CVSROOT:/cvs
Module name:www
Changes by: bl...@cvs.openbsd.org 2025/09/28 16:44:27
Modified files:
. : events.html
Added files:
papers : eurobsdcon2025-bluhm-protomp.pdf
eurobsdcon2025-espie-dpb.pdf
Log message:
Ad
CVSROOT:/cvs
Module name:www
Changes by: bl...@cvs.openbsd.org 2025/09/30 07:27:47
Modified files:
. : errata76.html errata77.html
Log message:
Release expat and libcrypto errata.
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/09/28 16:22:54
Modified files:
lib/libexpat : Tag: OPENBSD_7_7 Changes
lib/libexpat/lib: Tag: OPENBSD_7_7 internal.h xmlparse.c
lib/libexpat/tests: Tag: OPENBSD_7_7 nsalloc_tests.c
L
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/09/25 13:05:10
Modified files:
lib/libexpat : Changes README.md
lib/libexpat/doc: reference.html
lib/libexpat/lib: expat.h internal.h xmlparse.c xmlrole.h
lib/libexpat/tests:
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/09/09 04:36:00
Modified files:
sys/netinet6 : nd6.c
Log message:
Run ND6 timer at most once per second.
I observed a constantly running nd6_timer() taking exclusive net
lock. Problem is that routes,
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/09/17 16:50:08
Modified files:
regress/sys/netinet/tcpstate: Makefile client.pl tcp_closing.py
tcp_established.py tcp_finwait.py
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/09/12 17:02:36
Modified files:
sys/netinet6 : nd6.c nd6.h
Log message:
Iterate over ND6 llinfo list without net lock.
Make looping over llinfo list in nd6_timer() and nd6_purge() MP
safe. Use an ite
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/09/17 11:23:00
Modified files:
lib/libexpat : Changes README.md shlib_version
lib/libexpat/doc: reference.html
lib/libexpat/lib: expat.h expat_external.h internal.h xmlparse.c
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/09/17 11:29:14
Modified files:
sys/netinet: tcp_timer.c
Log message:
Fix TCP keepalive intervals.
In rev 1.82 2025/01/16 I messed up variables keepidle and keepintvl
for TCP keepalive. Restore ori
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/09/16 11:29:35
Modified files:
sys/netinet: tcp_input.c tcp_output.c tcp_var.h
Log message:
Retire TCP flag TF_BLOCKOUTPUT.
Together with socket splicing the flag TF_BLOCKOUTPUT was introduced
in 2
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/09/15 07:51:24
Modified files:
sys/net: route.c
Log message:
Revert: Clear RTF_MPATH flag for cloned routes.
In rev 1.449 the multipath flag was cleared for cloned routes to
avoid a crash durin
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/09/14 14:47:33
Modified files:
sys/netinet6 : nd6_nbr.c
Log message:
Fix use after free in ND6 DAD timer.
In IPv6 neighbor discovery, the duplicate address detection code
could trigger a use after fr
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/09/09 12:49:54
Modified files:
regress/sys/netinet/tcpstate: Makefile README tcp_closing.py
tcp_established.py tcp_finwait.py
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/09/09 03:16:18
Modified files:
sys/kern : init_main.c
sys/net: if.c if.h if_loop.c
Log message:
Limit softnet threads to number of CPU.
Currently 8 softnet threads are always sta
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/09/02 05:39:13
Modified files:
sys/netinet: if_ether.c
Log message:
In ARP timer iterate over llinfo list without net lock.
Make looping over llinfo list in arptimer() MP safe. Use an iterator
lik
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/08/13 07:00:29
Modified files:
sys/net: route.c
Log message:
Clear RTF_MPATH flag for cloned routes.
If two CPUs concurrently send to the same destination IP, both will
call rtalloc_mpath() and
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/08/11 09:34:30
Modified files:
sys/netinet: tcp_input.c
Log message:
Implement TCP SYN cache hash as inline function.
