]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/log
FreeBSD/FreeBSD.git
5 years agoFix small kernel memory disclosures. [EN-18:12.mem] releng/11.1
gordon [Thu, 27 Sep 2018 18:36:30 +0000 (18:36 +0000)]
Fix small kernel memory disclosures. [EN-18:12.mem]

Reported by: Thomas Barabosch, Fraunhofer FKIE
Approved by: so
Security: FreeBSD-EN-18:12.mem
Security: CVE-2018-17155

5 years agoFix DoS in listen syscall over IPv6 socket. [EN-18:11.listen]
gordon [Thu, 27 Sep 2018 18:34:42 +0000 (18:34 +0000)]
Fix DoS in listen syscall over IPv6 socket. [EN-18:11.listen]

Reported by: Jakub Jirasek, Secunia Research at Flexera
Approved by: so
Security: FreeBSD-EN-18:11.listen
Security: CVE-2018-6925

5 years agoFix NULL pointer dereference in freebsd4_getfsstat. [EN-18:10.syscall]
gordon [Thu, 27 Sep 2018 18:32:14 +0000 (18:32 +0000)]
Fix NULL pointer dereference in freebsd4_getfsstat. [EN-18:10.syscall]

Reported by: Thomas Barabosch, Fraunhofer FKIE
Approved by: so
Security: FreeBSD-EN-18:10.syscall
Security: CVE-2018-17154

5 years agoFix regression in IPv6 fragment reassembly. [EN-18:09.ip]
gordon [Thu, 27 Sep 2018 18:29:55 +0000 (18:29 +0000)]
Fix regression in IPv6 fragment reassembly. [EN-18:09.ip]

Approved by: so
Security: FreeBSD-EN-18:09.ip

5 years agoFix regression in Lazy FPU remediation. [EN-18:08.lazyfpu]
gordon [Wed, 12 Sep 2018 05:08:49 +0000 (05:08 +0000)]
Fix regression in Lazy FPU remediation. [EN-18:08.lazyfpu]

Approved by: so
Security: FreeBSD-EN-18:08.lazyfpu

5 years agoFix improper elf header parsing. [SA-18:12.elf]
gordon [Wed, 12 Sep 2018 05:07:35 +0000 (05:07 +0000)]
Fix improper elf header parsing. [SA-18:12.elf]

Approved by: so
Security: FreeBSD-SA-18:12.elf
Security: CVE-2018-6924

5 years agoRevis manual pages. [SA-18:08.tcp]
delphij [Wed, 15 Aug 2018 02:30:11 +0000 (02:30 +0000)]
Revis manual pages. [SA-18:08.tcp]

Fix L1 Terminal Fault (L1TF) kernel information disclosure.
[SA-18:09.l1tf]

Fix resource exhaustion in IP fragment reassembly. [SA-18:10.ip]

Fix unauthenticated EAPOL-Key decryption vulnerability.
[SA-18:11.hostapd]

Approved by: so

5 years agoBump patch level and document them.
delphij [Mon, 6 Aug 2018 20:39:27 +0000 (20:39 +0000)]
Bump patch level and document them.

Approved by: so

5 years agoAddress concerns about CPU usage while doing TCP reassembly.
jtl [Mon, 6 Aug 2018 17:48:46 +0000 (17:48 +0000)]
Address concerns about CPU usage while doing TCP reassembly.

Currently, the per-queue limit is a function of the receive buffer
size and the MSS.  In certain cases (such as connections with large
receive buffers), the per-queue segment limit can be quite large.
Because we process segments as a linked list, large queues may not
perform acceptably.

The better long-term solution is to make the queue more efficient.
But, in the short-term, we can provide a way for a system
administrator to set the maximum queue size.

We set the default queue limit to 100.  This is an effort to balance
performance with a sane resource limit.  Depending on their
environment, goals, etc., an administrator may choose to modify this
limit in either direction.

Approved by: so
Security: FreeBSD-SA-18:08.tcp
Security: CVE-2018-6922

5 years agoFix TLB shootdown for Xen based guests. [EN-18:07.pmap]
gordon [Thu, 21 Jun 2018 05:18:08 +0000 (05:18 +0000)]
Fix TLB shootdown for Xen based guests. [EN-18:07.pmap]

Approved by: so
Security: FreeBSD-EN-18:07.pmap

5 years agoFix Lazy FPU information disclosure. [SA-18:07.lazyfpu]
gordon [Thu, 21 Jun 2018 05:17:13 +0000 (05:17 +0000)]
Fix Lazy FPU information disclosure. [SA-18:07.lazyfpu]

Bump newvers.sh and UPDATING for today's patches.

