Commit Graph

234382 Commits

Author SHA1 Message Date
christos
29425aef1e fix memory leak, found by Brainy.
XXX: is there anything else that we need to cleanup at this point?
2015-04-04 15:09:45 +00:00
riastradh
73a47107cb Fix error branches in agp_amd64.c.
- agp_generic_detach always.
- Free asc if it was allocated.  (Found by Brainy, noted by maxv@.)
- Free the GATT if it was allocated.
2015-04-04 15:08:40 +00:00
macallan
b820c48042 malloc() -> kmem_alloc() for private data, also kmem_free() them if we
don't finish attaching for whatever reason

found by Brainy
2015-04-04 14:19:00 +00:00
macallan
c5ab7a0ed0 don't malloc a tiny, fixed size buffer to scribble into, then not use it
and never free it either

found by Brainy
2015-04-04 14:12:40 +00:00
christos
cfdc522bfc Alpha is the only platform where sig_atomic_t isn't int...
OpenBSD does not compile OpenSSH on the alpha anymore?
2015-04-04 13:59:20 +00:00
riastradh
e13b5afaf4 Make sure err is initialized. 2015-04-04 13:28:36 +00:00
macallan
229653bc60 add IPI support
compile-tested only since we don't actually spin up the 2nd core yet
2015-04-04 13:06:01 +00:00
riastradh
a26f29c67f Fix remaining read(fd, NULL, 1) cases. 2015-04-04 12:34:44 +00:00
macallan
83013a36f8 add jziic and RTC drivers 2015-04-04 12:32:34 +00:00
macallan
fb06cc11ce preliminary driver for JZ4780's on-chip SMBus controllers
needs more work but it's good enough for talking to an RTC
2015-04-04 12:28:52 +00:00
martin
9b3b0b6ea4 Note required cleandir for lint changes 2015-04-04 12:15:38 +00:00
maxv
795334fc6b ffs_superblock_validate(): ensure fs_ncg!=0 and fs_maxbpg!=0 to prevent
several divisions by zero.
2015-04-04 06:00:12 +00:00
rtr
80ea8ccc7c * update dccp_bind for struct mbuf * to struct sockaddr * parameter change
* pass NULL instead of casting 0 to a pointer when calling in_pcbbind()
2015-04-04 04:33:38 +00:00
christos
f804baf730 Adapt to the new API. 2015-04-04 02:51:10 +00:00
christos
f0cc19d59b new openssh 2015-04-04 00:03:12 +00:00
christos
9e714e12fb bump libssh 2015-04-04 00:00:41 +00:00
christos
e4d43b8226 Merge conflicts 2015-04-03 23:58:19 +00:00
jmcneill
0f61bda0b6 use conf/filesystems.config 2015-04-03 23:52:51 +00:00
christos
e161120f3a Changes since OpenSSH 6.7
=========================

This is a major release, containing a number of new features as
well as a large internal re-factoring.

Potentially-incompatible changes
--------------------------------

 * sshd(8): UseDNS now defaults to 'no'. Configurations that match
   against the client host name (via sshd_config or authorized_keys)
   may need to re-enable it or convert to matching against addresses.

New Features
------------

 * Much of OpenSSH's internal code has been re-factored to be more
   library-like. These changes are mostly not user-visible, but
   have greatly improved OpenSSH's testability and internal layout.

 * Add FingerprintHash option to ssh(1) and sshd(8), and equivalent
   command-line flags to the other tools to control algorithm used
   for key fingerprints. The default changes from MD5 to SHA256 and
   format from hex to base64.

   Fingerprints now have the hash algorithm prepended. An example of
   the new format: SHA256:mVPwvezndPv/ARoIadVY98vAC0g+P/5633yTC4d/wXE
   Please note that visual host keys will also be different.

