CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: n...@cvs.openbsd.org2022/04/14 00:59:29 Modified files: usr.bin/tmux : tmux.1 Log message: Fix clearphist alias, from Jacqueline Jolicoeur via jmc@.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2022/04/13 16:29:30 Modified files: sbin/fdisk : gpt.c Log message: Correct a gh_part_csum calculation used in debug output. Always calculate the GPT partition entries checksum over gh_part_num * gh_part_size bytes, not the maximal size of the internal partition entries array. No functional change.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: mill...@cvs.openbsd.org 2022/04/13 16:17:33 Modified files: lib/libc/net : inet_net_pton.c Log message: Fix typo in last commit.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: es...@cvs.openbsd.org 2022/04/13 15:22:40 Modified files: usr.sbin/pkg_add/OpenBSD: PackageLocation.pm PkgAdd.pm Log message: scaffolding from using the locate db that's now in quirks to avoid asking the network about updateinfo (not active yet, you need to uncomment some lines)
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: es...@cvs.openbsd.org 2022/04/13 15:20:23 Modified files: usr.sbin/pkg_add/OpenBSD: Add.pm UpdateSet.pm Log message: track ::Sample and ::Extra across an UpdateSet so that we may eventually give out more accurate diagnostic (soon !)
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: es...@cvs.openbsd.org 2022/04/13 15:19:16 Modified files: usr.sbin/pkg_add/OpenBSD: Paths.pm Log message: add Paths to the quirks locate db and the locate binary proper
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: dera...@cvs.openbsd.org 2022/04/13 14:54:55 Modified files: sbin/iked : types.h Log message: IKED_LIFETIME_BYTES is > 2GB, and potentially used in strange place, it should really be marked ULL ok bluhm tobhe
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: schwa...@cvs.openbsd.org2022/04/13 14:19:19 Modified files: usr.bin/mandoc : eqn.c eqn_parse.h regress/usr.bin/mandoc/eqn/define: infinite.in infinite.out_ascii infinite.out_lint Log message: To prevent infinite recursion while expanding eqn(7) definitions, we must not reset the recursion counter when moving beyond the end of the *previous* expansion, but we may only do so when moving beyond the rightmost position reached by *any* expansion in the current equation. This matters because definitions can nest; consider: .EQ define inner "content" define outer "inner outer" outer .EN This endless loop was found by tb@ using afl(1). Incidentally, GNU eqn(1) also performs an infinite loop in this situation and then crashes when memory runs out, but that's not an excuse for nasty behaviour of mandoc(1). While here, consistently print the expanded content even when the expansion is finally truncated. While that is not likely to help end-users, it may help authors of eqn(7) code to understand what's going on. Besides, it sends a very clear signal that something is amiss, which was easy to miss in the past unless people enabled -W error or used -T lint.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: es...@cvs.openbsd.org 2022/04/13 12:00:34 Modified files: share/man/man8 : afterboot.8 Log message: we're not 2000 anymore, direct the user to using binary packages, the ports tree should be about on par with release(8) okay schwarze@, sthen@
Re: CVS: cvs.openbsd.org: src
