Commit Graph

5140 Commits

Author SHA1 Message Date
jsg
743ec8762a update glxinfo and glxgears to Mesa demos 8.2.0 2014-07-13 09:47:57 +00:00
matthieu
ce3bfced85 update 2014-07-12 19:34:19 +00:00
matthieu
d098943642 Update to xf86-video-modesetting 0.9.0 2014-07-12 19:15:36 +00:00
espie
d90db373e9 thinko 2014-07-12 19:14:55 +00:00
matthieu
0e782e8198 Replace xrdb-cpp by auxcpp 2014-07-12 16:36:22 +00:00
matthieu
f2bdb80f55 More ucpp->xrdb-cpp renaming 2014-07-12 14:40:50 +00:00
matthieu
68f71d7d34 Tell xrdb to default to xrdb-cpp as C pre-processor 2014-07-12 14:34:36 +00:00
matthieu
6a6bbb2d59 Hook xrdb-cpp 2014-07-12 14:33:37 +00:00
matthieu
cf1d97d9e6 Local tweaks to ucpp for xrdb:
- exit on the 1st error it finds. Better than stopping processing input
- accept -P as a synonym for -l since this is what xrdb uses to suppress
  #line markers.
2014-07-12 14:32:55 +00:00
matthieu
f5aa946dbd Renname the manual page 2014-07-12 14:28:07 +00:00
matthieu
d4e54c2056 Replace the Makefile with a xenocara-compatible one. 2014-07-12 14:27:42 +00:00
matthieu
a2223c7302 Import a copy of ucpp, lightweight cpp for use by xrdb so that it
doesn't depend on the 'comp'  set. ok espie@ deraadt@
2014-07-12 14:25:39 +00:00
matthieu
c536fefa02 Remove the X pseudo-package support. outdated and never used.
ok espie@
2014-07-12 12:32:45 +00:00
matthieu
e52b740c0e Update to libXft 2.3.2 2014-07-12 10:10:57 +00:00
matthieu
5a14c2ef39 Update to libICE 1.0.9 2014-07-12 09:49:11 +00:00
matthieu
0a4adec844 Get rid of the md.x11r7 hack for the xfont set.
This made sense 5 years ago when different arches had different
font lists, nowadays just use a mi file and empty md ones like xshare.

This make future work on new X sets easier.
2014-07-11 17:27:38 +00:00
matthieu
a598a4a664 remove extra ${SUDO} in release-install target.
This target can only be run as root already.
ok espie@ todd@
2014-07-11 13:45:54 +00:00
todd
6c23513f16 sync 2014-07-11 13:14:51 +00:00
matthieu
cbb90c1d70 update 2014-07-11 08:21:18 +00:00
matthieu
4f333b168a Update to xorg-server 1.15.2. bug fixes. 2014-07-11 08:13:43 +00:00
todd
f78c783403 sync 2014-07-11 07:47:59 +00:00
todd
4835451bf4 sync 2014-07-10 22:58:16 +00:00
jsg
128505aa0d gallium/targets/{r300,r600,radeonsi}/dri/drm_target.c is now a symlink to
gallium/targets/{r300,r600,radeonsi}/common/drm_target.c in the Mesa source
but cvs import ignores symlinks.

Change the directory we search for drm_target.c in to deal with this.
2014-07-10 08:44:00 +00:00
espie
8c72b1da5a locate db in X, named xorg.db to please matthieu 2014-07-10 07:13:13 +00:00
jsg
e0538a9554 sync 2014-07-09 21:36:59 +00:00
jsg
ea95abebcf Mesa 10.2.3 2014-07-09 21:32:40 +00:00
jsg
4426d79b4b Merge Mesa 10.2.3
tested by matthieu@ kettenis@ mpi@ brett@ and myself across a
diverse range of hardware
2014-07-09 21:08:50 +00:00
jsg
7c297b484e Import Mesa 10.2.3 2014-07-09 20:33:36 +00:00
nick
a870156568 fix for man pages -- per roff(7), .so should be based in the parent man
page directory.  fixes the following X man 3 pages:
  XTestCompareCurrentCursorWithWindow.man
  XTestCompareCursorWithWindow.man XTestDiscard.man
  XTestFakeButtonEvent.man XTestFakeKeyEvent.man
  XTestFakeMotionEvent.man XTestFakeRelativeMotionEvent.man
  XTestGrabControl.man XTestSetGContextOfGC.man
  XTestSetVisualIDOfVisual.man
2014-06-20 00:38:53 +00:00
matthieu
9364b9c909 Uodate to xcb-util-renderutil 0.3.9 2014-06-15 09:00:40 +00:00
matthieu
e819e5ec74 update 2014-06-15 08:52:12 +00:00
matthieu
4e33e6837c Update to xf86-video-geode 2.11.15 2014-06-08 18:15:12 +00:00
matthieu
6006b2d2f7 Update to xf86-video-modesetting 0.8.1 2014-06-08 15:10:13 +00:00
matthieu
d7b8fa72ff update 2014-06-07 20:17:06 +00:00
sebastia
4012ca7792 Include missing header to segfault seen on Xorg startup with nv driver,
savage driver seems to have same problem.

