]>
CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/log
gordon [Tue, 15 Sep 2020 21:46:39 +0000 (21:46 +0000)]
Fix bhyve SVM guest escape.
This actually has a patch to sys/amd64/vmm/amd/svm.c that was accidentally
committed as part of r365779.
Approved by: so
Approved by: re (implicit for releng/12.2)
Security: FreeBSD-SA-20:29.bhyve_svm
Security: CVE-2020-7467
gordon [Tue, 15 Sep 2020 21:43:41 +0000 (21:43 +0000)]
Fix bhyve privilege escalation via VMCS access.
Approved by: so
Approved by: re (implicit for releng/12.2)
Security: FreeBSD-SA-20:28.bhyve_vmcs
Security: CVE-2020-24718
gordon [Tue, 15 Sep 2020 21:42:05 +0000 (21:42 +0000)]
Fix ure device driver susceptible to packet-in-packet attack.
Approved by: so
Approved by: re (implicit for releng/12.2)
Security: FreeBSD-SA-20:27.ure
Security: CVE-2020-7464
gordon [Wed, 2 Sep 2020 16:29:40 +0000 (16:29 +0000)]
Add UPDATING entries and bump version.
Approved by: so
gordon [Wed, 2 Sep 2020 16:25:31 +0000 (16:25 +0000)]
Fix dhclient heap overflow.
Approved by: so
Security: FreeBSD-SA-20:26.dhclient
Security: CVE-2020-7461
gordon [Wed, 2 Sep 2020 16:24:32 +0000 (16:24 +0000)]
Fix SCTP socket use-after-free.
Approved by: so
Security: FreeBSD-SA-20:25.sctp
Security: CVE-2020-7463
gordon [Wed, 2 Sep 2020 16:23:15 +0000 (16:23 +0000)]
Fix IPv6 Hop-by-Hop options use-after-free.
Approved by: so
Security: FreeBSD-SA-20:24.ipv6
Security: CVE-2020-7462
gordon [Wed, 2 Sep 2020 16:22:14 +0000 (16:22 +0000)]
Fix getfsstat compatibility system call panic.
Approved by: so
Security: FreeBSD-EN-20:18.getfsstat
gordon [Wed, 2 Sep 2020 16:21:27 +0000 (16:21 +0000)]
Fix FreeBSD Linux ABI kernel panic.
Approved by: so
Security: FreeBSD-EN-20:17.linuxthread
gordon [Wed, 5 Aug 2020 17:14:37 +0000 (17:14 +0000)]
Add UPDATING entries and bump version.
Approved by: so
gordon [Wed, 5 Aug 2020 17:14:01 +0000 (17:14 +0000)]
Fix sendmsg(2) privilege escalation.
Approved by: so
Security: FreeBSD-SA-20:23.sendmsg
Security: CVE-2020-7460
gordon [Wed, 5 Aug 2020 17:13:08 +0000 (17:13 +0000)]
Fix multiple vulnerabilities in sqlite3.
Approved by: so
Security: FreeBSD-SA-20:22.sqlite
Security: CVE-2020-11655
Security: CVE-2020-11656
Security: CVE-2020-13434
Security: CVE-2020-13435
Security: CVE-2020-13630
Security: CVE-2020-13631
Security: CVE-2020-13632
gordon [Wed, 5 Aug 2020 17:11:18 +0000 (17:11 +0000)]
Fix memory corruption in USB network device drivers.
Approved by: so
Security: FreeBSD-SA-20:21.usb_net
Security: CVE-2020-7459
gordon [Wed, 8 Jul 2020 20:26:19 +0000 (20:26 +0000)]
Add UPDATING entries and bump version.
Approved by: so
gordon [Wed, 8 Jul 2020 20:20:59 +0000 (20:20 +0000)]
Fix multiple vulnerabilities in unbound.
Approved by: so
Security: FreeBSD-SA-20:19.unbound
Security: CVE-2020-12662
Security: CVE-2020-12663
gordon [Wed, 8 Jul 2020 20:11:40 +0000 (20:11 +0000)]
Fix IPv6 socket option race condition and use after free.
