CVS: cvs.openbsd.org: src

2024-01-09 Thread Jason McIntyre
CVSROOT:/cvs
Module name:src
Changes by: j...@cvs.openbsd.org2024/01/09 23:33:13

Modified files:
usr.bin/ssh: ssh_config.5 sshd_config.5 

Log message:
fix incorrect capitalisation;



CVS: cvs.openbsd.org: src

2024-01-09 Thread Jonathan Matthew
CVSROOT:/cvs
Module name:src
Changes by: jmatt...@cvs.openbsd.org2024/01/09 22:06:00

Modified files:
sys/dev/pci: if_bnxt.c 

Log message:
If bringing up a queue fails, only tear down the ones that we set up
successfully, rather than trying to tear them all down and crashing.

tested by hrvoje, who can make queue setup fail sometimes
ok bluhm@



CVS: cvs.openbsd.org: src

2024-01-09 Thread Scott Soule Cheloha
CVSROOT:/cvs
Module name:src
Changes by: chel...@cvs.openbsd.org 2024/01/09 21:28:43

Modified files:
lib/libc/thread: rthread_cond.c rthread_sync.c 

Log message:
pthread_cond_timedwait(3): accept negative absolute timeouts

Negative absolute timeouts are valid inputs.

With input from kettenis@.

Thread: https://marc.info/?l=openbsd-tech&m=170467558006767&w=2

ok guenther@



CVS: cvs.openbsd.org: src

2024-01-09 Thread Dave Voutila
CVSROOT:/cvs
Module name:src
Changes by: d...@cvs.openbsd.org2024/01/09 21:13:59

Modified files:
usr.sbin/vmd   : vm.c 
sys/arch/amd64/amd64: vmm_machdep.c 
sys/arch/amd64/include: vmmvar.h 

Log message:
vmm/vmd: add io instruction length to exit information.

Add the instruction length to the vm exit information to allower
vmd(8) to manipulate the instruction pointer after io emulation.
This is preparation for emulating string-based io instructions.

Removes the instruction pointer update from the kernel (vmm(4)) as
well as the instruction length checks, which were overly restrictive
anyways based on the way prefixes work in x86 instructions.

ok mlarkin@



CVS: cvs.openbsd.org: src

2024-01-09 Thread Damien Miller
CVSROOT:/cvs
Module name:src
Changes by: d...@cvs.openbsd.org2024/01/09 15:19:36

Modified files:
regress/usr.bin/ssh: channel-timeout.sh 

Log message:
extend ChannelTimeout regression test to exercise multiplexed connections
and the new "global" timeout type. ok dtucker@



CVS: cvs.openbsd.org: src

2024-01-09 Thread Damien Miller
CVSROOT:/cvs
Module name:src
Changes by: d...@cvs.openbsd.org2024/01/09 15:19:00

Modified files:
usr.bin/ssh: channels.c ssh_config.5 sshd_config.5 

Log message:
add a "global" ChannelTimeout type to ssh(1) and sshd(8) that watches
all open channels and will close all open channels if there is no
traffic on any of them for the specified interval. This is in addition
to the existing per-channel timeouts added a few releases ago.

This supports use-cases like having a session + x11 forwarding channel
open where one may be idle for an extended period but the other is
actively used. The global timeout would allow closing both channels when
both have been idle for too long.

ok dtucker@



CVS: cvs.openbsd.org: src

2024-01-09 Thread Damien Miller
CVSROOT:/cvs
Module name:src
Changes by: d...@cvs.openbsd.org2024/01/09 14:39:14

Modified files:
usr.bin/ssh: ssh_api.c 

Log message:
adapt ssh_api.c code for kex-strict

from markus@ ok me



CVS: cvs.openbsd.org: src

2024-01-09 Thread Alexander Bluhm
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org   2024/01/09 12:57:01

Modified files:
sys/netinet: in_pcb.c in_pcb.h 
sys/netinet6   : in6_pcb.c in6_src.c 

Log message:
Convert some struct inpcb parameter to const pointer.

OK millert@



CVS: cvs.openbsd.org: src

2024-01-09 Thread Claudio Jeker
CVSROOT:/cvs
Module name:src
Changes by: clau...@cvs.openbsd.org 2024/01/09 08:13:49

Modified files:
usr.sbin/bgpd  : rtr_proto.c 

Log message:
The End of Data PDU changed between v0 (RFC6810) and v1 (RFC8210).

Add struct rtr_endofdata_v0 and rtr_parse_end_of_data_v0() to handle this
oddity. With this bgpd supports RFC6810 and RFC8210 and some form of
draft-ietf-sidrops-8210bis

OK tb@



CVS: cvs.openbsd.org: src

2024-01-09 Thread Claudio Jeker
CVSROOT:/cvs
Module name:src
Changes by: clau...@cvs.openbsd.org 2024/01/09 07:43:41

Modified files:
usr.sbin/bgpd  : rtr_proto.c 

Log message:
rtr_parse_notify() state check is special since we ignore the PDU when
it arrives in a strange moment. The RFC is as helpful about this as one
could expect. Still I botched the state check and later added an
rtr_send_error() call which made the previous worse.
OK tb@



CVS: cvs.openbsd.org: src

2024-01-09 Thread Claudio Jeker
CVSROOT:/cvs
Module name:src
Changes by: clau...@cvs.openbsd.org 2024/01/09 07:15:15

Modified files:
usr.sbin/bgpd  : rtr_proto.c 

Log message:
Be more consistent with RTR parse error reporting.

Stop calling rtr_send_error() after a parse error in rtr_process_msg();
instead move the calls into the parse functions.
Use consistend and useful error text to most rtr_send_error() calls.
In parse header also check the minimal version for router key and ASPA pdus
before checking their length.

OK tb@



CVS: cvs.openbsd.org: src

2024-01-09 Thread Claudio Jeker
CVSROOT:/cvs
Module name:src
Changes by: clau...@cvs.openbsd.org 2024/01/09 06:41:32

Modified files:
usr.sbin/bgpd  : bgpd.c kroute.c 

Log message:
Convert the parent process imsg handling over to the new imsg API.

This simplifies the code a fair bit and removes direct unchecked memory
access to imsg.data.
OK tb@