]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/log
FreeBSD/FreeBSD.git
4 years agoImport tzdata 2019c. releng/11.2
gordon [Wed, 23 Oct 2019 03:25:32 +0000 (03:25 +0000)]
Import tzdata 2019c.

Approved by: so
Security: FreeBSD-EN-19:18.tzdata

4 years agoBump version information and add UPDATING entries.
gordon [Tue, 20 Aug 2019 17:52:28 +0000 (17:52 +0000)]
Bump version information and add UPDATING entries.

Approved by: so

4 years agoFix reference count overflow in mqueuefs.
gordon [Tue, 20 Aug 2019 17:51:32 +0000 (17:51 +0000)]
Fix reference count overflow in mqueuefs.

Approved by: so
Security: FreeBSD-SA-19:24.mqueuefs
Security: CVE-2019-5603

4 years agoFix kernel memory disclosure from /dev/midistat.
gordon [Tue, 20 Aug 2019 17:50:33 +0000 (17:50 +0000)]
Fix kernel memory disclosure from /dev/midistat.

Approved by: so
Security: FreeBSD-SA-19:23.midi
Security: CVE-2019-5612

4 years agoFix IPv6 remote denial of service.
gordon [Tue, 20 Aug 2019 17:49:33 +0000 (17:49 +0000)]
Fix IPv6 remote denial of service.

Approved by: so
Security: FreeBSD-SA-19:22.mbuf
Security: CVE-2019-5611

4 years agoBump version information and add UPDATING entries.
gordon [Tue, 6 Aug 2019 17:14:09 +0000 (17:14 +0000)]
Bump version information and add UPDATING entries.

Approved by: so

4 years agoFix insufficient validation of guest-supplied data (e1000 device).
gordon [Tue, 6 Aug 2019 17:13:17 +0000 (17:13 +0000)]
Fix insufficient validation of guest-supplied data (e1000 device).

Approved by: so
Security: FreeBSD-SA-19:21.bhyve
Security: CVE-2019-5609

4 years agoFix insufficient message length validation in bsnmp library.
gordon [Tue, 6 Aug 2019 17:12:17 +0000 (17:12 +0000)]
Fix insufficient message length validation in bsnmp library.

Approved by: so
Security: FreeBSD-SA-19:20.bsnmp
Security: CVE-2019-5610

4 years agoFix ICMPv6 / MLDv2 out-of-bounds memory access.
gordon [Tue, 6 Aug 2019 17:11:17 +0000 (17:11 +0000)]
Fix ICMPv6 / MLDv2 out-of-bounds memory access.

Approved by: so
Security: FreeBSD-SA-19:19.mldv2
Security: CVE-2019-5608

4 years agoFix multiple vulnerabilities in bzip2.
gordon [Tue, 6 Aug 2019 17:09:47 +0000 (17:09 +0000)]
Fix multiple vulnerabilities in bzip2.

Approved by: so
Security: FreeBSD-SA-19:18.bzip2
Security: CVE-2016-3189
Security: CVE-2019-12900

4 years agoFix incorrect exception handling.
gordon [Tue, 6 Aug 2019 17:08:30 +0000 (17:08 +0000)]
Fix incorrect exception handling.

Approved by: so
Security: FreeBSD-EN-19:15.libunwind

4 years agoBump version information and update UPDATING.
gordon [Wed, 24 Jul 2019 12:58:21 +0000 (12:58 +0000)]
Bump version information and update UPDATING.

Approved by: so

4 years agoFix file descriptor reference count leak.
gordon [Wed, 24 Jul 2019 12:57:49 +0000 (12:57 +0000)]
Fix file descriptor reference count leak.

Approved by: so
Security: FreeBSD-SA-19:17.fd
Security: CVE-2019-5607

4 years agoFix byhve out-of-bounds read in XHCI device.
gordon [Wed, 24 Jul 2019 12:56:06 +0000 (12:56 +0000)]
Fix byhve out-of-bounds read in XHCI device.

Approved by: so
Security: FreeBSD-SA-19:16.bhyve
Security: CVE-2019-5604

4 years agoFix reference count overflow in mqueuefs.
gordon [Wed, 24 Jul 2019 12:55:16 +0000 (12:55 +0000)]
Fix reference count overflow in mqueuefs.

