CVS: cvs.openbsd.org: www

2025-10-02 Thread Alexander Bluhm
CVSROOT:/cvs Module name:www Changes by: bl...@cvs.openbsd.org 2025/09/28 16:44:27 Modified files: . : events.html Added files: papers : eurobsdcon2025-bluhm-protomp.pdf eurobsdcon2025-espie-dpb.pdf Log message: Ad

CVS: cvs.openbsd.org: www

2025-09-30 Thread Alexander Bluhm
CVSROOT:/cvs Module name:www Changes by: bl...@cvs.openbsd.org 2025/09/30 07:27:47 Modified files: . : errata76.html errata77.html Log message: Release expat and libcrypto errata.

CVS: cvs.openbsd.org: src

2025-09-28 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/09/28 16:22:54 Modified files: lib/libexpat : Tag: OPENBSD_7_7 Changes lib/libexpat/lib: Tag: OPENBSD_7_7 internal.h xmlparse.c lib/libexpat/tests: Tag: OPENBSD_7_7 nsalloc_tests.c L

CVS: cvs.openbsd.org: src

2025-09-25 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/09/25 13:05:10 Modified files: lib/libexpat : Changes README.md lib/libexpat/doc: reference.html lib/libexpat/lib: expat.h internal.h xmlparse.c xmlrole.h lib/libexpat/tests:

CVS: cvs.openbsd.org: src

2025-09-20 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/09/09 04:36:00 Modified files: sys/netinet6 : nd6.c Log message: Run ND6 timer at most once per second. I observed a constantly running nd6_timer() taking exclusive net lock. Problem is that routes,

CVS: cvs.openbsd.org: src

2025-09-17 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/09/17 16:50:08 Modified files: regress/sys/netinet/tcpstate: Makefile client.pl tcp_closing.py tcp_established.py tcp_finwait.py

CVS: cvs.openbsd.org: src

2025-09-17 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/09/12 17:02:36 Modified files: sys/netinet6 : nd6.c nd6.h Log message: Iterate over ND6 llinfo list without net lock. Make looping over llinfo list in nd6_timer() and nd6_purge() MP safe. Use an ite

CVS: cvs.openbsd.org: src

2025-09-17 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/09/17 11:23:00 Modified files: lib/libexpat : Changes README.md shlib_version lib/libexpat/doc: reference.html lib/libexpat/lib: expat.h expat_external.h internal.h xmlparse.c

CVS: cvs.openbsd.org: src

2025-09-17 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/09/17 11:29:14 Modified files: sys/netinet: tcp_timer.c Log message: Fix TCP keepalive intervals. In rev 1.82 2025/01/16 I messed up variables keepidle and keepintvl for TCP keepalive. Restore ori

CVS: cvs.openbsd.org: src

2025-09-16 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/09/16 11:29:35 Modified files: sys/netinet: tcp_input.c tcp_output.c tcp_var.h Log message: Retire TCP flag TF_BLOCKOUTPUT. Together with socket splicing the flag TF_BLOCKOUTPUT was introduced in 2

CVS: cvs.openbsd.org: src

2025-09-15 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/09/15 07:51:24 Modified files: sys/net: route.c Log message: Revert: Clear RTF_MPATH flag for cloned routes. In rev 1.449 the multipath flag was cleared for cloned routes to avoid a crash durin

CVS: cvs.openbsd.org: src

2025-09-14 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/09/14 14:47:33 Modified files: sys/netinet6 : nd6_nbr.c Log message: Fix use after free in ND6 DAD timer. In IPv6 neighbor discovery, the duplicate address detection code could trigger a use after fr

CVS: cvs.openbsd.org: src

2025-09-09 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/09/09 12:49:54 Modified files: regress/sys/netinet/tcpstate: Makefile README tcp_closing.py tcp_established.py tcp_finwait.py

CVS: cvs.openbsd.org: src

2025-09-09 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/09/09 03:16:18 Modified files: sys/kern : init_main.c sys/net: if.c if.h if_loop.c Log message: Limit softnet threads to number of CPU. Currently 8 softnet threads are always sta

