Build date: 1764975603 - Fri Dec 5 23:00:03 UTC 2025 Build cvs date: 1764963340 - Fri Dec 5 19:35:40 UTC 2025 Build id: 2025-12-06.1 Build tags: amd64-regress ports sysupgrade Applied the following diff(s): /home/anton/tmp/robsd/src-sys-em.diff /home/anton/tmp/robsd/src-sys-uhidev-sispm.diff /home/anton/tmp/robsd/src-sysupgrade.diff P lib/libcrypto/asn1/a_type.c P lib/libcrypto/asn1/p8_pkey.c P lib/libcrypto/bn/bn.h P lib/libcrypto/bn/bn_convert.c P lib/libcrypto/bn/bn_internal.h P lib/libcrypto/bn/bn_local.h P lib/libcrypto/ec/ec_internal.h P lib/libcrypto/ts/ts_lib.c P lib/libcrypto/ts/ts_rsp_verify.c P lib/libcrypto/ts/ts_verify_ctx.c P regress/lib/libcrypto/bn/bn_word.c P regress/lib/libcrypto/man/check_complete.pl P regress/usr.bin/ssh/multiplex.sh P regress/usr.bin/ssh/test-exec.sh P regress/usr.bin/ssh/unittests/misc/test_convtime.c P regress/usr.bin/ssh/unittests/test_helper/test_helper.c P regress/usr.bin/ssh/unittests/test_helper/test_helper.h P sbin/isakmpd/x509.c P sbin/pfctl/parse.y P sbin/ping/ping.c P share/man/man5/pf.conf.5 P sys/arch/alpha/alpha/pmap.c P sys/dev/pci/drm/amd/display/amdgpu_dm/amdgpu_dm.c M sys/dev/usb/uhidev.c P sys/netinet/ip.h P sys/sys/videoio.h P usr.bin/nc/netcat.c P usr.bin/ssh/clientloop.h P usr.bin/ssh/misc.c P usr.bin/ssh/misc.h P usr.bin/ssh/mux.c P usr.bin/ssh/packet.c P usr.bin/ssh/servconf.c P usr.bin/ssh/servconf.h P usr.bin/ssh/srclimit.c P usr.bin/ssh/ssh.1 P usr.bin/ssh/ssh.c P usr.bin/tcpbench/tcpbench.c P usr.bin/tmux/key-bindings.c P usr.sbin/bgpd/parse.y P usr.sbin/bgpd/rde.h M usr.sbin/bgpd/session.c P usr.sbin/btrace/btrace.h P usr.sbin/rpki-client/ccr.c P usr.sbin/rpki-client/filemode.c P usr.sbin/rpki-client/rpki-asn1.h P usr.sbin/traceroute/worker.c P usr.sbin/vmd/vm.c commit HvuyC1Orzj7N0wFC Author: tb Date: 2025/12/05 19:35:40 isakmpd: avoid direct ASN1_STRING accesses Since this transforms notBefore and notAfter into a string to be used in a keynote assertion, existing libcrypto interfaces aren't directly suitable, so I kept this mechanical by assigning the data and length fields to local variables via accessors and replacing tm->data by data and tm->length by len, only occasionally fixing up whitespace and omitting parentheses. probably ok beck claudio sbin/isakmpd/x509.c commit qRZqcl19niHj0KZF Author: phessler Date: 2025/12/05 17:48:47 allow network programs select DSCP_VA for network ToS OK stsp@ sbin/pfctl/parse.y sbin/ping/ping.c usr.bin/nc/netcat.c usr.bin/ssh/misc.c usr.bin/tcpbench/tcpbench.c usr.sbin/bgpd/parse.y usr.sbin/traceroute/worker.c commit ipRRMduQ2dIJpVaD Author: phessler Date: 2025/12/05 17:42:29 DSCP_VA define for use in network ToS OK stsp@ sys/netinet/ip.h commit zRhtg7pOv0l0yFDO Author: tb Date: 2025/12/05 17:32:05 check_complete: remove the BN_*FMT1 macros as well regress/lib/libcrypto/man/check_complete.pl commit zfLfxmwmJqOOzlZZ Author: tb Date: 2025/12/05 17:25:55 libcrypto: remove BN_{DEC,HEX}_FMT1 It appears that these were only ever used in bn_test.c... lib/libcrypto/bn/bn.h commit Hq7MZEcScxlulGOb Author: tb Date: 2025/12/05 17:10:06 check_complete: adjust for BN_ macro removal pointed out by kenjiro regress/lib/libcrypto/man/check_complete.pl commit A4rWnFKDucXdzqIx Author: dv Date: 2025/12/05 15:59:30 Fix vmd reboots broken by my pause barrier changes. Reported by bluhm@. Long story is vmd has some complexity in how the decision to "reboot" a vm process is made. The pause barrier diff clobbered a return value that bubbled up to a value passed to exit(3) and picked up by the parent vmd process (the "vmm" process) that determines if a process exit should result in relaunching the vm process or not. For now, just stop clobbering the value and don't report the error returned by pthread_barrier_destroy(3). usr.sbin/vmd/vm.c commit UKaYGSOkyHy1hkNa Author: tb Date: 2025/12/05 14:19:27 Replace trivial uses of ASN1_STRING_data() Almost entirely mechanical diff that ensures that for read-only accesses we use the const correct ASN1_STRING_get0_data(). Arguably, in most places the better fix would be to reach into ASN1_STRING but then we have to think and bikeshed... ok beck kenjiro lib/libcrypto/asn1/a_type.c