summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
delphij [Thu, 22 Dec 2016 16:19:05 +0000 (16:19 +0000)]
Fix multiple vulnerabilities of ntp.
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@310419
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Wed, 7 Dec 2016 23:32:42 +0000 (23:32 +0000)]
Merge r309688: address regressions in SA-16:37.libc.
PR: 215105
Submitted by: <jtd2004a sbcglobal.net>
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@309694
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Tue, 6 Dec 2016 18:49:54 +0000 (18:49 +0000)]
Fix possible login(1) argument injection in telnetd(8). [SA-16:36]
Fix link_ntoa(3) buffer overflow in libc. [SA-16:37]
Fix possible escape from bhyve(8) virtual machine. [SA-16:38]
Fix warnings about valid time zone abbreviations. [EN-16:19]
Update timezone database information. [EN-16:20]
Security: FreeBSD-SA-16:36.telnetd
Security: FreeBSD-SA-16:37.libc
Security: FreeBSD-SA-16:38.bhyve
Errata Notice: FreeBSD-EN-16:19.tzcode
Errata Notice: FreeBSD-EN-16:20.tzdata
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@309635
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Mon, 5 Dec 2016 23:26:06 +0000 (23:26 +0000)]
Update tzdata to 2016i.
Note: because of what appears to be a missing MFC to stable branches,
these patches were generated by doing:
% rsync -av stable/10/contrib/tzdata releng/10.x/contrib/tzdata
% svn add releng/10.x/contrib/tzdata
Errata Notice: EN-16:19
Submitted by: gjb
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@309576
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Mon, 5 Dec 2016 23:12:22 +0000 (23:12 +0000)]
Merge r307359 from stable/10:
Incorporate a change from OpenBSD by millert@OpenBSD.org
Don't warn about valid time zone abbreviations. POSIX
through 2000 says that an abbreviation cannot start with ':', and
cannot contain ',', '-', '+', NUL, or a digit. POSIX from 2001
on changes this rule to say that an abbreviation can contain only
'-', '+', and alphanumeric characters from the portable character
set in the current locale. To be portable to both sets of rules,
an abbreviation must therefore use only ASCII letters." Adapted
from tzcode2015f.
Errata Notice: EN-16:19.tzcode
Submitted by: bapt
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@309571
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Wed, 2 Nov 2016 07:24:14 +0000 (07:24 +0000)]
Fix OpenSSL remote DoS vulnerability. [SA-16:35]
Security: FreeBSD-SA-16:35.openssl
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@308204
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Tue, 25 Oct 2016 17:11:11 +0000 (17:11 +0000)]
Revised SA-16:15. The initial patch didn't cover all possible overflows
based on passing incorrect parameters to sysarch(2).
Security: SA-16:15
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@307933
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Mon, 10 Oct 2016 07:18:54 +0000 (07:18 +0000)]
Fix bspatch heap overflow vulnerability. [SA-16:29]
Fix multiple portsnap vulnerabilities. [SA-16:30]
Fix multiple libarchive vulnerabilities. [SA-16:31]
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@306941
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Mon, 26 Sep 2016 08:21:29 +0000 (08:21 +0000)]
Apply upstream revision
3612ff6fcec0e3d1f2a598135fe12177c0419582:
Fix overflow check in BN_bn2dec()
Fix an off by one error in the overflow check added by
07bed46
("Check for errors in BN_bn2dec()").
This fixes a regression introduced in SA-16:26.openssl.
Submitted by: jkim
PR: 212921
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@306336
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Fri, 23 Sep 2016 07:48:34 +0000 (07:48 +0000)]
Fix multiple OpenSSL vulnerabilitites.
Approved by: so
Security: FreeBSD-SA-16:26.openssl
git-svn-id: https://svn.freebsd.org/base/releng/10.2@306230
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Mon, 25 Jul 2016 15:04:17 +0000 (15:04 +0000)]
Fix bspatch heap overflow vulnerability. [SA-16:25]
Fix freebsd-update(8) support of FreeBSD 11.0 release
distribution. [EN-16:09]
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@303304
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Sat, 4 Jun 2016 05:46:52 +0000 (05:46 +0000)]
Fix multiple ntp vulnerabilities.
