CVS: cvs.openbsd.org: src

2021-04-28 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/28 15:21:44 Modified files: sys/netinet: if_ether.c Log message: Use mq_delist() to fetch the ARP mbuf hold queue once and feed the mbuf list to if_output(). OK sashan@ mvs@

CVS: cvs.openbsd.org: src

2021-04-28 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/28 11:59:53 Modified files: regress/sys/kern: Makefile Added files: regress/sys/kern/fork-exit: Makefile fork-exit.c Log message: To hunt kernel bugs during exit, terminate processes simulta

CVS: cvs.openbsd.org: src

2021-04-28 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/28 11:58:16 src/regress/sys/kern/fork-exit Update of /cvs/src/regress/sys/kern/fork-exit In directory cvs.openbsd.org:/tmp/cvs-serv95176/fork-exit Log Message: Directory /cvs/src/regress/sys/kern/fork-exit a

CVS: cvs.openbsd.org: src

2021-04-28 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/28 05:32:59 Modified files: sys/conf : GENERIC sys/arch/amd64/conf: GENERIC sys/arch/arm64/conf: GENERIC sys/arch/i386/conf: GENERIC sys/arch/powerpc64/conf: G

CVS: cvs.openbsd.org: src

2021-04-28 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/28 04:33:34 Modified files: sys/netinet: if_ether.c Log message: Document the locking mechanism of the global variables in ARP code. The global list of ARP llinfo is protected by net lock. This

CVS: cvs.openbsd.org: src

2021-04-26 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/26 02:45:01 Modified files: regress/libexec/ftpd: Makefile Log message: Unset ftp_proxy to make test independent from environment.

CVS: cvs.openbsd.org: src

2021-04-26 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/26 01:55:16 Modified files: sys/netinet: if_ether.c Log message: Convert the ARP packet hold queue from mbuf list to mbuf queue which contins a mutex. Update la_hold_total with atomic operations

CVS: cvs.openbsd.org: src

2021-04-23 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/23 15:55:36 Modified files: sys/netinet: if_ether.c if_ether.h ip_input.c Log message: Setting variable arpinit_done is not MP save if we want to execute arp_rtrequest() in parallel. Move initia

CVS: cvs.openbsd.org: src

2021-04-23 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/23 15:47:32 Modified files: sys/netinet: if_ether.c ip_input.c Log message: The variable la_hold_total contains the number of packets currently in the arp queue. So the sysctl net.inet.ip.arpque

CVS: cvs.openbsd.org: src

2021-04-23 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/23 01:21:03 Modified files: sys/kern : kern_sysctl.c sys/dev/dt : dt_dev.c Log message: Remove the sysctl kern.allowdt code from kernel if dt(4) is not configured. This will resul

CVS: cvs.openbsd.org: src

2021-04-21 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/21 04:18:35 Modified files: regress/sys/net/pair: Makefile Log message: Check that path MTU discovery across routing domains inserts a dynamic IPv4 route. Add IPv6 test that runs tcpbench over pair

CVS: cvs.openbsd.org: src

2021-04-21 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/21 03:38:11 Modified files: usr.sbin/ntpd : client.c control.c Log message: Improve ntpd offset handling. Call the index of the offset loops "shift" consistently. Merge the two offset loops in cli

CVS: cvs.openbsd.org: src

2021-04-19 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/19 04:58:31 Modified files: regress/usr.sbin/syslogd: args-tls-cafile-default.pl Log message: Fix TLS error message race. Due to less handshakes in TLS 1.3 an EPIPE error may be reported instead of

CVS: cvs.openbsd.org: www

2021-04-17 Thread Alexander Bluhm
CVSROOT:/cvs Module name:www Changes by: bl...@cvs.openbsd.org 2021/04/17 13:05:45 Modified files: . : 69.html Log message: The TCP direct ACK every other data segment change has been backed out before release. Describe what the TCP maxburst limit change a

CVS: cvs.openbsd.org: src

2021-04-16 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/16 06:08:25 Modified files: sys/netinet: tcp_input.c Log message: Turn on the direct ACK on every other segment. This is a backout of rev 1.366 which turned this feature off. Although sending le

CVS: cvs.openbsd.org: src

2021-04-15 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/15 07:42:33 Modified files: usr.sbin/bgpd : parse.y regress/usr.sbin/bgpd/config: bgpd.conf.10.ok bgpd.conf.11.ok Log message: On powerpc64 regress/usr.sbin/bgpd/config failed. It parses a

