OpenBSD src changes summary for 2016-05-30 ==========================================
distrib/armv7 include/rpcsvc/yp_prot.h include/rpcsvc/ypclnt.h lib/libc lib/libssl regress/lib regress/usr.bin share/man sys/arch/amd64/amd64 sys/arch/octeon/dev sys/arch/octeon/include sys/dev/pci sys/dev/wscons sys/kern sys/net sys/netinet sys/netinet6 sys/sys sys/uvm usr.bin/sed usr.bin/ssh usr.bin/tmux usr.sbin/smtpd == distrib =========================================================== 01/08 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/distrib armv7 ~ ramdisk/install.md > Tweak previous > OK jsg (rpe@) == include =========================================================== 02/08 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/include rpcsvc/yp_prot.h ~ rpcsvc/yp_prot.h > Stop publicly declaring _yp_dobind() and struct dom_binding, closing out > a rant Theo wrote 24 years ago. Mark __ypexclude_{add,is,free}() as hidden > "get off my lawn!" deraadt@ (guenther@) rpcsvc/ypclnt.h ~ rpcsvc/ypclnt.h > Stop publicly declaring _yp_dobind() and struct dom_binding, closing out > a rant Theo wrote 24 years ago. Mark __ypexclude_{add,is,free}() as hidden > "get off my lawn!" deraadt@ (guenther@) == lib =============================================================== 03/08 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/lib libc ~ arch/mips64/gen/_setjmp.S ~ arch/mips64/gen/setjmp.S > Do setjmp cookies for gp, sp, and ra > endian testing and ok deraadt@ > ok visa@ (guenther@) ~ arch/i386/gen/_setjmp.S ~ arch/i386/gen/setjmp.S ~ arch/i386/gen/sigsetjmp.S > Do setjmp cookies for eip, esp, and ebp. For bonus points, mix how > the cookies are used in setjmp/_setjmp/sigsetjmp so that mixing > calls (e.g., longjmp on a _setjmp buffer) will scramble all three > registers and jump you to a random location on a random stack! > ok deraadt@ (guenther@) ~ hidden/rpcsvc/ypclnt.h ~ yp/yp_bind.c ~ yp/ypexclude.h > Stop publicly declaring _yp_dobind() and struct dom_binding, closing out > a rant Theo wrote 24 years ago. Mark __ypexclude_{add,is,free}() as hidden > "get off my lawn!" deraadt@ (guenther@) ~ stdlib/icdb.c > The icdb magic number doesn't need to be visible to static links > ok tedu@ (guenther@) ~ arch/arm/Symbols.list ~ arch/arm/sys/brk.S ~ arch/arm/sys/sbrk.S ~ arch/hppa/Symbols.list ~ arch/hppa/sys/brk.S ~ arch/hppa/sys/sbrk.S ~ arch/mips64/Symbols.list ~ arch/mips64/sys/brk.S ~ arch/mips64/sys/sbrk.S ~ arch/powerpc/Symbols.list ~ arch/powerpc/sys/brk.S ~ arch/powerpc/sys/sbrk.S ~ arch/sh/Symbols.list ~ arch/sh/sys/brk.S ~ arch/sh/sys/sbrk.S > Consistently reference '_end' instead of 'end' in the brk/sbrk > implementation > ok deraadt@ (guenther@) ~ sys/syscall.2 > We no longer have syscalls with multiple return values. Whine about > long long alignment instead. (guenther@) ~ sys/Makefile.inc > Move __getcwd from ASM to HIDDEN: we don't want the literal __getcwd symbol > ok millert@ deraadt@ (guenther@) libssl ~ src/crypto/evp/evp.h ~ src/crypto/evp/evp_enc.c ~ src/ssl/s3_srvr.c ~ src/ssl/t1_lib.c > deprecate internal use of EVP_[Cipher|Encrypt|Decrypt]_Final. > 14 years ago these were changed in OpenSSL to be the same > as the _ex functions. We use the _ex functions only internally > to ensure it is obvious the ctx must be cleared. > ok bcook@ (beck@) == regress =========================================================== 04/08 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/regress lib ~ libcrypto/engine/enginetest.c > Gix misleading indent pointed out by GCC 6.1. > ok beck@ jsing@ (bcook@) usr.bin ~ ssh/unittests/utf8/tests.c > Fix two rare edge cases: > 1. If vasprintf() returns < 0, do not access a NULL pointer in snmprintf(), > and do not free() the pointer returned from vasprintf() because on some > systems other than OpenBSD, it might be a bogus pointer. > 2. If vasprintf() returns == 0, return 0 and "" rather than -1 and NULL. > Besides, free(dst) is pointless after failure (not a bug). > One half OK martijn@, the other half OK