Replace a bunch of nested macros to calculate the hash within TCP
SYN cache wit
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/08/05 06:52:20
Modified files:
sys/kern : kern_synch.c
sys/sys: refcnt.h
share/man/man9 : refcnt_init.9 rwlock.9
Log message:
Document dt(4) tracing initializers for refc
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/08/04 15:50:59
Modified files:
sys/netinet6 : nd6.c
Log message:
Convert nd6_timer_next from int to time_t.
Coverity found that global variable nd6_timer_next stores time_t
value and compares it with
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/08/04 15:25:10
Modified files:
sys/net: route.c
sys/netinet6 : nd6.c
Log message:
Pass down existing ifp pointer to nd6_free() and rtrequest_delete().
Coverity complained about usele
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/08/04 08:03:32
Modified files:
sys/netinet: ip_ah.c
Log message:
Avoid unsigned comparison in AH parsing.
The check (skip - sizeof(struct ip6_hdr) > 0) did not work as
expected because it is done a
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/08/03 04:02:23
Modified files:
sys/netinet6 : ip6_mroute.c
Log message:
Fix error handling in IPv6 multicast sysctl.
Coverity figured out that error declaration shadows global error
variable. Conseq
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/08/01 15:58:48
Modified files:
regress/sys/netinet/tcpstate: Makefile README tcp_closing.py
tcp_established.py tcp_finwait.py
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/08/01 07:35:37
Modified files:
regress/sys/netinet/tcpstate: tcp_closing.py tcp_established.py
tcp_finwait.py tcp_lastack.py
t
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/08/01 05:10:00
Modified files:
regress/sys/netinet/tcpstate: Makefile
Added files:
regress/sys/netinet/tcpstate: tcp_synsent.py
Log message:
Check that SYN packets are retransmitted in SYN_SENT
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/07/31 13:51:06
Modified files:
regress/sys/net/pf_trans: Makefile
Log message:
Background snmpd(8) might keep /dev/pf open. Adjust expected pf(4)
devices that can be opened by test.
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/07/31 09:07:59
Modified files:
sys/dev/dt : dt_dev.c
Log message:
Fix sleeping race in dt(4) ioctl(2).
Functions dt_ioctl_record_start() and dt_ioctl_record_stop() are
protected by kernel lock. Th
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/07/24 17:30:04
Modified files:
sys/kern : uipc_socket.c
Log message:
Use socket splicing macros consistently. No functional change.
OK mvs@
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/07/23 14:18:04
Modified files:
sys/kern : uipc_socket.c
Log message:
Protect the socket in the splice pointer by reference counting.
It is cleaner to have proper reference counted pointer than te
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/07/21 15:15:05
Added files:
share/btrace : ifaddrref.bt netlock.bt solock.bt
Log message:
btrace(8) script examples for ifaddr refcount tracking, exclusive
netlock use, and socket lock contention.
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/07/21 14:36:41
Modified files:
sys/dev/dt : dt_prov_static.c
sys/kern : kern_rwlock.c subr_pool.c uipc_socket.c
sys/net: if.c
sys/sys: rwlock.h
Log m
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/07/18 09:44:44
Modified files:
sys/net: if.c
Log message:
Increase softnet kernel threads from 4 to 8.
After unlocking the hot path of the IP/UDP/TCP network stack,
increase the number of softn
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/07/15 06:52:52
Modified files:
sys/kern : uipc_socket.c
Log message:
Use shared netlock and socket lock for closing sockets.
Functions soclose() and sofree() do not need exclusive netlock
anymore
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/07/14 16:14:20
Modified files:
sys/arch/amd64/amd64: ghcb.c
Log message:
SEV-ES guest: Fix GHCB trap frame synchronisation for 32-bit values.