CVS: cvs.openbsd.org: src

2021-04-14 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/14 13:34:56 Modified files: usr.sbin/tcpdump: print-wg.c Log message: On powerpc64 tcpdump(8) could not parse wireguard packets. EXTRACT_LE_32BITS() converts the type from little endian to host endia

CVS: cvs.openbsd.org: src

2021-04-14 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/14 06:32:56 Modified files: regress/sbin/slaacd: Slaacctl.py Log message: Rename privacy to temporary in slaacd regress, then it passes. OK florian@

CVS: cvs.openbsd.org: src

2021-04-13 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/04/13 12:50:46 Modified files: regress/usr.sbin/rpki-client/libressl: Makefile Log message: Automated regress cannot connect to servers in internet. Check whether jigsaw.w3.org is reachable and skip rp

CVS: cvs.openbsd.org: www

2021-04-13 Thread Alexander Bluhm
CVSROOT:/cvs Module name:www Changes by: bl...@cvs.openbsd.org 2021/04/13 08:38:25 Modified files: . : errata67.html errata68.html Log message: Release xi errata.

CVS: cvs.openbsd.org: xenocara

2021-04-13 Thread Alexander Bluhm
CVSROOT:/cvs Module name:xenocara Changes by: bl...@cvs.openbsd.org 2021/04/13 08:16:18 Modified files: xserver/Xi : Tag: OPENBSD_6_7 chgfctl.c Log message: Fix XChangeFeedbackControl() request underflow. CVE-2021-3472 / ZDI-CAN-1259 Reported by Jan-Niklas Sohn via

CVS: cvs.openbsd.org: xenocara

2021-04-13 Thread Alexander Bluhm
CVSROOT:/cvs Module name:xenocara Changes by: bl...@cvs.openbsd.org 2021/04/13 08:15:25 Modified files: xserver/Xi : Tag: OPENBSD_6_8 chgfctl.c Log message: Fix XChangeFeedbackControl() request underflow. CVE-2021-3472 / ZDI-CAN-1259 Reported by Jan-Niklas Sohn via

CVS: cvs.openbsd.org: src

2021-03-26 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/03/26 15:17:10 Modified files: sys/dev/dt : dt_dev.c Log message: Initialize error variable in dtread(). OK mpi@

CVS: cvs.openbsd.org: src

2021-03-24 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/03/24 08:26:39 Modified files: sys/arch/amd64/amd64: mem.c Log message: The logic in mmrw() to check whether an address is within direct map was the wrong way around. The && prevented an EFAULT error a

CVS: cvs.openbsd.org: src

2021-03-18 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/03/18 05:17:04 Modified files: usr.sbin/ntpd : constraint.c Log message: Remove duplicate prototype.

CVS: cvs.openbsd.org: src

2021-03-18 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/03/18 05:06:41 Modified files: usr.sbin/ntpd : client.c Log message: The ntpd client code corrects both T1 and T4 with the current offset returned by adjtime(2) from the kernel. T1 is local time when

CVS: cvs.openbsd.org: src

2021-03-09 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/03/09 08:16:28 Modified files: regress/usr.sbin/syslogd: Client.pm LICENSE Makefile Syslogd.pm args-dropped-filesystem.pl args-dropped

CVS: cvs.openbsd.org: src

2021-03-09 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/03/09 08:08:23 Modified files: sys/kern : subr_log.c sys/sys: malloc.h lib/libc/sys : sendsyslog.2 usr.sbin/syslogd: syslogd.c Log message: Early daemons like

CVS: cvs.openbsd.org: www

2021-03-08 Thread Alexander Bluhm
CVSROOT:/cvs Module name:www Changes by: bl...@cvs.openbsd.org 2021/03/08 14:20:44 Modified files: . : errata67.html errata68.html Log message: Release npppd errata.

CVS: cvs.openbsd.org: src

2021-03-08 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/03/08 14:19:43 Modified files: usr.sbin/npppd/pptp: Tag: OPENBSD_6_7 pptp_call.c pptp_ctrl.c Log message: Fix some heap over-read in logging in PPTP protocol handler. from yasuoka@ this is errata/6.7/0

CVS: cvs.openbsd.org: src

2021-03-08 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/03/08 14:18:55 Modified files: usr.sbin/npppd/pptp: Tag: OPENBSD_6_8 pptp_call.c pptp_ctrl.c Log message: Fix some heap over-read in logging in PPTP protocol handler. from yasuoka@ this is errata/6.8/0

CVS: cvs.openbsd.org: www

2021-03-03 Thread Alexander Bluhm
CVSROOT:/cvs Module name:www Changes by: bl...@cvs.openbsd.org 2021/03/03 10:57:59 Modified files: . : errata67.html errata68.html Log message: Release sshagent errata.

