Re: use NULL instead of 0 for pointers in sys/net

2021-10-23 Thread Jonathan Gray
On Sun, Oct 24, 2021 at 07:23:30AM +0200, Sebastien Marie wrote: > > ok semarie@ > > and while reviewing the code, I saw sppp_get_ip_addrs() last argument > (u_int32_t *srcmask) is always passed as NULL. > > In fact, both sppp_get_ip_addrs() and sppp_get_ip6_addrs() has the > same argument

Re: use NULL instead of 0 for pointers in sys/net

2021-10-23 Thread Sebastien Marie
ok semarie@ and while reviewing the code, I saw sppp_get_ip_addrs() last argument (u_int32_t *srcmask) is always passed as NULL. In fact, both sppp_get_ip_addrs() and sppp_get_ip6_addrs() has the same argument never used. Does it is something to simplify ? The code inside the functions is

Re: is rpath needed on rad(8)?

2021-10-23 Thread Sebastien Marie
On Sat, Oct 23, 2021 at 06:55:02PM +0100, Ricardo Mestre wrote: > does rad(8) actually need rpath here? as far as i can see it needs to open the > config, plus its includes, but that is already done before pledge(2) by imsg > sending IMSG_RECONF_CONF. > > florian@ is this correct or am i trusting

libc ansi

2021-10-23 Thread Jonathan Gray
Index: db/btree/bt_close.c === RCS file: /cvs/src/lib/libc/db/btree/bt_close.c,v retrieving revision 1.10 diff -u -p -r1.10 bt_close.c --- db/btree/bt_close.c 16 Jan 2015 16:48:51 - 1.10 +++ db/btree/bt_close.c 24 Oct 2021

grdc: show timezone when TZ is set

2021-10-23 Thread James Russell Stickney
I recently found myself wanting to moniter local time from a number of locations around the world. Setting the TZ environment variable on grdc did a wonderfull job at this. At which point, I wanted to know which clock was showing what time. This lead to the following patch. If curious as to how

use NULL instead of 0 for pointers in sys/{crypto,nfs,scsi,uvm}

2021-10-23 Thread Jonathan Gray
excluding sys/crypto/xform_ipcomp.c:76:23 as zlib has Z_NULL as 0 diff --git sys/crypto/cryptosoft.c sys/crypto/cryptosoft.c index dcb815aaa17..be1f3f1ec5c 100644 --- sys/crypto/cryptosoft.c +++ sys/crypto/cryptosoft.c @@ -424,7 +424,7 @@ swcr_authcompute(struct cryptop *crp, struct cryptodesc

use NULL instead of 0 for pointers in sys/ddb

2021-10-23 Thread Jonathan Gray
diff --git sys/ddb/db_break.c sys/ddb/db_break.c index dfe2f3af912..85354e32987 100644 --- sys/ddb/db_break.c +++ sys/ddb/db_break.c @@ -46,8 +46,8 @@ #defineNBREAKPOINTS100 struct db_breakpoint db_break_table[NBREAKPOINTS]; db_breakpoint_tdb_next_free_breakpoint =

use NULL instead of 0 for pointers in sys/netinet*

2021-10-23 Thread Jonathan Gray
diff --git sys/netinet/in_pcb.c sys/netinet/in_pcb.c index cd60f66b50a..d3b6e4a1015 100644 --- sys/netinet/in_pcb.c +++ sys/netinet/in_pcb.c @@ -756,7 +756,7 @@ in_rtchange(struct inpcb *inp, int errno) { if (inp->inp_route.ro_rt) { rtfree(inp->inp_route.ro_rt); -

use NULL instead of 0 for pointers in sys/net

2021-10-23 Thread Jonathan Gray
diff --git sys/net/bpf.c sys/net/bpf.c index 87a9d726423..87418c3dc17 100644 --- sys/net/bpf.c +++ sys/net/bpf.c @@ -1019,7 +1019,7 @@ bpf_setf(struct bpf_d *d, struct bpf_program *fp, int wf) KERNEL_ASSERT_LOCKED(); - if (fp->bf_insns == 0) { + if (fp->bf_insns == NULL) {

more ipsec mbuf pointer

2021-10-23 Thread Alexander Bluhm
Hi, There are more m_pullup()s in IPsec input. Pass down the pointer to the mbuf. At the end it will reach ip_deliver() which expects a pointer to an mbuf anyway. ok? bluhm Index: netinet/ip_ah.c === RCS file:

