summaryrefslogtreecommitdiff
path: root/libexec
AgeCommit message (Collapse)Author
2024-07-19unveil(2) /etc/gettytab.db in getty(8) to avoid possible violation.Alexander Bluhm
OK deraadt@
2024-07-18Since libcrypto is used to calc message authenticator, use libcryptoYASUOKA Masahiko
md5 also in other places instead libc md5. ok millert
2024-07-17Add Message-Authenticator attriubte when sending Access-Request.YASUOKA Masahiko
ok millert
2024-07-10Allow pfIfTable to have more than 64 entries.Martijn van Duren
Taken from pfctl_table.c r1.85 by sashan@ OK tb@
2022-09-01Import snmpd_metrics.Martijn van Duren
This contains snmpd's mib.c (and friends) adjusted for libagentx. This standalone binary is to be used by snmpd to achieve privilege separation. If people need net-snmpd, but want some of the base snmpd metrics they can start this binary as a normal daemon and connect to net-snmpd's agentx socket. Tested, Feedback, and OK sthen@ Release build test, and OK tb@
2024-06-09Silently ignore setuid changes in relinked binariesAndrew Fresh
If these files are being relinked at reboot, this causes false positives and alert fatigue. Prompted by florian@ Feedback from millert@ and deraadt@
2024-06-04enable -fret-clean on amd64, for libc libcrypto ld.so kernel, and all theTheo de Raadt
ssh tools. The dynamic objects are entirely ret-clean, static binaries will contain a blend of cleaning and non-cleaning callers.
2024-05-22When localtime() fails, throw an error instead of returning aMartijn van Duren
non-sensical 0 filled string. OK florian@
2024-05-21remove prototypes with no matching function and externs with no varJonathan Gray
partly checked by millert@
2024-05-20remove setproctitle() prototype that matches the one in stdlib.hJonathan Gray
2024-05-19remove prototypes with no matching functionJonathan Gray
2024-05-17use SIGKILL instead of 9; ok guentherTheo de Raadt
2024-05-09ctime(3) and ctime_r(3) can fail when timestamps are way off.Florian Obser
Add missing error checks to all calls under libexec/ Input kettenis, millert OK millert
2024-04-28gmtime(3) / locatime(3) can fail when timestamps are way off.Florian Obser
Add missing error checks to all calls under libexec/ Input & OK millert
2024-04-05ld.so should stop calling msyscall(2), since it is fully neutered andTheo de Raadt
about to be removed. Please be careful building through this, you need a kernel at least March 29th or so to build through it, otherwise use snapshots to cross over. ok various people
2024-04-01Advertise SMTPUTF8 and 8BITMIME extensions in EHLO.Todd C. Miller
Fixes potential interoperability issues when the real MTA supports those extensions. From Arnt Gulbrandsen, OK benno@
2024-03-30Prefer illop1 rather than nop for text padding in the ld.so linker script.Miod Vallat
2024-03-30Remove nonsensical comments. NFCMiod Vallat
2024-03-05backup disklabel for softraid(4) chunksKlemens Nanni
Extend "Check for changes to the disklabels of mounted disks" to those that host online softraid volumes, e.g installations with root inside CRYPTO sd0a (and EFI System partition on sd0i). That produces /var/backup/disklabel.sd0.current, previously missing in such setups; noticed after someone dd(1)ed miniroot onto sd0 by accident and had no disklabel(8) backup to restore. Feedback OK bluhm
2024-01-22ugly whitespacesTheo de Raadt
2024-01-19Stop initializing pinsyscall(SYS_execve in dynamic binaries that containTheo de Raadt
a reference reaching the execve(2) stub. The new pinsyscalls(2) that applies to all system calls has made this redundant.
2024-01-17very ugly whitespacesTheo de Raadt
2024-01-16Read PT_OPENBSD_SYSCALLS in libc.so, and convert it to a table forTheo de Raadt
pinsyscalls(2). ok kettenis
2024-01-14Whenever we have a libc major bump, we run the risk that dependent sharedMark Kettenis
libraries will request a different (major) libc version from the one requested by the binary itself. For various reasons loading multiple libc versions is not a good idea, and since the introduction of msyscall(2) support, system calls will only work when called from one of the two loaded libcs. This really means that when we have a libc major bump, users must update all dynamic executables and shared libraries in the system. However, to ease this transition, change ld.so to only load the first libc version that we encounter (in a breadth first sense) and substitute that libc version for all further loads of libc, even if different versions are requested. This is done silently since I can't come up with a good warning message. In practice this means the libc version requested by the executable itself will be loaded. This means that shared libraries may fail to load if they use a symbol that has been removed. But given the constraints, this is the best that we can do. Even when we bump the libc major, the set of changes is typically small and most binaries and shared libraries will continue to run and allow the user to run pkg_add -u without any fallout. ok deraadt@, gkoehler@
2023-12-20create a stub for pinsyscalls(2)Theo de Raadt
2023-12-20there is a super-alignment between btext and text, this creates a hole.Theo de Raadt
Twice, I have seen the sigtramp mapping land inside that hole. This causes grief for the upcoming pinsyscalls() work which operates on address space ranges. But the micro-optimization is silly. ok kettenis
2023-12-20For strange reasons which made sense at the time, the text segment wasTheo de Raadt
placed head of the btext (boot.text) segment. (the boot.text segment is "unmapped" after initization, as a self-protection mechanism). this meant the LOAD's virtual addresses were not in sequence, which clearly isn't what we intended.