Security: FreeBSD-SA-16:24.ntp
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@301301
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Tue, 31 May 2016 16:55:45 +0000 (16:55 +0000)]
Fix kernel stack disclosure in Linux compatibility layer. [SA-16:20]
Fix kernel stack disclosure in 4.3BSD compatibility layer. [SA-16:21]
Security: SA-16:20
Security: SA-16:21
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@301051
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Tue, 31 May 2016 16:33:56 +0000 (16:33 +0000)]
Merge r300361 by mm@:
Backport security fix for absolute path traversal
vulnerability in bsdcpio.
Security: CVE-2015-2304
Security: SA-16:22
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@301047
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Tue, 17 May 2016 22:28:20 +0000 (22:28 +0000)]
- Use unsigned version of min() when handling arguments of SETFKEY ioctl.
- Validate that user supplied control message length in sendmsg(2)
is not negative.
Security: SA-16:18
Security: CVE-2016-1886
Security: SA-16:19
Security: CVE-2016-1887
Submitted by: C Turt <cturt hardenedbsd.org>
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@300086
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Wed, 4 May 2016 15:26:23 +0000 (15:26 +0000)]
Fix multiple OpenSSL vulnerabilitites. [SA-16:17]
Fix excessive latency in x86 IPI delivery. [EN-16:07]
Fix memory leak in ZFS. [EN-16:08]
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@299067
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Fri, 29 Apr 2016 08:02:31 +0000 (08:02 +0000)]
Fix ntp multiple vulnerabilities.
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@298770
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Wed, 16 Mar 2016 22:31:04 +0000 (22:31 +0000)]
o Fix OpenSSH xauth(1) command injection. [SA-16:14]
o Fix incorrect argument validation in sysarch(2). [SA-16:15]
o Fix Hyper-V KVP (Key-Value Pair) daemon indefinite sleep. [EN-16:04]
o Fix hv_netvsc(4) incorrect TCP/IP checksums. [EN-16:05]
Errata: FreeBSD-EN-16:04.hyperv
Errata: FreeBSD-EN-16:05.hv_netvsc
Security: FreeBSD-SA-16:14.openssh-xauth, CVE-2016-3115
Security: FreeBSD-SA-16:15.sysarch, CVE-2016-1885
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@296955
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Thu, 3 Mar 2016 07:30:55 +0000 (07:30 +0000)]
Fix multiple OpenSSL vulnerabilities.
Security: FreeBSD-SA-16:12.openssl
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@296341
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Sat, 30 Jan 2016 06:12:03 +0000 (06:12 +0000)]
Fix OpenSSL SSLv2 ciphersuite downgrade vulnerability.
Security: CVE-2015-3197
Security: FreeBSD-SA-16:11.openssl
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@295061
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Wed, 27 Jan 2016 07:41:31 +0000 (07:41 +0000)]
Fix multiple vulnerabilities of ntp. [SA-16:09]
Fix Linux compatibility layer issetugid(2) system call
vulnerability. [SA-16:10]
Security: FreeBSD-SA-16:09.ntp
Security: FreeBSD-SA-16:10.linux
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@294904
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Thu, 14 Jan 2016 22:48:13 +0000 (22:48 +0000)]
Fix typo.
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@294052
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Thu, 14 Jan 2016 22:45:33 +0000 (22:45 +0000)]
Fix OpenSSH client information leak.
