OpenBSD cvs log

created 2019-02-19T20:56:46Z
begin 2019-02-15T00:00:00Z
end 2019-02-16T00:00:00Z
path src/sys
commits 8

date 2019-02-15T01:06:38Z
author dlg
files src/sys/net/if_mpw.c log diff annotate
message allow configuration of the rdomain that mpls operates in

this is based on the changes to mpe i made yesterday. unfortunately
mpw has a monstor ioctl that configures all the things, which makes
the kernel side complicated. hopefully i can split them up.

date 2019-02-15T02:01:44Z
author dlg
files src/sys/net/if_mpw.c log diff annotate
message coordinate configuration of local mpls labels with destroying an interface

this adds an rwlock like mpe has which means only one thing can be
adding or removing a local mpls label, and those things check if
the interface is dying before doing their thing.

date 2019-02-15T05:55:21Z
author dlg
files src/sys/kern/uipc_socket2.c log diff annotate
src/sys/sys/socketvar.h log diff annotate
message let sbcreatecontrol take a const void * instead of a caddr_t.

this makes it easier to call since you don't have to cast to caddr_t
if it's a void *. this also changes a size argument from int to
size_t.

ok claudio@

date 2019-02-15T13:00:51Z
author mpi
files src/sys/net/if_vlan.c log diff annotate
src/sys/net/if_vlan_var.h log diff annotate
message Use `ifidx' when storing an interface index.

ok dlg@

date 2019-02-15T16:46:59Z
author deraadt
files src/sys/uvm/uvm_map.c log diff annotate
message With an opportunistic check performed at every trap, we insist userland
sp must be on a MAP_STACK page. Relax the check a bit -- the sp may be
on a PROT_NONE page. Can't see how an attacker can leverage that situation.

(New perl build process contains a "how many call frames can my stack
hold" checker, and this triggers via the MAP_STACK fault rather than
the normal access check. The MAP_STACK check still has a kernel printf
as we hunt for applications which map stacks poorly. Interestingly the
perl code has a knob to disable similar printing alerts on Windows, which
apparently has a feature somewhat like MAP_STACK!)

ok tedu guenther kettenis

date 2019-02-15T18:33:44Z
author anton
files src/sys/ddb/db_variables.c log diff annotate
message The underlying storage for builtin ddb variables are of type int but
referenced to using a pointer to long. When writing to such a variable,
cast it to the correct type. Writing would otherwise on 64-bit
architectures cause the next variable adjacent in memory to also be
modified.

ok deraadt@ visa@

date 2019-02-15T18:34:59Z
author anton
files src/sys/ddb/db_variables.c log diff annotate
message zap trailing empty line

date 2019-02-15T21:16:01Z
author claudio
files src/sys/net/route.c log diff annotate
message Remove KASSERT() for now. It triggers when destroying lo(4) of a rdomain
because the rtable_l2 is modified before calling rt_ifa_del.
Triggered by regress test and reported by Moritz Buhl mbuhl at mbuhl dot me