Build date: 1764802803 - Wed Dec 3 23:00:03 UTC 2025 Build cvs date: 1764781763 - Wed Dec 3 17:09:23 UTC 2025 Build id: 2025-12-04.1 Build tags: amd64-regress ports sysupgrade Applied the following diff(s): /home/anton/tmp/robsd/src-sys-em.diff /home/anton/tmp/robsd/src-sys-uhidev-sispm.diff /home/anton/tmp/robsd/src-sysupgrade.diff P distrib/sets/lists/man/mi P lib/libc/sys/getthrname.2 P lib/libpthread/man/pthread_set_name_np.3 P lib/librthread/rthread_np.c P libexec/ld.so/library.c P sbin/ifconfig/ifconfig.8 P sbin/ifconfig/ifconfig.c P sys/arch/loongson/include/param.h M sys/dev/usb/uhidev.c P sys/kern/kern_prot.c P sys/net/if_veb.c P sys/net80211/ieee80211_crypto.c P sys/net80211/ieee80211_ioctl.c P sys/net80211/ieee80211_node.c P sys/uvm/uvm_aobj.c P sys/uvm/uvm_pdaemon.c P usr.bin/ssh/scp.c P usr.bin/tmux/colour.c P usr.bin/tmux/layout.c P usr.bin/tmux/window.c P usr.sbin/bgpd/bgpd.c P usr.sbin/bgpd/bgpd.h P usr.sbin/bgpd/rde.c P usr.sbin/bgpd/rde_filter.c P usr.sbin/bgpd/rde_update.c M usr.sbin/bgpd/session.c P usr.sbin/rpki-client/ccr.c P usr.sbin/rpki-client/cms.c P usr.sbin/rpki-client/ip.c commit LQqoqSbYbLa0vE38 Author: kurt Date: 2025/12/03 17:09:23 Update get/setthrname and pthread_get/set_name_np man pages to advise of what buffer sizes to use. After discussion with Theo, _MAXCOMLEN was the best value to use for these non-portable interfaces. Also update for setthrname(2) no longer failing with EINTVAL. ok deraadt@ lib/libc/sys/getthrname.2 lib/libpthread/man/pthread_set_name_np.3 commit Bjb6o4LnEKMJ1e1U Author: kurt Date: 2025/12/03 17:06:48 Ensure that we always return a null terminated string if the user passed us a name buffer smaller than the thread name. ok deraadt@ lib/librthread/rthread_np.c commit Aiw1WMWkeJf87Nxe Author: kurt Date: 2025/12/03 17:05:53 Instead of failing with EINVAL when setthrname(2) is passed a thread name longer then _MAXCOMLEN-1, truncate the name to fit. This is likely what the user wants and saves them from having to snprintf(3) into a buffer sized _MAXCOMLEN first. Man page update to follow. This makes pthread_set_name_np(3) succeed with long thread names instead of silently failing. ok deraadt@ miod@ sthen@ mpi@ sys/kern/kern_prot.c commit YeVZBTrxxwRckxs9 Author: kettenis Date: 2025/12/03 14:43:25 Use the correct start address for the initial immutable address range for a shared library. The code used the load offset of the shared library instead of the start address of the mapped memory. In most case that works because the first segment of a shared library typically starts at virtual address zero. But on sparc64 (and possibly other architectures that still use ld.bfd) libicudata.so from ports has a non-zero virtual address (possibly because it is a data-only library). So this fixes the bug reported by claudio@ ok deraadt@, jca@, claudio@ libexec/ld.so/library.c commit JlJzM7S6p4x3Fw3W Author: claudio Date: 2025/12/03 14:16:21 This moves the code to lookup and set the pftable_id and rtlabel_id from rde_apply_set() to filterset_recv(). This was already done in the nexthop case. OK tb@ usr.sbin/bgpd/rde_filter.c commit SbSwKdbeyJVwtoCw Author: tb Date: 2025/12/03 13:17:51 rpki-client: convert most of ip.c to opaque ASN1_STRING There is still a flag access due to unused bits, fixing this will have to wait until we have an API everyone agrees on. ok claudio usr.sbin/rpki-client/ip.c commit V7VpZML1i0rEOABP Author: claudio Date: 2025/12/03 12:20:19 Factor out filterset_send() (simple rename) and filterset_recv() (common code) as a first step to optimise filter_set handling in the RDE. OK tb@ usr.sbin/bgpd/bgpd.c usr.sbin/bgpd/bgpd.h usr.sbin/bgpd/rde.c usr.sbin/bgpd/rde_filter.c commit kRIinmdcKV43bgkq Author: deraadt Date: 2025/12/03 12:07:45 sync distrib/sets/lists/man/mi commit V6MgXA6EUCQRujBv Author: miod Date: 2025/12/03 11:59:18 The definition of PAGE_SHIFT should not be limited to defined(_KERNEL); this prevents userland from getting a valid PAGE_SIZE definition by including . Reported on bugs@ sys/arch/loongson/include/param.h commit 8BIRkTc1dLynJjop Author: tb Date: 2025/12/03 10:26:52 rpki-client: fix ip_addr_afi_parse() The somewhat weird length checks would nominally accept an octet string of length 1, in which case the subsequent memcpy() would perform a 1-byte overread (harmless since libcrypto 'helpfully' adds a trailing NUL) since ip.c r1.12. The only allowed length for an AFI are 2 and 3 per RFC 3779 and SAFI is out, so pull the check for presence of the SAfI up and reject other lengths != 2. Also convert this function to opaque ASN1_STRING. ok job usr.sbin/rpki-client/ip.c commit B4MAUIfAQWOvcUrU Author: tb Date: 2025/12/03 10:21:53 rpki-client: initialize a variable to appease stupid old gcc