Commit Graph

239368 Commits

Author SHA1 Message Date
christos
8d14d38c26 If we did not setup the tty, don't reset it. 2015-12-08 12:57:16 +00:00
christos
a2993d741e Only reset the terminal if we have a tty (Boris Ranto) 2015-12-08 12:56:55 +00:00
christos
a40b6ba18c more changes I forgot to commit 2015-12-08 12:51:21 +00:00
christos
5fd02f85b5 preserve a copy of the tm so we can check later. 2015-12-08 12:51:04 +00:00
christos
8861b14877 Kill one more REL_DEBUG, from kre 2015-12-08 12:41:28 +00:00
knakahara
5ff0670ba7 add gif test for set_tunnel/delete_tunnel and recursion calls check 2015-12-08 05:56:18 +00:00
pgoyette
d677b0d63e Update calculations for DDR4 devices. This gets 1066MHz modules to
report as PC4-17000.

XXX Due to insufficient precision in the SPD ROM data, we still report
XXX these modules with a DDR speed of 2132MHz, not 2133.  :(  (The
XXX cycle time is really 937.5ps, but is stored in the ROM as 938.0ps)
2015-12-08 02:09:23 +00:00
christos
317f295fe6 unfortunately it is not that easy to get rid of DIOCGPART. DTRT for the
raw partition and print a warning if we overflowed. I guess the right solution
for this is to create yet another version of disklabel that is 64 bit friendly.
2015-12-08 01:57:13 +00:00
pgoyette
c423c59d2d Update to match reality. For these functions, we still try the system
call first, and only fall back to /dev/clockctl if the system call
fails.
2015-12-07 23:20:57 +00:00
jdc
a987263c2d Use the destination buffer size when copying strings.
(Didn't matter in practice, because the destination was large enough.)
2015-12-07 20:59:44 +00:00
christos
da8d5d2ae7 there is no REL_DEBUG 2015-12-07 20:57:39 +00:00
christos
5e2a9cf1aa - Add support for "midnight" "noon", dawn etc.
- Add validation to date/time strings by checking that mktime did not change
  the fields of struct tm from the ones requested
- Allow the format "year monthname day".
From kre
2015-12-07 20:55:49 +00:00
christos
432cd4b9b7 new tests from kre 2015-12-07 20:52:46 +00:00
christos
4797f766ea don't release mutexes you did not enter? Please develop with LOCKDEBUG on! 2015-12-07 20:01:43 +00:00
christos
0b8ed6c54e regen 2015-12-07 14:40:23 +00:00
christos
9f215db8af name moschip devices consistently 2015-12-07 14:40:03 +00:00
msaitoh
19237ec8fd Bugfixes
- Calculate cycle_time correctly. _ftb is from +127 to -128.
  - Print latency in correct order.
- Don't print the size twice.
- KNF
2015-12-07 14:13:05 +00:00
pgoyette
42f5fa5fd3 Modularize drvctl(4) 2015-12-07 11:38:46 +00:00
knakahara
674e3a0ad1 remove extra shebang and fix a potentially bug 2015-12-07 09:59:26 +00:00
mlelstv
5fcead8f12 Handle reading of 4kbit EEPROMs in SPD devices. This is needed for DDR4 DIMMs. 2015-12-07 09:41:37 +00:00
pgoyette
887f46ade5 Forgot this file in previous commit (modularization of clockctl(4)) 2015-12-07 06:28:22 +00:00
ozaki-r
c6e461ee0d CID 1341546: Fix integer handling issue (CONSTANT_EXPRESSION_RESULT)
n > INT_MAX where n is a long integer variable never be true on 32bit
architectures. Use time_t(int64_t) instead of long for the variable.
2015-12-07 06:19:13 +00:00
pgoyette
1aa8a7614b synch usage() with the man page. 2015-12-07 03:34:00 +00:00
pgoyette
8285edda53 Modularize the clockctl pseudo-device and link to the build. 2015-12-07 03:25:57 +00:00
kamil
d3f055bfc7 Improve the httpd(8) printenv.lua Lua example
Stop using Lua builtin print function and replace them with http.* ones.
httpd.print and http.write wraps SSL support when needed.

Print http headers, without them browser may interpret page as raw text.

