OpenBSD/src 5KLCak7sys/arch/amd64/amd64 identcpu.c

   delete AMD smt related line accidentally deleted
VersionDeltaFile
1.154+2-1sys/arch/amd64/amd64/identcpu.c
+2-11 files

OpenBSD/src eKMgpkQsbin/sysctl sysctl.c

   warn if hw.smt is used, and recommend hw.blockcpu
VersionDeltaFile
1.270+5-1sbin/sysctl/sysctl.c
+5-11 files

OpenBSD/src jRjbGkVlib/libc/sys sysctl.2, sys/arch/amd64/amd64 identcpu.c

   Some new intel machines have a new 3rd tier of cpus called LP-E which are
   E-core (Atom) without L3 cache.  These cpus are Lethargic, and it sucks
   when processes migrate to them.
   This introduces sysctl hw.blockcpu= which takes a sequence of 4 letters.
   S (for SMT), P (regular performance cpu), E (efficient cpu) generally
   80% to 50% as fast), and L (lethargic cpu) which are even slower.
   By setting this, you can select cpus to kick out of the scheduler.  The
   default is SL.
   The hw.smt sysctl remains for now but we will eventually delete it.
   hw.smt changes and follows hw.blockcpu=S.
   ok kettenis mlarkin
VersionDeltaFile
1.114+97-21sys/kern/kern_sched.c
1.153+35-4sys/arch/amd64/amd64/identcpu.c
1.71+17-2lib/libc/sys/sysctl.2
1.78+8-1sys/sys/sched.h
1.247+4-2sys/sys/sysctl.h
1.487+4-1sys/kern/kern_sysctl.c
+165-312 files not shown
+170-338 files

OpenBSD/src rBTKYAHsys/arch/arm64/include cpu.h

   add ci_cputypes field which will be needed by an upcoming MI change
   ok kettenis
VersionDeltaFile
1.54+2-1sys/arch/arm64/include/cpu.h
+2-11 files

OpenBSD/src vehNZ7ssys/dev/fdt xhci_fdt.c

   Attempt to power on attached USB hubs.  Add support for SpacemiT K1.

   ok phessler@, jca@, jsing@
VersionDeltaFile
1.27+19-3sys/dev/fdt/xhci_fdt.c
+19-31 files

OpenBSD/src YWkFpNVsys/arch/riscv64/riscv64 cpu.c

   Recognize SpacemiT X60 and X100 cores.

   ok jsg@
VersionDeltaFile
1.22+13-1sys/arch/riscv64/riscv64/cpu.c
+13-11 files

OpenBSD/src Zu9pFq6lib/libcrypto/x509 x509_verify.c

   Fix an off-by-one error in the X.509 verifier depth checking.

   In x509_verify_build_chains(), ensure that we check the current depth
   against max_depth prior to turning it into a legacy-style depth index.
   Additionally, add a guard to x509_verify_chain_append() so that we avoid
   exceeding the maximum certs per chain, even if we fail to handle this
   correctly elsewhere. Also prevent the legacy callback from being able
   to override the maximum verification depth.

   The current off-by-one allows for a 4 byte overwrite to occur on heap
   allocated memory - this will likely trigger a crash on OpenBSD (but may
   go unnoticed elsewhere). This is only reachable if a TLS client is talking
   to a malicious server or if a TLS server has client certificate
   verification enabled - in both cases the verification depth also needs to
   be set to the maximum allowed value of 32.

   It is worth noting that many TLS clients/servers set the maximum
   verification depth to a value that is much less than the default. A libtls
   client or server uses a default depth of 6 and is not impacted in this

    [6 lines not shown]
VersionDeltaFile
1.74+11-6lib/libcrypto/x509/x509_verify.c
+11-61 files

OpenBSD/src 4UBk45mregress/lib/libcrypto/x509 verify.c callback.c

   Add additional X.509 verifier test cases.