Approved by: so
Security: FreeBSD-SA-19:15.mqueuefs
Security: CVE-2019-5603

4 years agoFix kernel memory disclosure in freebsd32_ioctl.
gordon [Wed, 24 Jul 2019 12:54:10 +0000 (12:54 +0000)]
Fix kernel memory disclosure in freebsd32_ioctl.

Approved by: so
Security: FreeBSD-SA-19:14.freebsd32
Security: CVE-2019-5605

4 years agoFix pts write-after-free.
gordon [Wed, 24 Jul 2019 12:53:06 +0000 (12:53 +0000)]
Fix pts write-after-free.

Approved by: so
Security: FreeBSD-SA-19:13.pts
Security: CVE-2019-5606

4 years agoFix multiple telnet client vulnerabilities.
gordon [Wed, 24 Jul 2019 12:51:52 +0000 (12:51 +0000)]
Fix multiple telnet client vulnerabilities.

Approved by: so
Security: FreeBSD-SA-19:12.telnet
Security: CVE-2019-0053

4 years agoFix panic from Intel CPU vulnerability mitigation.
gordon [Wed, 24 Jul 2019 12:50:46 +0000 (12:50 +0000)]
Fix panic from Intel CPU vulnerability mitigation.

Approved by: so
Security: FreeBSD-EN-19:13.mds

4 years agoUpdate UPDATING and bump newvers.sh
gordon [Wed, 3 Jul 2019 00:04:50 +0000 (00:04 +0000)]
Update UPDATING and bump newvers.sh

Approved by: so
Approved by: re (implicit)

4 years agoFix privilege escalation in cd(4) driver.
gordon [Wed, 3 Jul 2019 00:03:55 +0000 (00:03 +0000)]
Fix privilege escalation in cd(4) driver.

Approved by: so
Approved by: re (implicit)
Security: FreeBSD-SA-19:11.cd_ioctl
Security: CVE-2019-5602

4 years agoFix kernel stack disclosure in UFS/FFS.
gordon [Wed, 3 Jul 2019 00:02:16 +0000 (00:02 +0000)]
Fix kernel stack disclosure in UFS/FFS.

Approved by: so
Security: FreeBSD-SA-19:10.ufs
Security: CVE-2019-5601

4 years agoFix iconv buffer overflow.
gordon [Wed, 3 Jul 2019 00:00:39 +0000 (00:00 +0000)]
Fix iconv buffer overflow.

Approved by: so
Approved by: re (implicit)
Security: FreeBSD-SA-19:09.iconv

4 years agoImport tzdata 2019b.
gordon [Tue, 2 Jul 2019 23:59:45 +0000 (23:59 +0000)]
Import tzdata 2019b.

Approved by: so
Approved by: re (implicit)
Security: FreeBSD-EN-19:12.tzdata

4 years agoBump newvers.sh and add UPDATING block.
gordon [Tue, 14 May 2019 23:22:30 +0000 (23:22 +0000)]
Bump newvers.sh and add UPDATING block.

Approved by: so

4 years agoMitigations for Microarchitectural Data Sampling.
gordon [Tue, 14 May 2019 23:20:16 +0000 (23:20 +0000)]
Mitigations for Microarchitectural Data Sampling.

Approved by: so
Security: FreeBSD-SA-19:07.mds
Security: CVE-2018-12126
Security: CVE-2018-12127
Security: CVE-2018-12130
Security: CVE-2019-11091

4 years agoFix ICMP/ICMP6 packet filter bypass in pf.
gordon [Tue, 14 May 2019 23:12:22 +0000 (23:12 +0000)]
Fix ICMP/ICMP6 packet filter bypass in pf.

Approved by: so
Security: FreeBSD-SA-19:06.pf
Security: CVE-2019-5598

4 years agoFix IPv6 fragment reassembly panic in pf
gordon [Tue, 14 May 2019 23:10:21 +0000 (23:10 +0000)]
Fix IPv6 fragment reassembly panic in pf

Approved by: so
Security: FreeBSD-SA-19:05.pf
Security: CVE-2019-5597

4 years agoUpdate ntpd to 4.2.8p13 to fix authenticated denial of service.
gordon [Tue, 14 May 2019 23:06:26 +0000 (23:06 +0000)]
Update ntpd to 4.2.8p13 to fix authenticated denial of service.

