Commit Graph

234268 Commits

Author SHA1 Message Date
justin
59fd6f1da5 Return type of compat wait functions should be pid_t not int. 2015-03-26 11:17:08 +00:00
roy
bf5024efa4 Note import of dhcpcd-6.8.0 2015-03-26 10:37:06 +00:00
roy
b03ca99758 Sync 2015-03-26 10:26:37 +00:00
roy
dbc46acaa3 Import dhcpcd-6.8.0 with the following changes:
*  Use the exit code of EXIT_SUCCESS when terminating gracefully.
  *  Fix dumping a lease file by filename.
  *  If RTF_LOCAL is defined, don't try and set loopback routes.
  *  Fix adding host routes on BSD.
  *  After adding an address load the kernel routing table for the
     interface. When routes are rebuilt try not to remove any existing
     routes if they don't need changing.
  *  Replace timeval with timespec for our internal functions.
  *  Support kqueue(2).
  *  Better support for more interface types on BSD, thanks to Guy Yur.
  *  Many Prefix Delegation fixes.
  *  Fix creation of normal IPv6 link-local addresses overflowing the
     address storage and fooling dhcpcd into thinking it's not
     tentative when added.
  *  Add own syslog(3) like logging function for a nicer output and so
     we can log to a file for the case when syslogd(8) starts after
     dhcpcd so we can log any errors during system start using the new
     --logfile option.
2015-03-26 10:20:41 +00:00
hsuenaga
b59e05366b set ttbr0/1 using correct register(r2). 2015-03-26 08:50:42 +00:00
hsuenaga
a3f6924a7a don't use armreg_tlbiasidis_write() and armreg_icialluis_write()
on single processor platforms.
2015-03-26 08:45:05 +00:00
skrll
a459b24c4d Various usb 3 related changes from Takahiro HAYASHI 2015-03-26 08:08:27 +00:00
ozaki-r
0f2fc18b62 Remove redundant rtcache_invariants
It's done in rtcache_getdst.
2015-03-26 04:38:17 +00:00
ozaki-r
50468f9be7 Tidy up the regular path of ip_forward
No functional change is intended.
2015-03-26 04:05:58 +00:00
dholland
231a9fdc87 Avoid runon sentences. 2015-03-25 16:23:02 +00:00
msaitoh
60b434b153 Fix a bug that vlan setting may not apply to the parent interface correctly. 2015-03-25 12:53:55 +00:00
macallan
ada74a1dcd - determine bus clock, pass it to devices
- more clock enabling / gpio setup
2015-03-25 11:25:10 +00:00
macallan
53a48da639 more clock and gpio stuff 2015-03-25 11:23:26 +00:00
riastradh
8c0065db93 Make this run in NetBSD 6 by using st_mtimespec instead of st_mtim.
st_mtimespec is our traditional nonstandard name for what POSIX
called st_mtim in 2008, but these aren't going to run in non-NetBSD
anyway so using the nonstandard name shouldn't be an issue.
2015-03-24 23:24:55 +00:00
riastradh
1674867715 zfs tests don't actually need privileges. 2015-03-24 23:22:47 +00:00
christos
b52bce6ba8 set some readline compatibility default key settings.
https://bugzilla.redhat.com/attachment.cgi?id=1001895
2015-03-24 21:29:52 +00:00
christos
9a8795cdcd save and restore IGNORE_EXTCHARS like we do in the getc case. From:
https://bugzilla.redhat.com/attachment.cgi?id=1001894
2015-03-24 21:26:50 +00:00
skrll
fab59747f2 There is no need to save/restore l_private in softint_switch now that
cpu_switchto is fixed
2015-03-24 21:09:11 +00:00
christos
b2cf87b6f2 allow lists as filter addresses. 2015-03-24 20:24:17 +00:00
christos
1cd22af862 new tzcode 2015-03-24 20:02:18 +00:00
christos
aa771cb970 merge 2015b 2015-03-24 20:01:18 +00:00
apb
1643706715 Fix the description of "< x" and "x <> y" for port numbers.
Patch for "< x" from Timo Buhrmester, and for "x <> y" from me.
2015-03-24 19:46:58 +00:00
matt
8e9315c8cb Move isb's to before reading count. Change interrupt to level. 2015-03-24 15:53:39 +00:00
matt
d685920afa Sprinkle some arm_isb() to force execution of the mcrr instructions to get
more accurate values.  (Given that the generic timer is usually running at
a 64th or less of the cpu clock, this only settle to a tick or so.)
2015-03-24 08:58:41 +00:00
matt
d87c4ff51d Preserve/restore user r/w tpid in mcontext. 2015-03-24 08:38:29 +00:00
wiz
fc5db8c0e8 Put fseeko, ftello, pread, and pwrite in the POSIX 2001 namespace.
Ok christos, apb, martin
2015-03-24 07:44:52 +00:00
matt
236e90d4f2 Rework register usage in cpu_switchto so curcpu() is preserved across
ras_lookup.  Only set vfp & tpid registers and do ras lookups if new lwp
is not LW_SYSTEM.  (tested on RPI and atf tests on BPI by skrll).
2015-03-24 07:16:16 +00:00
jmcneill
3375ad1fb5 port-arm/49737: armgtmr0 timer broken
Use physical timer instead of virtual timer for timecounter. For platforms
that implement virtualization extensions, the CNTVOFF register defines a
virtual offset between the physical count and virtual count. Unfortunately,
the CNTVOFF register is only accessible in secure mode and the value is
per-CPU, so we may end up in a scenario where virtual count reads from
CPU A -> B -> A are not monotonic. No offset applied to physical timer,
so physical count reads are guaranteed to be monotonic.
2015-03-23 23:33:22 +00:00
ast
baf9344e28 Remove -f option as rc_fast is not set in invocation mode.
Do the load_rc_config *after* option parsing.
Catch conflicting -e + -l option specs.
2015-03-23 23:28:55 +00:00
roy
a37502b2b6 Add RTF_BROADCAST to mark routes used for the broadcast address when
they are created on the fly. This makes it clear what the route is for
and allows an optimisation in ip_output() by avoiding a call to
in_broadcast() because most of the time we do talk to a host.
It also avoids a needless allocation for the storage of llinfo_arp and
thus vanishes from arp(8) - it showed as incomplete anyway so this
is a nice side effect.