Approved by: so
Security: CVE-2018-3665
Security: FreeBSD-SA-18:07.lazyfpu
Sponsored by: The FreeBSD Foundation

5 years agoUpdate timezone database information. [EN-18:06.tzdata]
gordon [Tue, 8 May 2018 17:18:24 +0000 (17:18 +0000)]
Update timezone database information. [EN-18:06.tzdata]

Approved by: so
Security: FreeBSD-EN-18:06.tzdata

5 years agoFix multiple small kernel memory disclosures. [EN-18:05.mem]
gordon [Tue, 8 May 2018 17:14:54 +0000 (17:14 +0000)]
Fix multiple small kernel memory disclosures. [EN-18:05.mem]

Approved by: so
Security: CVE-2018-6920
Security: CVE-2018-6921
Security: FreeBSD-EN-18:05.mem

5 years agoFix mishandling of x86 debug exceptions. [SA-18:06.debugreg]
gordon [Tue, 8 May 2018 17:12:10 +0000 (17:12 +0000)]
Fix mishandling of x86 debug exceptions. [SA-18:06.debugreg]

Bump newvers.sh and UPDATING for today's patches.

Approved by: so
Security: CVE-2018-8897
Security: FreeBSD-SA-18:06.debugreg
Sponsored by: The FreeBSD Foundation

6 years agoFix multiple small kernel memory disclosures. [EN-18:04.mem]
gordon [Wed, 4 Apr 2018 05:43:03 +0000 (05:43 +0000)]
Fix multiple small kernel memory disclosures. [EN-18:04.mem]

Reported by: Ilja van Sprundel
Approved by: so
Security: CVE-2018-6919
Security: FreeBSD-EN-18:04.mem

6 years agoUpdate timezone database information. [EN-18:03.tzdata]
gordon [Wed, 4 Apr 2018 05:40:48 +0000 (05:40 +0000)]
Update timezone database information. [EN-18:03.tzdata]

Submitted by: philip
Approved by: so
Security: FreeBSD-EN-18:03.tzdata

6 years agoFix ipsec crash or denial of service. [SA-18:05.ipsec]
gordon [Wed, 4 Apr 2018 05:37:52 +0000 (05:37 +0000)]
Fix ipsec crash or denial of service. [SA-18:05.ipsec]

Reported by: Maxime Villard
Approved by: so
Security: CVE-2018-6918
Security: FreeBSD-SA-18:05.ipsec

6 years agoFix vt console memory disclosure. [SA-18:04.vt]
gordon [Wed, 4 Apr 2018 05:33:56 +0000 (05:33 +0000)]
Fix vt console memory disclosure. [SA-18:04.vt]

Bump newvers.sh and UPDATING for today's patches.

Submitted by: emaste
Reported by: Dr Silvio Cesare of InfoSect
Approved by: so
Security: CVE-2018-6917
Security: FreeBSD-SA-18:04.vt
Sponsored by: The FreeBSD Foundation

6 years agoAdd mitigations for two classes of speculative execution vulnerabilities
gordon [Wed, 14 Mar 2018 04:00:00 +0000 (04:00 +0000)]
Add mitigations for two classes of speculative execution vulnerabilities
on amd64. [FreeBSD-SA-18:03.speculative_execution]

Approved by: so
Security: FreeBSD-SA-18:03.speculative_execution
Security: CVE-2017-5715
Security: CVE-2017-5754

6 years agoUpdate file(1) to new version with security update. [EN-18:02.file]
gordon [Wed, 7 Mar 2018 06:04:25 +0000 (06:04 +0000)]
Update file(1) to new version with security update. [EN-18:02.file]

Approved by: so
Security: FreeBSD-EN-18:02.file
Security: CVE-2017-1000249

6 years agoUpdate timezone database information. [EN-18:01.tzdata]
gordon [Wed, 7 Mar 2018 06:01:44 +0000 (06:01 +0000)]
Update timezone database information. [EN-18:01.tzdata]

Approved by: so
Security: FreeBSD-EN-18:01.tzdata

6 years agoFix multiple vulnerabilities in ntp. [SA-18:02.ntp]
gordon [Wed, 7 Mar 2018 05:58:24 +0000 (05:58 +0000)]
Fix multiple vulnerabilities in ntp. [SA-18:02.ntp]

Approved by: so
Security: FreeBSD-SA-18:02.ntp
Security: CVE-2018-7182
Security: CVE-2018-7170
Security: CVE-2018-7184
Security: CVE-2018-7185
Security: CVE-2018-7183

6 years agoFix ipsec validation and use-after-free. [SA-18:01.ipsec]
gordon [Wed, 7 Mar 2018 05:53:35 +0000 (05:53 +0000)]
Fix ipsec validation and use-after-free. [SA-18:01.ipsec]

Approved by: so
Security: FreeBSD-SA-18:01.ipsec
Security: CVE-2018-6916

6 years agoFix multiple OpenSSL vulnerabilities.
gordon [Sat, 9 Dec 2017 03:44:26 +0000 (03:44 +0000)]
Fix multiple OpenSSL vulnerabilities.

Approved by: so
Security: CVE-2017-3737
Security: CVE-2017-3738
Security: FreeBSD-SA-17:12.openssl

6 years agoBump patch level.
delphij [Wed, 29 Nov 2017 07:41:39 +0000 (07:41 +0000)]
Bump patch level.

Reported by: Franco Fichtner <franco lastsummer de>
Approved by: so

6 years agoFix multiple vulnerabilities of OpenSSL.
delphij [Wed, 29 Nov 2017 05:59:12 +0000 (05:59 +0000)]
Fix multiple vulnerabilities of OpenSSL.