deraadt@; > committing quickly before people get hurt. (schwarze@) ~ ssh/unittests/utf8/Makefile > stricter malloc.conf(5) options for utf8 tests (schwarze@) ~ sed/substitute.sh > Some tests for \<; will be fixed by martijn@'s upcoming commit to process.c > (schwarze@) == share ============================================================= 05/08 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/share man ~ man4/video.4 > Fix sequence for the mmap(2) method. > ok jmc (mglocker@) == sys =============================================================== 06/08 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys arch/amd64/amd64 ~ autoconf.c ~ cpu.c > include rdtsc in the rdrand callback. some systems don't have rdrand yet, > but rdtsc may provide a few bits. ok deraadt (tedu@) arch/octeon/dev ~ cn30xxpipreg.h ~ if_cnmac.c ~ if_cnmacvar.h > Fill the packet data pool with standard mbuf clusters instead of > driver-specific memory blocks. This lets the cnmac(4) RX path run > without an mbuf ext_free callback. > ok uebayasi@ (visa@) arch/octeon/include ~ octeonvar.h > Fill the packet data pool with standard mbuf clusters instead of > driver-specific memory blocks. This lets the cnmac(4) RX path run > without an mbuf ext_free callback. > ok uebayasi@ (visa@) dev/pci ~ ubsec.c > replace m_copym2 with m_dup_pkt. > ok mpi@ (dlg@) dev/wscons ~ wsmousevar.h > Do not forward declare an enum, makes gcc3 happy. > From miod@, ok bru@ (mpi@) kern ~ exec_elf.c ~ kern_exec.c > (deraadt@) ~ exec_elf.c ~ kern_exec.c > backout to insert correct commit message (deraadt@) ~ exec_elf.c ~ kern_exec.c > Identify W^X labelled binaries at execve() time based upon > WX_OPENBSD_WXNEEDED > flag set by ld -zwxneeded. Such binaries are allowed to run only on > wxallowed > mountpoints. They do not report mmap/mprotect problems. > Rate limit mmap/mprotect reports from other binaries. > These semantics are chosen to encourage progress in the ports ecosystem, > without overwhelming the developers who work in the area. > ok sthen kettenis (deraadt@) net ~ if_bridge.c > Insert a hack to deal with interfaces removing the VLAN header before > the packet has been feed to the pseudo-interfaces input handlers. > To fix that without introducing a layer violation we should be able to > disable HW-vlan on parent when in use with different pseudo-interfaces. > In the case of bridge(4) for example it makes no sense to let the interface > remove the VLAN header if the kernel has to add it back for every packet. > Fix issues reported by sebastia@ and markus@ > From dlg@, ok claudio@ (mpi@) ~ if_spppsubr.c ~ if_sppp.h ~ if_pppoe.c > Set pppoe(4) control frames to high (NC, "network control") > priority. This is translated into an 802.1p priority tag when > sent over a vlan interface, reducing the risk of them being > crowded out by data packets on a busy link. > Some users have problems with ISPs that place specific > requirements on vlan priority (typically the packet header > value must be '0', relating to priority 1). This diff > doesn't fix that yet, but gives a single place to patch > to change tags on control packets without affecting > normal vlan priority operation on other interfaces. > ok mikeb. (sthen@) netinet ~ ip_carp.c > Insert a hack to deal with interfaces removing the VLAN header before > the packet has been feed to the pseudo-interfaces input handlers. > To fix that without introducing a layer violation we should be able to > disable HW-vlan on parent when in use with different pseudo-interfaces. > In the case of bridge(4) for example it makes no sense to let the interface > remove the VLAN header if the kernel has to add it back for every packet. > Fix issues reported by sebastia@ and markus@ > From dlg@, ok claudio@ (mpi@) netinet6 ~ nd6.c ~ nd6.h > remove code compensating for the "short" range of timeouts. > the nd6 code for managing expiries is never asked to handle intervals > greater than what timeouts can handle, so we dont need to overcompensate. > the code was also