Approved by: so
Security: FreeBSD-SA-19:04.ntp
Security: CVE-2019-8936

4 years agoUpdate hostapd/wpa_supplicant to 2.8 to fix multiple vulnerabilities.
gordon [Tue, 14 May 2019 22:59:32 +0000 (22:59 +0000)]
Update hostapd/wpa_supplicant to 2.8 to fix multiple vulnerabilities.

Approved by: so
Security: FreeBSD-SA-19:03.wpa
Security: CVE-2019-9494
Security: CVE-2019-9495
Security: CVE-2019-9496
Security: CVE-2019-9497
Security: CVE-2019-9498
Security: CVE-2019-9499
Security: CVE-2019-11555

4 years agoFix partially matching relative paths in xinstall.
gordon [Tue, 14 May 2019 22:51:49 +0000 (22:51 +0000)]
Fix partially matching relative paths in xinstall.

Approved by: so
Security: FreeBSD-EN-19:09.xinstall

4 years agoImport tzdata 2019a.
gordon [Tue, 14 May 2019 22:48:36 +0000 (22:48 +0000)]
Import tzdata 2019a.

Approved by: so
Security: FreeBSD-EN-19:08.tzdata

5 years agoUPDATING and newvers entries for 11.2-p9
emaste [Tue, 5 Feb 2019 18:22:21 +0000 (18:22 +0000)]
UPDATING and newvers entries for 11.2-p9

Approved by: so
Security: FreeBSD-SA-19:01.syscall

5 years agoamd64: clear callee-preserved registers on syscall exit
emaste [Tue, 5 Feb 2019 18:07:45 +0000 (18:07 +0000)]
amd64: clear callee-preserved registers on syscall exit

Submitted by: kib
Approved by: so
Security: CVE-2019-5595
Security: FreeBSD-SA-19:01.syscall

5 years agoUPDATING and newvers entries for 11.2-p8
emaste [Wed, 9 Jan 2019 19:11:32 +0000 (19:11 +0000)]
UPDATING and newvers entries for 11.2-p8

Approved by: so
Security: FreeBSD-EN-19:03.sqlite
Security: FreeBSD-EN-19:04.tzdata
Security: FreeBSD-EN-19:05.kqueue

5 years agoMFS11 r340904: Avoid unsynchronized updates to kn_status.
emaste [Wed, 9 Jan 2019 18:57:38 +0000 (18:57 +0000)]
MFS11 r340904: Avoid unsynchronized updates to kn_status.

Approved by: so
Security: FreeBSD-EN-19:05.kqueue

5 years agoMFS11 r342668: Import tzdata 2018h, 2018i
emaste [Wed, 9 Jan 2019 18:54:42 +0000 (18:54 +0000)]
MFS11 r342668: Import tzdata 2018h, 2018i

Approved by: so
Security: FreeBSD-EN-19:04.tzdata

5 years agoMFS11 r342292: MFC r333352 & r342183:
emaste [Wed, 9 Jan 2019 18:50:27 +0000 (18:50 +0000)]
MFS11 r342292: MFC r333352 & r342183:

r333352: Update private sqlite from sqlite3-3.20.0 to sqlite3-3.23.1
r342183: Update sqlite3-3.23.1 --> sqlite3-3.26.0 (3260000)

PR: 234113
Approved by: so
Security: FreeBSD-EN-19:03.sqlite

5 years ago11.2-RELEASE-p7 UPDATING
emaste [Wed, 19 Dec 2018 18:29:46 +0000 (18:29 +0000)]
11.2-RELEASE-p7 UPDATING

Approved by: so
Security: FreeBSD-SA-18:15.bootpd
Security: FreeBSD-EN-18:16.ptrace
Security: FreeBSD-EN-18:17.vm
Security: FreeBSD-EN-18:18.zfs

5 years agoMFS11 r342229: bootpd: validate hardware type
emaste [Wed, 19 Dec 2018 18:22:25 +0000 (18:22 +0000)]
MFS11 r342229: bootpd: validate hardware type

Due to insufficient validation of network-provided data it may have been
possible for a malicious actor to craft a bootp packet which could cause
a stack buffer overflow.

admbugs: 850
Reported by: Reno Robert
Reviewed by: markj
Approved by: so
Security: FreeBSD-SA-18:15.bootpd
Sponsored by: The FreeBSD Foundation

