CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: inogu...@cvs.openbsd.org2019/11/24 00:58:00 Modified files: regress/usr.bin/openssl: appstest.sh Log message: Add test for cms operations in appstest.sh
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2019/11/24 00:56:03 Modified files: sys/net: rtsock.c Log message: If the RTM_PROPOSAL is a solicitation proposal forward the request to all interfaces. Most handlers will ignore it but at least umb(4) will send a response back. OK florian@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2019/11/24 00:54:30 Modified files: sys/dev/usb: if_umb.c Log message: Add umb_rtrequest() to handle RTM_PROPOSAL events and send back the DNS proposals in that case. Also clear the DNS proposals when the interface is deconfigured (e.g. when going down). OK florian@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2019/11/24 00:50:55 Modified files: sys/net: if_ethersubr.c Log message: Make it possible to call ether_rtrequest with a NULL rt argument. In that case the function can just return. Part of a larger diff to use the if_rtrequest functions for RTM_PROPOSAL info. OK florian@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: j...@cvs.openbsd.org2019/11/23 19:29:43 Modified files: sys/dev/pci/drm/include/linux: bitops.h Log message: correct return type of sign_extend64()
CVS: cvs.openbsd.org: xenocara
CVSROOT:/cvs Module name:xenocara Changes by: j...@cvs.openbsd.org2019/11/23 17:35:40 Modified files: lib/mesa/src/gallium/winsys/sw/dri: Tag: OPENBSD_6_6 dri_sw_winsys.c lib/mesa/src/gallium/winsys/sw/xlib: Tag: OPENBSD_6_6 xlib_sw_winsys.c lib/mesa/src/mesa/drivers/x11: Tag: OPENBSD_6_6 xm_buffer.c Log message: Call shmget() with permission 0600 instead of 0777 >From Brian Paul 02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc in mainline Mesa "A security advisory (TALOS-2019-0857/CVE-2019-5068) found that creating shared memory regions with permission mode 0777 could allow any user to access that memory. Several Mesa drivers use shared- memory XImages to implement back buffers for improved performance. This path changes the shmget() calls to use 0600 (user r/w). Tested with legacy Xlib driver and llvmpipe." OpenBSD 6.6 errata 008
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: j...@cvs.openbsd.org2019/11/23 17:31:08 Modified files: sys/dev/pci/drm/i915: Tag: OPENBSD_6_6 i915_cmd_parser.c i915_drv.c i915_drv.h i915_gem.c i915_gem_context.c i915_gem_context.h i915_gem_execbuffer.c i915_gem_gtt.c i915_reg.h intel_drv.h intel_pm.c intel_ringbuffer.h Log message: changes from linux 4.19.y/4.19.84 drm/i915/cmdparser: Fix jump whitelist clearing drm/i915/gen8+: Add RC6 CTX corruption WA drm/i915: Lower RM timeout to avoid DSI hard hangs drm/i915/cmdparser: Ignore Length operands during command matching drm/i915/cmdparser: Add support for backward jumps drm/i915/cmdparser: Use explicit goto for error paths drm/i915: Add gen9 BCS cmdparsing drm/i915: Allow parsing of unsized batches drm/i915: Support ro ppgtt mapped cmdparser shadow buffers drm/i915: Add support for mandatory cmdparsing drm/i915: Remove Master tables from cmdparser drm/i915: Disable Secure Batches for gen6+ drm/i915: Rename gen7 cmdparser tables A local user could cause the system to hang by reading specific registers when Intel Gen8/Gen9 graphics hardware is in a low power state. A local user could perform writes to memory that should be blocked with Intel Gen9 graphics hardware. OpenBSD 6.6 errata 007
CVS: cvs.openbsd.org: xenocara
CVSROOT:/cvs Module name:xenocara Changes by: j...@cvs.openbsd.org2019/11/23 17:16:35 Modified files: lib/mesa/src/gallium/winsys/sw/dri: Tag: OPENBSD_6_5 dri_sw_winsys.c lib/mesa/src/gallium/winsys/sw/xlib: Tag: OPENBSD_6_5 xlib_sw_winsys.c lib/mesa/src/mesa/drivers/x11: Tag: OPENBSD_6_5 xm_buffer.c Log message: Call shmget() with permission 0600 instead of 0777 >From Brian Paul 02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc in mainline Mesa "A security advisory (TALOS-2019-0857/CVE-2019-5068) found that creating shared memory regions with permission mode 0777 could allow any user to access that memory. Several Mesa drivers use shared- memory XImages to implement back buffers for improved performance. This path changes the shmget() calls to use 0600 (user r/w). Tested with legacy Xlib driver and llvmpipe." OpenBSD 6.5 errata 019