   The second case (14b) currently triggers a bug in the new verifier.
VersionDeltaFile
1.13+18-1regress/lib/libcrypto/x509/verify.c
1.6+10-1regress/lib/libcrypto/x509/callback.c
+28-22 files

OpenBSD/src cLHIrB7regress/lib/libcrypto/certs verify_test.go

   Run new test certificate bundles through Go's verifier.
VersionDeltaFile
1.3+2-0regress/lib/libcrypto/certs/verify_test.go
+2-01 files

OpenBSD/src 7GKQaj8regress/lib/libcrypto/certs/14a bundle.pem roots.pem, regress/lib/libcrypto/certs/14b bundle.pem roots.pem

   Add additional certificate test bundles.
VersionDeltaFile
1.1+704-0regress/lib/libcrypto/certs/14a/bundle.pem
1.1+704-0regress/lib/libcrypto/certs/14b/bundle.pem
1.1+21-0regress/lib/libcrypto/certs/14a/roots.pem
1.1+21-0regress/lib/libcrypto/certs/14b/roots.pem
+1,450-04 files

OpenBSD/src CTPXkYOregress/lib/libcrypto/certs make-certs.sh

   Generate two additional certificate test scenarios which have deep chains.
VersionDeltaFile
1.3+16-0regress/lib/libcrypto/certs/make-certs.sh
+16-01 files

OpenBSD/src WBEIonNusr.bin/tmux server-client.c tmux.h

   Reorganize structure of key_code so that it can be built directly by
   bitshifts rather than a load of huge switches, from Dane Jensen in
   GitHub issue 4953.
VersionDeltaFile
1.448+100-1,392usr.bin/tmux/server-client.c
1.1300+109-114usr.bin/tmux/tmux.h
1.77+3-3usr.bin/tmux/key-string.c
1.112+2-3usr.bin/tmux/input-keys.c
+214-1,5124 files

OpenBSD/src t8uuP2tusr.sbin/bgpctl output.c

   Correctly align and space queue info in 'show neighbor' command.
   OK tb@
VersionDeltaFile
1.74+3-3usr.sbin/bgpctl/output.c
+3-31 files

OpenBSD/src 0bFsUQssys/dev/pci/drm drm_linux.c

   access ida under spltty()

   ida is accessed from both process and interrupt contexts.

   The interrupt context use occurs when a fence is hardware signaled:
   dma_fence_signal -> amdgpu_pasid_free_cb -> ida_free -> idr_remove

   linux currently uses an xarray with XA_FLAGS_LOCK_IRQ for ida, which
   blocks interrupts when locked

   This change was prompted by protection faults such as:
   idr_tree_SPLAY+0x58
   idr_alloc+0xb1
   amdgpu_pasid_alloc+0x5d
   amdgpu_driver_open_kms+0xac
   drm_file_alloc+0x245
   drmopen+0x12c

   seen with 6.12 and 6.18 drm

    [5 lines not shown]
VersionDeltaFile
1.134+12-2sys/dev/pci/drm/drm_linux.c
+12-21 files

OpenBSD/src ep7p8n9regress/usr.sbin/rpki-client/openssl unistd.h Makefile, regress/usr.sbin/rpki-client/openssl/build Makefile

   rpki-client regress: align guard with portable
VersionDeltaFile
1.6+2-2regress/usr.sbin/rpki-client/openssl/unistd.h
1.7+2-2regress/usr.sbin/rpki-client/openssl/build/Makefile
1.10+2-2regress/usr.sbin/rpki-client/openssl/Makefile
+6-63 files

OpenBSD/src 5b9zvc0sys/net80211 ieee80211_node.c

   sys/net80211: announce 160MHz channels only when driver supports it

   Support of 160Mhz window brings a regression for drivers which do not
   supprot 160MHz window which leads to the wrong channel center.

   It was tested on iwx with and without 160Mhz window support in the code
   agaisnt 2.4Ghz network with 20Mhz and 40Mhz, and 5Ghz with 40Mhz, 60Mhz,
   80Mhz and 160Mhz window.

   Reported as iwm issue by martijn@

   OK: stsp@
VersionDeltaFile
1.214+27-4sys/net80211/ieee80211_node.c
+27-41 files

OpenBSD/src 2GW21ijusr.bin/tmux window-copy.c

   When in copy mode with a large scroll offset and the window is resized
   so that history shrinks, data->oy can exceed screen_hsize causing an
   unsigned integer underflow in the py computation. Clamp data->oy in
   window_copy_resize and window_copy_cmd_refresh_from_pane before the
   subtraction. From futpib at gmail dot com in GitHub issue 4958.
VersionDeltaFile
1.392+5-1usr.bin/tmux/window-copy.c
+5-11 files

OpenBSD/src kJQffhsregress/usr.bin/ssh proxyjump.sh Makefile

   add a regression test for ProxyJump/-J; ok dtucker
VersionDeltaFile
1.1+102-0regress/usr.bin/ssh/proxyjump.sh
1.144+3-2regress/usr.bin/ssh/Makefile
+105-22 files

OpenBSD/src VVZEowEusr.bin/ssh readconf.c ssh.c

   apply the same validity rules to usernames and hostnames set for
   ProxyJump/-J on the commandline as we do for destination user/host
   names.

   Specifically, they are no longer allowed to contain most characters
   that have special meaning for common shells. Special characters are
   still allowed in ProxyJump commands that are specified in the config
   files.

   This _reduces_ the chance that shell characters from a hostile -J
   option from ending up in a shell execution context.

   Don't pass untrusted stuff to the ssh commandline, it's not intended
   to be a security boundary. We try to make it safe where we can, but
   we can't make guarantees, because we can't know the parsing rules
   and special characters for all the shells in the world, nor can we
   know what the user does with this data in their ssh_config wrt
   percent expansion, LocalCommand, match exec, etc.


    [4 lines not shown]
VersionDeltaFile
1.411+86-38usr.bin/ssh/readconf.c
1.629+7-43usr.bin/ssh/ssh.c
1.163+4-2usr.bin/ssh/readconf.h
+97-833 files

OpenBSD/src KqJAZduregress/lib/libssl/client clienttest.c, regress/lib/libssl/tlsext tlsexttest.c

   libssl regress: adjust golden numbers for RSASSA-PSS

   Add the three RSASSA-PSS SignatureScheme 0x080b, 0x080a, 0x0809 in the
   appropriate spots in (components of) the ClientHello and adjust various
   length octets by adding 6.
VersionDeltaFile
1.47+33-30regress/lib/libssl/client/clienttest.c
1.96+11-9regress/lib/libssl/tlsext/tlsexttest.c
+44-392 files

OpenBSD/src 0ueWZ2Rlib/libssl ssl_sigalgs.c

   libssl: announce support for RSASSA-PSS signature schemes

   Announce the signature schemes for RSASSA-PSS with pubkey OID RSASSA-PSS
   between RSASSA-PSS with pubkey OID rsaEncryption and RSASSA-PKCS1-v1_5.

   This is the last step in the everlasting saga for making these signature
   schemes and certificates with RSASSA-PSS OID work. Fortunately, these are
   rarely used since they are extremely complex and inefficient also due to
   the large size of the parameters. This addresses bug reports by Steffen
   Ullrich and Tom Lane.

   Tested by bluhm.

   ok djm jsing kenjiro
VersionDeltaFile
1.53+7-1lib/libssl/ssl_sigalgs.c
+7-11 files

OpenBSD/src XZZzxG9lib/libssl ssl_sigalgs.c

   ssl_sigalg_pkey_ok: allow RSASSA-PSS with pubkey OID RSASSA-PSS

   This fixes a long-standing logic error that hasn't been noticed because
   we never announced the rsa_pss_pss_sha{256,384,512} SignatureScheme. The
   EVP_PKEY_id() of a RSA-PSS pubkey is EVP_PKEY_RSA_PSS, not EVP_PKEY_RSA.

   Thanks to beck for helping me figure out how to fix this correctly. It
   drove me nuts for a very long time. Problem also noticed by Tom Lane
   due to some PostgreSQL regress failures.

   ok djm jsing kenjiro
VersionDeltaFile
1.52+6-5lib/libssl/ssl_sigalgs.c
+6-51 files

OpenBSD/src GDzAGkDlib/libssl ssl_sigalgs.c

   ssl_sigalgs: whitespace tweak
VersionDeltaFile
1.51+2-1lib/libssl/ssl_sigalgs.c
+2-11 files

OpenBSD/src kqqepaKgnu/usr.bin/perl/cpan/OpenBSD-Unveil/lib/OpenBSD Unveil.pm

   Improve OpenBSD::Unveil POD

   The choice of variable names made it somewhat unclear what arguments
   to pass and made it seem the interface might differ from unveil(2).

   ok dgl@
VersionDeltaFile
1.2+9-4gnu/usr.bin/perl/cpan/OpenBSD-Unveil/lib/OpenBSD/Unveil.pm
+9-41 files

OpenBSD/src US08OK0sys/dev/pci if_iwx.c

   sys/iwx: enable 160Mhz window at 5Ghz

   OK: kn@, phessler@, stsp@
VersionDeltaFile
1.226+75-6sys/dev/pci/if_iwx.c
+75-61 files

OpenBSD/src rpV4hDisys/net80211 ieee80211_node.c ieee80211.h

   sys/net80211: support of 160Mhz window at 5Ghz

   OK: kn@, phessler@, stsp@
VersionDeltaFile
1.213+63-11sys/net80211/ieee80211_node.c
1.66+6-2sys/net80211/ieee80211.h
1.101+6-2sys/net80211/ieee80211_node.h
+75-153 files

OpenBSD/src cEN5VdOsys/netinet igmp.c, sys/netinet6 mld6.c

   Remove useless memory barriers in igmp and mld6 timer.

   Multicast timers are protected by poper locks.  The shortcut that
   avoids locking when no timers are scheduled, does not need an
   additional membar.

   OK mvs@
VersionDeltaFile
1.98+12-13sys/netinet/igmp.c
1.75+9-13sys/netinet6/mld6.c
+21-262 files

OpenBSD/src xxnVONuinclude fnmatch.h

   FNM_CASEFOLD (and its synonym FNM_IGNORECASE) are now part of POSIX.1-2024

   Flagged by Sortix os-test.

   ok millert@, guenther@
VersionDeltaFile
1.9+6-2include/fnmatch.h
+6-21 files

OpenBSD/src 3iM0BWisys/tmpfs tmpfs_subr.c

   sys/tmpfs: use getnanotime() like FFS and MFS

   Editing files on tmpfs uses nanotime() to update mtime, and touch uses
   utimensat(UTIME_NOW) which uses getnanotime() which is cached and which
   can be smaller.

   So, sed ... A && touch B leads to mtime(A) > mtime(B) which isn't excted.

   "Yep" deraadt@
VersionDeltaFile
1.28+2-2sys/tmpfs/tmpfs_subr.c
+2-21 files

OpenBSD/src TjHPfoClib/libcrypto/mlkem mlkem_internal.c

   ML-KEM: ensure that key_768 is only dereferenced with 768-bit keys

   This looks like a NULL dereference that should crash, but for some reason
   it doesn't, even with -O0 with all compilers i tried.  At the very least it
   may result in compilers deducing that key_768 != NULL and lead to incorrect
   optimizations.

   ok claudio jsing kenjiro miod
VersionDeltaFile
1.8+7-3lib/libcrypto/mlkem/mlkem_internal.c
+7-31 files