Security: SA-16:07.openssh
Security: CVE-2016-0777
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@294050
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Thu, 14 Jan 2016 09:10:46 +0000 (09:10 +0000)]
o Fix filemon and bmake meta-mode stability issues. [EN-16:01]
o Fix invalid TCP checksums with pf(4). [EN-16:02.pf]
o Fix YP/NIS client library critical bug. [EN-16:03.yplib]
o Fix SCTP ICMPv6 error message vulnerability. [SA-16:01.sctp]
o Fix ntp panic threshold bypass vulnerability. [SA-16:02.ntp]
o Fix Linux compatibility layer incorrect futex handling. [SA-16:03.linux]
o Fix Linux compatibility layer setgroups(2) system call. [SA-16:04.linux]
o Fix TCP MD5 signature denial of service. [SA-16:05.tcp]
o Fix insecure default bsnmpd.conf permissions. [SA-16:06.bsnmpd]
Errata: FreeBSD-EN-16:01.filemon
Errata: FreeBSD-EN-16:02.pf
Errata: FreeBSD-EN-16:03.yplib
Security: FreeBSD-SA-16:01.sctp, CVE-2016-1879
Security: FreeBSD-SA-16:02.ntp, CVE-2015-5300
Security: FreeBSD-SA-16:03.linux, CVE-2016-1880
Security: FreeBSD-SA-16:04.linux, CVE-2016-1881
Security: FreeBSD-SA-16:05.tcp, CVE-2016-1882
Security: FreeBSD-SA-16:06.bsnmpd, CVE-2015-5677
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@293893
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Sat, 5 Dec 2015 09:53:58 +0000 (09:53 +0000)]
Fix OpenSSL multiple vulnerabilities.
Security: FreeBSD-SA-15:26.openssl
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@291854
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Wed, 4 Nov 2015 11:27:13 +0000 (11:27 +0000)]
o Fix regressions related to SA-15:25 upgrade of NTP. [1]
o Fix kqueue write events never fired for files greater 2GB. [2]
o Fix kpplications exiting due to segmentation violation on a correct
memory address. [3]
PR: 204046 [1]
PR: 204203 [1]
Errata Notice: FreeBSD-EN-15:19.kqueue [2]
Errata Notice: FreeBSD-EN-15:20.vm [3]
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@290361
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Mon, 26 Oct 2015 11:36:55 +0000 (11:36 +0000)]
Upgrade NTP to 4.2.8p4.
Security: FreeBSD-SA-15:25.ntp
Security: CVE-2015-7871
Security: CVE-2015-7855
Security: CVE-2015-7854
Security: CVE-2015-7853
Security: CVE-2015-7852
Security: CVE-2015-7851
Security: CVE-2015-7850
Security: CVE-2015-7849
Security: CVE-2015-7848
Security: CVE-2015-7701
Security: CVE-2015-7703
Security: CVE-2015-7704, CVE-2015-7705
Security: CVE-2015-7691, CVE-2015-7692, CVE-2015-7702
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@289999
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Fri, 2 Oct 2015 16:37:06 +0000 (16:37 +0000)]
Fix a regression with SA-15:24 patch that prevented NIS from
working.
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@288512
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Tue, 29 Sep 2015 18:07:18 +0000 (18:07 +0000)]
The Sun RPC framework uses a netbuf structure to represent the
transport specific form of a universal transport address. The
structure is expected to be opaque to consumers. In the current
implementation, the structure contains a pointer to a buffer
that holds the actual address.
In rpcbind(8), netbuf structures are copied directly, which would
result in two netbuf structures that reference to one shared
address buffer. When one of the two netbuf structures is freed,
access to the other netbuf structure would result in an undefined
result that may crash the rpcbind(8) daemon.
Fix this by making a copy of the buffer that is going to be freed
instead of doing a shallow copy.
Security: FreeBSD-SA-15:24.rpcbind
Security: CVE-2015-7236
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@288385
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Wed, 16 Sep 2015 20:59:41 +0000 (20:59 +0000)]
Fix regression in pw(8) when creating numeric users or groups.
[EN-15:16]
Fix libc handling of signals for multi-threaded processes.
[EN-15:17]
Implement pubkey support for pkg(7) bootstrap. [EN-15:18]
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@287872
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Tue, 25 Aug 2015 20:48:51 +0000 (20:48 +0000)]
Fix OpenSSH multiple vulnerabilities. [SA-15:22]
Fix insufficient check of unsupported pkg(7) signature methods.
[EN-15:15]
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@287145
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Tue, 18 Aug 2015 19:30:17 +0000 (19:30 +0000)]
Fix multiple integer overflows in expat.
