Re: sppp(4)/pppoe(4) dynamic address hack

2017-06-09 Thread Stefan Sperling
On Fri, Jun 09, 2017 at 10:36:45PM +0200, Christian Weisgerber wrote: > The example in the pppoe(4) man page also includes > > !/sbin/route add default -ifp pppoe0 0.0.0.1 > > to specify the default route. What happens to that? Good question. It raises an interesting point: Setting a de

Re: sppp(4)/pppoe(4) dynamic address hack

2017-06-09 Thread Stefan Sperling
On Fri, Jun 09, 2017 at 05:37:44PM +0100, Jason McIntyre wrote: > why do you have to specify 0.0.0.0 *and* dynaddr? If there is no address on the interface, the code in sppp_set_ip_addrs() loops over an empty interface address list and hence does nothing. IPCP will still negotiate an address but a

Re: nc: missing rpath pledge for -P

2017-06-09 Thread Adam Wolk
On Sat, Jun 10, 2017 at 12:45:01AM +0200, Theo Buehler wrote: > On Fri, Jun 09, 2017 at 11:59:44PM +0200, Theo Buehler wrote: > > On Fri, Jun 09, 2017 at 11:55:26PM +0200, Adam Wolk wrote: > > > On Fri, Jun 09, 2017 at 11:54:03PM +0200, Adam Wolk wrote: > > > > On Fri, Jun 09, 2017 at 09:28:29PM +0

Re: nc: missing rpath pledge for -P

2017-06-09 Thread Theo Buehler
On Fri, Jun 09, 2017 at 11:59:44PM +0200, Theo Buehler wrote: > On Fri, Jun 09, 2017 at 11:55:26PM +0200, Adam Wolk wrote: > > On Fri, Jun 09, 2017 at 11:54:03PM +0200, Adam Wolk wrote: > > > On Fri, Jun 09, 2017 at 09:28:29PM +, ra...@openmailbox.org wrote: > > > > Hello! > > > > > > > > Here

Re: nc: missing rpath pledge for -P

2017-06-09 Thread Theo Buehler
On Fri, Jun 09, 2017 at 11:55:26PM +0200, Adam Wolk wrote: > On Fri, Jun 09, 2017 at 11:54:03PM +0200, Adam Wolk wrote: > > On Fri, Jun 09, 2017 at 09:28:29PM +, ra...@openmailbox.org wrote: > > > Hello! > > > > > > Here is a patch with a pledge bugfix in netcat and some minor style > > > impr

Re: nc: missing rpath pledge for -P

2017-06-09 Thread Adam Wolk
On Fri, Jun 09, 2017 at 11:54:03PM +0200, Adam Wolk wrote: > On Fri, Jun 09, 2017 at 09:28:29PM +, ra...@openmailbox.org wrote: > > Hello! > > > > Here is a patch with a pledge bugfix in netcat and some minor style > > improvements. > > > > An example of how to trigger the bug: > > > > $ nc

Re: nc: missing rpath pledge for -P

2017-06-09 Thread Adam Wolk
On Fri, Jun 09, 2017 at 09:28:29PM +, ra...@openmailbox.org wrote: > Hello! > > Here is a patch with a pledge bugfix in netcat and some minor style > improvements. > > An example of how to trigger the bug: > > $ nc -Ptest -v -c blog.tintagel.pl 443 > nc: pledge: Operation not permitted > >

Re: nc: missing rpath pledge for -P

2017-06-09 Thread rain1
sorry! looks like my email client corrupted the patch, here it is hosted on a paste site https://paste.debian.net/970854/

nc: missing rpath pledge for -P

2017-06-09 Thread rain1
Hello! Here is a patch with a pledge bugfix in netcat and some minor style improvements. An example of how to trigger the bug: $ nc -Ptest -v -c blog.tintagel.pl 443 nc: pledge: Operation not permitted credits to * awolk@ for drawing attention to netcat. * Juuso Lapinlampi for suggesting to

Re: sppp(4)/pppoe(4) dynamic address hack

2017-06-09 Thread Christian Weisgerber
Stefan Sperling: > inet 0.0.0.0 255.255.255.255 NONE \ > pppoedev em0 authproto pap \ > authname 'testcaller' authkey 'donttell' \ >dynaddr dyndest up > > Tested on my ADSL line and it works as expected. The example in the pppoe(4) m

Re: brconfig: Unify/fix strtoul(3) handling

2017-06-09 Thread Klemens Nanni
No need for temporary variables either, strtonum guarantees through maxval that its return value won't overflow when casted. Index: brconfig.c === RCS file: /cvs/src/sbin/ifconfig/brconfig.c,v retrieving revision 1.15 diff -u -p -r1.

