]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log 
djm@openbsd.org  [Thu, 31 Mar 2022 03:07:03 +0000  (03:07  +0000)]  
upstream: add a sftp client "cp" command that supports server-side
copying of files. Useful for this task and for testing the copy-data
extension. Patch from Mike Frysinger; ok dtucker@
OpenBSD-Commit-ID: 
1bb1b950af0d49f0d5425b1f267e197aa1b57444 
djm@openbsd.org  [Thu, 31 Mar 2022 03:05:49 +0000  (03:05  +0000)]  
upstream: add support for the "corp-data" protocol extension to
allow server-side copies to be performed without having to go via the client.
Patch by Mike Frysinger, ok dtucker@
OpenBSD-Commit-ID: 
00aa510940fedd66dab1843b58682de4eb7156d5 
djm@openbsd.org  [Wed, 30 Mar 2022 21:13:23 +0000  (21:13 +0000)]  
upstream: select post-quantum KEX
sntrup761x25519-sha512@openssh.com as the default; ok markus@
OpenBSD-Commit-ID: 
f02d99cbfce22dffec2e2ab1b60905fbddf48fb9 
djm@openbsd.org  [Wed, 30 Mar 2022 21:10:25 +0000  (21:10 +0000)]  
upstream: fix poll() spin when a channel's output fd closes without
data in the channel buffer. Introduce more exact packing of channel fds into
the pollfd array. fixes bz3405 and bz3411; ok deraadt@ markus@
OpenBSD-Commit-ID: 
06740737849c9047785622ad5d472cb6a3907d10 
djm@openbsd.org  [Wed, 30 Mar 2022 04:33:09 +0000  (04:33  +0000)]  
upstream: ssh is almost out of getopt() characters; note the
remaining remaining available ones in a comment
OpenBSD-Commit-ID: 
48d38cef59d6bc8e84c6c066f6d601875d3253fd 
djm@openbsd.org  [Wed, 30 Mar 2022 04:27:51 +0000  (04:27  +0000)]  
upstream: avoid NULL deref via ssh-keygen -Y find-principals.
bz3409, reported by Mateusz Adamowski
OpenBSD-Commit-ID: 
a3b2c02438052ee858e0ee18e5a288586b5df2c5 
Darren Tucker  [Mon, 28 Mar 2022 06:51:03 +0000  (17:51 +1100)]  
Add AIX 5.1 test target.
Darren Tucker  [Sat, 26 Mar 2022 11:01:31 +0000  (22:01 +1100)]  
Drop leading "v" from release version identifier.
Darren Tucker  [Sat, 26 Mar 2022 05:28:04 +0000  (16:28 +1100)]  
Use tarballs when testing LibreSSL releases.
Darren Tucker  [Sat, 26 Mar 2022 04:02:45 +0000  (15:02 +1100)]  
Remove now-unused passwd variable.
Darren Tucker  [Sat, 26 Mar 2022 02:15:44 +0000  (13:15 +1100)]  
Missing semicolon.
Darren Tucker  [Sat, 26 Mar 2022 01:49:50 +0000  (12:49 +1100)]  
Factor out platform-specific locked account check.
Darren Tucker  [Fri, 25 Mar 2022 21:13:46 +0000  (08:13 +1100)]  
Add OpenWRT mips and mipsel test targets.
