===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/plus.html,v
retrieving revision 1.1387
retrieving revision 1.1388
diff -c -r1.1387 -r1.1388
*** www/plus.html 2016/06/06 18:00:17 1.1387
--- www/plus.html 2016/06/09 16:55:11 1.1388
***************
*** 80,85 ****
--- 80,110 ----
+
+ - In pf(4), don't panic if an mbuf(9) already has a statekey. This should help finding the remaining corner cases of packets looped back in the stack.
+
- In vmd(8), place a BOOTARG_END section at the end of the boot arguments list pushed to the VM during boot. This makes it possible to install and run an OpenBSD i386 guest VM using vmm(4).
+
- In libsndio, switch to the "new" audio(4) API.
+
+
- In ssh(1), don't record duplicate LocalForward and RemoteForward entries (bz#2562).
+
+
- In bgplg(8), use SERVER_NAME for the hostname displayed on the page.
+
- Increase size of the clone bitmap. This is required for upcoming work on cloning bpf(4).
+
- In vmm(4), support processors without unrestricted guest capability.
+
+
- Fix EXA detection in r128(4), cirrus(4), mach64(4) and mga(4).
+
- Enable creation of softraid(4) volumes using disks with non-512 byte sectors. This increments the metadata version.
+
- Fix a memory leak in isakmpd(8).
+
- In dhcpd(8), fix an abort due to a missing pledge(2) promise.
+
- Add -f to ndp(8).
+
+
- In grep(1), don't do reverse search optimization if looking for all matches in a line.
+
- On armv7, map and use the bootconfig/FDT area passed by u-boot and try to init FDT on it. This allows for the use of device tree information.
+
+
- In Xserver(1), implement VT switching (based on the USL compat interface) in the wscons console backend and use it by default.
+
- Update to xf86-video-ati 7.6.1.
+
+
- In ihidev(4) and dwiic(4), add support for I2C HID devices with GPIO signalled interrupts.
+
- In rcctl(8), rename the "faulty" list action to "failed".
- In tftpd(8), go in the background much later to reduce possible silent failures.
- If one of the TCP SYN cache buckets overflow, it might be a collision attack against the hash function. Mitigate this attack by reseeding the hash function as soon as possible.