CVS: cvs.openbsd.org: src

2025-09-02 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/09/02 05:39:13 Modified files: sys/netinet: if_ether.c Log message: In ARP timer iterate over llinfo list without net lock. Make looping over llinfo list in arptimer() MP safe. Use an iterator lik

CVS: cvs.openbsd.org: src

2025-08-13 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/08/13 07:00:29 Modified files: sys/net: route.c Log message: Clear RTF_MPATH flag for cloned routes. If two CPUs concurrently send to the same destination IP, both will call rtalloc_mpath() and

CVS: cvs.openbsd.org: src

2025-08-11 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/08/11 09:34:30 Modified files: sys/netinet: tcp_input.c Log message: Implement TCP SYN cache hash as inline function. Replace a bunch of nested macros to calculate the hash within TCP SYN cache wit

CVS: cvs.openbsd.org: src

2025-08-05 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/08/05 06:52:20 Modified files: sys/kern : kern_synch.c sys/sys: refcnt.h share/man/man9 : refcnt_init.9 rwlock.9 Log message: Document dt(4) tracing initializers for refc

CVS: cvs.openbsd.org: src

2025-08-04 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/08/04 15:50:59 Modified files: sys/netinet6 : nd6.c Log message: Convert nd6_timer_next from int to time_t. Coverity found that global variable nd6_timer_next stores time_t value and compares it with

CVS: cvs.openbsd.org: src

2025-08-04 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/08/04 15:25:10 Modified files: sys/net: route.c sys/netinet6 : nd6.c Log message: Pass down existing ifp pointer to nd6_free() and rtrequest_delete(). Coverity complained about usele

CVS: cvs.openbsd.org: src

2025-08-04 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/08/04 08:03:32 Modified files: sys/netinet: ip_ah.c Log message: Avoid unsigned comparison in AH parsing. The check (skip - sizeof(struct ip6_hdr) > 0) did not work as expected because it is done a

CVS: cvs.openbsd.org: src

2025-08-03 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/08/03 04:02:23 Modified files: sys/netinet6 : ip6_mroute.c Log message: Fix error handling in IPv6 multicast sysctl. Coverity figured out that error declaration shadows global error variable. Conseq

CVS: cvs.openbsd.org: src

2025-08-01 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/08/01 15:58:48 Modified files: regress/sys/netinet/tcpstate: Makefile README tcp_closing.py tcp_established.py tcp_finwait.py

CVS: cvs.openbsd.org: src

2025-08-01 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/08/01 07:35:37 Modified files: regress/sys/netinet/tcpstate: tcp_closing.py tcp_established.py tcp_finwait.py tcp_lastack.py t

CVS: cvs.openbsd.org: src

2025-08-01 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/08/01 05:10:00 Modified files: regress/sys/netinet/tcpstate: Makefile Added files: regress/sys/netinet/tcpstate: tcp_synsent.py Log message: Check that SYN packets are retransmitted in SYN_SENT

CVS: cvs.openbsd.org: src

2025-07-31 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/07/31 13:51:06 Modified files: regress/sys/net/pf_trans: Makefile Log message: Background snmpd(8) might keep /dev/pf open. Adjust expected pf(4) devices that can be opened by test.

CVS: cvs.openbsd.org: src

2025-07-31 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/07/31 09:07:59 Modified files: sys/dev/dt : dt_dev.c Log message: Fix sleeping race in dt(4) ioctl(2). Functions dt_ioctl_record_start() and dt_ioctl_record_stop() are protected by kernel lock. Th

CVS: cvs.openbsd.org: src

2025-07-24 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/07/24 17:30:04 Modified files: sys/kern : uipc_socket.c Log message: Use socket splicing macros consistently. No functional change. OK mvs@

CVS: cvs.openbsd.org: src

2025-07-23 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/07/23 14:18:04 Modified files: sys/kern : uipc_socket.c Log message: Protect the socket in the splice pointer by reference counting. It is cleaner to have proper reference counted pointer than te

CVS: cvs.openbsd.org: src

2025-07-21 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/07/21 15:15:05 Added files: share/btrace : ifaddrref.bt netlock.bt solock.bt Log message: btrace(8) script examples for ifaddr refcount tracking, exclusive netlock use, and socket lock contention.

