CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: a...@cvs.openbsd.org2023/01/06 23:40:21 Modified files: share/man/man4 : pvbus.4 sys/dev/pv : hypervic.c pvbus.c pvvar.h vmt.c xenstore.c usr.sbin/hostctl: hostctl.c Log message: The maximum length of the value is extended to 64k bytes. ok yasuoka
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: guent...@cvs.openbsd.org2023/01/06 22:26:40 Modified files: usr.bin/kdump : kdump.c Log message: Add argument and return support for {get,set}thrname()
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: guent...@cvs.openbsd.org2023/01/06 22:25:40 Modified files: sys/kern : init_sysent.c syscalls.c sys/sys: syscall.h syscallargs.h Log message: regen
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: guent...@cvs.openbsd.org2023/01/06 22:24:59 Modified files: sys/kern : syscalls.master kern_exec.c kern_fork.c kern_pledge.c kern_prot.c sys/sys: proc.h sysctl.h include: unistd.h lib/libc : Symbols.list shlib_version lib/libc/sys : Makefile.inc lib/librthread : rthread_np.c shlib_version bin/ps : print.c usr.bin/top: machine.c Log message: Add {get,set}thrname(2) for putting thread names in the kernel and exposed in a new field returned by sysctl(KERN_PROC). Update pthread_{get,set}_name_np(3) to use the syscalls. Show them, when set, in ps -H and top -H output. libc and libpthread minor bumps ok mpi@, mvs@, deraadt@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2023/01/06 12:25:20 Modified files: regress/lib/libssl/tlsfuzzer: tlsfuzzer.py Log message: tlsfuzzer: hook up new connection abort tests while skipping the NST tests for TLSv1.3 since that's not currently handled.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: m...@cvs.openbsd.org2023/01/06 12:23:53 Modified files: sys/arch/arm/arm: undefined.c Log message: Use copyin32() to fetch a faulting instruction rather than short-circuit it with a comment saying that we really ought to use copyin* here.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: m...@cvs.openbsd.org2023/01/06 12:12:12 Removed files: sys/arch/powerpc/powerpc: copystr.c Log message: Oops, forgot to cvs rm
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: m...@cvs.openbsd.org2023/01/06 12:10:18 Modified files: share/man/man9 : copy.9 sys/arch/alpha/alpha: locore.s sys/arch/amd64/amd64: copy.S sys/arch/arm/arm: copystr.S sys/arch/arm64/arm64: copystr.S sys/arch/hppa/hppa: machdep.c sys/arch/i386/i386: locore.s sys/arch/m88k/m88k: m88k_machdep.c sys/arch/powerpc/conf: files.powerpc sys/arch/powerpc/powerpc: copystr.c sys/arch/riscv64/riscv64: copystr.S sys/arch/sh/sh : locore_c.c sys/arch/sparc64/sparc64: locore.s sys/sys: systm.h Log message: Remove copystr(9), unless used internally by copy{in,out}str.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: m...@cvs.openbsd.org2023/01/06 12:08:36 Modified files: sys/kern : vfs_lookup.c Log message: Replace last user of copystr() with strlcpy(). NFCI
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: m...@cvs.openbsd.org2023/01/06 12:07:17 Removed files: sys/arch/hppa/include: nvm.h Log message: Remove no longer needed and quite worthless header.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: m...@cvs.openbsd.org2023/01/06 12:05:46 Modified files: sys/arch/hppa/stand/libsa: pdc.c Log message: Remove unused local variables as well as the dependency on .
