Commit Graph

5265 Commits

Author SHA1 Message Date
matt bd8986bbe0 Fix a bug where the octeon+ saa/saad instructions think they are using the AT
register when they actually aren't.
2015-05-29 22:18:51 +00:00
matt 6b8427896d Add the historical __OCTEON__ builtin_define along with __mips_popcount which
is defined if the platform has the dpop/pop instructions.
2015-05-29 19:37:27 +00:00
joerg 6c1b2314b1 Until we have a solution for stdatomic.h for GCC 4.8, install Clang's
version under /usr/include/clang-3.6 to match the C11 default.
2015-05-29 17:40:41 +00:00
joerg 1c490986b1 Update build glue for LLVM/Clang 3.6.1. This brings in a number of
bugfixes for various platforms and corrects the mcount symbol on
NetBSD/ARM.
2015-05-29 17:37:50 +00:00
joerg 137a60b63b Mark files not present in llvm-237755 as dead. 2015-05-29 17:32:05 +00:00
joerg f55ccfa327 Import Clang 3.6.1. 2015-05-29 17:21:44 +00:00
joerg d66c74902b Import LLVM 3.6.1. 2015-05-29 17:18:11 +00:00
mrg 35d2346c62 generate after oabi/eabi fixes. 2015-05-28 17:31:38 +00:00
rjs 550917d61d Build both xf86-video-radeon drivers for amd64 and i386, just build the
old one for other ports.
2015-05-28 14:36:44 +00:00
christos e4b9f99a89 put back setting uid and gid to -1 if they are not available. 2015-05-28 01:01:37 +00:00
christos 6e17a5c33f Merge the uid data too, so that we don't end up with multiple entries
when we don't care about the uid in the config file. In this case sshd
returns either uid=root|sshd depending on how we failed, so we used to
get two entries.
2015-05-27 22:39:01 +00:00
christos 73925aa27e print the key in human readable form when debugging. 2015-05-27 22:37:37 +00:00
christos d9f6e5f3d9 Make sure that we get the socket messages we expect, otherwise return NULL. 2015-05-27 22:37:13 +00:00
matt e3b08ce148 Make MULTILIBS work for oabi 2015-05-27 15:33:41 +00:00
skrll 640e856ca3 Fix up TARGET_ENDIAN_DEFAULT for BE oabi 2015-05-25 21:18:29 +00:00
matt 2bfd904e26 regenerated for N32 support. 2015-05-23 22:14:20 +00:00
matt 62bd03ee9c Regen for N32 target vectors. 2015-05-23 01:45:08 +00:00
matt 3a9ce77d41 Add the mips n32 target vectors. 2015-05-23 01:41:02 +00:00
rjs b596b9b9be Add xf86-video-intel-old to the build. 2015-05-21 00:12:10 +00:00
christos 4f2f73389d don't re-define END() now that amd64 defines it 2015-05-18 14:41:41 +00:00
roy 24f182ff35 Inform dhcpcd we have config.h file to load. 2015-05-16 23:33:33 +00:00
roy 7fd072243f Sync 2015-05-16 23:31:32 +00:00
roy c2e67a9bab Import dhcpcd-6.9.0 with the following changes:
*  Fix IPv6 prefix underflow when confirming deprecated but valid leases
  *  eloop.c and .h are now 100% portable outside of dhcpcd
     (provided the system supports recent POSIX and either you or
     the system provide working TAILQ macros)
  *  Allow waitip to work per interface.
  *  Handle ND options in the same way we handle DHCP and DHCPv6 options.
  *  Add new variable of type bitflags:flags where the flags ABCDEFGH,
     A is 10000000, B is 01000000, etc.
     Variables with the name reserved are no longer processed.
  *  Improve IN_IFF_TENTATIVE with ip sharing.
2015-05-16 23:25:41 +00:00
mrg 53e5192712 switch the default method to SNA. 2015-05-14 02:43:33 +00:00
skrll 65b0d3bfdb Make sure mips_elf_n32_is_local_label_name is used. 2015-05-13 06:24:18 +00:00
christos 430343a0c6 The L (Length) and M (More) flags needs to be cleared before deciding
whether the locally generated response requires fragmentation. This
fixes an issue where these flags from the server could have been invalid
for the following message. In some cases, this could have resulted in
triggering the wpabuf security check that would terminate the process
due to invalid buffer allocation.

XXX: pullup-7
2015-05-09 19:51:43 +00:00
christos 38d77090f3 The remaining number of bytes in the message could be smaller than the
Total-Length field size, so the length needs to be explicitly checked
prior to reading the field and decrementing the len variable. This could
have resulted in the remaining length becoming negative and interpreted
as a huge positive integer.

In addition, check that there is no already started fragment in progress
before allocating a new buffer for reassembling fragments. This avoid a
potential memory leak when processing invalid message.

XXX: pullup-7
2015-05-09 19:49:28 +00:00
christos 11ce78e57f The length of the received Commit and Confirm message payloads was not
checked before reading them. This could result in a buffer read
overflow when processing an invalid message.

