Commit Graph

257268 Commits

Author SHA1 Message Date
christos
a9b3a63e1f Update the keys file to the latest version from:
https://ftp.isc.org/isc/bind9/keys/9.11/bind.keys.v9_11

This includes the new KSK2017 key which is planned to replace the KSK2010
in October 11th, 2018. It is important to have software that ships with
both before September 11th 2018. Anything that bootstraps after that could
have trouble switching.

XXX: pullup-8, pullup-7, pullup-6
2018-03-09 18:56:02 +00:00
christos
92799b34cb revert previous; this was no typo. 2018-03-09 17:15:14 +00:00
christos
a2b8ac2816 fix device attributes 2018-03-09 17:14:57 +00:00
christos
3b0596539e everyone switched to openssl-1.1 2018-03-09 12:58:59 +00:00
christos
419bfd3d3e use the proper match pattern 2018-03-09 12:40:23 +00:00
christos
b84f7f92e0 Disable assembly stubs for the big endian variants of mips (could be more
precise? are all of them broken?)
2018-03-09 12:39:30 +00:00
maxv
47afec3d88 Remove M_PKTHDR from secondary mbufs when reassembling packets.
This is a real problem, because I found at least one component that relies
on the fact that only the first mbuf has M_PKTHDR: far from here, in
m_splithdr, we don't update m->m_pkthdr.len if M_PKTHDR is found in a
secondary mbuf. (The initial intention there was to avoid updating
m_pkthdr.len twice, the assumption was that if M_PKTHDR is set then we're
dealing with the first mbuf.) Therefore, when handling fragmented IPsec
packets (in particular IPv6, IPv4 is a bit more complicated), we may end
up with an incorrect m_pkthdr.len after authentication or decryption. In
the case of ESP, this can lead to a remote crash on this instruction:

	m_copydata(m, m->m_pkthdr.len - 3, 3, lastthree);

m_pkthdr.len is bigger than the actual mbuf chain.

It seems possible to me to trigger this bug even if you don't have the ESP
key, because the fragmentation part is outside of the encrypted ESP
payload.

So if you MITM the target, and intercept an incoming ESP packet (which you
can't decrypt), you should be able to forge a new specially-crafted,
fragmented packet and stuff the ESP payload (still encrypted, as you
intercepted it) into it. The decryption succeeds and the target crashes.
2018-03-09 11:57:38 +00:00
sevan
796d7c9466 Initialise ret to avoid returning uninitialised value if the if statement is
false. Found when building the POWERMAC_G5 kernel with clang.
2018-03-09 11:05:56 +00:00
knakahara
400c191493 Fix ipsec(4) I/F esp_frag support. 2018-03-09 11:05:21 +00:00
knakahara
130a306c85 Functionalize duplicated code. No functional changes. 2018-03-09 11:03:26 +00:00
knakahara
6be8939a62 Fix missing sadb_x_ipsecrequest informations for PF_KEY message. 2018-03-09 11:01:41 +00:00
knakahara
fceccdc8f9 NAT-T src and dst port in ipsec_variant should be network byte order. 2018-03-09 10:59:36 +00:00
msaitoh
0a42effe43 Add yet another Shared L2 TLB (2M/4M pages).
XXX need redesign.
2018-03-09 08:49:32 +00:00
msaitoh
b4914b1997 Make some event counters MP safe. Now all of the event counters are
MP safe.
2018-03-09 06:27:53 +00:00
christos
11ab244b7f use the magic - 2018-03-09 02:36:28 +00:00
christos
97b4576f10 Add the rest of the earm flavors; madness. 2018-03-09 01:34:30 +00:00
christos
c9896dce02 Don't define the v8 functions for v7! 2018-03-09 01:33:57 +00:00
macallan
09f8419f79 add fcu at iic 2018-03-08 23:27:12 +00:00
macallan
cfa90a0f1f preliminary driver for the fan control unit found in some G5 2018-03-08 23:25:56 +00:00
nonaka
58c029ad93 Add missed file in previous commit.
> efiboot: system can boot from CD/DVD-ROM media.
2018-03-08 23:02:50 +00:00
macallan
2daa0664f9 use channel info and set MODE bits accordingly instead of hoping OF set them
for us
now iic devices on different channels work properly
2018-03-08 21:53:20 +00:00
christos
39cdfefb57 add missing debuglib 2018-03-08 20:39:40 +00:00
christos
eab7c2b73f PR/53081: Fix size of the shift to depend on the type of the bitmap so that
we get the correct width.
2018-03-08 20:32:32 +00:00
martin
e2838b1f9e The PCI_PRODUCT_VIATECH_VT82C686A_SMB has been renamed, adjust. 2018-03-08 18:48:25 +00:00
sevan
7acf00be8e Update URL for the cited paper 2018-03-08 17:57:15 +00:00
christos
a10a55c9e9 oops forgot to commit this. 2018-03-08 13:38:02 +00:00
nonaka
cefc4c6cc1 efiboot: system can boot from CD/DVD-ROM media. 2018-03-08 10:34:33 +00:00
msaitoh
9da7fe5bb1 s/20183/201803/ 2018-03-08 10:17:22 +00:00
msaitoh
b23422ee7d sdtemp(4): Add Microchp EMC1501, another device ID of Maxim MAX6604 support.
ichsmb(4): Add support for Intel C620, Apollo Lake and Gemini Lake devices.
lm(4): Add NCT6796D support.
2018-03-08 10:14:00 +00:00
mrg
d6ef9967c8 use 1ul for a left shift that may be greater than int sized.
noticed by martin.

