Commit Graph

989 Commits

Author SHA1 Message Date
jsg
e6d0e0383c Drop the local diff to avoid calling drm set/drop master ioctls,
the kernel implements these as noops now.
2016-12-02 05:41:52 +00:00
jsg
339adf1110 Implement an OpenBSD specific codepath for drmGetDevice
The existing code walks all of /dev looking for different types of drm
nodes.  We just have primary nodes and can directly map the minor number
to a path.

ok kettenis@
2016-11-25 23:58:13 +00:00
jsg
06724bcd2a Implement drmParsePciBusInfo for OpenBSD by using the new
DRM_IOCTL_GET_PCIINFO ioctl.

ok kettenis@
2016-11-25 23:52:06 +00:00
jsg
68ce36bfe8 Implement drmParsePciDeviceInfo for OpenBSD by using the new
DRM_IOCTL_GET_PCIINFO ioctl.

ok kettenis@
2016-11-25 23:48:50 +00:00
jsg
ed28609b08 Implement drmParseSubsystemType for OpenBSD.
Always return DRM_BUS_PCI for now.  No non-pci drm drivers are in the
kernel and this is unlikely to change anytime soon as the existing ones
aren't permissively licensed.

ok kettenis@
2016-11-25 23:44:40 +00:00
jsg
038e48492e Implement drmGetMinorNameForFD for systems without sysfs by adapting
drm_get_device_name_for_fd() from the Mesa loader.

ok kettenis@
2016-11-25 23:41:29 +00:00
tb
750df2fcc6 Fix a copy-paste error that resulted in the parent directory being
chowned instead of only the symlink.

no objections matthieu
2016-11-19 08:45:51 +00:00
jsg
b2fcf88635 Merge libdrm 2.4.73 2016-11-19 05:45:00 +00:00
jsg
90bdad6ae7 Import libdrm 2.4.73 2016-11-19 05:36:14 +00:00
jasper
617afc97af enter xcb-util-xrm/ 2016-11-07 19:31:57 +00:00
jasper
86496c1007 add generated autoconf bits 2016-11-07 19:25:35 +00:00
jasper
1a446edaa5 remove unneeded bits 2016-11-07 19:22:59 +00:00
jasper
44c5a3cdf0 add xcb-util-xrm-1.0
ok matthieu@
2016-11-07 19:20:35 +00:00
matthieu
055e2cd049 Update to xcb-util-cursor to 0.1.3.
This will give applications using this library the same X cursor search path
as the ones that use the legacy libXcursor.
2016-11-03 13:11:40 +00:00
matthieu
21f674944e Update to libXvMC 1.0.10 2016-11-03 12:22:54 +00:00
matthieu
b5b7504b4d Update to libXv 1.0.11 2016-11-03 11:00:48 +00:00
matthieu
ffec5e9271 Update to libXrender 0.9.10 2016-11-03 10:55:16 +00:00
matthieu
20bda1d576 Update to libXrandr 1.5.1 2016-11-03 10:47:58 +00:00
matthieu
47423fcb03 Update to libXfixes 5.0.3 2016-11-03 10:30:05 +00:00
matthieu
20a75c6d0f Update to libX11 1.6.4 2016-11-03 10:21:30 +00:00
matthieu
4c3f151ece Remove stale files 2016-11-03 10:19:11 +00:00
matthieu
0e759a72d7 Update to libXi 1.7.8 2016-11-03 09:28:22 +00:00
matthieu
9a2b6d095b regen 2016-11-02 18:32:01 +00:00
matthieu
9f1ad92005 add Makefile.bsd-wrapper 2016-11-02 18:29:23 +00:00
matthieu
981fa8b5d2 Patch from upstreams to actually let this build 2016-11-02 18:28:30 +00:00
matthieu
0ed8a296d0 Import libXfont2 version 2.0.1 2016-11-02 18:05:49 +00:00
dcoppa
91c5ab3b87 Update to freetype-doc-2.7 2016-10-29 12:07:21 +00:00
dcoppa
737706040f Update to FreeType 2.7
Now Subpixel hinting, also known as ClearType hinting, is enabled
by default.

OK matthieu@
2016-10-28 21:41:14 +00:00
jsg
46fe26bc0b binutils on powerpc now ignores --gc-sections. Remove the local patch
to avoid using it on powerpc from Mesa.

Tested by matthieu@ on macppc.
2016-10-23 06:16:03 +00:00
jsg
512a658c47 Merge libdrm 2.4.71 2016-10-16 06:11:11 +00:00
jsg
d855f0143e Import libdrm 2.4.71 2016-10-16 06:01:17 +00:00
matthieu
fd18c20e72 regen 2016-10-11 22:14:30 +00:00
matthieu
c9d0110642 Force AM_MAINTAINER_MODE in all Xenocara packages built by autotools
This prevents autotools to try to rebuild themselve automagically
if configure.ac, Makefile.am or a few other have more recent time
stamps than the generated files.

