OpenBSD/src jmaugsCusr.bin/tmux input.c tty-keys.c

   Pass which clipboard is set through to the terminal, from Axel Lindskog
   in GitHub issue 4858.
VersionDeltaFile
1.251+24-21usr.bin/tmux/input.c
1.202+11-3usr.bin/tmux/tty-keys.c
1.457+3-3usr.bin/tmux/tty.c
1.247+3-3usr.bin/tmux/screen-write.c
1.1294+3-2usr.bin/tmux/tmux.h
+44-325 files

OpenBSD/src wg8e2FElibexec/ld.so/ldconfig ldconfig.c, usr.bin/m4 main.c

   These programs are using pledge "tmppath" with "rpath wpath cpath".
   The "tmppath" is not needed.
   ok semarie and others
VersionDeltaFile
1.89+2-2usr.bin/m4/main.c
1.177+2-2usr.sbin/smtpd/smtpctl.c
1.37+2-2usr.bin/mail/main.c
1.358+2-2usr.sbin/smtpd/smtpd.c
1.81+2-2usr.bin/sendbug/sendbug.c
1.40+2-2libexec/ld.so/ldconfig/ldconfig.c
+12-126 files

OpenBSD/src ZrJE9O1sys/dev/ic qwz.c

   correct bounds check on number of memory segments
   found with smatch, ok patrick@
VersionDeltaFile
1.22+2-3sys/dev/ic/qwz.c
+2-31 files

OpenBSD/src 4CtKiZLusr.bin/ssh sftp-client.c

   same treatment for remote/remote copies (i.e. scp -3): adjust
   permissions on destination directory only if we created it or -p
   was requested. bz3925
VersionDeltaFile
1.184+7-4usr.bin/ssh/sftp-client.c
+7-41 files

OpenBSD/src hQ8LQ3Qusr.bin/ssh sftp-client.c

   when uploading a directory using sftp/sftp (e.g. during a recursive
   transfer), don't clobber the remote directory permissions unless
   either we created the directory during the transfer or the -p flag
   was set. bz3925 ok dtucker@
VersionDeltaFile
1.183+7-4usr.bin/ssh/sftp-client.c
+7-41 files

OpenBSD/src nFltyTRusr.bin/ssh servconf.c

   make IPQoS first-match-wins in sshd_config as it's intended to be
   bz3924
VersionDeltaFile
1.445+2-2usr.bin/ssh/servconf.c
+2-21 files

OpenBSD/src zh15zLssys/dev/pci if_iwx.c

   Sprinkle some BUS_DMA_64BIT; this hardware has no issues handling full
   64-bit addresses.

   ok stsp@
VersionDeltaFile
1.198+8-7sys/dev/pci/if_iwx.c
+8-71 files

OpenBSD/src VDJSROvusr.sbin/bgpd mrt.c

   Call timer_remove_all with the right object.

   Copy-paste bug which was introduced with rev 1.128.
   Causes the parent to SIGSEGV on config reloads when mrt dumps are used.
VersionDeltaFile
1.134+3-3usr.sbin/bgpd/mrt.c
+3-31 files

OpenBSD/src UIomcmXusr.sbin/rpki-client rpki-client.8

   sync
VersionDeltaFile
1.139+4-4usr.sbin/rpki-client/rpki-client.8
+4-41 files

OpenBSD/src vEHIVzrusr.sbin/bgpd rde.c

   Call rde_filterstate_init() early since goto badflow will call
   rde_filterstate_clean() and so the state must be initalized.

   Fix for CID 501585
VersionDeltaFile
1.685+3-2usr.sbin/bgpd/rde.c
+3-21 files

OpenBSD/src Tyhu3RPusr.bin/tmux grid.c

   Reuse extended entry when clearing RGB cell, to prevent memory growth
   when cells are repeatedly cleared (they are only compacted when scrolled
   off screen). From Michael K Darling in GitHub issue 4862.
VersionDeltaFile
1.142+8-2usr.bin/tmux/grid.c
+8-21 files

OpenBSD/src Ciiy4eJsys/dev softraid_crypto.c

   Always close the device.