Security: FreeBSD-SA-17:11
Approved by: so

6 years agoCorrect patch level.
gordon [Wed, 15 Nov 2017 23:29:32 +0000 (23:29 +0000)]
Correct patch level.

Approved by: so
X-Pointy-Hat: gordon@

6 years agoProperly bzero kldstat structure to prevent information leak. [SA-17:10]
gordon [Wed, 15 Nov 2017 22:49:47 +0000 (22:49 +0000)]
Properly bzero kldstat structure to prevent information leak. [SA-17:10]

Approved by: so
Security: FreeBSD-SA-17:10.kldstat
Security: CVE-2017-1088

6 years agoFix kernel data leak via ptrace(PT_LWPINFO). [SA-17:08]
gordon [Wed, 15 Nov 2017 22:39:41 +0000 (22:39 +0000)]
Fix kernel data leak via ptrace(PT_LWPINFO). [SA-17:08]

Approved by: so
Security: FreeBSD-SA-17:08.ptrace
Security: CVE-2017-1086

6 years agoUpdate timezone database information. [EN-17:09]
gordon [Thu, 2 Nov 2017 15:40:19 +0000 (15:40 +0000)]
Update timezone database information. [EN-17:09]

Approved by: so

6 years agoCorrect copy-paste. 11.1 is p2, not p13.
gordon [Tue, 17 Oct 2017 21:20:07 +0000 (21:20 +0000)]
Correct copy-paste. 11.1 is p2, not p13.

X-Pointy-Hat-To: gordon
Approved by: so

6 years agoFix WPA2 protocol vulnerability. [SA-17:07]
gordon [Tue, 17 Oct 2017 17:57:18 +0000 (17:57 +0000)]
Fix WPA2 protocol vulnerability. [SA-17:07]

Approved by: so

6 years agoFix OpenSSH Denial of Service vulnerability. [SA-17:06]
delphij [Thu, 10 Aug 2017 06:59:07 +0000 (06:59 +0000)]
Fix OpenSSH Denial of Service vulnerability. [SA-17:06]

Fix VNET kernel panic with asynchronous I/O. [EN-17:07]

Fix pf(4) housekeeping thread causes kernel panic. [EN-17:08]

Approved by: so

6 years ago- Switch releng/11.1 to -RELEASE.
gjb [Thu, 20 Jul 2017 23:39:50 +0000 (23:39 +0000)]
- Switch releng/11.1 to -RELEASE.
- Add the anticipated 11.1-RELEASE date to UPDATING.
- Set a static __FreeBSD_version.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

6 years agoDocument r307265, vfs.zfs.compressed_arc_enabled.
gjb [Sun, 16 Jul 2017 17:29:27 +0000 (17:29 +0000)]
Document r307265, vfs.zfs.compressed_arc_enabled.

Proxied by: allanjude, emaste
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

6 years agoRename releng/11.1 to RC3 as part of the 11.1-RELEASE cycle.
gjb [Thu, 13 Jul 2017 23:48:05 +0000 (23:48 +0000)]
Rename releng/11.1 to RC3 as part of the 11.1-RELEASE cycle.
Use the 'release_1' package set to populate the dvd1.iso packages.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

6 years agoDocument r320954, deprecation of digi(4), ie(4), mcd(4), scd(4),
gjb [Thu, 13 Jul 2017 17:37:32 +0000 (17:37 +0000)]
Document r320954, deprecation of digi(4), ie(4), mcd(4), scd(4),
si(4), spic(4), wl(4), sicontrol(8), and wlconfig(8).

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

6 years agoMFS11 320921:
jhb [Thu, 13 Jul 2017 17:05:57 +0000 (17:05 +0000)]
MFS11 320921:
Add deprecation notices for various device drivers removed in 12.0.

Approved by: re (kib)

6 years agoDocument pkg(8) version 1.10.1.
gjb [Thu, 13 Jul 2017 16:27:43 +0000 (16:27 +0000)]
Document pkg(8) version 1.10.1.
Prune empty sections.
Remove a stale comment.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

6 years agoDocument SA-17:05.heimdal.
gjb [Thu, 13 Jul 2017 16:23:44 +0000 (16:23 +0000)]
Document SA-17:05.heimdal.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

6 years agoMF11 r320947; MFC r320876:
hselasky [Thu, 13 Jul 2017 15:54:26 +0000 (15:54 +0000)]
MF11 r320947; MFC r320876:
Make sure the mlx4en RX DMA ring gets stamped with software ownership
in order to prevent the flow of QP to error in the firmware once
UPDATE_QP is called.

Approved by: re (marius)
Sponsored by: Mellanox Technologies

6 years agoMFS 320891
grehan [Thu, 13 Jul 2017 08:13:29 +0000 (08:13 +0000)]
MFS 320891
    MFC r317542, r317543, r317543

      317542   comment fix
      317543   set rfb default port
      317543   listen on localhost by default for rfb

Approved by: re (kib)

6 years agoMFS 320866
grehan [Thu, 13 Jul 2017 07:55:00 +0000 (07:55 +0000)]
MFS 320866
    MFC 313727, 317483
      In addition, replace the missing caph routines with
    small helper functions (bhyverun.c) or an open-coded
    replacement (uart_emul.c)

    313727   Capsicumize bhyve
    317483   Allow CAP_MMAP_RW on memfd for PCI passthru

Approved by: re (kib)

6 years agoMFS r320855
grehan [Thu, 13 Jul 2017 07:32:55 +0000 (07:32 +0000)]
MFS r320855
  ps2 mouse fixes, found by plan9/9front.