In 64-bit mode, when performing 32-bit operations with a GP
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/07/14 15:53:46
Modified files:
sys/netinet: in_pcb.c
Log message:
Remove outdated comment about netlock in in_pcbdetach().
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/07/14 15:47:26
Modified files:
sys/kern : uipc_socket2.c
Log message:
Unlock shared netlock before socket lock.
solock_shared() takes both, first shared netlock and then socket
lock. When unlock
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/07/13 14:06:54
Modified files:
sys/arch/amd64/amd64: machdep.c
Log message:
AMD SEV-ES guest: Claim early GHCB pages only when used.
Only claim the two early GHCB pages when we are actually running
as
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/07/11 14:04:20
Modified files:
sys/arch/amd64/amd64: trap.c vector.S
Log message:
AMD SEV-ES guest: In vctrap() allow only CPUID from userspace.
CPUID is the only instruction we allow to raise a #VC ex
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/07/02 15:28:46
Modified files:
sys/arch/amd64/amd64: trap.c
Log message:
In AMD SEV-ES guest #VC trap asserts interrupts are disabled.
Instead of disabling interrupts again, use kassert to verify that
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/30 07:27:28
Modified files:
sys/arch/amd64/amd64: trap.c
Log message:
AMD SEV-ES guest handles CPUID, IOIO, MSR during VC# trap.
Fill in the handling of cpuid, in/out and rdmsr/wrmsr. For in/out
an
CVSROOT:/cvs
Module name:www
Changes by: bl...@cvs.openbsd.org 2025/06/30 06:42:52
Modified files:
. : errata76.html errata77.html
Log message:
Release xserver and pledge errata.
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/29 07:58:43
Modified files:
sys/kern : Tag: OPENBSD_7_7 kern_pledge.c
Log message:
Avoid NULL pointer dereference when TIOCUCNTL ioctl is called with
a non-file argument.
from jsg@; feedback a
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/29 07:58:25
Modified files:
sys/kern : Tag: OPENBSD_7_6 kern_pledge.c
Log message:
Avoid NULL pointer dereference when TIOCUCNTL ioctl is called with
a non-file argument.
from jsg@; feedback a
CVSROOT:/cvs
Module name:xenocara
Changes by: bl...@cvs.openbsd.org 2025/06/29 07:55:09
Modified files:
xserver/os : Tag: OPENBSD_7_7 io.c
Log message:
Check for integer overflow on BigRequest length.
Related to CVE-2025-49176.
from matthieu@
this is errata/7.7/00
CVSROOT:/cvs
Module name:xenocara
Changes by: bl...@cvs.openbsd.org 2025/06/29 07:54:36
Modified files:
xserver/os : Tag: OPENBSD_7_6 io.c
Log message:
Check for integer overflow on BigRequest length.
Related to CVE-2025-49176.
from matthieu@
this is errata/7.6/02
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/29 03:31:47
Modified files:
sys/arch/amd64/amd64: vector.S
Log message:
Install final #VC trap handler for AMD SEV-ES guests.
As OUT instructions are used to ack, mask and unmask interrupts in
the P
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/27 11:23:49
Modified files:
sys/arch/amd64/amd64: ghcb.c locore0.S machdep.c trap.c vector.S
sys/arch/amd64/include: cpufunc.h ghcb.h segments.h
Log message:
Allocate GHCB and handle #VC tra
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/26 15:46:40
Modified files:
sys/netinet: tcp_usrreq.c
Log message:
Fix TCP netstat counter.
In my previous commit I forgot an ASSIGN() in tcp_sysctl_tcpstat().
Then the counter index was not inc
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/26 13:10:13
Modified files:
usr.sbin/syslogd: syslogd.c
Log message:
Ensure that syslogd(8) runs TLS handshake callback.