Security: CVE-2015-1283
Security: FreeBSD-SA-15:20.expat
Fix make(1) syntax errors when upgrading from 9.x and earlier.
[EN-15:11]
Fix incorrect netstat(1) data handling on 32-bit systems.
[EN-15:12]
Allow size argument to vidcontrol(1) for syscons(4). [EN-15:13]
Approved by: so
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286901
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Wed, 12 Aug 2015 14:17:41 +0000 (14:17 +0000)]
Update releng/10.2 to -RELEASE status, and prepare for final
10.2-RELEASE builds.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286666
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Wed, 12 Aug 2015 14:08:06 +0000 (14:08 +0000)]
Anticipate the expected 10.2-RELEASE date.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286665
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Wed, 12 Aug 2015 14:02:56 +0000 (14:02 +0000)]
Set static abitag to the current value of __FreeBSD_version.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286664
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Thu, 6 Aug 2015 22:01:09 +0000 (22:01 +0000)]
Update releng/10.2 to RC2 in preparation for the next set of builds.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286391
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Thu, 6 Aug 2015 19:52:28 +0000 (19:52 +0000)]
MFS r286384: MFC r286375:
Now that stable/8 is EOL, stop building INDEX-8.
Approved by: re (gjb)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286386
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Thu, 6 Aug 2015 14:13:44 +0000 (14:13 +0000)]
Fix a typo.
Submitted by: pkelsey
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286365
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Thu, 6 Aug 2015 01:39:23 +0000 (01:39 +0000)]
MFS r286340 (bapt):
Fix segfault in pw(8) when modifying the UID of
a user.
PR: 202111
Approved by: re (delphij)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286357
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Wed, 5 Aug 2015 22:31:41 +0000 (22:31 +0000)]
Document SA-15:18, SA-15:19.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286356
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Wed, 5 Aug 2015 22:05:12 +0000 (22:05 +0000)]
Fix patch(1) shell injection vulnerability via ed(1). [SA-15:18]
Fix routed remote denial of service vulnerability. [SA-15:19]
Approved by: re (so blanket)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286350
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Wed, 5 Aug 2015 19:56:23 +0000 (19:56 +0000)]
Switch the pkg(8) repository to use the release package set
to populate dvd1.iso.
This is a direct commit to releng/10.2.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286339
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
trasz [Wed, 5 Aug 2015 16:58:04 +0000 (16:58 +0000)]
MFS r286322:
Make the kern.racct.enable tunable actually work.
This is a direct commit to 10-STABLE - 11-CURRENT is not affected,
because tunables are automatically fetched there.
Approved by: re (gjb)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286326
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Tue, 4 Aug 2015 19:43:48 +0000 (19:43 +0000)]
Cleanup pass through the relnotes file:
- Reword a few entries for consistency throughout the document.
- Remove the 'role="arm"' from the arm-specific section, as it
is redundant.
- s/&man.geom.4;/GEOM/ in a title, because it looks ridiculous.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286295
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Tue, 4 Aug 2015 13:42:44 +0000 (13:42 +0000)]
MFS r286286:
MFC r286285:
Ensure the local MANIFEST is always used when verifying remote
distribution sets.
Approved by: re (glebius)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286287
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
kib [Tue, 4 Aug 2015 05:18:24 +0000 (05:18 +0000)]
MFC r285878 (stable/10 r286145):
Revert r173708's modifications to vm_object_page_remove().
This fixes inconsistencies encountered by vm_object_unwire() or
by the buffer cache when the file is truncated.
Approved by: re (gjb)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286276
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
imp [Tue, 4 Aug 2015 00:11:38 +0000 (00:11 +0000)]
MF-stable/10 r286263:
Only match devices that belong to this driver.
Approved by: re@ (gjb@)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286264
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Mon, 3 Aug 2015 19:08:47 +0000 (19:08 +0000)]
Remove another stray empty section.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286253
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Mon, 3 Aug 2015 19:08:45 +0000 (19:08 +0000)]
Fix a whitespace nit.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286252
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Mon, 3 Aug 2015 19:08:43 +0000 (19:08 +0000)]
Remove a few empty sections.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286251
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Mon, 3 Aug 2015 19:08:40 +0000 (19:08 +0000)]
Add a ports-versions section.