Approved by: so
Security: FreeBSD-SA-20:20.ipv6
Security: CVE-2020-7457
gordon [Wed, 8 Jul 2020 19:58:00 +0000 (19:58 +0000)]
Fix kernel panic in mps(4) driver.
Approved by: so
Security: FreeBSD-EN-20:15.mps
gordon [Wed, 8 Jul 2020 19:57:24 +0000 (19:57 +0000)]
Fix kernel panic in LinuxKPI subsystem.
Approved by: so
Security: FreeBSD-EN-20:14.linuxpki
gordon [Tue, 9 Jun 2020 16:15:07 +0000 (16:15 +0000)]
Add UPDATING entries and bump version.
Approved by: so
Approved by: re (implicit)
gordon [Tue, 9 Jun 2020 16:13:54 +0000 (16:13 +0000)]
Fix USB HID descriptor parsing error.
Approved by: so
Approved by: re (implicit)
Security: FreeBSD-SA-20:17.usb
Security: CVE-2020-7456
gordon [Tue, 12 May 2020 17:00:23 +0000 (17:00 +0000)]
Add UPDATING entries and bump version.
Approved by: so
Approved by: re (implicit)
gordon [Tue, 12 May 2020 16:57:47 +0000 (16:57 +0000)]
Fix use after free in cryptodev module.
Approved by: so
Security: FreeBSD-SA-20:15.cryptodev
Security: CVE-2019-15879
gordon [Tue, 12 May 2020 16:55:32 +0000 (16:55 +0000)]
Fix improper checking in SCTP-AUTH shared key update.
Approved by: so
Security: FreeBSD-SA-20:14.sctp
Security: CVE-2019-15878
gordon [Tue, 12 May 2020 16:54:39 +0000 (16:54 +0000)]
Fix memory disclosure vulnerability in libalias.
Approved by: so
Approved by: re (implicit)
Security: FreeBSD-SA-20:13.libalias
Security: CVE-2020-7455
gordon [Tue, 12 May 2020 16:51:11 +0000 (16:51 +0000)]
Fix insufficient packet length validation in libalias.
Approved by: so
Approved by: re (implicit)
Security: FreeBSD-SA-20:12.libalias
Security: CVE-2020-7454
gordon [Tue, 12 May 2020 16:44:13 +0000 (16:44 +0000)]
Update to tzdata 2020a.
Approved by: so
Security: EN-20:08.tzdata
emaste [Wed, 29 Apr 2020 18:59:37 +0000 (18:59 +0000)]
MF11 r352638,r358076: correct Clang and lld version checks
r352638 (mhorne): Allow for compiler versions >= 10
r358076 (dim): Correctly recognize linker versions greater than 10.0.
These routines determine the host compiler and linker version, and caused
attempts to build 12.1-RELEASE on 13-CURRENT to fail after the latter was
updated to Clang 10. The host compiler version was also misdetected on
11.3 although it seems not to have caused the same build failure there.
We don't guarantee such a build config to work, but it is used by FreeBSD
ports build processes. As a result the fixes from stable/11 will be
included with the next set of advisories, and are being committed to the
releng branch now to unblock ports builds.
PR: 245973
Reported by: sbruno, antoine
Approved by: so
Errata: EN-20:10.build
Sponsored by: The FreeBSD Foundation
gordon [Tue, 21 Apr 2020 15:54:08 +0000 (15:54 +0000)]
Add UPDATING entries and bump version.
Approved by: so
gordon [Tue, 21 Apr 2020 15:52:22 +0000 (15:52 +0000)]
Fix ipfw invalid mbuf handling.
Approved by: so
Security: FreeBSD-SA-20:10.ipfw
Security: CVE-2019-5614
Security: CVE-2019-15874
gordon [Tue, 21 Apr 2020 15:50:57 +0000 (15:50 +0000)]
Fix regression in rpc.rquotad with certain NFS servers.
Approved by: so
Security: FreeBSD-EN-20:07.quotad
gordon [Thu, 19 Mar 2020 17:01:57 +0000 (17:01 +0000)]
Add UPDATING entries and bump version.