Somewhat surprisingly, gcc 15 grew the smarts to avoid a false positive here. ok job usr.sbin/rpki-client/ccr.c commit GoMHhbxlXBtnBphl Author: stsp Date: 2025/12/03 10:21:12 enable 802.11 AKM SHA256-PSK by default if the driver supports PMF test + ok kevlo@ sys/net80211/ieee80211_crypto.c sys/net80211/ieee80211_ioctl.c sys/net80211/ieee80211_node.c commit NL5MoUCN52JCwsG4 Author: tb Date: 2025/12/03 10:19:28 rpki-client: convert cms.c to opaque ASN1_STRING Add length checks for the eContent to avoid malloc(0) and malloc(huge). Neither of these should be reachable, but who knows for sure... feedback/ok claudio usr.sbin/rpki-client/cms.c commit bPwEFSrDfZda9oHe Author: stsp Date: 2025/12/03 10:19:27 add support for 802.11 AKM SHA256-PSK to ifconfig test + ok kevlo@ sbin/ifconfig/ifconfig.8 sbin/ifconfig/ifconfig.c commit M2KuvhFRh2BymDVP Author: claudio Date: 2025/12/03 10:00:15 Fix possible use-after-free in up_generate_addpath() adjout_prefix_withdraw() is too complex to be sure that there is never a case where the prefix is removed and freed. So use the safe idiom and fetch the next element before calling adjout_prefix_withdraw(). Fix for CID 500335 OK tb@ usr.sbin/bgpd/rde_update.c commit rkmSJHt9rrPgceHC Author: mpi Date: 2025/12/03 09:47:44 Let the page daemon recover when uao_set_swslot() returns ENOMEM. When all available pages have been exhausted it might not be possible for the aobj layer to allocate a new element for a hash table. In that case simply skip the page. The page daemon will likely find a page that can be added to the cluster without requiring any allocation in uao_set_swslot(). Not that this edge case, reported by bluhm@, can be triggered because the aiodone daemon releases the memory reserved for the page daemon asynchronously. So there might always be a window where no page are available to write pages to disk. Tested by and ok bluhm@ sys/uvm/uvm_aobj.c sys/uvm/uvm_pdaemon.c commit K447NlnpIK9aELRA Author: nicm Date: 2025/12/03 07:41:38 Improve code readability in colour_palette_get and colour_palette_set. GitHub issue 4730 from Pavel Roskin. usr.bin/tmux/colour.c commit Z9sdrRO3I80KORq1 Author: nicm Date: 2025/12/03 07:38:46 Add check that the pane is not in alternate screen mode when in copy-mode. From Michael Grant in GitHub issue 4728. usr.bin/tmux/window.c commit YcpSuTBzywtMK2cl Author: nicm Date: 2025/12/03 07:35:32 Fix the size caluation for left-right windows used to spread out cells horizontally evenly. From Michael Grant in GitHub issue 4724. usr.bin/tmux/layout.c commit tL3GvXTUziucuCZZ Author: djm Date: 2025/12/03 06:29:50 correctly quote filenames in verbose output for local->local copies; from Colin Watson via bz3900; ok dtucker@ usr.bin/ssh/scp.c commit bmSNPhUITt2ddcKV Author: dlg Date: 2025/12/03 05:53:51 unbreak the build, if_input_proto isn't in the tree (yet). pointed out by deraadt@ sys/net/if_veb.c commit Co2p3hw9WtaHtKg6 Author: dlg Date: 2025/12/03 01:55:45 the blocknonip flag is supposed to filter outgoing packets too. sys/net/if_veb.c commit 221y4M9ZnNSZ8D5P Author: dlg Date: 2025/12/03 01:49:40 add veb-port kstats to count which of the many reasons a packet was dropped this adds them to the per cpu mem on each port that the refcnt "hazards" are on. sys/net/if_veb.c P MODULES P app/xkbcomp/compat.c P app/xkbcomp/expr.c commit Cq8fy0nJRMVBuqN4 Author: bluhm Date: 2025/12/03 08:59:58 Fixes for vulnerabilities found in xkbcommon also present in xkbcomp CVE-2018-15863 Don't crash on no-op modmask expressions CVE-2018-15861 Don't falsely promise from ExprResolveLhs CVE-2018-15859 Fail expression lookup on invalid atoms CVE-2018-15853 fix stack overflow when evaluating boolean negation from matthieu@ this is errata/7.8/009_xkbcomp.patch.sig app/xkbcomp/compat.c app/xkbcomp/expr.c commit QKBp38EnaZoTQfaL Author: bluhm Date: 2025/12/03 08:58:44 Fixes for vulnerabilities found in xkbcommon also present in xkbcomp CVE-2018-15863 Don't crash on no-op modmask expressions CVE-2018-15861 Don't falsely promise from ExprResolveLhs CVE-2018-15859 Fail expression lookup on invalid atoms CVE-2018-15853 fix stack overflow when evaluating boolean negation from matthieu@ this is errata/7.7/016_xkbcomp.patch.sig app/xkbcomp/compat.c app/xkbcomp/expr.c commit 12S3J1xP0YXsz9HV Author: matthieu Date: 2025/12/03 06:35:12 update MODULES commit 4y2HIGPcfnEzjk1X Author: matthieu Date: 2025/12/03 05:44:19 Fixes for vulnerabilities found in xkbcommon also present in xkbcomp CVE-2018-15863 Don't crash on no-op modmask expressions CVE-2018-15861 Don't falsely promise from ExprResolveLhs CVE-2018-15859 Fail expression lookup on invalid atoms CVE-2018-15853 fix stack overflow when evaluating boolean negation app/xkbcomp/compat.c app/xkbcomp/expr.c