   ok yasuoka
VersionDeltaFile
1.147+2-4sys/dev/softraid_crypto.c
+2-41 files

OpenBSD/src cXqN5kAsys/uvm uvm_meter.c uvmexp.h, usr.bin/systat uvm.c

   Reuse an unused field in uvmexp, and introduce swpskip.  In the near
   future, this will count how many times pages are not sent to swap
   because the pagedaemon detects the swap system won't be able to deliver
   results (and toss the cluster of pages back)
   ok beck
VersionDeltaFile
1.13+8-8usr.bin/systat/uvm.c
1.56+3-3sys/uvm/uvm_meter.c
1.26+2-3sys/uvm/uvmexp.h
+13-143 files

OpenBSD/src RlZeT5wusr.bin/systat engine.c

   The uvm display abuses the FLD subsystem with a set of empty labels,
   which results in an extra blank line. Work around this by noticing all
   the labels are empty and not doing a newline.
VersionDeltaFile
1.31+6-2usr.bin/systat/engine.c
+6-21 files

OpenBSD/src 9dg8qwZusr.bin/ssh ssh-agent.c ssh.c

   remove duplicate includes; ok dtucker@
VersionDeltaFile
1.319+1-2usr.bin/ssh/ssh-agent.c
1.626+1-2usr.bin/ssh/ssh.c
1.37+1-2usr.bin/ssh/sshlogin.c
+3-63 files

OpenBSD/src eUSxWeRsys/dev/ic qwx.c

   correct bounds check on number of memory segments
   found with smatch, feedback and ok stsp@
VersionDeltaFile
1.99+2-3sys/dev/ic/qwx.c
+2-31 files

OpenBSD/src FdTMiGiusr.sbin/rpki-client rpki-asn1.h

   update extern for renamed variable

   EncapContentInfo_it was renamed to ContentInfo_it in ccr.c rev 1.31
   ok claudio@
VersionDeltaFile
1.13+2-2usr.sbin/rpki-client/rpki-asn1.h
+2-21 files

OpenBSD/src ZAZ3NiRsys/arch/amd64/amd64 trap.c

   Handle VMMCALL in vctrap()

   When SEV guest userland issues a vmmcall instruction, a #VC exception
   with code SVM_VMEXIT_VMMCALL will be raised in the guest kernel.
   For now we do not allow vmmcalls from guest userland, thus terminate
   the userland process with SIGILL.

   This is similar to the non-SEV case.

   ok mlarkin@
VersionDeltaFile
1.117+9-1sys/arch/amd64/amd64/trap.c
+9-11 files

OpenBSD/src WqdEGxnsys/arch/amd64/amd64 vmm_machdep.c

   vmm(4): Ignore VMGEXIT request and inject #UD

   SEV guest userland processes are allowed to issue the vmgexit
   instruction.  However, guest userland has no access to the GHCB.

   VMEXITs with exit reason SVM_VMEXIT_VMGEXIT initiated by the guest
   kernel will always provide a valid GHCB request.

   Moreover, as the guest kernel makes sure, that the GHCB contains
   no request when guest userland is running, a rouge guest userland
   process can only force repeated VMEXITs with an empty GHCB.

   Therefore, in vmm(4)'s vmgexit handler inject #UD when the exit
   reason is not updated with data from the GHCB and stays on
   SVM_VMEXIT_VMGEXIT.

   ok mlarkin@
VersionDeltaFile
1.72+4-1sys/arch/amd64/amd64/vmm_machdep.c
+4-11 files

OpenBSD/src JrRbDu1sys/arch/amd64/amd64 ghcb.c vmm_machdep.c, sys/arch/amd64/include ghcb.h

   vmm(4): Check for and allow empty GHCB; only clear valid bitmap

   The GHCB valid bitmap indicates wether the GHCB contains a request
   or not.  When no bits are set, ignore the GHCB and do not sync with
   vCPU state.

   To clear/invalidate the GHCB just zero out the valid bitmap instead
   of the full GHCB.

   ok mlarkin@
VersionDeltaFile
1.8+19-3sys/arch/amd64/amd64/ghcb.c
1.71+3-1sys/arch/amd64/amd64/vmm_machdep.c
1.7+2-1sys/arch/amd64/include/ghcb.h
+24-53 files

OpenBSD/src G1ilw5dusr.sbin/bgpd rde.c

   Make sure that the filterset passed along with other objects is present.