On Fri, Apr 08, 2022 at 07:49:43PM -0600, Dave Voutila wrote: > CVSROOT: /cvs > Module name: src > Changes by: d...@cvs.openbsd.org2022/04/08 19:49:43 > > Modified files: > sys/arch/amd64/amd64: vmm_support.S > > Log message: > Simplify vmx instruction error handling. > > Removes jumps and shortens the code while keeping functionality the > same. > > ok mlarkin@ This commit breaks vmm on my ThinkPad T430s. cpu1: failed to enter VMM mode cpu0: failed to enter VMM mode cpu0: Intel(R) Core(TM) i7-3520M CPU @ 2.90GHz, 2893.83 MHz, 06-3a-09 cpu0: FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,DS,ACPI,MMX,FXSR,SSE,SSE2,SS,HTT,TM,PBE,SSE3,PCLMUL,DTES64,MWAIT,DS-CPL,VMX,SMX,EST,TM2,SSSE3,CX16,xTPR,PDCM,PCID,SSE4.1,SSE4.2,x2APIC,POPCNT,DEADLINE,AES,XSAVE,AVX,F16C,RDRAND,NXE,RDTSCP,LONG,LAHF,PERF,ITSC,FSGSBASE,SMEP,ERMS,MD_CLEAR,IBRS,IBPB,STIBP,L1DF,SSBD,SENSOR,ARAT,XSAVEOPT,MELTDOWN cpu0: 256KB 64b/line 8-way L2 cache I think the problem is that XOR affects the zero flag. Does it? This diff fixes it. ok? bluhm Index: arch/amd64/amd64/vmm_support.S === RCS file: /data/mirror/openbsd/cvs/src/sys/arch/amd64/amd64/vmm_support.S,v retrieving revision 1.19 diff -u -p -r1.19 vmm_support.S --- arch/amd64/amd64/vmm_support.S 9 Apr 2022 01:49:43 - 1.19 +++ arch/amd64/amd64/vmm_support.S 13 Apr 2022 17:10:42 - @@ -62,8 +62,8 @@ _C_LABEL(vmm_dispatch_intr): _C_LABEL(vmxon): RETGUARD_SETUP(vmxon, r11) - vmxon (%rdi) xorq%rax, %rax + vmxon (%rdi) setna %al RETGUARD_CHECK(vmxon, r11) ret @@ -71,8 +71,8 @@ _C_LABEL(vmxon): _C_LABEL(vmxoff): RETGUARD_SETUP(vmxoff, r11) - vmxoff xorq%rax, %rax + vmxoff setna %al RETGUARD_CHECK(vmxoff, r11) ret @@ -80,8 +80,8 @@ _C_LABEL(vmxoff): _C_LABEL(vmclear): RETGUARD_SETUP(vmclear, r11) - vmclear (%rdi) xorq%rax, %rax + vmclear (%rdi) setna %al RETGUARD_CHECK(vmclear, r11) ret @@ -89,8 +89,8 @@ _C_LABEL(vmclear): _C_LABEL(vmptrld): RETGUARD_SETUP(vmptrld, r11) - vmptrld (%rdi) xorq%rax, %rax + vmptrld (%rdi) setna %al RETGUARD_CHECK(vmptrld, r11) ret @@ -98,8 +98,8 @@ _C_LABEL(vmptrld): _C_LABEL(vmptrst): RETGUARD_SETUP(vmptrst, r11) - vmptrst (%rdi) xorq%rax, %rax + vmptrst (%rdi) setna %al RETGUARD_CHECK(vmptrst, r11) ret @@ -107,8 +107,8 @@ _C_LABEL(vmptrst): _C_LABEL(vmwrite): RETGUARD_SETUP(vmwrite, r11) - vmwrite %rsi, %rdi xorq%rax, %rax + vmwrite %rsi, %rdi setna %al RETGUARD_CHECK(vmwrite, r11) ret @@ -116,8 +116,8 @@ _C_LABEL(vmwrite): _C_LABEL(vmread): RETGUARD_SETUP(vmread, r11) - vmread %rdi, (%rsi) xorq%rax, %rax + vmread %rdi, (%rsi) setna %al RETGUARD_CHECK(vmread, r11) ret
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: clau...@cvs.openbsd.org 2022/04/13 10:27:34 Modified files: openbgpd : ftp.html Log message: Regen
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: clau...@cvs.openbsd.org 2022/04/13 10:27:02 Modified files: build/mirrors : openbgpd-ftp.html.head Log message: Use correct year
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: clau...@cvs.openbsd.org 2022/04/13 10:24:13 Modified files: build : Makefile build/mirrors : openbgpd-ftp.html.head Log message: OpenBGPD 7.3 released
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: mill...@cvs.openbsd.org 2022/04/13 10:23:53 Modified files: lib/libc/gen : ftok.c Log message: ftok: avoid left shift of a signed in by 24 places Fix "left shift of 255 by 24 places cannot be represented in type 'int'" error from UBSAN. Adapted from a FreeBSD diff via tb@. OK tb@ deraadt@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: mill...@cvs.openbsd.org 2022/04/13 10:20:11 Modified files: lib/libc/net : inet_net_pton.c Log message: inet_net_pton_ipv6: avoid signed vs unsigned comparison Use a temporary variable to store the number of bytes to be copied (size_t) and also use it as the memcpy(3) length. Previously we copied "size" bytes instead of just the necessary number. OK claudio@ tb@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2022/04/13 09:32:33 Modified files: sbin/fdisk : gpt.c Log message: Correct a gh_csum calculation used in debug output. Always calculate the GPT header checksum over gh_size bytes (a.k.a. 92), not sizeof(struct gpt_header). Compilers in their wisdom may pad the struct to a nice round size, e.g. 96 bytes. No functional change.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2022/04/13 09:07:25 Modified files: sbin/fdisk : gpt.c Log message: Eliminate a couple of 'XXX' assumptions by calculating the actual number of sectors a given number of GPT partition entries require. No intentional functional change.
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: t...@cvs.openbsd.org2022/04/13 08:51:54 Modified files: . : 71.html Log message: condense libressl internal changes a bit more
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: t...@cvs.openbsd.org2022/04/13 08:44:35 Modified files: . : 71.html Log message: libressl: drop lists of added and removed API
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: schwa...@cvs.openbsd.org2022/04/13 08:37:34 Modified files: usr.bin/mandoc : man_macro.c regress/usr.bin/mandoc/man/TH: nobody.in nobody.out_ascii nobody.out_lint Log message: Do not die on an assertion if an input file contains no section whatsoever and ends with a broken next-line scope. Obviously, this cannot happen in a real manual page, but mandoc(1) should not die even when fed absurd input. This bug was independently reported by both jsg@ and tb@ who both found it with afl(1).
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: dera...@cvs.openbsd.org 2022/04/13 08:34:48 Modified files: . : 71.html Log message: libressl version, i think
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: dera...@cvs.openbsd.org 2022/04/13 08:34:10 Modified files: . : 71.html Log message: start removing editing comments
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: schwa...@cvs.openbsd.org2022/04/13 07:11:33 Modified files: usr.bin/mandoc : mandoc.c roff.c regress/usr.bin/mandoc/roff/esc: Makefile Added files: regress/usr.bin/mandoc/roff/esc: E1.in E1.out_ascii Log message: Surprisingly, groff supports multiple copy mode escapes at the beginning of an escape sequence: \, \E, \EE, \EEE, and so on all do the same outside copy mode, so let them do the same in mandoc(1), too. This fixes an assertion failure triggered by \EE*X that tb@ found with afl(1). The first E was consumed by roff_expand(), but that function failed to recognize the escape sequence as the expansion of a user-defined string and handed it over to mandoc_escape(), which consumed the second E and then died on an assertion because it is not prepared to handle user-defined strings. Fix this by letting *both* functions handly arbitrary numbers of 'E's correctly.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: to...@cvs.openbsd.org 2022/04/13 05:06:15 Modified files: sbin/iked : iked.conf.5 Log message: Document sntrup761x25519 key exchange.
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: schwa...@cvs.openbsd.org2022/04/13 04:26:47 Modified files: build : support.dat . : support.html Log message: update Duncan Hart's entry
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: st...@cvs.openbsd.org 2022/04/13 04:08:10 Modified files: sys/conf : param.c Log message: Use a simpler "formula" to decide a default kern.maxthread value; just 2*NPROCESS rather than NPROCESS+8*MAXUSERS. Results in a slightly higher maxthread value - the previous value was fairly likely to be exceeded on a system running a couple of heavily threaded processes. > previousnew > MAXUSERSNPROCESSmaxthread (2*NPROCESS) > 80 131019502620 > 64 105415662108 > 32 542 798 1084 ok kettenis@