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: sas...@cvs.openbsd.org 2023/01/06 10:44:34 Modified files: sbin/pfctl : pfctl.c sys/net: pf.c pf_ioctl.c pfvar.h pfvar_priv.h Log message: PF_ANCHOR_STACK_MAX is insufficient protection against stack overflow. On amd64 stack overflows for anchor rule with depth ~30. The tricky thing is the 'safe' depth varies depending on kind of packet processed by pf_match_rule(). For example for local outbound TCP packet stack overflows when recursion if pf_match_rule() reaches depth 24. Instead of lowering PF_ANCHOR_STACK_MAX to 20 and hoping it will be enough on all platforms and for all packets I'd like to stop calling pf_match_rule() recursively. This commit brings back pf_anchor_stackframe array we used to have back in 2017. It also revives patrick@'s idea to pre-allocate stack frame arrays from per-cpu. OK kn@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2023/01/06 09:06:43 Modified files: usr.sbin/rpki-client: filemode.c main.c parser.c Log message: Rework the main <-> parser/filemode communication protocol a bit. Swap repo_id and filename to simplify the code in parser.c. In filemode both repo_id and filename are ignored. Additionally do not errx() in case of unknown file types. Instead send back enough info that the code can move on. OK tb@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2023/01/06 07:35:34 Modified files: sys/netinet6 : nd6.c nd6.h Log message: Clean up struct nd_opts, use nd6_options() function local variables nd_opts_search is really the next option, so call it next_opt. nd_opts_done == 1 means next_opt == NULL, i.e. no more option to handle, so zap the former and use the latter to stop. Finally drop the useless struct members, all under _KERNEL. OK claudio
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2023/01/06 07:32:55 Modified files: sys/netinet6 : nd6.c Log message: Inline nd6_option() helper, remove indirections Move the function body into the while loop, merge identical variables, pull the `invalid' label out of the loop and straighten `skip' into the `skip1' label. Merging nd6_option() into nd6_options() is now much clearer after the previous clean up. nd_opts_{search,last,done} are now clearly "private" to n6_options() and can be cleaned up from struct nd_opts next. OK claudio
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2023/01/06 07:29:47 Modified files: sys/netinet6 : nd6.c Log message: Clarify nd6_option() return semantics nd_opts_last is set only once in nd6_options() during struct init and guaranteed non-NULL as it is set to the function's argument *opt which is passed in as (struct_ptr + 1) in both callers. nd6_option(), the internal helper, returns a pointer to the next option or NULL, which means either "no option, ok" or "invalid option, fail". Failure is signaled through nd_opts_last being NULL after nd6_option() returned, which only happens if nd6_option() zeroed the whole *ndopts. Move the two cases under mnemonic labels and zap the now obviously redundant bzero() call in nd6_options(). OK claudio
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2023/01/06 07:24:36 Modified files: sys/netinet6 : nd6.c Log message: Simplify nd6_options() initialise logic nd_opts_{search,last,done} are exlusively used in the internal option handling machinery; the only two nd6_options() callers only use nd_opts_{src,tgt}_lladdr. nd6_options() always zeroes and initialises the caller's struct nd_opts. If icmp6len is zero, i.e. if there are no ICMP6 header options left, everything inside *ndopts is zero, except nd_opts_done=1 which is not used by the callers. Set the internal nd_opts_{search,last,done} members only when needed. OK claudio
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2023/01/06 07:17:15 Modified files: sys/netinet6 : nd6_nbr.c Log message: Merge common code into new nd6_dad_destroy() The current code wrt. stopping DAD for and removing a particular IP from the list is flawed. Introduce a single nd6_dad_destroy() to the cleanup, so that there's only one place to fix. This is just a mechanical deduplication without significant behaviour change; in case a duplicated address was found, RTM_CHGADDRATTR now goes out before cleanup, which should be no problem. The nd6_dad_create() pendant could be done as well, but the end of nd6_dad_start() is currently the only place where a new IP/DAD entry is set up, so little gain besides function name symmetry. OK claudio
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2023/01/06 06:26:57 Modified files: usr.sbin/bgpctl: ometric.c ometric.h Log message: sync with rpki-client 'more dastardly white spaces' commit
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: dera...@cvs.openbsd.org 2023/01/06 06:22:00 Modified files: usr.sbin/rpki-client: ometric.c ometric.h Log message: more dastardly white spaces
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2023/01/06 06:19:43 Modified files: usr.sbin/rpki-client: print.c Log message: Zap trailing tabs
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: dtuc...@cvs.openbsd.org 2023/01/06 05:33:33 Modified files: regress/usr.bin/ssh: percent.sh Log message: When OpenSSL is not available, skip parts of percent test that require it. Based on github pr#368 from ren mingshuai.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: dtuc...@cvs.openbsd.org 2023/01/06 01:50:33 Modified files: regress/usr.bin/ssh: dynamic-forward.sh Log message: Save debug logs from ssh for debugging purposes.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: j...@cvs.openbsd.org2023/01/06 01:44:11 Modified files: usr.bin/ssh: sshd_config.5 Log message: tweak previous; ok djm
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: d...@cvs.openbsd.org2023/01/06 01:07:39 Modified files: regress/usr.bin/ssh: Makefile Added files: regress/usr.bin/ssh: channel-timeout.sh Log message: regression test for ChannelTimeout