Commit Graph

237117 Commits

Author SHA1 Message Date
mrg
5414ce041b for now, use gdb.old. 2015-08-15 21:12:28 +00:00
mrg
4a7a9971a5 add a bunch of missing CLEANDIRFILES, since the implicit rules they
come from are not entirely simple to generate.

remove old DIST= setting that was wrong.

this subdir builds again for me now.
2015-08-15 21:11:37 +00:00
mrg
0249ef23ac this is gdb.old, not gdb.
XXX: put this in bsd.own.mk?
2015-08-15 20:57:37 +00:00
mrg
67a23d995b re-run mknative binutils for powerpc. 2015-08-15 19:54:02 +00:00
wiz
7b9a747246 Mark up NULL with Dv. 2015-08-15 16:39:58 +00:00
maxv
812c7f05b0 Mention UVM_KMF_EXEC. 2015-08-15 10:31:41 +00:00
christos
968cf8f21f import new gdb 2015-08-15 10:24:36 +00:00
maxv
73ef0e67c2 Remove pax_adjust() (does not exist). 2015-08-15 10:24:29 +00:00
christos
837edd6b4e import new gdb 2015-08-15 10:18:10 +00:00
maxv
13c3729cf1 Remove POOL_INIT() (does not exist). 2015-08-15 10:18:07 +00:00
christos
b23b258258 import new gdb 2015-08-15 09:56:15 +00:00
christos
9d2109275e import new gdb 2015-08-15 09:46:14 +00:00
christos
8986534fbd switch everyone to gdb.old 2015-08-15 09:34:17 +00:00
uebayasi
2d6876178b Whitespace. 2015-08-15 09:33:55 +00:00
christos
0ab5b34041 import the head of gdb in gdb.old in preparation for the new gdb import. 2015-08-15 09:27:49 +00:00
nonaka
159e64b751 regen 2015-08-14 16:50:15 +00:00
nonaka
c4a9fc464c Added ASMedia ASM1042A USB 3.0 Host Controller. 2015-08-14 16:49:43 +00:00
martin
46b12960f1 Make it compilable without DIAGNOSTIC 2015-08-14 15:27:28 +00:00
nakayama
3a8c4b6cb5 pckbc@ebus: match "kb_ps2" device to make keyboard and mouse work
on qemu-sparc64.

XXX OpenBIOS doesn't provide interrupts for pckbc currently, so use
the interrupt numbers described in QEMU's hw/sparc64/sun4u.c::isa_irq_handler.
2015-08-14 10:59:27 +00:00
msaitoh
ab295c3e51 - Add Hardware-Controlled Performance States (HWP) bits.
- Use __BIT()
2015-08-14 06:54:22 +00:00
knakahara
f60a13e999 fix pci_get_ht_capability(9). 2015-08-14 06:48:11 +00:00
msaitoh
5f784f1f39 - Fix uninitialized data.
- include vlan.h and check NVLAN.
2015-08-14 06:05:40 +00:00
knakahara
1d72faad3b fix: missing pci_get_ht_capability(9) to distrib/sets/lists. 2015-08-14 02:35:32 +00:00
nakayama
e863f737b3 Detect a boot device more precisely on QEMU by checking the device
name.
2015-08-14 02:28:18 +00:00
knakahara
ae22aa76b8 Add pci_get_ht_capability(9) man. 2015-08-14 02:04:16 +00:00
knakahara
104d6d9fe1 regen 2015-08-14 01:26:38 +00:00
knakahara
a3c8dd6d16 Add Marvell 88E1512. 2015-08-14 01:23:17 +00:00
knakahara
95cf80e14d regen 2015-08-14 01:15:38 +00:00
knakahara
a50d5a0768 Add Marvell Armada38x. 2015-08-14 01:11:49 +00:00
rjs
314f76f867 Add gem versions of collision counters. 2015-08-13 14:51:35 +00:00
leot
ea36dfc342 Add myself. 2015-08-13 13:21:04 +00:00
wiz
9e1c9adfc5 Remove trailing space in boast. 2015-08-13 12:30:08 +00:00
christos
0b6a748c0a New tzcode 2015-08-13 11:30:17 +00:00
christos
d856f74aad merge 2015f 2015-08-13 11:21:18 +00:00
christos
c64627c274 bump for openssh 2015-08-13 10:36:38 +00:00
christos
851c23a318 new openssh 2015-08-13 10:36:31 +00:00
christos
8395c1339a merge conflicts 2015-08-13 10:33:21 +00:00
christos
fa879c24ed bump version 2015-08-13 10:32:36 +00:00
christos
f453f1d467 import openssh-7.0
Changes since OpenSSH 6.9
=========================

This focus of this release is primarily to deprecate weak, legacy
and/or unsafe cryptography.

Security
--------

 * sshd(8): OpenSSH 6.8 and 6.9 incorrectly set TTYs to be world-
   writable. Local attackers may be able to write arbitrary messages
   to logged-in users, including terminal escape sequences.
   Reported by Nikolay Edigaryev.

 * sshd(8): Portable OpenSSH only: Fixed a privilege separation
   weakness related to PAM support. Attackers who could successfully
   compromise the pre-authentication process for remote code
   execution and who had valid credentials on the host could
   impersonate other users.  Reported by Moritz Jodeit.