Approved by:    re (kib)

6 years agoMF11: r320898; MFC: r320577, r320620
marius [Wed, 12 Jul 2017 21:46:16 +0000 (21:46 +0000)]
MF11: r320898; MFC: r320577, r320620

Retry up to 2 ms to enable bus power as at least with some Intel
SDHCI/eMMC controllers the first attempt after a D3 to D0 transition,
i. e. when the firmware has put the devices into D3 state before,
can fail.

Approved by: re (gjb)

6 years agoMFS r320907: MFC r320906: MFV r320905: Import upstream fix for
delphij [Wed, 12 Jul 2017 08:07:16 +0000 (08:07 +0000)]
MFS r320907: MFC r320906: MFV r320905: Import upstream fix for
CVE-2017-11103.

In _krb5_extract_ticket() the KDC-REP service name must be obtained
from encrypted version stored in 'enc_part' instead of the unencrypted
version stored in 'ticket'.  Use of the unecrypted version provides an
opportunity for successful server impersonation and other attacks.

Submitted by: hrs
Obtained from: Heimdal
Security: FreeBSD-SA-17:05.heimdal
Security: CVE-2017-11103
Approved by: re (kib)

6 years agoMFS r320889:
kib [Wed, 12 Jul 2017 07:31:28 +0000 (07:31 +0000)]
MFS r320889:
Restore layout of struct vm_map_entry.

Approved by: re (delphij)

6 years agoMFC r320843 MFS r320903:
kib [Wed, 12 Jul 2017 07:00:56 +0000 (07:00 +0000)]
MFC r320843 MFS r320903:
Fix loop termination in vm_map_find_min().

Approved by: re (delphij)

6 years agoMFC r320801 MFS r320887:
kib [Tue, 11 Jul 2017 05:49:42 +0000 (05:49 +0000)]
MFC r320801 MFS r320887:
Simplify language.

Approved by: re (delphij)

6 years agoDocument r320874, gdb(1) and kgdb(1) deprecation.
gjb [Mon, 10 Jul 2017 17:53:12 +0000 (17:53 +0000)]
Document r320874, gdb(1) and kgdb(1) deprecation.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

6 years agoMFS11 320824: Add deprecation notices for gdb and kgdb.
jhb [Mon, 10 Jul 2017 17:42:24 +0000 (17:42 +0000)]
MFS11 320824: Add deprecation notices for gdb and kgdb.

Even though gdb and kgdb may not be removed for 12.0 on some architectures,
the notice is unconditional as these tools will likely be removed at some
point in the future when adequate replacements are available (gdb in ports
or lldb in base).

Approved by: re (gjb)
Relnotes: yes

6 years agoMFS11 r320870:
gjb [Mon, 10 Jul 2017 12:52:18 +0000 (12:52 +0000)]
MFS11 r320870:
 MFC r320785:
 Connect ena(4) to the build.

Approved by: re (kib)
Sponsored by: The FreeBSD Foundation

6 years agoMFC r320619 MFS r320863:
kib [Mon, 10 Jul 2017 07:12:59 +0000 (07:12 +0000)]
MFC r320619 MFS r320863:
Resolve confusion between different error code spaces.

Approved by: re (delphij)

6 years agoMFC r320570 MFS r320822:
kib [Sun, 9 Jul 2017 04:34:22 +0000 (04:34 +0000)]
MFC r320570 MFS r320822:
Correct signatures of several pthreads stubs.

Approved by: re (gjb)

6 years agoMFS r320799: MFC r320665:
delphij [Sat, 8 Jul 2017 04:53:12 +0000 (04:53 +0000)]
MFS r320799: MFC r320665:

In open_binary_fd: when using buffer size for strl* and snprintf,
always use >= instead of > to avoid truncation.

Approved by: re (kib)

6 years agoDocument r320760, ena(4) addition.
gjb [Fri, 7 Jul 2017 15:41:47 +0000 (15:41 +0000)]
Document r320760, ena(4) addition.
Add the ena(4) manual page.
Add Amazon.com to the sponsors.ent file.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

6 years agoRename releng/11.1 to RC2 as part of the 11.1-RELEASE cycle.
gjb [Fri, 7 Jul 2017 15:01:10 +0000 (15:01 +0000)]
Rename releng/11.1 to RC2 as part of the 11.1-RELEASE cycle.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

6 years agoMFS11 r320753:
gjb [Fri, 7 Jul 2017 15:00:25 +0000 (15:00 +0000)]
MFS11 r320753:
 MFC r320748:
 Allow passing NOPKG= to make(1) to enable the pkg-stage target
 from getting executed when NOPKG is defined but empty.

Approved by: re (kib)
Sponsored by: The FreeBSD Foundation

6 years agoAdd MAP_GUARD and use it for stack grow area protection.
kib [Fri, 7 Jul 2017 06:29:18 +0000 (06:29 +0000)]
Add MAP_GUARD and use it for stack grow area protection.
Bump __FreeBSD_version.  This is an MFS of stable/11 r320666.