Approved by: so
gordon [Thu, 19 Mar 2020 16:52:41 +0000 (16:52 +0000)]
Fix multiple denial of service in ntpd.
Approved by: so
Security: FreeBSD-SA-20:09.ntp
gordon [Thu, 19 Mar 2020 16:51:33 +0000 (16:51 +0000)]
Fix kernel memory disclosure with nested jails.
Approved by: so
Security: FreeBSD-SA-20:08.jail
Security: CVE-2020-7453
gordon [Thu, 19 Mar 2020 16:50:36 +0000 (16:50 +0000)]
Fix incorrect user-controlled pointer use in epair.
Approved by: so
Security: FreeBSD-SA-20:07.epair
Security: CVE-2020-7452
gordon [Thu, 19 Mar 2020 16:48:29 +0000 (16:48 +0000)]
Fix insufficient oce(4) ioctl(2) privilege checking.
Approved by: so
Security: FreeBSD-SA-20:05.if_oce_ioctl
Security: CVE-2019-15876
gordon [Thu, 19 Mar 2020 16:46:01 +0000 (16:46 +0000)]
Fix TCP IPv6 SYN cache kernel information disclosure.
Approved by: so
Security: FreeBSD-SA-20:04.tcp
Security: CVE-2020-7451
gordon [Thu, 19 Mar 2020 16:43:37 +0000 (16:43 +0000)]
Fix incorrect checksum calculations with IPv6 extension headers.
Approved by: so
Security: FreeBSD-EN-20:06.ipv6
gordon [Thu, 19 Mar 2020 16:35:15 +0000 (16:35 +0000)]
Fix missing pfctl(8) tunable.
Approved by: so
Security: FreeBSD-EN-20:04.pfctl
gordon [Tue, 28 Jan 2020 18:58:37 +0000 (18:58 +0000)]
Add UPDATING entries and bump version.
Approved by: so
gordon [Tue, 28 Jan 2020 18:57:45 +0000 (18:57 +0000)]
Fix kernel stack data disclosure
Reported by: Ilja Van Sprundel
Approved by: so
Security: FreeBSD-SA-20:03.thrmisc
Security: CVE-2019-15875
gordon [Tue, 28 Jan 2020 18:55:25 +0000 (18:55 +0000)]
Fix libfetch buffer overflow
Reported by: Duncan Overbruck
Approved by: so
Security: FreeBSD-SA-20:01.libfetch
Security: CVE-2020-7450
gordon [Tue, 28 Jan 2020 18:54:15 +0000 (18:54 +0000)]
Fix nmount invalid pointer dereference
Submitted by: Andrew Turner
Approved by: so
Security: FreeBSD-EN-20:02.nmount
gordon [Tue, 28 Jan 2020 18:53:14 +0000 (18:53 +0000)]
Fix imprecise ordering of SSP canary initialization
Submitted by: Kyle Evans
Approved by: so
Security: FreeBSD-EN-20:01.ssp
gordon [Tue, 12 Nov 2019 18:13:51 +0000 (18:13 +0000)]
Add UPDATING entries and bump version numbers.
Approved by: so
gordon [Tue, 12 Nov 2019 18:13:04 +0000 (18:13 +0000)]
Fix Machine Check Exception on Page Size Change.
Approved by: so
Security: FreeBSD-SA-19:25.mcepsc
Security: CVE-2018-12207
gordon [Wed, 23 Oct 2019 03:25:32 +0000 (03:25 +0000)]
Import tzdata 2019c.
Approved by: so
Security: FreeBSD-EN-19:18.tzdata
gordon [Tue, 20 Aug 2019 18:02:37 +0000 (18:02 +0000)]
That's EN-19:17.ipfw. It's not an SA.
Reported by: kevans@
Approved by: so
gordon [Tue, 20 Aug 2019 17:52:28 +0000 (17:52 +0000)]
Bump version information and add UPDATING entries.
Approved by: so
gordon [Tue, 20 Aug 2019 17:51:32 +0000 (17:51 +0000)]
Fix reference count overflow in mqueuefs.