It could happen that the logging client triggered the TLS read
callback befor
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/26 06:38:35
Modified files:
sys/arch/amd64/amd64: locore0.S
Log message:
Also for AMD SEV-ES a lfence after ret is needed to mitigate spectre.
from hshoexer@; OK mlarkin@
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/26 06:17:27
Modified files:
sys/arch/amd64/amd64: identcpu.c locore0.S
sys/arch/amd64/include: specialreg.h
Log message:
Show SEV or SEV-ES guestmode in dmesg when running with AMD SEV.
fro
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/25 03:43:23
Modified files:
usr.sbin/syslogd: syslogd.c
Log message:
Fix memleak in syslogd(8) when client aborts TLS connection.
In the callback tcp_closecb() the TLS context was not freed. This
h
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/23 12:18:59
Modified files:
distrib/sets/lists/comp: mi
Log message:
sync ip6_divert.h
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/23 10:49:40
Modified files:
usr.sbin/vmd : loadfile_elf.c
Log message:
Setup long mode code segment for AMD SEV-ES guests in vmd(8).
vmd(8) starts kernel image in 32 bit compatibility mode. Howev
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/23 07:33:32
Modified files:
sys/netinet6 : in6_proto.c
Log message:
Mark IPv6 route6 and dest6 input MP-safe.
Both functions dest6_input() and route6_input() for IPv6 destination
options and routi
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/23 06:05:46
Modified files:
sys/net: pf.c
sys/netinet: ip_divert.c ip_divert.h
sys/netinet6 : in6_proto.c ip6_divert.c
Removed files:
sys/netinet6 : ip6_diver
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/23 05:33:39
Modified files:
sys/arch/amd64/amd64: locore0.S
sys/arch/amd64/include: ghcb.h trap.h vmmvar.h
Log message:
In locore0 handle #VC trap for AMD SEV-ES guest.
When locore is execu
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/22 05:34:40
Modified files:
sys/kern : kern_sysctl.c uipc_mbuf.c uipc_mbuf2.c
sys/sys: mbuf.h
usr.bin/netstat: mbuf.c
Log message:
Protect mbuf statistics counter with
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/21 16:08:44
Modified files:
sys/netinet6 : in6_proto.c ip6_divert.c ip6_divert.h
sbin/sysctl: sysctl.c
usr.bin/netstat: inet6.c main.c netstat.h
Log message:
Remove specific d
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/21 14:19:25
Modified files:
sys/dev/pci: pcidevs.h pcidevs_data.h
Log message:
regen
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/21 14:17:35
Modified files:
sys/dev/pci: pcidevs
Log message:
Add PCI Id for 100 GBit E810 ice(4) network interface. Call devices
E810-C and E810-XXV for consistency with Linux and FreeBSD.
inpu
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/20 08:34:34
Modified files:
sys/kern : uipc_syscalls.c
Log message:
Switch solisten() from exclusive to shared netlock.
UNIX streams already use per socket lock. tcp_listen() is MP safe.
Run
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/20 07:54:59
Modified files:
sys/kern : kern_synch.c
Log message:
Assert that reference count is always positive.
Refcnt objects are always initialized to 1. When the counter drops
to 0, the r
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/18 11:45:07
Modified files:
sys/netinet: ip_divert.h
sys/netinet6 : ip6_divert.c ip6_divert.h
Log message:
Remove sysctl for divert6 recv and send space.
UDP has a common sysctl for r
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/18 10:15:46
Modified files:
sys/netinet: tcp_input.c tcp_var.h udp_usrreq.c
usr.bin/netstat: inet.c
Log message:
Handle sockets that are closing in parallel.
After unlocking, sockets ma
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/17 10:16:13
Modified files:
regress/sys/netinet/tcpstate: tcp_closing.py tcp_established.py
tcp_finwait.py tcp_lastack.py
Log message:
Use variable REMOTE_SSH t
CVSROOT:/cvs
Module name:www
Changes by: bl...@cvs.openbsd.org 2025/06/17 07:20:58
Modified files:
. : errata76.html errata77.html
Log message:
Release pfsyncook, acme, xserver errata.