incorrect by using a long, which isnt that long > on ILP32 machines. > ok mpi@ millert@ benno@ (dlg@) sys ~ exec.h ~ proc.h > (deraadt@) ~ exec.h ~ proc.h > backout to insert correct commit message (deraadt@) ~ exec.h ~ proc.h > Identify W^X labelled binaries at execve() time based upon > WX_OPENBSD_WXNEEDED > flag set by ld -zwxneeded. Such binaries are allowed to run only on > wxallowed > mountpoints. They do not report mmap/mprotect problems. > Rate limit mmap/mprotect reports from other binaries. > These semantics are chosen to encourage progress in the ports ecosystem, > without overwhelming the developers who work in the area. > ok sthen kettenis (deraadt@) uvm ~ uvm_mmap.c > (deraadt@) ~ uvm_mmap.c > backout to insert correct commit message (deraadt@) ~ uvm_mmap.c > Identify W^X labelled binaries at execve() time based upon > WX_OPENBSD_WXNEEDED > flag set by ld -zwxneeded. Such binaries are allowed to run only on > wxallowed > mountpoints. They do not report mmap/mprotect problems. > Rate limit mmap/mprotect reports from other binaries. > These semantics are chosen to encourage progress in the ports ecosystem, > without overwhelming the developers who work in the area. > ok sthen kettenis (deraadt@) == usr.bin =========================================================== 07/08 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin sed ~ process.c > Make sed use the new REG_STARTEND | REG_NOTBOL combination. This fixes a > begin > of word mismatch as reported by jsg@. > Discussed with otto@ and others early on, earlier version tested in ports > build > by aja@ > OK millert@ > Few readability tweaks and OK schwarze@ (martijn@) ssh ~ utf8.c > Fix two rare edge cases: > 1. If vasprintf() returns < 0, do not access a NULL pointer in snmprintf(), > and do not free() the pointer returned from vasprintf() because on some > systems other than OpenBSD, it might be a bogus pointer. > 2. If vasprintf() returns == 0, return 0 and "" rather than -1 and NULL. > Besides, free(dst) is pointless after failure (not a bug). > One half OK martijn@, the other half OK deraadt@; > committing quickly before people get hurt. (schwarze@) ~ utf8.c > Even when only writing an unescaped character, the dst buffer may need to > grow, or it would be overrun; issue found by tb@ with malloc.conf(5) 'C'. > While here, reserve an additional byte for the terminating NUL > up front such that we don't have to realloc() later just for that. > OK tb@ (schwarze@) ~ progressmeter.c > Backout rev. 1.43 for now. > The function update_progress_meter() calls refresh_progress_meter() > which calls snmprintf() which calls malloc(); but update_progress_meter() > acts as the SIGALRM signal handler. > "malloc(): error: recursive call" reported by sobrado@. (schwarze@) tmux ~ tty.c > Send two cub1 instead of using cub for moving the cursor two left. This > is normally better because using cub1 will be ^H^H (so two bytes) but > cub would be ^[[2D (four). (nicm@) ~ screen-write.c > Do not draw character to screen if it has not changed, and do not save > last character if it won't be used. This (and last few commits) prompted > by a report from Hubert depesz Lubaczewski. (nicm@) ~ cmd-set-option.c ~ tmux.h ~ tty.c ~ window.c > Cache the window styles and do not look up the window-style options > unless they have changed. (nicm@) == usr.sbin ========================================================== 08/08 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin smtpd ~ to.c > Simplify address parsing code by only using inet_net_pton(3). > There's no need to have a separate case for non-CIDR addresses using > inet_pton(3) as inet_net_pton(3) handles them as well. > This simplification is valid for all our daemons parsing addresses, > it is a common patern. > ok gilles@, millert@ (mpi@) =============================================================================== _______________________________________________ odc mailing list [email protected] http://www.squish.net/mailman/listinfo/odc