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: j...@cvs.openbsd.org2019/11/23 17:10:23 Modified files: sys/dev/pci/drm: Tag: OPENBSD_6_5 drmP.h drm_linux.h sys/dev/pci/drm/i915: Tag: OPENBSD_6_5 i915_cmd_parser.c i915_dma.c i915_drv.c i915_drv.h i915_gem_context.c i915_gem_execbuffer.c i915_gem_gtt.c i915_gem_gtt.h i915_reg.h intel_display.c intel_drv.h intel_pm.c intel_ringbuffer.c intel_ringbuffer.h Log message: changes from linux 4.4.y/4.4.201 drm/i915/cmdparser: Fix jump whitelist clearing drm/i915/gen8+: Add RC6 CTX corruption WA drm/i915: Lower RM timeout to avoid DSI hard hangs drm/i915/cmdparser: Ignore Length operands during command matching drm/i915/cmdparser: Add support for backward jumps drm/i915: Add gen9 BCS cmdparsing drm/i915: Allow parsing of unsized batches drm/i915: Support ro ppgtt mapped cmdparser shadow buffers drm/i915: Add support for mandatory cmdparsing drm/i915: Remove Master tables from cmdparser drm/i915: Disable Secure Batches for gen6+ drm/i915: Rename gen7 cmdparser tables A local user could cause the system to hang by reading specific registers when Intel Gen8/Gen9 graphics hardware is in a low power state. A local user could perform writes to memory that should be blocked with Intel Gen9 graphics hardware. OpenBSD 6.5 errata 018
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2019/11/23 12:47:04 Modified files: sys/net: route.h Log message: Move srtdnstosa() static inline function under #ifdef _KERNEL. This way 3rd party software stuck with c90 will still compile. Quick fix since RTM_PROPOSAL will most porbably change later on. Reported by naddy and aja
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: chel...@cvs.openbsd.org 2019/11/23 10:22:10 Modified files: sys/dev/pci: envy.c Log message: envy(4): *sleep(9) -> *sleep_nsec(9); ok ratchov@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2019/11/23 10:10:13 Modified files: sys/scsi : cd.c ch.c scsi_base.c scsi_ioctl.c scsiconf.c sd.c st.c uk.c Log message: Consistently use ISSET() to check for set flags.
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: schwa...@cvs.openbsd.org2019/11/23 09:14:03 Modified files: . : groups.html build : groups.dat Log message: delete bsdusers.ir which has been inactive for a couple of years; OK Babak Farrokhi in private mail
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: r...@cvs.openbsd.org2019/11/23 08:05:21 Modified files: usr.sbin/ospfd : ospfd.c Log message: These dependon related lines fit better a bit further up. No functional change. Suggested and OK claudio@
CVS: cvs.openbsd.org: xenocara
CVSROOT:/cvs Module name:xenocara Changes by: matth...@cvs.openbsd.org2019/11/23 07:31:41 Modified files: . : MODULES 3RDPARTY Log message: update
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: st...@cvs.openbsd.org 2019/11/23 06:24:37 Modified files: build : groups.dat . : groups.html Log message: fix bogus mailto: (probably introduced by a mail that was originally html and autoconverted to text by lists.openbsd.org), spotted by schwarze@. perhaps this entry should have replaced bsdusers.ir (also spotted by schwarze@) but I'll leave that pending for now.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2019/11/23 05:27:33 Modified files: sys/scsi : cd.c ch.c scsi_base.c scsi_ioctl.c scsiconf.c sd.c Log message: Consistently use !ISSET() to check for unset flags.
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: st...@cvs.openbsd.org 2019/11/23 05:13:37 Modified files: . : groups.html build : groups.dat Log message: add IRBUG (Iran BSD User Group), from Faraz Vahedi
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: flor...@cvs.openbsd.org 2019/11/23 01:57:52 Modified files: sbin/unwind: resolver.c Log message: plug memory leak
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: flor...@cvs.openbsd.org 2019/11/23 01:17:39 Modified files: sbin/slaacd: slaacd.c Log message: On startup withdraw all proposals for all interfaces by sending an empty proposal with if_index 0. It is possible that the set of autoconf interfaces changed between a stop -> start transition and slaacd would never withdraw nameservers for interfaces that had the autoconf flag previously but no longer after the restart.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: flor...@cvs.openbsd.org 2019/11/23 01:17:11 Modified files: sbin/unwind: resolver.c Log message: An if_index of zero signals to remove all previous proposals from a daemon. Soon to be used by slaacd(8) which handles all interfaces but can't know which interfaces had been set to autoconf before a restart.