Re: Fix vi(1) recovery - new method

2021-10-23 Thread trondd
Any feedback, direction, or suggestions? I'd like to see something get in as the current situation not only doesn't recover unsaved work but it sets a user up to potentially lose saved work, too. Tim. trondd wrote: > This is a new attempt at fixing vi(1) recovery by actually writing > to

Re: [patch] man page improvement for sem* family of functions

2021-10-23 Thread Jason McIntyre
On Fri, Oct 22, 2021 at 10:36:55PM +0300, Mikhail wrote: > On Sat, Oct 16, 2021 at 03:13:39PM +0300, Mikhail wrote: > > Hello, I was troubleshooting postgresql not being able to start after > > 'pkill -6 postgres'. The error was: > > > > FATAL: could not create semaphores: No space left on device

Re: relayd patch for websocket upgrade

2021-10-23 Thread Sebastian Benoit
commited, Thanks for reporting and this and the patches, and sorry for the delay. /Benno Sebastian Benoit(be...@openbsd.org) on 2021.10.23 22:22:10 +0200: > Jonathon Fletcher(jonathon.fletc...@gmail.com) on 2021.10.19 14:26:51 -0700: > > On Sun, May 02, 2021 at 11:05:16AM -0700, Jonathon

snmp{,d}: Clean up non-SNMP encodings

2021-10-23 Thread Martijn van Duren
RFC2578 section 7.1.1: The INTEGER type (but not the Integer32 type) may also be used to represent integer-valued information as named-number enumerations. RFC3416 section 2.5: A BITS value is encoded as an OCTET STRING So these two can go. There's still plenty opportunity for cleanup

Re: relayd patch for websocket upgrade

2021-10-23 Thread Sebastian Benoit
Jonathon Fletcher(jonathon.fletc...@gmail.com) on 2021.10.19 14:26:51 -0700: > On Sun, May 02, 2021 at 11:05:16AM -0700, Jonathon Fletcher wrote: > > On Sun, Mar 07, 2021 at 06:22:04PM -0800, Jonathon Fletcher wrote: > > > On Sun, Mar 07, 2021 at 06:46:33PM +0100, Marcus MERIGHI wrote: > > > >

ipsec(4): speedup ESP

2021-10-23 Thread Tobias Heider
The diff below removes a few leftover tdb_crypto allocations in esp_input() and esp_output(). The allocations were needed to pass arguments to the callback function with the non-blocking crypto API and are redundant now that crypto is blocking. This should result in a notable speedup for ESP.

is rpath needed on rad(8)?

2021-10-23 Thread Ricardo Mestre
does rad(8) actually need rpath here? as far as i can see it needs to open the config, plus its includes, but that is already done before pledge(2) by imsg sending IMSG_RECONF_CONF. florian@ is this correct or am i trusting too much on my eyes? Index: rad.c

missing explicit_bzero(3) on login_reject(8)

2021-10-23 Thread Ricardo Mestre
ensure that sensitive data is zeroed out from mem. ok? Index: login_reject.c === RCS file: /cvs/src/libexec/login_reject/login_reject.c,v retrieving revision 1.17 diff -u -p -u -r1.17 login_reject.c --- login_reject.c 26 Apr

Re: Please test: full poll/select(2) switch

2021-10-23 Thread Alexander Bluhm
On Sat, Oct 23, 2021 at 10:40:56AM +0100, Martin Pieuchot wrote: > Diff below switches both poll(2) and select(2) to the kqueue-based > implementation. Passed regress on i386. > In addition it switches libevent(3) to use poll(2) by default for > testing purposes. It created some test failures

Re: unveil(2) stty(1)

2021-10-23 Thread Theo de Raadt
Ah, right. OK deraadt Ricardo Mestre wrote: > the semantics should be to call unveil on something before the NULL,NULL > otherwise nothing will get unveiled, maybe bob disagrees? :) > > regarding the weird behaviour well there are other programs with the same > issue, see pfctl, it accepts

Re: unveil(2) stty(1)

2021-10-23 Thread Ricardo Mestre
the semantics should be to call unveil on something before the NULL,NULL otherwise nothing will get unveiled, maybe bob disagrees? :) regarding the weird behaviour well there are other programs with the same issue, see pfctl, it accepts several configs but only stops loading if one of them is

Re: unveil(2) stty(1)