djm@openbsd.org  [Sun, 20 Mar 2022 08:52:17 +0000  (08:52 +0000)]  
upstream: don't leak argument list; bz3404, reported by Balu
Gajjala ok dtucker@
OpenBSD-Commit-ID: 
fddc32d74e5dd5cff1a49ddd6297b0867eae56a6 
djm@openbsd.org  [Sun, 20 Mar 2022 08:51:21 +0000  (08:51 +0000)]  
upstream: make addargs() and replacearg() a little more robust and
improve error reporting
make freeargs(NULL) a noop like the other free functions
ok dtucker as part of bz3403
OpenBSD-Commit-ID: 
15f86da83176978b4d1d288caa24c766dfa2983d 
djm@openbsd.org  [Fri, 18 Mar 2022 04:04:11 +0000  (04:04  +0000)]  
upstream: don't try to resolve ListenAddress directives in the sshd
re-exec path - we're never going to use the result and if the operation fails
then it can prevent connections from being accepted. Reported by Aaron
Poffenberger; with / ok dtucker@
OpenBSD-Commit-ID: 
44c53a43909a328e2f5ab26070fdef3594eded60 
djm@openbsd.org  [Fri, 18 Mar 2022 02:50:21 +0000  (02:50  +0000)]  
upstream: remove blank line
OpenBSD-Commit-ID: 
d5e0182965b2fbfb03ad5f256d1a1ce5706bcddf 
djm@openbsd.org  [Fri, 18 Mar 2022 02:32:22 +0000  (02:32  +0000)]  
upstream: helpful comment
OpenBSD-Commit-ID: 
e3315a45cb04e7feeb614d76ec80a9fe4ca0e8c7 
djm@openbsd.org  [Fri, 18 Mar 2022 02:31:25 +0000  (02:31  +0000)]  
upstream: ssh-keygen -Y check-novalidate requires namespace or SEGV
will ensue. Patch from Mateusz Adamowski via GHPR#307
OpenBSD-Commit-ID: 
99e8ec38f9feb38bce6de240335be34aedeba5fd 
djm@openbsd.org  [Tue, 15 Mar 2022 05:27:37 +0000  (05:27  +0000)]  
upstream: improve DEBUG_CHANNEL_POLL debugging message
OpenBSD-Commit-ID: 
2275eb7bc4707d019b1a0194b9c92c0b78da848f 
cheloha@openbsd.org  [Sun, 13 Mar 2022 23:27:54 +0000  (23:27 +0000)]  
upstream: ssh: xstrdup(): use memcpy(3)
Copying the given string into the buffer with strlcpy(3) confers no
benefit in this context because we have already determined the
string's length with strlen(3) in order to allocate that buffer.
Thread: https://marc.info/?l=openbsd-tech&m=
164687525802691 &w=2
ok dtucker@ millert@
OpenBSD-Commit-ID: 
f8bfc082e36e2d2dc4e1feece02fe274155ca11a 
Darren Tucker  [Fri, 11 Mar 2022 07:43:58 +0000  (18:43 +1100)]  
Resync fmt_scaled. with OpenBSD.
Darren Tucker  [Tue, 8 Mar 2022 22:41:56 +0000  (09:41 +1100)]  
Provide killpg implementation.
Darren Tucker  [Tue, 8 Mar 2022 22:29:30 +0000  (09:29 +1100)]  
Check for missing ftruncate prototype.
Darren Tucker  [Tue, 8 Mar 2022 09:04:06 +0000  (20:04 +1100)]  
Default to not using sandbox when cross compiling.
djm@openbsd.org  [Tue, 1 Mar 2022 01:59:19 +0000  (01:59  +0000)]  
upstream: pack pollfd array before server_accept_loop() ppoll()
call, and terminate sshd if ppoll() returns errno==EINVAL
avoids spin in ppoll when MaxStartups > RLIMIT_NOFILE, reported by
Daniel Micay
feedback/ok deraadt
OpenBSD-Commit-ID: 
dbab1c24993ac977ec24d83283b8b7528f7c2c15 
naddy@openbsd.org  [Sun, 27 Feb 2022 01:33:59 +0000  (01:33  +0000)]  
upstream: include rejected signature algorithm in error message and
not the (useless) key type; ok djm@
OpenBSD-Commit-ID: 
d0c0f552a4d9161203e07e95d58a76eb602a76ff 
dtucker@openbsd.org  [Fri, 25 Feb 2022 09:46:24 +0000  (09:46 +0000)]  
upstream: Remove the char * casts from arguments to do_lstat,
do_readdir and do_stat paths since the underlying functions now take a const
char *. Patch from vapier at gentoo.org.
OpenBSD-Commit-ID: 
9e4d964dbfb0ed683a2a2900711b88e7f1c0297b 
djm@openbsd.org  [Fri, 25 Feb 2022 02:09:27 +0000  (02:09  +0000)]  
upstream: save an unneccessary alloc/free, based on patch from
Martin Vahlensieck; ok dtucker@
OpenBSD-Commit-ID: 
90ffbf1f837e509742f2c31a1fbf2c0fd376fd5f 
Darren Tucker  [Mon, 28 Feb 2022 22:02:06 +0000  (09:02 +1100)]  
Remove unused ivbits argument from chacha_keysetup
Darren Tucker  [Mon, 28 Feb 2022 22:00:20 +0000  (09:00 +1100)]  
Add OPENBSD ORIGINAL marker.
