summaryrefslogtreecommitdiff
path: root/usr.sbin
AgeCommit message (Collapse)Author
2022-11-10vmd(8): remove toggling interrupt line on vcpu in vcpu run loopDave Voutila
We toggle the interrupt "line" on the vcpu when we assert or deassert irq on the pic in either the vcpu thread (emulating some devices) or on the device event thread (mostly handling reading available data). Having it in the vcpu run loop here just results in another ioctl(2) call before the one for re-entering the guest cpu. Removing it shows no noticeable behavioral change in existing guests. ok mlarkin@
2022-11-10Initialize data before passing it to get_input_data. StrictlyMoritz Buhl
speaking this is not necessary as all used bits of the uint32_t are zeroed. ok mlarkin
2022-11-10Indicate compliance with work-in-progress spec for ROA objectsJob Snijders
2022-11-10vmd(8): import mmio decode and emulation, disabled for now.Dave Voutila
The initial mmio support for vmd adds support for only specific MOV and MOVZX instructions. Plan is to begin iterating in-tree on other missing pieces. All functionality is gated behind an #if for now. Only change to vmm(4) is reordering register #define's in vmmvar.h. ok mlarkin@
2022-11-10A theoretical path exists where ext.data1 is not initialized byMoritz Buhl
parseextcommunity but used afterwards. Found by codechecker. OK claudio
2022-11-10change default output to -a format; ok tbTheo de Raadt
2022-11-10In case RSA_meth_new fails, errstr would be passed to fatalx withoutMoritz Buhl
initialization. OK tb
2022-11-10always call va_end.Moritz Buhl
ok tb
2022-11-09nreq could leak a http get request in case a redirect withoutMoritz Buhl
location header was received. OK deraadt
2022-11-09In do_zzz a garbage stack value could be accessed in case a readMoritz Buhl
or write in send_command failed. Found by codechecker. OK deraadt
2022-11-09Error out if a ROA payload contains too many ipAddrBlocksJob Snijders
The ASN.1 profile in draft-ietf-sidrops-rfc6482bis section 4 specifies that there must not be more than 2 ipAddrBlocks (one for IPv4, and one for IPv6). Compatible with all published ROAs. OK tb@
2022-11-09ndp, route, netstat: adjust ipv6 address widthKlemens Nanni
It has been annoying me for too long that fully specififed GUAs (2001:0db8:3333:4444:5555:6666:7777:8888) mess up alignment. systat(1)'s netstat is the only view that has a big enough limit and thus never misaligns. Unify ndp(8), route(8) and netstat(1) views to always align nicely. Feedback OK claudio
2022-11-09Properly handle L3VPN routes in kroute. This got broken while reworkingClaudio Jeker
large part of the code. Issue reported and fix tested by Bars Bars tutbaranov (at) gmail.com OK tb@
2022-11-09Fix nlri parsing of L3VPN prefixes in withdrawals.Claudio Jeker
L3VPN NLRI have different encoding for updates and withdraws. The withdraw carries one dummy MPLS label that needs to be skipped. The code doing that did adjust the lenght but did not skip the the label in the buffer and so the parsed prefix was off by 3 bytes. OK tb@
2022-11-09Show the MPLS label of a L3VPN route in show fib output.Claudio Jeker
OK tb@
2022-11-09document '=' as a pkgspecMarc Espie
2022-11-09Remove old-style eeprom mentions and relevant leftover code; ok kettenis@Miod Vallat
2022-11-08Skip softraid(4) keydisks silentlyKlemens Nanni
Logging the presence of a keydisk the same way offline data chunks are logged seems unjustified: Offline data chunks mean the softraid volume is degraded and installboot(8) should be rerun when they're online. Offline keydisks just means the user unplugged their USB key or so and installboot must never touch them anyway, so the absence of keydisks is meaningless to installboot -- it should never touch them. So a) drop the "is keydisk - skipping" message and b) hoist the keydisk check before the offline check so as to avoid "not online - skipping" messages for offline keydisks.
