Commit Graph

235446 Commits

Author SHA1 Message Date
pgoyette 2d1ae66403 Additional commentary for where other duplicate entries might need to
be made (amd64-xen, i386-xen, and i386-xen-pae).
2015-05-11 01:05:16 +00:00
jmcneill 60e61de69c remove debug printf 2015-05-10 23:56:21 +00:00
jmcneill 3bc45873a8 add tegrai2c (I2C[12345]) and seeprom on I2C1 2015-05-10 23:51:08 +00:00
jmcneill 520aad9552 Tegra I2C driver 2015-05-10 23:50:21 +00:00
jmcneill 987ded3f77 Many I2C drivers hold spin locks between iic_acquire_bus / iic_release_bus.
Avoid sleeping while owning the I2C bus.
2015-05-10 22:54:06 +00:00
mlelstv dfeac6dbe6 Don't report EINVAL errors when searching the bootwedge, this error
is most likely the result of reading beyond the end of the wrong disk.
2015-05-10 22:21:38 +00:00
mlelstv ef0ab974cd If BTINFO_ROOTDEVICE is set but isn't a device name, then treat it
as a root specification. This allows strings like wedge:wedgename.
2015-05-10 22:18:58 +00:00
joerg 66e60a49ac Include printf by default even for SMALL builds. It is used e.g. by
dhcpcd and as such required by most ramdisk images. Allow turning it off
again by TINYPROG.
2015-05-10 20:30:54 +00:00
rtr a05061a0c1 mtod mbuf to sockaddr * for so_send(). 2015-05-10 18:55:22 +00:00
jmcneill 5fce422d60 Tegra SATA ungating support 2015-05-10 15:31:48 +00:00
christos 3af9216dd2 CID 976256: Help coverity understand that when the list is empty the head
is NULL.
2015-05-10 14:08:54 +00:00
christos 524046d70c PR/975220: Check return of kthread_create 2015-05-10 14:05:22 +00:00
christos 65bd814e25 CID 274829: Check error from fd_getfile to avoid NULL deref immediately
after.
2015-05-10 14:00:42 +00:00
jmcneill 23bcc13e35 half-attached sdhc breaks reset for some reason, so disable eMMC until we fix it 2015-05-10 13:24:11 +00:00
jmcneill 41f97c365d correct CAR_PLLX_MISC_REG value 2015-05-10 11:12:07 +00:00
jmcneill 84ff9bb7c1 Tegra HD audio support (untested as it is for HDMI output) 2015-05-10 11:04:59 +00:00
martin e21052b4e5 Backout the previous incorrect fix for PR 49440 and redo it more globaly:
get rid of the global "yesno", introduce utility functions "ask_yesno()"
and "ask_noyes()" instead, greatly simplifying a lot of code.
Pass in a pointer to the return value to various "set source" menus.
2015-05-10 10:14:02 +00:00
martin b3b23df81a Sort DBG vs CPPFLAGS in the DEBUG case, as requested by Christos 2015-05-10 09:13:15 +00:00
pgoyette 5608b80ca0 Regen for changes related to separation of compat_sysv syscalls into a
separate module.
2015-05-10 08:13:41 +00:00
pgoyette fb37507887 Update sets lists for new compat_sysv module. 2015-05-10 07:50:31 +00:00
pgoyette ff00f0b594 Split the SYSV* compat code out into a separate compat_sysv module.
For monolithic kernels, both modules will be compiled as "built-ins",
while modular environments will be able to load the SYSVSEM, SYSVSHM,
and SYSVMSG code independant from the rest of compat.

This is a necessary precursor step to making the "STD" SYSV* code
into a separate module.

Tested in both monolithic and modular environments with no errors
seen.
2015-05-10 07:41:15 +00:00
matt 5963c77816 mips doesn't do a.out and never has. 2015-05-10 06:33:28 +00:00
dholland 5a52d2d51f Remove pointless casts. 2015-05-09 23:29:51 +00:00
dholland 90a10bbb8a Make error() printflike instead of using sprintf before calling it. 2015-05-09 23:28:43 +00:00
dholland 98fbb52a77 Use proper (enough) parentheses in macro expansion. 2015-05-09 23:19:34 +00:00
dholland 86f52a859f Use errx when malloc fails, and also don't cast the return value of
malloc/realloc.
2015-05-09 23:16:51 +00:00
dholland d4e3de0b16 one crash -> errx Christos missed 2015-05-09 23:14:22 +00:00
dholland ceecfabaa7 Polish the error messages.
Don't use warn/err to print error messages about the input, as
prepending the program name to those both isn't helpful and confuses
programs that try to parse compile logs.
2015-05-09 23:12:57 +00:00
dholland d1ac143f58 #if 0 code should still compile :-) 2015-05-09 22:58:22 +00:00
dholland de33725fda use standard idiom - thanks riastradh@ 2015-05-09 22:23:40 +00:00
riastradh 8569198c39 Defer to a callout in hifn_rng_get. Fixes lock-against-self.
Still can't call rnd_add_data directly from an rndsource callback.