No need to hardcode prefix path in the form.

Add comments for a user with tips how to use this script.

Patch by Travis Paul

Closes PR misc/50502
2015-12-07 03:11:48 +00:00
christos
e2c3609f82 new openssl 2015-12-06 21:54:26 +00:00
christos
261bb38818 merge conflicts 2015-12-06 21:52:35 +00:00
christos
3e7df5c261 Import openssl-1.0.1q
OpenSSL Security Advisory [3 Dec 2015] - Updated [4 Dec 2015]
=============================================================

[Updated 4 Dec 2015]: This advisory has been updated to include the details of
CVE-2015-1794, a Low severity issue affecting OpenSSL 1.0.2 which had a fix
included in the released packages but was missed from the advisory text.

NOTE: WE ANTICIPATE THAT 1.0.0t AND 0.9.8zh WILL BE THE LAST RELEASES FOR THE
0.9.8 AND 1.0.0 VERSIONS AND THAT NO MORE SECURITY FIXES WILL BE PROVIDED (AS
PER PREVIOUS ANNOUNCEMENTS). USERS ARE ADVISED TO UPGRADE TO LATER VERSIONS.

BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193)
==================================================================

Severity: Moderate

There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No
EC algorithms are affected. Analysis suggests that attacks against RSA and DSA
as a result of this defect would be very difficult to perform and are not
believed likely. Attacks against DH are considered just feasible (although very
difficult) because most of the work necessary to deduce information
about a private key may be performed offline. The amount of resources
required for such an attack would be very significant and likely only
accessible to a limited number of attackers. An attacker would
additionally need online access to an unpatched system using the target
private key in a scenario with persistent DH parameters and a private
key that is shared between multiple clients. For example this can occur by
default in OpenSSL DHE based SSL/TLS ciphersuites.

This issue affects OpenSSL version 1.0.2.

OpenSSL 1.0.2 users should upgrade to 1.0.2e

This issue was reported to OpenSSL on August 13 2015 by Hanno
Böck. The fix was developed by Andy Polyakov of the OpenSSL
development team.

Certificate verify crash with missing PSS parameter (CVE-2015-3194)
===================================================================

Severity: Moderate

The signature verification routines will crash with a NULL pointer dereference
if presented with an ASN.1 signature using the RSA PSS algorithm and absent
mask generation function parameter. Since these routines are used to verify
certificate signature algorithms this can be used to crash any certificate
verification operation and exploited in a DoS attack. Any application which
performs certificate verification is vulnerable including OpenSSL clients and
servers which enable client authentication.

This issue affects OpenSSL versions 1.0.2 and 1.0.1.

OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q

This issue was reported to OpenSSL on August 27 2015 by Loïc Jonas Etienne
(Qnective AG). The fix was developed by Dr. Stephen Henson of the OpenSSL
development team.

X509_ATTRIBUTE memory leak (CVE-2015-3195)
==========================================

Severity: Moderate

When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
memory. This structure is used by the PKCS#7 and CMS routines so any
application which reads PKCS#7 or CMS data from untrusted sources is affected.
SSL/TLS is not affected.

This issue affects OpenSSL versions 1.0.2 and 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q
OpenSSL 1.0.0 users should upgrade to 1.0.0t
OpenSSL 0.9.8 users should upgrade to 0.9.8zh

This issue was reported to OpenSSL on November 9 2015 by Adam Langley
(Google/BoringSSL) using libFuzzer. The fix was developed by Dr. Stephen
Henson of the OpenSSL development team.

Race condition handling PSK identify hint (CVE-2015-3196)
=========================================================

Severity: Low

If PSK identity hints are received by a multi-threaded client then
the values are wrongly updated in the parent SSL_CTX structure. This can
result in a race condition potentially leading to a double free of the
identify hint data.

This issue was fixed in OpenSSL 1.0.2d and 1.0.1p but has not been previously
listed in an OpenSSL security advisory. This issue also affects OpenSSL 1.0.0
and has not been previously fixed in an OpenSSL 1.0.0 release.

OpenSSL 1.0.2 users should upgrade to 1.0.2d
OpenSSL 1.0.1 users should upgrade to 1.0.1p
OpenSSL 1.0.0 users should upgrade to 1.0.0t

The fix for this issue can be identified in the OpenSSL git repository by commit
ids 3c66a669dfc7 (1.0.2), d6be3124f228 (1.0.1) and 1392c238657e (1.0.0).

The fix was developed by Dr. Stephen Henson of the OpenSSL development team.

Anon DH ServerKeyExchange with 0 p parameter (CVE-2015-1794)
============================================================

Severity: Low

If a client receives a ServerKeyExchange for an anonymous DH ciphersuite with
the value of p set to 0 then a seg fault can occur leading to a possible denial
of service attack.

This issue affects OpenSSL version 1.0.2.

OpenSSL 1.0.2 users should upgrade to 1.0.2e

This issue was reported to OpenSSL on August 3 2015 by Guy Leaver (Cisco). The
fix was developed by Matt Caswell of the OpenSSL development team.

Note
====

As per our previous announcements and our Release Strategy
(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions
1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these
versions will be provided after that date. In the absence of significant
security issues being identified prior to that date, the 1.0.0t and 0.9.8zh
releases will be the last for those versions. Users of these versions are
advised to upgrade.


References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv/20151203.txt

Note: the online version of the advisory may be updated with additional
details over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html
2015-12-06 21:45:41 +00:00
christos
640422f86c Fix west australia offset, from kre 2015-12-06 14:43:59 +00:00
wiz
e54f25a390 gdb-7.10.1 out. 2015-12-06 10:40:51 +00:00
msaitoh
eca6c3c1c9 KNF. 2015-12-06 09:44:13 +00:00
wiz
97b0e5c3cc Fix typo in comment. 2015-12-06 09:38:54 +00:00
wiz
3602b021e6 Bump date for previous. 2015-12-06 09:38:21 +00:00
wiz
34c418c523 Bump date for previous.
Remove trailing whitespace.
2015-12-06 09:36:57 +00:00
msaitoh
c52f0d4278 Fix the definition of DDR4's tFAW (offset 0x24). 2015-12-06 09:31:20 +00:00
mlelstv
4a1ce99b9b Clean up assertions and catch integer overflow. 2015-12-06 08:53:22 +00:00
mlelstv
a2fbab6210 document new pin configuration flags 2015-12-06 07:40:04 +00:00
mlelstv
b92b935f14 pass new pin configuration flags to driver. 2015-12-06 07:31:28 +00:00
christos
56604dcf08 remove more duplicated code. 2015-12-06 04:27:05 +00:00
tsutsui
e9ca2f5972 Make options SCIFCONSOLE patchable via a variable using gdb(1) etc.
Tested on dreamcast.
2015-12-06 02:21:55 +00:00
tsutsui
a97dd8a4c1 Convert tsleep(9)/wakeup(9) pairs to condvar(9) with mutex(9).
Briefly tested with mkbd(4).
2015-12-06 02:04:10 +00:00
christos
4d523900d0 Add listing commands for type, set and unset.
Add help and formatting for set and unset.
Change show to print all the attribute info in one line.
2015-12-06 00:39:26 +00:00
christos
1580202168 Add test for type, set, unset 2015-12-06 00:38:30 +00:00
marty
193691568d try 2 2015-12-06 00:33:44 +00:00
marty
327d10328a Reorganize Exynos code step 1 of N
create config files that use evbarm/exynos rather than evbarm/odroid for
the machdep portion.

point ODROID-XU4 at those files

add evbarm/exynos/exyos_{start.S, machdep.c} and platform.h that are exynos
5422 specific.  -- We'll edit in other exynos platforms once this one
fully works.

This boots the Odroid XU4 to the same point as using evbarm/odroid does, but
with some differences in gpio handling.  Everything else should be semantically
equivalent.
2015-12-06 00:31:24 +00:00
christos
ce40c86d4c more variables 2015-12-05 18:53:29 +00:00
christos
a1fb78d5a0 file shuffling 2015-12-05 18:52:11 +00:00
christos
1ec7975205 new files 2015-12-05 18:47:43 +00:00
christos
4eb04fb6c1 Add debugging and more to migration 2015-12-05 18:46:08 +00:00
christos
ac8087a5ab Add a migration test 2015-12-05 18:45:35 +00:00