5 years agoMFS11 r341828: Resolve a hang in ZFS during vnode reclaimation
emaste [Wed, 19 Dec 2018 18:05:50 +0000 (18:05 +0000)]
MFS11 r341828: Resolve a hang in ZFS during vnode reclaimation

  This is caused by a deadlock between zil_commit() and zfs_zget()
  Add a way for zfs_zget() to break out of the retry loop in the common case

PR: 229614, 231117
Submitted by: allanjude
Approved by: so
Security: FreeBSD-EN-18:18.zfs
Sponsored by: Klara Systems, The FreeBSD Foundation

5 years agoMFS11 r341401: Update the free page count when blacklisting pages.
emaste [Wed, 19 Dec 2018 18:00:58 +0000 (18:00 +0000)]
MFS11 r341401: Update the free page count when blacklisting pages.

PR: 231296
Submitted by: markj
Approved by: so
Security: FreeBSD-EN-18:17.vm
Sponsored by: The FreeBSD Foundation

5 years agoMFS11 r340290: Only clear a pending thread event if one is pending.
emaste [Wed, 19 Dec 2018 17:52:56 +0000 (17:52 +0000)]
MFS11 r340290: Only clear a pending thread event if one is pending.

This fixes a panic when attaching to an already-stopped process.

Also do some other clean ups for control flow of sendsig section.

Submitted by: markj
Approved by: so
Security: FreeBSD-EN-18:16.ptrace
Sponsored by: The FreeBSD Foundation

5 years agoFix insufficient bounds checking in bhyve(8) device model. [SA-18:14.bhyve]
gordon [Tue, 4 Dec 2018 18:38:32 +0000 (18:38 +0000)]
Fix insufficient bounds checking in bhyve(8) device model. [SA-18:14.bhyve]

Submitted by:   jhb
Reported by:    Reno Robert
Approved by:    so
Security:       FreeBSD-SA-18:14.bhyve
Security:       CVE-2018-17160

5 years agoFix deferred kernel loading breaks loader password. [EN-18:15.loader]
gordon [Tue, 27 Nov 2018 19:45:25 +0000 (19:45 +0000)]
Fix deferred kernel loading breaks loader password. [EN-18:15.loader]

Submitted by: dteske
Approved by: so
Security: FreeBSD-EN-18:15.loader

5 years agoTimezone database information update. [EN-18:14.tzdata]
gordon [Tue, 27 Nov 2018 19:44:39 +0000 (19:44 +0000)]
Timezone database information update. [EN-18:14.tzdata]

Approved by: so
Security: FreeBSD-EN-18:14.tzdata

5 years agoFix ICMP buffer underwrite. [EN-18:13.icmp]
gordon [Tue, 27 Nov 2018 19:43:16 +0000 (19:43 +0000)]
Fix ICMP buffer underwrite. [EN-18:13.icmp]

Approved by: so
Security: FreeBSD-EN-18:13.icmp
Security: CVE-2018-17156

5 years agoFix multiple vulnerabilities in NFS server code. [SA-18:13.nfs]
gordon [Tue, 27 Nov 2018 19:42:16 +0000 (19:42 +0000)]
Fix multiple vulnerabilities in NFS server code. [SA-18:13.nfs]

Reported by: Jakub Jirasek, Secunia Research at Flexera
Approved by: so
Security: FreeBSD-SA-18:13.nfs
Security: CVE-2018-17157
Security: CVE-2018-17158
Security: CVE-2018-17159

5 years agoFix small kernel memory disclosures. [EN-18:12.mem]
gordon [Thu, 27 Sep 2018 18:36:30 +0000 (18:36 +0000)]
Fix small kernel memory disclosures. [EN-18:12.mem]

Reported by: Thomas Barabosch, Fraunhofer FKIE
Approved by: so
Security: FreeBSD-EN-18:12.mem
Security: CVE-2018-17155

5 years agoFix DoS in listen syscall over IPv6 socket. [EN-18:11.listen]
gordon [Thu, 27 Sep 2018 18:34:42 +0000 (18:34 +0000)]
Fix DoS in listen syscall over IPv6 socket. [EN-18:11.listen]

Reported by: Jakub Jirasek, Secunia Research at Flexera
Approved by: so
Security: FreeBSD-EN-18:11.listen
Security: CVE-2018-6925