 * sshd(8): Portable OpenSSH only: Fixed a use-after-free bug
   related to PAM support that was reachable by attackers who could
   compromise the pre-authentication process for remote code
   execution. Also reported by Moritz Jodeit.

 * sshd(8): fix circumvention of MaxAuthTries using keyboard-
   interactive authentication. By specifying a long, repeating
   keyboard-interactive "devices" string, an attacker could request
   the same authentication method be tried thousands of times in
   a single pass. The LoginGraceTime timeout in sshd(8) and any
   authentication failure delays implemented by the authentication
   mechanism itself were still applied. Found by Kingcope.

Potentially-incompatible Changes
--------------------------------

 * Support for the legacy SSH version 1 protocol is disabled by
   default at compile time.

 * Support for the 1024-bit diffie-hellman-group1-sha1 key exchange
   is disabled by default at run-time. It may be re-enabled using
   the instructions at http://www.openssh.com/legacy.html

 * Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled
   by default at run-time. These may be re-enabled using the
   instructions at http://www.openssh.com/legacy.html

 * Support for the legacy v00 cert format has been removed.

 * The default for the sshd_config(5) PermitRootLogin option has
   changed from "yes" to "prohibit-password".

 * PermitRootLogin=without-password/prohibit-password now bans all
   interactive authentication methods, allowing only public-key,
   hostbased and GSSAPI authentication (previously it permitted
   keyboard-interactive and password-less authentication if those
   were enabled).

New Features
------------

 * ssh_config(5): add PubkeyAcceptedKeyTypes option to control which
   public key types are available for user authentication.

 * sshd_config(5): add HostKeyAlgorithms option to control which
   public key types are offered for host authentications.

 * ssh(1), sshd(8): extend Ciphers, MACs, KexAlgorithms,
   HostKeyAlgorithms, PubkeyAcceptedKeyTypes and HostbasedKeyTypes
   options to allow appending to the default set of algorithms
   instead of replacing it. Options may now be prefixed with a '+'
   to append to the default, e.g. "HostKeyAlgorithms=+ssh-dss".

 * sshd_config(5): PermitRootLogin now accepts an argument of
   'prohibit-password' as a less-ambiguous synonym of 'without-
   password'.

Bugfixes
--------

 * ssh(1), sshd(8): add compatability workarounds for Cisco and more
   PuTTY versions. bz#2424

 * Fix some omissions and errors in the PROTOCOL and PROTOCOL.mux
   documentation relating to Unix domain socket forwarding;
   bz#2421 bz#2422

 * ssh(1): Improve the ssh(1) manual page to include a better
   description of Unix domain socket forwarding; bz#2423

 * ssh(1), ssh-agent(1): skip uninitialised PKCS#11 slots, fixing
   failures to load keys when they are present. bz#2427

 * ssh(1), ssh-agent(1): do not ignore PKCS#11 hosted keys that wth
   empty CKA_ID; bz#2429

 * sshd(8): clarify documentation for UseDNS option; bz#2045
2015-08-13 10:25:51 +00:00
ozaki-r
14dcf9ff75 Reflect a fix on rt_refcnt
The test was adjusted based on wrong behavior.
2015-08-13 10:22:21 +00:00
ozaki-r
c1f0857176 Remove extra rt_refcnt++ in rtalloc1
rtrequest has already done it. So we don't need to do it once more.

This fixes regressed behavior of ARP cache expiration which an expired
cache doesn't disappear.
2015-08-13 10:14:26 +00:00
msaitoh
76e03c6b0b Reduce diff against FreeBSD r280181. 2015-08-13 10:03:37 +00:00
shm
7d14271c4e Extend AUTHORS section. Nobody likes a braggart.
OK mrg@
2015-08-13 09:00:29 +00:00
ozaki-r
e12cf6b309 Move rtfree to a common place
This change also plugs a missing rtfree on an error path.
2015-08-13 07:59:05 +00:00
msaitoh
90a6dc2de1 MSI and MSI-X are supported now. 2015-08-13 05:02:37 +00:00
msaitoh
cf6cd3a5c4 Change pci_msi[x]_count()'s argument. 2015-08-13 05:01:04 +00:00
msaitoh
f5fe29e986 Compile ixv(4) by default. 2015-08-13 04:58:03 +00:00
msaitoh
57d62ed3a8 - Add MSI/MSI-X support. The multiqueue function is not supported yet.
- Make ixv.c compilable. _NOT_TESTED_YET_
2015-08-13 04:56:43 +00:00
msaitoh
eae4f48c70 Add workaround for PCI prefetchable bit in msipic_construct_msix_pic().
Some chips (e.g. Intel 82599) report SERR and MSI-X interrupt doesn't work.
This problem might not be the driver's bug but our PCI common part or VMs'
bug. See fxp(4), bge(4) and ixgbe(4). All of them has the same workaround
related to prefetchable bit. For the MSI-X table area, it should not have side
effect by prefetching. Until we find a real reason, we ignore the prefetchable
bit.
2015-08-13 04:52:40 +00:00
msaitoh
b62abb6e08 - Don't take pci_attach_args as an argument in pci_msi[x]_count().
- Move prototypes of pci_msi[x]_count() from x86/x86/pci_machdep_common to
  sys/dev/pci/pcivar.h.
- Move pci_msi[x]_count() from x86/pci/pci_msi_machdep.c to sys/dev/pci/pci.c
2015-08-13 04:39:33 +00:00