CVSROOT:/cvs
Module name:xenocara
Changes by: bl...@cvs.openbsd.org 2025/06/17 07:18:36
Modified files:
xserver/dix: Tag: OPENBSD_7_7 dispatch.c
xserver/hw/xfree86/modes: Tag: OPENBSD_7_7 xf86RandR12.c
xserver/os : Tag: OPENBSD_7_7 io.c
CVSROOT:/cvs
Module name:xenocara
Changes by: bl...@cvs.openbsd.org 2025/06/17 07:16:43
Modified files:
xserver/dix: Tag: OPENBSD_7_6 dispatch.c
xserver/hw/xfree86/modes: Tag: OPENBSD_7_6 xf86RandR12.c
xserver/os : Tag: OPENBSD_7_6 io.c
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/16 15:58:19
Modified files:
regress/sys/netinet/tcpstate: Makefile tcp_closing.py
tcp_lastack.py
Added files:
regress/sys/netinet/tcpstate: tcp_establish
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/16 16:08:38
Modified files:
regress/sys/net/pf_state: challenge_ack.py
Log message:
Send reset packet to avoid dangling TCP state after test.
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/16 07:14:53
Modified files:
regress/sys/net/pf_state: Makefile README beforegap_rst.py
challenge_ack.py
Added files:
regress/sys/net/pf_state: lessseq_fin.py
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/15 06:46:45
Modified files:
regress/sys/netinet6/frag6: frag6_queuelimit.py
Log message:
It seems that the time.sleep() call in python takes a little bit
longer. As sending request fragments got slo
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/14 14:35:59
Modified files:
regress/sys/netinet/frag: frag_queuelimit.py
Log message:
It seems that the time.sleep() call in python takes a little bit
longer. As sending request fragments got slower
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/12 17:51:33
Modified files:
regress/sys/netinet: Makefile
Log message:
Link regress tcpstate to build.
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/12 17:48:34
Log message:
These regress tests use a local and remote machine. On remote
machine inetd is providing services. Local machine runs scapy to
navigate the remote TCP stack through the T
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/12 13:10:17
Modified files:
sys/netinet: tcp_input.c
Log message:
Fix use-after-free of inpcb.
In tcp_input.c rev 1.451 a socket leak was fixed which introduced
a use-after-free of the inpcb. I
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/11 08:30:07
Modified files:
sys/netinet: tcp_input.c
Log message:
Fix socket leak in TCP SYN cache.
My socket reference counting commit tcp_input.c rev 1.450 has
introduced a socket leak. This
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/10 12:21:49
Modified files:
usr.sbin/acme-client: Tag: OPENBSD_7_7 netproc.c
Log message:
Handle "processing" status by retrying as the RFC suggests.
Previously we would give up with "unhandled stat
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/10 12:20:38
Modified files:
usr.sbin/acme-client: Tag: OPENBSD_7_6 netproc.c
Log message:
Handle "processing" status by retrying as the RFC suggests.
Previously we would give up with "unhandled stat
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/10 12:17:39
Modified files:
sys/net: Tag: OPENBSD_7_7 pf.c
Log message:
The counter for halfopen states should be manipulated using atomic_ops(9f).
In current code the counter may underflow.
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/10 12:16:27
Modified files:
sys/net: Tag: OPENBSD_7_6 pf.c
Log message:
The counter for halfopen states should be manipulated using atomic_ops(9f).
In current code the counter may underflow.
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/08 11:06:19
Modified files:
sys/netinet: in_pcb.h tcp_subr.c tcp_timer.c tcp_timer.h
tcp_var.h
Log message:
Remove TCP timeout reaper.
The TCP timeout reaper is no long
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/06 11:06:24
Modified files:
sys/kern : kern_sysctl.c
Log message:
Add forgotten NET_UNLOCK_SHARED() in FILLINPTABLE().
