Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (1h)  netbsd-8 (5d)  netbsd-10 (6d)  netbsd-9 (12d)  thorpej-ifq (175d)  thorpej-altq-separation (178d) 

2024-05-10 14:20:18 UTC Now

2018-02-10 04:12:17 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #540):
sys/dist/pf/net/pf.c: 1.77-1.78
PR/52682: David Binderman: Fix wrong assignment (in the !__NetBSD__ code)
Oh, what is this. Fix a remotely-triggerable integer overflow: the way we
define TCPOLEN_SACK makes it unsigned, and the comparison in the while()
is unsigned too. That's not the expected behavior, the original code
wanted a signed comparison.
It's pretty easy to make 'hlen' go negative and trigger a buffer overflow.
This bug was reported 8 years ago by Lucio Albornoz in PR/44059.

(snj)

2018-02-10 03:55:59 UTC MAIN commitmail json YAML

make it compile without MULTIPROCESSOR (xen?)

(christos)

2018-02-09 23:22:13 UTC MAIN commitmail json YAML

fix BN_to_integer to get rid of  __UNCONST. Trick question:
How many BN_to_integer implementations does Heimdal contain (I only fixed 2).

(christos)

2018-02-09 22:46:19 UTC MAIN commitmail json YAML

Use the magic FILESBUILD variable so that it builds with BUILD/UPDATE unset.
Why again FILESBUILD is not the default and needs to be set?

(christos)

2018-02-09 22:08:28 UTC MAIN commitmail json YAML

Explain what may seem to be a non-sensical assignment, but isn't.

closes PR 53000

(jakllsch)

2018-02-09 21:25:04 UTC MAIN commitmail json YAML

Oh, what is this. Fix a remotely-triggerable integer overflow: the way we
define TCPOLEN_SACK makes it unsigned, and the comparison in the while()
is unsigned too. That's not the expected behavior, the original code
wanted a signed comparison.

It's pretty easy to make 'hlen' go negative and trigger a buffer overflow.

This bug was reported 8 years ago by Lucio Albornoz in PR/44059.

(maxv)

2018-02-09 18:45:55 UTC MAIN commitmail json YAML

Disable XSAVEOPT, until it is clear what's wrong with it (PR/52966).

(maxv)

2018-02-09 18:31:52 UTC MAIN commitmail json YAML

2018-02-09 17:14:26 UTC MAIN commitmail json YAML

update nsd, fix typo for acpica

(christos)

2018-02-09 17:13:27 UTC MAIN commitmail json YAML

2018-02-09 17:11:14 UTC MAIN commitmail json YAML

2018-02-09 16:06:59 UTC MAIN commitmail json YAML

2018-02-09 15:24:35 UTC MAIN commitmail json YAML

On Milan, also explicitly disable MBIRQ1 on PIIX.

Milan's ROM bootloader v1.2 and v1.4 incorrectly set MBIRQ0 connected
to the secondary IDE to IRQ14 (not 15) and unused MBIRQ1 to IRQ15,
so both IDE channels don't work properly.

(tsutsui)

2018-02-09 14:12:56 UTC netbsd-6-0 commitmail json YAML

2018-02-09 14:12:22 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1526):
sys/netinet/ip_input.c: revision 1.366

Disable ip_allowsrcrt and ip_forwsrcrt. Enabling them by default was a
completely dumb idea, because they have security implications.

By sending an IPv4 packet containing an LSRR option, an attacker will
cause the system to forward the packet to another IPv4 address - and
this way he white-washes the source of the packet.

It is also possible for an attacker to reach hidden networks: if a server
has a public address, and a private one on an internal network (network
which has several internal machines connected), the attacker can send a
packet with:
        source = 0.0.0.0
        destination = public address of the server
        LSRR first address = address of a machine on the internal network
And the packet will be forwarded, by the server, to the internal machine,
in some cases even with the internal IP address of the server as a source.

(martin)

2018-02-09 14:11:54 UTC netbsd-6-1 commitmail json YAML

2018-02-09 14:11:21 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1526):
sys/netinet/ip_input.c: revision 1.366

Disable ip_allowsrcrt and ip_forwsrcrt. Enabling them by default was a
completely dumb idea, because they have security implications.

By sending an IPv4 packet containing an LSRR option, an attacker will
cause the system to forward the packet to another IPv4 address - and
this way he white-washes the source of the packet.

It is also possible for an attacker to reach hidden networks: if a server
has a public address, and a private one on an internal network (network
which has several internal machines connected), the attacker can send a
packet with:
        source = 0.0.0.0
        destination = public address of the server
        LSRR first address = address of a machine on the internal network
And the packet will be forwarded, by the server, to the internal machine,
in some cases even with the internal IP address of the server as a source.