CVS: cvs.openbsd.org: src

2025-07-21 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/07/21 14:36:41 Modified files: sys/dev/dt : dt_prov_static.c sys/kern : kern_rwlock.c subr_pool.c uipc_socket.c sys/net: if.c sys/sys: rwlock.h Log m

CVS: cvs.openbsd.org: src

2025-07-18 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/07/18 09:44:44 Modified files: sys/net: if.c Log message: Increase softnet kernel threads from 4 to 8. After unlocking the hot path of the IP/UDP/TCP network stack, increase the number of softn

CVS: cvs.openbsd.org: src

2025-07-15 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/07/15 06:52:52 Modified files: sys/kern : uipc_socket.c Log message: Use shared netlock and socket lock for closing sockets. Functions soclose() and sofree() do not need exclusive netlock anymore

CVS: cvs.openbsd.org: src

2025-07-14 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/07/14 16:14:20 Modified files: sys/arch/amd64/amd64: ghcb.c Log message: SEV-ES guest: Fix GHCB trap frame synchronisation for 32-bit values. In 64-bit mode, when performing 32-bit operations with a GP

CVS: cvs.openbsd.org: src

2025-07-14 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/07/14 15:53:46 Modified files: sys/netinet: in_pcb.c Log message: Remove outdated comment about netlock in in_pcbdetach().

CVS: cvs.openbsd.org: src

2025-07-14 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/07/14 15:47:26 Modified files: sys/kern : uipc_socket2.c Log message: Unlock shared netlock before socket lock. solock_shared() takes both, first shared netlock and then socket lock. When unlock

CVS: cvs.openbsd.org: src

2025-07-13 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/07/13 14:06:54 Modified files: sys/arch/amd64/amd64: machdep.c Log message: AMD SEV-ES guest: Claim early GHCB pages only when used. Only claim the two early GHCB pages when we are actually running as

CVS: cvs.openbsd.org: src

2025-07-11 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/07/11 14:04:20 Modified files: sys/arch/amd64/amd64: trap.c vector.S Log message: AMD SEV-ES guest: In vctrap() allow only CPUID from userspace. CPUID is the only instruction we allow to raise a #VC ex

CVS: cvs.openbsd.org: src

2025-07-02 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/07/02 15:28:46 Modified files: sys/arch/amd64/amd64: trap.c Log message: In AMD SEV-ES guest #VC trap asserts interrupts are disabled. Instead of disabling interrupts again, use kassert to verify that

CVS: cvs.openbsd.org: src

2025-06-30 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/30 07:27:28 Modified files: sys/arch/amd64/amd64: trap.c Log message: AMD SEV-ES guest handles CPUID, IOIO, MSR during VC# trap. Fill in the handling of cpuid, in/out and rdmsr/wrmsr. For in/out an

CVS: cvs.openbsd.org: www

2025-06-30 Thread Alexander Bluhm
CVSROOT:/cvs Module name:www Changes by: bl...@cvs.openbsd.org 2025/06/30 06:42:52 Modified files: . : errata76.html errata77.html Log message: Release xserver and pledge errata.

CVS: cvs.openbsd.org: src

2025-06-29 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/29 07:58:43 Modified files: sys/kern : Tag: OPENBSD_7_7 kern_pledge.c Log message: Avoid NULL pointer dereference when TIOCUCNTL ioctl is called with a non-file argument. from jsg@; feedback a

CVS: cvs.openbsd.org: src

2025-06-29 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/29 07:58:25 Modified files: sys/kern : Tag: OPENBSD_7_6 kern_pledge.c Log message: Avoid NULL pointer dereference when TIOCUCNTL ioctl is called with a non-file argument. from jsg@; feedback a