lib/libcrypto/asn1/p8_pkey.c lib/libcrypto/ts/ts_lib.c lib/libcrypto/ts/ts_rsp_verify.c lib/libcrypto/ts/ts_verify_ctx.c commit XWcve9Ks5hjoilub Author: tb Date: 2025/12/05 14:12:32 libcrypto: make most of the BN_* macro pollution internal This is a first sweep of reducing the number of terribly named macros in bn.h More can go away. Those we need internally go to bn_local.h. Annoyingly bn_internal.h uses some of them, so it includes bn_local.h now. This can be cleaned up later. ok jsing kenjiro lib/libcrypto/bn/bn.h lib/libcrypto/bn/bn_convert.c lib/libcrypto/bn/bn_internal.h lib/libcrypto/bn/bn_local.h lib/libcrypto/ec/ec_internal.h commit JVuy1UwpdKpb2nNY Author: tb Date: 2025/12/05 14:07:01 bn_word.c: include bn_local.h in preparation for an upcoming change regress/lib/libcrypto/bn/bn_word.c commit ero4Ke4UPrxX1Pbl Author: sthen Date: 2025/12/05 11:39:59 s/State Limiter/&s/ in .Ss (linked with the plural from other text, and matches "Source Limiters). From Atanas Vladimirov. share/man/man5/pf.conf.5 commit DTHK919BXLDsrGF9 Author: djm Date: 2025/12/05 11:13:35 ASSERT_DOUBLE_* test helpers regress/usr.bin/ssh/unittests/test_helper/test_helper.c regress/usr.bin/ssh/unittests/test_helper/test_helper.h commit vkAjhlZVdD6VgEnY Author: jsg Date: 2025/12/05 10:45:05 disable Panel Self Refresh (PSR) in amdgpu PSR is a power saving feature, previously enabled for DCN >= 3.1.2 (YELLOW CARP / Rembrandt). Disabling PSR avoids a problem encountered by robert@ on a ThinkPad X13 Gen 6 (21RM) with GC 11.5.2, DCN 3.5.0. If a reboot was attempted after X started, the machine would hang. robert has patiently tried many PSR related patches, but nothing besides disabling PSR entirely has helped. sys/dev/pci/drm/amd/display/amdgpu_dm/amdgpu_dm.c commit AaS357tPH99vBVMv Author: tb Date: 2025/12/05 08:41:32 rpki-client: adjust doc comment of rtype_from_der() with reality usr.sbin/rpki-client/filemode.c commit CFW8bLHlHQHmuY7O Author: dtucker Date: 2025/12/05 08:09:34 Shell compatibility fix. regress/usr.bin/ssh/multiplex.sh commit AKZ7dgjcTcMXMaWC Author: djm Date: 2025/12/05 07:49:45 convert PerSourcePenalties to using floating point time, allowing penalties to be less than a second. This is useful if you need to penalise things you expect to occur at >=1 QPS. feedback dtucker / deraadt; ok deraadt@ usr.bin/ssh/servconf.c usr.bin/ssh/servconf.h usr.bin/ssh/srclimit.c commit YJOp7YM1HBgnrkr7 Author: djm Date: 2025/12/05 07:43:24 unit tests for convtime_double() regress/usr.bin/ssh/unittests/misc/test_convtime.c commit opiJ1z0bmRIsHxsK Author: djm Date: 2025/12/05 07:43:12 Add convtime_double() that converts a string interval, such as "3w2d4h5m10.5s", into a floating point number of seconds. Reimplement the existing convtime() function using convtime_double() (it just drops the fractional seconds) lots of feedback deraadt@ / dtucker@; ok deraadt@ usr.bin/ssh/misc.c usr.bin/ssh/misc.h commit nyHRXA6EUN7bect8 Author: tb Date: 2025/12/05 07:26:42 rpki-client: turn CCR into a proper CMS citizen Using an EncapsulatedContentInfo was a hack which arose out of the desire of having an OID next to the stuff we really care about. Russ Housley pointed out that an EncapsulatedContentInfo is never really used at the top level and that CMS (of course) has a proper mechanism for this. (The absence of signers also makes this original choice dubious, see last paragraph before RFC 5652, section 5.2.1.) So, switch to a ContentInfo and fix another encoding issue, namely using a naked OID instead of a CMS DigestAlgorithmIdentifier. In addition to CCR becoming a plain CMS object, the code becomes simpler overall despite the DigestAlgorithmIdentifier adding some complexity. The big win is that the opaque OCTET STRING wrapping the CCR SEQUENCE and the manual DER wrangling can go away. Russ confirmed by decoding a detailed example that this produces the appropriate DER matching the changes in the ASN.1 in draft-ietf-sidrops-rpki-ccr-02.txt. In detail: - mechanically rename EncapContentInfo (back) to ContentInfo - embed the CanonicalCacheRepresentation directly in ContentInfo - make hashAlg an X509_ALGOR, representing an AlgorithmIdentifier