Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (2m)  netbsd-8 (6d)  netbsd-10 (6d)  netbsd-9 (12d)  thorpej-ifq (176d)  thorpej-altq-separation (178d) 

2024-05-10 21:46:18 UTC Now

2017-03-10 09:13:49 UTC MAIN commitmail json YAML

Revert to version 1.55 of map_object.c. This reverts:

"really unmap the gap between the text and data rather than just removing
all access with mprotect().  the latter results in the kernel having to
keep track of that range separately since the permissions are different.
avoid calling mmap() with a size of zero."

As per toolchain/52054: src/libexec/ld.elf_so update breaks everything,
this commit is very broken for some people (but not others). chs mentioned
he has a fix, but best not to leave -current broken in the meantime.

(maya)

2017-03-10 09:12:46 UTC MAIN commitmail json YAML

PR misc/52058: proc_trampoline became lwp_trampoline.
Sort.

(martin)

2017-03-10 09:08:47 UTC MAIN commitmail json YAML

PR misc/52058: replace all proc_trampoline with lwp_trampoline belatedly.

(martin)

2017-03-10 07:35:58 UTC MAIN commitmail json YAML

need to membar_producer() *before* switching.

pointed out by riastradh@, thanks

(ryo)

2017-03-10 04:13:43 UTC MAIN commitmail json YAML

add my name to distrib/notes/common/main

(salazar)

2017-03-10 02:21:37 UTC MAIN commitmail json YAML

fix MIN/MAX confusion.

(christos)

2017-03-10 00:26:43 UTC MAIN commitmail json YAML

attach display devices first so we see more kernel output on shark

(macallan)

2017-03-10 00:22:01 UTC MAIN commitmail json YAML

- provide access to PCI memory space
- pass a DMA tag. Won't work but at least we don't crash anymore
TODO:
- magic number reduction. Seriously.
- figure out why DMA doesn't work

with this cards that don't need DMA or more than 1MB of MMIO space should work

(macallan)

2017-03-10 00:13:08 UTC MAIN commitmail json YAML

if we have vlpci, map in 1MB worth of PCI memory space

(macallan)

2017-03-10 00:09:13 UTC MAIN commitmail json YAML

include files.usb, vlpci needs-flag

(macallan)

2017-03-09 16:28:13 UTC netbsd-7 commitmail json YAML

2017-03-09 16:27:32 UTC netbsd-7 commitmail json YAML

2017-03-09 14:05:59 UTC MAIN commitmail json YAML

2017-03-09 11:39:43 UTC MAIN commitmail json YAML

Bump date for previous. Use American spelling.

(wiz)

2017-03-09 11:39:41 UTC MAIN commitmail json YAML

Remove redundant null check before free. it is safe to free(NULL)
While here, clear up odd whitespace issue. NFC

(maya)

2017-03-09 10:10:02 UTC MAIN commitmail json YAML

Protect genfs_do_putpages() against vnodes disappearing during
a forced mount update from read-write to read-only.

(hannken)

2017-03-09 09:57:36 UTC MAIN commitmail json YAML

ifp->if_transmit() must free mbuf even if error occurred.

Add missing m_freem(m) to if_nulltransmit().
Below ifp->if_transmit() implementations are already added m_freem(m) properly.
    - wm(4)
    - ixg(4)
    - ixv(4)
    - pppoe(4)
    - gif(4)
    - l2tp(4)

pointed out by ozaki-r@n.o, thanks.

(knakahara)

2017-03-09 08:41:56 UTC MAIN commitmail json YAML

Only check target address collision if the sender address is the null
address (ie a DAD probe) or our matching address is either TENTATIVE
or DUPLICATED.

(roy)

2017-03-09 08:27:18 UTC MAIN commitmail json YAML

Clarify ttm state transitions tt_unpopulated<->tt_unbound<->tt_bound.
Assert it, too, and don't handle other cases.

We can add the assertion to ttm_agp_tt_unpopulate because it is called by
{nouveau,radeon}_ttm_tt_unpopulate, which is generically called
ttm_tt_unpopulate.

And the sole caller to ttm_tt_unpopulate (ttm_tt_destroy) only does so if the
state is unbound. the other caller is in a !NetBSD block.

We can add the assertion to ttm_agp_tt_populate and avoid handling the
!unpopulated case because the sole callers are {nouveau,radeon}_ttm_tt_populate
both of which return early in the !unpopulated case.

We can change the assertion on ttm_tt_wire because it is solely called by
ttm_bus_dma_populate, which already asserts that it is the unpopulated case.

from riastradh

(maya)

2017-03-09 08:05:21 UTC MAIN commitmail json YAML

oops, copied the code from the wrong diff. ... unbreak the build, still
doing the same thing.

(maya)

2017-03-09 07:55:23 UTC MAIN commitmail json YAML

Restore unpopulated state on fail1 error path. I shouldn't have committed
it separately.

from riastradh@

(maya)

2017-03-09 07:50:50 UTC MAIN commitmail json YAML

Remove redundant handling for tt_unbound case, and assert that it is the
unpopulated case.

All callers of ttm_bus_dma_populate (ttm_agp_tt_populate,
radeon_ttm_tt_populate, nouveau_ttm_tt_populate) return early if it isn't
unpopulated.

from riastradh@

(maya)

2017-03-09 07:42:36 UTC MAIN commitmail json YAML

Mark the state as unbound a bit earlier, to avoid triggering an assert in
the fail1 error path.

PR kern/52048: radeondrmkms: ttm->state == tt_unbound assertion

(maya)

2017-03-09 06:33:12 UTC netbsd-7 commitmail json YAML

2017-03-09 06:28:36 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by msaitoh in ticket #1372):
sys/dev/pci/if_wm.c: revisions 1.462, 1.464-1.465 1.474 via patch
sys/dev/pci/if_wmreg.h: revision 1.97
sys/dev/pci/if_wmvar.h: revision 1.33
- Set IPV6EXDIS bit in RFCTL register because of an Errata on 82575 and
  newer devices.
- Linux and FreeBSD defines 0x10f5 as E1000_DEV_ID_ICH9_IGP_M_AMT. In
  reality, This is not IGP but BM. Add new case to identify PHY type
  device. Fixes PR#51924 reported byJarle Greipsland.
- Use new wm_gmii_setup_phytype() function to setup sc_phytype and
  mii_{read|write}reg. This change improves detection of PHY type.
- Fix typo in comment.

(snj)

2017-03-09 06:26:04 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by msaitoh in ticket #1371):
sys/dev/mii/miidevs: revision 1.125
Add some Intel devices.

(snj)

2017-03-09 06:21:54 UTC MAIN commitmail json YAML

Tidy up again

(ozaki-r)

2017-03-09 06:19:37 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by msaitoh in ticket #1370):
sys/dev/pci/ixgbe/ixgbe.c: revision 1.60
  Use 64bit DMA tag. If not, a lot of bounce buffer is allocated.
Fixes PR#49968 reported by Hauke.

(snj)

2017-03-09 04:37:23 UTC MAIN commitmail json YAML

Remove unnecessary splnet

(ozaki-r)

2017-03-09 00:43:50 UTC MAIN commitmail json YAML

really unmap the gap between the text and data rather than just removing
all access with mprotect().  the latter results in the kernel having to
keep track of that range separately since the permissions are different.
avoid calling mmap() with a size of zero.