CVS: cvs.openbsd.org: xenocara

2025-06-29 Thread Alexander Bluhm
CVSROOT:/cvs Module name:xenocara Changes by: bl...@cvs.openbsd.org 2025/06/29 07:55:09 Modified files: xserver/os : Tag: OPENBSD_7_7 io.c Log message: Check for integer overflow on BigRequest length. Related to CVE-2025-49176. from matthieu@ this is errata/7.7/00

CVS: cvs.openbsd.org: xenocara

2025-06-29 Thread Alexander Bluhm
CVSROOT:/cvs Module name:xenocara Changes by: bl...@cvs.openbsd.org 2025/06/29 07:54:36 Modified files: xserver/os : Tag: OPENBSD_7_6 io.c Log message: Check for integer overflow on BigRequest length. Related to CVE-2025-49176. from matthieu@ this is errata/7.6/02

CVS: cvs.openbsd.org: src

2025-06-29 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/29 03:31:47 Modified files: sys/arch/amd64/amd64: vector.S Log message: Install final #VC trap handler for AMD SEV-ES guests. As OUT instructions are used to ack, mask and unmask interrupts in the P

CVS: cvs.openbsd.org: src

2025-06-27 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/27 11:23:49 Modified files: sys/arch/amd64/amd64: ghcb.c locore0.S machdep.c trap.c vector.S sys/arch/amd64/include: cpufunc.h ghcb.h segments.h Log message: Allocate GHCB and handle #VC tra

CVS: cvs.openbsd.org: src

2025-06-26 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/26 15:46:40 Modified files: sys/netinet: tcp_usrreq.c Log message: Fix TCP netstat counter. In my previous commit I forgot an ASSIGN() in tcp_sysctl_tcpstat(). Then the counter index was not inc

CVS: cvs.openbsd.org: src

2025-06-26 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/26 13:10:13 Modified files: usr.sbin/syslogd: syslogd.c Log message: Ensure that syslogd(8) runs TLS handshake callback. It could happen that the logging client triggered the TLS read callback befor

CVS: cvs.openbsd.org: src

2025-06-26 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/26 06:38:35 Modified files: sys/arch/amd64/amd64: locore0.S Log message: Also for AMD SEV-ES a lfence after ret is needed to mitigate spectre. from hshoexer@; OK mlarkin@

CVS: cvs.openbsd.org: src

2025-06-26 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/26 06:17:27 Modified files: sys/arch/amd64/amd64: identcpu.c locore0.S sys/arch/amd64/include: specialreg.h Log message: Show SEV or SEV-ES guestmode in dmesg when running with AMD SEV. fro

CVS: cvs.openbsd.org: src

2025-06-25 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/25 03:43:23 Modified files: usr.sbin/syslogd: syslogd.c Log message: Fix memleak in syslogd(8) when client aborts TLS connection. In the callback tcp_closecb() the TLS context was not freed. This h

CVS: cvs.openbsd.org: src

2025-06-23 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/23 12:18:59 Modified files: distrib/sets/lists/comp: mi Log message: sync ip6_divert.h

CVS: cvs.openbsd.org: src

2025-06-23 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/23 10:49:40 Modified files: usr.sbin/vmd : loadfile_elf.c Log message: Setup long mode code segment for AMD SEV-ES guests in vmd(8). vmd(8) starts kernel image in 32 bit compatibility mode. Howev

CVS: cvs.openbsd.org: src

2025-06-23 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/23 07:33:32 Modified files: sys/netinet6 : in6_proto.c Log message: Mark IPv6 route6 and dest6 input MP-safe. Both functions dest6_input() and route6_input() for IPv6 destination options and routi

CVS: cvs.openbsd.org: src

2025-06-23 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/23 06:05:46 Modified files: sys/net: pf.c sys/netinet: ip_divert.c ip_divert.h sys/netinet6 : in6_proto.c ip6_divert.c Removed files: sys/netinet6 : ip6_diver

CVS: cvs.openbsd.org: src

2025-06-23 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/23 05:33:39 Modified files: sys/arch/amd64/amd64: locore0.S sys/arch/amd64/include: ghcb.h trap.h vmmvar.h Log message: In locore0 handle #VC trap for AMD SEV-ES guest. When locore is execu