 * ssh(1), sshd(8): Experimental host key rotation support. Add a
   protocol extension for a server to inform a client of all its
   available host keys after authentication has completed. The client
   may record the keys in known_hosts, allowing it to upgrade to better
   host key algorithms and a server to gracefully rotate its keys.

   The client side of this is controlled by a UpdateHostkeys config
   option (default off).

 * ssh(1): Add a ssh_config HostbasedKeyType option to control which
   host public key types are tried during host-based authentication.

 * ssh(1), sshd(8): fix connection-killing host key mismatch errors
   when sshd offers multiple ECDSA keys of different lengths.

 * ssh(1): when host name canonicalisation is enabled, try to
   parse host names as addresses before looking them up for
   canonicalisation. fixes bz#2074 and avoiding needless DNS
   lookups in some cases.

 * ssh-keygen(1), sshd(8): Key Revocation Lists (KRLs) no longer
   require OpenSSH to be compiled with OpenSSL support.

 * ssh(1), ssh-keysign(8): Make ed25519 keys work for host based
   authentication.

 * sshd(8): SSH protocol v.1 workaround for the Meyer, et al,
   Bleichenbacher Side Channel Attack. Fake up a bignum key before
   RSA decryption.

 * sshd(8): Remember which public keys have been used for
   authentication and refuse to accept previously-used keys.
   This allows AuthenticationMethods=publickey,publickey to require
   that users authenticate using two _different_ public keys.

 * sshd(8): add sshd_config HostbasedAcceptedKeyTypes and
   PubkeyAcceptedKeyTypes options to allow sshd to control what
   public key types will be accepted. Currently defaults to all.

 * sshd(8): Don't count partial authentication success as a failure
   against MaxAuthTries.

 * ssh(1): Add RevokedHostKeys option for the client to allow
   text-file or KRL-based revocation of host keys.

 * ssh-keygen(1), sshd(8): Permit KRLs that revoke certificates by
   serial number or key ID without scoping to a particular CA.

 * ssh(1): Add a "Match canonical" criteria that allows ssh_config
   Match blocks to trigger only in the second config pass.

 * ssh(1): Add a -G option to ssh that causes it to parse its
   configuration and dump the result to stdout, similar to "sshd -T".

 * ssh(1): Allow Match criteria to be negated. E.g. "Match !host".

 * The regression test suite has been extended to cover more OpenSSH
   features. The unit tests have been expanded and now cover key
   exchange.

Bugfixes

 * ssh-keyscan(1): ssh-keyscan has been made much more robust again
   servers that hang or violate the SSH protocol.

 * ssh(1), ssh-keygen(1): Fix regression bz#2306: Key path names were
   being lost as comment fields.

 * ssh(1): Allow ssh_config Port options set in the second config
   parse phase to be applied (they were being ignored). bz#2286

 * ssh(1): Tweak config re-parsing with host canonicalisation - make
   the second pass through the config files always run when host name
   canonicalisation is enabled (and not whenever the host name
   changes) bz#2267

 * ssh(1): Fix passing of wildcard forward bind addresses when
   connection multiplexing is in use; bz#2324;

 * ssh-keygen(1): Fix broken private key conversion from non-OpenSSH
   formats; bz#2345.

 * ssh-keygen(1): Fix KRL generation bug when multiple CAs are in
   use.

 * Various fixes to manual pages: bz#2288, bz#2316, bz#2273

Portable OpenSSH

 * Support --without-openssl at configure time

   Disables and removes dependency on OpenSSL. Many features,
   including SSH protocol 1 are not supported and the set of crypto
   options is greatly restricted. This will only work on systems
   with native arc4random or /dev/urandom.

   Considered highly experimental for now.

 * Support --without-ssh1 option at configure time

   Allows disabling support for SSH protocol 1.

 * sshd(8): Fix compilation on systems with IPv6 support in utmpx; bz#2296

 * Allow custom service name for sshd on Cygwin. Permits the use of
   multiple sshd running with different service names.

