OpenBSD src changes summary for 2016-05-30
==========================================

distrib/armv7                           include/rpcsvc/yp_prot.h
include/rpcsvc/ypclnt.h                 lib/libc
lib/libssl                              regress/lib
regress/usr.bin                         share/man
sys/arch/amd64/amd64                    sys/arch/octeon/dev
sys/arch/octeon/include                 sys/dev/pci
sys/dev/wscons                          sys/kern
sys/net                                 sys/netinet
sys/netinet6                            sys/sys
sys/uvm                                 usr.bin/sed
usr.bin/ssh                             usr.bin/tmux
usr.sbin/smtpd                          

== distrib =========================================================== 01/08 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/distrib

armv7

  ~ ramdisk/install.md                    

  > Tweak previous
  > OK jsg (rpe@)

== include =========================================================== 02/08 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/include

rpcsvc/yp_prot.h

  ~ rpcsvc/yp_prot.h                      

  > Stop publicly declaring _yp_dobind() and struct dom_binding, closing out
  > a rant Theo wrote 24 years ago.  Mark __ypexclude_{add,is,free}() as hidden
  > "get off my lawn!" deraadt@ (guenther@)

rpcsvc/ypclnt.h

  ~ rpcsvc/ypclnt.h                       

  > Stop publicly declaring _yp_dobind() and struct dom_binding, closing out
  > a rant Theo wrote 24 years ago.  Mark __ypexclude_{add,is,free}() as hidden
  > "get off my lawn!" deraadt@ (guenther@)

== lib =============================================================== 03/08 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/lib

libc

  ~ arch/mips64/gen/_setjmp.S             ~ arch/mips64/gen/setjmp.S

  > Do setjmp cookies for gp, sp, and ra
  > endian testing and ok deraadt@
  > ok visa@ (guenther@)

  ~ arch/i386/gen/_setjmp.S               ~ arch/i386/gen/setjmp.S
  ~ arch/i386/gen/sigsetjmp.S             

  > Do setjmp cookies for eip, esp, and ebp.  For bonus points, mix how
  > the cookies are used in setjmp/_setjmp/sigsetjmp so that mixing
  > calls (e.g., longjmp on a _setjmp buffer) will scramble all three
  > registers and jump you to a random location on a random stack!
  > ok deraadt@ (guenther@)

  ~ hidden/rpcsvc/ypclnt.h                ~ yp/yp_bind.c
  ~ yp/ypexclude.h                        

  > Stop publicly declaring _yp_dobind() and struct dom_binding, closing out
  > a rant Theo wrote 24 years ago.  Mark __ypexclude_{add,is,free}() as hidden
  > "get off my lawn!" deraadt@ (guenther@)

  ~ stdlib/icdb.c                         

  > The icdb magic number doesn't need to be visible to static links
  > ok tedu@ (guenther@)

  ~ arch/arm/Symbols.list                 ~ arch/arm/sys/brk.S
  ~ arch/arm/sys/sbrk.S                   ~ arch/hppa/Symbols.list
  ~ arch/hppa/sys/brk.S                   ~ arch/hppa/sys/sbrk.S
  ~ arch/mips64/Symbols.list              ~ arch/mips64/sys/brk.S
  ~ arch/mips64/sys/sbrk.S                ~ arch/powerpc/Symbols.list
  ~ arch/powerpc/sys/brk.S                ~ arch/powerpc/sys/sbrk.S
  ~ arch/sh/Symbols.list                  ~ arch/sh/sys/brk.S
  ~ arch/sh/sys/sbrk.S                    

  > Consistently reference '_end' instead of 'end' in the brk/sbrk
  > implementation
  > ok deraadt@ (guenther@)

  ~ sys/syscall.2                         

  > We no longer have syscalls with multiple return values.  Whine about
  > long long alignment instead. (guenther@)

  ~ sys/Makefile.inc                      

  > Move __getcwd from ASM to HIDDEN: we don't want the literal __getcwd symbol
  > ok millert@ deraadt@ (guenther@)

libssl

  ~ src/crypto/evp/evp.h                  ~ src/crypto/evp/evp_enc.c
  ~ src/ssl/s3_srvr.c                     ~ src/ssl/t1_lib.c

  > deprecate internal use of EVP_[Cipher|Encrypt|Decrypt]_Final.
  > 14 years ago these were changed in OpenSSL to be the same
  > as the _ex functions. We use the _ex functions only internally
  > to ensure it is obvious the ctx must be cleared.
  > ok bcook@ (beck@)

