OpenBSD cvs log

created 2021-07-18T00:16:56Z
begin 2021-07-14T00:00:00Z
end 2021-07-15T00:00:00Z
path src/sys
commits 6

date 2021-07-14T01:11:13Z
author daniel
files src/sys/dev/ic/twe.c log diff annotate
message fix "logically dead code" flagged by coverity

It looks like twe was refactored in 2011 and one error check was missed.
While the device may no longer be widely used, this helps reduce the
coverity alert count.

CID 1453371

ok krw@

date 2021-07-14T05:42:47Z
author jsg
files src/sys/dev/pci/drm/include/linux/timer.h log diff annotate
message When mod_timer() is called with a value less than or equal to the
current number of jiffies delete the timeout and reschedule for the next
tick. Avoids timeout_add() failing the ticks >= 0 assertion when
mod_timer() is called from i915_utils.c set_timer_ms().

Reported and earlier version tested by Tom Murphy on Kaby Lake R.

date 2021-07-14T09:56:17Z
author jsg
files src/sys/dev/pci/drm/include/linux/timer.h log diff annotate
message timeout_add() always sets a new expiry time unrelated to the previous
one and requeues as needed so no need to call timeout_del() before
timeout_add()

spotted by kettenis@

date 2021-07-14T21:07:36Z
author bluhm
files src/sys/netinet/tcp_subr.c log diff annotate
message Resend the TCP packet only if the MTU locked flag appears at the
route and was not there before. This should prevent a recursion
in path MTU discovery with TCP over IPsec.
reported and tested Matthias Schmidt; tested and OK tobhe@

date 2021-07-14T22:09:24Z
author bluhm
files src/sys/kern/kern_sig.c log diff annotate
message After VFS shutdown, init(8) cannot map a missing page that contains
the signal handler code. Traditionally a process would spin in
such a case, but we changed the logic in revision 1.167 trapsignal()
to receive a fatal signal. If that happens to init(8), the kernel
panics. In case of reboot, jump between init signal handler and
page fault trap until the kernel resets the machine.
reported and tested weerd@; OK deraadt@

date 2021-07-14T22:39:26Z
author tobhe
files src/sys/net/pfkeyv2.c log diff annotate
src/sys/net/pfkeyv2.h log diff annotate
src/sys/net/pfkeyv2_convert.c log diff annotate
src/sys/net/pfkeyv2_parsemessage.c log diff annotate
message Export SA replay counters via pfkey and print with ipsecctl.
This is useful for debugging replay window issues with 64 bit
sequence numbers in IPsec.

ok bluhm@