Approved by: so
Security: FreeBSD-SA-19:24.mqueuefs
Security: CVE-2019-5603
gordon [Tue, 20 Aug 2019 17:50:33 +0000 (17:50 +0000)]
Fix kernel memory disclosure from /dev/midistat.
Approved by: so
Security: FreeBSD-SA-19:23.midi
Security: CVE-2019-5612
gordon [Tue, 20 Aug 2019 17:49:33 +0000 (17:49 +0000)]
Fix IPv6 remote denial of service.
Approved by: so
Security: FreeBSD-SA-19:22.mbuf
Security: CVE-2019-5611
gordon [Tue, 20 Aug 2019 17:46:40 +0000 (17:46 +0000)]
Fix ipfw(8) jail keyword prior to jail startup.
Approved by: so
Security: FreeBSD-EN-19:17.ipfw
gordon [Tue, 20 Aug 2019 17:45:44 +0000 (17:45 +0000)]
Add bhyve instruction emulation improvements (opcode 03H and F7H).
Approved by: so
Security: FreeBSD-EN-19:16.bhyve
gordon [Tue, 6 Aug 2019 17:14:09 +0000 (17:14 +0000)]
Bump version information and add UPDATING entries.
Approved by: so
gordon [Tue, 6 Aug 2019 17:13:17 +0000 (17:13 +0000)]
Fix insufficient validation of guest-supplied data (e1000 device).
Approved by: so
Security: FreeBSD-SA-19:21.bhyve
Security: CVE-2019-5609
gordon [Tue, 6 Aug 2019 17:12:17 +0000 (17:12 +0000)]
Fix insufficient message length validation in bsnmp library.
Approved by: so
Security: FreeBSD-SA-19:20.bsnmp
Security: CVE-2019-5610
gordon [Tue, 6 Aug 2019 17:11:17 +0000 (17:11 +0000)]
Fix ICMPv6 / MLDv2 out-of-bounds memory access.
Approved by: so
Security: FreeBSD-SA-19:19.mldv2
Security: CVE-2019-5608
gordon [Tue, 6 Aug 2019 17:09:47 +0000 (17:09 +0000)]
Fix multiple vulnerabilities in bzip2.
Approved by: so
Security: FreeBSD-SA-19:18.bzip2
Security: CVE-2016-3189
Security: CVE-2019-12900
gordon [Wed, 24 Jul 2019 12:58:21 +0000 (12:58 +0000)]
Bump version information and update UPDATING.
Approved by: so
gordon [Wed, 24 Jul 2019 12:57:49 +0000 (12:57 +0000)]
Fix file descriptor reference count leak.
Approved by: so
Security: FreeBSD-SA-19:17.fd
Security: CVE-2019-5607
gordon [Wed, 24 Jul 2019 12:56:06 +0000 (12:56 +0000)]
Fix byhve out-of-bounds read in XHCI device.
Approved by: so
Security: FreeBSD-SA-19:16.bhyve
Security: CVE-2019-5604
gordon [Wed, 24 Jul 2019 12:55:16 +0000 (12:55 +0000)]
Fix reference count overflow in mqueuefs.
Approved by: so
Security: FreeBSD-SA-19:15.mqueuefs
Security: CVE-2019-5603
gordon [Wed, 24 Jul 2019 12:54:10 +0000 (12:54 +0000)]
Fix kernel memory disclosure in freebsd32_ioctl.
Approved by: so
Security: FreeBSD-SA-19:14.freebsd32
Security: CVE-2019-5605
gordon [Wed, 24 Jul 2019 12:53:06 +0000 (12:53 +0000)]
Fix pts write-after-free.
Approved by: so
Security: FreeBSD-SA-19:13.pts
Security: CVE-2019-5606
gordon [Wed, 24 Jul 2019 12:51:52 +0000 (12:51 +0000)]
Fix multiple telnet client vulnerabilities.