Guard against this and routes marked with RTF_BLACKHOLE in
ip_fastforward().
While here, guard against routes marked with RTF_BLACKHOLE in
ip6_fastforward().
RTF_BROADCAST is IPv4 only, so don't bother checking that here.
2015-03-23 18:33:17 +00:00
matt
71dae66cee Fix some inverted return values. Don't return SIGILL if there is an active
FPU exception.
2015-03-23 17:42:02 +00:00
matt
c4c41a7e9d Add L_FLAG/LW_SYSTEM 2015-03-23 17:28:14 +00:00
pooka
735543fb1b fix typo
"set curlwp to context" -> "set curlwp to implicit context"
from Martin Lucina <martin@lucina.net>
2015-03-23 15:42:29 +00:00
riastradh
50f73940a2 Update some xrefs to point to softint(9), not the old/alt spelling. 2015-03-23 13:40:34 +00:00
spz
9cef71b670 merge OpenSSL 1.0.1m
do the necessary changes in src/crypto/external/bsd/openssl
update doc
2015-03-23 10:22:45 +00:00
spz
635165fad8 This is an import of OpenSSL 1.0.1m.
The vulnerabilities listed below were previously fixed by patches
supplied by the OpenSSL project.

Thus, this import is not about vulnerabilities, but about the change
in source style OpenSSL applied before 1.0.1m (as well as small fixes
not listed in the changelog that make us have a 'proper' 1.0.1m).

Upstream Changelog:

 Changes between 1.0.1l and 1.0.1m [19 Mar 2015]

  *) Segmentation fault in ASN1_TYPE_cmp fix

     The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is
     made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check
     certificate signature algorithm consistency this can be used to crash any
     certificate verification operation and exploited in a DoS attack. Any
     application which performs certificate verification is vulnerable including
     OpenSSL clients and servers which enable client authentication.
     (CVE-2015-0286)
     [Stephen Henson]

  *) ASN.1 structure reuse memory corruption fix

     Reusing a structure in ASN.1 parsing may allow an attacker to cause
     memory corruption via an invalid write. Such reuse is and has been
     strongly discouraged and is believed to be rare.

