Commit Graph

239386 Commits

Author SHA1 Message Date
pgoyette
15d8e3db1c Initialize the mutex before calling xxx_rescan(). Otherwise if we
load/attach an i2cbus at a later time (ie, load the iic module),
we'll end-up re-initializing the mutex.

(Caught with a LOCKDEBUG kernel)
2015-12-10 05:29:41 +00:00
knakahara
eaf1fb5902 add NULL check 2015-12-10 01:20:12 +00:00
maxv
a1153902a9 Rename verified_exec.c -> veriexec.c.
The old log is now in Attic/.
2015-12-09 18:25:32 +00:00
maxv
5e224a552d KNF, and use C-style comments. Also, remove fusword/susword. 2015-12-09 16:55:18 +00:00
maxv
10c6ba270a KNF 2015-12-09 16:26:16 +00:00
wiz
d7f847e7d4 Fix date. 2015-12-09 08:30:03 +00:00
knakahara
0072297ac8 ip_encap uses kmem_alloc APIs instead of malloc. 2015-12-09 06:00:51 +00:00
knakahara
849e83fa25 gif(4) uses kmem_alloc APIs instead of malloc. 2015-12-09 05:56:24 +00:00
knakahara
5e4601c62c Refactor gif_set_tunnel(). No functional change. 2015-12-09 03:33:32 +00:00
knakahara
118f179f3d Improve gif_set_tunnel() rollback code. 2015-12-09 03:31:28 +00:00
kamil
8ad8b0676c Correct mistakes in the sqlite.lua example
Changes:
- The open flag: sqlite.OPEN_CREATE will open the DB for reading and
  writing, adding sqlite.OPEN_READWRITE to sqlite.OPEN_CREATE will cause
  the DB to not be created and prevent the script from continuing
- When using stmt:bind_parameter_index() the parameter needs to be
  prefixed with ':' if that was used in the prepared statement,
  otherwise the incorrect index of 0 is returned.
- The drop table statement has an "x" appended to the table name, looks
  like a typo.

Patch by Travis Paul

Closes PR misc/50493
2015-12-08 23:04:40 +00:00
christos
7cbc092f17 fix struct name 2015-12-08 22:16:01 +00:00
christos
9a41cce439 Fix DIOCGPARTINFO 2015-12-08 21:27:50 +00:00
christos
952d11cd49 catch up with DIOCGPART -> DIOCGPARTINFO 2015-12-08 20:56:21 +00:00
christos
8d10f96266 Replace DIOCGPART -> DIOCGPARTINFO which returns the data needed instead of
pointers.
2015-12-08 20:36:14 +00:00
gson
07d2388506 unbreak the build 2015-12-08 16:53:27 +00:00
christos
a25476cdad PR/50506: Tobias Nygren: kqueue(2) lacks EV_DISPATCH/EV_RECEIPT support 2015-12-08 14:52:06 +00:00
skrll
5b56700641 Don't rely on uboot to enable am335x gpio clocks
From jmcneill@
2015-12-08 14:42:24 +00:00
christos
8d14d38c26 If we did not setup the tty, don't reset it. 2015-12-08 12:57:16 +00:00
christos
a2993d741e Only reset the terminal if we have a tty (Boris Ranto) 2015-12-08 12:56:55 +00:00
christos
a40b6ba18c more changes I forgot to commit 2015-12-08 12:51:21 +00:00
christos
5fd02f85b5 preserve a copy of the tm so we can check later. 2015-12-08 12:51:04 +00:00
christos
8861b14877 Kill one more REL_DEBUG, from kre 2015-12-08 12:41:28 +00:00
knakahara
5ff0670ba7 add gif test for set_tunnel/delete_tunnel and recursion calls check 2015-12-08 05:56:18 +00:00
pgoyette
d677b0d63e Update calculations for DDR4 devices. This gets 1066MHz modules to
report as PC4-17000.

