-10When tracing is compiled in make sure it flushes its content to disk asMartijn van Duren
soon as the TRACE function is called. This helps while debugging crashes. Noticed and annoyed by while debugging the SIGTERM crash I just submitted. OK millert@ and tb@
2017-11-10Fix a use after free when sending SIGHUP or SIGTERM to vi when in editingMartijn van Duren
mode. Found while testing previous commit by millert@ OK millert@ and tb@
2017-11-10"unknown KDF type 2" -> "keydisk not found".Sunil Nimmagadda
Inputs and ok jsing@.
2017-11-10Add rcv_openat() function that does the open, makes sure it is aTodd C. Miller
regular file with the expected permissions and locks it. Inspired by changes in NetBSD by Christos. OK martijn@
2017-11-10Avoid using system(3) when running "sendmail -t". We already haveTodd C. Miller
the recover file fd open so just run sendmail with stdin set to the recover file. OK martijn@
2017-11-10streamline termp allocation. this will allow the init function toMarc Espie
do things differently in the ps vs pdf case. okay schwarze@
2017-11-10Introduce a reader version of the NET_LOCK().Martin Pieuchot
This will be used to first allow read-only ioctl(2) to be executed while the softnet taskq is running. Then it will allows us to execute multiple softnet taskq in parallel. Tested by Hrvoje Popovski, ok kettenis@, sashan@, visa@, tb@
2017-11-10Use percpu counters with etheripstat.Visa Hankala
Input and OK jca@, OK florian@
2017-11-09If we successfully change the directory, set PWD too to give the shell aNicholas Marriott
hint in case of symlinks.
2017-11-09Use the proper macros in AUTHORS, and delete the bogus BUGS section.Ingo Schwarze
Reporting OpenBSD bugs to GNU makes no sense...
2017-11-09tweak previous;Jason McIntyre
2017-11-09/usr/share/compile -> /usr/share/relink/kernelAntoine Jacoutot
from semarie I meant to do that at p2k17 but totally forgot...
2017-11-09Use lease 'epoch' (time lease was acquired) to calculate timers forKenneth R Westerback
renew/rebind/expiry. Treat renew/rebind/expiry statements in leases as comments for human consumption.
2017-11-09kill trailing whitespace introduced in previous commitTheo Buehler
2017-11-09The cmd argument of ifconf() has been unused since COMPAT_LINUX wasTheo Buehler
purged. Remove it and move the prototype to if.c since ifconf() is not used outside of this file. ok mpi
2017-11-09Synchronize command initiation, event wait, and interrupt handlingVisa Hankala
using a mutex. This lets octmmc_intr() run without the KERNEL_LOCK(). Tested on CN6120, CN7130 and CN7360.
2017-11-08Wait for the splicing syscall by grepping it in the relay log. ThisAlexander Bluhm
ensures that scapy's SYN+ACK packet hits the TCP stack when it hurts.
2017-11-08The TF_BLOCKOUTPUT flag is set around all sorwakeup() and sowwakeup()Alexander Bluhm
calls in tcp_input(). When I added this code for socket splicing, I have missed that they may be called indirectly through functions. Although not strictly necessary since we have the sosplice thread, put that flag consistently when we want to prevent that tcp_output() is called in the middle of tcp_input(). As soisconnected(), soisdisconnected(), and socantrcvmore() call the wakeup functions from tcp_input(), set the TF_BLOCKOUTPUT flag around them. OK visa@
2017-11-08Add a type cast to force signed comparison. This fixes a loopVisa Hankala
termination issue that can arise when parsing IP options. The bug was found by Hrvoje Popovski with ping -R. Fix tested by Hrvoje, OK millert@
2017-11-08Do not accept superfluous arguments.Patrick Wildt
From Klemens Nanni. ok markus@
2017-11-08Make {ah,esp,ipcomp}stat use percpu counters.Visa Hankala
OK bluhm@, mpi@
2017-11-08In the final RFC 5903 the computation for the DH shared secret changed.Patrick Wildt
Instead of the full point, only the X point is included. The member g_xy is always the shared secret but so far its buffer has been allocated using the size of the public points. Since this is a different size now, as the shared secret for EC Groups should only store the x point, we need another member to specify the length of g_xy. Since this is a backwards incompatible change older isakmpds won't be able to negotiate if you use EC groups. Bump the version of our own vendor tag so peers can try to keep compatibility based on the presen- ted tag. This could be used to implement backwards compatibility to older isakmpds. Prompted by and ok mpi@
2017-11-08Enable this test on i386.Martin Pieuchot
2017-11-08/usr/share/compile -> relink; ok tbJason McIntyre
2017-11-08For IPcomp we need to load explicit ESP-flows for the IPIP or IPCOMPPatrick Wildt
tunneled packets, otherwise every packet between the gateways will be sent into the tunnel (e.g. ICMP, too). ok markus@
2017-11-08Since r1.41 the extensions are included in the CSR. Thus ca_request()Patrick Wildt
already sets the extension values and returns. ca_sign() re-uses the information to write out the extension file. Since ca_request() uses strings stored on the stack, on return the pointers to those strings will be unusable. To fix this, strdup() the strings passed ca_setenv() so we can re-use them in another scope. And free() them when we clear the environment in ca_clrenv(). Initial report and diff from Andrei-Marius Radu. ok markus@
2017-11-08Fixup what looks like a merge mistake; no functional changeMike Belopuhov