help and cluebatting from matthieu@ and guenther@

OK matthieu@
2014-05-30 06:42:00 +00:00
todd
7c79d7eb32 sync 2014-05-25 20:07:48 +00:00
todd
44a1abe46a sync 2014-05-25 13:08:21 +00:00
todd
f75c18b53b sync 2014-05-20 22:38:04 +00:00
todd
278e4f1a22 sync 2014-05-20 12:10:18 +00:00
matthieu
0f1c03937b Add do-not-config.h.in as file touch to avoid re-running autoheader.
Prevents xserver's build from creating an empty config.h.in file.
Problem noticed by naddy@.
2014-05-19 21:09:08 +00:00
todd
50eccefb2f sync 2014-05-19 12:57:31 +00:00
todd
4faf801abd sync 2014-05-18 14:07:26 +00:00
matthieu
9bfdc933e1 update 2014-05-18 12:15:06 +00:00
matthieu
4bd039500e Update to libXfont 1.4.8 2014-05-18 12:13:54 +00:00
matthieu
27cbe0965e sync 2014-05-18 10:33:46 +00:00
matthieu
b4cc09fbf4 Update to fontconfig 2.11.1. Tested by shadchin@ 2014-05-18 10:33:03 +00:00
matthieu
c5fb976108 Add /usr/lib/pkgconfig to PKG_CONFIG_LIBDIR to let pkg-config find expat 2014-05-18 10:29:01 +00:00
shadchin
7248b498d4 update 2014-05-17 17:20:09 +00:00
shadchin
c896ccf8ec Update to xf86-input-synaptics 1.8.0.
ok matthieu@, tested claudio@
2014-05-17 17:18:21 +00:00
matthieu
05ed5123d1 Security fixes from X.Org Advisory:
X Font Service Protocol & Font metadata file handling issues in libXfont
May 13, 2014

- CVE-2014-0209: integer overflow of allocations in font metadata file parsing

    When a local user who is already authenticated to the X server adds
    a new directory to the font path, the X server calls libXfont to open
    the fonts.dir and fonts.alias files in that directory and add entries
    to the font tables for every line in it.  A large file (~2-4 gb) could
    cause the allocations to overflow, and allow the remaining data read
    from the file to overwrite other memory in the heap.

    Affected functions: FontFileAddEntry(), lexAlias()

- CVE-2014-0210: unvalidated length fields when parsing xfs protocol replies

    When parsing replies received from the font server, these calls do not
    check that the lengths and/or indexes returned by the font server are
    within the size of the reply or the bounds of the memory allocated to
    store the data, so could write past the bounds of allocated memory when
    storing the returned data.

    Affected functions: _fs_recv_conn_setup(), fs_read_open_font(),
    fs_read_query_info(), fs_read_extent_info(), fs_read_glyphs(),
    fs_read_list(), fs_read_list_info()

- CVE-2014-0211: integer overflows calculating memory needs for xfs replies

    These calls do not check that their calculations for how much memory
    is needed to handle the returned data have not overflowed, so can
    result in allocating too little memory and then writing the returned
    data past the end of the allocated buffer.

    Affected functions: fs_get_reply(), fs_alloc_glyphs(),
    fs_read_extent_info()

Reported by Ilja van Sprundel of IOActive
Fixes by Alan Coopersmith of Oracle
2014-05-13 19:09:22 +00:00