rather than an ASN1_OBJECT (an OID). - in generate_ccr() we embed the OID in the X509_ALGOR with no parameters V_ASN1_UNDEF, as appropriate for SHA-256 - in serialize_ccr_content() and ccr_parse() get rid of the OCTET STRING wrapping dance - in ccr_parse() unwrap OID and parameters and check they are as they should be for SHA-256. ok job usr.sbin/rpki-client/ccr.c usr.sbin/rpki-client/rpki-asn1.h commit 1SvLELRcyH24hnlj Author: dtucker Date: 2025/12/05 06:55:22 Add test for ssh -Oconninfo mux command. regress/usr.bin/ssh/multiplex.sh regress/usr.bin/ssh/test-exec.sh commit b16VmiZVMEXw9QpQ Author: dtucker Date: 2025/12/05 06:16:27 Add an ssh -Oconninfo command that shows connection information, similar to the ~I escapechar. This is the first use of the mux extension mechanism, so it should be both forward and backward compatible: a new client talking to an old server will not allow the "conninfo" request to be sent, but everything else should work seamlessly. feedback and ok djm@ usr.bin/ssh/clientloop.h usr.bin/ssh/mux.c usr.bin/ssh/packet.c usr.bin/ssh/ssh.1 usr.bin/ssh/ssh.c commit 8PjyBipVGmnGmzTF Author: dlg Date: 2025/12/04 23:15:55 rework how tlb shootdown information is sent between cpus. this change avoids using a mutex to coordinate work between cpus. previously every cpu had a list of structs that represented a shootdown "job" that another cpu might want to send it. these structs were protected by a per cpu mutex, so if cpu A wanted to send a shootdown to B, cpu A would take Bs lock, take a job from the free list, fill it in, queue the job on a pending list, release the mutex, and then send an IPI to B. the ipi handler on B would then take the mutex, pop jobs off the pending list, run them, queue them back on the free list, and then release its mutex. in this change there's no mutex, instead each job slot has an individual "state" field. so if cpu A wants to send a shootdown to B, A iterates over all the job slots on B and tries cas ops against the state field to transition it from "idle" to "pending". if cpu A can take ownership of a job slot on cpu B, it then fills in the shootdown info, and then sets the job state to "valid" before sending the IPI to B. setting the state to valid releases As ownership of the job and gives it to B for processing. cpu B then iterates over its job slots looking for "valid" states. if it finds a valid state it'll process the shootdown and then reset the state back to "idle", making it available for other cpus to try and use for sending shootdowns with. so in addition to avoiding the use of a mutex in IPI code, this also improves concurrency by allowing multiple cpus to queue jobs on each other without being serialised by the mutex, or being blocked by the cpu processing it's own jobs submitted by other CPUs. if there isn't a spare job slot on a cpu, both the old and new code would fall back to asking the remote cpu to do a global flush. in the old code this fall back was also protected by the mutex, in the new code it's more atomic operations. miod@ has tested this on a dual cpu CS20, and a quad cpu ES40. i think i was lucky that the weather was cold and he wanted to warm his space up. i've tested this on an es45 with 3 cpus. ok miod@ sys/arch/alpha/alpha/pmap.c commit FHmXFZAgVKXIswjJ Author: kirill Date: 2025/12/04 22:57:47 sys/videoio.h: sync with Linux 1. media: Add MALI_C55_3A_STATS meta format https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d36f732366aeb32bf3486545e597500a3bf0994 2. media: mali-c55: Add image formats for Mali-C55 parameters buffer https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1ab3cb233d61131b2d02650f8ed9e4e077fd4508 3. media: uapi: Add controls for Mali-C55 ISP https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8d0bbed21ef737195277c0af8c30511fb72e608b OK phessler@ sys/sys/videoio.h commit AUHvcdHyvuIfR0HD Author: jsg Date: 2025/12/04 22:55:17 remove prototypes for removed functions usr.sbin/bgpd/rde.h usr.sbin/btrace/btrace.h commit FtvQIIuKAQOdB19W Author: nicm Date: 2025/12/04 22:50:34 Allow drag in alternate screen again, GitHub issue 4743 reported by Brad King. usr.bin/tmux/key-bindings.c