integer overflow in PF may lead to dropped connections

2017-03-06 Thread mathieu.blanc
Hi, here is a patch which fixes an integer overflow in the computation of adaptive timeouts. The effect of this integer overflow is that depending on timeout values, legitimate established connection states can be evicted immediately (although other states with shorter timeouts would be available

Re: 11n support for athn(4)

2017-03-06 Thread Stefan Sperling
On Mon, Mar 06, 2017 at 07:36:21AM +0200, Timo Myyrä wrote: > Did some tcpbench testing and got following results: > Each test run with: tcpbench -s || tcpbench -t 15 commands. > Host AP: apu 2b4 with athn, client = thinkpad t430s with iwn (OpenBSD) > > channel 9 running old snapshot etc: > 11n c

{tc,ud}btable & NET_LOCK()

2017-03-06 Thread Martin Pieuchot
In sysctl_file() splnet() is no longer what we want. Arguably the KERNEL_LOCK() should be enough, but since pf(4) is messing with these tables, and nobody turned this part of pf(4) MP, let's require the NET_LOCK(). ok? Index: kern/kern_sysctl.c ===

Re: integer overflow in PF may lead to dropped connections

2017-03-06 Thread Mike Belopuhov
On Fri, Mar 03, 2017 at 16:58 +0100, mathieu.bl...@cea.fr wrote: > Hi, > > here is a patch which fixes an integer overflow in the computation of > adaptive timeouts. The effect of this integer overflow is that > depending on timeout values, legitimate established connection states > can be evicted

PF_ROUTE vs NET_LOCK(), take 2

2017-03-06 Thread Martin Pieuchot
After some refactoring, here's the updated diff to take the routing sockets out of the NET_LOCK(). ok? Index: net/raw_usrreq.c === RCS file: /cvs/src/sys/net/raw_usrreq.c,v retrieving revision 1.29 diff -u -p -r1.29 raw_usrreq.c ---

Re: integer overflow in PF may lead to dropped connections

2017-03-06 Thread Claudio Jeker
On Mon, Mar 06, 2017 at 01:04:28PM +0100, Mike Belopuhov wrote: > On Fri, Mar 03, 2017 at 16:58 +0100, mathieu.bl...@cea.fr wrote: > > Hi, > > > > here is a patch which fixes an integer overflow in the computation of > > adaptive timeouts. The effect of this integer overflow is that > > depending

Re: integer overflow in PF may lead to dropped connections

2017-03-06 Thread Mike Belopuhov
On Mon, Mar 06, 2017 at 14:46 +0100, Claudio Jeker wrote: > On Mon, Mar 06, 2017 at 01:04:28PM +0100, Mike Belopuhov wrote: > > On Fri, Mar 03, 2017 at 16:58 +0100, mathieu.bl...@cea.fr wrote: > > > Hi, > > > > > > here is a patch which fixes an integer overflow in the computation of > > > adaptiv

Re: route_output M_WAITOK

2017-03-06 Thread Alexander Bluhm
On Sun, Mar 05, 2017 at 12:22:57PM +0100, Claudio Jeker wrote: > On Fri, Mar 03, 2017 at 08:16:43AM +0100, Martin Pieuchot wrote: > > On 03/03/17(Fri) 01:40, Alexander Bluhm wrote: > > > On Thu, Mar 02, 2017 at 10:55:41AM +0100, Martin Pieuchot wrote: > > > > Actually the malloc(9) could be convert

Re: PF_ROUTE vs NET_LOCK(), take 2

2017-03-06 Thread Alexander Bluhm
On Mon, Mar 06, 2017 at 01:33:19PM +0100, Martin Pieuchot wrote: > After some refactoring, here's the updated diff to take the routing > sockets out of the NET_LOCK(). > > ok? OK bluhm@ > > Index: net/raw_usrreq.c > === > RCS file:

Preserve original pf flow classification

2017-03-06 Thread Mike Belopuhov
There's no need to overwrite original flow ID assigned on input so that it remains stable throughout the life of a packet. The rationale is that output processing may split, encapsulate or obfuscate a single stream which makes the changed flow ID useless for purposes of flow control, for instance

Re: take PRU_ATTACH out of usrreq

2017-03-06 Thread Alexander Bluhm
On Sun, Mar 05, 2017 at 10:54:39AM +0100, Claudio Jeker wrote: > Here is an updated version of the PRU_ATTACH diff. I looked at the pfkey > code and decided to only do the minimum now. I will go in afterwards and > kill the dynamic fiddling in there. There is no reason for all this > complication s

Re: {tc,ud}btable & NET_LOCK()

2017-03-06 Thread Alexander Bluhm
On Mon, Mar 06, 2017 at 12:13:48PM +0100, Martin Pieuchot wrote: > In sysctl_file() splnet() is no longer what we want. Arguably the > KERNEL_LOCK() should be enough, but since pf(4) is messing with these > tables, and nobody turned this part of pf(4) MP, let's require the > NET_LOCK(). > > ok?

synaptics(4): multitouch input and hysteresis

2017-03-06 Thread Ulf Brosziewski
While preparing and testing some changes in ubcmtp I found a bug in wsconscomm that may affect two-finger touches on "noisy" MT devices, that is, on devices that constantly report small deltas of the touch positions even if there is no noticeable movement. Whenever the contact count or the pointer

Re: priq: proposed change in the behavior

2017-03-06 Thread Mike Belopuhov
On Thu, Mar 02, 2017 at 14:23 +0100, Mike Belopuhov wrote: > On Thu, Mar 02, 2017 at 10:35 +1000, David Gwynne wrote: > > the current code has been very careful not to free an mbuf while > > holding the ifq mutex. i would prefer to keep it that way. > > > > the least worst way to do that would be

Re: tlsv1 alert decrypt error

2017-03-06 Thread Bob Beck
Move it to tech@ from misc.. not libressl.. libressl is not special ;) On Mon, Mar 6, 2017 at 3:21 PM, Kirill Miazine wrote: > Moving to libressl@ from misc@, as it's a LibreSSL issue. > > * Joel Sing [2017-03-05 23:01]: > > On Thursday 02 March 2017 13:28:08 Kirill Miazine wrote: >> >>> Recentl

Re: tlsv1 alert decrypt error

2017-03-06 Thread Bob Beck
And as joel mentioned, a fix is already arriving for this - there was a bug in SSLv2 compatible handshake initiation, and Paypal still has it enabled... (yeeuch) On Mon, Mar 6, 2017 at 3:48 PM, Bob Beck wrote: > > Move it to tech@ from misc.. not libressl.. libressl is not special ;) > > On

in_pcballoc IPv6 hash

2017-03-06 Thread Alexander Bluhm
Hi, Initially all inpcb, including the IPv6 ones, are hooked into the IPv4 hash. They cannot be used before bind(2) and then they are rehashed and rehooked, so this is not noticed. Nevertheless I think this is a bug and they should go into the IPv6 hash from the beginning. ok? bluhm Index: ne

decryption failed or bad record mac (was: tlsv1 alert decrypt error)

2017-03-06 Thread Kirill Miazine
Thanks for moving the thread to the correct place! * Bob Beck [2017-03-06 15:49]: And as joel mentioned, a fix is already arriving for this - there was a bug in SSLv2 compatible handshake initiation, Joel sent me a patch which appeared here: http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/lib/li

Re: priq: convert to mbuf lists

2017-03-06 Thread David Gwynne
> On 2 Mar 2017, at 21:19, Mike Belopuhov wrote: > > On Thu, Mar 02, 2017 at 10:11 +0100, Martin Pieuchot wrote: >> On 02/03/17(Thu) 01:16, Mike Belopuhov wrote: >>> On 2 March 2017 at 00:56, David Gwynne wrote: > On 2 Mar 2017, at 06:43, Mike Belopuhov wrote: > > This conve

acpisbs/acpibat

2017-03-06 Thread joshua stein
In case the DSDT provides interfaces for both a Smart Battery and a normal one, probe for acpisbs first, if it attaches, make acpibat not match. Index: dev/acpi/acpi.c === RCS file: /cvs/src/sys/dev/acpi/acpi.c,v retrieving revision

