Commit Graph

256070 Commits

Author SHA1 Message Date
uwe
44fdebe499 .Li is superfluous inside .Bd -literal 2018-01-25 19:15:10 +00:00
uwe
cef7c5ec5c Formatting fixes. 2018-01-25 18:56:17 +00:00
christos
a61f9804b8 sync with tzcode-2018c 2018-01-25 18:07:17 +00:00
riastradh
2414933e28 Don't call xennet_softstart from hard interrupt; schedule softint.
Fixes panic in bpf_mtap which expects to be called only in softint.
2018-01-25 17:41:49 +00:00
riastradh
977eeed81e Use a random opaque cookie, not kva pointer, for nfssvc(2).
(What were they smoking?!)

I suspect most of this is actually dead code that wasn't properly
amputated along with the rest of the gangrene of NFSKERB a decade
ago, but I'm out of time to investigate further.  If someone else
wants to kill NFSSVC_AUTHIN/NFSSVC_AUTHINFAIL and the rest of the
tentacular kerberosity, be my guest.

Noted by Silvio Cesare of InfoSect.
2018-01-25 17:14:36 +00:00
sborrill
396e43780a regen 2018-01-25 16:05:11 +00:00
sborrill
fcb1253faf Add Marvell Yukon 88E8040T 2018-01-25 16:02:12 +00:00
maxv
4eac13772c Remove outdated comment and fix typo. 2018-01-25 15:55:57 +00:00
maxv
e3090ee154 Several changes:
* Move the structure definitions into frag6.c, they should not be used
   elsewhere.

 * Rename ip6af_mff -> ip6af_more, and switch it to bool, easier to
   understand.

 * Remove IP6_REASS_MBUF, no point in keeping this.

 * Remove ip6q_arrive and ip6q_nxtp, unused.

 * Style.
2018-01-25 15:33:06 +00:00
prlw1
9ae336e207 Unused variable build fix. (now void *aux is unused) 2018-01-25 15:01:05 +00:00
macallan
1ca1edecf6 do boundary checks when writing cursor sprite colour registers 2018-01-25 14:45:58 +00:00
uwe
3d7806dc20 Xref the right driver. .An -nosplit Delint. 2018-01-25 10:52:49 +00:00
uwe
9bf96ecebe New sentence - new line. Sort sections. Use .Xr to refer to amdtemp(4). 2018-01-25 10:48:27 +00:00
maxv
eb74a6f9ba Style, reduce the indentation level when possible, and add a missing NULL
check after M_PREPEND.
2018-01-25 10:45:58 +00:00
maxv
8aca1b685f style 2018-01-25 10:33:37 +00:00
pgoyette
fe25815e38 Add missing article 'a' 2018-01-25 10:28:57 +00:00
uwe
3e8e18d0ab Fix .Dt name. Formatting fixes. 2018-01-25 10:15:24 +00:00
maxv
9594322d21 Improve wording. 2018-01-25 09:33:21 +00:00
maxv
a52cd3a837 Improve wording, and put a new drawing, from me and Kengo Nakahara. 2018-01-25 09:29:18 +00:00
wiz
b2f1e9e16f Revert previous.
obsolete + other tags is not easy to clean up.
2018-01-25 08:57:59 +00:00
pgoyette
1ae1c976fd Some clean-up on the HISTORY and AUTHORS sections, and addition of a BUGS
section to document the fact that we don't yet handle the required temp
offset, nor do we expose the available thermal-trip value.
2018-01-25 08:41:17 +00:00
yamaguchi
8df2d11139 Added myself. 2018-01-25 04:48:45 +00:00
christos
4ad47752f1 Add locking. 2018-01-25 03:54:57 +00:00
christos
26ca7efe45 use named initializers 2018-01-25 03:54:21 +00:00
ozaki-r
488f641d4a Fix another deadlock
When waiting for a route update to finish, a waiter has to release its reference
to the route to avoid a deadlock. Because a updater tries to wait for references
to a target route (except for a reference by the updater itself) to be released.
2018-01-25 03:09:05 +00:00
ozaki-r
6a3a8456d3 Abandon unnecessary softint
The softint was introduced to defer fownsignal that was called in bpf_wakeup to
softint at v1.139, but now bpf_wakeup always runs in softint so we don't need
the softint anymore.
2018-01-25 02:45:02 +00:00
christos
56571b081c man pages for amdsmn and amdzentemp 2018-01-25 01:25:39 +00:00
christos
3a74451db2 Add amdzentemp from FreeBSD via Ian Clark 2018-01-25 01:22:21 +00:00
christos
ed0e1dc203 add amdzentemp 2018-01-25 01:21:40 +00:00
sevan
fd1dcc07d4 regen 2018-01-24 22:25:48 +00:00
sevan
81f9cfef93 Add Nvidia GeForce FX Go5200, as found in the PowerBook6,4 2018-01-24 22:23:51 +00:00
skrll
e06438494b Remove references to arm26 2018-01-24 19:42:30 +00:00
skrll
2977c913b0 arm26 is gone. 2018-01-24 19:29:36 +00:00
macallan
2e8b74c2b6 note to self: OF_getprop() returns -1 on error
now this works properly on sevan's iMac G4
2018-01-24 17:21:03 +00:00
sevan
0042c4a241 typo, remove extra bracket 2018-01-24 14:45:44 +00:00
maxv
e65efd3f91 style 2018-01-24 14:39:14 +00:00
maxv
715fe7f306 As I said in my last commit in this file, ipo should be set to NULL;
otherwise the 'local address spoofing' check below is always wrong on
IPv6.
2018-01-24 14:37:34 +00:00
maxv
61a2b14b11 Fix the iteration: IPPROTO_FRAGMENT options are special, in the sense
that they don't have a 'length' field. It is therefore incorrect to
read ip6e.ip6e_len, it contains garbage.