MFC r320317:
Implement address space guards.

MFC r320338:
Remove stale part of the comment.

MFC r320339:
Correctly handle small MAP_STACK requests.

MFC r320344:
For now, allow mprotect(2) over the guards to succeed regardless of
the requested protection.

MFC r320430:
Treat the addr argument for mmap(2) request without MAP_FIXED flag as
a hint.

MFC r320560 (by alc):
Modify vm_map_growstack() to protect itself from the possibility of the
gap entry in the vm map being smaller than the sysctl-derived stack guard
size.

Approved by: re (delphij)

6 years agoMF11 r320731,320749,320759: Add Amazon Elastic Network Adapter driver
cperciva [Fri, 7 Jul 2017 00:34:51 +0000 (00:34 +0000)]
MF11 r320731,320749,320759: Add Amazon Elastic Network Adapter driver
and turn it on in EC2 AMI builds

Approved by: re (gjb)
Relnotes: FreeBSD now supports "next generation" Enhanced Networking
in the Amazon EC2 cloud
Sponsored by: Amazon.com Inc. (original work)

6 years agoMF11 r320685: Update to ELF Tool Chain snapshot at r3561
emaste [Thu, 6 Jul 2017 18:30:52 +0000 (18:30 +0000)]
MF11 r320685: Update to ELF Tool Chain snapshot at r3561

This update is primarily bug fixes in C++ symbol demangling, including:

- rvalue reference
- builtin type auto and decltype(auto)
- revamped support for function return types
- formatting fixes
- omit void when its the only param
- ref-qualifiers and others in function types
- type qualifiers in pointer-to-member function types
- incorrect handling regarding CV-qualifiers in function types
- ref-qualifier found in nested-name
- properly handle <name> ::= <substitute><template-args>
- make sure that nested function name is not a substitute candidate
- correctly handle expression in template args
- skip unknown substitution abbreviations

Also r320663 libelftc: bump version, tracking import in r320343

Approved by: re (gjb)
Sponsored by: The FreeBSD Foundation

6 years agoMFS r320744: MFC r320690:
markj [Thu, 6 Jul 2017 17:31:38 +0000 (17:31 +0000)]
MFS r320744: MFC r320690:
Defer ACPI taskqueue creation to SI_SUB_KICK_SCHEDULER.

PR: 220277
Approved by: re (gjb)

6 years agoUpdate the pkg(8) configuration for the default installation and
gjb [Thu, 6 Jul 2017 17:22:33 +0000 (17:22 +0000)]
Update the pkg(8) configuration for the default installation and
the dvd1.iso to use the quarterly set, now that the new quarterly
branch exists and packages have built.

This commit was deferred when branching releng/11.1, since the
2017Q3 branch did not exist yet.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

6 years agoMFS11 r320697:
gjb [Thu, 6 Jul 2017 04:03:21 +0000 (04:03 +0000)]
MFS11 r320697:
 MFC r320599:
 Fix Vagrant image upload after recent API changes.

 - Update ATLAS_UPLOAD_URL to avoid various regular expressions
   from failing to match due to redirections.
 - Use ATLAS_UPLOAD_URL throughout the script.
 - Adjust several regular expression patterns.

Approved by: re (kib)
Sponsored by: The FreeBSD Foundation

6 years agoMFS r320605, r320610: MFC r303052, r309017 (by alc):
markj [Wed, 5 Jul 2017 19:24:53 +0000 (19:24 +0000)]
MFS r320605, r320610: MFC r303052, r309017 (by alc):
Omit v_cache_count when computing the number of free pages, since its
value is always 0.

Approved by: re (gjb, kib)

6 years agoMFS r320684: MFC r320451 (by cem):
markj [Wed, 5 Jul 2017 17:29:07 +0000 (17:29 +0000)]
MFS r320684: MFC r320451 (by cem):
Complete support for the IO_APPEND flag in fuse.

Approved by: re (gjb)

6 years agoDocument r320654, rcmd deprecation.
gjb [Wed, 5 Jul 2017 17:06:29 +0000 (17:06 +0000)]
Document r320654, rcmd deprecation.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

6 years agoMerge r320645 from stable/11 into releng/11.1:
allanjude [Tue, 4 Jul 2017 18:36:02 +0000 (18:36 +0000)]
Merge r320645 from stable/11 into releng/11.1:
Add deprecation notices for all rcmd tools

Approved by: re (gjb)
Relnotes: yes

6 years agoMFC r320422:
kib [Tue, 4 Jul 2017 05:37:58 +0000 (05:37 +0000)]
MFC r320422:
Do not ignore an error from vm_mmap_object().

Approved by: re (delphij)

6 years agoMerge r320602 from stable/11 into releng/11.1:
ken [Mon, 3 Jul 2017 18:20:45 +0000 (18:20 +0000)]
Merge r320602 from stable/11 into releng/11.1:
  ------------------------------------------------------------------------
  r320602 | ken | 2017-07-03 09:34:21 -0600 (Mon, 03 Jul 2017) | 45 lines

  MFC r320421:

    ------------------------------------------------------------------------
    r320421 | ken | 2017-06-27 13:26:02 -0600 (Tue, 27 Jun 2017) | 37 lines

    Fix a panic in camperiphfree().

