created | 2021-12-19T23:18:43Z |
---|---|
begin | 2021-12-16T00:00:00Z |
end | 2021-12-17T00:00:00Z |
path | src/sys |
commits | 5 |
date | 2021-12-16T00:54:42Z | |||
---|---|---|---|---|
author | deraadt | |||
files | src/sys/net/if_wg.c | log | diff | annotate |
message |
pool_get w/ PR_ZERO is better than following with a bzero, because pools hold dirty and clean memory, and can hand out the right time cheaper ok dlg |
date | 2021-12-16T02:01:59Z | |||
---|---|---|---|---|
author | sashan | |||
files | src/sys/net/pf_lb.c | log | diff | annotate |
message |
fix zero division found by syzkaller. The sanity checks in pf(4) ioctls are not powerful enough to detect invalid port ranges (or even invalid rules). syzkaller does not use pfctl(8), it uses ioctl(2) to pass some random chunk of memory as a rule to pf(4). Fix adds explicit check for 0 divider to pf_get_transaddr(). It should make syzkaller happy without disturbing anyone else. OK gnezdo@ Reported-by: [email protected] |
date | 2021-12-16T08:03:17Z | |||
---|---|---|---|---|
author | anton | |||
files | src/sys/arch/amd64/conf/GENERIC | log | diff | annotate |
src/sys/arch/amd64/conf/RAMDISK | log | diff | annotate | |
src/sys/arch/amd64/conf/RAMDISK_CD | log | diff | annotate | |
src/sys/dev/acpi/acpi.c | log | diff | annotate | |
src/sys/dev/acpi/com_acpi.c | log | diff | annotate | |
message |
Attach com over acpi on amd64. Some hardware uses a different interrupt assignment compared to the the legacy one supported by com over isa. This causes the console to halt once userland takes over as no interrupts are received. The actual address and irq can be read from ACPI, kettenis@ already added support for arm64 which paved the way for amd64. Some consoles that previously attached over isa are now expected to attach over acpi. Thanks to patrick@ for testing on arm64. ok kettenis@ |
date | 2021-12-16T09:33:56Z | |||
---|---|---|---|---|
author | claudio | |||
files | src/sys/net/rtsock.c | log | diff | annotate |
message |
When adding the extra 10% of space to a needed sysctl buffer use math that is less likely to overflow the int type used. A BGP fullfeed is now so big that this calculation overflowed and then got sign extended. The result was for example 'route -n show' failures. Problem identified with deraadt@ OK deraadt@ (more cleanup needed but this fix is a good start) |
date | 2021-12-16T15:38:03Z | |||
---|---|---|---|---|
author | bluhm | |||
files | src/sys/netinet/ip_spd.c | log | diff | annotate |
message |
Fix a tiny race in tdb_delete() between TDBF_DELETED, tdb_unlink() and tdb_cleanspd(). gettdb...() can return a TDB before tdb_unlink(). Then ipsp_spd_lookup() could add it to tdb_policy_head after tdb_cleanspd(). There it would stay until it hits the kassert in tdb_free(). OK tobhe@ |