FreeBSD/src 0a91888sys/arm64/apple apple_pinctrl.c, sys/conf files.arm64

arm64: add a GPIO driver for Apple Silicon

This is a ported version of OpenBSD's work, modulo interrupt
functionality.  We won't need GPIO interrupts until we start to get
closer to audio support, and the existing version is sufficient for,
e.g., pcie.

Reviewed by:    andrew
Differential Revision:  https://reviews.freebsd.org/D49630
DeltaFile
+469-0sys/arm64/apple/apple_pinctrl.c
+1-0sys/conf/files.arm64
+470-02 files

FreeBSD/src ba2336dsys/arm64/apple exynos_uart.c exynos_uart.h, sys/conf files.arm64

arm64: add a driver for the uart found on Apple Silicon machines

This is a revival of the old exynos4210 driver, with some additional
bits to configure the apple "s5l" uart (which is actually slightly
different to operate).

This hasn't been tested on anything that would hit the non-s5l path, so
banish it off to the apple/ domain until someone cares to confirm that
none of the other hardware is broken -- it may be that nobody does, but
the complexity isn't too bad: mostly the driver1 construct added to the
uart_bas that we use to avoid having a whole bunch of shims for uart
driver methods and hardcoded references to the cfg structs.

Reviewed by:    andrew
Differential Revision:  https://reviews.freebsd.org/D48120
DeltaFile
+568-0sys/arm64/apple/exynos_uart.c
+136-0sys/arm64/apple/exynos_uart.h
+1-0sys/conf/files.arm64
+1-0sys/dev/uart/uart.h
+706-04 files

FreeBSD/src 22178cblib/libc/tests/secure fortify_unistd_test.c generate-fortify-tests.lua

libc: tests: fix the gethostname() and getdomainname() tests

Instead of relying on any particular domainname and hostname to succeed,
spin up a jail before we execute the test with them set to some known,
fixed values.  This allows them to be meaningfully tested -- previously,
they were skipped much more often than not.

Reported by:    jlduran
Reviewed by:    jlduran, markj
Differential Revision:  https://reviews.freebsd.org/D49237
DeltaFile
+62-75lib/libc/tests/secure/fortify_unistd_test.c
+37-17lib/libc/tests/secure/generate-fortify-tests.lua
+1-0lib/libc/tests/secure/fortify_strings_test.c
+1-0lib/libc/tests/secure/fortify_poll_test.c
+1-0lib/libc/tests/secure/fortify_random_test.c
+1-0lib/libc/tests/secure/fortify_select_test.c
+103-926 files not shown
+109-9212 files

FreeBSD/src 09cdbf0lib/libc/tests/secure fortify_unistd_test.c fortify_string_test.c

libc: tests: allow fortified test cases to require root

An upcoming test will require root to create a jail with its own
domainname/hostname to avoid external requirements on the test runner
as we want to fetch them with valid and plausible sizes.

Generate test headers for all cases to reduce churn in future diffs as
metadata is added to individual tests, or in case other test options
are added to correspond to different metadata to set.

Reviewed by:    jlduran, markj
Differential Revision:  https://reviews.freebsd.org/D49236
DeltaFile
+260-65lib/libc/tests/secure/fortify_unistd_test.c
+260-65lib/libc/tests/secure/fortify_string_test.c
+240-60lib/libc/tests/secure/fortify_wchar_test.c
+204-51lib/libc/tests/secure/fortify_socket_test.c
+180-45lib/libc/tests/secure/fortify_stdio_test.c
+88-22lib/libc/tests/secure/fortify_uio_test.c
+1,232-3086 files not shown
+1,482-37112 files

FreeBSD/src 85242b5lib/libc/tests/secure generate-fortify-tests.lua Makefile

libc: tests: fix luacheck warnings in the fortification test generator

All of these are simple shadowing that don't need to happen; we're
passing the shadowed value through in every case anyways, just use it
in the closure in a more lua-natural fashion.

While we're here, lint the generator every time we generate tests to
ensure that we don't regress without having to remember to manually
run luacheck.

