summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Use a 8-th order FIR low-pass filter for resamplingratchov2021-01-112-9/+148
| | | | | At the expence of slightly more CPU cycles, it almost removes aliasing noise in most practical use-cases.
* Simplify sleep signal handling a bit by introducing sleep_signal_check().claudio2021-01-112-19/+26
| | | | | | | The common code is moved to sleep_signal_check() and instead of multiple state variables for sls_sig and sls_unwind only one sls_sigerr is set. This simplifies the checks in sleep_finish_signal() a great bit. Idea from and OK mpi@
* Create a path MTU host route for IPsec over IPv6. Basically thebluhm2021-01-117-32/+111
| | | | | | | | | | | | | | | | code is copied from IPv4 and adapted. Some things are changed in v4 to make it look similar. - ip6_forward increases the noroute error counter, do that in ip_forward, too. - Pass more specific sockaddr_in6 to icmp6_mtudisc_clone(). - IPv6 may also use reject routes for IPsec PMTU clones. - To pass a route_in6 to ip6_output_ipsec_send() introduce one in ip6_forward(). That is the same what IPv4 does. Note that dst and sin6 switch roles. - Copy comments from ip_output_ipsec_send() to ip6_output_ipsec_send() to make code similar. - Implement dynamic IPv6 IPsec PMTU routes. OK tobhe@
* - grab fullpkgpath early (to decide: hard error if not provided) ?espie2021-01-111-6/+16
| | | | | | | | | | | | | | | - tweak the look-up mechanism for dependencies to NOT look at installed packages for inter-dependencies between subpackages (and debug packages) of the SAME pkgpath. The rationale for looking at installed packages in the usual case is that it's normally much faster rather than have the ports tree spew out packing-lists. In the case of multi-packages updates, the new version may have been built successfully (and correctly) while the old version is still around. However, if pkg_create looks at the installed version, it may fail to create the package because the shared library versions will be different.
* Add some basic tests for pflog(4) interface. Create special routingbluhm2021-01-113-2/+225
| | | | | doamin, load rules into pf(4) regress anchor, tcpdump on pflog, send packets over lo(4), grep for expected result in tcpdump output.
* Stop deleting the control socket on daemon shutdown, like we did on othermestre2021-01-111-2/+1
| | | | | | | | | daemons. This avoids giving an additional permission (in this case unveil(2) "c") to the daemon just to be able to delete the socket and we already discussed in the past that leaving that file behind doesn't cause any problems. Discussed with deraadt@ rob@ florian@ OK rob@ benno@ deraadt@
* document how to specify multiple alternative names;jmc2021-01-111-3/+5
| | | | | modified version of diff from wolf on misc, improved by and ok florian benno sthen
* Correct spelling of persourcenetblocksize in config-dump mode.dtucker2021-01-111-2/+2
|
* Change convtime() from returning long to returning int. On platformsdtucker2021-01-114-14/+14
| | | | | | where sizeof(int) != sizeof(long), convtime could accept values >MAX_INT which subsequently truncate when stored in an int during config parsing. bz#3250, ok djm@
* Merge handshake_loop() into handshake(). There's no benefit in havingtb2021-01-101-18/+7
| | | | this factored into a separate function.
* Support .rpm in EXTRACT_CASESkn2021-01-101-2/+4
| | | | | | Less special cases in (rare) ports, pluse one can use EXTRACT_FILES as usual now. OK espie robert
* Backport fix to avoid including math.h from stdlib.h.kettenis2021-01-102-62/+63
| | | | | | Fixes building the textproc/groff port (and maybe others). ok naddy@
* add quirks for Kensington Slimblade trackball via new vendor buttonsthfr2021-01-105-17/+40
| | | | | | | quirks. Original diff from Sven M. Hallberg < pesco () khjk ! org > Diff updated and tested by Timo Myyra ok phessler@
* regenthfr2021-01-102-4/+9
|
* add Kensington Slimblade Trackballthfr2021-01-101-1/+2
|
* Exclude the 'hz' token from the lexer backdoor, so interval and profilejmatthew2021-01-101-4/+8
| | | | | | probes can be parsed again. ok anton@ kn@
* tweak a commenttb2021-01-101-2/+2
|
* Disable base-gcc on loongson and octeon.visa2021-01-107-1226/+1
| | | | OK deraadt@
* Link shared ciphers test to buildtb2021-01-101-1/+3
|
* Add a regress for SSL_get_shared_ciphers() for the change of returnedtb2021-01-101-0/+457
| | | | | | ciphers in ssl_lib.c r1.240 and TLSv1.3 support in tls13_server.c r1.69. requested by jsing
* Split hierarchical calls into kern_sysctl_dirsgnezdo2021-01-091-42/+46
| | | | | | Removed a rash of +/-1 and made both functions shorter and more focused. OK millert@