Document a few interesting package versions for 10.2-RELEASE.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286250
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Mon, 3 Aug 2015 19:08:38 +0000 (19:08 +0000)]
Document r283990, mpr(4) updated to version 9.255.01.00-fbsd.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286249
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Mon, 3 Aug 2015 19:08:35 +0000 (19:08 +0000)]
Document r284935, hptnr(4) updated to version 1.1.4.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286248
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Mon, 3 Aug 2015 19:08:33 +0000 (19:08 +0000)]
Document r284879, htp27xx(4) updated to version 1.2.7.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286247
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Mon, 3 Aug 2015 19:08:31 +0000 (19:08 +0000)]
Document r281963, snd_hda(4) support for ThinkPad X1 20BS model.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286246
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Mon, 3 Aug 2015 19:08:29 +0000 (19:08 +0000)]
Document r278407, r279924, uart(4) updates for ThinkPad AMT
serial devices.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286245
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Fri, 31 Jul 2015 16:46:30 +0000 (16:46 +0000)]
Forced commit to mark the real 10.2-RC2 point.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286137
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Fri, 31 Jul 2015 16:44:57 +0000 (16:44 +0000)]
MFS r286132:
MFC r286131:
Pull pmspcv (pms(4)) from GENERIC. It has PCI ID conflicts
with ahd(4), mvs(4), and likely other drivers.
Approved by: re (implicit, release blocker)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286135
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Fri, 31 Jul 2015 00:00:59 +0000 (00:00 +0000)]
Update releng/10.2 to RC2 in preparation for the next set of builds.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286098
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Thu, 30 Jul 2015 23:58:55 +0000 (23:58 +0000)]
Document r286084, tar(1) sparse file fix.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286097
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Thu, 30 Jul 2015 23:58:53 +0000 (23:58 +0000)]
Document r285830, specifically that the default pkg(8) repository
was switched from 'latest' to 'quarterly' for 10.2-RELEASE.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286096
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
bdrewery [Thu, 30 Jul 2015 18:00:37 +0000 (18:00 +0000)]
MFS r286082:
MFC r285972:
MFV r285970:
Apply upstream changeset
bf4f6ec64e:
Fix issue 356: properly skip a sparse file entry in a tar file.
PR: 201506
Relnotes: yes
Approved by: re (gjb)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286084
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Thu, 30 Jul 2015 17:06:28 +0000 (17:06 +0000)]
MFS 286079:
MFC r285999 (kp):
pf: Always initialise pf_fragment.fr_flags
When we allocate the struct pf_fragment in pf_fillup_fragment() we
forgot to initialise the fr_flags field. As a result we sometimes
mistakenly thought the fragment to not be a buffered fragment.
This resulted in panics because we'd end up freeing the pf_fragment
but not removing it from V_pf_fragqueue (believing it to be part of
V_pf_cachequeue). The next time we iterated V_pf_fragqueue we'd use
a freed object and panic.
While here also fix a pf_fragment use after free in pf_normalize_ip().
pf_reassemble() frees the pf_fragment, so we can't use it any more.
Approved by: re (glebius)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286083
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
marius [Thu, 30 Jul 2015 03:06:11 +0000 (03:06 +0000)]
MFC: r285843 (r286059 in stable/10)
- Since r253161, uart_intr() abuses FILTER_SCHEDULE_THREAD for signaling
uart_bus_attach() during its test that 20 iterations weren't sufficient
for clearing all pending interrupts, assuming this means that hardware
is broken and doesn't deassert interrupts. However, under pressure, 20
iterations also can be insufficient for clearing all pending interrupts,
leading to a panic as intr_event_handle() tries to schedule an interrupt
handler not registered. Solve this by introducing a flag that is set in
test mode and otherwise restores pre-r253161 behavior of uart_intr(). The
approach of additionally registering uart_intr() as handler as suggested
in PR 194979 is not taken as that in turn would abuse special pccard and
pccbb handling code of intr_event_handle(). [1]
- Const'ify uart_driver_name.