5 years agoFix NULL pointer dereference in freebsd4_getfsstat. [EN-18:10.syscall]
gordon [Thu, 27 Sep 2018 18:32:14 +0000 (18:32 +0000)]
Fix NULL pointer dereference in freebsd4_getfsstat. [EN-18:10.syscall]

Reported by: Thomas Barabosch, Fraunhofer FKIE
Approved by: so
Security: FreeBSD-EN-18:10.syscall
Security: CVE-2018-17154

5 years agoFix regression in IPv6 fragment reassembly. [EN-18:09.ip]
gordon [Thu, 27 Sep 2018 18:29:55 +0000 (18:29 +0000)]
Fix regression in IPv6 fragment reassembly. [EN-18:09.ip]

Approved by: so
Security: FreeBSD-EN-18:09.ip

5 years agoFix regression in Lazy FPU remediation. [EN-18:08.lazyfpu]
gordon [Wed, 12 Sep 2018 05:08:49 +0000 (05:08 +0000)]
Fix regression in Lazy FPU remediation. [EN-18:08.lazyfpu]

Approved by: so
Security: FreeBSD-EN-18:08.lazyfpu

5 years agoFix improper elf header parsing. [SA-18:12.elf]
gordon [Wed, 12 Sep 2018 05:07:35 +0000 (05:07 +0000)]
Fix improper elf header parsing. [SA-18:12.elf]

Approved by: so
Security: FreeBSD-SA-18:12.elf
Security: CVE-2018-6924

5 years agoRevis manual pages. [SA-18:08.tcp]
delphij [Wed, 15 Aug 2018 02:30:11 +0000 (02:30 +0000)]
Revis manual pages. [SA-18:08.tcp]

Fix L1 Terminal Fault (L1TF) kernel information disclosure.
[SA-18:09.l1tf]

Fix resource exhaustion in IP fragment reassembly. [SA-18:10.ip]

Fix unauthenticated EAPOL-Key decryption vulnerability.
[SA-18:11.hostapd]

Approved by: so

5 years agoBump patch level and document them.
delphij [Mon, 6 Aug 2018 20:39:27 +0000 (20:39 +0000)]
Bump patch level and document them.

Approved by: so

5 years agoAddress concerns about CPU usage while doing TCP reassembly.
jtl [Mon, 6 Aug 2018 17:47:47 +0000 (17:47 +0000)]
Address concerns about CPU usage while doing TCP reassembly.

Currently, the per-queue limit is a function of the receive buffer
size and the MSS.  In certain cases (such as connections with large
receive buffers), the per-queue segment limit can be quite large.
Because we process segments as a linked list, large queues may not
perform acceptably.

The better long-term solution is to make the queue more efficient.
But, in the short-term, we can provide a way for a system
administrator to set the maximum queue size.

We set the default queue limit to 100.  This is an effort to balance
performance with a sane resource limit.  Depending on their
environment, goals, etc., an administrator may choose to modify this
limit in either direction.

Approved by: so
Security: FreeBSD-SA-18:08.tcp
Security: CVE-2018-6922

5 years ago- Switch releng/11.2 to -RELEASE.
gjb [Thu, 21 Jun 2018 22:59:49 +0000 (22:59 +0000)]
- Switch releng/11.2 to -RELEASE.
- Add the anticipated 11.2-RELEASE date to UPDATING.
- Set a static __FreeBSD_version.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoFinal touches to 11.2-RELEASE release notes:
gjb [Thu, 21 Jun 2018 18:13:04 +0000 (18:13 +0000)]
Final touches to 11.2-RELEASE release notes:
- Remove an empty section that was left over from a previous commit
  to prune empty sections.
- Add a note about a late discovered issue with zfsd(8) (Bugzilla
  228750).  Fix a sentence stop while here.
- Document SA-18:07, which had been included in RC3.
- Fix FreeBSD versions in the installation.html page.

Approved by: re (implicit, relnotes)
Sponsored by: The FreeBSD Foundation

5 years agoUpdate releng/11.2 to RC3 as part of the 11.2-RELEASE cycle.
gjb [Fri, 15 Jun 2018 13:49:11 +0000 (13:49 +0000)]
Update releng/11.2 to RC3 as part of the 11.2-RELEASE cycle.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoMFC rr335072, r335089:
kib [Fri, 15 Jun 2018 13:21:37 +0000 (13:21 +0000)]
MFC rr335072, r335089:
Enable eager FPU context switch on i386 and amd64.
CVE: CVE-2018-3665

MFC r335131
Remove printf() in #NM handler.