Approved by: so
Security: FreeBSD-SA-19:12.telnet
Security: CVE-2019-0053
gordon [Wed, 24 Jul 2019 12:50:46 +0000 (12:50 +0000)]
Fix panic from Intel CPU vulnerability mitigation.
Approved by: so
Security: FreeBSD-EN-19:13.mds
gjb [Thu, 4 Jul 2019 23:58:11 +0000 (23:58 +0000)]
- Switch releng/11.3 to -RELEASE.
- Add the anticipated 11.3-RELEASE date to UPDATING.
- Set a static __FreeBSD_version.
Approved by: re (implicit)
Sponsored by: Rubicon Communications, LLC (Netgate)
gjb [Thu, 4 Jul 2019 17:15:36 +0000 (17:15 +0000)]
Document three open issues affecting 11.3-RELEASE.
Approved by: re (implicit)
Sponsored by: Rubicon Communications, LLC (Netgate)
gjb [Wed, 3 Jul 2019 01:04:11 +0000 (01:04 +0000)]
Document SA-19:09, SA-19:11.
Approved by: re (implicit)
Sponsored by: Rubicon Communications, LLC (Netgate)
gjb [Wed, 3 Jul 2019 00:58:10 +0000 (00:58 +0000)]
Document r349620, tzdata 2019b.
Approved by: re (implicit)
Sponsored by: Rubicon Communications, LLC (Netgate)
gordon [Wed, 3 Jul 2019 00:04:50 +0000 (00:04 +0000)]
Update UPDATING and bump newvers.sh
Approved by: so
Approved by: re (implicit)
gordon [Wed, 3 Jul 2019 00:03:55 +0000 (00:03 +0000)]
Fix privilege escalation in cd(4) driver.
Approved by: so
Approved by: re (implicit)
Security: FreeBSD-SA-19:11.cd_ioctl
Security: CVE-2019-5602
gordon [Wed, 3 Jul 2019 00:00:39 +0000 (00:00 +0000)]
Fix iconv buffer overflow.
Approved by: so
Approved by: re (implicit)
Security: FreeBSD-SA-19:09.iconv
gordon [Tue, 2 Jul 2019 23:59:45 +0000 (23:59 +0000)]
Import tzdata 2019b.
Approved by: so
Approved by: re (implicit)
Security: FreeBSD-EN-19:12.tzdata
gjb [Fri, 28 Jun 2019 00:00:02 +0000 (00:00 +0000)]
Update releng/11.3 to RC3 as part of the 11.3-RELEASE cycle.
Approved by: re (implicit)
Sponsored by: Rubicon Communications, LLC (Netgate)
mav [Thu, 27 Jun 2019 14:26:57 +0000 (14:26 +0000)]
MFC r349376: Fix strsep_quote() on strings without quotes.
For strings without quotes and escapes dstptr and srcptr are equal, so
zeroing *dstptr before checking *srcptr is not a good idea. In practice
it means that in -maproot=65534:65533 everything after the colon is lost.
The problem was there since r293305, but before r346976 it was covered by
improper strsep_quote() usage.
PR: 238725
Approved by: re (gjb)
ae [Wed, 26 Jun 2019 17:21:30 +0000 (17:21 +0000)]
Merge from stable/11:
Fix the uninitialized use of source IPv6 address in NAT64LSN.
This code is already refactored in head/, but due to the missing
epoch(9) support it is impossible to merge. So, it is direct commit to
stable/11.
Reported by: Patrick M. Hausen <hausen punkt de>
Tested by: Patrick M. Hausen <hausen punkt de>
Approved by: re (kib, gjb)
gjb [Wed, 26 Jun 2019 15:16:23 +0000 (15:16 +0000)]
Bump the release.manpath.freebsd macro version, although I do not
see any place this is actually used.
Approved by: re (implicit)
Sponsored by: Rubicon Communications, LLC (Netgate)
gjb [Tue, 25 Jun 2019 19:36:01 +0000 (19:36 +0000)]
Connect the installation page to the build.
Approved by: re (implicit)
Sponsored by: Rubicon Communications, LLC (Netgate)
gjb [Tue, 25 Jun 2019 19:36:00 +0000 (19:36 +0000)]
Release notes documentation:
- Update version numbers in the installation page.