(chs)

2017-03-09 00:21:55 UTC MAIN commitmail json YAML

in pmap_get_ptp(), if we need to allocate multiple new ptp levels
and succeed in allocating some pages but fail to get them all,
free any ptps we did allocate before returning.
also, only consume kernel-reserve pages if pmap_enter()
is called without PMAP_CANFAIL set, to help avoid deadlocking
during high memory pressure.

(chs)

2017-03-09 00:18:23 UTC MAIN commitmail json YAML

use warnx() rather than warn() in a case where errno is not relevant.

(chs)

2017-03-09 00:17:32 UTC MAIN commitmail json YAML

mention KDTRACE_HOOKS.

(chs)

2017-03-09 00:16:51 UTC MAIN commitmail json YAML

improve readability of TRAP_SIGDEBUG info.
also print the trapframe info like amd64 does.

(chs)

2017-03-09 00:16:07 UTC MAIN commitmail json YAML

improve readability of TRAP_SIGDEBUG info and add fsbase/gsbase.

(chs)

2017-03-09 00:15:06 UTC MAIN commitmail json YAML

set signo and code correctly for signals triggered by uvm_fault() errors.

(chs)

2017-03-09 00:14:03 UTC MAIN commitmail json YAML

use kpreempt_disable() rather than splsoftclock() to disable preemption.

(chs)

2017-03-08 22:55:20 UTC MAIN commitmail json YAML

Do it properly.    Thanks wiz.

(kre)

2017-03-08 21:56:05 UTC MAIN commitmail json YAML

/usr/include/pmc.h is installed on i386 iff src/lib/libpmc/pmc_i386.c exists
(which it no longer does - only arm has a similar .c file so only arm
builds install pmc.h in /usr/include now)

This should unbreak the i386 build.

(kre)

2017-03-08 18:00:49 UTC MAIN commitmail json YAML

A few changes:
* Use markers to reduce false sharing.
* Remove XENDEBUG_SYNC and several debug messages, they are just useless.
* Remove xen_vcpu_*. They are unused and not optimized: if we really
  wanted to flush ranges we should pack the VAs in a mmuext_op array
  instead of performing several hypercalls in a loop.
* Start removing PG_k.
* KNF, reorder, simplify and remove stupid comments.

(maxv)

2017-03-08 17:06:35 UTC MAIN commitmail json YAML

Avoid tripping on opposite-endian sysconfig/fex blobs.

(jakllsch)

2017-03-08 16:52:17 UTC MAIN commitmail json YAML

2017-03-08 16:42:27 UTC MAIN commitmail json YAML

Add a version argument, set to 1, and check it in usr.bin/pmc. Use uint32_t
instead uint8_t since we now need 12bit selectors (10h family). And while
here KNF.

(maxv)

2017-03-08 16:09:27 UTC MAIN commitmail json YAML

Deprecate the pmc functions in libi386. The parameters will be updated,
and we are not interested in maintaining this anyway. Now i386's pmc
interface is opaque, which is good.

(maxv)

2017-03-08 16:05:29 UTC MAIN commitmail json YAML

We don't use libi386 anymore.

(maxv)

2017-03-08 15:53:01 UTC MAIN commitmail json YAML

Remove i386 from libpmc; it has its own interface (sysarch), and we won't
maintain compatibility.

Verily, I cannot build a distribution now, so I'm committing this rather
blindly. This being said, it looks correct enough.

(maxv)

2017-03-08 14:57:27 UTC netbsd-6-0 commitmail json YAML

2017-03-08 14:56:51 UTC netbsd-6-0 commitmail json YAML

external/mit/xorg/server/xorg-server.old/os/Makefile 1.2 (patch)
external/mit/xorg/server/xorg-server/os/Makefile 1.15 (patch)

Apply upstream fixes for generation and comparision of
MIT-MAGIC-COOKIES, fixing CVE-2017-2624
[mrg, ticket #1443]

(martin)

2017-03-08 14:56:16 UTC netbsd-6-0 commitmail json YAML

xsrc/external/mit/xorg-server.old/dist/configure.ac 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/include/dix-config.h.in 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/include/dix-config.h.in 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/include/os.h 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/auth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/auth.c 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/os/mitauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/mitauth.c 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/os/osdep.h 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/rpcauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/timingsafe_memcmp.c 1.1 (patch)
xsrc/external/mit/xorg-server.old/dist/os/xdmauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/include/dix-config.h 1.3 (patch)
xsrc/external/mit/xorg-server.old/include/dix-config.h 1.4 (patch)
xsrc/external/mit/xorg-server/dist/configure.ac 1.4 (patch)
xsrc/external/mit/xorg-server/dist/configure.ac 1.5 (patch)
xsrc/external/mit/xorg-server/dist/include/dix-config.h.in 1.2 (patch)
xsrc/external/mit/xorg-server/dist/include/dix-config.h.in 1.3 (patch)
xsrc/external/mit/xorg-server/dist/include/os.h 1.8 (patch)
xsrc/external/mit/xorg-server/dist/os/auth.c 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/auth.c 1.3 (patch)
xsrc/external/mit/xorg-server/dist/os/mitauth.c 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/mitauth.c 1.3 (patch)
xsrc/external/mit/xorg-server/dist/os/osdep.h 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/rpcauth.c 1.4 (patch)
xsrc/external/mit/xorg-server/dist/os/timingsafe_memcmp.c 1.1 (patch)
xsrc/external/mit/xorg-server/dist/os/xdmauth.c 1.2 (patch)
xsrc/external/mit/xorg-server/include/dix-config.h 1.26 (patch)
xsrc/external/mit/xorg-server/include/dix-config.h 1.27 (patch)

Apply upstream fixes for generation and comparision of
MIT-MAGIC-COOKIES, fixing CVE-2017-2624
[mrg, ticket #1443]

(martin)

2017-03-08 14:55:09 UTC netbsd-6 commitmail json YAML

Wrong ticket number, fix #1443 entry

(martin)

2017-03-08 14:52:07 UTC netbsd-6-1 commitmail json YAML

2017-03-08 14:50:37 UTC netbsd-6-1 commitmail json YAML

external/mit/xorg/server/xorg-server.old/os/Makefile 1.2 (patch)
external/mit/xorg/server/xorg-server/os/Makefile 1.15 (patch)

Apply upstream fixes for generation and comparision of
MIT-MAGIC-COOKIES, fixing CVE-2017-2624
[mrg, ticket #1381]

(martin)