Reported by:    jlduran
Reviewed by:    jlduran, markj
Differential Revision:  https://reviews.freebsd.org/D49235
DeltaFile
+6-6lib/libc/tests/secure/generate-fortify-tests.lua
+9-1lib/libc/tests/secure/Makefile
+15-72 files

FreeBSD/src 4c9ffb1usr.bin/grep util.c, usr.bin/grep/tests grep_freebsd_test.sh

grep: avoid duplicated lines when we're coloring output

For the default uncolored output, we'll just output a line once and then
move on.  For colored output, we'll output multiple matches per
line with context from the line interspersed and may end up writing out
some match context multiple times as we don't persist which part of the
lines have already been printed.

Fix it by tracking the length of line printed thus far in printline()
and retaining it across successive calls to printline() in the same
line.  printline() should indicate whether it terminated the line or not
to avoid tracking the logic for that in multiple places: -o lines are
always terminated, so it's generally only some --color contexts where we
wouldn't have terminated.

Add a test to make sure that we're only printing one line going forward.

Reported and tested by: Jamie Landeg-Jones <jamie catflap org>
Reviewed by:    emaste
Differential Revision:  https://reviews.freebsd.org/D49324
DeltaFile
+59-13usr.bin/grep/util.c
+15-0usr.bin/grep/tests/grep_freebsd_test.sh
+74-132 files

FreeBSD/src 7215aedsys/dev/wg if_wg.c, tests/sys/net if_wg.sh

kern: wg: remove overly-restrictive address family check

IPv4 packets can be routed via an IPv6 nexthop, so the handling of the
parsed address family is more strict than it needs to be.  If we have a
valid header that matches a known peer, then we have no reason to
decline the packet.

Convert it to an assertion that it matches the destination as viewed by
the stack below it, instead.  `dst` may be the gateway instead of the
destination in the case of a nexthop, so the `af` assignment must be
switched to use the destination in all cases.

Add a test case that approximates a setup like in the PR and
demonstrates the issue.

PR:             284857
Reviewed by:    markj (earlier version), zlei

(cherry picked from commit 2bef0d54f74dad6962ef7d1dfa407e95cb4fb4ad)
DeltaFile
+79-0tests/sys/net/if_wg.sh
+3-5sys/dev/wg/if_wg.c
+82-52 files

FreeBSD/src 2bef0d5sys/dev/wg if_wg.c, tests/sys/net if_wg.sh

kern: wg: remove overly-restrictive address family check

IPv4 packets can be routed via an IPv6 nexthop, so the handling of the
parsed address family is more strict than it needs to be.  If we have a
valid header that matches a known peer, then we have no reason to
decline the packet.

Convert it to an assertion that it matches the destination as viewed by
the stack below it, instead.  `dst` may be the gateway instead of the
destination in the case of a nexthop, so the `af` assignment must be
switched to use the destination in all cases.

Add a test case that approximates a setup like in the PR and
demonstrates the issue.

PR:             284857
Reviewed by:    markj (earlier version), zlei
Differential Revision:  https://reviews.freebsd.org/D49172
DeltaFile
+79-0tests/sys/net/if_wg.sh
+3-5sys/dev/wg/if_wg.c
+82-52 files

FreeBSD/src 429b03alib/libc/aarch64/string strlcat.c strncat.c

libc: fix _FORTIFY_SOURCE build on aarch64

As with their amd64 counterparts, we need to undef these string funcs
that _FORTIFY_SOURCE will have defined macros for to avoid breaking the
build.

Fixes:  bea89d038ac ("lib/libc/aarch64/string: add strlcat SIMD [...]")
Fixes:  3dc5429158c ("lib/libc/aarch64/string: add strncat SIMD [...]")
DeltaFile
+2-0lib/libc/aarch64/string/strlcat.c
+2-0lib/libc/aarch64/string/strncat.c
+4-02 files

FreeBSD/src 181549clib/libbe be.c

libbe: avoid copying encryption-related props

libzfs insists that these be cloned from the origin, so avoid making a
deep copy of them ourselves to unbreak creating a new BE from a BE with
encrypted components -- in today's environment, without a loader that
does encryption, this means a deep BE setup where something underneath
the BE (e.g., home directories) are encrypted.

Reported and tested by: arrowd
Reviewed by:    allanjude
Differential Revision:  https://reviews.freebsd.org/D48464
DeltaFile
+13-1lib/libbe/be.c
+13-11 files

FreeBSD/src b769044sys/dev/nvmf nvmf_tcp.h

nvmf: fix build with __assert_unreachable() addition to userland

<assert.h> now has a usable definition, so we don't need to shim it out
in the nvmf header anymore.