2022-11-08whitespace fix in debug printf, no functional change.Dave Voutila
2022-11-08Document network-boot-arguments for sparc64 diskless(8)Klemens Nanni
The Oracle OpenBoot 4.x Administration Guide[0] documents a few useful options for network boot. Basically, either {ok} setenv network-boot-arguments tftp-retries=0 {ok} boot net ... or {ok} boot net:tftp-retries=0 ... Newer machines like the T4-2 using OpenBoot 4.38.16 also support BOOTP/DHCP besides RARP: "dhcp,hostname=puffy" works as expected on my T4-2, but "boot-filename" and "boot-retries" remain unsupported on this particular machine despite being documented in the guide. 0: https://docs.oracle.com/cd/E63648_01/html/E63649/gpvll.html#scrolltoc OK miod
2022-11-08Make "prepare filesystem" softraid aware, fix arm64 softraid installKlemens Nanni
On EFI platforms, 'installboot -p' on a softraid volume will only prepare the filesysem inside the volume and leave physical softraid chunks untouched which leaves you with unbootable chunks. The current workaround is to prepare chunks manually (see regress). Fix it in the same spirit the actual "install" already works in softraid.c. This is what mlarkin has already been tested in a combined diff with the MD -> MI softraid merge bits from the previous commit. Works fine on amd64, arm64 and sparc64 upgrades and installations. OK jsing
2022-11-08stray spaceTheo Buehler
2022-11-07Fix a memory leak in the error path of rde_dump_ctx_new.Moritz Buhl
ctx is leaked in case of an allocation in prefix_dump_new, prefix_dump_subtree, rib_dump_new, or rib_dump_subtree fails. Found by CodeChecker. OK claudio@
2022-11-07Fix theoretical access to garbage stack memory in pfkey_reply forMoritz Buhl
bgpd and ldpd. Found by CodeChecker. OK claudio@
2022-11-07Simplify use of strrchr()Job Snijders
with and OK tb@
2022-11-07Merge duplicate MD code into MI sr_open_chunk()Klemens Nanni
It does not have the prettiest signature, but nicely folds identical copies into softraid.c, which then allows us to reuse sr_open_chunk() yet again in an upcoming diff to make -p softraid aware (fixes arm64 installations). Regress keeps passing. Works fine on amd64, arm64 and sparc64. "looks fine" mlarkin for whom this unbreaks a fresh arm64 softraid install
2022-11-07Fix some spelling errors.Moritz Buhl
OK claudio@
2022-11-07Confirm Path Length is absent in the Basic Constraints extensionJob Snijders
OK tb@
2022-11-06Nuke some 'set but not used' pathlen variables.Kenneth R Westerback
ok beck@
2022-11-06Next to signedObject only allow rpkiNotify accessMethodsTheo Buehler
Instead of ignoring all non-signedObject accessMethods, we can be stricter and only allow rpkiNotify (for now) and error on anything else. Also make sure we properly clean up behind ourselves on error. With and ok job
2022-11-06Don't leak args.fspec in create_filesystem().Kenneth R Westerback
ok kn@
2022-11-06Fix typo in comment about pledges (send -> sendfd).Dave Voutila
No functional change.
2022-11-06typo: wlll -> willAntoine Jacoutot
2022-11-06Reintroduce snippet describing startup behaviour to where it belongs. ok jmc@Otto Moerbeek
2022-11-06remove the remnants of the old -s option, which was left stranded with poor,Jason McIntyre
innocent -n; noticed by indivc on misc@
2022-11-04Do not fail on non-rsync URIs in EE cert SIA extensionsTheo Buehler
The spec allows multiple accessMethod entries, ordered by preference. While an rsync URI must be present, others are allowed. Do not fail in that situation and pick the first rsync URI encountered. The logic is very similar to the one in x509_get_crl(). ok job
2022-11-04In very verbose mode, log unexpected accessMethodsTheo Buehler
While RFC 6487, 4.8.2.2 is very explicit about allowing id-ad-signedObject as the only accessMethod, the clear language was lost during the RFC 8182 editing process. APNIC, TWNIC and JPNIC and a few others are currently known to have an id-ad-rpkiNotify. The verbose logging allows us to check the ecosystem while waiting for the point in time where we can turn this into an error. See also https://www.rfc-editor.org/errata/eid7239. ok job
2022-11-04Format filemode output in a tabular fashion to improve readabilityJob Snijders
OK tb@ claudio@
2022-11-04allow "=" to be "hey only the default value" for pkgspec in dependenciesMarc Espie
to be used later once it's in snaps.
2022-11-04Add missing field initializer.Theo Buehler
ok claudio
2022-11-04whitespaceTheo Buehler
2022-11-04Catch bad characters in rpkiManifest filenames earlier onJob Snijders
This improves the hard-to-read error: rpki-client: .rrdp/59B96A4C078FDCEDBB776D5BE8DF45EAC0149157547270EA7D4647A76611E145/rpki-rsync.us-east-2.amazonaws.com/volume/220c3ec2-ccf9-4b8a-bf61-fd4d1e151271/LAXNBPgDnLLjagP8++RFIoaMCGo.mft: RFC 6487 section 4.8.6: CRL: bad CRL distribution point extension rpki-client: rpki-rsync.us-east-2.amazonaws.com/volume/220c3ec2-ccf9-4b8a-bf61-fd4d1e151271/LAXNBPgDnLLjagP8++RFIoaMCGo.mft: no valid mft available to: rpki-client: rpki.ripe.net/repository/DEFAULT/ZMvVW3ZpjFaCVe2TtDEqMlyFk3E.cer: SIA: rpkiManifest filename contains invalid characters OK tb@
2022-11-04Don't show CPS URIs when in filemodeJob Snijders
OK tb@
2022-11-04Check the SIA signedObject in ROA/MFT/ASPA/TAK/GBR EE certificatesJob Snijders
Unfortunately we can't yet error out when accessMethods other than signedObject are encountered in the SubjectInformationAccess extension because there is pollution in the ecosystem. OK tb@
2022-11-03don't needlessy uppercase Nd;Jason McIntyre
2022-11-03Constrain KeyUsage and ExtendedKeyUsage on both CA & EE certificatesJob Snijders
RFC 6487 section 4.8.4 restricts the KeyUsage extension on EE certificates to only be digitalSignature. RFC 6487 section 4.8.5 forbids the ExtendedKeyUsage extension from appearing on CA certificates. However, this may change in the future through the standardisation process. OK tb@
2022-11-03shorten Autonomous System Provider AuthorizationsJob Snijders
2022-11-03Add notion of ASPAJob Snijders
2022-11-03Permit only keyCertSign and CRLSign in CA KeyUsage extensionJob Snijders
OK tb@
2022-11-02Emit warnings when unexpected X.509v3 extensions are encounteredJob Snijders
OK tb@