- Fix some minor style bugs.
PR: 194979 [1]
Reviewed by: marcel (earlier version)
Approved by: re (gjb)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286061
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
marius [Thu, 30 Jul 2015 02:45:35 +0000 (02:45 +0000)]
MFC: r285839 (r286055 in stable/10)
o Revert the other functional half of r239864, i. e. the merge of r134227
from x86 to use smp_ipi_mtx spin lock not only for smp_rendezvous_cpus()
but also for the MD cache invalidation, TLB demapping and remote register
reading IPIs due to the following reasons:
- The cross-IPI SMP deadlock x86 otherwise is subject to can't happen on
sparc64. That's because on sparc64, spin locks don't disable interrupts
completely but only raise the processor interrupt level to PIL_TICK. This
means that IPIs still get delivered and direct dispatch IPIs such as the
cache invalidation etc. IPIs in question are still executed.
- In smp_rendezvous_cpus(), smp_ipi_mtx is held not only while sending an
IPI_RENDEZVOUS, but until all CPUs have processed smp_rendezvous_action().
Consequently, smp_ipi_mtx may be locked for an extended amount of time as
queued IPIs (as opposed to the direct ones) such as IPI_RENDEZVOUS are
scheduled via a soft interrupt. Moreover, given that this soft interrupt
is only delivered at PIL_RENDEZVOUS, processing of smp_rendezvous_action()
on a target may be interrupted by f. e. a tick interrupt at PIL_TICK, in
turn leading to the target in question trying to send an IPI by itself
while IPI_RENDEZVOUS isn't fully handled, yet, and, thus, resulting in a
deadlock.
o As mentioned in the commit message of r245850, on least some sun4u platforms
concurrent sending of IPIs by different CPUs is fatal. Therefore, hold the
reintroduced MD ipi_mtx also while delivering cross-traps via MI helpers,
i. e. ipi_{all_but_self,cpu,selected}().
o Akin to x86, let the last CPU to process cpu_mp_bootstrap() set smp_started
instead of the BSP in cpu_mp_unleash(). This ensures that all APs actually
are started, when smp_started is no longer 0.
o In all MD and MI IPI helpers, check for smp_started == 1 rather than for
smp_cpus > 1 or nothing at all. This avoids races during boot causing IPIs
trying to be delivered to APs that in fact aren't up and running, yet.
While at it, move setting of the cpu_ipi_{selected,single}() pointers to
the appropriate delivery functions from mp_init() to cpu_mp_start() where
it's better suited and allows to get rid of the global isjbus variable.
o Given that now concurrent IPI delivery no longer is possible, also nuke
the delays before completely disabling interrupts again in the CPU-specific
cross-trap delivery functions, previously giving other CPUs a window for
sending IPIs on their part. Actually, we now should be able to entirely get
rid of completely disabling interrupts in these functions. Such a change
needs more testing, though.
o In {s,}tick_get_timecount_mp(), make the {s,}tick variable static. While not
necessary for correctness, this avoids page faults when accessing the stack
of a foreign CPU as {s,}tick now is locked into the TLBs as part of static
kernel data. Hence, {s,}tick_get_timecount_mp() always execute as fast as
possible, avoiding jitter.
PR: 201245
Approved by: re (gjb)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286060
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
whu [Thu, 30 Jul 2015 02:22:38 +0000 (02:22 +0000)]
MFC r285928 Do not enable UDP checksum offloading when running on the
Hyper-V on Windows Server 2012 and earlier hosts.
Submitted by: whu
Reviewed by: royger
Approved by: re (gjb)
Sponsored by: Microsoft OSTC
Differential Revision: https://reviews.freebsd.org/D3102
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286058
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Wed, 29 Jul 2015 23:34:38 +0000 (23:34 +0000)]
Set the default VHD file format to the fixed-size image for the
10.2-RELEASE, as the issue preventing the dynamic-size image from
booting is not yet resolved.