Darren Tucker  [Mon, 28 Feb 2022 11:21:36 +0000  (22:21 +1100)]  
No unused param warnings for clang-12 and gcc-11.
Darren Tucker  [Sat, 26 Feb 2022 03:10:41 +0000  (14:10 +1100)]  
Add debian-i386 test target.
Darren Tucker  [Sat, 26 Feb 2022 03:06:14 +0000  (14:06 +1100)]  
Allow ppoll_time64 in seccomp sandbox.
Darren Tucker  [Fri, 25 Feb 2022 08:47:48 +0000  (19:47 +1100)]  
Improve handling of _getshort and _getlong.
Darren Tucker  [Fri, 25 Feb 2022 04:14:22 +0000  (15:14 +1100)]  
Constify utimes in compat library to match specs.
Darren Tucker  [Fri, 25 Feb 2022 02:50:56 +0000  (13:50 +1100)]  
ANSIfy getshort and getlong.
Darren Tucker  [Fri, 25 Feb 2022 02:23:04 +0000  (13:23 +1100)]  
Use PICFLAG instead of hard coding -fPIC.
Darren Tucker  [Fri, 25 Feb 2022 00:37:11 +0000  (11:37 +1100)]  
Add tests for latest releases of {Libre,Open}SSL.
Colin Watson  [Thu, 24 Feb 2022 16:04:18 +0000  (16:04 +0000)]  
Improve detection of -fzero-call-used-regs=all support
djm@openbsd.org  [Wed, 23 Feb 2022 21:21:49 +0000  (21:21 +0000)]  
upstream: free(3) wants stdlib.h
OpenBSD-Commit-ID: 
227a8c70a95b4428c49e46863c9ef4bd318a3b8a 
djm@openbsd.org  [Wed, 23 Feb 2022 21:21:16 +0000  (21:21 +0000)]  
upstream: put back the scp manpage changes for SFTP mode too
OpenBSD-Commit-ID: 
05dc53921f927e1b5e5694e1f3aa314549f2e768 
deraadt@openbsd.org  [Wed, 23 Feb 2022 19:01:00 +0000  (19:01 +0000)]  
upstream: and we go back to testing sftp-scp after the 8.9
release...
OpenBSD-Commit-ID: 
a80440168258adca543a4607b871327a279c569c 
Damien Miller  [Wed, 23 Feb 2022 11:31:11 +0000  (22:31 +1100)]  
makedepend
djm@openbsd.org  [Wed, 23 Feb 2022 11:18:13 +0000  (11:18 +0000)]  
upstream: avoid integer overflow of auth attempts (harmless, caught
by monitor)
OpenBSD-Commit-ID: 
488ad570b003b21e0cd9e7a00349cfc1003b4d86 
djm@openbsd.org  [Wed, 23 Feb 2022 11:17:10 +0000  (11:17 +0000)]  
upstream: randomise the password used in fakepw
OpenBSD-Commit-ID: 
34e159f73b1fbf0a924a9c042d8d61edde293947 
djm@openbsd.org  [Wed, 23 Feb 2022 11:15:57 +0000  (11:15 +0000)]  
upstream: use asprintf to construct .rhosts paths
OpenBSD-Commit-ID: 
8286e8d3d2c6ff916ff13d041d1713073f738a8b 
djm@openbsd.org  [Wed, 23 Feb 2022 11:07:09 +0000  (11:07 +0000)]  
upstream: openssh-8.9
OpenBSD-Commit-ID: 
5c5f791c87c483cdab6d9266b43acdd9ca7bde0e 
Darren Tucker  [Tue, 22 Feb 2022 04:29:22 +0000  (15:29 +1100)]  
Extend select+rlimit sanbox test to include poll.
Darren Tucker  [Tue, 22 Feb 2022 02:08:59 +0000  (13:08 +1100)]  
Add Alpine Linux test VM.
Darren Tucker  [Tue, 22 Feb 2022 01:27:07 +0000  (12:27 +1100)]  
Include sys/param.h if present.
Darren Tucker  [Tue, 22 Feb 2022 01:25:52 +0000  (12:25 +1100)]  
Only include sys/poll.h if we don't have poll.h.
Damien Miller  [Tue, 22 Feb 2022 00:14:51 +0000  (11:14 +1100)]  
disable agent-restrict test on minix3
Darren Tucker  [Mon, 21 Feb 2022 10:27:20 +0000  (21:27 +1100)]  
Skip agent-getpeereid when running as root.
dtucker@openbsd.org  [Sun, 20 Feb 2022 03:47:26 +0000  (03:47  +0000)]  
upstream: Aproximate realpath on the expected output by deduping
leading slashes. Fixes test failure when user's home dir is / which is
possible in some portable configurations.
