Commit Graph

234094 Commits

Author SHA1 Message Date
matt d87c4ff51d Preserve/restore user r/w tpid in mcontext. 2015-03-24 08:38:29 +00:00
wiz fc5db8c0e8 Put fseeko, ftello, pread, and pwrite in the POSIX 2001 namespace.
Ok christos, apb, martin
2015-03-24 07:44:52 +00:00
matt 236e90d4f2 Rework register usage in cpu_switchto so curcpu() is preserved across
ras_lookup.  Only set vfp & tpid registers and do ras lookups if new lwp
is not LW_SYSTEM.  (tested on RPI and atf tests on BPI by skrll).
2015-03-24 07:16:16 +00:00
jmcneill 3375ad1fb5 port-arm/49737: armgtmr0 timer broken
Use physical timer instead of virtual timer for timecounter. For platforms
that implement virtualization extensions, the CNTVOFF register defines a
virtual offset between the physical count and virtual count. Unfortunately,
the CNTVOFF register is only accessible in secure mode and the value is
per-CPU, so we may end up in a scenario where virtual count reads from
CPU A -> B -> A are not monotonic. No offset applied to physical timer,
so physical count reads are guaranteed to be monotonic.
2015-03-23 23:33:22 +00:00
ast baf9344e28 Remove -f option as rc_fast is not set in invocation mode.
Do the load_rc_config *after* option parsing.
Catch conflicting -e + -l option specs.
2015-03-23 23:28:55 +00:00
roy a37502b2b6 Add RTF_BROADCAST to mark routes used for the broadcast address when
they are created on the fly. This makes it clear what the route is for
and allows an optimisation in ip_output() by avoiding a call to
in_broadcast() because most of the time we do talk to a host.
It also avoids a needless allocation for the storage of llinfo_arp and
thus vanishes from arp(8) - it showed as incomplete anyway so this
is a nice side effect.

Guard against this and routes marked with RTF_BLACKHOLE in
ip_fastforward().
While here, guard against routes marked with RTF_BLACKHOLE in
ip6_fastforward().
RTF_BROADCAST is IPv4 only, so don't bother checking that here.
2015-03-23 18:33:17 +00:00
matt 71dae66cee Fix some inverted return values. Don't return SIGILL if there is an active
FPU exception.
2015-03-23 17:42:02 +00:00
matt c4c41a7e9d Add L_FLAG/LW_SYSTEM 2015-03-23 17:28:14 +00:00
pooka 735543fb1b fix typo
"set curlwp to context" -> "set curlwp to implicit context"
from Martin Lucina <martin@lucina.net>
2015-03-23 15:42:29 +00:00
riastradh 50f73940a2 Update some xrefs to point to softint(9), not the old/alt spelling. 2015-03-23 13:40:34 +00:00
spz 9cef71b670 merge OpenSSL 1.0.1m
do the necessary changes in src/crypto/external/bsd/openssl
update doc
2015-03-23 10:22:45 +00:00
spz 635165fad8 This is an import of OpenSSL 1.0.1m.
The vulnerabilities listed below were previously fixed by patches
supplied by the OpenSSL project.

Thus, this import is not about vulnerabilities, but about the change
in source style OpenSSL applied before 1.0.1m (as well as small fixes
not listed in the changelog that make us have a 'proper' 1.0.1m).

Upstream Changelog:

 Changes between 1.0.1l and 1.0.1m [19 Mar 2015]

  *) Segmentation fault in ASN1_TYPE_cmp fix

     The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is
     made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check
     certificate signature algorithm consistency this can be used to crash any
     certificate verification operation and exploited in a DoS attack. Any
     application which performs certificate verification is vulnerable including
     OpenSSL clients and servers which enable client authentication.
     (CVE-2015-0286)
     [Stephen Henson]

  *) ASN.1 structure reuse memory corruption fix

     Reusing a structure in ASN.1 parsing may allow an attacker to cause
     memory corruption via an invalid write. Such reuse is and has been
     strongly discouraged and is believed to be rare.

     Applications that parse structures containing CHOICE or ANY DEFINED BY
     components may be affected. Certificate parsing (d2i_X509 and related
     functions) are however not affected. OpenSSL clients and servers are
     not affected.
     (CVE-2015-0287)
     [Stephen Henson]

  *) PKCS7 NULL pointer dereferences fix

     The PKCS#7 parsing code does not handle missing outer ContentInfo
     correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with
     missing content and trigger a NULL pointer dereference on parsing.

     Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or
     otherwise parse PKCS#7 structures from untrusted sources are
     affected. OpenSSL clients and servers are not affected.

     This issue was reported to OpenSSL by Michal Zalewski (Google).
     (CVE-2015-0289)
     [Emilia Käsper]

  *) DoS via reachable assert in SSLv2 servers fix

     A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
     servers that both support SSLv2 and enable export cipher suites by sending
     a specially crafted SSLv2 CLIENT-MASTER-KEY message.

     This issue was discovered by Sean Burford (Google) and Emilia Käsper
     (OpenSSL development team).
     (CVE-2015-0293)
     [Emilia Käsper]

  *) Use After Free following d2i_ECPrivatekey error fix

     A malformed EC private key file consumed via the d2i_ECPrivateKey function
     could cause a use after free condition. This, in turn, could cause a double
     free in several private key parsing functions (such as d2i_PrivateKey
     or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption
     for applications that receive EC private keys from untrusted
     sources. This scenario is considered rare.

     This issue was discovered by the BoringSSL project and fixed in their
     commit 517073cd4b.
     (CVE-2015-0209)
     [Matt Caswell]

  *) X509_to_X509_REQ NULL pointer deref fix

     The function X509_to_X509_REQ will crash with a NULL pointer dereference if
     the certificate key is invalid. This function is rarely used in practice.

     This issue was discovered by Brian Carpenter.
     (CVE-2015-0288)
     [Stephen Henson]

  *) Removed the export ciphers from the DEFAULT ciphers
     [Kurt Roeckx]

 Changes between 1.0.1k and 1.0.1l [15 Jan 2015]

  *) Build fixes for the Windows and OpenVMS platforms
     [Matt Caswell and Richard Levitte]
2015-03-23 08:28:04 +00:00
riastradh d06a75e7df Reorganize UFP_* flags with markup and more detail. 2015-03-23 08:19:12 +00:00
wiz 0e9029ef91 Bump date for previous. Use more markup in AUTHORS section. 2015-03-23 08:11:10 +00:00
riastradh e3235bfa54 Describe UFP_DIRTYONLY and UFP_BACKWARD flags to uvn_findpages.
PR kern/49335
2015-03-23 08:00:33 +00:00
riastradh d32bef14a2 Call these `identities', not `life states'. 2015-03-23 07:59:12 +00:00
ozaki-r 248367a4ce Regen 2015-03-23 07:54:44 +00:00
ozaki-r 5afb55419b Add linux_systrace_args.c for arm 2015-03-23 07:52:36 +00:00
ozaki-r a15e409a65 Regen 2015-03-23 07:51:45 +00:00
ozaki-r a58f44dd16 Fix inconsistent argument names 2015-03-23 07:50:03 +00:00
apb 978d974482 Explain why there is no consttime_memcmp().
Inspired by a patch from Kamil Rytarowski.
2015-03-23 07:41:16 +00:00
ozaki-r 9102ea39a1 Regen 2015-03-23 07:40:31 +00:00
ozaki-r dfda72b105 Fix inconsistent argument names 2015-03-23 07:30:15 +00:00
matt 22e0fb4106 Fix register usage in softint_switch. load / restore l_private across
softint_dispatch
2015-03-22 23:46:08 +00:00
matt 0df464ab8d Make sure to save the user thread point in softint_switch in case it was
set just before we got an interrupt.  Otherwise if the softint blocks, the
old value would be restored and change lost.
2015-03-22 23:17:57 +00:00
mrg 99baa91ed3 if not playing (-q mode), don't call ioctl() or try to use the results.
now -q mode works.
2015-03-22 22:47:43 +00:00
wiz 5753d35ecf Sort options in usage. 2015-03-22 22:39:05 +00:00
wiz 51041dd869 Sort options. Use An -nosplit in AUTHORS section. 2015-03-22 22:38:19 +00:00
wiz e74dc903d0 Use An in AUTHORS section. 2015-03-22 22:35:08 +00:00
joerg bcfe277c29 Mark as volatile, just to be sure. 2015-03-22 21:45:12 +00:00
martin 3884499e40 Use ta0 instead of t4 (so at least it compiles for all ABIs) 2015-03-22 20:32:08 +00:00
martin 0f9d79598b Back -O3 optimization out for now - it did not fix the performance
differences to pkgsrc we see, but causes runtime fallout on e.g. sparc64
(just running "openssl" crashes with a SEGFAULT).
2015-03-22 20:29:04 +00:00
palle 6451d12f93 sun4v: Fixed bug in cpu_cache_info_sun4v() causing non-cache nodes to be processed - this should fix crashes on T2-based systems (e.g. T5120) when retrieving L2$ info during bootstrap. Tested by rodent@ 2015-03-22 19:37:54 +00:00
palle 32713ed701 sun4v: added new function mdesc_name_by_idx() for retrieving the name of a node 2015-03-22 19:33:21 +00:00
jmcneill 4f1b45db2e Add Amlogic RTC driver, from Anon Ymous 2015-03-22 17:28:22 +00:00
jmcneill 089a8f9d1d Support interlaced modes. 2015-03-22 16:23:26 +00:00
tsutsui 3960313655 Don't forget to put /ofwboot into the image otherwise boot fails.
Should be pulled up to netbsd-6* and netbsd-7 branches.
2015-03-22 14:02:15 +00:00
jmcneill 6bd142becd Use the hardware scaler to do overscan compensation. You can set the
scaling value as a percentage in two ways -- either as a kernel cmdline
parameter (fb.scale=<pct>) or at runtime with sysctl (hw.genfb0.scale=<pct>).

Setting scale=100 disables the scaler, any other value enables it. For
the cheap TV on my desk, scale=95 gives me a fully visible framebuffer.
2015-03-22 13:53:33 +00:00
ast 6ffaa22c57 Mention import of service(8) command from FreeBSD. 2015-03-22 12:48:18 +00:00
ast f00f13ee2a Make the usage appear more standard. 2015-03-22 10:24:48 +00:00
ast 04efec8469 Import a substantially modified service(8) command from FreeBSD to
manage rc.d scripts.  This command is well known on most other Unixes
and should help soften the learning curve for Unix admins coming
to NetBSD.
2015-03-22 09:57:42 +00:00
ast 64fd4bb542 Appease various mandoc -Tlint warnings and update copyright while we're here 2015-03-22 09:45:50 +00:00
jmcneill 7ba4328bfa Process /etc/modules.conf (if present) at startup, before securelevel is
raised, to allow module loading on ports without a module aware bootloader.
2015-03-21 19:10:43 +00:00
apb b3f66a3d8a Actually create the "done" files, and test them for existence. 2015-03-21 16:42:17 +00:00
martin 36c17f1650 Make more compile time options the same as the pkgsrc version 2015-03-21 15:56:54 +00:00
apb 2b56eacd4f zoneinfo: Import tzdata2015b. [apb 20150321]
Also s/tzdata/tzcode in another line.
2015-03-21 15:54:11 +00:00
apb 5aa928701a We have tzdata2015b. 2015-03-21 15:52:19 +00:00
apb 0ba7d01cae Update tzdata2netbsd for tzdata2015b.
* Edit version numbers.
* Make the script deal better with being re-run multiple times.  It
  now keeps a status file for each non-trivial step, and doesn't repeat
  the step if the sttaus file exists.
* Instead of spawning a subshell to resolve merge conflicts, print a message
  and exit, with a suggestion to rte-run the script after conflicts
  are resolved.
* Check whether there are any conflicts before trying to do anything
  about conflicts.
2015-03-21 15:51:20 +00:00
apb 555a785a32 Import tzdata2015b from ftp://ftp.iana.org/tz/releases/tzdata2015b.tar.gz
Summary of changes in tzdata2015b (2015-03-19 23:28:11 -0700):
  * Mongolia will start observing DST again in 2015, from the last
    Saturday in March at 02:00 to the last Saturday in September at 00:00.
  * Palestine will start DST on March 28, not March 27, in 2015.
  * The 1982 zone shift in Pacific/Easter has been corrected, fixing a 2015a
    regression.
  * Some more zones have been turned into links, when they differed
    from existing zones only for older time stamps.
  * Correct the 1992-2010 DST abbreviation in Volgograd from "MSK" to "MSD".
  * Changes affecting commentary.
2015-03-21 15:45:33 +00:00
riastradh c1cdb89ea5 No, PQ_ANON is set only if owned by anon, not if loaned to anon. 2015-03-21 13:58:31 +00:00