CVS: cvs.openbsd.org: src

2025-06-22 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/22 05:34:40 Modified files: sys/kern : kern_sysctl.c uipc_mbuf.c uipc_mbuf2.c sys/sys: mbuf.h usr.bin/netstat: mbuf.c Log message: Protect mbuf statistics counter with

CVS: cvs.openbsd.org: src

2025-06-21 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/21 16:08:44 Modified files: sys/netinet6 : in6_proto.c ip6_divert.c ip6_divert.h sbin/sysctl: sysctl.c usr.bin/netstat: inet6.c main.c netstat.h Log message: Remove specific d

CVS: cvs.openbsd.org: src

2025-06-21 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/21 14:19:25 Modified files: sys/dev/pci: pcidevs.h pcidevs_data.h Log message: regen

CVS: cvs.openbsd.org: src

2025-06-21 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/21 14:17:35 Modified files: sys/dev/pci: pcidevs Log message: Add PCI Id for 100 GBit E810 ice(4) network interface. Call devices E810-C and E810-XXV for consistency with Linux and FreeBSD. inpu

CVS: cvs.openbsd.org: src

2025-06-20 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/20 08:34:34 Modified files: sys/kern : uipc_syscalls.c Log message: Switch solisten() from exclusive to shared netlock. UNIX streams already use per socket lock. tcp_listen() is MP safe. Run

CVS: cvs.openbsd.org: src

2025-06-20 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/20 07:54:59 Modified files: sys/kern : kern_synch.c Log message: Assert that reference count is always positive. Refcnt objects are always initialized to 1. When the counter drops to 0, the r

CVS: cvs.openbsd.org: src

2025-06-18 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/18 11:45:07 Modified files: sys/netinet: ip_divert.h sys/netinet6 : ip6_divert.c ip6_divert.h Log message: Remove sysctl for divert6 recv and send space. UDP has a common sysctl for r

CVS: cvs.openbsd.org: src

2025-06-18 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/18 10:15:46 Modified files: sys/netinet: tcp_input.c tcp_var.h udp_usrreq.c usr.bin/netstat: inet.c Log message: Handle sockets that are closing in parallel. After unlocking, sockets ma

CVS: cvs.openbsd.org: src

2025-06-17 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/17 10:16:13 Modified files: regress/sys/netinet/tcpstate: tcp_closing.py tcp_established.py tcp_finwait.py tcp_lastack.py Log message: Use variable REMOTE_SSH t

CVS: cvs.openbsd.org: www

2025-06-17 Thread Alexander Bluhm
CVSROOT:/cvs Module name:www Changes by: bl...@cvs.openbsd.org 2025/06/17 07:20:58 Modified files: . : errata76.html errata77.html Log message: Release pfsyncook, acme, xserver errata.

CVS: cvs.openbsd.org: xenocara

2025-06-17 Thread Alexander Bluhm
CVSROOT:/cvs Module name:xenocara Changes by: bl...@cvs.openbsd.org 2025/06/17 07:18:36 Modified files: xserver/dix: Tag: OPENBSD_7_7 dispatch.c xserver/hw/xfree86/modes: Tag: OPENBSD_7_7 xf86RandR12.c xserver/os : Tag: OPENBSD_7_7 io.c

CVS: cvs.openbsd.org: xenocara

2025-06-17 Thread Alexander Bluhm
CVSROOT:/cvs Module name:xenocara Changes by: bl...@cvs.openbsd.org 2025/06/17 07:16:43 Modified files: xserver/dix: Tag: OPENBSD_7_6 dispatch.c xserver/hw/xfree86/modes: Tag: OPENBSD_7_6 xf86RandR12.c xserver/os : Tag: OPENBSD_7_6 io.c

CVS: cvs.openbsd.org: src

2025-06-16 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/16 15:58:19 Modified files: regress/sys/netinet/tcpstate: Makefile tcp_closing.py tcp_lastack.py Added files: regress/sys/netinet/tcpstate: tcp_establish

CVS: cvs.openbsd.org: src

2025-06-16 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/16 16:08:38 Modified files: regress/sys/net/pf_state: challenge_ack.py Log message: Send reset packet to avoid dangling TCP state after test.