OpenBSD-Regress-ID: 
53b8c53734f8893806961475c7106397f98d9f63 
Darren Tucker  [Sun, 20 Feb 2022 02:30:52 +0000  (13:30 +1100)]  
Really move DSA to end of list.
In commit 
ad16a84e  syncing from OpenBSD, RSA was accidentally moved to
the end of the list instead of DSA.  Spotted by andrew at fyfe.gb.net.
Darren Tucker  [Fri, 18 Feb 2022 01:12:21 +0000  (12:12 +1100)]  
Add test configs for MUSL C library.
Damien Miller  [Thu, 17 Feb 2022 11:54:19 +0000  (22:54 +1100)]  
minix needs BROKEN_POLL too; chokes on /dev/null
djm@openbsd.org  [Thu, 17 Feb 2022 10:58:27 +0000  (10:58 +0000)]  
upstream: check for EINTR/EAGAIN failures in the rfd fast-path; caught
by dtucker's minix3 vm :) ok dtucker@
OpenBSD-Commit-ID: 
2e2c895a3e82ef347aa6694394a76a438be91361 
Darren Tucker  [Thu, 17 Feb 2022 11:05:29 +0000  (22:05 +1100)]  
Comment hurd test, the VM is currently broken.
Damien Miller  [Thu, 17 Feb 2022 10:15:16 +0000  (21:15 +1100)]  
find sk-dummy.so when build_dir != src_dir
Damien Miller  [Wed, 16 Feb 2022 05:26:17 +0000  (16:26 +1100)]  
update versions in preparation for 8.9 release
djm@openbsd.org  [Tue, 15 Feb 2022 05:13:36 +0000  (05:13  +0000)]  
upstream: document the unbound/host-bound options to
PubkeyAuthentication; spotted by HARUYAMA Seigo
OpenBSD-Commit-ID: 
298f681b66a9ecd498f0700082c7a6c46e948981 
Darren Tucker  [Mon, 14 Feb 2022 03:19:40 +0000  (14:19 +1100)]  
Test if sshd accidentally acquires controlling tty
Darren Tucker  [Fri, 11 Feb 2022 23:24:56 +0000  (10:24 +1100)]  
Add cygwin-release test config.
Darren Tucker  [Fri, 11 Feb 2022 10:00:35 +0000  (21:00 +1100)]  
Move SSHD_ACQUIRES_CTTY workaround into compat.
Darren Tucker  [Fri, 11 Feb 2022 09:09:32 +0000  (20:09 +1100)]  
Simplify handling of --with-ssl-dir.
Darren Tucker  [Fri, 11 Feb 2022 02:39:29 +0000  (13:39 +1100)]  
Stop testing OpenBSD HEAD on 6.9 and 7.0.
dtucker@openbsd.org  [Fri, 11 Feb 2022 00:43:56 +0000  (00:43  +0000)]  
upstream: Always initialize delim before passing to hpdelim2 which
might not set it. Found by the Valgrind tests on github, ok deraadt@
OpenBSD-Commit-ID: 
c830c0db185ca43beff3f41c19943c724b4f636d 
Darren Tucker  [Thu, 10 Feb 2022 23:03:06 +0000  (10:03 +1100)]  
Fix helper include path and remove excess code.
Darren Tucker  [Thu, 10 Feb 2022 12:27:02 +0000  (23:27 +1100)]  
Put poll.h inside ifdef.
Darren Tucker  [Thu, 10 Feb 2022 11:17:31 +0000  (22:17 +1100)]  
We now support POLLPRI so actually define it.
dtucker@openbsd.org  [Sun, 6 Feb 2022 22:58:33 +0000  (22:58 +0000)]  
upstream: Add test for empty hostname with port.
OpenBSD-Regress-ID: 
e19e89d3c432b68997667efea44cf015bbe2a7e3 
dtucker@openbsd.org  [Fri, 4 Feb 2022 07:53:44 +0000  (07:53 +0000)]  
upstream: Add unit tests for hpdelim.
OpenBSD-Regress-ID: 
be97b85c19895e6a1ce13c639765a3b48fd95018 
djm@openbsd.org  [Thu, 10 Feb 2022 04:12:38 +0000  (04:12  +0000)]  
upstream: revert for imminent OpenSSH release, which wil ship with
scp in RCP mode.