XXX Due to insufficient precision in the SPD ROM data, we still report
XXX these modules with a DDR speed of 2132MHz, not 2133.  :(  (The
XXX cycle time is really 937.5ps, but is stored in the ROM as 938.0ps)
2015-12-08 02:09:23 +00:00
christos
317f295fe6 unfortunately it is not that easy to get rid of DIOCGPART. DTRT for the
raw partition and print a warning if we overflowed. I guess the right solution
for this is to create yet another version of disklabel that is 64 bit friendly.
2015-12-08 01:57:13 +00:00
pgoyette
c423c59d2d Update to match reality. For these functions, we still try the system
call first, and only fall back to /dev/clockctl if the system call
fails.
2015-12-07 23:20:57 +00:00
jdc
a987263c2d Use the destination buffer size when copying strings.
(Didn't matter in practice, because the destination was large enough.)
2015-12-07 20:59:44 +00:00
christos
da8d5d2ae7 there is no REL_DEBUG 2015-12-07 20:57:39 +00:00
christos
5e2a9cf1aa - Add support for "midnight" "noon", dawn etc.
- Add validation to date/time strings by checking that mktime did not change
  the fields of struct tm from the ones requested
- Allow the format "year monthname day".
From kre
2015-12-07 20:55:49 +00:00
christos
432cd4b9b7 new tests from kre 2015-12-07 20:52:46 +00:00
christos
4797f766ea don't release mutexes you did not enter? Please develop with LOCKDEBUG on! 2015-12-07 20:01:43 +00:00
christos
0b8ed6c54e regen 2015-12-07 14:40:23 +00:00
christos
9f215db8af name moschip devices consistently 2015-12-07 14:40:03 +00:00
msaitoh
19237ec8fd Bugfixes
- Calculate cycle_time correctly. _ftb is from +127 to -128.
  - Print latency in correct order.
- Don't print the size twice.
- KNF
2015-12-07 14:13:05 +00:00
pgoyette
42f5fa5fd3 Modularize drvctl(4) 2015-12-07 11:38:46 +00:00
knakahara
674e3a0ad1 remove extra shebang and fix a potentially bug 2015-12-07 09:59:26 +00:00
mlelstv
5fcead8f12 Handle reading of 4kbit EEPROMs in SPD devices. This is needed for DDR4 DIMMs. 2015-12-07 09:41:37 +00:00
pgoyette
887f46ade5 Forgot this file in previous commit (modularization of clockctl(4)) 2015-12-07 06:28:22 +00:00
ozaki-r
c6e461ee0d CID 1341546: Fix integer handling issue (CONSTANT_EXPRESSION_RESULT)
n > INT_MAX where n is a long integer variable never be true on 32bit
architectures. Use time_t(int64_t) instead of long for the variable.
2015-12-07 06:19:13 +00:00
pgoyette
1aa8a7614b synch usage() with the man page. 2015-12-07 03:34:00 +00:00
pgoyette
8285edda53 Modularize the clockctl pseudo-device and link to the build. 2015-12-07 03:25:57 +00:00
kamil
d3f055bfc7 Improve the httpd(8) printenv.lua Lua example
Stop using Lua builtin print function and replace them with http.* ones.
httpd.print and http.write wraps SSL support when needed.

Print http headers, without them browser may interpret page as raw text.

No need to hardcode prefix path in the form.

Add comments for a user with tips how to use this script.

Patch by Travis Paul

Closes PR misc/50502
2015-12-07 03:11:48 +00:00
christos
e2c3609f82 new openssl 2015-12-06 21:54:26 +00:00
christos
261bb38818 merge conflicts 2015-12-06 21:52:35 +00:00
christos
3e7df5c261 Import openssl-1.0.1q
OpenSSL Security Advisory [3 Dec 2015] - Updated [4 Dec 2015]
=============================================================

[Updated 4 Dec 2015]: This advisory has been updated to include the details of
CVE-2015-1794, a Low severity issue affecting OpenSSL 1.0.2 which had a fix
included in the released packages but was missed from the advisory text.

NOTE: WE ANTICIPATE THAT 1.0.0t AND 0.9.8zh WILL BE THE LAST RELEASES FOR THE
0.9.8 AND 1.0.0 VERSIONS AND THAT NO MORE SECURITY FIXES WILL BE PROVIDED (AS
PER PREVIOUS ANNOUNCEMENTS). USERS ARE ADVISED TO UPGRADE TO LATER VERSIONS.

BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193)
==================================================================

Severity: Moderate

There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No
EC algorithms are affected. Analysis suggests that attacks against RSA and DSA
as a result of this defect would be very difficult to perform and are not
believed likely. Attacks against DH are considered just feasible (although very
difficult) because most of the work necessary to deduce information
about a private key may be performed offline. The amount of resources
required for such an attack would be very significant and likely only
accessible to a limited number of attackers. An attacker would
additionally need online access to an unpatched system using the target
private key in a scenario with persistent DH parameters and a private
key that is shared between multiple clients. For example this can occur by
default in OpenSSL DHE based SSL/TLS ciphersuites.