2023-12-19whitespacesTheo de Raadt
2023-12-19correct alignment placementTheo de Raadt
2023-12-18correct section the SYS_kbind syscall pin record goes intoTheo de Raadt
noticed by gnezdo
2023-12-16Fix phdr name in ld.script.Kenji Aoyama
ok deraadt@
2023-12-12repair type for 2nd arg of read(2)Theo de Raadt
2023-12-12To avoid kbind(2) becoming a powerful gadget, it is called inline to aTheo de Raadt
function. Therefore we cannot create a precise pinsyscall label. Instead create a duplicate entry (using inline asm) to force the kernel's pinsyscall code to skip validation, rather than labelling it illegal. kbind(2) remains safe because it self-protects by checking its calling address. ok kettenis
2023-12-11Make sure the syscall table entries are aligned on a 4-byte boundary.Theo de Raadt
Required for strict-alignment architectures and a good idea on others. same as kettenis commit to libc
2023-12-11arm just had to be different and change the syntax for .pushsectionTheo de Raadt
arguments, so we have to cope.
2023-12-10Populate the non-LOAD openbsd.syscalls section (and PT_OPENBSD_SYSCALL)Theo de Raadt
with {uint offset, uint syscall#} entries in libc & ld.so. In libc a few syscall# entries (break, sigprocmask, _tfork, _threxit) are duplicated because additional or inline uses occur (that situation is handled elsewhere) ok kettenis
2023-12-08locally us MAXIMUM() rather than MAX()Theo de Raadt
ok tb gnezdo
2023-12-06Move CALLSYS_NOERROR macro from <machine/asm.h> to libc, and expand it forMiod Vallat
non-libc users. This is a two-liner macro anyway, and this will make deraadt@'s future changes in this area easier to make. NFC
2023-11-21Set sc_rtfilter to specific ROUTE_FILTER() values, as was originallyMartijn van Duren
intended, instead of filtering out everything. OK sthen@
2023-11-18crt0 uses a helper function in a MD src/libexec/ld.so .h file (rather thanTheo de Raadt
reproducing the relevant defines and code in a different place) to perform minor relocations. If things go very wrong, it would call _dl_exit() -- a locally defined crt0 function which is syscall exit(2). We don't need to call exit(2) for this obscure case which doesn't happen and provides no debugging information. An 'abort' is going to provide better information. So let's change the function name to _dso_abort() and make it a single illegal instruction. ok guenther
2023-10-24Make hrSWRunPath use argv[0], instead of p_comm. hrSWRunName is supposedMartijn van Duren
to be a descriptive name, where hrSWRunPath should give the full path to the binary. While argv[0] can contain any of a simple binary name, the full path, or a custom name given by the application itself, it gives us the option to retrieve both pieces of information. This is also the same distinction made by netsnmp. This also keeps the default command column from top(1) and snmptop in sync, and now allows for identical output in the column between `top -C` and `snmptop -Cpa` OK tb@
2023-10-24Add support for HOST-RESOURCES-MIB:hrSWRunPerfTable by addingMartijn van Duren
hrSWRunPerfCPU and hrSWRunPerfMem. This allows snmptop to work with snmpd(8). Math copied from top(1). OK tb@
2023-09-05Log a dummy "<unknown>" IP address in the unlikely event that genameinfo(3) ↵Jeremie Courreges-Anglas
fails clang-16 warning reported by robert@, ok tb@ millert@
2023-08-15ldd can pledge "stdio rpath proc exec prot_exec". We can later bifurbicateTheo de Raadt
at the dlopen vs execve split, dropping either "proc" or "prot_exec". ok gnezdo
2023-08-15Improve handling of dlopen(RTLD_TRACE) aka ldd, of a library thatPhilip Guenther
is already loaded: * add a 'trace' argument to _dl_show_objects() and exit the walk-the-objects loop if you hit that traced object * in dlopen(), pass the trace object to _dl_show_objects() * also, invoke _dl_show_objects() + exit if the object was already opened * pass NULL to _dl_show_objects() for all the other calls * oh hey, _dl_tracelib is now superfluous: _dl_show_objects() should do the walk-the-objects loop only if trace is not NULL. Problem noted by gnezdo@ ok millert@
2023-08-15Skip the _dl_msyscall() invocation if tracing library loading.Philip Guenther
Problem noted by gnezdo@ ok millert@
2023-08-12Check for a full read, avoid warn when errno might be unmodifiedGreg Steuck
Promote size from int to size_t. From: lucas at sexy dot is Regress tests by gnezdo@ deraadt: yes
2023-07-24I added the 2nd argument (execpromises) to pledge(2), and then huntedTheo de Raadt
for more than a year code which could use it; but in all non-trivial circumstances (programs which would benefit), I was stopped by issues (in particular by environment variable behavious). But I never looked in ldd(1). This is the FIRST one which is completely obvious. spledge(NULL, "stdio rpath") ok guenther
2023-07-13- use IS_ELF() to check the ELF magic bytesJasper Lievisse Adriaanse
- reject non-sensical program header values which would result in a crash when accessing the 0 bytes sized buffer allocated due to it ok deraadt@ kettenis@
2023-07-12validate alignment of ELF program headersJasper Lievisse Adriaanse