Commit Graph

236217 Commits

Author SHA1 Message Date
martin
5dd05e8b9a Bump version now that we can load kernels with sizeof(.data)+sizeof(.bss)> 4 MB 2015-06-14 18:40:10 +00:00
christos
621bb43b15 the data segment is not randomized. 2015-06-14 16:56:36 +00:00
martin
158ff069a0 Fix available length calculation in kvamap_extract when reusing existing
mappings.
2015-06-14 16:20:44 +00:00
gson
873b1ca5ad Revert previous; it broke the lib/libc/ttyio/t_ttyio/ioctl test case. 2015-06-14 16:19:31 +00:00
martin
4b0b50f7a8 Make sure not to re-arm the statistics callout when we are about to detach. 2015-06-14 08:46:33 +00:00
martin
5bf724d9b4 Add disarm support 2015-06-14 08:32:02 +00:00
phx
86f1c74589 Use all the changes from
http://ftp.netbsd.org/pub/NetBSD/misc/mlelstv/vmparam.diff
after a discussion on port-m68k. I tested them on several Amiga models
and they seem to work fine.
This gives us the maximum virtual memory space for a process under the
current 512MB pmap limitation.
Also bump VM_KERNEL_PT_PAGES to allow up to 2 GB RAM.
2015-06-13 23:55:18 +00:00
pooka
4e8e1eb1eb fix snafu to enable umass component also for amd64 2015-06-13 23:33:20 +00:00
christos
5cdfb39e7e old ipc still needed for compat_netbsd32 on i386 and sparc. 2015-06-13 22:18:04 +00:00
christos
9198a032e7 we need compat_sysv now. 2015-06-13 22:17:04 +00:00
martin
25ed20a82e Do not set MLIBDIR if MKCOMPAT=no 2015-06-13 20:38:52 +00:00
dholland
e3df6c4c29 grammar patrol 2015-06-13 19:52:58 +00:00
jakllsch
20ab6e5f00 Fix two issues in NetBSD implementation of igp_read_bios_from_vram():
* Allocate the correct buffer for the VGA BIOS image.
 * Abort if buffer allocation failed, not if buffer allocation succeeded.

Not directly tested, but I can't imagine this makes anything worse.
2015-06-13 18:18:18 +00:00
dennis
1c1ffc929a Add entries for riscv and aarch64. This lets the former build
complete and gets the latter close to the end.
2015-06-13 17:28:42 +00:00
msaitoh
75c77bac7a Add MSI/MSI-X support written by Kengo Nakahara. Some old devices' support
is written by me. It's disabled by default. If you'd like to use, define
WM_MSI_MSIX.

Tested with:
	8254[3405617] (INTx even if it has MSI CAP because of a errata)
	8257[12], 82583 ICH8, ICH10, PCH2, PCH_LPT(I21[78]) (MSI)
	8257[456], 82580, I35[04], I21[01] (MSI-X)

Not tested:
	82542, 82573, 80003, ICH9, PCH,
2015-06-13 15:47:58 +00:00
hannken
1c70c47140 ufs_inactive: stop overwriting error status and return the last error seen.
Should resolve CID 1306276 (UNUSED_VALUE)
2015-06-13 14:56:45 +00:00
mlelstv
5d01999423 btoc is already rounding up to click size, use predefined ctod macro
to translate to disk blocks.
2015-06-13 07:35:50 +00:00
dholland
cd1ecdeaa3 add -b to usage, from leot 2015-06-13 04:53:13 +00:00
dholland
bf0b86145a Fix the list of keys across the bottom so it fits on an 80-column screen
again. Fixes PR 49937.

HI MRG
2015-06-13 04:15:51 +00:00
christos
f40fdf6fe8 constify the new hmac tests 2015-06-12 20:25:44 +00:00
dholland
aad8cec383 Typo in comment. 2015-06-12 19:18:30 +00:00
dholland
28bb489865 Use NOFOLLOW intead of <empty>. Purely cosmetic as NOFOLLOW is 0, but
it's supposed to be there for clarity.
2015-06-12 19:06:32 +00:00
dholland
d94a1d6201 Punctuate properly. 2015-06-12 17:50:01 +00:00
gson
6b1c582456 When closing a tty, limit the amount of time spent waiting for the
output to drain to five seconds so that exiting processes with
buffered output for a serial port blocked by flow control do not
hang indefinitely.  Should fix PR kern/12534.  OK christos.
2015-06-12 17:28:53 +00:00
macallan
ffadbe1aeb actually check the return value from m_gethdr() and deal with errors
now we no longer segfault in dme_allocate_buffer()
2015-06-12 17:24:02 +00:00
christos
325108d669 new OpenSSL 2015-06-12 17:02:30 +00:00
christos
2dedb2215d merge conflicts, restore binary compatibility in hmac, regen. 2015-06-12 17:01:11 +00:00
christos
9cae6e10c2 Changes between 1.0.1m and 1.0.1n [11 Jun 2015]
*) Malformed ECParameters causes infinite loop

     When processing an ECParameters structure OpenSSL enters an infinite loop
     if the curve specified is over a specially malformed binary polynomial
     field.

     This can be used to perform denial of service against any
     system which processes public keys, certificate requests or
     certificates.  This includes TLS clients and TLS servers with
     client authentication enabled.

     This issue was reported to OpenSSL by Joseph Barr-Pixton.
     (CVE-2015-1788)
     [Andy Polyakov]

  *) Exploitable out-of-bounds read in X509_cmp_time

     X509_cmp_time does not properly check the length of the ASN1_TIME
     string and can read a few bytes out of bounds. In addition,
     X509_cmp_time accepts an arbitrary number of fractional seconds in the
     time string.

