summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2019-10-07two compat features to allow the zstdgrep script to work.Ted Unangst
add --label option to prefix the output instead of filename. allow using - to mean stdin. ok deraadt
2019-10-07worker should always get a conffd, and if we don't, it's an error.Ted Unangst
fixes compiler warning via deraadt
2019-10-07Attach Hyper-V guest services to VMBus 4.0Mike Belopuhov
Tested by Andre Stoebe and Remi Locherer. ok deraadt, tb
2019-10-07update pkg nameTheo de Raadt
2019-10-07correct datesTheo de Raadt
2019-10-07Remove a message that the driver does not print any longer.Visa Hankala
2019-10-07As found by tb@, the name of the temporary file used when updating theStuart Henderson
root anchor changed in unbound 1.9.3, "Add hex print of trust anchor pointer to trust anchor file temp name to make it unique, for libunbound created multiple contexts". This isn't allowed by unbound-anchor's unveil; adjust to unveil the parent directory (typically /var/unbound/db, but generated from the filename). ok florian@ tb@
2019-10-07ip_ether.c is empty, and now unlinked from the build.David Gwynne
ok jca@ deraadt@ claudio@ visa@
2019-10-07Convert infinite tsleep(9) to tsleep_nsec(9).Martin Pieuchot
ok ratchov@
2019-10-07If optstring is NULL and usecommonopt is true, optstr was prependedAlexander Bluhm
by uninitialized garbage. Crash in snmp(1) found by regress/usr.sbin/snmpd. OK martijn@
2019-10-07Fix respawn-pane/window if default-command is set, reported by Janos Barbero.Nicholas Marriott
2019-10-07Restart the send queue (rather than just clearing OACTIVE) when we'veJonathan Matthew
freed up some space on the tx ring. This fixes stalls seen in tcpbench. ok dlg@ patrick@ kettenis@
2019-10-06Use MSEC_TO_NSEC() to define XHCI_CMD_TIMEOUT & use it w/ tsleep_nsec(9).Martin Pieuchot
ok visa@, kn@
2019-10-06tsleep(9) to tsleep_nsec(9) conversionMartin Pieuchot
ok visa@, kn@
2019-10-06tsleep(9) to tsleep_nsec(9) conversions.Martin Pieuchot
ok visa@, kn@, cheloha@
2019-10-06tweak previous;Jason McIntyre
2019-10-06Fix vn_open to require an op of 0, and 0 or KERNELPATH only as flags.Bob Beck
sweep tree to correct NDIINT op and flags ahead of time. document the requirement. This allows KERNELPATH to be used to bypass unveil for crash dumps with nosuidcoredump=2 or 3 ok visa@ deraadt@ florian@
2019-10-06Add support for i2c clock.Mark Kettenis
2019-10-06Add support for i2c pins.Mark Kettenis
2019-10-06for now, only mix in sysctl hw.{uuid,serialno,sensors} to /dev/random.Stuart Henderson
as found the hard way by d.rauschenb@gmail on an old fujitsu siemens machine, reading all of hw (notable hw.setperf) can have unexpected side-effects. ok deraadt
2019-10-06Fix net80211's accounting of discarded input control frames.Stefan Sperling
PS-poll and BA-req frames are in fact being processed. Do not count such frames as discarded control frames. OK phessler kn mpi
2019-10-06Fix month mask.Mark Kettenis
ok deraadt@, patrick@
2019-10-06Avoid gasting around get_process_info()kn
get_process_info() returns a pointer to the global handle later only be used in format_next_process(); treat this struct handle as such without casting the pointer to caddr_t and back again. No object change. OK millert deraadt
2019-10-06Zap intermediate structs in compare_*()kn
SETORDER() can assign from function arguments directly without additional identical structs in each function. No object change. OK millert
2019-10-06Instead of running sed over the whole log to remove CRs, remove themDarren Tucker
only where it's needed (and confuses test(1) on at least OS X in portable).
