CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: an...@cvs.openbsd.org 2020/12/02 00:00:42 Modified files: share/man/man4 : dt.4 Log message: Bring back cross references now that all manuals are installed. ok jmc@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: a...@cvs.openbsd.org2020/12/01 18:47:53 Modified files: gnu/usr.bin/binutils/gdb: solib-svr4.c Log message: Fix a bug that GDB could not show the symbols of the core dump it was generated with the static linked ELF file. ok mpi@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: to...@cvs.openbsd.org 2020/12/01 15:43:30 Modified files: sbin/iked : pfkey.c Log message: Don't log ESRCH as warning.
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: st...@cvs.openbsd.org 2020/12/01 14:24:37 Modified files: faq: current.html Log message: update the iked "to dynamic" bits. old "0.0.0.0" does still work, it's "0.0.0.0/0" that does bad things.
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: st...@cvs.openbsd.org 2020/12/01 12:21:56 Modified files: faq: current.html Log message: iked.conf: if you were using "to 0.0.0.0" you may be interested in the new "to dynamic", as I discovered when I found a 0.0.0.0/0 to 0.0.0.0/0 flow while investigating why the network wasn't working too well on one of my vpn gateways after updating 6.8->current..
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: an...@cvs.openbsd.org 2020/12/01 11:47:26 Modified files: usr.sbin/btrace: bt_parse.y Log message: The print() function only accepts a single argument. ok mpi@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: flor...@cvs.openbsd.org 2020/12/01 11:10:27 Modified files: usr.sbin/rad : frontend.c Log message: Remove useless void cast annotation.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: flor...@cvs.openbsd.org 2020/12/01 11:08:54 Modified files: sbin/slaacd: frontend.c slaacd.c Log message: Sync get_ifrdomain() to rad(8) version by removing a useles (void) cast in front of a strlcpy(3). tb@ had pointed out that the use in rad(8) was not consistent. I consider the void cast a useless annotation, either the strl* functions must have the canonical trucation check or it must be obvious that truncation cannot happen or is not a problem. While at it remove a bunch more casts that snuck in over time.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: flor...@cvs.openbsd.org 2020/12/01 10:31:37 Modified files: usr.sbin/rad : frontend.c rad.c rad.h Log message: Let rad(8) handle all rdomains in a single daemon, similar to previous work in slaacd. Suggested / requested by tb who showed me previous work by reyk which unfortunately predated my work in slaacd and followed a different pattern to that done in slaacd. Testing & OK tb
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: t...@cvs.openbsd.org2020/12/01 10:02:45 Modified files: . : errata67.html errata68.html Log message: release xmaplen errata
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: mill...@cvs.openbsd.org 2020/12/01 09:19:38 Modified files: lib/libc/db/recno: rec_open.c Log message: Set type to DB_RECNO in __rec_open() for consistency with other db types. >From Boudewijn Dijkstra
CVS: cvs.openbsd.org: xenocara
CVSROOT:/cvs Module name:xenocara Changes by: bl...@cvs.openbsd.org 2020/12/01 08:37:43 Modified files: xserver/xkb: Tag: OPENBSD_6_7 xkb.c Log message: Fix XkbSetDeviceInfo() and SetDeviceIndicators() heap overflows ZDI-CAN 11389 / CVE-2020-25712 Fix from Jan-Niklas Sohn working with Trend Micro. Check SetMap request length carefully. Avoid out of bounds memory accesses on too short requests. ZDI-CAN 11572 / CVE-2020-14360 Reported by Jan-Niklas Sohn working with Trend Micro Zero Day Initiative from matthieu@ this is errata/6.7/030_xmaplen.patch.sig
CVS: cvs.openbsd.org: xenocara
CVSROOT:/cvs Module name:xenocara Changes by: bl...@cvs.openbsd.org 2020/12/01 08:36:45 Modified files: xserver/xkb: Tag: OPENBSD_6_8 xkb.c Log message: Fix XkbSetDeviceInfo() and SetDeviceIndicators() heap overflows ZDI-CAN 11389 / CVE-2020-25712 Fix from Jan-Niklas Sohn working with Trend Micro. Check SetMap request length carefully. Avoid out of bounds memory accesses on too short requests. ZDI-CAN 11572 / CVE-2020-14360 Reported by Jan-Niklas Sohn working with Trend Micro Zero Day Initiative from matthieu@ this is errata/6.8/007_xmaplen.patch.sig
CVS: cvs.openbsd.org: xenocara
CVSROOT:/cvs Module name:xenocara Changes by: matth...@cvs.openbsd.org2020/12/01 08:25:39 Modified files: xserver/xkb: xkb.c Log message: Check SetMap request length carefully. Avoid out of bounds memory accesses on too short requests. ZDI-CAN 11572 / CVE-2020-14360 Reported by Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
CVS: cvs.openbsd.org: xenocara
CVSROOT:/cvs Module name:xenocara Changes by: matth...@cvs.openbsd.org2020/12/01 08:21:28 Modified files: xserver/xkb: xkb.c Log message: Fix XkbSetDeviceInfo() and SetDeviceIndicators() heap overflows ZDI-CAN 11389 / CVE-2020-25712 Fix from Jan-Niklas Sohn working with Trend Micro.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2020/12/01 07:55:40 Modified files: sbin/dhclient : dhclient.c Log message: Extract another couple of chunks from main() into helper functions, get_routefd() and set_user().