    If a peripheral driver (e.g. da, sa, cd) is added or removed from the
    peripheral driver list while an unrelated peripheral driver instance (e.g.
    da0, sa5, cd2) is going away and is inside camperiphfree(), we could
    dereference an invalid pointer.

    When peripheral drivers are added or removed (see periphdriver_register()
    and periphdriver_unregister()), the peripheral driver array is resized
    and existing entries are moved.

    Although we hold the topology lock while we traverse the peripheral driver
    list, we retain a pointer to the location of the peripheral driver pointer
    and then drop the topology lock.  So we are still vulnerable to the list
    getting moved around while the lock is dropped.

    To solve the problem, cache a copy of the peripheral driver pointer.  If
    its storage location in the list changes while we have the lock dropped, it
    won't have any effect.

    This doesn't solve the issue that peripheral drivers ("da", "cd", as opposed
    to individual instances like "da0", "cd0") are not generally part of a
    reference counting scheme to guard against deregistering them while there
    are instances active.  The caller (generally the person unloading a module)
    has to be aware of active drivers and not unload something that is in use.

    sys/cam/cam_periph.c:
     In camperiphfree(), cache a pointer to the peripheral driver
     instance to avoid holding a pointer to an invalid memory location
     in the event that the peripheral driver list changes while we have
     the topology lock dropped.

    PR: kern/219701
    Submitted by: avg
    Sponsored by: Spectra Logic

    ------------------------------------------------------------------------
  ------------------------------------------------------------------------

Approved by: re (gjb)

6 years agoMerge r320600 from stable/11 into releng/11.1:
ken [Mon, 3 Jul 2017 18:07:09 +0000 (18:07 +0000)]
Merge r320600 from stable/11 into releng/11.1:
  ------------------------------------------------------------------------
  r320600 | ken | 2017-07-03 09:10:16 -0600 (Mon, 03 Jul 2017) | 30 lines

  MFC r320420:

    ------------------------------------------------------------------------
    r320420 | ken | 2017-06-27 11:55:25 -0600 (Tue, 27 Jun 2017) | 25 lines

    In scsi_zbc_in(), fill in the length in the ZBC IN CDB.

    Without the allocation length set, the target will either reject
    the command or complete it without transferring any data.

    This fixes the REPORT ZONES command for SCSI ZBC protocol devices,
    as well as ATA ZAC protocol devices that are behind a SCSI to ATA
    translation layer.  (LSI/Broadcom's 12Gb SAS adapters translate ZBC
    commands to ZAC commands.)  Those are Host Aware and Host Managed SMR
    drives.

    This will fix REPORT ZONE commands sent to the da(4) driver via the
    GEOM bio interface and zonectl, and REPORT ZONE commands sent from
    camcontrol(8).

    Note that in the case of camcontrol(8), we currently only send
    SCSI ZBC commands to native SCSI protocol devices, not ATA devices
    behind a SAT layer.

    sys/cam/scsi/scsi_da.c:
     Fill in the length field in scsi_zbc_in().

    Sponsored by: Spectra Logic
    ------------------------------------------------------------------------
  ------------------------------------------------------------------------

Approved by: re (gjb)

6 years agoMFS11 r320596:
gjb [Mon, 3 Jul 2017 13:46:58 +0000 (13:46 +0000)]
MFS11 r320596:
 MFC r320488:
  Correct the branch naming convention in param.h.
  While here, consistently use upper-case 'X' to represent the
  version number.

Approved by: re (kib, marius)
Sponsored by: The FreeBSD Foundation

6 years agoMerge from stable/11 r320593:
ae [Mon, 3 Jul 2017 10:10:04 +0000 (10:10 +0000)]
Merge from stable/11 r320593:
  Fix IPv6 extension header parsing. The length field doesn't include
  the first 8 octets.

  Obtained from: Yandex LLC
Approved by: re (marius)

6 years agoMFS r320586: MFC r320093: Check return value of seteuid() and bail out
delphij [Mon, 3 Jul 2017 05:42:55 +0000 (05:42 +0000)]
MFS r320586: MFC r320093: Check return value of seteuid() and bail out
if we fail.

Approved by: re (kib)

6 years agoMFS r320566: MFC r320390:
araujo [Mon, 3 Jul 2017 05:04:44 +0000 (05:04 +0000)]
MFS r320566: MFC r320390:
With r318394 seems it breaks gpart(8) in some embedded systems such like PCEngines,
RPI1-B, Alix and APU2 boards as well as NanoBSD with the following message:

vnode_pager_generic_getpages_done: I/O read error 5

Seems the breakage was because it was missed to include acr in glabel update.

Approved by: re (delphij)

6 years agoMFS r320581: MFC r320494: Fix double free by reverting r300385 and
delphij [Mon, 3 Jul 2017 04:25:28 +0000 (04:25 +0000)]
MFS r320581: MFC r320494: Fix double free by reverting r300385 and
r300624 which was false positive reported by cppcheck.