I'm not sure whether this an exploitable vulnerability. Because of this
bug you could theoretically craft 'protoff', which means that you can
have the kernel patch the nxt value at the wrong place once the packet
is decrypted. Perhaps it can be used in some unusual MITM - a router that
happens to be between two IPsec hosts adds a frag6 option in the outer
IPv6 header to trigger the bug in the receiver -, but I couldn't come up
with anything worrying.
2018-01-24 14:28:13 +00:00
maxv
99712ef7e1 ipsec4_fixup_checksum calls m_pullup, so don't forget to do mtod() again,
to prevent use-after-free.

In fact, the m_pullup call is never reached: it is impossible for 'skip'
to be zero in this function, so add an XXX for now.
2018-01-24 14:01:40 +00:00
kre
6860c2675d Note update to tzdata2018c 2018-01-24 13:57:37 +00:00
maxv
e944e8579a Add missing NULL check. Normally that's not triggerable remotely, since we
are guaranteed that 8 bytes are valid at mbuf+skip.
2018-01-24 13:54:16 +00:00
kre
8aab451628 Merge tzdata2018c 2018-01-24 13:52:47 +00:00
kre
35c0382b5f Import tzdata2018c from ftp://ftp.iana.org/tz/releases/tzdata2018c.tar.gz
Summary of changes in tzdata2018c (2018-01-22 23:00:44 -0800):
Summary of changes in tzdata2018b (2018-01-17 23:24:48 -0800):
Summary of changes in tzdata2018a (2018-01-12 22:29:21 -0800):

	2018a and 2018b were (kind of) released, but never announced.
	Some "issues" were found with them that caused the relatively
	quick updates...

	The updates are from the previous version (2017c) to the
	current one (2018c) - that 2018a & 2018b intervened is best
	forgotten... (changes in 2018a that were corrected (2018b) or
	reverted (2018c) are not mentioned).

  Briefly:

     Sao Tome and Principe (An island nation off west coast of Equatorial Africa)
     switched from +00 to +01.

     Brazil's DST will now start on November's first Sunday.

     Use Debian-style installation locations, instead of 4.3BSD-style.
	(this does not affect NetBSD, we do not use the tzdata Makefile)

  Changes to past and future time stamps

    Sao Tome and Principe switched from +00 to +01 on 2018-01-01 at
    01:00.  (Thanks to Steffen Thorsen and Michael Deckers.)

  Changes to future time stamps

    Starting in 2018 southern Brazil will begin DST on November's
    first Sunday instead of October's third Sunday.  (Thanks to
    Steffen Thorsen.)

  Changes to past time stamps

    Japanese DST transitions (1948-1951) were Sundays at 00:00, not
    Saturdays or Sundays at 02:00.  (Thanks to Takayuki Nikai.)

    A discrepancy of 4 s in timestamps before 1931 in South Sudan has
    been corrected.  The 'backzone' and 'zone.tab' files did not agree
    with the 'africa' and 'zone1970.tab' files.  (Problem reported by
    Michael Deckers.)

    The abbreviation invented for Bolivia Summer Time (1931-2) is now
    BST instead of BOST, to be more consistent with the convention
    used for Latvian Summer Time (1918-9) and for British Summer Time.
2018-01-24 13:51:56 +00:00
maxv
e6e440140b Reinforce and clarify. 2018-01-24 13:49:23 +00:00
maxv
152f060813 Fix a vulnerability in IPsec-IPv6-AH, that allows an attacker to remotely
crash the kernel with a single packet.

In this loop we need to increment 'ad' by two, because the length field
of the option header does not count the size of the option header itself.

If the length is zero, then 'count' is incremented by zero, and there's
an infinite loop. Beyond that, this code was written with the assumption
that since the IPv6 packet already went through the generic IPv6 option
parser, several fields are guaranteed to be valid; but this assumption
does not hold because of the missing '+2', and there's as a result a
triggerable buffer overflow (write zeros after the end of the mbuf,
potentially to the next mbuf in memory since it's a pool).

Add the missing '+2', this place will be reinforced in separate commits.
2018-01-24 13:30:47 +00:00
maxv
b4eb3b6cdd Revert a part of rev1.49 (six months ago). The pointer given to memcpy
was correct.

Discussed with Christos and Ryota.
2018-01-24 13:13:11 +00:00
uwe
ad8c206f39 Try to use proper semantic markup. Fix a few formatting nits. 2018-01-24 12:05:50 +00:00
uwe
6a5e01dbb3 It's not literal "-options" so use .Ar 2018-01-24 12:04:47 +00:00
wiz
2546a1bb78 sqlite-3.22 out. 2018-01-24 10:46:14 +00:00
wiz
a7c4479cc6 Remove macros without effect. 2018-01-24 10:04:28 +00:00