> revision 1.106
> date: 2021/10/15 14:46:46;  author: deraadt;  state: Exp;  lines: +13 -9;  commitid: w5n9B2RE38tFfggl;
> openbsd 7.0 release shipped with the (hopefully last) scp that uses RCP
> protocol for copying.  Let's get back to testing the SFTP protocol.
This will be put back once the OpenSSH release is done.
OpenBSD-Commit-ID: 
0c725481a78210aceecff1537322c0b2df03e768 
dtucker@openbsd.org  [Tue, 8 Feb 2022 08:59:12 +0000  (08:59 +0000)]  
upstream: Switch hpdelim interface to accept only ":" as delimiter.
Historicallly, hpdelim accepted ":" or "/" as a port delimiter between
hosts (or addresses) and ports.  These days most of the uses for "/"
are no longer accepted, so there are several places where it checks the
delimiter to disallow it.  Make hpdelim accept only ":" and use hpdelim2
in the other cases.  ok djm@
OpenBSD-Commit-ID: 
7e6420bd1be87590b6840973f5ad5305804e3102 
pedro martelletto  [Mon, 7 Feb 2022 08:09:59 +0000  (09:09 +0100)]  
fix typos in previous
Damien Miller  [Mon, 7 Feb 2022 01:53:47 +0000  (12:53 +1100)]  
compat code for fido_assert_set_clientdata()
djm@openbsd.org  [Mon, 7 Feb 2022 01:25:12 +0000  (01:25  +0000)]  
upstream: use libfido2 1.8.0+ fido_assert_set_clientdata() instead
of manually hashing data outselves. Saves a fair bit of code and makes life
easier for some -portable platforms.
OpenBSD-Commit-ID: 
351dfaaa5ab1ee928c0e623041fca28078cff0e0 
jsg@openbsd.org  [Sun, 6 Feb 2022 00:29:03 +0000  (00:29  +0000)]  
upstream: remove please from manual pages ok jmc@ sthen@ millert@
OpenBSD-Commit-ID: 
6543acb00f4f38a23472538e1685c013ca1a99aa 
dtucker@openbsd.org  [Fri, 4 Feb 2022 02:49:17 +0000  (02:49  +0000)]  
upstream: Since they are deprecated, move DSA to the end of the
default list of public keys so that they will be tried last.  From github
PR#295 from "ProBackup-nl", ok djm@
OpenBSD-Commit-ID: 
7e5d575cf4971d4e2de92e0b6d6efaba53598bf0 
Damien Miller  [Wed, 2 Feb 2022 05:52:07 +0000  (16:52 +1100)]  
portable-specific string array constification
djm@openbsd.org  [Tue, 1 Feb 2022 23:37:15 +0000  (23:37 +0000)]  
upstream: test 'ssh-keygen -Y find-principals' with wildcard
principals; from Fabian Stelzer
OpenBSD-Regress-ID: 
fbe4da5f0032e7ab496527a5bf0010fd700f8f40 
dtucker@openbsd.org  [Fri, 21 Jan 2022 02:54:41 +0000  (02:54  +0000)]  
upstream: Enable all supported ciphers and macs in the server
before trying to benchmark them.  Increase the data file size to get more
signal.
OpenBSD-Regress-ID: 
dc3697d9f7defdfc51c608782c8e750128e46eb6 
djm@openbsd.org  [Tue, 1 Feb 2022 23:34:47 +0000  (23:34 +0000)]  
upstream: allow 'ssh-keygen -Y find-principals' to match wildcard
principals in allowed_signers files; from Fabian Stelzer
OpenBSD-Commit-ID: 
1e970b9c025b80717dddff5018fe5e6f470c5098 
djm@openbsd.org  [Tue, 1 Feb 2022 23:32:51 +0000  (23:32 +0000)]  
upstream: mark const string array contents const too, i.e. static
const char *array => static const char * const array from Mike Frysinger
OpenBSD-Commit-ID: 
a664e31ea6a795d7c81153274a5f47b22bdc9bc1 
djm@openbsd.org  [Tue, 1 Feb 2022 23:11:11 +0000  (23:11 +0000)]  
upstream: better match legacy scp behaviour: show un-expanded paths
in error messages. Spotted by and ok tb@
OpenBSD-Commit-ID: 
866c8ffac5bd7d38ecbfc3357c8adfa58af637b7 
dtucker@openbsd.org  [Tue, 1 Feb 2022 07:57:32 +0000  (07:57 +0000)]  
upstream: Remove explicit kill of privsep preauth child's PID in
SIGALRM handler. It's no longer needed since the child will get terminated by
the SIGTERM to the process group that cleans up any auth helpers, it
simplifies the signal handler and removes the risk of a race when updating
the PID. Based on analysis by HerrSpace in github PR#289, ok djm@
OpenBSD-Commit-ID: 
2be1ffa28b4051ad9e33bb4371e2ec8a31d6d663 
guenther@openbsd.org  [Fri, 28 Jan 2022 06:18:42 +0000  (06:18 +0000)]  
upstream: When it's the possessive of 'it', it's spelled "its",
without the apostrophe.