Approved by: re (kib)

6 years agoMFC r320316:
kib [Sat, 1 Jul 2017 22:54:52 +0000 (22:54 +0000)]
MFC r320316:
Do not try to unmark MAP_ENTRY_IN_TRANSITION marked by other thread.

Approved by: re (gjb)

6 years agorelease.ent:
gjb [Fri, 30 Jun 2017 19:22:35 +0000 (19:22 +0000)]
release.ent:
- Update versions, and switch from 'snapshot' to 'release'.

errata/article.xml:
- Prune stale entries from 11.0-RELEASE.
- Bump copyright date.

relnotes/article.xml:
- Remove several empty sections.

readme/article.xml:
- Fix a malformed URL.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

6 years ago- Copy stable/11@r320475 to releng/11.1 as part of the 11.1-RELEASE
gjb [Thu, 29 Jun 2017 23:56:50 +0000 (23:56 +0000)]
- Copy stable/11@r320475 to releng/11.1 as part of the 11.1-RELEASE
  cycle.
- Prune svn:mergeinfo from the new branch.
- Bump __FreeBSD_version.
- Rename releng/11.1 to RC1.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

6 years agoMFC r320372:
markj [Thu, 29 Jun 2017 17:34:48 +0000 (17:34 +0000)]
MFC r320372:
Fix a memory leak in ses_get_elm_devnames().

Approved by: re (gjb)

6 years agoMFC r320353: linux_getdents, linux_readdir: fix mismatch between malloc and free...
avg [Thu, 29 Jun 2017 12:49:03 +0000 (12:49 +0000)]
MFC r320353: linux_getdents, linux_readdir: fix mismatch between malloc and free tags

Approved by: re (gjb)

6 years agoMFC r320263:
tuexen [Wed, 28 Jun 2017 21:08:21 +0000 (21:08 +0000)]
MFC r320263:
Use a longer buffer for messages in ERROR chunks.

MFC r320264:
Check the length of a COOKIE chunk before accessing fields in it.

MFC r320300:
Handle sctp_get_next_param() in a consistent way.

Approved by: re (marius@)

6 years agoMFC r315518
alc [Wed, 28 Jun 2017 05:28:15 +0000 (05:28 +0000)]
MFC r315518
  Avoid unnecessary calls to vm_map_protect() in elf_load_section().

  Typically, when elf_load_section() unconditionally passed VM_PROT_ALL to
  elf_map_insert(), it was needlessly enabling execute access on the
  mapping, and it would later have to call vm_map_protect() to correct the
  mapping's access rights.  Now, instead, elf_load_section() always passes
  its parameter "prot" to elf_map_insert().  So, elf_load_section() must
  only call vm_map_protect() if it needs to remove the write access that
  was temporarily granted to perform a copyout().

Approved by: re (kib)

6 years agoMFC r320202:
kib [Wed, 28 Jun 2017 05:20:28 +0000 (05:20 +0000)]
MFC r320202:
Call pmap_copy() only for map entries which have the backing object
instantiated.

Approved by: re (delphij)

6 years agoMFC r320201:
kib [Wed, 28 Jun 2017 04:25:20 +0000 (04:25 +0000)]
MFC r320201:
Assert that the protection of a new map entry is a subset of the max
protection.

Approved by: re (delphij)

6 years agoMFC r314310
alc [Wed, 28 Jun 2017 04:01:29 +0000 (04:01 +0000)]
MFC r314310
  Refine the fix from r312954.  Specifically, add a new PDE-only flag,
  PG_PROMOTED, that indicates whether lingering 4KB page mappings might
  need to be flushed on a PDE change that restricts or destroys a 2MB
  page mapping.  This flag allows the pmap to avoid range invalidations
  that are both unnecessary and costly.

Approved by: re (kib)

6 years agoMFC r320123:
ken [Tue, 27 Jun 2017 12:56:36 +0000 (12:56 +0000)]
MFC r320123:

  Fix a potential sleep while holding a mutex in the sa(4) driver.

  If the user issues a MTIOCEXTGET ioctl, and the tape drive in question has
  a serial number that is longer than 80 characters, we malloc a buffer in
  saextget() to hold the output of cam_strvis().

  Since a mutex is held in that codepath, doing a M_WAITOK malloc could lead
  to sleeping while holding a mutex.  Change it to a M_NOWAIT malloc and bail
  out if we fail to allocate the memory.  Devices with serial numbers longer
  than 80 bytes are very rare (I don't recall seeing one), so this
  should be a very unusual case to hit.  But it is a bug that should be fixed.

  sys/cam/scsi/scsi_sa.c:
   In saextget(), if we need to malloc a buffer to hold the output of
   cam_strvis(), don't wait for the memory.  Fail and return an error
   if we can't allocate the memory immediately.

PR: kern/220094
Submitted by: Jia-Ju Bai <baijiaju1990@163.com>
Sponsored by: Spectra Logic
Approved by: re (gjb)

6 years agoMFC r320307:
kib [Tue, 27 Jun 2017 10:50:48 +0000 (10:50 +0000)]
MFC r320307:
Fix indent.

Approved by: re (marius)

6 years agoMFC r320314:
kib [Tue, 27 Jun 2017 10:09:00 +0000 (10:09 +0000)]
MFC r320314:
Remove the description of MAP_HASSEMAPHORE.