2017-03-08 14:49:59 UTC netbsd-6-1 commitmail json YAML

xsrc/external/mit/xorg-server.old/dist/configure.ac 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/include/dix-config.h.in 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/include/dix-config.h.in 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/include/os.h 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/auth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/auth.c 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/os/mitauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/mitauth.c 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/os/osdep.h 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/rpcauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/timingsafe_memcmp.c 1.1 (patch)
xsrc/external/mit/xorg-server.old/dist/os/xdmauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/include/dix-config.h 1.3 (patch)
xsrc/external/mit/xorg-server.old/include/dix-config.h 1.4 (patch)
xsrc/external/mit/xorg-server/dist/configure.ac 1.4 (patch)
xsrc/external/mit/xorg-server/dist/configure.ac 1.5 (patch)
xsrc/external/mit/xorg-server/dist/include/dix-config.h.in 1.2 (patch)
xsrc/external/mit/xorg-server/dist/include/dix-config.h.in 1.3 (patch)
xsrc/external/mit/xorg-server/dist/include/os.h 1.8 (patch)
xsrc/external/mit/xorg-server/dist/os/auth.c 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/auth.c 1.3 (patch)
xsrc/external/mit/xorg-server/dist/os/mitauth.c 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/mitauth.c 1.3 (patch)
xsrc/external/mit/xorg-server/dist/os/osdep.h 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/rpcauth.c 1.4 (patch)
xsrc/external/mit/xorg-server/dist/os/timingsafe_memcmp.c 1.1 (patch)
xsrc/external/mit/xorg-server/dist/os/xdmauth.c 1.2 (patch)
xsrc/external/mit/xorg-server/include/dix-config.h 1.26 (patch)
xsrc/external/mit/xorg-server/include/dix-config.h 1.27 (patch)

Apply upstream fixes for generation and comparision of
MIT-MAGIC-COOKIES, fixing CVE-2017-2624
[mrg, ticket #1381]

(martin)

2017-03-08 14:48:52 UTC netbsd-6 commitmail json YAML

2017-03-08 14:48:16 UTC netbsd-6 commitmail json YAML

external/mit/xorg/server/xorg-server.old/os/Makefile 1.2 (patch)
external/mit/xorg/server/xorg-server/os/Makefile 1.15 (patch)

Apply upstream fixes for generation and comparision of
MIT-MAGIC-COOKIES, fixing CVE-2017-2624
[mrg, ticket #1381]

(martin)

2017-03-08 14:47:24 UTC netbsd-6 commitmail json YAML

xsrc/external/mit/xorg-server.old/dist/configure.ac 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/include/dix-config.h.in 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/include/dix-config.h.in 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/include/os.h 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/auth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/auth.c 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/os/mitauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/mitauth.c 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/os/osdep.h 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/rpcauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/timingsafe_memcmp.c 1.1 (patch)
xsrc/external/mit/xorg-server.old/dist/os/xdmauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/include/dix-config.h 1.3 (patch)
xsrc/external/mit/xorg-server.old/include/dix-config.h 1.4 (patch)
xsrc/external/mit/xorg-server/dist/configure.ac 1.4 (patch)
xsrc/external/mit/xorg-server/dist/configure.ac 1.5 (patch)
xsrc/external/mit/xorg-server/dist/include/dix-config.h.in 1.2 (patch)
xsrc/external/mit/xorg-server/dist/include/dix-config.h.in 1.3 (patch)
xsrc/external/mit/xorg-server/dist/include/os.h 1.8 (patch)
xsrc/external/mit/xorg-server/dist/os/auth.c 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/auth.c 1.3 (patch)
xsrc/external/mit/xorg-server/dist/os/mitauth.c 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/mitauth.c 1.3 (patch)
xsrc/external/mit/xorg-server/dist/os/osdep.h 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/rpcauth.c 1.4 (patch)
xsrc/external/mit/xorg-server/dist/os/timingsafe_memcmp.c 1.1 (patch)
xsrc/external/mit/xorg-server/dist/os/xdmauth.c 1.2 (patch)
xsrc/external/mit/xorg-server/include/dix-config.h 1.26 (patch)
xsrc/external/mit/xorg-server/include/dix-config.h 1.27 (patch)

Apply upstream fixes for generation and comparision of
MIT-MAGIC-COOKIES, fixing CVE-2017-2624
[mrg, ticket #1381]

(martin)

2017-03-08 14:31:09 UTC netbsd-7-0 commitmail json YAML

2017-03-08 14:30:31 UTC netbsd-7-0 commitmail json YAML

external/mit/xorg/server/xorg-server.old/os/Makefile 1.2 (patch)
external/mit/xorg/server/xorg-server/os/Makefile 1.15 (patch)

Apply upstream fixes for generation and comparision of
MIT-MAGIC-COOKIES, fixing CVE-2017-2624
[mrg, ticket #1381]

(martin)

2017-03-08 14:29:50 UTC netbsd-7-0 commitmail json YAML

xsrc/external/mit/xorg-server.old/dist/configure.ac 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/include/dix-config.h.in 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/include/dix-config.h.in 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/include/os.h 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/auth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/auth.c 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/os/mitauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/mitauth.c 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/os/osdep.h 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/rpcauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/timingsafe_memcmp.c 1.1 (patch)
xsrc/external/mit/xorg-server.old/dist/os/xdmauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/include/dix-config.h 1.3 (patch)
xsrc/external/mit/xorg-server.old/include/dix-config.h 1.4 (patch)
xsrc/external/mit/xorg-server/dist/configure.ac 1.4 (patch)
xsrc/external/mit/xorg-server/dist/configure.ac 1.5 (patch)
xsrc/external/mit/xorg-server/dist/include/dix-config.h.in 1.2 (patch)
xsrc/external/mit/xorg-server/dist/include/dix-config.h.in 1.3 (patch)
xsrc/external/mit/xorg-server/dist/include/os.h 1.8 (patch)
xsrc/external/mit/xorg-server/dist/os/auth.c 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/auth.c 1.3 (patch)
xsrc/external/mit/xorg-server/dist/os/mitauth.c 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/mitauth.c 1.3 (patch)
xsrc/external/mit/xorg-server/dist/os/osdep.h 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/rpcauth.c 1.4 (patch)
xsrc/external/mit/xorg-server/dist/os/timingsafe_memcmp.c 1.1 (patch)
xsrc/external/mit/xorg-server/dist/os/xdmauth.c 1.2 (patch)
xsrc/external/mit/xorg-server/include/dix-config.h 1.26 (patch)
xsrc/external/mit/xorg-server/include/dix-config.h 1.27 (patch)

Apply upstream fixes for generation and comparision of
MIT-MAGIC-COOKIES, fixing CVE-2017-2624
[mrg, ticket #1381]

(martin)

2017-03-08 14:22:55 UTC netbsd-7 commitmail json YAML

2017-03-08 14:22:12 UTC netbsd-7 commitmail json YAML

external/mit/xorg/server/xorg-server.old/os/Makefile 1.2 (patch)
external/mit/xorg/server/xorg-server/os/Makefile 1.15 (patch)

Apply upstream fixes for generation and comparision of
MIT-MAGIC-COOKIES, fixing CVE-2017-2624
[mrg, ticket #1381]

(martin)