MFC r335132:
Reorganize code flow in fpudna()/npxdna().

Approved by: re (gjb)

5 years agoMFS11 r335088 (dim):
gjb [Thu, 14 Jun 2018 17:42:36 +0000 (17:42 +0000)]
MFS11 r335088 (dim):
 MFC rr334886:
  Add missed libc++ entries to (Optional)ObsoleteFiles.inc

  Some of these were removed during the libc++ 5.0.0 import, others
  were added in the libc++ 6.0.0 import.

Approved by: re (marius)
Sponsored by: The FreeBSD Foundation

5 years agoMFS11 r334872 (ram):
gjb [Thu, 14 Jun 2018 17:42:19 +0000 (17:42 +0000)]
MFS11 r334872 (ram):
 MFC r334657:
  Issue: Utility hangs when  OCS_IOCTL_CMD_MGMT_GET_ALL called in
  parallel on port 0 and port 1.

  Fix: Using static structure for results is corrupting the second
  ioctl request. Removed static for results structure.

Approved by: re (marius)
Sponsored by: The FreeBSD Foundation

5 years agoSwitch releng/11.2 to RC2 as part of the 11.2-RELEASE cycle, following
gjb [Fri, 8 Jun 2018 21:47:17 +0000 (21:47 +0000)]
Switch releng/11.2 to RC2 as part of the 11.2-RELEASE cycle, following
r334860.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoFix the ordering of where '$bootable' is set in the second
gjb [Fri, 8 Jun 2018 21:46:11 +0000 (21:46 +0000)]
Fix the ordering of where '$bootable' is set in the second
variable setting, which was moved around as part of prior
commits that were subsequently reverted.

This is a direct commit to releng/11.2.

Approved by: re (kib)
Sponsored by: The FreeBSD Foundation

5 years agoRevert releng/11.2 back to RC1 temporarily, as an additional fix
gjb [Fri, 8 Jun 2018 21:44:15 +0000 (21:44 +0000)]
Revert releng/11.2 back to RC1 temporarily, as an additional fix
for amd64 ISOs is required.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoRename releng/11.2 to RC2 as part of the 11.2-RELEASE cycle, following
gjb [Fri, 8 Jun 2018 14:36:10 +0000 (14:36 +0000)]
Rename releng/11.2 to RC2 as part of the 11.2-RELEASE cycle, following
r334839.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoRestore r332345 and r332346 from head, merged to stable/11 as
gjb [Fri, 8 Jun 2018 14:35:27 +0000 (14:35 +0000)]
Restore r332345 and r332346 from head, merged to stable/11 as
part of r333006, which was reverted in r334735.

r332345 fixes makefs(8) invocation after head revision r331843,
where makefs(8) was updated to be in sync with NetBSD.

r332346 fixes the $bootable variable position so the platformid
option is correctly applied.

This is a direct commit to releng/11.2, as these two revisions
were part of a total of four revisions merge to stable/11 (at
the time) in r333006.

Approved by: re (bdrewery)
Sponsored by: The FreeBSD Foundation

5 years agoRevert releng/11.2 back to RC1 due to an issue discovered with
gjb [Fri, 8 Jun 2018 14:00:12 +0000 (14:00 +0000)]
Revert releng/11.2 back to RC1 due to an issue discovered with
amd64 ISOs, pending a fix to be committed shortly.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoUpdate releng/11.2 to RC2 as part of the 11.2-RELEASE cycle.
gjb [Thu, 7 Jun 2018 23:59:19 +0000 (23:59 +0000)]
Update releng/11.2 to RC2 as part of the 11.2-RELEASE cycle.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoMFstable/11 334801
tuexen [Thu, 7 Jun 2018 18:01:31 +0000 (18:01 +0000)]
MFstable/11 334801

Improve compliance with RFC 4895 and RFC 6458.

Silently dicard SCTP chunks which have been requested to be
authenticated but are received unauthenticated no matter if support
for SCTP authentication has been negotiated. This improves compliance
with RFC 4895.