2021-10-23 Thread Theo de Raadt
But the -f file is opened above your proposed unveil() addition. So I think you only need unveil(NULL,NULL). While here, I see a different weird problem: stty -f file -f dsaf -f dsaf -f sadf -f asdf -f sadf You can pass lots of -f options, and stty will leak them the fd's. I suspect it

unveil(2) stty(1)

2021-10-23 Thread Ricardo Mestre
stty(1) can't be pledged for all modes, but it can be unveiled. the only file to be opened is on stty -f `file', so call unveil(2) afterwards to restrict all fs access. tested with all arguments through ktrace/kdump. ok? Index: stty.c

Re: simplify sys___thrsigdivert a bit

2021-10-23 Thread Claudio Jeker
On Sat, Oct 23, 2021 at 05:47:58PM +0200, Mark Kettenis wrote: > > Date: Sat, 23 Oct 2021 17:29:36 +0200 > > From: Claudio Jeker > > > > The sys___thrsigdivert code can be simplified a bit. It is possible to > > set the error before the loop and then have the loop exit after polling > > for

Re: simplify sys___thrsigdivert a bit

2021-10-23 Thread Mark Kettenis
> Date: Sat, 23 Oct 2021 17:29:36 +0200 > From: Claudio Jeker > > The sys___thrsigdivert code can be simplified a bit. It is possible to > set the error before the loop and then have the loop exit after polling > for pending signals. IMO the results looks nicer than what we have now. > > OK?

Re: fix IO handling in rpki-client

2021-10-23 Thread Sebastian Benoit
ok benno@ Claudio Jeker(cje...@diehard.n-r-g.com) on 2021.10.23 14:20:19 +0200: > This diff changes the io read functions to work on ibufs. > With this the poll loops will consume data with io_buf_read() until a full > message is received and then that message is processed. Thanks to this > the

simplify sys___thrsigdivert a bit

2021-10-23 Thread Claudio Jeker
The sys___thrsigdivert code can be simplified a bit. It is possible to set the error before the loop and then have the loop exit after polling for pending signals. IMO the results looks nicer than what we have now. OK? -- :wq Claudio Index: kern/kern_sig.c

Re: httpd request body too large in log

2021-10-23 Thread Klemens Nanni
On Sat, Oct 23, 2021 at 05:21:53PM +0200, Sebastian Benoit wrote: > differentiate the third 413 from the other two in httpd. OK kn

httpd request body too large in log

2021-10-23 Thread Sebastian Benoit
differentiate the third 413 from the other two in httpd. ok? diff --git usr.sbin/httpd/server_http.c usr.sbin/httpd/server_http.c index 153829f4201..bf3fae05414 100644 --- usr.sbin/httpd/server_http.c +++ usr.sbin/httpd/server_http.c @@ -1406,7 +1406,7 @@ server_response(struct httpd *httpd,

Re: ipsec input mbuf pointer

2021-10-23 Thread Vitaliy Makkoveev
> On 22 Oct 2021, at 21:38, Alexander Bluhm wrote: > > Hi, > > I found a m_pullup() down in ah input. As it may free or change > the mbuf, the caller must be careful. All callers do not use the > mbuf, so we are safe. Nevertheless I would like to use a common > pattern to handle this. Pass

Re: crypto: retire async crypto API

2021-10-23 Thread Vitaliy Makkoveev
> On 23 Oct 2021, at 16:08, Tobias Heider wrote: > > Now that we have removed all the legacy crypto offloading drivers we can > simplify the crypto framework API by ripping out the async callbacks. > > The diff below removes crypto_dispatch() and crypto_done() and replaces > them with

Re: [patch] man page improvement for sem* family of functions

2021-10-23 Thread Mikhail
On Sat, Oct 23, 2021 at 11:45:03AM +0100, Jason McIntyre wrote: > i think this is fine. are you asking for an ok because you are a > developer? if not i'll commit it unless i hear anyone object. I'm not a developer, so please commit on your behalf.