fixes PR#53081.
2018-03-08 10:06:18 +00:00
maxv
9213b2e9ef Switch nptr to uint8_t, and use nbuf_ensure_contig. Makes us use fewer
magic values.
2018-03-08 07:54:14 +00:00
wiz
6857c1356c Remove Tn. Add serial comma. 2018-03-08 07:39:28 +00:00
msaitoh
ee1ee2d938 Add NCT6796D. 2018-03-08 07:35:21 +00:00
maxv
b24cc1c550 Declare NPC_FMTERR, and use it to kick malformed packets. Several sanity
checks are added in IPv6; after we see the first IPPROTO_FRAGMENT header,
we are allowed to fail to advance, otherwise we kick the packet.

Sent on tech-net@ a few days ago, no response, but I'm committing it now
anyway.
2018-03-08 07:06:13 +00:00
ozaki-r
f670488b19 Fix a race condition on DAD destructions (again)
The previous fix to DAD timers was wrong; it avoided a use-after-free but
instead introduced a memory leak.  The destruction method had delegated
a destruction of a DAD timer to the timer itself and told that by setting NULL
to dp->dad_ifa.  However, the previous fix made DAD timers do nothing on
the sign.

Fixing the issue with using callout_stop isn't easy.  One approach is to have
a refcount on dp but it introduces extra complexity that we want to avoid.

The new fix falls back to using callout_halt, which was abandoned because of
softnet_lock.  Fortunately now the network stack is protected by KERNEL_LOCK
so we can remove softnet_lock from DAD timers (callout) and use callout_halt
safely.
2018-03-08 06:48:23 +00:00
wiz
f55f5e634e Bump date for previous. 2018-03-08 06:47:30 +00:00
martin
ee301cc02e __BITMAP_ZERO() only takes the pointer to the bitmap as an argument 2018-03-08 05:50:13 +00:00
msaitoh
40e85fdc03 Sort entries. No functional change. 2018-03-08 04:15:11 +00:00
christos
4be809cba5 need CRYPTO_memcmp() 2018-03-08 03:15:08 +00:00
christos
49ec5300d6 add size directives. 2018-03-08 03:14:31 +00:00
mrg
f91c3f82a9 fix various gcc6 m68k issues:
- bad indentation.  next68k en.c and mvme68k le_poll.c fixes real issues
  in error handling, the rest are NFCI.
- pass 68030 flags as appropriate for mvme68k.
- next68k nextrom.c has -Warray-bounds ignored for an odd expression
  that appears to run before relocation, and needs manual offsets
  added which trips bounds array checking.

with this all m68k ports build with GCC 6.
2018-03-08 03:12:01 +00:00
knakahara
c4f07af713 Reduce duplicated code which schedule deferred packet processing. No functional change. 2018-03-08 02:41:27 +00:00
knakahara
6020b04524 Fix INTx/MSI handler did not schedule workqueue. Pointed out by msaitoh@n.o. 2018-03-08 02:39:42 +00:00
maya
a671135b0f Adjust ci on the second iteration.
Now a MULTIPROCESSOR+LOCKDEBUG ERLITE reaches userland again
2018-03-07 23:08:29 +00:00
christos
128142209e remove the SHA256_Init man page; we are using ours from libc. 2018-03-07 22:40:26 +00:00
kre
3df05ec651 Fix typo in comment (s/is/if/) - NFC. 2018-03-07 21:13:24 +00:00
bouyer
6bdb7968c2 fdt-ise the allwinner can and lradc drivers. 2018-03-07 20:55:31 +00:00
maya
1abbae619e Remove now duplicate code for enabling FPU before reading FPU_ID 2018-03-07 20:48:00 +00:00
maya
1beca88d1c Remove now duplicate code to read FPU_ID into t1 2018-03-07 20:46:05 +00:00
maya
aef052f430 Remove duplicate confused code for enabling 64bit addressing 2018-03-07 20:43:53 +00:00