It will allows to get rid of the NO_REORDER mechanism that touches
files in the source tree to ensure nothing gets rebuilt.
2016-10-11 21:54:35 +00:00
matthieu
d9fc70eb7c Remove the global 'make includes' step from 'make build'.
This is no longer needed and gets in the way of tightening
permission used during build. ok and suggestions natano@
2016-10-10 13:34:43 +00:00
matthieu
178fb5f1c1 Move headers files to 'GL/' so that the library can be built
without installed headers.
2016-10-10 13:27:14 +00:00
natano
6c14b73344 ks_tables.h is always considered out of date due to the forced rebuild
of the makekeys util. This means it's also rebuilt during install. First
as root during build, later by the BUILDUSER during release, which won't
be able to rewrite it, because it's now owned by root. With this result:

	override rw-r--r--  root/wheel for ks_tables.h?


One step closer towards noperm release builds for xenocara.

ok matthieu
2016-10-08 21:51:47 +00:00
matthieu
dde5cc23a3 Put back the NOPROFILE= that I accidentally removed in previous commit 2016-10-08 19:29:18 +00:00
matthieu
dd04a74464 use the pkg-config support from bsd.xorg.mk to handle
libGLw and libepoxy .pc files rather than manually generating them
as root in postinstall. Spotted by natano@ ok natano@.
2016-10-08 19:09:34 +00:00
matthieu
f8928160a7 Fix package version in fontconfig.pc 2016-10-08 14:09:10 +00:00
matthieu
e61292a300 Avoid buffer underflow on empty strings.
If an empty string is received from an x-server, do not underrun the
buffer by accessing "rep.nameLen - 1" unconditionally, which could end
up being -1.

From Tobias Stoeckmann / X.Org security advisory Oct 4, 2016
2016-10-04 15:11:05 +00:00
matthieu
1e4e5956d0 Protocol handling issues in libXv
The Xv query functions for adaptors and encodings suffer from out of boundary
accesses if a hostile X server sends a maliciously crafted response.

A previous fix already checks the received length against fixed values but
ignores additional length specifications which are stored inside the received
data.

These lengths are accessed in a for-loop. The easiest way to guarantee a
correct processing is by validating all lengths against the remaining size
left before accessing referenced memory.

This makes the previously applied check obsolete, therefore I removed it.

From Tobias Stoeckmann / X.Org security advisory Oct 4, 2016
2016-10-04 15:09:40 +00:00
matthieu
ce0f69616f Out of boundary access and endless loop in libXtst
A lack of range checks in libXtst allows out of boundary accesses.
The checks have to be done in-place here, because it cannot be done
without in-depth knowledge of the read data.

If XRecordStartOfData, XRecordEndOfData, or XRecordClientDied
without a client sequence have attached data, an endless loop would
occur. The do-while-loop continues until the current index reaches
the end. But in these cases, the current index would not be
incremented, leading to an endless processing.

From Tobias Stoeckmann / X.Org security advisory Oct 4, 2016
2016-10-04 15:08:08 +00:00
matthieu
26cabdb32f Validate lengths while parsing server data.
Individual lengths inside received server data can overflow
the previously reserved memory.

It is therefore important to validate every single length
field to not overflow the previously agreed sum of all invidual
length fields.

From Tobias Stoeckmann / X.Org security advisory Oct 4, 2016
2016-10-04 15:05:13 +00:00
matthieu
9f957a9f79 Avoid OOB write in XRenderQueryFilters
The memory for filter names is reserved right after receiving the reply.
After that, filters are iterated and each individual filter name is
stored in that reserved memory.

The individual name lengths are not checked for validity, which means
that a malicious server can reserve less memory than it will write to
during each iteration.

From Tobias Stoeckmann / X.Org security advisory Oct 4, 2016
2016-10-04 15:03:48 +00:00
matthieu
aebb61b811 Avoid out of boundary accesses on illegal responses
The responses of the connected X server have to be properly checked
to avoid out of boundary accesses that could otherwise be triggered
by a malicious server.

From Tobias Stoeckmann / X.Org security advisory Oct 4, 2016
2016-10-04 15:02:31 +00:00
matthieu
342b1570d2 Properly validate server responses
By validating length fields from server responses, out of boundary
accesses and endless loops can be mitigated.

From Tobias Stoeckmann / X.Org security advisory Oct 4, 2016
2016-10-04 15:01:03 +00:00
matthieu
269364ad66 Integer overflow on illegal server response
The 32 bit field "rep.length" is not checked for validity, which allows
an integer overflow on 32 bit systems.

A malicious server could send INT_MAX as length, which gets multiplied
by the size of XRectangle. In that case the client won't read the whole
data from server, getting out of sync.

From Tobias Stoeckmann / X.Org security advisory Oct 4, 2016
2016-10-04 14:59:47 +00:00
matthieu
89e55bbf5a Validation of server responses in XGetImage()
Check if enough bytes were received for specified image type and
geometry. Otherwise GetPixel and other functions could trigger an
out of boundary read later on.
From Tobias Stoeckmann / X.Org security advisory Oct 4, 2016
2016-10-04 14:58:26 +00:00
matthieu
bd2560e2ec The validation of server responses avoids out of boundary accesses.
From Tobias Stoeckmann / Xorg Securiry adrvisory Oct 4, 2016.
2016-10-04 14:56:37 +00:00
matthieu
c542153d63 revert pixman-vmx.c to the version of pixman-0.32.8.
gcc 4.2 is not able to compile the new version.
XXX switch back to 0.34 once macppc switches to clang.
2016-10-03 06:57:44 +00:00