CVS: cvs.openbsd.org: src

2021-03-01 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/03/01 04:05:43 Modified files: sys/net: if_bridge.c pf.c pf_norm.c sys/netinet: ip_output.c ip_var.h sys/netinet6 : ip6_id.c ip6_output.c ip6_var.h Log message: Refactor

CVS: cvs.openbsd.org: www

2021-02-24 Thread Alexander Bluhm
CVSROOT:/cvs Module name:www Changes by: bl...@cvs.openbsd.org 2021/02/24 09:29:13 Modified files: . : errata67.html errata68.html Log message: Release pffrag errata.

CVS: cvs.openbsd.org: src

2021-02-24 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/24 09:25:35 Modified files: sys/net: Tag: OPENBSD_6_7 pf_norm.c Log message: When cutting of the head of an overlapping fragment during pf reassembly, reinsert the fragment into the lookup ta

CVS: cvs.openbsd.org: src

2021-02-24 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/24 09:23:33 Modified files: sys/net: Tag: OPENBSD_6_8 pf_norm.c Log message: When cutting of the head of an overlapping fragment during pf reassembly, reinsert the fragment into the lookup ta

CVS: cvs.openbsd.org: src

2021-02-24 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/24 06:19:48 Modified files: sys/kern : uipc_socket.c Log message: In sorflush() use m_purge() instead of handrolling it. no objections mvs@

CVS: cvs.openbsd.org: src

2021-02-23 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/23 05:14:10 Modified files: sys/netinet: ip_output.c Log message: As ip_insertoptions() may prepend a mbuf, "goto bad" has to free the new chain. This fixes a potential memory leak in ip_output(

CVS: cvs.openbsd.org: src

2021-02-22 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/22 06:04:56 Modified files: sys/net: pf_norm.c Log message: When cutting of the head of an overlapping fragment during pf reassembly, reinsert the fragment into the lookup table with correct

CVS: cvs.openbsd.org: src

2021-02-12 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/12 06:48:31 Modified files: sys/net: pf.c Log message: Fix null pointer dereference in pf_route6(). Embedding scope into addresses that come from pf cannot be right, so remove the code. Cove

CVS: cvs.openbsd.org: src

2021-02-11 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/11 14:09:56 Modified files: regress/sbin/pfctl: pf46.loaded Log message: More route-to fallout in pfctl regress.

CVS: cvs.openbsd.org: src

2021-02-11 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/11 12:41:05 Modified files: sbin/isakmpd : Makefile Log message: Link isakmpd dynamically. Mount /usr on NFS via IPsec does not work anyway. Dynamic binaries help building errata, reduce disk usa

CVS: cvs.openbsd.org: src

2021-02-10 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/10 11:28:06 Modified files: sys/netinet: ip_output.c Log message: If pf changes the routing table when sending packets, the kernel could get stuck in an endless recursion during TCP path MTU disc

CVS: cvs.openbsd.org: src

2021-02-10 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/10 07:45:27 Modified files: sbin/ifconfig : ifconfig.c Log message: Use the same check in kernel and ifconfig for group names. ifconfig delete group does not need name sanitation. The kernel will

CVS: cvs.openbsd.org: src

2021-02-10 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/10 07:41:53 Modified files: sys/net: if.c Log message: Interface group names must fit into IFNAMSIZ and be unique. But the kernel made the unique check before trunkating with strlcpy(). So t

CVS: cvs.openbsd.org: src

2021-02-08 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/08 05:30:10 Modified files: sys/net: if.c sys/netinet: ip_carp.c Log message: Start refcounting interface groups with 1. if_creategroup() returns a new object that is already re

CVS: cvs.openbsd.org: src

2021-02-06 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/06 06:15:37 Modified files: sys/net: if_ethersubr.c sys/netinet: ip_output.c Log message: Simplex interface sends packet back without hardware checksum offloading. The checksum

CVS: cvs.openbsd.org: src

2021-02-05 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/05 09:47:48 Modified files: sys/net: if_ethersubr.c Log message: Fix whitespace.