OpenBSD-Commit-ID: 
fb6ab9c65bd31de831da1eb4631ddac018c5fae7 
Alex James  [Sun, 30 Jan 2022 22:13:36 +0000  (16:13 -0600)]  
sandbox-seccomp-filter: allow gettid
djm@openbsd.org  [Sat, 22 Jan 2022 00:49:34 +0000  (00:49  +0000)]  
upstream: add a ssh_packet_process_read() function that reads from
a fd directly into the transport input buffer.
Use this in the client and server mainloops to avoid unnecessary
copying. It also lets us use a more greedy read size without penalty.
Yields a 2-3% performance gain on cipher-speed.sh (in a fairly
unscientific test tbf)
feedback dtucker@ ok markus@
OpenBSD-Commit-ID: 
df4112125bf79d8e38e79a77113e1b373078e632 
djm@openbsd.org  [Sat, 22 Jan 2022 00:45:31 +0000  (00:45  +0000)]  
upstream: Use sshbuf_read() to read directly into the channel input
buffer rather than into a stack buffer that needs to be copied again;
Improves performance by about 1% on cipher-speed.sh feedback dtucker@ ok
markus@
OpenBSD-Commit-ID: 
bf5e6e3c821ac3546dc8241d8a94e70d47716572 
Damien Miller  [Tue, 25 Jan 2022 00:52:34 +0000  (11:52 +1100)]  
depend
djm@openbsd.org  [Sat, 22 Jan 2022 00:43:43 +0000  (00:43  +0000)]  
upstream: Add a sshbuf_read() that attempts to read(2) directly in
to a sshbuf; ok markus@
OpenBSD-Commit-ID: 
2d8f249040a4279f3bc23c018947384de8d4a45b 
djm@openbsd.org  [Fri, 21 Jan 2022 07:04:19 +0000  (07:04 +0000)]  
upstream: add a helper for writing an error message to the
stderr_buf and setting quit_pending; no functional change but saves a bunch
of boilerplate
OpenBSD-Commit-ID: 
0747657cad6b9eabd514a6732adad537568e232d 
djm@openbsd.org  [Fri, 21 Jan 2022 06:58:06 +0000  (06:58 +0000)]  
upstream: correct comment and use local variable instead of long
indirection; spotted by dtucker@
OpenBSD-Commit-ID: 
5f65f5f69db2b7d80a0a81b08f390a63f8845965 
deraadt@openbsd.org  [Fri, 21 Jan 2022 00:53:40 +0000  (00:53  +0000)]  
upstream: When poll(2) returns -1, for some error conditions
pfd[].revents is not cleared.  There are subtle errors in various programs.
In this particular case, the program should error out. ok djm millert
OpenBSD-Commit-ID: 
00f839b16861f7fb2adcf122e95e8a82fa6a375c 
Damien Miller  [Sat, 22 Jan 2022 00:38:21 +0000  (11:38 +1100)]  
restore tty force-read hack
This portable-specific hack fixes a hang on exit for ttyful sessions
on Linux and some SysVish Unix variants. It was accidentally disabled
in commit 
5c79952dfe1a  (a precursor to the mainloop poll(2) conversion).
Spotted by John in bz3383
Corinna Vinschen  [Thu, 20 Jan 2022 16:22:56 +0000  (03:22  +1100)]  
Fix signedness bug in Cygwin codeSigned-off-by: Corinna Vinschen <vinschen@redhat.com> 
Darren Tucker  [Thu, 20 Jan 2022 02:26:27 +0000  (13:26 +1100)]  
Improve compatibility of early exit trap handling.