Approved by: re (implicit)
Sponsored by: Rubicon Communications, LLC (Netgate)
gjb [Tue, 25 Jun 2019 19:35:58 +0000 (19:35 +0000)]
Release notes documentation:
- Add versions of ports-mgmt/pkg, x11/gnome3, and x11/kde5.
Approved by: re (implicit)
Sponsored by: Rubicon Communications, LLC (Netgate)
gjb [Tue, 25 Jun 2019 19:35:57 +0000 (19:35 +0000)]
Release notes documentation:
- Remove empty sections.
Approved by: re (implicit)
Sponsored by: Rubicon Communications, LLC (Netgate)
gjb [Tue, 25 Jun 2019 19:35:56 +0000 (19:35 +0000)]
Release notes documentation:
- r338938, oce(4) version 11.0.50.0.
- r341987, mlx4en(4) and mlx5en(4) version 3.5.0.
- r349181, ixl(4) and ixlv(4) version 1.11.9 and 1.5.8.
Approved by: re (implicit)
Sponsored by: Rubicon Communications, LLC (Netgate)
gjb [Mon, 24 Jun 2019 19:52:08 +0000 (19:52 +0000)]
Release notes documentation:
- r347037, virtual machine image reduction, and note how to resize
the images.
- r346479, init_exec kenv(1) variable addition.
- r346518, spi(8) addition.
- r348482, deprecated IPSec algorithm warnings.
- r347962, driver deprecations.
Approved by: re (implicit)
Sponsored by: Rubicon Communications, LLC (Netgate)
gjb [Fri, 21 Jun 2019 00:01:12 +0000 (00:01 +0000)]
Update releng/11.3 to RC2 as part of the 11.3-RELEASE cycle.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
gjb [Wed, 19 Jun 2019 15:26:52 +0000 (15:26 +0000)]
Update the pkg.conf used to populate the dvd1.iso to use
the release_3 package set.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
erj [Wed, 19 Jun 2019 00:37:54 +0000 (00:37 +0000)]
MFS r349163: ixl(4)/ixlv(4): Update Intel XL710 PF and VF drivers to ixl-1.11.9 and ixlv-1.5.8
Update the legacy (non-iflib) drivers in stable/11 with recent changes from the
Intel out-of-tree version.
Major changes:
- Support for new BASE-T device with additional link speeds (2.5G and 5G) and EEE
- Additional I2C access methods backported from ixl-iflib
- FW LLDP Agent control with sysctl added for X722 devices (this already
existed for 710 devices)
- MAC/VLAN filters handling has been refactored
- Building and loading if_ixlv as a KLD has been fixed
This commit is not from CURRENT since the driver in 12/13 uses iflib, and the decision was
made to not use iflib in FreeBSD 11 releases.
Submitted by: Krzysztof Galazka <krzysztof.galazka@intel.com>
Approved by: re@ (gjb@)
Sponsored by: Intel Corporation
Differential Revision: https://reviews.freebsd.org/D20290
gjb [Fri, 14 Jun 2019 00:30:52 +0000 (00:30 +0000)]
Post-branch updates to release-related documentation:
- Bump copyright years.
- Note in parenthesis 11.3 may be the last 11.x release.
- Prune stale errata items from 11.2-RELEASE.
- Fix mailing list in the readme page.
- Bump version numbers accordingly.
This has no effect or impact on the in-progress 11.3-RC1
build.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
gjb [Fri, 14 Jun 2019 00:03:48 +0000 (00:03 +0000)]
Copy stable/11@r349022 to releng/11.3 as part of the 11.3-RELEASE
cycle.
Update releng/11.3 from BETA3 to RC1.
Switch the default dvd1.iso pkg(8) repository from latest to
quarterly.
Bump __FreeBSD_version.
Prune vestigial svn:mergeinfo from the new branch.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
gjb [Thu, 13 Jun 2019 19:51:48 +0000 (19:51 +0000)]
Release notes documentation:
- r346296, clang (and friends) 8.0.0.