This is a direct commit to releng/10.2.
Approved by: re (kib)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286048
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Wed, 29 Jul 2015 20:17:29 +0000 (20:17 +0000)]
Add ixl(4) to the hardware notes.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286039
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Wed, 29 Jul 2015 20:17:26 +0000 (20:17 +0000)]
Update copyright after r286023.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286038
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
brueffer [Wed, 29 Jul 2015 17:28:04 +0000 (17:28 +0000)]
MFC: r285859 (via r286019)
Auto-generate hardware notes for pms(4).
Approved by: re (gjb)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286023
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
brueffer [Wed, 29 Jul 2015 17:25:18 +0000 (17:25 +0000)]
MFC: r285858, r286017
Add a basic manpage for the pms driver.
Approved by: re (gjb)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286022
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
glebius [Wed, 29 Jul 2015 14:16:25 +0000 (14:16 +0000)]
Merge r285939-285941,285943,286004 from stable/10:
- Protect against ioctl() vs ioctl() races.
- Always lock hash row of a source node when updating
its 'states' counter. [1]
- Don't dereference NULL is pf_get_mtag() fails. [2]
- During module unload drop locks before destroying UMA zone.
PR: 182401 [1]
PR: 200222 [2]
Approved by: re (gjb)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@286014
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Wed, 29 Jul 2015 00:57:54 +0000 (00:57 +0000)]
MFS r285863 (jhb):
Partially revert r284034. In particular, revert the final change in
this MFC (281874). It broke suspend and resume on several Thinkpads
(though not all) in 10 even though it works fine on the same laptops
in HEAD.
PR: 201239
Reported by: Kevin Oberman and several others
Approved by: re (kib)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285991
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Tue, 28 Jul 2015 20:42:36 +0000 (20:42 +0000)]
Document SA-15:14 through SA-15:16.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285983
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Tue, 28 Jul 2015 19:59:04 +0000 (19:59 +0000)]
Fix patch(1) shell injection vulnerability. [SA-15:14]
Fix resource exhaustion in TCP reassembly. [SA-15:15]
Fix OpenSSH multiple vulnerabilities. [SA-15:16]
Approved by: re (so blanket)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285978
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
kib [Tue, 28 Jul 2015 17:00:03 +0000 (17:00 +0000)]
MFC r285134 (by mjg):
fd: de-k&r-ify functions + some whitespace fixes
MFC r285269:
Handle copyout for the fcntl(F_OGETLK) using oflock structure.
Approved by: re (gjb)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285964
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Tue, 28 Jul 2015 15:05:19 +0000 (15:05 +0000)]
Fix the description for r274486.
Submitted by: glebius
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285962
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
emaste [Tue, 28 Jul 2015 13:11:31 +0000 (13:11 +0000)]
MFS r285951: Avoid creating invalid UEFI device path
The UEFI loader on the 10.1 release install disk (disc1) modifies an
existing EFI_DEVICE_PATH_PROTOCOL instance in an apparent attempt to
truncate the device path. In doing so it creates an invalid device
path.
Perform the equivalent action without modification of structures
allocated by firmware.
PR: 197641
Submitted by: Chris Ruffin <chris.ruffin at intel.com>
Approved by: re (gjb)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285956
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
emaste [Tue, 28 Jul 2015 12:52:22 +0000 (12:52 +0000)]
MFS r285950: mfiutil: increase buffer size to accommodate sprintf string
PR: 201289
Approved by: re (gjb)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285953
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
jimharris [Mon, 27 Jul 2015 17:53:11 +0000 (17:53 +0000)]
MFS r285918:
MFC r285816:
nvme: ensure csts.rdy bit is cleared before returning from nvme_ctrlr_disable
Approved by: re (gjb)
Sponsored by: Intel
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285922
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
jimharris [Mon, 27 Jul 2015 17:52:17 +0000 (17:52 +0000)]
MFS r285917:
MFC r285815:
nvme: properly handle case where pci_alloc_msix does not alloc all vectors
Approved by: re (gjb)
Sponsored by: Intel
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285921
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
jimharris [Mon, 27 Jul 2015 17:51:12 +0000 (17:51 +0000)]
MFS r285916:
MFC r285796:
nvmecontrol: read controller identify data before any log page operations
Approved by: re (gjb)
Sponsored by: Intel
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285920
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
jimharris [Mon, 27 Jul 2015 17:50:05 +0000 (17:50 +0000)]
MFS r285915:
MFC r285767:
nvd: set d_delmaxsize to full capacity of NVMe namespace
The NVMe specification has no ability to specify a maximum delete size
that is less than the full capacity of the namespace - so just using the
namespace size is the correct value here.
