Commit Graph

6355 Commits

Author SHA1 Message Date
matthieu
cfac9b1f49 Unlink the following utilities from the build:
fslsfonts, fstobdf, showfont, xfsinfo, xfwp and scripts (xon)
Ports can be created if needed. ok deraadt@, jca@
2018-12-21 14:37:24 +00:00
matthieu
8adca26b11 update 2018-12-17 10:39:25 +00:00
matthieu
63c200916e update 2018-12-10 07:24:25 +00:00
fcambus
b3ae9f8426 Update openchrome to 0.6.176.
This fixes display on my VX900 systems.

OK matthieu@
2018-12-09 21:07:33 +00:00
danj
4bd2e674ea Move some links to https
There may still be a redirect but matthieu@ prefers generic URL as they
should be more stable

ok matthieu@
2018-12-07 18:53:06 +00:00
matthieu
d7845c3e27 Remove libXxf86misc. Unlinked from build for 6 months. 2018-11-25 19:35:00 +00:00
matthieu
be3e8f71c9 Remove libXfontcache. Unlinked from build for 6 months. 2018-11-25 19:34:21 +00:00
matthieu
b2051f5e65 Remove xf86miscproto. Unlinked from build for 6 months. 2018-11-25 19:33:46 +00:00
matthieu
8a24aa5549 Remove fontcacheproto. Unlinked from build for 6 months. 2018-11-25 19:32:38 +00:00
matthieu
3fb1322815 update 2018-11-25 10:19:27 +00:00
okan
7d9a5b3486 Stop asking for events (NoEventMask) from menu window once done with
the menu (we don't destroy it, only unmap).
2018-11-14 19:22:51 +00:00
okan
ee0ce74a2f Allow 'transientfor' clients to inherit group and bwidth either during init or
via property notify events. Previously only the flags were set but nothing was
in the path to apply said flags and/or bwidth. Required slight of re-orgnaization
of client_init.
2018-11-13 17:37:13 +00:00
kn
5089c22b90 Use strtonum(3)
Zap obsolete linter hints while here.

Feedback and OK cheloha
2018-11-11 16:10:37 +00:00
kn
c5d5ef9f35 Zap unneeded bzero(3) on already zero initialized global data
OK cheloha
2018-11-11 16:01:21 +00:00
jsg
65cc648a0e Make similiar changes to the i386 tsd dispatch assembly as libglvnd to
avoid a text relocation fixing the build with lld.

This time store the address of the GOT in ebx as required before calling
the PLT stub and change .balign value to match X86_ENTRY_SIZE as suggested
by naddy.

ok naddy@
2018-11-11 04:15:19 +00:00
jsg
f88a7e92a2 Backout i386 tsd dispatch changes. While they worked for
glxinfo/glxgears it broke SDL2 GL which dlopens libGL.
2018-11-10 08:11:16 +00:00
okan
0a0e524477 merge from base, from sashan@:
> - odd condition/test in PF lexer
> (and other lexers too)
>
> This commit rectifies earlier change:
>
> in the lex... even inside quotes, a \ followed by space or tab should
> expand to space or tab, and a \ followed by newline should be ignored
> (as a line continuation).  compatible with the needs of hoststated
> (which has the most strict quoted string requirements), and ifstated
> (where one commonly does line continuations in strings).
>
> OK deraadt@, OK millert@
2018-11-09 16:00:54 +00:00
okan
2fda12947a Use the original client border width to adjust initial placement of clients
containing {P,US}Position requests where they are explicitly set to 'ignore' in
cwmrc(5); clients are unaware that their border will be altered (removed in
this case) when calcuating position and thus end up a factor of their original
border width off once mapped by cwm(1). cwm(1) will essentially shift the
client to the edge if the original request's position and border match.