Re: sppp(4)/pppoe(4) dynamic address hack

2017-06-09 Thread Jason McIntyre
On Fri, Jun 09, 2017 at 06:33:46PM +0200, Stefan Sperling wrote: > Currently, sppp(4) interfaces use a destination address of 0.0.0.1 to > indicate that the destination address should be assigned by the peer: > > inet 0.0.0.0 255.255.255.255 NONE \ > pppoedev em0 authprot

sppp(4)/pppoe(4) dynamic address hack

2017-06-09 Thread Stefan Sperling
Currently, sppp(4) interfaces use a destination address of 0.0.0.1 to indicate that the destination address should be assigned by the peer: inet 0.0.0.0 255.255.255.255 NONE \ pppoedev em0 authproto pap \ authname 'testcaller' authkey 'donttell' up

Re: radix lookup w/o KERNEL_LOCK()

2017-06-09 Thread Alexander Bluhm
On Fri, Jun 09, 2017 at 04:40:18PM +0200, Martin Pieuchot wrote: > Now with the correct diff: OK bluhm@ > > Index: net/radix.c > === > RCS file: /cvs/src/sys/net/radix.c,v > retrieving revision 1.56 > diff -u -p -r1.56 radix.c > ---

Re: Towards tcp_input() w/o KERNEL_LOCK()

2017-06-09 Thread Alexander Bluhm
On Fri, Jun 09, 2017 at 03:54:04PM +0200, Martin Pieuchot wrote: > Updated diff: > > - use a clever trick in sorflush() to make the new assert happy. Perhaps a bit too clever. On my amd64 struct socket has nearly 400 bytes. That may be too much for our kernel stack. > - convert sbappendrecor

Re: radix lookup w/o KERNEL_LOCK()

2017-06-09 Thread Martin Pieuchot
On 09/06/17(Fri) 16:23, Martin Pieuchot wrote: > On 09/06/17(Fri) 15:46, Alexander Bluhm wrote: > > On Fri, Jun 09, 2017 at 03:11:05PM +0200, Martin Pieuchot wrote: > > > > The static variable last_zeroed does not look MP safe. If I get > > > > this code correctly it is only an optimization to avo

Re: radix lookup w/o KERNEL_LOCK()

2017-06-09 Thread Alexander Bluhm
On Fri, Jun 09, 2017 at 04:23:13PM +0200, Martin Pieuchot wrote: > I couldn't convince myself that rn_search() do not check bits > after 'mlen' so I added the memset() as you suggested. It looks like you forgot to put the memset() in the diff. > @@ -432,14 +440,10 @@ rn_addmask(void *n_arg, int s

Re: pfsync and option WITH_PF_LOCK

2017-06-09 Thread Alexandr Nedvedicky
On Fri, Jun 09, 2017 at 03:48:49PM +0200, Hrvoje Popovski wrote: > On 9.6.2017. 14:55, Alexandr Nedvedicky wrote: > > Hello, > > > > > > On Fri, Jun 09, 2017 at 01:11:01PM +0200, Alexander Bluhm wrote: > >> On Fri, Jun 09, 2017 at 10:55:46AM +0200, Alexandr Nedvedicky wrote: > >>> would it make s

Re: radix lookup w/o KERNEL_LOCK()

2017-06-09 Thread Martin Pieuchot
On 09/06/17(Fri) 15:46, Alexander Bluhm wrote: > On Fri, Jun 09, 2017 at 03:11:05PM +0200, Martin Pieuchot wrote: > > > The static variable last_zeroed does not look MP safe. If I get > > > this code correctly it is only an optimization to avoid multiple > > > zeroing in addmask_key. This does no

Re: Towards tcp_input() w/o KERNEL_LOCK()

2017-06-09 Thread Martin Pieuchot
On 09/06/17(Fri) 00:32, Alexander Bluhm wrote: > On Tue, Jun 06, 2017 at 05:15:40PM +0200, Martin Pieuchot wrote: > > TCP/UDP are almost ready to run without KERNEL_LOCK() because accesses > > to their sockets are serialized via the NET_LOCK(). On the other hand > > pfkey and routing sockets acces

Re: pfsync and option WITH_PF_LOCK

2017-06-09 Thread Hrvoje Popovski
On 9.6.2017. 14:55, Alexandr Nedvedicky wrote: > Hello, > > > On Fri, Jun 09, 2017 at 01:11:01PM +0200, Alexander Bluhm wrote: >> On Fri, Jun 09, 2017 at 10:55:46AM +0200, Alexandr Nedvedicky wrote: >>> would it make sense to commit a poor man's solution below, before pfsync(4) >>> will get to sh

Re: radix lookup w/o KERNEL_LOCK()

2017-06-09 Thread Alexander Bluhm
On Fri, Jun 09, 2017 at 03:11:05PM +0200, Martin Pieuchot wrote: > > The static variable last_zeroed does not look MP safe. If I get > > this code correctly it is only an optimization to avoid multiple > > zeroing in addmask_key. This does not work anyway with addmask_key > > on the stack. > > Y