Reviewed by:    emaste, jhb
Differential Revision:  https://reviews.freebsd.org/D48078
DeltaFile
+0-1sys/dev/nvmf/nvmf_tcp.h
+0-11 files

FreeBSD/src 712f81finclude assert.h

include: add a userland version of __assert_unreachable

The kernel has had a version of this since
c79cee71363d ("kernel: provide panicky version of __unreachable"), and
userland can benefit from the same.  __unreachable is largely
inadequate because it's *not* an assertion of any sort, so we're not
really alerted to a problem that we could've anticipated.

Reviewed by:    emaste, imp, jhb, olce
Differential Revision:  https://reviews.freebsd.org/D48077
DeltaFile
+7-0include/assert.h
+7-01 files

FreeBSD/src c6bf965usr.sbin/pkg rsa.c

pkg: include missing <string.h>

My local environment seems to be seeing some pollution; we need
<string.h> for strlen.

PR:             284021
Fixes:          2e065d74a5b0e ("pkg: add a pkgsign_verify_data [...]")

(cherry picked from commit b8770ce1dfed52fcb7249cdf3cf4d4d16357b9fd)
DeltaFile
+1-0usr.sbin/pkg/rsa.c
+1-01 files

FreeBSD/src 1879016usr.sbin/pkg rsa.c

pkg: include missing <string.h>

My local environment seems to be seeing some pollution; we need
<string.h> for strlen.

PR:             284021
Fixes:          2e065d74a5b0e ("pkg: add a pkgsign_verify_data [...]")

(cherry picked from commit b8770ce1dfed52fcb7249cdf3cf4d4d16357b9fd)
DeltaFile
+1-0usr.sbin/pkg/rsa.c
+1-01 files

FreeBSD/src b8770ceusr.sbin/pkg rsa.c

pkg: include missing <string.h>

My local environment seems to be seeing some pollution; we need
<string.h> for strlen.

PR:             284021
Fixes:          2e065d74a5b0e ("pkg: add a pkgsign_verify_data [...]")
MFC after:      immediately (trivial build fix)
DeltaFile
+1-0usr.sbin/pkg/rsa.c
+1-01 files

FreeBSD/src b5ae765usr.sbin/pkg ecc.c pkg.c

pkg: finish adding the ECC signer and signature type bits

Signature types need to be parsed out of the key/signature information
that we are presented with from the files we download.  We use that to
understand whicher signer we need to dispatch to.

The ECC signer is more-or-less lifted from pkg(8), with some changes to
slim it down for pkg(7).

Reviewed by:    bapt

(cherry picked from commit 3d0a0dda3a7d57bbd4eaf65ba8da0f2a36089c0e)
DeltaFile
+606-0usr.sbin/pkg/ecc.c
+97-18usr.sbin/pkg/pkg.c
+5-2usr.sbin/pkg/Makefile
+3-0usr.sbin/pkg/pkg.h
+711-204 files

FreeBSD/src 0d94685usr.bin/shar shar.1

shar: add a deprecation notice

The shar(1) program is simple, but the fundamental idea of a sh archive
is risky at best and one that we probably shouldn't be promoting as
prominently as a program in $PATH and a manpage.  Let's deprecate and
remove it, since the same functionality can easily be found in
tar(1) instead.

Reviewed by:    emaste, philip
Reviewed by:    allanjude, brooks, delphij, des, imp, rpokala (previous)

(cherry picked from commit f68ee0e7a1e8732f725cad4ac708ec49093782d4)
(cherry picked from commit 2832af7b4ea256b18ef4dbf2ff97a50765f0609a)
DeltaFile
+18-1usr.bin/shar/shar.1
+18-11 files

FreeBSD/src 4e33c2eusr.sbin/pkg rsa.c pkg.c

pkg: add a pkgsign_verify_data callback

This will be used to verify raw payloads, as if signed by pkg-key(8).
It will be used specifically in pkg(7) to verify .pubkeysig as published
by poudriere.

Amend verify_pubsignature() now to use it.  For the RSA signer, we need
to verify using a sha256 of the data instead of the data itself.