When the application uses the SCTP_AUTH_CHUNK socket option to
request a chunk to be received in an authenticated way, enable
the SCTP authentication extension for the end-point. This improves
compliance with RFC 6458.

Discussed with: Peter Lei
Approved by: re (marius@)

5 years agoFix a typo.
gjb [Thu, 7 Jun 2018 17:08:36 +0000 (17:08 +0000)]
Fix a typo.

Spotted by: adamw
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoAdd xml:id attributes for diff reduction.
gjb [Thu, 7 Jun 2018 16:35:09 +0000 (16:35 +0000)]
Add xml:id attributes for diff reduction.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoFix a grammatical error.
gjb [Thu, 7 Jun 2018 16:31:05 +0000 (16:31 +0000)]
Fix a grammatical error.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoConnect the installation page to the build.
gjb [Thu, 7 Jun 2018 16:26:28 +0000 (16:26 +0000)]
Connect the installation page to the build.
Update the release version in installation/article.xml.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoDocument pkg(8) version.
gjb [Thu, 7 Jun 2018 16:21:16 +0000 (16:21 +0000)]
Document pkg(8) version.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agorelnotes/article.xml:
gjb [Thu, 7 Jun 2018 16:21:15 +0000 (16:21 +0000)]
relnotes/article.xml:
- Remove empty sections.
- Move the 'hardware support' section, containing only
  driver information, to the 'device drivers' section.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoDocument r334789, dhclient(8) allow to superscede interface-mtu
gjb [Thu, 7 Jun 2018 16:21:14 +0000 (16:21 +0000)]
Document r334789, dhclient(8) allow to superscede interface-mtu

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoerrata/article.xml:
gjb [Thu, 7 Jun 2018 16:21:12 +0000 (16:21 +0000)]
errata/article.xml:
- Prune stale entries from 11.1-RELEASE.
- Add an xml:id for diff reduction.

hardware/article.xml:
- Add an xml:id for diff reduction.

installation/article.xml:
- Add an xml:id for diff reduction.

readme/article.xml:
- Fix a malformed URL and mailing list reference.

readme/article.xml:
- Update the xml:id to match that used by readme/article.xml
  for consistency.

release.ent:
- Update versions, and switch from 'snapshot' to 'release'.

security.xml:
- Remove reference to 10.x.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoMFC: r334443 (by cem@) MF stable/11: r334787
marius [Thu, 7 Jun 2018 15:51:23 +0000 (15:51 +0000)]
MFC: r334443 (by cem@) MF stable/11: r334787

dhclient(8): allow to supersede interface-mtu option

In some cases broken DHCP servers might send invalid MTU value, so allow to
use 'supersede' in dhclient.conf to override this. When superseded value is
0, MTU value is not updated at all.

PR: 206721
Submitted by: novel@
Reported by: <jimp AT pfsense.org>
Approved by: re (gjb)
Relnotes: yes (potentially surprising behavior change w/ broken dhcpd mtu)
Differential Revision: https://reviews.freebsd.org/D15484

5 years agoMFstable/11 334732:
tuexen [Wed, 6 Jun 2018 22:34:20 +0000 (22:34 +0000)]
MFstable/11 334732:

Don't overflow a buffer if we receive an INIT or INIT-ACK chunk
without a RANDOM parameter but with a CHUNKS or HMAC-ALGO parameter.
Please note that sending this combination violates the specification.

Thanks to Ronald E. Crane for reporting the issue for the userland
stack.

Approved by: re (gjb@)

5 years agoMFstable/11 334731
tuexen [Wed, 6 Jun 2018 22:02:44 +0000 (22:02 +0000)]
MFstable/11 334731

Limit the retransmission timer for SYN-ACKs by TCPTV_REXMTMAX.

Use the same logic to handle the SYN-ACK retransmission when sent from
the syn cache code as when sent from the main code.

Approved by: re (gjb@)
Sponsored by: Netflix, Inc.

5 years agoMFstable/11 r334730
tuexen [Wed, 6 Jun 2018 21:23:42 +0000 (21:23 +0000)]
MFstable/11 r334730

Ensure net.inet.tcp.syncache.rexmtlimit is limited by TCP_MAXRXTSHIFT.