Fix this by verifying that the payload is of expected length before
processing it. In addition, enforce correct state transition sequence to
make sure there is no unexpected behavior if receiving a Commit/Confirm
message before the previous exchanges have been completed.

Thanks to Kostya Kortchinsky of Google security team for discovering and
reporting this issue.

XXX: pullup-7
2015-05-09 19:46:01 +00:00
christos c23d0f7f66 The length of the WMM Action frame was not properly validated and the
length of the information elements (int left) could end up being
negative. This would result in reading significantly past the stack
buffer while parsing the IEs in ieee802_11_parse_elems() and while doing
so, resulting in segmentation fault.

This can result in an invalid frame being used for a denial of service
attack (hostapd process killed) against an AP with a driver that uses
hostapd for management frame processing (e.g., all mac80211-based
drivers).

Thanks to Kostya Kortchinsky of Google security team for discovering and
reporting this issue.

XXX: pullup-7
2015-05-09 19:35:15 +00:00
christos e4bfca3a3e strtoul() return value may end up overflowing the int h->chunk_size and
resulting in a negative value to be stored as the chunk_size. This could
result in the following memcpy operation using a very large length
argument which would result in a buffer overflow and segmentation fault.

This could have been used to cause a denial service by any device that
has been authorized for network access (either wireless or wired). This
would affect both the WPS UPnP functionality in a WPS AP (hostapd with
upnp_iface parameter set in the configuration) and WPS ER
(wpa_supplicant with WPS_ER_START control interface command used).

Validate the parsed chunk length value to avoid this. In addition to
rejecting negative values, we can also reject chunk size that would be
larger than the maximum configured body length.

Thanks to Kostya Kortchinsky of Google security team for discovering and
reporting this issue.

XXX: pullup-7
2015-05-09 19:33:47 +00:00
matt fd2293f463 Fix TEXTREL message to print out the section name 2015-05-09 17:43:23 +00:00
christos f29f1289ff CID 1268629: Don't deref NULL (can't happen unless count is incorrect;
code safety).
2015-05-09 15:28:25 +00:00
skrll 47d8d0b280 Define bfd_elf64_bfd_is_local_label_name so that local symbols really
get stripped, etc.
2015-05-08 15:13:53 +00:00
christos fce62f0d34 regen 2015-05-07 14:43:30 +00:00
christos ac4fc9a0ef generalize the mips test to match mips64. 2015-05-07 14:43:22 +00:00
hannken e10a32f7f7 Remove miscfs/syncfs and
- move the syncer into kern/vfs_subr.c.

- change the syncer to process the mountlist and VFS_SYNC as appropriate.

- use an API for mount points similiar to the API for vnodes:
  - vfs_syncer_add_to_worklist(struct mount *mp) to add
  - vfs_syncer_remove_from_worklist(struct mount *mp) to remove a mount.

No objections on tech-kern@
2015-05-06 15:57:07 +00:00
mrg 6cbd5bb34d remove unused file; pointed out by Kamil Rytarowski in private email. 2015-05-05 17:03:18 +00:00
mrg f3e894d0be libxcb-xkb.so has the wrong version, fix it. patch as provided by
Yorick Hardy in PR 49873.
2015-05-04 23:51:25 +00:00
roy 4d6391b4f4 Sync 2015-05-02 15:18:36 +00:00
macallan 372b3c16e6 build Loongson-MMI support only on mips64el 2015-05-02 14:54:18 +00:00
roy fc8c67611d Don't bind to IN_IFF_TENTATIVE or IN_IFF_DETACHED addresses. 2015-05-02 14:46:51 +00:00
roy 9d0b84c4a5 Sync 2015-05-01 18:23:11 +00:00
roy 4ac8d7d2d2 Import openresolv-3.7.0 with the following change:
*  -x marks the resolv.conf as exclusive.
     Only the latest resolv.conf will be processed, if none then
     as normal.
2015-05-01 18:21:17 +00:00
riz eff2366669 blacklistd and friends will actually be in NetBSD 7. 2015-04-30 06:20:43 +00:00
prlw1 9521ae7bfd Fix typos 2015-04-28 09:48:30 +00:00
christos 8e17dc8ada Fix potential buffer overflow:
http://w1.fi/security/2015-1/0001-P2P-Validate-SSID-element-length-before-copying-it-C.patch

XXX: pullup-[67]
2015-04-22 20:24:20 +00:00
riastradh 3b3b3f4af1 Remove bogus size_t->int casts in uiomove. 2015-04-21 13:15:28 +00:00
christos 0bb625c711 help sun2 2015-04-21 10:12:04 +00:00
riastradh 46e71c7d57 Make VOP_LINK return directory still locked and referenced.
Ride 7.99.10 bump.
2015-04-20 22:59:19 +00:00
joerg 66e8846b8d Redo __aeabi_atexit by shuffling the arguments and dropping the code in
libstdc++.
2015-04-19 18:15:26 +00:00