Window offset noticed by at least Andre Stoebe via bugs@, and others since
(and likely before). Thanks!
2018-11-08 15:49:42 +00:00
matthieu
b2e24c1d7c Remove the unused 'keyFile' resource.
It is not used anymore in xenodm (was used to specify the secret keys
for the XDM-AUTHORIZATION-1 authentication protocol in xdm with
xdmcp).
ok kn@
2018-11-03 18:04:45 +00:00
matthieu
aceb52e119 Explicitely disable xdm-authorization-1 support in X server.
It was previously disabled by a broken test for XdmcpWrap() in xdm and
later in xenodm but it won't be missed. (use of DES, no IPv6 support).
ok tb@ mortimer@
2018-11-03 14:05:28 +00:00
matthieu
b129529692 regen 2018-11-03 14:01:21 +00:00
matthieu
e0d21cc9e4 Remove useless check for XdmcpWrap().
It was only needed by xdmcp. ok tb@ mortimer@
2018-11-03 14:01:02 +00:00
matthieu
f5d27d0af0 Fix path to app-default resource file. From Sascha Paunovic,
tweaked by me. ok deraadt@
2018-11-01 11:48:04 +00:00
jsg
52a0cb86e3 update 2018-11-01 08:33:21 +00:00
jsg
54d5c1463c sync 2018-11-01 08:31:23 +00:00
jsg
41f63e84e3 Merge libdrm 2.4.96 2018-11-01 08:29:47 +00:00
jsg
384954210f Import libdrm 2.4.96 2018-11-01 08:22:36 +00:00
jsg
f19a6c0440 Make similiar changes to the i386 tsd dispatch assembly as libglvnd to
avoid a text relocation fixing the build with lld.

ok kettenis@ naddy@
2018-10-31 23:26:16 +00:00
jsg
af38fe66ed regen 2018-10-29 11:38:31 +00:00
jsg
5f17afeed5 Don't attempt to rebuild spirv_info.c if timestamp on source files
changed as python won't be in path.

someone in this situation mentioned it to landry@
2018-10-29 11:35:23 +00:00
matthieu
f9024c4d46 Pass the correct buffer length to strlcpy() to avoid truncation.
Problem noticed by Edgar Pettijohn III, ok tb@
2018-10-28 19:38:19 +00:00
mestre
bb65f435ee Add a few \n I missed to add in some fprintf(3)s in my last commit 2018-10-26 17:37:47 +00:00
mestre
2288d216a5 If input_name is provided we can unveil(2) it with read permissions, if
output_name is provided we need to unveil(2) this one with rwc. Additionally
depending on the different combinations of if these files are passed via args
or from stdin/to stdout we can also pledge(2) accordingly to the code path.

OK deraadt@
2018-10-26 17:12:03 +00:00
deraadt
d9d5fc591a Disable setuid on the X server. We have always known it is a trash fire
and we held out hope too long.  This will break some stuff.  Let's start
with non-setuid as the baseline, and see if it is worth trying to fix
the broken parts in some other way.
2018-10-25 21:55:18 +00:00
matthieu
2d6e93a5b7 MFC: Disable -logfile and -modulepath when running with elevated
privileges.  This Could cause arbitrary files overwrite.
CVE-2018-14665.
2018-10-25 15:44:27 +00:00
mestre
e897f28b00 xserver's priv proc is responsible for opening devices in O_RDWR mode and send
their fds over to the parent proc. Knowing this then we already have a list of
all possible devices that might be opened in the future, in struct okdev
allowed_devices[], and we just need to traverse them and unveil(2) each one
with read/write permissions.

positive feedback from semarie@, OK matthieu@
2018-10-25 06:41:25 +00:00
jsg
45bb3d5b2d sync 2018-10-23 08:15:04 +00:00
jsg
0a79225c68 update 2018-10-23 06:46:39 +00:00
jsg
19f2c52c66 Merge Mesa 17.3.9
Mesa 18.x needs an ld with build-id for at least the intel code
Mesa 18.2 assumes linux only memfd syscalls in intel code

Tested by matthieu@, kettenis@ and myself on a variety of hardware and
architectures. ok kettenis@
2018-10-23 06:35:32 +00:00
jsg
587354b697 Import Mesa 17.3.9 2018-10-23 05:40:45 +00:00
matthieu
2c83b87d07 update 2018-10-20 19:26:12 +00:00
matthieu
5c831511f8 Update to libSM 1.2.3 2018-10-20 19:25:32 +00:00
matthieu
7070f339ed Update to libX11 1.6.7 2018-10-20 19:23:25 +00:00
matthieu
edd3ecfc7c Explicitely disable xf86misc 2018-10-20 19:09:19 +00:00
matthieu
792e7828ab update 2018-10-16 19:33:35 +00:00
matthieu
71dca55fd9 Update to libxcb 1.13.1, a small bug fix release.
ok naddy@
2018-10-04 20:17:48 +00:00
matthieu
4a94cb7b79 update 2018-09-30 08:58:33 +00:00
deraadt
f6e29c09b7 sync 2018-09-27 03:41:24 +00:00
deraadt
97f61bb6a9 sync 2018-09-18 13:30:35 +00:00
jsg
227a344eb5 update 2018-09-13 12:05:53 +00:00