Checksums:
==========

 - SHA1 (openssh-6.8.tar.gz) = 99903c6ca76e0a2c044711017f81127e12459d37
 - SHA256 (openssh-6.8.tar.gz) = N1uzVarFbrm2CzAwuDu3sRoszmqpK+5phAChP/QNyuw=

 - SHA1 (openssh-6.8p1.tar.gz) = cdbc51e46a902b30d263b05fdc71340920e91c92
 - SHA256 (openssh-6.8p1.tar.gz) = P/ZM5z7hJEgLW/dnuYMNfTwDu8tqvnFrePAZLDfOFg4=

Please note that the PGP key used to sign releases was recently rotated.
The new key has been signed by the old key to provide continuity. It is
available from the mirror sites as RELEASE_KEY.asc.

Reporting Bugs:
===============

- Please read http://www.openssh.com/report.html
  Security bugs should be reported directly to openssh@openssh.com

OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt,
Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre, Tim Rice and
Ben Lindstrom.
2015-04-03 23:49:21 +00:00
jmcneill
8d31b76868 Move common non-device stuff to GENERIC.common. Simplify board configs,
and let them all share common settings.
2015-04-03 23:25:07 +00:00
christos
60a029958d accept typenames in param decls. 2015-04-03 21:40:04 +00:00
christos
6cc6303e95 add another lint test 2015-04-03 21:38:47 +00:00
christos
a2bce09441 add test for typename as a function param 2015-04-03 21:37:26 +00:00
rtr
a2ba5e69ab * change pr_bind to accept struct sockaddr * instead of struct mbuf *
* update protocol bind implementations to use/expect sockaddr *
  instead of mbuf *
* introduce sockaddr_big struct for storage of addr data passed via
  sys_bind; sockaddr_big is of sufficient size and alignment to
  accommodate all addr data sizes received.
* modify sys_bind to allocate sockaddr_big instead of using an mbuf.
* bump kernel version to 7.99.9 for change to pr_bind() parameter type.

Patch posted to tech-net@
  http://mail-index.netbsd.org/tech-net/2015/03/15/msg005004.html

The choice to use a new structure sockaddr_big has been retained since
changing sockaddr_storage size would lead to unnecessary ABI change. The
use of the new structure does not preclude future work that increases
the size of sockaddr_storage and at that time sockaddr_big may be
trivially replaced.

Tested by mrg@ and myself, discussed with rmind@, posted to tech-net@
2015-04-03 20:01:07 +00:00
jmcneill
12e9b90f9f Allow for choosing between 16 and 24bpp framebuffers. The default is now
16 instead of 24. Set 'fb.depth=16' or 'fb.depth=24' on kernel command-line
to explicitly select a colour depth.
2015-04-03 18:03:05 +00:00
jmcneill
f058c67066 comment out DDB_COMMANDONENTER 2015-04-03 18:00:25 +00:00
bouyer
8bc54b22df Use the same TRY_EMPTY_VM_SPACE as mips and vax for arm, which also
has VM_MAXUSER_ADDRESS set to 2GB. Fixes "fatal error: had to relocate PCH"
from g++ building wxGTK28 or wxGTK30.
For details see https://gcc.gnu.org/bugzilla/show_bug.cgi?id=58379

thanks to Martin Husemann for the hint.
2015-04-03 17:25:42 +00:00
pooka
a9585c3c6c Use RUMP_PMAP_KERNEL and RUMP_PMAP_LOCAL to denote
kernel and local client pmaps, respectively.
2015-04-03 16:46:39 +00:00
pooka
52af998366 Use a different vmspace for rump kernel proc0 and local clients.
While the rump kernel and local clients are by definition in the same
host vmspace, there are subtle differences in how in-kernel code works
in case accessing the kernel vmspace or a user process vmspace.

