Mon, 14 May 2018 09:21:36 +0000 Fix panic or hangup when "sysctl -w hw.ixgN.debug=1". trunk
msaitoh <msaitoh@NetBSD.org> [Mon, 14 May 2018 09:21:36 +0000] rev 319031
Fix panic or hangup when "sysctl -w hw.ixgN.debug=1". XXX pullup-8
Mon, 14 May 2018 06:52:33 +0000 End sentence with a dot. trunk
wiz <wiz@NetBSD.org> [Mon, 14 May 2018 06:52:33 +0000] rev 319030
End sentence with a dot.
Mon, 14 May 2018 05:17:10 +0000 locate: fix support for multiple databases trunk
lukem <lukem@NetBSD.org> [Mon, 14 May 2018 05:17:10 +0000] rev 319029
locate: fix support for multiple databases Ensure that the first database is correctly added when more than one database is provided. Fixes problem I introduced in rev 1.17 on 2009-04-12, and noticed recently by Simon.
Mon, 14 May 2018 02:55:46 +0000 Protect if_deferred_start_softint with KERNEL_LOCK if the interface isn't MP-safe trunk
ozaki-r <ozaki-r@NetBSD.org> [Mon, 14 May 2018 02:55:46 +0000] rev 319028
Protect if_deferred_start_softint with KERNEL_LOCK if the interface isn't MP-safe
Mon, 14 May 2018 02:55:03 +0000 Protect packet input routines with KERNEL_LOCK and splsoftnet trunk
ozaki-r <ozaki-r@NetBSD.org> [Mon, 14 May 2018 02:55:03 +0000] rev 319027
Protect packet input routines with KERNEL_LOCK and splsoftnet if_input, i.e, ether_input and friends, now runs in softint without any protections. It's ok for ether_input itself because it's already MP-safe, however, subsequent routines called from it such as carp_input and agr_input aren't safe because they're not MP-safe. Protect if_input with KERNEL_LOCK. if_input can be called from a normal LWP context. In that case we need to prevent interrupts (softint) from running by splsoftnet to protect non-MP-safe codes (e.g., carp_input and agr_input). Pointed out by mlelstv@
Mon, 14 May 2018 02:53:29 +0000 Use if_is_mpsafe (NFC) trunk
ozaki-r <ozaki-r@NetBSD.org> [Mon, 14 May 2018 02:53:29 +0000] rev 319026
Use if_is_mpsafe (NFC)
Mon, 14 May 2018 02:16:29 +0000 Restore TCP header inclusions for TCP_SIGNATURE trunk
ozaki-r <ozaki-r@NetBSD.org> [Mon, 14 May 2018 02:16:29 +0000] rev 319025
Restore TCP header inclusions for TCP_SIGNATURE
Mon, 14 May 2018 00:26:02 +0000 With the hope it fixes PR #52911, be extra paranoid about assuring the trunk
jakllsch <jakllsch@NetBSD.org> [Mon, 14 May 2018 00:26:02 +0000] rev 319024
With the hope it fixes PR #52911, be extra paranoid about assuring the Device Context DMA memory is sync'd immediately before reading from it.
Sun, 13 May 2018 23:14:47 +0000 Add a new ptrace(2) ATF exploit for: CVE-2018-8897 (POP SS debug exception) trunk
kamil <kamil@NetBSD.org> [Sun, 13 May 2018 23:14:47 +0000] rev 319023
Add a new ptrace(2) ATF exploit for: CVE-2018-8897 (POP SS debug exception) The original expolit and mitigation have been developed by Maxime Villard. I've reworked the shared code and adapted for the ATF context. I've included PIE-aware version (RIP/EIP relative) and introduced additional comments to the explanation how to trigger the flaw. This test passes on NetBSD/8.99.17. Sponsored by <The NetBSD Foundation>
Sun, 13 May 2018 23:01:25 +0000 Refactor code in ATF ptrace(2) tests trunk
kamil <kamil@NetBSD.org> [Sun, 13 May 2018 23:01:25 +0000] rev 319022
Refactor code in ATF ptrace(2) tests Move the can_we_set_dbregs() auxiliary function from t_ptrace_x86_wait.h to a common file t_ptrace_wait.h. This allows using this function for checking whether the DBREGS set operations in ptrace(2) are accessible for a user. Sponsored by <The NetBSD Foundation>
(0) -300000 -100000 -30000 -10000 -3000 -1000 -300 -100 -10 +10 +100 +300 +1000 +3000 +10000 +30000 +100000 tip