CVS: cvs.openbsd.org: src

2021-02-05 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/05 07:12:17 Added files: regress/sys/net/pair: Makefile pf.conf Log message: Setup two pair(4) and one lo(4) interface in different routing domains and with different interface MTU. Test that packet

CVS: cvs.openbsd.org: src

2021-02-05 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/05 07:09:16 src/regress/sys/net/pair Update of /cvs/src/regress/sys/net/pair In directory cvs.openbsd.org:/tmp/cvs-serv40116/pair Log Message: Directory /cvs/src/regress/sys/net/pair added to the repository

CVS: cvs.openbsd.org: src

2021-02-04 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/04 11:51:01 Modified files: lib/libc/sys : getsockopt.2 Log message: Referece trpt(8) from the SO_DEBUG section of getsockopt(2). OK claudio@ visa@

CVS: cvs.openbsd.org: src

2021-02-04 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/04 11:46:25 Modified files: usr.bin/tcpbench: tcpbench.1 tcpbench.c Log message: Implement the nc(1) -D socket debug option also in tcpbench(1). This allows to analyse TCP connections. OK claudio@

CVS: cvs.openbsd.org: src

2021-02-01 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/01 11:11:46 Modified files: regress/sys/netinet/ipsec: Makefile Log message: ESP path MTU discovery over IPv6 tunnel has been fixed. Add test.

CVS: cvs.openbsd.org: src

2021-02-01 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/01 06:25:04 Modified files: sys/netinet: ip_output.c sys/netinet6 : ip6_output.c Log message: Fix path MTU discovery for ESP tunneled in IPv6. We always want short TCP segments or fra

CVS: cvs.openbsd.org: src

2021-02-01 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/01 05:52:07 Modified files: regress/sys/net/pf_forward: Makefile pf.conf regress/sys/net/pf_fragment: Makefile pf.conf Log message: Syntax of pf(4) route-to has changed. Adapt tests.

CVS: cvs.openbsd.org: src

2021-02-01 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/02/01 05:08:51 Modified files: sys/netinet6 : ip6_output.c Log message: Fix white spaces and wrap long lines.

CVS: cvs.openbsd.org: src

2021-01-21 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/21 10:02:37 Modified files: regress/sys/kern/pledge/sockopt: Makefile Log message: Pledge violation for SO_RTABLE prints "wroute" now. Adapt test.

CVS: cvs.openbsd.org: src

2021-01-20 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/20 16:25:19 Modified files: sys/net: if_pflog.c Log message: An invalid packet may not have set src and dst in packet descriptor. Add a NULL check to prevent crash in pflog(4) introduced in p

CVS: cvs.openbsd.org: src

2021-01-20 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/20 10:38:18 Modified files: regress/sys/netinet/ipsec: LICENSE Makefile ipsec.conf Log message: Test path MTU discovery with IPv6 TCP packets tunneled in IPv4 ESP.

CVS: cvs.openbsd.org: src

2021-01-20 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/20 09:36:09 Modified files: sys/kern : kern_pledge.c Log message: If pledge "wroute" is missing for setsockopt SO_RTABLE, print failure message "wroute" into dmesg. Since revision 1.263 pledge

CVS: cvs.openbsd.org: src

2021-01-20 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/20 06:50:09 Modified files: regress/sys/net/pflog: Makefile Log message: Check the rewritten address output from tcpdump -e on pflog.

CVS: cvs.openbsd.org: src

2021-01-20 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/20 06:40:15 Modified files: sys/net: if_pflog.c usr.sbin/tcpdump: print-pflog.c Log message: Print rewritten addresses in tcpdump(8) logged with pflog(4) for rdr-to, nat-to, af-to ru

CVS: cvs.openbsd.org: src

2021-01-19 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/19 15:22:23 Modified files: sys/net: if_pflog.c pf.c Log message: pflog(4) tried to log the translated packet with rdr-to, nat-to, and af-to addresses and ports applied. Therefore it created

CVS: cvs.openbsd.org: src

2021-01-17 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/17 13:53:51 Modified files: regress/lib/libagentx: Makefile Log message: Put a sleep 1 after starting net-snmpd. The reason of the race is unclear, noone wants to debug net-snmpd. Goal it to replac

CVS: cvs.openbsd.org: src

2021-01-16 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/16 06:38:47 Modified files: regress/sys/net/pflog: Makefile Log message: If ip or ip6 forwarding is not set, expect af-to failure.

CVS: cvs.openbsd.org: www

2021-01-16 Thread Alexander Bluhm
CVSROOT:/cvs Module name:www Changes by: bl...@cvs.openbsd.org 2021/01/16 06:12:49 Modified files: faq: current.html Log message: To use pf(4) af-to rules, set ip and ip forwarding sysctl.