Problem discovered by riastradh's "read(fd, NULL, 1)" test.
2015-04-03 16:40:55 +00:00
pooka
0c4fe4730c Use vmspace of calling [rump kernel] process instead of sysspace. 2015-04-03 16:37:02 +00:00
ginsbach
236fefb93e Fix spelling; time zone is two words not one. 2015-04-03 15:52:50 +00:00
jmcneill
a094d5cdf1 Fix cnmagic handling, now I can enter ddb from serial console. 2015-04-03 15:50:15 +00:00
mbalmer
03639a91cd IPv4 number -> IPv4 address 2015-04-03 14:57:41 +00:00
jmcneill
551459fb9b Use a callback (with ugly lock dance from bcm2835_rng) instead of callout.
Make sure the ring oscillator is enabled as well.
2015-04-03 14:02:06 +00:00
palle
33126bce3b sun4v: There is no L-bit (Locked) in the sun4v tte 2015-04-03 10:07:57 +00:00
msaitoh
b6cb51d5e2 Use 1000ULL to prevent integer overflow (for IF_Gbps(10)). Same as OpenBSD. 2015-04-03 08:20:55 +00:00
ozaki-r
24f231a2bd Add opt_net_mpsafe.h for rump 2015-04-03 07:56:54 +00:00
ozaki-r
9817ed1a76 Don't grab KERNEL_LOCK during if_output when NET_MPSAFE
The change makes L3 MP-safe work easy. At this point
we deal with only IP forwarding.

No functional change when NET_MPSAFE isn't enabled.
2015-04-03 07:55:18 +00:00
snj
23af7a0ab0 properly pluralize. 2015-04-03 07:28:41 +00:00
ozaki-r
79caf7865d Restructure rtcache_lookup2 to make it clear what it does
No functional change.
2015-04-03 05:44:13 +00:00
riastradh
e1af3960a6 Use pmap_pv(9) to remove mappings of device pages in TTM.
Adapt nouveau and radeon to do pmap_pv_track for their device pages.

Proposed on tech-kern with no objections:

https://mail-index.netbsd.org/tech-kern/2015/03/26/msg018561.html

Further background at:

https://mail-index.netbsd.org/tech-kern/2014/07/23/msg017392.html
2015-04-03 01:09:42 +00:00
riastradh
f8875b371c Use pmap_pv(9) to remove mappings of Intel graphics aperture pages.
Proposed on tech-kern with no objections:

https://mail-index.netbsd.org/tech-kern/2015/03/26/msg018561.html

Further background at:

https://mail-index.netbsd.org/tech-kern/2014/07/23/msg017392.html
2015-04-03 01:06:05 +00:00
riastradh
92df5caba4 Implement pmap_pv(9) for x86 for P->V tracking of unmanaged pages.
Proposed on tech-kern with no objections:

https://mail-index.netbsd.org/tech-kern/2015/03/26/msg018561.html
2015-04-03 01:04:23 +00:00
riastradh
369827c136 Initialize P->V tracking for unmanaged device pages in uvm_init.
Conditional on __HAVE_PMAP_PV_TRACK until we add it to all pmaps.

MI part of pmap_pv(9) change proposed on tech-kern:

https://mail-index.netbsd.org/tech-kern/2015/03/26/msg018561.html
2015-04-03 01:03:42 +00:00
ast
ac1727e138 cosmetic change in man 8 service
use shell quoting in a safe way as suggested by Alan Barrett
2015-04-02 18:41:22 +00:00
dennis
f334ce9265 Make the small [U]INT_LEAST?_TYPE definitions match the 32 bit compiler 2015-04-02 16:49:09 +00:00
jmcneill
8bead3d0f8 print chip name 2015-04-02 15:48:38 +00:00
tnn
10879eadfe attach Mobile 5th Gen. Core SMBus 2015-04-02 15:32:19 +00:00
tnn
8a13682435 regen 2015-04-02 15:10:49 +00:00
tnn
a20ad0c2fd Mobile 5th Generation Intel Core devices, from intel doc #330837-004 2015-04-02 15:08:22 +00:00