Re: Route priority support for ospf6d

2017-06-09 Thread Claudio Jeker
On Fri, Jun 09, 2017 at 03:28:07PM +0200, Alexander Bluhm wrote: > On Wed, May 31, 2017 at 02:29:03PM +0200, Florian Riehm wrote: > > @@ -359,6 +333,7 @@ kr_fib_decouple(void) > > void > > kr_dispatch_msg(int fd, short event, void *bula) > > { > > + /* XXX this is stupid */ > > dispatch_rt

Re: Route priority support for ospf6d

2017-06-09 Thread Alexander Bluhm
On Wed, May 31, 2017 at 02:29:03PM +0200, Florian Riehm wrote: > @@ -359,6 +333,7 @@ kr_fib_decouple(void) > void > kr_dispatch_msg(int fd, short event, void *bula) > { > + /* XXX this is stupid */ > dispatch_rtmsg(); > } I guess this comment refers to the event_loopexit(NULL) in osp

Re: rtadvd(8) send unicast advertisements

2017-06-09 Thread Florian Obser
On Fri, Jun 09, 2017 at 02:48:58PM +0200, Alexander Bluhm wrote: > On Fri, Jun 09, 2017 at 09:16:01AM +, Florian Obser wrote: > > I don't think we need a knob for this, doing it per default if we > > have the source link layer address should be fine. > > > > See RFC 7772 why this is a good thi

Re: radix lookup w/o KERNEL_LOCK()

2017-06-09 Thread Martin Pieuchot
On 08/06/17(Thu) 23:46, Alexander Bluhm wrote: > On Tue, Jun 06, 2017 at 03:36:12PM +0200, Martin Pieuchot wrote: > > +#define SALEN(sa) (*(u_char *)sa) > > Put () around macro arguments. > #define SALEN(sa) (*(u_char *)(sa)) Done. > > -int > > +static int > > rn_refines(void *m_arg, void

Re: pfsync and option WITH_PF_LOCK

2017-06-09 Thread Alexandr Nedvedicky
Hello, On Fri, Jun 09, 2017 at 01:11:01PM +0200, Alexander Bluhm wrote: > On Fri, Jun 09, 2017 at 10:55:46AM +0200, Alexandr Nedvedicky wrote: > > would it make sense to commit a poor man's solution below, before pfsync(4) > > will get to shape? The idea is to grab PF_LOCK, just before we pass th

Re: rtadvd(8) send unicast advertisements

2017-06-09 Thread Alexander Bluhm
On Fri, Jun 09, 2017 at 09:16:01AM +, Florian Obser wrote: > I don't think we need a knob for this, doing it per default if we > have the source link layer address should be fine. > > See RFC 7772 why this is a good thing. > > OK? I wonder whether the /* update counter */ if

Re: pfsync and option WITH_PF_LOCK

2017-06-09 Thread Alexander Bluhm
On Fri, Jun 09, 2017 at 10:55:46AM +0200, Alexandr Nedvedicky wrote: > would it make sense to commit a poor man's solution below, before pfsync(4) > will get to shape? The idea is to grab PF_LOCK, just before we pass the data > to PF for further processing. Whatever helps to make progress with pf

rtadvd(8) send unicast advertisements

2017-06-09 Thread Florian Obser
I don't think we need a knob for this, doing it per default if we have the source link layer address should be fine. See RFC 7772 why this is a good thing. OK? diff --git rtadvd.c rtadvd.c index 1f470a06c31..219b357e50b 100644 --- rtadvd.c +++ rtadvd.c @@ -141,7 +141,7 @@ static int prefix_check

Re: pfsync and option WITH_PF_LOCK

2017-06-09 Thread Alexandr Nedvedicky
Hello, would it make sense to commit a poor man's solution below, before pfsync(4) will get to shape? The idea is to grab PF_LOCK, just before we pass the data to PF for further processing. regards sasha 8<---8<---8<--8< --- src/sys/net/if_

sed(1): missing NUL in pattern space

2017-06-09 Thread kshe
Hi, There is an ongoing confusion in sed's source about the concept of EOL: the code contradicts itself as to whether it should be determined by a trailing NUL or by looking up the `len' field of the SPACE structure. At least two commands (`l' and `s') assume that the pattern space is always NUL-

[PATCH] urndis: change M_WAITOK --> M_WAITOK | M_CANFAIL

2017-06-09 Thread Kevin Lo
Hi, This diff passes M_CANFAIL to malloc(9) calls which use M_WAITOK but are tested for failure. OK? Index: sys/dev/usb/if_urndis.c === RCS file: /cvs/src/sys/dev/usb/if_urndis.c,v retrieving revision 1.65 diff -u -p -u -p -r1.65 if