This issue affects OpenSSL version 1.0.2.

OpenSSL 1.0.2 users should upgrade to 1.0.2e

This issue was reported to OpenSSL on August 13 2015 by Hanno
Böck. The fix was developed by Andy Polyakov of the OpenSSL
development team.

Certificate verify crash with missing PSS parameter (CVE-2015-3194)
===================================================================

Severity: Moderate

The signature verification routines will crash with a NULL pointer dereference
if presented with an ASN.1 signature using the RSA PSS algorithm and absent
mask generation function parameter. Since these routines are used to verify
certificate signature algorithms this can be used to crash any certificate
verification operation and exploited in a DoS attack. Any application which
performs certificate verification is vulnerable including OpenSSL clients and
servers which enable client authentication.

This issue affects OpenSSL versions 1.0.2 and 1.0.1.

OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q

This issue was reported to OpenSSL on August 27 2015 by Loïc Jonas Etienne
(Qnective AG). The fix was developed by Dr. Stephen Henson of the OpenSSL
development team.

X509_ATTRIBUTE memory leak (CVE-2015-3195)
==========================================

Severity: Moderate

When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
memory. This structure is used by the PKCS#7 and CMS routines so any
application which reads PKCS#7 or CMS data from untrusted sources is affected.
SSL/TLS is not affected.

This issue affects OpenSSL versions 1.0.2 and 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q
OpenSSL 1.0.0 users should upgrade to 1.0.0t
OpenSSL 0.9.8 users should upgrade to 0.9.8zh

This issue was reported to OpenSSL on November 9 2015 by Adam Langley
(Google/BoringSSL) using libFuzzer. The fix was developed by Dr. Stephen
Henson of the OpenSSL development team.

Race condition handling PSK identify hint (CVE-2015-3196)
=========================================================

Severity: Low

If PSK identity hints are received by a multi-threaded client then
the values are wrongly updated in the parent SSL_CTX structure. This can
result in a race condition potentially leading to a double free of the
identify hint data.

This issue was fixed in OpenSSL 1.0.2d and 1.0.1p but has not been previously
listed in an OpenSSL security advisory. This issue also affects OpenSSL 1.0.0
and has not been previously fixed in an OpenSSL 1.0.0 release.

OpenSSL 1.0.2 users should upgrade to 1.0.2d
OpenSSL 1.0.1 users should upgrade to 1.0.1p
OpenSSL 1.0.0 users should upgrade to 1.0.0t

The fix for this issue can be identified in the OpenSSL git repository by commit
ids 3c66a669dfc7 (1.0.2), d6be3124f228 (1.0.1) and 1392c238657e (1.0.0).

The fix was developed by Dr. Stephen Henson of the OpenSSL development team.

Anon DH ServerKeyExchange with 0 p parameter (CVE-2015-1794)
============================================================

Severity: Low

If a client receives a ServerKeyExchange for an anonymous DH ciphersuite with
the value of p set to 0 then a seg fault can occur leading to a possible denial
of service attack.

This issue affects OpenSSL version 1.0.2.

OpenSSL 1.0.2 users should upgrade to 1.0.2e

This issue was reported to OpenSSL on August 3 2015 by Guy Leaver (Cisco). The
fix was developed by Matt Caswell of the OpenSSL development team.

Note
====

As per our previous announcements and our Release Strategy
(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions
1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these
versions will be provided after that date. In the absence of significant
security issues being identified prior to that date, the 1.0.0t and 0.9.8zh
releases will be the last for those versions. Users of these versions are
advised to upgrade.


References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv/20151203.txt

Note: the online version of the advisory may be updated with additional
details over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html
2015-12-06 21:45:41 +00:00
christos
640422f86c Fix west australia offset, from kre 2015-12-06 14:43:59 +00:00
wiz
e54f25a390 gdb-7.10.1 out. 2015-12-06 10:40:51 +00:00
msaitoh
eca6c3c1c9 KNF. 2015-12-06 09:44:13 +00:00
wiz
97b0e5c3cc Fix typo in comment. 2015-12-06 09:38:54 +00:00