== regress =========================================================== 04/08 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/regress

lib

  ~ libcrypto/engine/enginetest.c         

  > Gix misleading indent pointed out by GCC 6.1.
  > ok beck@ jsing@ (bcook@)

usr.bin

  ~ ssh/unittests/utf8/tests.c            

  > Fix two rare edge cases:
  > 1. If vasprintf() returns < 0, do not access a NULL pointer in snmprintf(),
  > and do not free() the pointer returned from vasprintf() because on some
  > systems other than OpenBSD, it might be a bogus pointer.
  > 2. If vasprintf() returns == 0, return 0 and "" rather than -1 and NULL.
  > Besides, free(dst) is pointless after failure (not a bug).
  > One half OK martijn@, the other half OK deraadt@;
  > committing quickly before people get hurt. (schwarze@)

  ~ ssh/unittests/utf8/Makefile           

  > stricter malloc.conf(5) options for utf8 tests (schwarze@)

  ~ sed/substitute.sh                     

  > Some tests for \<; will be fixed by martijn@'s upcoming commit to process.c
  > (schwarze@)

== share ============================================================= 05/08 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/share

man

  ~ man4/video.4                          

  > Fix sequence for the mmap(2) method.
  > ok jmc (mglocker@)

== sys =============================================================== 06/08 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys

arch/amd64/amd64

  ~ autoconf.c                            ~ cpu.c

  > include rdtsc in the rdrand callback. some systems don't have rdrand yet,
  > but rdtsc may provide a few bits. ok deraadt (tedu@)

arch/octeon/dev

  ~ cn30xxpipreg.h                        ~ if_cnmac.c
  ~ if_cnmacvar.h                         

  > Fill the packet data pool with standard mbuf clusters instead of
  > driver-specific memory blocks. This lets the cnmac(4) RX path run
  > without an mbuf ext_free callback.
  > ok uebayasi@ (visa@)

arch/octeon/include

  ~ octeonvar.h                           

  > Fill the packet data pool with standard mbuf clusters instead of
  > driver-specific memory blocks. This lets the cnmac(4) RX path run
  > without an mbuf ext_free callback.
  > ok uebayasi@ (visa@)

dev/pci

  ~ ubsec.c                               

  > replace m_copym2 with m_dup_pkt.
  > ok mpi@ (dlg@)

dev/wscons

  ~ wsmousevar.h                          

  > Do not forward declare an enum, makes gcc3 happy.
  > From miod@, ok bru@ (mpi@)

kern

  ~ exec_elf.c                            ~ kern_exec.c

  >  (deraadt@)

  ~ exec_elf.c                            ~ kern_exec.c

  > backout to insert correct commit message (deraadt@)

  ~ exec_elf.c                            ~ kern_exec.c

  > Identify W^X labelled binaries at execve() time based upon
  > WX_OPENBSD_WXNEEDED
  > flag set by ld -zwxneeded.  Such binaries are allowed to run only on
  > wxallowed
  > mountpoints.  They do not report mmap/mprotect problems.
  > Rate limit mmap/mprotect reports from other binaries.
  > These semantics are chosen to encourage progress in the ports ecosystem,
  > without overwhelming the developers who work in the area.
  > ok sthen kettenis (deraadt@)

net

  ~ if_bridge.c                           

  > Insert a hack to deal with interfaces removing the VLAN header before
  > the packet has been feed to the pseudo-interfaces input handlers.
  > To fix that without introducing a layer violation we should be able to
  > disable HW-vlan on parent when in use with different pseudo-interfaces.
  > In the case of bridge(4) for example it makes no sense to let the interface
  > remove the VLAN header if the kernel has to add it back for every packet.
  > Fix issues reported by sebastia@ and markus@
  > From dlg@, ok claudio@ (mpi@)

  ~ if_spppsubr.c                         ~ if_sppp.h
  ~ if_pppoe.c                            

  > Set pppoe(4) control frames to high (NC, "network control")
  > priority.  This is translated into an 802.1p priority tag when
  > sent over a vlan interface, reducing the risk of them being
  > crowded out by data packets on a busy link.
  > Some users have problems with ISPs that place specific
  > requirements on vlan priority (typically the packet header
  > value must be '0', relating to priority 1).  This diff
  > doesn't fix that yet, but gives a single place to patch
  > to change tags on control packets without affecting
  > normal vlan priority operation on other interfaces.
  > ok mikeb. (sthen@)

netinet

  ~ ip_carp.c                             

  > Insert a hack to deal with interfaces removing the VLAN header before
  > the packet has been feed to the pseudo-interfaces input handlers.
  > To fix that without introducing a layer violation we should be able to
  > disable HW-vlan on parent when in use with different pseudo-interfaces.
  > In the case of bridge(4) for example it makes no sense to let the interface
  > remove the VLAN header if the kernel has to add it back for every packet.
  > Fix issues reported by sebastia@ and markus@
  > From dlg@, ok claudio@ (mpi@)

netinet6

  ~ nd6.c                                 ~ nd6.h

  > remove code compensating for the "short" range of timeouts.
  > the nd6 code for managing expiries is never asked to handle intervals
  > greater than what timeouts can handle, so we dont need to overcompensate.
  > the code was also incorrect by using a long, which isnt that long
  > on ILP32 machines.
  > ok mpi@ millert@ benno@ (dlg@)

sys

  ~ exec.h                                ~ proc.h

  >  (deraadt@)