* Reduce case duplication in kern_sysctlgnezdo2021-01-091-108/+85
| | | | | | | This changes amd64 GENERIC.MP .text size of kern_sysctl.o from 6440 to 6400. Surprisingly, RAMDISK grows from 1645 to 1678. OK millert@, mglocker@
* Fold fitting sysctl_rdint into sysctl_bounded_arr in i386 cpu_sysctlgnezdo2021-01-091-11/+6
| | | | OK millert@
* Enforce range with sysctl_int_bounded in etherip_sysctlgnezdo2021-01-091-2/+3
| | | | OK millert@
* Enforce range with sysctl_int_bounded in swap_encrypt_ctlgnezdo2021-01-091-2/+3
| | | | OK millert@
* Enforce range with sysctl_int_bounded in pipex_sysctlgnezdo2021-01-091-3/+3
| | | | OK millert@
* Enforce range with sysctl_int_bounded in ipip_sysctlgnezdo2021-01-091-2/+3
| | | | OK millert@
* Enforce range with sysctl_int_bounded in sysctl_wdoggnezdo2021-01-091-3/+5
| | | | OK millert@
* Enforce range with sysctl_int_bounded in witness_sysctl_watchgnezdo2021-01-091-10/+8
| | | | | | Makes previously explicit checking less verbose. OK millert@
* Enforce range with sysctl_int_bounded in tcp_sysctlgnezdo2021-01-091-18/+15
| | | | | | | One case uses the explicit range from the code and the other was inferred from reading the usage. OK millert@
* Finish converting ddb_sysctl to sysctl_int_boundedgnezdo2021-01-091-27/+7
| | | | | | | I missed the verbose pattern that it used for error checking the first time around. OK millert@
* Use sysctl_int_bounded in sysctl_hwsmtgnezdo2021-01-091-6/+2
| | | | | | Prefer error reporting is to silent clipping. OK millert@
* Revert mistaken commit: Stop wsmux_attach_sc race from anton@gnezdo2021-01-091-2/+2
|
* Stop wsmux_attach_sc race from anton@gnezdo2021-01-091-2/+2
| | | | OK millert@
* Include the optimized putchar functions only if RASOPS_SMALL is notfcambus2021-01-091-4/+4
| | | | | | defined, as was previously the case. OK kettenis@
* "encoding of diag instructions is hard, let's go shopping"kettenis2021-01-092-69/+31
| | | | | | | Clean up things a bit, adding documentation about the source of the information about these instructions. From miod@
* Move peer related checks from up_test_update() to rde_generate_updates()claudio2021-01-092-37/+18
| | | | | | | | | both the export check and the address family check should be done as early as possible since these peers will not need any kind of updates to happen. Also remove the non-standard ORIGINATOR_ID check. With this up_test_update() becomes a simple true/false function which makes the rest of the code a bit simpler. OK benno@
* Test that local UDP broadcast packets to 255.255.255.255 are handledbluhm2021-01-092-4/+110
| | | | correctly by socket splicing. They generate an ELOOP error.
* If the loop check in somove(9) goes to release without setting anbluhm2021-01-091-3/+2
| | | | | | | error, a broadcast mbuf will stay in the socket buffer forever. This is bad as multiple mbufs can use up all the space. Better report ELOOP, dissolve splicing, and let userland handle it. OK anton@
* Syzkaller has found a stack overflow in socket splicing. Broadcastbluhm2021-01-091-2/+5
| | | | | | | | | | | | packets were resent through simplex broadcast delivery and socket splicing. Although there is an M_LOOP check in somove(9), it did not take effect. if_input_local() cleared the M_BCAST and M_MCAST flags with m_resethdr(). As if_input_local() is used for broadcast and multicast delivery, it was a mistake to delete them. Keep the M_BCAST and M_MCAST mbuf flags when packets are reinjected into the network stack. Reported-by: syzbot+a43ace363f1b663238f8@syzkaller.appspotmail.com OK anton@; discussed with claudio@
* Remove locally imposed limit on sockets.rob2021-01-092-20/+14
| | | | Suggested by martijn@, ok claudio@
* Enable support for floating-point exceptions. We always run in "precise"kettenis2021-01-098-31/+68
| | | | | | | | | | | | mode. On modern processors (POWER8 and later) there is no performance penalty for this as long as exceptions are disabled in the FPSCR (which is the default). This way we don't have to implement an architecture-dependent system call to set the mode, as it can only be done by the kernel. With help from gkoehler@ ok gkoehler@
* add a comma to previous;jmc2021-01-091-2/+2
|
* kill trailing whitespacejasper2021-01-091-12/+12
|
* whitespacetb2021-01-092-7/+7
|
* Adjust kexfuzz to addr.c/addrmatch.c split.dtucker2021-01-091-2/+2
|
* Update unittests for addr.c/addrmatch.c split.dtucker2021-01-099-17/+18
|
* Replace a custom linked list with SLIST.visa2021-01-091-12/+10
|
* Replace SIMPLEQ with SLIST because the code does not need a queue.visa2021-01-091-26/+24
|
* Remove unnecessary relocking of w_mtx as panic() should not return.visa2021-01-091-10/+2
|