   For communication with the parent the missing presence of a filter_set
   is cause for a panic. This should just never happen. For messages from
   bgpctl that are forwarded by the session engine things are more complex.
   Make sure the filter_set was sent and only execute the command that
   wraps this filter_set is present. If it is not there it may have been
   filtered out because it is invalid and then the command depending on
   this data should not be executed.

   OK tb@
VersionDeltaFile
1.684+38-17usr.sbin/bgpd/rde.c
+38-171 files

OpenBSD/src 6d3iHaBusr.sbin/bgpd rde_filter.c

   Make sure rde_filterset_unref() can be called with a NULL pointer.
   OK tb@
VersionDeltaFile
1.146+3-1usr.sbin/bgpd/rde_filter.c
+3-11 files

OpenBSD/src F2hSPWFusr.sbin/traceroute traceroute.c

   Make sure that internal counters do not go out of bounds if the '-n' or
   '-A' options are specified more than once. From Petre Rodan, ok florian@
VersionDeltaFile
1.171+9-5usr.sbin/traceroute/traceroute.c
+9-51 files

OpenBSD/src JpcJsubregress/sys/arch/amd64 Makefile, regress/sys/arch/amd64/vmmcall vmmcall.c Makefile

   regress: Test vmmcall raises #UD

   On AMD/SVM the hypervisor will inject #UD when userland tries to
   execute the vmmcall instruction.  Same holds for vmgexit which is
   encode as "rep vmmcall".

   On Intel/VMX vmmcall and vmgexit are invalid instructions, so the
   CPU will raise #UD.

   ok mlarkin@
VersionDeltaFile
1.1+80-0regress/sys/arch/amd64/vmmcall/vmmcall.c
1.1+29-0regress/sys/arch/amd64/vmmcall/Makefile
1.6+2-1regress/sys/arch/amd64/Makefile
+111-13 files

OpenBSD/src xgIqwqaregress/sys/arch/amd64 Makefile, regress/sys/arch/amd64/vmcall vmcall.c Makefile

   regress: Test vmcall raises #UD

   On Intel/VMX the hypervisor will inject #UD when userland tries to
   execute the vmcall instruction.

   On AMD/SVM vmcall is an invalid instruction, so the CPU will raise

   ok mlarkin@
VersionDeltaFile
1.1+63-0regress/sys/arch/amd64/vmcall/vmcall.c
1.1+28-0regress/sys/arch/amd64/vmcall/Makefile
1.5+2-1regress/sys/arch/amd64/Makefile
+93-13 files

OpenBSD/src goVnX7dsys/arch/amd64/amd64 vmm_machdep.c

   vmm(4): inject #UD for VMs running on SVM/VMX

   While there fix typo in a debug printf.

   ok mlarkin@
VersionDeltaFile
1.70+10-2sys/arch/amd64/amd64/vmm_machdep.c
+10-21 files

OpenBSD/src wevq1k3sys/dev/ic psp.c

   psp(4): add another firmware file

   ok mlarkin@
VersionDeltaFile
1.23+2-1sys/dev/ic/psp.c
+2-11 files

OpenBSD/src QcRByHYsys/dev/pci if_bnxt.c

   On newer hardware generations, no async events are enabled by default,
   so explicitly enable the ones we're interested in.

   tested by stsp@ as part of a larger diff
   ok dlg@
VersionDeltaFile
1.66+24-2sys/dev/pci/if_bnxt.c
+24-21 files

OpenBSD/src ke0rNtDusr.bin/tmux control-notify.c

   Format layout change string once per window in control notify, from
   Conor Taylor in GitHub issue 4848.
VersionDeltaFile
1.32+13-18usr.bin/tmux/control-notify.c
+13-181 files

OpenBSD/src acrqrfYusr.bin/tmux control.c

   Pull format allocation outside of loop for control subs, from Conor
   Taylor in GitHub issue 4848.
VersionDeltaFile
1.51+114-72usr.bin/tmux/control.c
+114-721 files