2019-10-06Eek, check overflow with destination size, not sourceFlorian Obser
2019-10-06drm/amd/display: Restore backlight brightness after system resumeJonathan Gray
From Kai-Heng Feng 2c60da90ec4467adec602e1b81b3ca256f581031 in linux 4.19.y/4.19.77 bb264220d9316f6bd7c1fd84b8da398c93912931 in mainline linux
2019-10-06drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2)Jonathan Gray
From Ahzo d47636913bda8255652805eb29b9638e6d9311c1 in linux 4.19.y/4.19.77 f659bb6dae58c113805f92822e4c16ddd3156b79 in mainline linux
2019-10-06add BL_CORE_SUSPENDRESUME defineJonathan Gray
needed for next round of 4.19 patches
2019-10-05Retry request once when receiving a 503Jeremie Courreges-Anglas
Basic implementation: we just retry once, and make no attempt (yet) to parse any Retry-After header. The idea is to work around cdn.openbsd.org sometimes replying with a 503 for reasons unknown. According to juanfra@ it sets "Retry-After: 0" so this minimal implementation should be enough. Different diff from espie@, test case from sthen@, input from millert@, ok millert@ deraadt@
2019-10-05The rdtsc() macro has been removed in rev 1.7 ofMatthieu Herrb
/sys/arch/amd64/include/pctr.h. Adjust the manual page. ok deraadt@
2019-10-05Tighten handling of pure relative DIR32 relocations and those referencingPhilip Guenther
sections; despite being a RELA arch, ld.so was making assumptions about the initialization of the targeted location. Add the relative relocation optimization, handling relocations covered by the DT_RELACOUNT value in a tight loop. ok mpi@ deraadt@
2019-10-05fix build errors of aac(4)jan
2019-10-05Use mask to extract IPL; should have been part of the earlier diff thatMark Kettenis
added IPI support on armv7.
2019-10-05Add workaround for Cortex-A73 errata 858921. Pointed out by drahn@ whoMark Kettenis
also came up with the initial implementation. ok drahn@, jsg@
2019-10-05The event queue consumer counter also needs to be unsigned like the others.Jonathan Matthew
chris@ seems to have hit this one too ok dlg@
2019-10-05src/sys/netinet/ip_ether.c is empty, and gif doesn't need it.David Gwynne
gif may have needed it when you could switch modes with gif, but now that's handled by if_etherip.c. ip_ether.c is empty, so we can plan to remove it. ok visa@ jca@ deraadt@
2019-10-05The mips64 symbol table layout means we have to consider symbol visibilityPhilip Guenther
and skip 'protected' symbols when identifying which functions will be subjects of lazy resolution
2019-10-05Get the architecture from the ELF header instead of running uname,Philip Guenther
so that we can operate on libs from other archs
2019-10-05Delete some obsolete debugging #ifdefs blocksPhilip Guenther
ok mlarkin@, mpi@, krw@, deraadt@
2019-10-04merge in the rest of unbound-1.9.4 (we already had the only code change)Stuart Henderson
2019-10-04better link "set" and "SET OPTIONS";Jason McIntyre
original diff from sven falempin, tweaked a bit by myself; ok sthen
2019-10-04Add support for setting the CPU clock frequencies. This enables DVFS.Mark Kettenis
2019-10-04Buff; also, specify router-id per rfc6286.Richard Procter
MPLS VPN cluesticks supplied by Dylan Hall ok claudio@ jmc@
2019-10-04Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey.Theo Buehler
(Note that the CMS code is currently disabled.) Port of Edlinger's Fix for CVE-2019-1563 from OpenSSL 1.1.1 (old license) tests from bluhm@ ok jsing commit e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f Author: Bernd Edlinger <bernd.edlinger@hotmail.de> Date: Sun Sep 1 00:16:28 2019 +0200 Fix a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey An attack is simple, if the first CMS_recipientInfo is valid but the second CMS_recipientInfo is chosen ciphertext. If the second recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct encryption key will be replaced by garbage, and the message cannot be decoded, but if the RSA decryption fails, the correct encryption key is used and the recipient will not notice the attack. As a work around for this potential attack the length of the decrypted key must be equal to the cipher default key length, in case the certifiate is not given and all recipientInfo are tried out. The old behaviour can be re-enabled in the CMS code by setting the CMS_DEBUG_DECRYPT flag. Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/9777) (cherry picked from commit 5840ed0cd1e6487d247efbc1a04136a41d7b3a37)
2019-10-04Convert the child_list member from a linked list to a vector.Philip Guenther
ok mpi@
2019-10-04Use a valid curve when constructing an EC_KEY that looks like X25519.Joel Sing
The recent EC group cofactor change results in stricter validation, which causes the EC_GROUP_set_generator() call to fail. Issue reported and fix tested by rsadowski@ ok tb@
2019-10-04Provide internal RSA_padding_{add,check}_PKCS1_OAEP_mgf1() functions.Joel Sing
These are internal only for now and will be made public at a later date. The RSA_padding_{add,check}_PKCS1_OAEP() functions become wrappers around the *_mgf1() variant. ok tb@ inoguchi@ (as part of a larger diff)
2019-10-04Instead of calling fatal() when pftable additions and deletions mixClaudio Jeker
commit the pending work and therefore start a new worklist. The delayed commits can cause such situations to happen and there is no reason to panic because of this. Problem found by jmc@ OK benno@
2019-10-04Avoid a path traversal bug in s_server on Windows.Brent Cook
openssl s_server has an arbitrary read vulnerability on Windows when run with the -WWW or -HTTP options, due to an incomplete path check logic. Thanks to Jobert Abma for reporting. ok tb@