Approved by: re (marius)

6 years agoMFC r320313:
kib [Tue, 27 Jun 2017 09:42:56 +0000 (09:42 +0000)]
MFC r320313:
Fix typo.

Approved by: re (marius)

6 years agoMFC r320175
davidcs [Mon, 26 Jun 2017 19:36:24 +0000 (19:36 +0000)]
MFC r320175
Add pkts_cnt_oversized to stats.

Approved by: re(marius)

6 years agoMFC of 320176:
mckusick [Mon, 26 Jun 2017 17:29:32 +0000 (17:29 +0000)]
MFC of 320176:

Allow '_' in labels when specifying -L to newfs.

PR: 220163
Reported by: Keve Nagy
Reviewed by: kib
Approved by: re@ (Xin Li)

6 years agoMFC r320121:
kib [Mon, 26 Jun 2017 12:37:11 +0000 (12:37 +0000)]
MFC r320121:
Ignore the P_SYSTEM process flag, and do not request
VM_MAP_WIRE_SYSTEM mode when wiring the newly grown stack.

Approved by: re (marius)

6 years agoMFC r320125:
kib [Mon, 26 Jun 2017 12:30:39 +0000 (12:30 +0000)]
MFC r320125:
Fix batched unload for DMAR busdma in qi mode.

Approved by: re (marius)

6 years agoMFC r320108:
kib [Mon, 26 Jun 2017 12:17:04 +0000 (12:17 +0000)]
MFC r320108:
Allow negative aio_offset only for the read and write LIO ops on
device nodes.

Approved by: re (marius)

6 years agoMFC r320259: jedec_ts: read device id from the correct register
avg [Mon, 26 Jun 2017 09:32:57 +0000 (09:32 +0000)]
MFC r320259: jedec_ts: read device id from the correct register

Approved by: re (marius)

6 years agoMFC 320184
sephe [Mon, 26 Jun 2017 05:56:49 +0000 (05:56 +0000)]
MFC 320184

    hyperv/storvsc: Reduce log verbosity

    On some windows hosts TEST_UNIT_READY command will return
    SRB_STATUS_ERROR and sense data "NOT READY asc:3a,1 (Medium
    not present - tray closed)", this occurs periodically, and
    not hurt anything else.  So, we prefer to ignore this kind
    of errors.

    Approved by:    re (delphij)
    PR:             219973
    Submitted by:   Hongjiang Zhang <hongzhan microsoft com>
    Sponsored by:   Microsoft
    Differential Revision:  https://reviews.freebsd.org/D11271

6 years agoMFC r320242, r320256:
cy [Mon, 26 Jun 2017 05:42:35 +0000 (05:42 +0000)]
MFC r320242, r320256:

Update leap-seconds to leap-seconds.3676924800.

As per https://datacenter.iers.org/eop/-/somos/5Rgv/latest/16:

     INTERNATIONAL EARTH ROTATION AND REFERENCE SYSTEMS SERVICE (IERS)

SERVICE INTERNATIONAL DE LA ROTATION TERRESTRE ET DES SYSTEMES DE REFERENCE

SERVICE DE LA ROTATION TERRESTRE
OBSERVATOIRE DE PARIS
61, Av. de l'Observatoire 75014 PARIS (France)
Tel.      : 33 (0) 1 40 51 23 35
FAX       : 33 (0) 1 40 51 22 91
Internet  : services.iers@obspm.fr

                                             Paris, 9 January 2017

                                             Bulletin C 53

                                             To authorities responsible
                                             for the measurement and
                                             distribution of time

                          INFORMATION ON UTC - TAI

 NO leap second will be introduced at the end of June 2017.
 The difference between Coordinated Universal Time UTC and the
 International Atomic Time TAI is :

     from 2017 January 1, 0h UTC, until further notice : UTC-TAI = -37 s

 Leap seconds can be introduced in UTC at the end of the months of December
 or June,  depending on the evolution of UT1-TAI. Bulletin C is mailed every
 six months, either to announce a time step in UTC, or to confirm that there
 will be no time step at the next possible date.

                                            Christian BIZOUARD
                                            Director
                                            Earth Orientation Center of IERS
                                            Observatoire de Paris, France

Obtained from: ftp://time.nist.gov/pub/leap-seconds.3676924800
Approved by: re@ (delphij@)

6 years agoFix an incorrect revision number.
gjb [Sun, 25 Jun 2017 18:01:27 +0000 (18:01 +0000)]
Fix an incorrect revision number.

Submitted by: David Marec <david dot marec at @davenulle dot .org>
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

6 years agoMFC r320216: Fix use-after-free introduced in r300388.
delphij [Sun, 25 Jun 2017 17:42:27 +0000 (17:42 +0000)]
MFC r320216: Fix use-after-free introduced in r300388.

In r300388, endnetconfig() was called on nc_handle which would release
the associated netconfig structure, which means tmpnconf->nc_netid
would be a use-after-free.

Solve this by doing endnetconfig() in return paths instead.

Reported by: jemalloc via kevlo
Reviewed by: cem, ngie (earlier version)
Approved by: re (kib)