- r346981, WPA 2.8.
- r348343, OpenSSL 1.0.2s.
- r348607, libarchive(3) updates.
- r348980, OpenPAM updates.
- r346855, cxgbe(4) hash filters, NAT offloading, SMAC/DMAC
swapping filtering.
- r346940, cxgbe(4) T4/5/6 firmware update.
- r348588, geli(8) weak algorithm deprecation warnings.
- r346690, ZFS parallel mounting.
- r348753, deprecation warnings enabled.
- r346212, NAT64 CLAT support.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
ae [Wed, 12 Jun 2019 16:34:02 +0000 (16:34 +0000)]
MFC r348682:
Initialize V_nat64out methods explicitly.
It looks like initialization of static variable doesn't work for
VIMAGE and this leads to panic.
Approved by: re (gjb)
des [Wed, 12 Jun 2019 01:53:14 +0000 (01:53 +0000)]
MFH (r313975, r315909, r317827, r344533): upgrade to latest OpenPAM
Approved by: re (gjb)
hselasky [Tue, 11 Jun 2019 08:50:26 +0000 (08:50 +0000)]
MFC r348797:
Fix for reading the configuration descriptor in libusb. Catch invalid
configuration descriptor reads early on to avoid issues with devices
that don't check for a valid USB configuration read request.
Submitted by: takahiro.kurosawa@gmail.com
PR: 238412
Approved by: re (kib)
cy [Tue, 11 Jun 2019 03:40:25 +0000 (03:40 +0000)]
MFC r348667:
While working on a PR, more are discovered.
Remove more #ifdefs missed in r343701.
Approved by: re (gjb@)
cy [Tue, 11 Jun 2019 03:39:20 +0000 (03:39 +0000)]
MFC r348666:
Clean up #ifdefs from old unsupported releases of FreeBSD.
Approved by: re (gjb@)
kevans [Mon, 10 Jun 2019 16:36:31 +0000 (16:36 +0000)]
MFC r342747 (mmacy): zfsboot: support newer ZFS versions
declare v3 objset size/layout to fix userboot and possibly other loader
issues
- fix for userboot assertion failure in zfs_dev_close in free due to out of
bounds write
- fix for zfs_alloc / zfs_free mismatch assertion failure when booting GPT
on BIOS
Approved by: re (gjb)
kevans [Mon, 10 Jun 2019 15:55:38 +0000 (15:55 +0000)]
MFC r348569: [zfsboot] Fix boot env back compat (#190)
* Fix boot env back compat
zfsboot must try zfsloader before loader in order to remain compatible
with boot environments created prior to zfs functionality being rolled
into loader proper.
* Improve comments in zfsboot
Explain the significance of the load path order, and put the comment
about looping through the paths in the appropriate scope.
Approved by: re (gjb)
kevans [Mon, 10 Jun 2019 14:47:56 +0000 (14:47 +0000)]
MFC r348510: bectl(8): Don't accept jid=0 from jail_getid
This will trivially exist, but we don't want it - none of our jailed BEs
will have jid=0.
Approved by: re (gjb)
slavash [Mon, 10 Jun 2019 13:44:29 +0000 (13:44 +0000)]
MFC r348601:
Fix prio vs. nonprio tagged traffic in RDMACM
In current RDMACM implementation RDMACM server will not find a GID
index when the request was prio-tagged and the sever is non
prio-tagged and vise-versa.
According to 802.1Q-2014, VLAN tagged packets with VLAN id 0 should
be considered as untagged. Treat RDMACM request the same.
Reviewed by: hselasky, kib
Sponsored by: Mellanox Technologies
Approved by: re (gjb@)
hselasky [Mon, 10 Jun 2019 13:36:12 +0000 (13:36 +0000)]
MFC r348631:
In usb(4) fix a lost completion event issue towards libusb(3). It may happen
if a USB transfer is cancelled that we need to fake a completion event.
Implement missing support in ugen_fs_copy_out() to handle this.
This fixes issues with webcamd(8) and firefox.
Approved by: re (gjb)
Sponsored by: Mellanox Technologies