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: m...@cvs.openbsd.org2020/12/01 06:56:22 Modified files: sys/uvm: uvm_extern.h uvm_page.c uvm_pmemrange.c uvmexp.h Log message: Turn uvm_pagealloc() mp-safe by checking uvmexp global with pageqlock held. Use a new flag, UVM_PLA_USERESERVE, to tell uvm_pmr_getpages() that using kernel reserved pages is allowed. Merge duplicated checks waking the pagedaemon to uvm_pmr_getpages(). Add two more pages to the amount reserved for the kernel to compensate the fact that the pagedaemon may now consume an additional page. Document locking of some uvmexp fields. ok kettenis@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: v...@cvs.openbsd.org2020/12/01 06:40:16 Modified files: sys/arch/loongson/conf: Makefile.loongson Log message: Add option to build loongson kernels using clang.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: v...@cvs.openbsd.org2020/12/01 06:30:13 Modified files: gnu/llvm/clang/include/clang/Driver: Options.td gnu/llvm/clang/lib/Driver/ToolChains: Clang.cpp gnu/llvm/llvm/lib/Target/Mips: Mips.h MipsTargetMachine.cpp gnu/llvm/llvm/lib/Target/Mips/AsmParser: MipsAsmParser.cpp gnu/llvm/llvm/lib/Target/Mips/MCTargetDesc: MipsABIInfo.cpp gnu/usr.bin/clang/libLLVMMipsCodeGen: Makefile Added files: gnu/llvm/llvm/lib/Target/Mips: MipsLoongson2FBTBFix.cpp Log message: Implement Loongson 2F BTB bug workaround in clang This adapts the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang. Because LLVM emits machine code directly without using assembly as intermediary form, the workaround has to be applied in the compiler backend in addition to the integrated assembler. Discussed with miod@ OK mortimer@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: st...@cvs.openbsd.org 2020/12/01 04:28:03 Modified files: sys/net: wg_noise.c Log message: bzero the antireplay counter rwlock before rw_init'ing it, not after. This was triggering a WITNESS detection witness: lock_object uninitialized: 0x80bcf0d8 Starting stack trace... witness_checkorder(80bcf0d8,9,0) at witness_checkorder+0xab rw_enter_write(80bcf0c8) at rw_enter_write+0x43 noise_remote_decrypt(80bcea48,c4992785,0,fd80073c89bc,10) at noise_remote_decrypt+0x135 wg_decap(8054a000,fd805f53ac00) at wg_decap+0xda wg_decap_worker(8054a000) at wg_decap_worker+0x7a taskq_thread(8012d900) at taskq_thread+0x9f alternating between two lock objects. From Matt Dunwoodie, thanks semarie@ for explanations about witness and looking at the code.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: n...@cvs.openbsd.org2020/12/01 03:48:03 Modified files: usr.bin/tmux : cmd-parse.y Log message: Leave newlines inside multiline quotes.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: n...@cvs.openbsd.org2020/12/01 01:12:58 Modified files: usr.bin/tmux : format-draw.c format.c options-table.c tmux.1 Log message: Make replacement of ##s consistent when drawing formats, whether followed by [ or not. Add a flag (e) to the q: format modifier to double up #s and use it for the window_flags format variable so it doesn't end up escaping any following text. GitHub issue 2485.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: t...@cvs.openbsd.org2020/12/01 01:05:06 Modified files: regress/lib/libssl/unit: ssl_methods.c Log message: Extend the methods test to cover dtls methods as well