     Applications that parse structures containing CHOICE or ANY DEFINED BY
     components may be affected. Certificate parsing (d2i_X509 and related
     functions) are however not affected. OpenSSL clients and servers are
     not affected.
     (CVE-2015-0287)
     [Stephen Henson]

  *) PKCS7 NULL pointer dereferences fix

     The PKCS#7 parsing code does not handle missing outer ContentInfo
     correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with
     missing content and trigger a NULL pointer dereference on parsing.

     Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or
     otherwise parse PKCS#7 structures from untrusted sources are
     affected. OpenSSL clients and servers are not affected.

     This issue was reported to OpenSSL by Michal Zalewski (Google).
     (CVE-2015-0289)
     [Emilia Käsper]

  *) DoS via reachable assert in SSLv2 servers fix

     A malicious client can trigger an OPENSSL_assert (i.e., an abort) in
     servers that both support SSLv2 and enable export cipher suites by sending
     a specially crafted SSLv2 CLIENT-MASTER-KEY message.

     This issue was discovered by Sean Burford (Google) and Emilia Käsper
     (OpenSSL development team).
     (CVE-2015-0293)
     [Emilia Käsper]

  *) Use After Free following d2i_ECPrivatekey error fix

     A malformed EC private key file consumed via the d2i_ECPrivateKey function
     could cause a use after free condition. This, in turn, could cause a double
     free in several private key parsing functions (such as d2i_PrivateKey
     or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption
     for applications that receive EC private keys from untrusted
     sources. This scenario is considered rare.

     This issue was discovered by the BoringSSL project and fixed in their
     commit 517073cd4b.
     (CVE-2015-0209)
     [Matt Caswell]

  *) X509_to_X509_REQ NULL pointer deref fix

     The function X509_to_X509_REQ will crash with a NULL pointer dereference if
     the certificate key is invalid. This function is rarely used in practice.

     This issue was discovered by Brian Carpenter.
     (CVE-2015-0288)
     [Stephen Henson]

  *) Removed the export ciphers from the DEFAULT ciphers
     [Kurt Roeckx]

 Changes between 1.0.1k and 1.0.1l [15 Jan 2015]

  *) Build fixes for the Windows and OpenVMS platforms
     [Matt Caswell and Richard Levitte]
2015-03-23 08:28:04 +00:00
riastradh
d06a75e7df Reorganize UFP_* flags with markup and more detail. 2015-03-23 08:19:12 +00:00
wiz
0e9029ef91 Bump date for previous. Use more markup in AUTHORS section. 2015-03-23 08:11:10 +00:00
riastradh
e3235bfa54 Describe UFP_DIRTYONLY and UFP_BACKWARD flags to uvn_findpages.
PR kern/49335
2015-03-23 08:00:33 +00:00
riastradh
d32bef14a2 Call these identities', not life states'. 2015-03-23 07:59:12 +00:00
ozaki-r
248367a4ce Regen 2015-03-23 07:54:44 +00:00
ozaki-r
5afb55419b Add linux_systrace_args.c for arm 2015-03-23 07:52:36 +00:00
ozaki-r
a15e409a65 Regen 2015-03-23 07:51:45 +00:00
ozaki-r
a58f44dd16 Fix inconsistent argument names 2015-03-23 07:50:03 +00:00
apb
978d974482 Explain why there is no consttime_memcmp().
Inspired by a patch from Kamil Rytarowski.
2015-03-23 07:41:16 +00:00
ozaki-r
9102ea39a1 Regen 2015-03-23 07:40:31 +00:00
ozaki-r
dfda72b105 Fix inconsistent argument names 2015-03-23 07:30:15 +00:00
matt
22e0fb4106 Fix register usage in softint_switch. load / restore l_private across
softint_dispatch
2015-03-22 23:46:08 +00:00
matt
0df464ab8d Make sure to save the user thread point in softint_switch in case it was
set just before we got an interrupt.  Otherwise if the softint blocks, the
old value would be restored and change lost.
2015-03-22 23:17:57 +00:00
mrg
99baa91ed3 if not playing (-q mode), don't call ioctl() or try to use the results.
now -q mode works.
2015-03-22 22:47:43 +00:00