CVS: cvs.openbsd.org: src

2025-06-16 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/16 07:14:53 Modified files: regress/sys/net/pf_state: Makefile README beforegap_rst.py challenge_ack.py Added files: regress/sys/net/pf_state: lessseq_fin.py

CVS: cvs.openbsd.org: src

2025-06-15 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/15 06:46:45 Modified files: regress/sys/netinet6/frag6: frag6_queuelimit.py Log message: It seems that the time.sleep() call in python takes a little bit longer. As sending request fragments got slo

CVS: cvs.openbsd.org: src

2025-06-14 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/14 14:35:59 Modified files: regress/sys/netinet/frag: frag_queuelimit.py Log message: It seems that the time.sleep() call in python takes a little bit longer. As sending request fragments got slower

CVS: cvs.openbsd.org: src

2025-06-12 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/12 17:51:33 Modified files: regress/sys/netinet: Makefile Log message: Link regress tcpstate to build.

CVS: cvs.openbsd.org: src

2025-06-12 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/12 17:48:34 Log message: These regress tests use a local and remote machine. On remote machine inetd is providing services. Local machine runs scapy to navigate the remote TCP stack through the T

CVS: cvs.openbsd.org: src

2025-06-12 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/12 13:10:17 Modified files: sys/netinet: tcp_input.c Log message: Fix use-after-free of inpcb. In tcp_input.c rev 1.451 a socket leak was fixed which introduced a use-after-free of the inpcb. I

CVS: cvs.openbsd.org: src

2025-06-11 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/11 08:30:07 Modified files: sys/netinet: tcp_input.c Log message: Fix socket leak in TCP SYN cache. My socket reference counting commit tcp_input.c rev 1.450 has introduced a socket leak. This

CVS: cvs.openbsd.org: src

2025-06-10 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/10 12:21:49 Modified files: usr.sbin/acme-client: Tag: OPENBSD_7_7 netproc.c Log message: Handle "processing" status by retrying as the RFC suggests. Previously we would give up with "unhandled stat

CVS: cvs.openbsd.org: src

2025-06-10 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/10 12:20:38 Modified files: usr.sbin/acme-client: Tag: OPENBSD_7_6 netproc.c Log message: Handle "processing" status by retrying as the RFC suggests. Previously we would give up with "unhandled stat

CVS: cvs.openbsd.org: src

2025-06-10 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/10 12:17:39 Modified files: sys/net: Tag: OPENBSD_7_7 pf.c Log message: The counter for halfopen states should be manipulated using atomic_ops(9f). In current code the counter may underflow.

CVS: cvs.openbsd.org: src

2025-06-10 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/10 12:16:27 Modified files: sys/net: Tag: OPENBSD_7_6 pf.c Log message: The counter for halfopen states should be manipulated using atomic_ops(9f). In current code the counter may underflow.

CVS: cvs.openbsd.org: src

2025-06-08 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/08 11:06:19 Modified files: sys/netinet: in_pcb.h tcp_subr.c tcp_timer.c tcp_timer.h tcp_var.h Log message: Remove TCP timeout reaper. The TCP timeout reaper is no long

CVS: cvs.openbsd.org: src

2025-06-06 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/06 11:06:24 Modified files: sys/kern : kern_sysctl.c Log message: Add forgotten NET_UNLOCK_SHARED() in FILLINPTABLE(). My previous fix in rev 1.474 was incomplete. Also unlock the net lock in

CVS: cvs.openbsd.org: src

2025-06-06 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/06 07:13:37 Modified files: sys/netinet: ip_divert.c ip_divert.h sys/netinet6 : ip6_divert.c Log message: Simplify IP divert defines. Noone wants to override divert packet defines via

CVS: cvs.openbsd.org: src

2025-06-04 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/04 11:35:21 Modified files: sys/net: if_ethersubr.c Log message: Extract ether type after completing length check. It is cleaner to read ether_type from the mbuf data after ether_extract_hea

CVS: cvs.openbsd.org: src

2025-06-04 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/04 07:29:11 Modified files: sys/kern : kern_sysctl.c Log message: Fix whitespace.