My previous fix in rev 1.474 was incomplete. Also unlock the net
lock in
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/06 07:13:37
Modified files:
sys/netinet: ip_divert.c ip_divert.h
sys/netinet6 : ip6_divert.c
Log message:
Simplify IP divert defines.
Noone wants to override divert packet defines via
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/04 11:35:21
Modified files:
sys/net: if_ethersubr.c
Log message:
Extract ether type after completing length check.
It is cleaner to read ether_type from the mbuf data after
ether_extract_hea
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/04 07:29:11
Modified files:
sys/kern : kern_sysctl.c
Log message:
Fix whitespace.
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/04 07:06:51
Modified files:
sys/kern : kern_sysctl.c
Log message:
Add forgotten mtx_enter() in FILLINPTABLE().
In commit rev 1.471 I have missed the continue path in the loop
that needs to rel
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/04 06:37:00
Modified files:
sys/netinet: ip_divert.c ip_divert.h
sys/netinet6 : ip6_divert.c ip6_divert.h
usr.bin/netstat: inet6.c
Log message:
Use struct divstat for both IPv
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/04 02:21:29
Modified files:
usr.sbin/vmd : psp.c sev.c vm.c vmd.h
Log message:
Initial state encryption for AMD SEV-ES guests in vmd(8).
For SEV-ES enabled guest, vmd sends the LAUNCH ENCRYPT STAT
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/03 14:46:31
Modified files:
sys/kern : kern_sysctl.c
Log message:
Export TCP send congestion window also for IPv6.
In sysctl fill_file() copy out TCP snd_cwnd also for inet6 case so
netstat -B
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/03 14:13:42
Modified files:
usr.sbin/vmd : parse.y psp.c sev.c vm.conf.5 vmd.h
Log message:
Add config option for vmd(8) to run guest in AMD SEV-ES mode.
Introduce keyword "seves" for vm.conf(5) t
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/03 10:51:26
Modified files:
sys/kern : kern_sysctl.c
sys/netinet: in_pcb.c in_pcb.h tcp_input.c tcp_subr.c
tcp_timer.c tcp_usrreq.c udp_usrreq.c
sy
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/06/02 09:35:00
Modified files:
regress/sys/netinet/tcpthread: Makefile
Log message:
Calculate number of sockets used by run-sock100 test depending on
mbuf cluster limit. This way also smaller machines
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/05/30 07:08:07
Modified files:
sys/net: pf.c
Log message:
pf(4) allows TCP RST packets in the backwards window if ACK matches.
TCP reset packets are generated for the sequence numbers that have
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/05/28 05:08:25
Modified files:
sys/arch/amd64/amd64: vmm_machdep.c
Log message:
Handle AMD SEV-ES GHCB MSR protocol for guest termination in vmm(4).
Another service requested by a SEV-ES enabled guest
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/05/28 01:59:05
Modified files:
sys/arch/amd64/amd64: vmm_machdep.c
sys/arch/amd64/include: ghcb.h
Log message:
Handle AMD SEV-ES GHCB MSR protocol for CPUID in vmm(4).
When a SEV-ES guest is i
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/05/27 07:27:20
Modified files:
sys/arch/amd64/amd64: vmm_machdep.c
Log message:
Fix whitespace, makes it easier to apply diffs.
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/05/27 02:13:42
Modified files:
sys/arch/amd64/amd64: vmm_machdep.c
Log message:
Handle IOIO for AMD SEV-ES VMGEXIT in vmm(4).
Fill in the actual handler for IOIO related GEXIT. The actual "in"
or "out
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org 2025/05/27 01:52:49
Modified files:
sys/kern : uipc_mbuf2.c
sys/netinet: ip6.h tcp_input.c udp_usrreq.c
sys/netinet6 : dest6.c frag6.c icmp6.c ip6_input.c mld6.c
1 - 100 of 1902 matches
Mail list logo