If the sysctl variable is set to a value larger than TCP_MAXRXTSHIFT+1,
the array tcp_syn_backoff[] is accessed out of bounds.

Discussed with: jtl@
Approved by: re (gjb)
Sponsored by: Netflix, Inc.

5 years agoRemove the r333006 entry following r334735.
gjb [Wed, 6 Jun 2018 20:32:39 +0000 (20:32 +0000)]
Remove the r333006 entry following r334735.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoRevert r333006:
gjb [Wed, 6 Jun 2018 20:31:15 +0000 (20:31 +0000)]
Revert r333006:

 This revision implemented hybrid ISOs for the amd64
 architecture, however it was discovered to have caused
 a regression in booting legacy-mode (BIOS/CSM).

 This restores the way ISOs were previously created, as
 the cause (and differences between head and stable/11
 and releng/11.2) have not been entirely identified.

Approved by: re (marius)
Sponsored by: The FreeBSD Foundation

5 years agoMFstable/11 r334728:
tuexen [Wed, 6 Jun 2018 20:28:17 +0000 (20:28 +0000)]
MFstable/11 r334728:

Ensure we are not dereferencing a NULL pointer.

CID: 1385266
Approved by: re (marius@)

5 years agoFix two grammatical errors.
gjb [Tue, 5 Jun 2018 22:27:36 +0000 (22:27 +0000)]
Fix two grammatical errors.

Reported by: adamw
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoAdd xml:id to the article tag for diff reduction when regenerating
gjb [Tue, 5 Jun 2018 21:55:40 +0000 (21:55 +0000)]
Add xml:id to the article tag for diff reduction when regenerating
the relnotes page.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoDocument r333343, ixl(4) version 1.9.9-k.
gjb [Tue, 5 Jun 2018 21:41:26 +0000 (21:41 +0000)]
Document r333343, ixl(4) version 1.9.9-k.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoAdjust wording for r334444 to be more consistent with the text
gjb [Tue, 5 Jun 2018 21:41:25 +0000 (21:41 +0000)]
Adjust wording for r334444 to be more consistent with the text
for i386 memstick images.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoDocument r333417, smartpqi(4) addition.
gjb [Tue, 5 Jun 2018 21:41:24 +0000 (21:41 +0000)]
Document r333417, smartpqi(4) addition.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoDocument r333166, Apollo Lake boot issue fix.
gjb [Tue, 5 Jun 2018 21:41:23 +0000 (21:41 +0000)]
Document r333166, Apollo Lake boot issue fix.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoDocument r334444, amd64 memstick images now use MBR instead of GPT.
gjb [Tue, 5 Jun 2018 21:41:22 +0000 (21:41 +0000)]
Document r334444, amd64 memstick images now use MBR instead of GPT.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoDocument r334458, libxo(3) version 0.9.0.
gjb [Tue, 5 Jun 2018 21:41:21 +0000 (21:41 +0000)]
Document r334458, libxo(3) version 0.9.0.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoDocument r332040, ocs_fc(4) addition.
gjb [Tue, 5 Jun 2018 21:41:20 +0000 (21:41 +0000)]
Document r332040, ocs_fc(4) addition.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoDocument r331058, ng_pppoe(4) user-supplied Host-Uniq tag support.
gjb [Tue, 5 Jun 2018 21:41:19 +0000 (21:41 +0000)]
Document r331058, ng_pppoe(4) user-supplied Host-Uniq tag support.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoDocument r329581, fix to ICMPv6 redirects.
gjb [Tue, 5 Jun 2018 21:41:18 +0000 (21:41 +0000)]
Document r329581, fix to ICMPv6 redirects.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoDocument r329010, loader(8) quote parsing improvements.
gjb [Tue, 5 Jun 2018 21:41:17 +0000 (21:41 +0000)]
Document r329010, loader(8) quote parsing improvements.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoDocument r327920, SW_WATCHDOG is now dynamic.
gjb [Tue, 5 Jun 2018 21:41:16 +0000 (21:41 +0000)]
Document r327920, SW_WATCHDOG is now dynamic.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

5 years agoDocument r325730, ipfw(4) Dummynet AQM packet marking L2/L3.
gjb [Tue, 5 Jun 2018 21:41:15 +0000 (21:41 +0000)]
Document r325730, ipfw(4) Dummynet AQM packet marking L2/L3.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation