OpenBSD/src HR8vWKmusr.bin/tmux server-client.c

   Fixed missing drag end detection and mouse button detection with
   modifiers. From Dane Jensen, reported by Joseph Tyson and Mark Kelly.
VersionDeltaFile
1.449+14-13usr.bin/tmux/server-client.c
+14-131 files

OpenBSD/src f0Qqrjplib/libc/sys pledge.2

   mdoc fixes
VersionDeltaFile
1.83+2-3lib/libc/sys/pledge.2
+2-31 files

OpenBSD/src ZARevXtlib/libc/sys open.2

   add .Nm for __pledge_open, makes 'man __pledge_open' work
VersionDeltaFile
1.56+3-2lib/libc/sys/open.2
+3-21 files

OpenBSD/src CSfgMmDsys/dev/pci if_iwx.c

   sys/iwx: increase maximal VHT A-MPDU from 64K to 1024K

   OK: stsp@
VersionDeltaFile
1.227+3-3sys/dev/pci/if_iwx.c
+3-31 files

OpenBSD/src H2bymU5lib/libc/sys pledge.2

   remove whitespace at eol
VersionDeltaFile
1.82+5-5lib/libc/sys/pledge.2
+5-51 files

OpenBSD/src ObxxVcalib/libc/sys pledge.2

   spelling
VersionDeltaFile
1.81+6-6lib/libc/sys/pledge.2
+6-61 files

OpenBSD/src anGTmpAsys/dev/pci/drm/amd/amdgpu amdgpu_drv.c

   make ddb output visible when entering ddb from X on amdgpu

   add a call to drm_fb_helper_restore_fbdev_mode_unlocked()
   to amdgpu_enter_ddb() otherwise ddb output can't be seen

   not required on inteldrm or radeondrm
VersionDeltaFile
1.69+1-0sys/dev/pci/drm/amd/amdgpu/amdgpu_drv.c
+1-01 files

OpenBSD/src 46dUL7kusr.sbin/vmctl main.c vmctl.h

   Clean up vmctl, remove use of vmd's log.c.

   This reimplements simpler versions of logging functions needed for
   linking the qcow and raw disk image code from vmd.

   Also cleans up the Makefile a bit, removing atomicio.c which is
   unused.

   ok mlarkin@
VersionDeltaFile
1.88+59-5usr.sbin/vmctl/main.c
1.44+8-1usr.sbin/vmctl/vmctl.h
1.8+4-4usr.sbin/vmctl/Makefile
1.97+3-2usr.sbin/vmctl/vmctl.c
+74-124 files

OpenBSD/src 5KLCak7sys/arch/amd64/amd64 identcpu.c

   delete AMD smt related line accidentally deleted
VersionDeltaFile
1.154+2-1sys/arch/amd64/amd64/identcpu.c
+2-11 files

OpenBSD/src eKMgpkQsbin/sysctl sysctl.c

   warn if hw.smt is used, and recommend hw.blockcpu
VersionDeltaFile
1.270+5-1sbin/sysctl/sysctl.c
+5-11 files

OpenBSD/src jRjbGkVlib/libc/sys sysctl.2, sys/arch/amd64/amd64 identcpu.c

   Some new intel machines have a new 3rd tier of cpus called LP-E which are
   E-core (Atom) without L3 cache.  These cpus are Lethargic, and it sucks
   when processes migrate to them.
   This introduces sysctl hw.blockcpu= which takes a sequence of 4 letters.
   S (for SMT), P (regular performance cpu), E (efficient cpu) generally
   80% to 50% as fast), and L (lethargic cpu) which are even slower.
   By setting this, you can select cpus to kick out of the scheduler.  The
   default is SL.
   The hw.smt sysctl remains for now but we will eventually delete it.
   hw.smt changes and follows hw.blockcpu=S.
   ok kettenis mlarkin
VersionDeltaFile
1.114+97-21sys/kern/kern_sched.c
1.153+35-4sys/arch/amd64/amd64/identcpu.c
1.71+17-2lib/libc/sys/sysctl.2
1.78+8-1sys/sys/sched.h
1.247+4-2sys/sys/sysctl.h
1.487+4-1sys/kern/kern_sysctl.c
+165-312 files not shown
+170-338 files

OpenBSD/src rBTKYAHsys/arch/arm64/include cpu.h

   add ci_cputypes field which will be needed by an upcoming MI change
   ok kettenis
VersionDeltaFile
1.54+2-1sys/arch/arm64/include/cpu.h
+2-11 files

OpenBSD/src vehNZ7ssys/dev/fdt xhci_fdt.c

   Attempt to power on attached USB hubs.  Add support for SpacemiT K1.

   ok phessler@, jca@, jsing@
VersionDeltaFile
1.27+19-3sys/dev/fdt/xhci_fdt.c
+19-31 files

OpenBSD/src YWkFpNVsys/arch/riscv64/riscv64 cpu.c

   Recognize SpacemiT X60 and X100 cores.

   ok jsg@
VersionDeltaFile
1.22+13-1sys/arch/riscv64/riscv64/cpu.c
+13-11 files

OpenBSD/src Zu9pFq6lib/libcrypto/x509 x509_verify.c

   Fix an off-by-one error in the X.509 verifier depth checking.

   In x509_verify_build_chains(), ensure that we check the current depth
   against max_depth prior to turning it into a legacy-style depth index.
   Additionally, add a guard to x509_verify_chain_append() so that we avoid
   exceeding the maximum certs per chain, even if we fail to handle this
   correctly elsewhere. Also prevent the legacy callback from being able
   to override the maximum verification depth.

   The current off-by-one allows for a 4 byte overwrite to occur on heap
   allocated memory - this will likely trigger a crash on OpenBSD (but may
   go unnoticed elsewhere). This is only reachable if a TLS client is talking
   to a malicious server or if a TLS server has client certificate
   verification enabled - in both cases the verification depth also needs to
   be set to the maximum allowed value of 32.

   It is worth noting that many TLS clients/servers set the maximum
   verification depth to a value that is much less than the default. A libtls
   client or server uses a default depth of 6 and is not impacted in this

    [6 lines not shown]
VersionDeltaFile
1.74+11-6lib/libcrypto/x509/x509_verify.c
+11-61 files

OpenBSD/src 4UBk45mregress/lib/libcrypto/x509 verify.c callback.c

   Add additional X.509 verifier test cases.

   The second case (14b) currently triggers a bug in the new verifier.
VersionDeltaFile
1.13+18-1regress/lib/libcrypto/x509/verify.c
1.6+10-1regress/lib/libcrypto/x509/callback.c
+28-22 files

OpenBSD/src cLHIrB7regress/lib/libcrypto/certs verify_test.go

   Run new test certificate bundles through Go's verifier.
VersionDeltaFile
1.3+2-0regress/lib/libcrypto/certs/verify_test.go
+2-01 files

OpenBSD/src 7GKQaj8regress/lib/libcrypto/certs/14a bundle.pem roots.pem, regress/lib/libcrypto/certs/14b bundle.pem roots.pem

   Add additional certificate test bundles.
VersionDeltaFile
1.1+704-0regress/lib/libcrypto/certs/14b/bundle.pem
1.1+704-0regress/lib/libcrypto/certs/14a/bundle.pem
1.1+21-0regress/lib/libcrypto/certs/14b/roots.pem
1.1+21-0regress/lib/libcrypto/certs/14a/roots.pem
+1,450-04 files

OpenBSD/src CTPXkYOregress/lib/libcrypto/certs make-certs.sh

   Generate two additional certificate test scenarios which have deep chains.
VersionDeltaFile
1.3+16-0regress/lib/libcrypto/certs/make-certs.sh
+16-01 files

OpenBSD/src WBEIonNusr.bin/tmux server-client.c tmux.h

   Reorganize structure of key_code so that it can be built directly by
   bitshifts rather than a load of huge switches, from Dane Jensen in
   GitHub issue 4953.
VersionDeltaFile
1.448+100-1,392usr.bin/tmux/server-client.c
1.1300+109-114usr.bin/tmux/tmux.h
1.77+3-3usr.bin/tmux/key-string.c
1.112+2-3usr.bin/tmux/input-keys.c
+214-1,5124 files

OpenBSD/src t8uuP2tusr.sbin/bgpctl output.c

   Correctly align and space queue info in 'show neighbor' command.
   OK tb@
VersionDeltaFile
1.74+3-3usr.sbin/bgpctl/output.c
+3-31 files

OpenBSD/src 0bFsUQssys/dev/pci/drm drm_linux.c

   access ida under spltty()

   ida is accessed from both process and interrupt contexts.

   The interrupt context use occurs when a fence is hardware signaled:
   dma_fence_signal -> amdgpu_pasid_free_cb -> ida_free -> idr_remove

   linux currently uses an xarray with XA_FLAGS_LOCK_IRQ for ida, which
   blocks interrupts when locked

   This change was prompted by protection faults such as:
   idr_tree_SPLAY+0x58
   idr_alloc+0xb1
   amdgpu_pasid_alloc+0x5d
   amdgpu_driver_open_kms+0xac
   drm_file_alloc+0x245
   drmopen+0x12c

   seen with 6.12 and 6.18 drm

    [5 lines not shown]
VersionDeltaFile
1.134+12-2sys/dev/pci/drm/drm_linux.c
+12-21 files

OpenBSD/src ep7p8n9regress/usr.sbin/rpki-client/openssl Makefile unistd.h, regress/usr.sbin/rpki-client/openssl/build Makefile

   rpki-client regress: align guard with portable
VersionDeltaFile
1.10+2-2regress/usr.sbin/rpki-client/openssl/Makefile
1.7+2-2regress/usr.sbin/rpki-client/openssl/build/Makefile
1.6+2-2regress/usr.sbin/rpki-client/openssl/unistd.h
+6-63 files

OpenBSD/src 5b9zvc0sys/net80211 ieee80211_node.c

   sys/net80211: announce 160MHz channels only when driver supports it

   Support of 160Mhz window brings a regression for drivers which do not
   supprot 160MHz window which leads to the wrong channel center.

   It was tested on iwx with and without 160Mhz window support in the code
   agaisnt 2.4Ghz network with 20Mhz and 40Mhz, and 5Ghz with 40Mhz, 60Mhz,
   80Mhz and 160Mhz window.

   Reported as iwm issue by martijn@

   OK: stsp@
VersionDeltaFile
1.214+27-4sys/net80211/ieee80211_node.c
+27-41 files

OpenBSD/src 2GW21ijusr.bin/tmux window-copy.c

   When in copy mode with a large scroll offset and the window is resized
   so that history shrinks, data->oy can exceed screen_hsize causing an
   unsigned integer underflow in the py computation. Clamp data->oy in
   window_copy_resize and window_copy_cmd_refresh_from_pane before the
   subtraction. From futpib at gmail dot com in GitHub issue 4958.
VersionDeltaFile
1.392+5-1usr.bin/tmux/window-copy.c
+5-11 files

OpenBSD/src kJQffhsregress/usr.bin/ssh proxyjump.sh Makefile

   add a regression test for ProxyJump/-J; ok dtucker
VersionDeltaFile
1.1+102-0regress/usr.bin/ssh/proxyjump.sh
1.144+3-2regress/usr.bin/ssh/Makefile
+105-22 files

OpenBSD/src VVZEowEusr.bin/ssh readconf.c ssh.c

   apply the same validity rules to usernames and hostnames set for
   ProxyJump/-J on the commandline as we do for destination user/host
   names.

   Specifically, they are no longer allowed to contain most characters
   that have special meaning for common shells. Special characters are
   still allowed in ProxyJump commands that are specified in the config
   files.

   This _reduces_ the chance that shell characters from a hostile -J
   option from ending up in a shell execution context.

   Don't pass untrusted stuff to the ssh commandline, it's not intended
   to be a security boundary. We try to make it safe where we can, but
   we can't make guarantees, because we can't know the parsing rules
   and special characters for all the shells in the world, nor can we
   know what the user does with this data in their ssh_config wrt
   percent expansion, LocalCommand, match exec, etc.


    [4 lines not shown]
VersionDeltaFile
1.411+86-38usr.bin/ssh/readconf.c
1.629+7-43usr.bin/ssh/ssh.c
1.163+4-2usr.bin/ssh/readconf.h
+97-833 files

OpenBSD/src KqJAZduregress/lib/libssl/client clienttest.c, regress/lib/libssl/tlsext tlsexttest.c

   libssl regress: adjust golden numbers for RSASSA-PSS

   Add the three RSASSA-PSS SignatureScheme 0x080b, 0x080a, 0x0809 in the
   appropriate spots in (components of) the ClientHello and adjust various
   length octets by adding 6.
VersionDeltaFile
1.47+33-30regress/lib/libssl/client/clienttest.c
1.96+11-9regress/lib/libssl/tlsext/tlsexttest.c
+44-392 files

OpenBSD/src 0ueWZ2Rlib/libssl ssl_sigalgs.c

   libssl: announce support for RSASSA-PSS signature schemes

   Announce the signature schemes for RSASSA-PSS with pubkey OID RSASSA-PSS
   between RSASSA-PSS with pubkey OID rsaEncryption and RSASSA-PKCS1-v1_5.

   This is the last step in the everlasting saga for making these signature
   schemes and certificates with RSASSA-PSS OID work. Fortunately, these are
   rarely used since they are extremely complex and inefficient also due to
   the large size of the parameters. This addresses bug reports by Steffen
   Ullrich and Tom Lane.

   Tested by bluhm.

   ok djm jsing kenjiro
VersionDeltaFile
1.53+7-1lib/libssl/ssl_sigalgs.c
+7-11 files

OpenBSD/src XZZzxG9lib/libssl ssl_sigalgs.c

   ssl_sigalg_pkey_ok: allow RSASSA-PSS with pubkey OID RSASSA-PSS

   This fixes a long-standing logic error that hasn't been noticed because
   we never announced the rsa_pss_pss_sha{256,384,512} SignatureScheme. The
   EVP_PKEY_id() of a RSA-PSS pubkey is EVP_PKEY_RSA_PSS, not EVP_PKEY_RSA.

   Thanks to beck for helping me figure out how to fix this correctly. It
   drove me nuts for a very long time. Problem also noticed by Tom Lane
   due to some PostgreSQL regress failures.

   ok djm jsing kenjiro
VersionDeltaFile
1.52+6-5lib/libssl/ssl_sigalgs.c
+6-51 files