2017-03-08 14:20:07 UTC netbsd-7 commitmail json YAML

xsrc/external/mit/xorg-server.old/dist/configure.ac 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/include/dix-config.h.in 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/include/dix-config.h.in 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/include/os.h 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/auth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/auth.c 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/os/mitauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/mitauth.c 1.3 (patch)
xsrc/external/mit/xorg-server.old/dist/os/osdep.h 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/rpcauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/dist/os/timingsafe_memcmp.c 1.1 (patch)
xsrc/external/mit/xorg-server.old/dist/os/xdmauth.c 1.2 (patch)
xsrc/external/mit/xorg-server.old/include/dix-config.h 1.3 (patch)
xsrc/external/mit/xorg-server.old/include/dix-config.h 1.4 (patch)
xsrc/external/mit/xorg-server/dist/configure.ac 1.4 (patch)
xsrc/external/mit/xorg-server/dist/configure.ac 1.5 (patch)
xsrc/external/mit/xorg-server/dist/include/dix-config.h.in 1.2 (patch)
xsrc/external/mit/xorg-server/dist/include/dix-config.h.in 1.3 (patch)
xsrc/external/mit/xorg-server/dist/include/os.h 1.8 (patch)
xsrc/external/mit/xorg-server/dist/os/auth.c 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/auth.c 1.3 (patch)
xsrc/external/mit/xorg-server/dist/os/mitauth.c 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/mitauth.c 1.3 (patch)
xsrc/external/mit/xorg-server/dist/os/osdep.h 1.2 (patch)
xsrc/external/mit/xorg-server/dist/os/rpcauth.c 1.4 (patch)
xsrc/external/mit/xorg-server/dist/os/timingsafe_memcmp.c 1.1 (patch)
xsrc/external/mit/xorg-server/dist/os/xdmauth.c 1.2 (patch)
xsrc/external/mit/xorg-server/include/dix-config.h 1.26 (patch)
xsrc/external/mit/xorg-server/include/dix-config.h 1.27 (patch)

Apply upstream fixes for generation and comparision of
MIT-MAGIC-COOKIES, fixing CVE-2017-2624
[mrg, ticket #1381]

(martin)

2017-03-08 11:45:14 UTC MAIN commitmail json YAML

2017-03-08 08:00:09 UTC MAIN commitmail json YAML

PR kern/52039: use same safeguard as for the 82578

(kardel)

2017-03-08 07:45:11 UTC MAIN commitmail json YAML

2017-03-08 07:44:16 UTC MAIN commitmail json YAML

2017-03-08 07:39:44 UTC MAIN commitmail json YAML

2017-03-08 07:32:58 UTC MAIN commitmail json YAML

Tidy up the lists

(ozaki-r)

2017-03-08 07:31:42 UTC MAIN commitmail json YAML

port to xorg-server 1.10:

--
Log Message:
apply

https://cgit.freedesktop.org/xorg/xserver/commit/?id=d7ac755f0b618eb1259d93c8a16ec6e39a18627c

Use timingsafe_memcmp() to compare MIT-MAGIC-COOKIES CVE-2017-2624
Provide the function definition for systems that don't have it.

Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>

and
https://cgit.freedesktop.org/xorg/xserver/commit/?id=5c44169caed811e59a65ba346de1cadb46d266ec

os: Squash missing declaration warning for timingsafe_memcmp
timingsafe_memcmp.c:21:1: warning: no previous prototype for `timingsafe_memcmp' [-Wmissing-prototypes]
timingsafe_memcmp(const void *b1, const void *b2, size_t len)

Signed-off-by: Adam Jackson <ajax@redhat.com>
--

(mrg)

2017-03-08 07:18:48 UTC MAIN commitmail json YAML

port to xorg-server 1.10:
--
Log Message:
apply
https://cgit.freedesktop.org/xorg/xserver/commit/?id=2855f759b1e7bf7f5e57cac36c1f0d0e5ac1a683

auth: remove AuthToIDFunc and associated functions. Not used anymore.
And the current code for MitToId has a use-after-free() issue.

[Also remove the actual implementations - ajax]

Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
--

(mrg)

2017-03-08 07:14:12 UTC MAIN commitmail json YAML

apply

https://cgit.freedesktop.org/xorg/xserver/commit/?id=d7ac755f0b618eb1259d93c8a16ec6e39a18627c

Use timingsafe_memcmp() to compare MIT-MAGIC-COOKIES CVE-2017-2624
Provide the function definition for systems that don't have it.

Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>

and
https://cgit.freedesktop.org/xorg/xserver/commit/?id=5c44169caed811e59a65ba346de1cadb46d266ec

os: Squash missing declaration warning for timingsafe_memcmp
timingsafe_memcmp.c:21:1: warning: no previous prototype for `timingsafe_memcmp' [-Wmissing-prototypes]
timingsafe_memcmp(const void *b1, const void *b2, size_t len)

Signed-off-by: Adam Jackson <ajax@redhat.com>

(mrg)

2017-03-08 06:59:36 UTC MAIN commitmail json YAML

Remove multicast stuffs from the list of Non MP-safe components

(ozaki-r)

2017-03-08 06:54:39 UTC MAIN commitmail json YAML

apply
https://cgit.freedesktop.org/xorg/xserver/commit/?id=2855f759b1e7bf7f5e57cac36c1f0d0e5ac1a683

auth: remove AuthToIDFunc and associated functions. Not used anymore.
And the current code for MitToId has a use-after-free() issue.

[Also remove the actual implementations - ajax]

Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>

(mrg)

2017-03-08 05:30:56 UTC MAIN commitmail json YAML

Improve test stability and output messages on failure

(ozaki-r)

2017-03-08 04:11:14 UTC MAIN commitmail json YAML

2017-03-08 02:55:45 UTC MAIN commitmail json YAML

2017-03-08 02:55:12 UTC MAIN commitmail json YAML

2017-03-08 00:39:57 UTC netbsd-6-0 commitmail json YAML

2017-03-08 00:39:44 UTC netbsd-6-0 commitmail json YAML

Put back a netbsd-6* workaround accidentally removed in ticket 1437:
Explicitly initialize uid to avoid a gcc warning.

(snj)

2017-03-08 00:39:23 UTC netbsd-6-1 commitmail json YAML

2017-03-08 00:39:06 UTC netbsd-6-1 commitmail json YAML

Put back a netbsd-6* workaround accidentally removed in ticket 1437:
Explicitly initialize uid to avoid a gcc warning.

(snj)

2017-03-08 00:38:33 UTC netbsd-6 commitmail json YAML

2017-03-08 00:38:18 UTC netbsd-6 commitmail json YAML

Add back a netbsd-6* workaround accidentally removed in ticket 1437:
Explicitly initialize uid to avoid a gcc warning.

(snj)

2017-03-07 23:35:50 UTC MAIN commitmail json YAML

binutils-2.28 released.

(wiz)

2017-03-07 22:03:04 UTC MAIN commitmail json YAML

allocate bus dma maps during attachment, rather than creating and destroying
them for each request; besides being faster, bus_dmamap_destroy() is not
safe to be called from interrupt context

adresses PR kern/52034 by Benny Siegert

(jdolecek)

2017-03-07 21:02:14 UTC netbsd-6 commitmail json YAML

2017-03-07 21:01:29 UTC netbsd-6 commitmail json YAML

Apply patch (requested by mrg in ticket #1442):
Define HAVE_ARC4RANDOM_BUF

(snj)

2017-03-07 21:00:47 UTC netbsd-6 commitmail json YAML

Apply patch (requested by mrg in ticket #1442):
Use arc4random when available to produce the auth cookie.
(80f62c54fbd50a3bbdf9c37258525098c9117830 upstream)

(snj)

2017-03-07 21:00:11 UTC netbsd-6-1 commitmail json YAML

2017-03-07 20:59:51 UTC netbsd-6-1 commitmail json YAML

Apply patch (requested by mrg in ticket #1442):
Define HAVE_ARC4RANDOM_BUF

(snj)