(Still plan to fix this with further rnd rototilling.)

XXX pullup netbsd-7
2015-05-09 21:57:56 +00:00
christos 896b64cf70 regen 2015-05-09 21:54:35 +00:00
christos f8af8a7dd9 PR/49889: Maxim Tsyplakov: support for D-Link DFE520TX 2015-05-09 21:53:45 +00:00
christos 8cde9e3d9b modernize:
- make crash() called atexit
	- use err/errx
	- remove __P
2015-05-09 21:44:47 +00:00
dholland a409b95d7f Coverity CID 975184: don't ignore pmf_device_register failure.
(XXX: unfortunately all we can do for the moment is print a warning)
2015-05-09 21:31:05 +00:00
christos f4ad1a1253 use EXIT_SUCCESS/EXIT_FAILURE consistently. 2015-05-09 21:22:18 +00:00
christos 430343a0c6 The L (Length) and M (More) flags needs to be cleared before deciding
whether the locally generated response requires fragmentation. This
fixes an issue where these flags from the server could have been invalid
for the following message. In some cases, this could have resulted in
triggering the wpabuf security check that would terminate the process
due to invalid buffer allocation.

XXX: pullup-7
2015-05-09 19:51:43 +00:00
christos 38d77090f3 The remaining number of bytes in the message could be smaller than the
Total-Length field size, so the length needs to be explicitly checked
prior to reading the field and decrementing the len variable. This could
have resulted in the remaining length becoming negative and interpreted
as a huge positive integer.

In addition, check that there is no already started fragment in progress
before allocating a new buffer for reassembling fragments. This avoid a
potential memory leak when processing invalid message.

XXX: pullup-7
2015-05-09 19:49:28 +00:00
christos 11ce78e57f The length of the received Commit and Confirm message payloads was not
checked before reading them. This could result in a buffer read
overflow when processing an invalid message.

Fix this by verifying that the payload is of expected length before
processing it. In addition, enforce correct state transition sequence to
make sure there is no unexpected behavior if receiving a Commit/Confirm
message before the previous exchanges have been completed.

Thanks to Kostya Kortchinsky of Google security team for discovering and
reporting this issue.

XXX: pullup-7
2015-05-09 19:46:01 +00:00
christos c23d0f7f66 The length of the WMM Action frame was not properly validated and the
length of the information elements (int left) could end up being
negative. This would result in reading significantly past the stack
buffer while parsing the IEs in ieee802_11_parse_elems() and while doing
so, resulting in segmentation fault.

This can result in an invalid frame being used for a denial of service
attack (hostapd process killed) against an AP with a driver that uses
hostapd for management frame processing (e.g., all mac80211-based
drivers).

Thanks to Kostya Kortchinsky of Google security team for discovering and
reporting this issue.

XXX: pullup-7
2015-05-09 19:35:15 +00:00
christos e4bfca3a3e strtoul() return value may end up overflowing the int h->chunk_size and
resulting in a negative value to be stored as the chunk_size. This could
result in the following memcpy operation using a very large length
argument which would result in a buffer overflow and segmentation fault.

This could have been used to cause a denial service by any device that
has been authorized for network access (either wireless or wired). This
would affect both the WPS UPnP functionality in a WPS AP (hostapd with
upnp_iface parameter set in the configuration) and WPS ER
(wpa_supplicant with WPS_ER_START control interface command used).

Validate the parsed chunk length value to avoid this. In addition to
rejecting negative values, we can also reject chunk size that would be
larger than the maximum configured body length.

Thanks to Kostya Kortchinsky of Google security team for discovering and
reporting this issue.

XXX: pullup-7
2015-05-09 19:33:47 +00:00
dholland 116f085a39 Update HISTORY from OpenBSD: strerror from 4.3 Reno, perror from v4.
(this page was claiming both were from 4.4, which is clearly rubbish)
2015-05-09 19:01:53 +00:00
jmcneill 430e427719 Jetson TK1: USB1 VBUS power is controlled by GPIO N4 2015-05-09 18:57:30 +00:00
jmcneill 245d537bdd Tegra USB PHY support 2015-05-09 18:56:51 +00:00
christos 925d349b50 tricks with sizeof() make coverity complain. 2015-05-09 18:49:36 +00:00
dholland a9ad5ddc08 Also check the other emitted getrlimit call for failure. 2015-05-09 18:48:14 +00:00
christos 37fd390ec4 if no address was found, don't check if it is tentative (hi Roy) 2015-05-09 18:47:26 +00:00
christos 28383371f1 assign sin only when it is needed 2015-05-09 18:46:25 +00:00
dholland d4f9fa9c7c perror -> warn 2015-05-09 18:32:04 +00:00
dholland c0ca3685e5 check setrlimit too 2015-05-09 18:22:37 +00:00