CVS: cvs.openbsd.org: src

2025-06-04 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/04 07:06:51 Modified files: sys/kern : kern_sysctl.c Log message: Add forgotten mtx_enter() in FILLINPTABLE(). In commit rev 1.471 I have missed the continue path in the loop that needs to rel

CVS: cvs.openbsd.org: src

2025-06-04 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/04 06:37:00 Modified files: sys/netinet: ip_divert.c ip_divert.h sys/netinet6 : ip6_divert.c ip6_divert.h usr.bin/netstat: inet6.c Log message: Use struct divstat for both IPv

CVS: cvs.openbsd.org: src

2025-06-04 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/04 02:21:29 Modified files: usr.sbin/vmd : psp.c sev.c vm.c vmd.h Log message: Initial state encryption for AMD SEV-ES guests in vmd(8). For SEV-ES enabled guest, vmd sends the LAUNCH ENCRYPT STAT

CVS: cvs.openbsd.org: src

2025-06-03 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/03 14:46:31 Modified files: sys/kern : kern_sysctl.c Log message: Export TCP send congestion window also for IPv6. In sysctl fill_file() copy out TCP snd_cwnd also for inet6 case so netstat -B

CVS: cvs.openbsd.org: src

2025-06-03 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/03 14:13:42 Modified files: usr.sbin/vmd : parse.y psp.c sev.c vm.conf.5 vmd.h Log message: Add config option for vmd(8) to run guest in AMD SEV-ES mode. Introduce keyword "seves" for vm.conf(5) t

CVS: cvs.openbsd.org: src

2025-06-03 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/03 10:51:26 Modified files: sys/kern : kern_sysctl.c sys/netinet: in_pcb.c in_pcb.h tcp_input.c tcp_subr.c tcp_timer.c tcp_usrreq.c udp_usrreq.c sy

CVS: cvs.openbsd.org: src

2025-06-02 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/06/02 09:35:00 Modified files: regress/sys/netinet/tcpthread: Makefile Log message: Calculate number of sockets used by run-sock100 test depending on mbuf cluster limit. This way also smaller machines

CVS: cvs.openbsd.org: src

2025-05-30 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/05/30 07:08:07 Modified files: sys/net: pf.c Log message: pf(4) allows TCP RST packets in the backwards window if ACK matches. TCP reset packets are generated for the sequence numbers that have

CVS: cvs.openbsd.org: src

2025-05-28 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/05/28 05:08:25 Modified files: sys/arch/amd64/amd64: vmm_machdep.c Log message: Handle AMD SEV-ES GHCB MSR protocol for guest termination in vmm(4). Another service requested by a SEV-ES enabled guest

CVS: cvs.openbsd.org: src

2025-05-28 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/05/28 01:59:05 Modified files: sys/arch/amd64/amd64: vmm_machdep.c sys/arch/amd64/include: ghcb.h Log message: Handle AMD SEV-ES GHCB MSR protocol for CPUID in vmm(4). When a SEV-ES guest is i

CVS: cvs.openbsd.org: src

2025-05-27 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/05/27 07:27:20 Modified files: sys/arch/amd64/amd64: vmm_machdep.c Log message: Fix whitespace, makes it easier to apply diffs.

CVS: cvs.openbsd.org: src

2025-05-27 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/05/27 02:13:42 Modified files: sys/arch/amd64/amd64: vmm_machdep.c Log message: Handle IOIO for AMD SEV-ES VMGEXIT in vmm(4). Fill in the actual handler for IOIO related GEXIT. The actual "in" or "out

CVS: cvs.openbsd.org: src

2025-05-27 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2025/05/27 01:52:49 Modified files: sys/kern : uipc_mbuf2.c sys/netinet: ip6.h tcp_input.c udp_usrreq.c sys/netinet6 : dest6.c frag6.c icmp6.c ip6_input.c mld6.c

  1   2   3   4   5   6   7   8   9   10   >