Reviewed by:    bapt

(cherry picked from commit 2e065d74a5b0ea32db7d4f6e3f78eaa17ee7685e)
DeltaFile
+32-18usr.sbin/pkg/rsa.c
+29-1usr.sbin/pkg/pkg.c
+4-0usr.sbin/pkg/pkg.h
+65-193 files

FreeBSD/src 9d25078usr.sbin/pkg pkg.c pkg.h

pkg: refactor out a pkg_read_fd()

We already have to do this for reading the pubkey, just pull it out for
other uses.  The ECC signer will use this to verify the bootstrap if
the PUBKEY mechanism is used.

Reviewed by:    bapt, emaste

(cherry picked from commit 2ecfc040a09f8c42f67bbfdcc4bd02ef84dac8b7)
DeltaFile
+27-13usr.sbin/pkg/pkg.c
+2-0usr.sbin/pkg/pkg.h
+29-132 files

FreeBSD/src 14cf1cdusr.sbin/pkg rsa.c pkg.c

pkg: pull rsa bits out of pkg.c

We'll eventually add a pkgsign abstraction over these similar to how we do
in pkg(8), but start by isolating these parts.

Reviewed by:    bapt, emaste

(cherry picked from commit 2629e90dd05fb69d767525f960101d7d055ffae0)
DeltaFile
+155-0usr.sbin/pkg/rsa.c
+1-129usr.sbin/pkg/pkg.c
+50-0usr.sbin/pkg/pkg.h
+1-1usr.sbin/pkg/Makefile
+207-1304 files

FreeBSD/src 082f356usr.sbin/pkg pkg.c pkg.h

pkg: abstract rsa out behind a pkgsign API

This mirrors a change we made in pkg(8), and will be used to next add
another signer that does ECC.

Reviewed by:    bapt, emaste

(cherry picked from commit 5862580ded35e23581291a2e1052f04428369ead)
DeltaFile
+83-3usr.sbin/pkg/pkg.c
+19-3usr.sbin/pkg/pkg.h
+8-3usr.sbin/pkg/rsa.c
+110-93 files

FreeBSD/src e993a99secure/lib Makefile, secure/lib/libpkgecc Makefile pkg_libecc_rand.c

secure: hook up libecc as libpkgecc

libecc is not intended to be general use, other applications should
really be using openssl.  pkg(7) uses libecc to align with the pkg(8)
project and its goals.  This will be used in the upcoming support for
ECC in pkg(7).

Reviewed by:    emaste

(cherry picked from commit 05427f4639bcf2703329a9be9d25ec09bb782742)
DeltaFile
+137-0secure/lib/libpkgecc/Makefile
+22-0secure/lib/libpkgecc/pkg_libecc_rand.c
+4-0share/mk/src.libnames.mk
+1-1secure/lib/Makefile
+164-14 files

FreeBSD/src c56f6dacrypto/libecc/src/examples/sig/rsa rsa_pkcs1_tests.h, crypto/libecc/src/sig eddsa.c

Add 'crypto/libecc/' from commit '736d663976d1768533badbf06581481d01fade4c'

git-subtree-dir: crypto/libecc
git-subtree-mainline: f59bb61e1eb4d1e4fc3c60cc14779d0668267cb2
git-subtree-split: 736d663976d1768533badbf06581481d01fade4c
(cherry picked from commit f0865ec9906d5a18fa2a3b61381f22ce16e606ad)
DeltaFile
+728,074-0crypto/libecc/src/wycheproof_tests/libecc_wycheproof_tests.h
+111,724-0crypto/libecc/src/examples/sig/rsa/rsa_pkcs1_tests.h
+24,610-0crypto/libecc/src/tests/ed25519_test_vectors.h
+5,757-0crypto/libecc/src/tests/ec_self_tests_core.h
+3,750-0crypto/libecc/src/tests/ecccdh_test_vectors.h
+2,935-0crypto/libecc/src/sig/eddsa.c
+876,850-0338 files not shown
+959,066-0344 files

FreeBSD/src 98b6891lib Makefile, lib/libder Makefile

lib: hook libder up to the build

libder will be used in upcoming ECC support in the pkg(7) bootstrap to
read DER-encoded keys and signatures.