     An attacker can use this to craft malformed certificates and CRLs of
     various sizes and potentially cause a segmentation fault, resulting in
     a DoS on applications that verify certificates or CRLs. TLS clients
     that verify CRLs are affected. TLS clients and servers with client
     authentication enabled may be affected if they use custom verification
     callbacks.

     This issue was reported to OpenSSL by Robert Swiecki (Google), and
     independently by Hanno Böck.
     (CVE-2015-1789)
     [Emilia Käsper]

  *) PKCS7 crash with missing EnvelopedContent

     The PKCS#7 parsing code does not handle missing inner EncryptedContent
     correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs
     with missing content and trigger a NULL pointer dereference on parsing.

     Applications that decrypt PKCS#7 data or otherwise parse PKCS#7
     structures from untrusted sources are affected. OpenSSL clients and
     servers are not affected.

     This issue was reported to OpenSSL by Michal Zalewski (Google).
     (CVE-2015-1790)
     [Emilia Käsper]

  *) CMS verify infinite loop with unknown hash function

     When verifying a signedData message the CMS code can enter an infinite loop
     if presented with an unknown hash function OID. This can be used to perform
     denial of service against any system which verifies signedData messages using
     the CMS code.
     This issue was reported to OpenSSL by Johannes Bauer.
     (CVE-2015-1792)
     [Stephen Henson]

  *) Race condition handling NewSessionTicket

     If a NewSessionTicket is received by a multi-threaded client when attempting to
     reuse a previous ticket then a race condition can occur potentially leading to
     a double free of the ticket data.
     (CVE-2015-1791)
     [Matt Caswell]

  *) Reject DH handshakes with parameters shorter than 768 bits.
     [Kurt Roeckx and Emilia Kasper]
2015-06-12 16:34:57 +00:00
matt
49e70f47cc Add back sysmapsize 2015-06-12 16:28:39 +00:00
tnn
845d2aa565 Supports ETHERCAP_VLAN_MTU. ok martin@ PR#49967 2015-06-12 11:54:39 +00:00
plunky
68a3deedd1 the Bluetooth rc.d setup was simplified some time ago, so
'btdevctl' variable is no longer used. change wording to
reflect this
2015-06-12 09:43:05 +00:00
msaitoh
2a363586cb - Print NVM version on 8257[124], too.
- Modify NVM version string a bit.
2015-06-12 04:40:28 +00:00
palle
655b9807ec sun4v: Avoid using ASI_PHYS_NON_CACHED/ASI_PHYS_NON_CACHED_LITTLE in sparc_bus_map() since they are deprecated according to the UA2005 docs. Using the ASI_PRIMARY/ASI_PRIMARY_LITTLE seems to work. ok martin@ 2015-06-11 21:00:05 +00:00
gson
cebb0ef7cc Don't call exit() from a signal handler, as it's not async-signal-safe;
use _exit() instead.
2015-06-11 18:12:00 +00:00
matt
f804672e3b Remove PMAP_POOLPAGE_DEBUG latent code since it never worked. 2015-06-11 15:58:49 +00:00
khorben
64a1eb60ad Also document the "splash" command in boot(8) 2015-06-11 15:56:53 +00:00
matt
ff7750a4ef Define (but not use) separate kernel and user pagetables.
Move to the new names.
2015-06-11 15:50:17 +00:00
matt
b140ef278c No more sysmapsize. 2015-06-11 15:48:57 +00:00
matt
74c5c005f8 Use (uint64_t) to avoid 32-bit overflow 2015-06-11 15:43:36 +00:00
macallan
1af69ec73b use kcpuset_isset() 2015-06-11 15:38:18 +00:00
matt
ff6371c723 u_int32_t -> uint32_t 2015-06-11 15:36:26 +00:00
matt
957e288d74 Fix a type from kcpuset transition.
Deal with kcpuset_ffs return value a little more cleanly.
2015-06-11 15:15:27 +00:00
matt
078e3d0fa5 XXX cast NBPG to vaddr_t to avoid promotion to unsigned long. 2015-06-11 15:13:34 +00:00
matt
c525e41f98 Declare or #define avail_start and avail_end as appropriate 2015-06-11 15:11:13 +00:00
matt
34ff9ed42b Add avail_start, avail_end declarations. 2015-06-11 15:08:27 +00:00
matt
e3ec8c0595 Add tlb_asid_t 2015-06-11 14:32:16 +00:00
matt
9b83c0f5e6 Add struct pmap_limits and pm_{min,max}addr from uvm/pmap/map.h and use it to
store avail_start, avail_end, virtual_start, and virtual_end.
Remove iospace and let emips just bump pmap_limits.virtual_start to get the
VA space it needs.
pmap_segtab.c is almost identical to uvm/pmap/pmap_segtab.c now.  It won't
be long until we switch to the uvm/pmap one.
2015-06-11 08:22:08 +00:00
matt
bd7a43d981 Add stuff from mips_param.h that the .S files need. 2015-06-11 08:16:47 +00:00
matt
43b5e772f9 Move declaration of avail_start, avail_end to <machine/kloader.h> 2015-06-11 08:14:38 +00:00
matt
9861f869d0 Use PMAP_MAP_POOLPAGE instead of POOL_PHYSTOV since we use PMAP_UNMAP_POOLPAGE.
Use PMAP_ALLOC_POOLPAGE instead of pmap_md_alloc_poolpage.
Cleanup some panic messages.
2015-06-11 08:04:44 +00:00