2017-03-07 20:59:18 UTC netbsd-6-1 commitmail json YAML

Apply patch (requested by mrg in ticket #1442):
Use arc4random when available to produce the auth cookie.
(80f62c54fbd50a3bbdf9c37258525098c9117830 upstream)

(snj)

2017-03-07 20:58:48 UTC netbsd-6-0 commitmail json YAML

2017-03-07 20:56:08 UTC netbsd-6-0 commitmail json YAML

Apply patch (requested by mrg in ticket #1442):
Define HAVE_ARC4RANDOM_BUF

(snj)

2017-03-07 20:54:15 UTC netbsd-6-0 commitmail json YAML

Apply patch (requested by mrg in ticket #1442):
Use arc4random when available to produce the auth cookie.
(80f62c54fbd50a3bbdf9c37258525098c9117830 upstream)

(snj)

2017-03-07 20:36:55 UTC netbsd-7 commitmail json YAML

2017-03-07 20:26:12 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by jnmeth in ticket #1328):
sys/arch/xen/xen/hypervisor.c: revision 1.67
add machdep.xen.version sysctl to easily get hypervisor version

(snj)

2017-03-07 20:20:24 UTC netbsd-7-0 commitmail json YAML

2017-03-07 20:18:50 UTC netbsd-7-0 commitmail json YAML

2017-03-07 20:18:25 UTC netbsd-7-0 commitmail json YAML

Apply patch (requested by mrg in ticket #1380):
Define HAVE_ARC4RANDOM_BUF.

(snj)

2017-03-07 20:17:58 UTC netbsd-7 commitmail json YAML

Apply patch (requested by mrg in ticket #1380):
Define HAVE_ARC4RANDOM_BUF

(snj)

2017-03-07 20:17:12 UTC netbsd-7-0 commitmail json YAML

Apply patch (requested by mrg in ticket #1380):
Use arc4random when available to produce the auth cookie.
(80f62c54fbd50a3bbdf9c37258525098c9117830 upstream)

(snj)

2017-03-07 20:16:34 UTC netbsd-7 commitmail json YAML

Apply patch (requested by mrg in ticket #1380):
Use arc4random when available to produce the auth cookie.
(80f62c54fbd50a3bbdf9c37258525098c9117830 upstream)

(snj)

2017-03-07 19:10:07 UTC MAIN commitmail json YAML

2017-03-07 16:40:16 UTC MAIN commitmail json YAML

2017-03-07 16:37:38 UTC MAIN commitmail json YAML

2017-03-07 16:28:42 UTC MAIN commitmail json YAML

we don't need both memset and 0

(christos)

2017-03-07 16:26:37 UTC MAIN commitmail json YAML

need .WAIT before *san since they depend on libc++

(christos)

2017-03-07 16:23:20 UTC MAIN commitmail json YAML

fix incomplete initializers for clang.

(christos)

2017-03-07 11:54:17 UTC MAIN commitmail json YAML

Fix a logic error introduced with Rev. 1.507: defer setting MNT_RDONLY
only if going from read-write to read-only.

Should fix PR kern/52045 (panic: ffs_sync: rofs mod, fs=/ after fsck)

(hannken)

2017-03-07 11:15:08 UTC MAIN commitmail json YAML

Remove redundant null check before free()
It is guaranteed to be fine also by C99

(maya)

2017-03-07 07:25:56 UTC netbsd-6 commitmail json YAML

2017-03-07 07:25:19 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #1437):
libexec/httpd/CHANGES: up to 1.25
libexec/httpd/bozohttpd.8: up to 1.65
libexec/httpd/bozohttpd.c: up to 1.86
libexec/httpd/bozohttpd.h: up to 1.47
libexec/httpd/cgi-bozo.c: up to 1.37
libexec/httpd/content-bozo.c: up to 1.14
libexec/httpd/libbozohttpd/libbozohttpd.3: up to 1.4
libexec/httpd/main.c: up to 1.16
libexec/httpd/small/Makefile: up to 1.3
libexec/httpd/testsuite/Makefile: up to 1.7
libexec/httpd/testsuite/cgi-bin/empty: up to 1.1
libexec/httpd/testsuite/html_cmp: up to 1.5
libexec/httpd/testsuite/t11.in: up to 1.1
libexec/httpd/testsuite/t11.out: up to 1.1
libexec/httpd/testsuite/test-bigfile: up to 1.4
libexec/httpd/testsuite/test-simple: up to 1.4
Update bozohttpd to 20170201.  Changes:
- fix an infinite loop in cgi processing
- fixes and clean up for the testsuite
- no longer sends encoding header for compressed formats
- add a bozo_get_version() function which returns the version number

(snj)

2017-03-07 07:22:48 UTC netbsd-6-1 commitmail json YAML

2017-03-07 07:21:54 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #1437:
libexec/httpd/CHANGES: up to 1.25
libexec/httpd/bozohttpd.8: up to 1.65
libexec/httpd/bozohttpd.c: up to 1.86
libexec/httpd/bozohttpd.h: up to 1.47
libexec/httpd/cgi-bozo.c: up to 1.37
libexec/httpd/content-bozo.c: up to 1.14
libexec/httpd/libbozohttpd/libbozohttpd.3: up to 1.4
libexec/httpd/main.c: up to 1.16
libexec/httpd/small/Makefile: up to 1.3
libexec/httpd/testsuite/Makefile: up to 1.7
libexec/httpd/testsuite/cgi-bin/empty: up to 1.1
libexec/httpd/testsuite/html_cmp: up to 1.5
libexec/httpd/testsuite/t11.in: up to 1.1
libexec/httpd/testsuite/t11.out: up to 1.1
libexec/httpd/testsuite/test-bigfile: up to 1.4
libexec/httpd/testsuite/test-simple: up to 1.4
Update bozohttpd to 20170201.  Changes:
- fix an infinite loop in cgi processing
- fixes and clean up for the testsuite
- no longer sends encoding header for compressed formats
- add a bozo_get_version() function which returns the version number

(snj)

2017-03-07 07:16:38 UTC netbsd-6-0 commitmail json YAML

2017-03-07 07:16:09 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #1437):
libexec/httpd/CHANGES: up to 1.25
libexec/httpd/bozohttpd.8: up to 1.65
libexec/httpd/bozohttpd.c: up to 1.86
libexec/httpd/bozohttpd.h: up to 1.47
libexec/httpd/cgi-bozo.c: up to 1.37
libexec/httpd/content-bozo.c: up to 1.14
libexec/httpd/libbozohttpd/libbozohttpd.3: up to 1.4
libexec/httpd/main.c: up to 1.16
libexec/httpd/small/Makefile: up to 1.3
libexec/httpd/testsuite/Makefile: up to 1.7
libexec/httpd/testsuite/cgi-bin/empty: up to 1.1
libexec/httpd/testsuite/html_cmp: up to 1.5
libexec/httpd/testsuite/t11.in: up to 1.1
libexec/httpd/testsuite/t11.out: up to 1.1
libexec/httpd/testsuite/test-bigfile: up to 1.4
libexec/httpd/testsuite/test-simple: up to 1.4
Update bozohttpd to 20170201.  Changes:
- fix an infinite loop in cgi processing
- fixes and clean up for the testsuite
- no longer sends encoding header for compressed formats
- add a bozo_get_version() function which returns the version number

(snj)

2017-03-07 01:53:53 UTC MAIN commitmail json YAML

Remove unnecessary splnet for bridge_enqueue

bridge_enqueue now uses if_transmit_lock that does splnet for device
drivers, so splnet for bridge_enqueue isn't needed anymore.