(cherry picked from commit f59bb61e1eb4d1e4fc3c60cc14779d0668267cb2)
DeltaFile
+13-0lib/libder/Makefile
+4-0share/mk/src.libnames.mk
+1-0lib/Makefile
+18-03 files

FreeBSD/src 883ba1bcontrib/libder/libder libder_obj.c libder_read.c, contrib/libder/tests fuzz_stream.c

Add 'contrib/libder/' from commit '9c40c4de4c33b2ba1124fb752ebea0bebaa6013f'

git-subtree-dir: contrib/libder
git-subtree-mainline: d11904b350214943dedb64c7121d4602799d7afd
git-subtree-split: 9c40c4de4c33b2ba1124fb752ebea0bebaa6013f
(cherry picked from commit 35c0a8c449fd2b7f75029ebed5e10852240f0865)
DeltaFile
+1,192-0contrib/libder/libder/libder_obj.c
+864-0contrib/libder/libder/libder_read.c
+246-0contrib/libder/tests/fuzz_stream.c
+229-0contrib/libder/libder/libder_write.c
+181-0contrib/libder/libder/libder.h
+179-0contrib/libder/libder/libder.3
+2,891-030 files not shown
+4,813-036 files

FreeBSD/src 4ce976cusr.bin/shar shar.1

shar: add a deprecation notice

The shar(1) program is simple, but the fundamental idea of a sh archive
is risky at best and one that we probably shouldn't be promoting as
prominently as a program in $PATH and a manpage.  Let's deprecate and
remove it, since the same functionality can easily be found in
tar(1) instead.

Reviewed by:    emaste, philip
Reviewed by:    allanjude, brooks, delphij, des, imp, rpokala (previous)

(cherry picked from commit f68ee0e7a1e8732f725cad4ac708ec49093782d4)
(cherry picked from commit 2832af7b4ea256b18ef4dbf2ff97a50765f0609a)
DeltaFile
+18-1usr.bin/shar/shar.1
+18-11 files

FreeBSD/src 8aeeab4usr.sbin/pkg ecc.c pkg.c

pkg: finish adding the ECC signer and signature type bits

Signature types need to be parsed out of the key/signature information
that we are presented with from the files we download.  We use that to
understand whicher signer we need to dispatch to.

The ECC signer is more-or-less lifted from pkg(8), with some changes to
slim it down for pkg(7).

Reviewed by:    bapt

(cherry picked from commit 3d0a0dda3a7d57bbd4eaf65ba8da0f2a36089c0e)
DeltaFile
+606-0usr.sbin/pkg/ecc.c
+97-18usr.sbin/pkg/pkg.c
+5-2usr.sbin/pkg/Makefile
+3-0usr.sbin/pkg/pkg.h
+711-204 files

FreeBSD/src cb09fc9usr.sbin/pkg rsa.c pkg.c

pkg: add a pkgsign_verify_data callback

This will be used to verify raw payloads, as if signed by pkg-key(8).
It will be used specifically in pkg(7) to verify .pubkeysig as published
by poudriere.

Amend verify_pubsignature() now to use it.  For the RSA signer, we need
to verify using a sha256 of the data instead of the data itself.

Reviewed by:    bapt

(cherry picked from commit 2e065d74a5b0ea32db7d4f6e3f78eaa17ee7685e)
DeltaFile
+32-18usr.sbin/pkg/rsa.c
+29-1usr.sbin/pkg/pkg.c
+4-0usr.sbin/pkg/pkg.h
+65-193 files

FreeBSD/src 1e3003busr.sbin/pkg pkg.c pkg.h

pkg: abstract rsa out behind a pkgsign API

This mirrors a change we made in pkg(8), and will be used to next add
another signer that does ECC.

Reviewed by:    bapt, emaste

(cherry picked from commit 5862580ded35e23581291a2e1052f04428369ead)
DeltaFile
+83-3usr.sbin/pkg/pkg.c
+19-3usr.sbin/pkg/pkg.h
+8-3usr.sbin/pkg/rsa.c
+110-93 files

FreeBSD/src 836f1dausr.sbin/pkg pkg.c pkg.h

pkg: refactor out a pkg_read_fd()

We already have to do this for reading the pubkey, just pull it out for
other uses.  The ECC signer will use this to verify the bootstrap if
the PUBKEY mechanism is used.

Reviewed by:    bapt, emaste

(cherry picked from commit 2ecfc040a09f8c42f67bbfdcc4bd02ef84dac8b7)
DeltaFile
+27-13usr.sbin/pkg/pkg.c
+2-0usr.sbin/pkg/pkg.h
+29-132 files