Re: crypto: retire async crypto API

2021-10-23 Thread Alexander Bluhm
On Sat, Oct 23, 2021 at 03:08:29PM +0200, Tobias Heider wrote: > Now that we have removed all the legacy crypto offloading drivers we can > simplify the crypto framework API by ripping out the async callbacks. > > The diff below removes crypto_dispatch() and crypto_done() and replaces > them with

Re: new option for rcctl ls

2021-10-23 Thread Maxim
Stuart Henderson, 2021-10-21 16:45:47 +0100: > Sometimes I find it useful to list daemons which are set to 'disabled' > but are actually running. Either those where I have started them by hand > forgotten to enable in rc.conf.local, or to check for services which > shouldn't be running but which

Re: [Possible patch] httpd and HEAD requests to CGI scripts

2021-10-23 Thread Sebastian Benoit
Ross L Richardson(open...@rlr.id.au) on 2021.10.09 21:40:50 +1100: > This relates to the earlier messages I sent to bugs@ in: > https://marc.info/?t=16330937691=1=2 > > RFC 7231 [HTTP/1.1] section 4.3.2. "HEAD" states: > The HEAD method is identical to GET except that the server

crypto: retire async crypto API

2021-10-23 Thread Tobias Heider
Now that we have removed all the legacy crypto offloading drivers we can simplify the crypto framework API by ripping out the async callbacks. The diff below removes crypto_dispatch() and crypto_done() and replaces them with crypto_invoke() which is blocking and only returns after the operation

fix IO handling in rpki-client

2021-10-23 Thread Claudio Jeker
This diff changes the io read functions to work on ibufs. With this the poll loops will consume data with io_buf_read() until a full message is received and then that message is processed. Thanks to this the processes no longer block while waiting for more data in the io read functions. With this

More uvm_obj_destroy()

2021-10-23 Thread Martin Pieuchot
Diff below is extracted from the current UVM unlocking diff. It adds a couple of uvm_obj_destroy() and move some uvm_obj_init() around. uvm_obj_destroy() will be used to release the memory of the, possibly shared, lock allocated in uvm_obj_init(). When it is call the object should no longer

Re: [patch] man page improvement for sem* family of functions

2021-10-23 Thread Jason McIntyre
On Fri, Oct 22, 2021 at 10:36:55PM +0300, Mikhail wrote: > On Sat, Oct 16, 2021 at 03:13:39PM +0300, Mikhail wrote: > > Hello, I was troubleshooting postgresql not being able to start after > > 'pkill -6 postgres'. The error was: > > > > FATAL: could not create semaphores: No space left on device

tcpdump: print-snmp.c recognize notfound conditions

2021-10-23 Thread Martijn van Duren
Right now tcpdump prints noSuchObject/noSuchInstance/endOfMibView as [P/x/GetRequest]/[P/x/GetNextRequest]/[P/x/GetResponse]. This is because tcpdump doesn't treat CONTEXT for what it is: context dependent. I'm not going to untangle this entire mess, but this diff at least gives us a better

tcpdump: print-snmp.c don't treat "public" as default community

2021-10-23 Thread Martijn van Duren
We moved away from the idea of default community in all of our snmp tools. Let's give tcpdump the same treatment so that people don't get the wrong idea. OK? martijn@ Index: print-snmp.c === RCS file:

Re: nsd 4.3.8

2021-10-23 Thread Florian Obser
Anyone? We really want this one... - Fix #194: Incorrect NSEC3 response for SOA query below delegation point. On 2021-10-20 18:24 +02, Florian Obser wrote: > Particularly interesting is > - Fix #190: NSD returns 3 NSEC3 records for NODATA response. > > which I believe is a fix for the problem

Please test: full poll/select(2) switch

2021-10-23 Thread Martin Pieuchot
Diff below switches both poll(2) and select(2) to the kqueue-based implementation. In addition it switches libevent(3) to use poll(2) by default for testing purposes. I don't have any open bug left with this diff and I'm happily running GNOME with it. So I'd be happy if you could try to break

tcpdump: print-snmp.c document some ancient history

2021-10-23 Thread Martijn van Duren
Thanks to benno who found the original reference to this value. Help out some poor soul who might wander in here in the future. OK? martijn@ Index: print-snmp.c === RCS file: /cvs/src/usr.sbin/tcpdump/print-snmp.c,v retrieving

Re: new option for rcctl ls

2021-10-23 Thread Antoine Jacoutot
On Fri, Oct 22, 2021 at 07:27:28PM +0100, Stuart Henderson wrote: > On 2021/10/22 12:56, Stuart Henderson wrote: > > On 2021/10/22 12:20, Antoine Jacoutot wrote: > > > On Thu, Oct 21, 2021 at 04:45:47PM +0100, Stuart Henderson wrote: > > > > Sometimes I find it useful to list daemons which are set