CVS: cvs.openbsd.org: src

2021-01-16 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/16 06:09:46 Modified files: sys/net: pf.c Log message: The sysctl variable net.inet.ip.forwarding is checked before ip_input() passes the packet to ip_forward(). But with an af-to rule, pf(4

CVS: cvs.openbsd.org: src

2021-01-15 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/15 15:27:49 Modified files: sys/net: pf.c Log message: Remove a check that bypasses pf state tests. It dates back to 2003 when NAT was implemented differently. Now it does not seem to make

CVS: cvs.openbsd.org: src

2021-01-15 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/15 08:18:12 Modified files: sys/netinet: ip_input.c Log message: As documented in sysctl(2) net.inet.ip.forwarding can be 2. Relax input validation and use integer comparison. OK kn@ mvs@ sthen@

CVS: cvs.openbsd.org: src

2021-01-15 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/15 07:36:16 Modified files: regress/lib/libagentx: Makefile Log message: Fix startup of smtpd; kill dangling smtpd; increase verbosity. OK martijn@

CVS: cvs.openbsd.org: src

2021-01-14 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/14 14:53:42 Modified files: regress/sys/net/pflog: Makefile pf.conf Log message: IPv4 loopback addresses do not work with af-to as in_canforward() prevents forwarding such packets. Switch regress to

CVS: cvs.openbsd.org: src

2021-01-14 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/14 06:41:28 Modified files: regress/sys/net/pflog: Makefile pf.conf Log message: IPv6 link-local addresses are broken in pf(4) as scope ID is used inconsistently. Switch regress to unique-local addr

CVS: cvs.openbsd.org: src

2021-01-13 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/13 05:38:36 Modified files: sys/kern : uipc_mbuf.c Log message: Convert mbuf type KDASSERT() to a proper KASSERT() in m_get(9). Should prevent to use uninitialized value as bogus counter index.

CVS: cvs.openbsd.org: src

2021-01-12 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/12 17:26:18 Modified files: regress/sys/net/pflog: Makefile pf.conf Log message: Add pflog(4) tests for IPv6.

CVS: cvs.openbsd.org: src

2021-01-11 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/11 17:15:03 Modified files: regress/sys/net/pflog: Makefile Log message: Check that rule without logopt user has no uid in log entry.

CVS: cvs.openbsd.org: src

2021-01-11 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/11 17:10:34 Modified files: sys/net: if_pflog.c pfvar.h sbin/pfctl : parse.y pfctl_parser.c Log message: Sometimes a user ID was logged in pflog(4) although the logopt of the rul

CVS: cvs.openbsd.org: src

2021-01-11 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/11 15:58:16 Modified files: regress/lib/libagentx: Makefile main.c Log message: Regress and Makefile cleanup. OK rob@

CVS: cvs.openbsd.org: src

2021-01-11 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/11 06:28:54 Modified files: sys/netinet: icmp6.h ip_input.c ip_output.c sys/netinet6 : icmp6.c ip6_forward.c ip6_output.c ip6_var.h Log message: Create a path MTU host route for IPsec

CVS: cvs.openbsd.org: src

2021-01-11 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/11 05:02:53 Modified files: regress/sys/net: Makefile Added files: regress/sys/net/pflog: Makefile pf.conf Log message: Add some basic tests for pflog(4) interface. Create special routing d

CVS: cvs.openbsd.org: src

2021-01-11 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/11 04:48:08 src/regress/sys/net/pflog Update of /cvs/src/regress/sys/net/pflog In directory cvs.openbsd.org:/tmp/cvs-serv85770/pflog Log Message: Directory /cvs/src/regress/sys/net/pflog added to the reposit

CVS: cvs.openbsd.org: src

2021-01-09 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/09 08:39:38 Modified files: regress/sys/kern/sosplice/loop: Makefile Added files: regress/sys/kern/sosplice/loop: bcast.pl Log message: Test that local UDP broadcast packets to 255.255.255.2

CVS: cvs.openbsd.org: src

2021-01-09 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/09 08:30:38 Modified files: sys/kern : uipc_socket.c Log message: If the loop check in somove(9) goes to release without setting an error, a broadcast mbuf will stay in the socket buffer foreve

CVS: cvs.openbsd.org: src

2021-01-09 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/09 07:55:21 Modified files: sys/net: if.c Log message: Syzkaller has found a stack overflow in socket splicing. Broadcast packets were resent through simplex broadcast delivery and socket sp

CVS: cvs.openbsd.org: src

2021-01-04 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/04 05:48:27 Modified files: sys/net: if_pfsync.c pf.c Log message: Minor refactoring in pf(4). Note that struct pfsync_state is no longer memcopied but assigned. Alignment should not be an

CVS: cvs.openbsd.org: src

2021-01-03 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/03 05:33:00 Modified files: regress/sys/kern/sosplice/loop: Makefile Log message: Increase file descriptor limit to allow long chains of spliced sockets in one test process.