Re: Preserve original pf flow classification

2017-03-06 Thread David Gwynne
> On 7 Mar 2017, at 05:27, Mike Belopuhov wrote: > > There's no need to overwrite original flow ID assigned on > input so that it remains stable throughout the life of a > packet. The rationale is that output processing may split, > encapsulate or obfuscate a single stream which makes the > chan

Re: 11n support for athn(4)

2017-03-06 Thread Timo Myyrä
Stefan Sperling writes: > On Mon, Mar 06, 2017 at 07:36:21AM +0200, Timo Myyrä wrote: > >> Did some tcpbench testing and got following results: >> Each test run with: tcpbench -s || tcpbench -t 15 commands. >> Host AP: apu 2b4 with athn, client = thinkpad t430s with iwn (OpenBSD) >> >> channel

Re: 61.html - document resolver(3) support for EDNS0 and DNSSEC

2017-03-06 Thread Jeremie Courreges-Anglas
I have committed a similar diff, thanks. -- jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF DDCC 0DFA 74AE 1524 E7EE

arm64 setjmp/longjmp signal mask storage error

2017-03-06 Thread Dale Rahn
Setjmp, longjmp was converted from calling sigprocmask to invoking sigprocmask directly. The ABI for the function call and the syscall are not the same and the register manipulation code was not updated in the change. This diff moves the jmpbuf to x2 for the duration of the sigprocmask syscall an

Re: in_pcballoc IPv6 hash

2017-03-06 Thread Jeremie Courreges-Anglas
Alexander Bluhm writes: > Hi, > > Initially all inpcb, including the IPv6 ones, are hooked into the > IPv4 hash. They cannot be used before bind(2) and then they are > rehashed and rehooked, so this is not noticed. Nevertheless I think > this is a bug and they should go into the IPv6 hash from

Re: ntp_update_second - removed unused var

2017-03-06 Thread Jeremie Courreges-Anglas
David Hill writes: > Hello - > > time_t *sec is unused in ntp_update_second. > OK? ok jca@ > Index: kern/kern_tc.c > === > RCS file: /cvs/src/sys/kern/kern_tc.c,v > retrieving revision 1.30 > diff -u -p -r1.30 kern_tc.c > --- kern/

Re: arm64 SMP support, diff #3/5

2017-03-06 Thread Dale Rahn
On Thu, Feb 23, 2017 at 01:03:57PM +1100, Jonathan Gray wrote: > On Wed, Feb 22, 2017 at 06:45:52PM -0500, Dale Rahn wrote: > > Add psci 2.0 features to spin up/down/suspend processors. > > > > This change uses extern weak symbols to determine if the platform supports > > the cpu_on/cpu_off/cpu_su

Re: ftp(1): tls_close(3) handle TLS_WANT_POLLIN, TLS_WANT_PLLOUT

2017-03-06 Thread Jeremie Courreges-Anglas
Sunil Nimmagadda writes: > Hi, > > tls_close() could return TLS_WANT_POLLIN, TLS_WANT_POLLOUT as well. > This diff repeats the call immediately. Ok? ok jca@ > cvs server: Diffing . > Index: fetch.c > === > RCS file: /cvs/src/usr.bi

Re: arm64 setjmp/longjmp signal mask storage error

2017-03-06 Thread Patrick Wildt
On Tue, Mar 07, 2017 at 01:44:19AM -0500, Dale Rahn wrote: > Setjmp, longjmp was converted from calling sigprocmask to invoking > sigprocmask directly. The ABI for the function call and the syscall > are not the same and the register manipulation code was not updated > in the change. > > This dif