  ~ exec.h                                ~ proc.h

  > backout to insert correct commit message (deraadt@)

  ~ exec.h                                ~ proc.h

  > Identify W^X labelled binaries at execve() time based upon
  > WX_OPENBSD_WXNEEDED
  > flag set by ld -zwxneeded.  Such binaries are allowed to run only on
  > wxallowed
  > mountpoints.  They do not report mmap/mprotect problems.
  > Rate limit mmap/mprotect reports from other binaries.
  > These semantics are chosen to encourage progress in the ports ecosystem,
  > without overwhelming the developers who work in the area.
  > ok sthen kettenis (deraadt@)

uvm

  ~ uvm_mmap.c                            

  >  (deraadt@)

  ~ uvm_mmap.c                            

  > backout to insert correct commit message (deraadt@)

  ~ uvm_mmap.c                            

  > Identify W^X labelled binaries at execve() time based upon
  > WX_OPENBSD_WXNEEDED
  > flag set by ld -zwxneeded.  Such binaries are allowed to run only on
  > wxallowed
  > mountpoints.  They do not report mmap/mprotect problems.
  > Rate limit mmap/mprotect reports from other binaries.
  > These semantics are chosen to encourage progress in the ports ecosystem,
  > without overwhelming the developers who work in the area.
  > ok sthen kettenis (deraadt@)

== usr.bin =========================================================== 07/08 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin

sed

  ~ process.c                             

  > Make sed use the new REG_STARTEND | REG_NOTBOL combination. This fixes a
  > begin
  > of word mismatch as reported by jsg@.
  > Discussed with otto@ and others early on, earlier version tested in ports
  > build
  > by aja@
  > OK millert@
  > Few readability tweaks and OK schwarze@ (martijn@)

ssh

  ~ utf8.c                                

  > Fix two rare edge cases:
  > 1. If vasprintf() returns < 0, do not access a NULL pointer in snmprintf(),
  > and do not free() the pointer returned from vasprintf() because on some
  > systems other than OpenBSD, it might be a bogus pointer.
  > 2. If vasprintf() returns == 0, return 0 and "" rather than -1 and NULL.
  > Besides, free(dst) is pointless after failure (not a bug).
  > One half OK martijn@, the other half OK deraadt@;
  > committing quickly before people get hurt. (schwarze@)

  ~ utf8.c                                

  > Even when only writing an unescaped character, the dst buffer may need to
  > grow, or it would be overrun; issue found by tb@ with malloc.conf(5) 'C'.
  > While here, reserve an additional byte for the terminating NUL
  > up front such that we don't have to realloc() later just for that.
  > OK tb@ (schwarze@)

  ~ progressmeter.c                       

  > Backout rev. 1.43 for now.
  > The function update_progress_meter() calls refresh_progress_meter()
  > which calls snmprintf() which calls malloc(); but update_progress_meter()
  > acts as the SIGALRM signal handler.
  > "malloc(): error: recursive call" reported by sobrado@. (schwarze@)

tmux

  ~ tty.c                                 

  > Send two cub1 instead of using cub for moving the cursor two left. This
  > is normally better because using cub1 will be ^H^H (so two bytes) but
  > cub would be ^[[2D (four). (nicm@)

  ~ screen-write.c                        

  > Do not draw character to screen if it has not changed, and do not save
  > last character if it won't be used. This (and last few commits) prompted
  > by a report from Hubert depesz Lubaczewski. (nicm@)

  ~ cmd-set-option.c                      ~ tmux.h
  ~ tty.c                                 ~ window.c

  > Cache the window styles and do not look up the window-style options
  > unless they have changed. (nicm@)

== usr.sbin ========================================================== 08/08 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin

smtpd

  ~ to.c                                  

  > Simplify address parsing code by only using inet_net_pton(3).
  > There's no need to have a separate case for non-CIDR addresses using
  > inet_pton(3) as inet_net_pton(3) handles them as well.
  > This simplification is valid for all our daemons parsing addresses,
  > it is a common patern.
  > ok gilles@, millert@ (mpi@)

===============================================================================
_______________________________________________
odc mailing list
[email protected]
http://www.squish.net/mailman/listinfo/odc

Reply via email to