CVS: cvs.openbsd.org: src

2021-01-01 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/01 18:27:45 Modified files: regress/sys/kern/sosplice: LICENSE Makefile Added files: regress/sys/kern/sosplice/loop: Makefile chain.pl loop.pl Log message: Create chains and loops of spliced

CVS: cvs.openbsd.org: src

2021-01-01 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2021/01/01 18:22:53 src/regress/sys/kern/sosplice/loop Update of /cvs/src/regress/sys/kern/sosplice/loop In directory cvs.openbsd.org:/tmp/cvs-serv43372/loop Log Message: Directory /cvs/src/regress/sys/kern/sosplice

CVS: cvs.openbsd.org: src

2020-12-29 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2020/12/29 09:59:42 Modified files: lib/libexpat : COPYING Changes README.md lib/libexpat/doc: reference.html lib/libexpat/lib: expat.h xmlparse.c xmlrole.c xmltok.c

CVS: cvs.openbsd.org: src

2020-12-27 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2020/12/27 10:27:50 Modified files: regress/sbin : Makefile Log message: Link disklabel and newfs regress to build.

CVS: cvs.openbsd.org: src

2020-12-27 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2020/12/27 07:37:54 Modified files: regress/sys/kern/sosplice/scapy: scapy.pl Log message: Ensure that a sufficient part of the remote log file has been transferred before the local side greps for the splice

CVS: cvs.openbsd.org: src

2020-12-26 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2020/12/26 09:37:54 Modified files: regress/lib/libexpat: Makefile.inc Log message: Include expat_config.h to run regress with matching set of ifdefs.

CVS: cvs.openbsd.org: src

2020-12-26 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2020/12/26 07:42:09 Modified files: regress/lib/libcrypto/CA: Makefile Log message: Start each regress run from scratch with new keys and CA database.

CVS: cvs.openbsd.org: src

2020-12-26 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2020/12/26 06:50:15 Modified files: regress/usr.sbin/syslogd: LICENSE args-tls-cafile-fake.pl Log message: Timing on slow armv7 machine is different. Instead of a broken pipe error we may also receive a TLS

CVS: cvs.openbsd.org: src

2020-12-25 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2020/12/25 17:48:56 Modified files: regress/lib/libcrypto: Makefile regress/lib/libcrypto/CA: Makefile intermediate.cnf root.cnf Removed files: regress/lib/libcrypto/CA: doit.sh Log message

CVS: cvs.openbsd.org: src

2020-12-25 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2020/12/25 17:12:03 Modified files: regress/sys/kern/sosplice/scapy: scapy.pl regress/sys/netinet/pmtu: LICENSE regress/sys/netinet6/nd6: Makefile Log message: Missed a python2.7, scapy 2,

CVS: cvs.openbsd.org: src

2020-12-25 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2020/12/25 17:06:08 Modified files: regress/sys/netinet/frag: frag_refrag.py regress/sys/netinet6/frag6: frag6_permute.py frag6_refrag.py Log message: Wrap long lines.

CVS: cvs.openbsd.org: src

2020-12-25 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2020/12/25 15:59:27 Modified files: regress/sys/netinet/frag: Makefile Added files: regress/sys/netinet/frag: frag_maxpacket0.py Log message: Send fragment that reaches beyond max packet length. pf

CVS: cvs.openbsd.org: src

2020-12-25 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2020/12/25 15:42:41 Modified files: regress/sys/netinet6/frag6: frag6_mf1end.py frag6_overdrop.py frag6_overhead.py frag6_overhead1.py

CVS: cvs.openbsd.org: src

2020-12-25 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2020/12/25 15:16:03 Modified files: regress/sys/netinet6/rh0: LICENSE Makefile rh0_empty.py rh0_final.py rh0_frag2.py rh0_frag_empty.py rh0

CVS: cvs.openbsd.org: src

2020-12-25 Thread Alexander Bluhm
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2020/12/25 14:43:55 Modified files: regress/sys/netinet6: Makefile Log message: Link pktinfo_addr and srcaddr regress to build.

<    5   6   7   8   9   10   11   12   13   14   >