This fixes reported issues where ZFS trim on init looked like it was
hanging the system - previously the default I/O max size (128KB on
Intel NVMe controllers) was used for delete operations which worked out
to only about 8MB/s. With this patch I can add an 800GB DC P3700
drive to a ZFS pool in about 15-20 seconds.
Approved by: re (gjb)
Sponsored by: Intel
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285919
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Sun, 26 Jul 2015 19:47:46 +0000 (19:47 +0000)]
Document r285721, bsdinstall aligns zfs partitions on 1Mb boundaries.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285902
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Sun, 26 Jul 2015 19:47:43 +0000 (19:47 +0000)]
Document r285750, ssh(1) hostname canonicalization before looking
for the host in known_hosts.
Add Dell, Inc. to sponsors.ent.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285901
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Sun, 26 Jul 2015 19:47:41 +0000 (19:47 +0000)]
Document r285769, bsdinstall(8) updates to workaround various
problematic BIOSes when booting from GPT, and partition scheme
selection in the UFS partition menu.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285900
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Sun, 26 Jul 2015 19:47:38 +0000 (19:47 +0000)]
Document r273838, PLPMTUD blackhole detection (RFC 4821).
Submitted by: sbruno
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285899
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Sun, 26 Jul 2015 17:57:53 +0000 (17:57 +0000)]
Further refine the PAE_TABLES entry, based on feedback from
alc.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285895
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
delphij [Fri, 24 Jul 2015 22:08:57 +0000 (22:08 +0000)]
MFS r285856:
MFC r285701:
Use fixed date/time (the time choosen was the time the import was done
on -HEAD) in libntp so we can make reproducible build.
PR: bin/201661
Differential Revision: https://reviews.freebsd.org/D3122
While I'm there also remove libmd from linkage as reported in bin/201738
PR: bin/201738
Submitted by: John Marshall
Approved by: re (gjb)
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285861
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Fri, 24 Jul 2015 22:00:44 +0000 (22:00 +0000)]
Add a local entity for the pms(4) driver.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285860
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Fri, 24 Jul 2015 19:50:55 +0000 (19:50 +0000)]
Fix rendering of a URL.
Update entities to reflect 10.2-RELEASE in preparation for
adding the hardware, relnotes, and installation pages to the
website.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285855
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
emaste [Fri, 24 Jul 2015 19:37:30 +0000 (19:37 +0000)]
MFS r285849: Fix minor errors found by coverity.
PR: 201594
Approved by: re (gjb)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285853
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Fri, 24 Jul 2015 19:16:16 +0000 (19:16 +0000)]
Update the pkg.conf(5) for the dvd1.iso packages to use the
'quarterly' branch, which was missed in r285830.
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285850
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Thu, 23 Jul 2015 23:37:03 +0000 (23:37 +0000)]
Prune svn:mergeinfo after branching stable/10 -> releng/10.2
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285832
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f
gjb [Thu, 23 Jul 2015 23:31:40 +0000 (23:31 +0000)]
- Copy stable/10@285827 to releng/10.2 in preparation for 10.2-RC1
builds.
- Update newvers.sh to reflect RC1.
- Update __FreeBSD_version to reflect 10.2.
- Update default pkg(8) configuration to use the quarterly branch.[1]
Discussed with: re, portmgr [1]
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation
git-svn-id: https://svn.freebsd.org/base/releng/10.2@285830
ccf9f872-aa2e-dd11-9fc8-
001c23d0bc1f