(ozaki-r)

2017-03-07 01:32:03 UTC MAIN commitmail json YAML

Add missing splnet to if_deferred_start_common

if_start should run in splnet to avoid running interrupt handlers.

(ozaki-r)

2017-03-07 01:28:37 UTC MAIN commitmail json YAML

Apply deferred if_start (from maya@)

Fix PR kern/52023

(ozaki-r)

2017-03-06 23:11:39 UTC MAIN commitmail json YAML

add lint to the bogus test for <stdint.h>

(christos)

2017-03-06 23:07:42 UTC MAIN commitmail json YAML

2017-03-06 23:04:52 UTC MAIN commitmail json YAML

Accept PTR for addtype

(christos)

2017-03-06 22:29:35 UTC MAIN commitmail json YAML

Use more macros.

(wiz)

2017-03-06 21:03:56 UTC MAIN commitmail json YAML

2017-03-06 21:02:47 UTC MAIN commitmail json YAML

2017-03-06 21:01:39 UTC MAIN commitmail json YAML

2017-03-06 17:19:21 UTC MAIN commitmail json YAML

bump date, improve english

(snj)

2017-03-06 16:49:26 UTC MAIN commitmail json YAML

print out the actual stride value

(macallan)

2017-03-06 13:50:40 UTC MAIN commitmail json YAML

We do HAVE_NOUVEAU. so use it.

(maya)

2017-03-06 13:14:25 UTC MAIN commitmail json YAML

fix set lists for pxaip(4). it's not a pmax man page.

(maya)

2017-03-06 12:01:47 UTC MAIN commitmail json YAML

2017-03-06 12:00:27 UTC MAIN commitmail json YAML

2017-03-06 11:58:31 UTC MAIN commitmail json YAML

handle typeof in casts

(christos)

2017-03-06 11:34:54 UTC MAIN commitmail json YAML

Some minor edits:

s/a on-board/an on-board/
use "serial comma"
s/bus/controller/
add attribution for author of the manual page

(pgoyette)

2017-03-06 11:10:23 UTC MAIN commitmail json YAML

2017-03-06 10:12:00 UTC MAIN commitmail json YAML

Adapt the test "enable WAPBL on rw mounts only" to the recent change of
the protocol to update a mounted file.

Should fix PR kern/52031 (FFS mount update doesn't play nice with WAPBL)

(hannken)

2017-03-06 10:11:21 UTC MAIN commitmail json YAML

Always use the lowest mount for fstrans and suspend.  This way we
enter/leave or suspend/resume the stack of layered file systems as a unit.

(hannken)

2017-03-06 10:10:43 UTC MAIN commitmail json YAML

Deny unmounting file systems below layered file systems.

(hannken)

2017-03-06 10:10:07 UTC MAIN commitmail json YAML

2017-03-06 10:08:49 UTC MAIN commitmail json YAML

Handle v_writecount from union_open(), union_close() and union_revoke()
so lower file system vnodes get marked as open for writing.

(hannken)

2017-03-06 10:07:52 UTC MAIN commitmail json YAML

Change vrecycle() and vgone() to lock with LK_RETRY.  If this node is
a layerfs node the lower node(s) may already be reclaimed.

(hannken)

2017-03-06 10:00:14 UTC MAIN commitmail json YAML

add "net.inet.ipsec.crypto_support" man

(knakahara)

2017-03-06 09:59:05 UTC MAIN commitmail json YAML

add sysctl to select software/hardware encryption driver. can enable CRYPTO_DEBUG.

(knakahara)

2017-03-06 09:24:09 UTC MAIN commitmail json YAML

Improve grammar.  Pointed out by Timo Buhrmester on netbsd-docs list.

(pgoyette)

2017-03-06 09:06:23 UTC MAIN commitmail json YAML

Add pxaip(4) man page to the sets list.

(pgoyette)

2017-03-06 09:06:02 UTC MAIN commitmail json YAML

2017-03-06 08:36:20 UTC MAIN commitmail json YAML

Fix incrementing wrong counter

(ozaki-r)

2017-03-06 08:18:44 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by bouyer in ticket #1441):
sys/arch/x86/x86/pmap.c: revision 1.241 via patch
sys/arch/x86/include/pmap.h: revision 1.63 via patch
Should be PG_k, doesn't change anything.
--
Remove PG_u from the kernel pages on Xen. Otherwise there is no privilege
separation between the kernel and userland.
On Xen-amd64, the kernel runs in ring3 just like userland, and the
separation is guaranteed by the hypervisor - each syscall/trap is
intercepted by Xen and sent manually to the kernel. Before that, the
hypervisor modifies the page tables so that the kernel becomes accessible.
Later, when returning to userland, the hypervisor removes the kernel pages
and flushes the TLB.
However, TLB flushes are costly, and in order to reduce the number of pages
flushed Xen marks the userland pages as global, while keeping the kernel
ones as local. This way, when returning to userland, only the kernel pages
get flushed - which makes sense since they are the only ones that got
removed from the mapping.
Xen differentiates the userland pages by looking at their PG_u bit in the
PTE; if a page has this bit then Xen tags it as global, otherwise Xen
manually adds the bit but keeps the page as local. The thing is, since we
set PG_u in the kernel pages, Xen believes our kernel pages are in fact
userland pages, so it marks them as global. Therefore, when returning to
userland, the kernel pages indeed get removed from the page tree, but are
not flushed from the TLB. Which means that they are still accessible.
With this - and depending on the DTLB size - userland has a small window
where it can read/write to the last kernel pages accessed, which is enough
to completely escalate privileges: the sysent structure systematically gets
read when performing a syscall, and chances are that it will still be
cached in the TLB. Userland can then use this to patch a chosen syscall,
make it point to a userland function, retrieve %gs and compute the address
of its credentials, and finally grant itself root privileges.

(snj)

2017-03-06 08:18:14 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by bouyer in ticket #1441):
sys/arch/x86/x86/pmap.c: revision 1.241 via patch
sys/arch/x86/include/pmap.h: revision 1.63 via patch
Should be PG_k, doesn't change anything.
--
Remove PG_u from the kernel pages on Xen. Otherwise there is no privilege
separation between the kernel and userland.
On Xen-amd64, the kernel runs in ring3 just like userland, and the
separation is guaranteed by the hypervisor - each syscall/trap is
intercepted by Xen and sent manually to the kernel. Before that, the
hypervisor modifies the page tables so that the kernel becomes accessible.
Later, when returning to userland, the hypervisor removes the kernel pages
and flushes the TLB.
However, TLB flushes are costly, and in order to reduce the number of pages
flushed Xen marks the userland pages as global, while keeping the kernel
ones as local. This way, when returning to userland, only the kernel pages
get flushed - which makes sense since they are the only ones that got
removed from the mapping.
Xen differentiates the userland pages by looking at their PG_u bit in the
PTE; if a page has this bit then Xen tags it as global, otherwise Xen
manually adds the bit but keeps the page as local. The thing is, since we
set PG_u in the kernel pages, Xen believes our kernel pages are in fact
userland pages, so it marks them as global. Therefore, when returning to
userland, the kernel pages indeed get removed from the page tree, but are
not flushed from the TLB. Which means that they are still accessible.
With this - and depending on the DTLB size - userland has a small window
where it can read/write to the last kernel pages accessed, which is enough
to completely escalate privileges: the sysent structure systematically gets
read when performing a syscall, and chances are that it will still be
cached in the TLB. Userland can then use this to patch a chosen syscall,
make it point to a userland function, retrieve %gs and compute the address
of its credentials, and finally grant itself root privileges.

(snj)

2017-03-06 08:17:49 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by bouyer in ticket #1441):
sys/arch/x86/x86/pmap.c: revision 1.241 via patch
sys/arch/x86/include/pmap.h: revision 1.63 via patch
Should be PG_k, doesn't change anything.
--
Remove PG_u from the kernel pages on Xen. Otherwise there is no privilege
separation between the kernel and userland.
On Xen-amd64, the kernel runs in ring3 just like userland, and the
separation is guaranteed by the hypervisor - each syscall/trap is
intercepted by Xen and sent manually to the kernel. Before that, the
hypervisor modifies the page tables so that the kernel becomes accessible.
Later, when returning to userland, the hypervisor removes the kernel pages
and flushes the TLB.
However, TLB flushes are costly, and in order to reduce the number of pages
flushed Xen marks the userland pages as global, while keeping the kernel
ones as local. This way, when returning to userland, only the kernel pages
get flushed - which makes sense since they are the only ones that got
removed from the mapping.
Xen differentiates the userland pages by looking at their PG_u bit in the
PTE; if a page has this bit then Xen tags it as global, otherwise Xen
manually adds the bit but keeps the page as local. The thing is, since we
set PG_u in the kernel pages, Xen believes our kernel pages are in fact
userland pages, so it marks them as global. Therefore, when returning to
userland, the kernel pages indeed get removed from the page tree, but are
not flushed from the TLB. Which means that they are still accessible.
With this - and depending on the DTLB size - userland has a small window
where it can read/write to the last kernel pages accessed, which is enough
to completely escalate privileges: the sysent structure systematically gets
read when performing a syscall, and chances are that it will still be
cached in the TLB. Userland can then use this to patch a chosen syscall,
make it point to a userland function, retrieve %gs and compute the address
of its credentials, and finally grant itself root privileges.

(snj)

2017-03-06 07:33:27 UTC MAIN commitmail json YAML

Add a test case for net.inet.ip.mtudisctimeout

The test case just reproduces PR kern/52029 and needs more tests.

(ozaki-r)

2017-03-06 07:31:15 UTC MAIN commitmail json YAML

Make sure icmp_redirect_timeout_q and ip_mtudisc_timeout_q are initialized on bootup

Fix PR kern/52029

(ozaki-r)

2017-03-06 07:15:47 UTC MAIN commitmail json YAML

Fix ONEDAYISH; it can be followed by one extra space

(ozaki-r)

2017-03-06 05:58:00 UTC MAIN commitmail json YAML

Fix previous.
- xevie.pc is for libXevie, not for libxcb-xevie.
- obsolete lint file.

(nakayama)

2017-03-06 04:10:00 UTC netbsd-7 commitmail json YAML

2017-03-06 03:34:34 UTC netbsd-7-0 commitmail json YAML

2017-03-06 03:32:46 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by bouyer in ticket #1388):
sys/arch/x86/include/pmap.h: revision 1.63 via patch
sys/arch/x86/x86/pmap.c: revision 1.241 via patch
Should be PG_k, doesn't change anything.
--
Remove PG_u from the kernel pages on Xen. Otherwise there is no privilege
separation between the kernel and userland.
On Xen-amd64, the kernel runs in ring3 just like userland, and the
separation is guaranteed by the hypervisor - each syscall/trap is
intercepted by Xen and sent manually to the kernel. Before that, the
hypervisor modifies the page tables so that the kernel becomes accessible.
Later, when returning to userland, the hypervisor removes the kernel pages
and flushes the TLB.
However, TLB flushes are costly, and in order to reduce the number of pages
flushed Xen marks the userland pages as global, while keeping the kernel
ones as local. This way, when returning to userland, only the kernel pages
get flushed - which makes sense since they are the only ones that got
removed from the mapping.
Xen differentiates the userland pages by looking at their PG_u bit in the
PTE; if a page has this bit then Xen tags it as global, otherwise Xen
manually adds the bit but keeps the page as local. The thing is, since we
set PG_u in the kernel pages, Xen believes our kernel pages are in fact
userland pages, so it marks them as global. Therefore, when returning to
userland, the kernel pages indeed get removed from the page tree, but are
not flushed from the TLB. Which means that they are still accessible.
With this - and depending on the DTLB size - userland has a small window
where it can read/write to the last kernel pages accessed, which is enough
to completely escalate privileges: the sysent structure systematically gets
read when performing a syscall, and chances are that it will still be
cached in the TLB. Userland can then use this to patch a chosen syscall,
make it point to a userland function, retrieve %gs and compute the address
of its credentials, and finally grant itself root privileges.

(snj)

2017-03-06 03:27:19 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by bouyer in ticket #1388):
sys/arch/x86/x86/pmap.c: revision 1.241
Should be PG_k, doesn't change anything.
--
Remove PG_u from the kernel pages on Xen. Otherwise there is no privilege
separation between the kernel and userland.
On Xen-amd64, the kernel runs in ring3 just like userland, and the
separation is guaranteed by the hypervisor - each syscall/trap is
intercepted by Xen and sent manually to the kernel. Before that, the
hypervisor modifies the page tables so that the kernel becomes accessible.
Later, when returning to userland, the hypervisor removes the kernel pages
and flushes the TLB.
However, TLB flushes are costly, and in order to reduce the number of pages
flushed Xen marks the userland pages as global, while keeping the kernel
ones as local. This way, when returning to userland, only the kernel pages
get flushed - which makes sense since they are the only ones that got
removed from the mapping.
Xen differentiates the userland pages by looking at their PG_u bit in the
PTE; if a page has this bit then Xen tags it as global, otherwise Xen
manually adds the bit but keeps the page as local. The thing is, since we
set PG_u in the kernel pages, Xen believes our kernel pages are in fact
userland pages, so it marks them as global. Therefore, when returning to
userland, the kernel pages indeed get removed from the page tree, but are
not flushed from the TLB. Which means that they are still accessible.
With this - and depending on the DTLB size - userland has a small window
where it can read/write to the last kernel pages accessed, which is enough
to completely escalate privileges: the sysent structure systematically gets
read when performing a syscall, and chances are that it will still be
cached in the TLB. Userland can then use this to patch a chosen syscall,
make it point to a userland function, retrieve %gs and compute the address
of its credentials, and finally grant itself root privileges.

(snj)

2017-03-06 03:18:56 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #1377):
external/mit/xorg/lib/libICE/Makefile: revision 1.6
define HAVE_ARC4RANDOM_BUF.

(snj)

2017-03-06 03:15:31 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #1377):
external/mit/xorg/lib/libICE/Makefile: revision 1.6
define HAVE_ARC4RANDOM_BUF.

(snj)

2017-03-06 01:50:44 UTC MAIN commitmail json YAML

Add missing function declarations

(ozaki-r)

2017-03-05 23:15:35 UTC MAIN commitmail json YAML

New sentence, new line.
Use more macros.
Bump date for previous.

(wiz)

2017-03-05 23:07:12 UTC MAIN commitmail json YAML

Enhance disk metrics by calculating a weighted sum that is incremented
by the number of concurrent I/O requests. Also introduce a new disk_wait()
function to measure requests waiting in a bufq.
iostat -y now reports data about waiting and active requests.

So far only drivers using dksubr and dk, ccd, wd and xbd collect data about
waiting requests.

(mlelstv)

2017-03-05 22:24:29 UTC MAIN commitmail json YAML

2017-03-05 22:14:51 UTC MAIN commitmail json YAML

fix some printf formats in DIAGNOSTIC code.

(mrg)

2017-03-05 20:45:49 UTC MAIN commitmail json YAML

add missing sys/evcnt.h include.

(mrg)

2017-03-05 19:23:58 UTC MAIN commitmail json YAML

one extra char for NUL.

(christos)

2017-03-05 19:22:45 UTC MAIN commitmail json YAML

match MacBookPro 9,2 bluetooth controller

(snj)

2017-03-05 19:22:10 UTC MAIN commitmail json YAML

2017-03-05 19:21:17 UTC MAIN commitmail json YAML

add MacBookPro 9,2 bluetooth controller

(snj)

2017-03-05 18:42:51 UTC MAIN commitmail json YAML

Fix man page ERRORS section for (clock,pthread}_getcpuclockid to match
reality.

(njoly)

2017-03-05 17:30:38 UTC MAIN commitmail json YAML

Grow the buffer for event search if there was not enough space.
From Gerry Swislow

(christos)

2017-03-05 17:20:25 UTC MAIN commitmail json YAML

use the modular versions of spkr

(christos)

2017-03-05 16:09:26 UTC MAIN commitmail json YAML

in cpu_setmcontext(), do not update the TLS register (r2) as part of _UC_CPU.
if _UC_TLSBASE is set, use lwp_setprivate() to update both r2 and the
common field in struct lwp.

(chs)

2017-03-05 16:08:23 UTC MAIN commitmail json YAML

reenable mutex2 and mutex3 on powerpc now that PR 44387 is fixed.

(chs)

2017-03-05 16:07:38 UTC MAIN commitmail json YAML

reenable sigfpe_flt on powerpc now that FPU exceptions work.

(chs)

2017-03-05 13:57:29 UTC MAIN commitmail json YAML

add some event counters, for commits, writes, cache flush

(jdolecek)

2017-03-05 11:52:39 UTC MAIN commitmail json YAML

2017-03-05 11:07:46 UTC MAIN commitmail json YAML

Fix the position of curlwp_bindx; it should be after if_put

(ozaki-r)

2017-03-05 09:27:53 UTC MAIN commitmail json YAML

2017-03-05 09:08:18 UTC MAIN commitmail json YAML

Remove PG_u from the kernel pages on Xen. Otherwise there is no privilege
separation between the kernel and userland.

On Xen-amd64, the kernel runs in ring3 just like userland, and the
separation is guaranteed by the hypervisor - each syscall/trap is
intercepted by Xen and sent manually to the kernel. Before that, the
hypervisor modifies the page tables so that the kernel becomes accessible.
Later, when returning to userland, the hypervisor removes the kernel pages
and flushes the TLB.

However, TLB flushes are costly, and in order to reduce the number of pages
flushed Xen marks the userland pages as global, while keeping the kernel
ones as local. This way, when returning to userland, only the kernel pages
get flushed - which makes sense since they are the only ones that got
removed from the mapping.

Xen differentiates the userland pages by looking at their PG_u bit in the
PTE; if a page has this bit then Xen tags it as global, otherwise Xen
manually adds the bit but keeps the page as local. The thing is, since we
set PG_u in the kernel pages, Xen believes our kernel pages are in fact
userland pages, so it marks them as global. Therefore, when returning to
userland, the kernel pages indeed get removed from the page tree, but are
not flushed from the TLB. Which means that they are still accessible.

With this - and depending on the DTLB size - userland has a small window
where it can read/write to the last kernel pages accessed, which is enough
to completely escalate privileges: the sysent structure systematically gets
read when performing a syscall, and chances are that it will still be
cached in the TLB. Userland can then use this to patch a chosen syscall,
make it point to a userland function, retrieve %gs and compute the address
of its credentials, and finally grant itself root privileges.

(maxv)

2017-03-05 08:58:25 UTC MAIN commitmail json YAML

2017-03-05 08:36:35 UTC MAIN commitmail json YAML

Should be PG_k, doesn't change anything.

(maxv)

2017-03-05 08:05:23 UTC MAIN commitmail json YAML

2017-03-05 03:39:46 UTC MAIN commitmail json YAML

update properly for xf86-vide-ati 7.8.0.

(mrg)

2017-03-05 03:38:40 UTC MAIN commitmail json YAML

xsrc/external/mit/xf86-video-ati-kms/dist/src/AtomBios/CD_Operations.c deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/AtomBios/Decoder.c deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/AtomBios/hwserv_drv.c deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/AtomBios/includes/CD_Common_Types.h deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/AtomBios/includes/CD_Definitions.h deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/AtomBios/includes/CD_Opcodes.h deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/AtomBios/includes/CD_Structs.h deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/AtomBios/includes/CD_binding.h deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/AtomBios/includes/CD_hw_services.h deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/AtomBios/includes/Decoder.h deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/AtomBios/includes/ObjectID.h deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/AtomBios/includes/atombios.h deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/AtomBios/includes/regsdef.h deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/atombios_crtc.c deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/atombios_output.c deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/generic_bus.h deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/legacy_crtc.c deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/legacy_output.c deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/radeon_accelfuncs.c deleted
xsrc/external/mit/xf86-video-ati-kms/dist/src/radeon_atombios.c deleted
      :
(more 32 files)
now, merge xf86-video-ati 7.8.0 properly.

(mrg)

2017-03-05 03:18:38 UTC MAIN commitmail json YAML

2017-03-05 03:09:28 UTC MAIN commitmail json YAML

2017-03-05 02:04:10 UTC MAIN commitmail json YAML

2017-03-05 01:57:26 UTC MAIN commitmail json YAML

2017-03-05 01:42:55 UTC MAIN commitmail json YAML

2017-03-05 01:32:03 UTC MAIN commitmail json YAML

2017-03-05 01:07:05 UTC MAIN commitmail json YAML

2017-03-05 00:59:48 UTC MAIN commitmail json YAML

2017-03-04 23:24:51 UTC MAIN commitmail json YAML

2017-03-04 23:24:29 UTC MAIN commitmail json YAML

2017-03-04 23:23:21 UTC MAIN commitmail json YAML

2017-03-04 23:22:49 UTC MAIN commitmail json YAML

2017-03-04 23:01:34 UTC MAIN commitmail json YAML

2017-03-04 22:07:14 UTC MAIN commitmail json YAML

merge our local change to ensure FD_SETSIZE is set before <sys/select.h>
is included, using the new version of the code to set XFD_SETSIZE.

(mrg)