(martin)

2018-02-09 14:10:35 UTC netbsd-6 commitmail json YAML

2018-02-09 14:09:35 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1526):
sys/netinet/ip_input.c: revision 1.366

Disable ip_allowsrcrt and ip_forwsrcrt. Enabling them by default was a
completely dumb idea, because they have security implications.

By sending an IPv4 packet containing an LSRR option, an attacker will
cause the system to forward the packet to another IPv4 address - and
this way he white-washes the source of the packet.

It is also possible for an attacker to reach hidden networks: if a server
has a public address, and a private one on an internal network (network
which has several internal machines connected), the attacker can send a
packet with:
        source = 0.0.0.0
        destination = public address of the server
        LSRR first address = address of a machine on the internal network
And the packet will be forwarded, by the server, to the internal machine,
in some cases even with the internal IP address of the server as a source.

(martin)

2018-02-09 14:06:57 UTC netbsd-7-0 commitmail json YAML

2018-02-09 14:06:25 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1563):
sys/netinet/ip_input.c: revision 1.366 (via patch)

Disable ip_allowsrcrt and ip_forwsrcrt. Enabling them by default was a
completely dumb idea, because they have security implications.

By sending an IPv4 packet containing an LSRR option, an attacker will
cause the system to forward the packet to another IPv4 address - and
this way he white-washes the source of the packet.

It is also possible for an attacker to reach hidden networks: if a server
has a public address, and a private one on an internal network (network
which has several internal machines connected), the attacker can send a
packet with:
        source = 0.0.0.0
        destination = public address of the server
        LSRR first address = address of a machine on the internal network
And the packet will be forwarded, by the server, to the internal machine,
in some cases even with the internal IP address of the server as a source.

(martin)

2018-02-09 14:06:18 UTC MAIN commitmail json YAML

Style, and move the 'ip_srcroute' call after 'tcp_dooptions', otherwise
we're leaking 'ipopts'. (Harmless, since TCP_SIGNATURE is disabled.)

(maxv)

2018-02-09 14:06:02 UTC netbsd-7-1 commitmail json YAML

2018-02-09 14:05:29 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1563):
sys/netinet/ip_input.c: revision 1.366 (via patch)

Disable ip_allowsrcrt and ip_forwsrcrt. Enabling them by default was a
completely dumb idea, because they have security implications.

By sending an IPv4 packet containing an LSRR option, an attacker will
cause the system to forward the packet to another IPv4 address - and
this way he white-washes the source of the packet.

It is also possible for an attacker to reach hidden networks: if a server
has a public address, and a private one on an internal network (network
which has several internal machines connected), the attacker can send a
packet with:
        source = 0.0.0.0
        destination = public address of the server
        LSRR first address = address of a machine on the internal network
And the packet will be forwarded, by the server, to the internal machine,
in some cases even with the internal IP address of the server as a source.

(martin)

2018-02-09 13:38:08 UTC netbsd-7 commitmail json YAML

2018-02-09 13:37:17 UTC MAIN commitmail json YAML

2018-02-09 13:37:09 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1563):
sys/netinet/ip_input.c: revision 1.366 (via patch)

Disable ip_allowsrcrt and ip_forwsrcrt. Enabling them by default was a
completely dumb idea, because they have security implications.

By sending an IPv4 packet containing an LSRR option, an attacker will
cause the system to forward the packet to another IPv4 address - and
this way he white-washes the source of the packet.

It is also possible for an attacker to reach hidden networks: if a server
has a public address, and a private one on an internal network (network
which has several internal machines connected), the attacker can send a
packet with:
        source = 0.0.0.0
        destination = public address of the server
        LSRR first address = address of a machine on the internal network
And the packet will be forwarded, by the server, to the internal machine,
in some cases even with the internal IP address of the server as a source.

(martin)

2018-02-09 13:35:45 UTC MAIN commitmail json YAML

2018-02-09 13:25:41 UTC MAIN commitmail json YAML

src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/Makefile@1.8 / diff / nxr@1.8
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/aes-586.S@1.7 / diff / nxr@1.7
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/aesni-x86.S@1.8 / diff / nxr@1.8
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/bf-586.S@1.4 / diff / nxr@1.4
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/bn-586.S@1.9 / diff / nxr@1.9
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/cast-586.S@1.5 / diff / nxr@1.5
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/cmll-x86.S@1.5 / diff / nxr@1.5
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/co-586.S@1.7 / diff / nxr@1.7
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/crypt586.S@1.4 / diff / nxr@1.4
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/des-586.S@1.6 / diff / nxr@1.6
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/ghash-x86.S@1.6 / diff / nxr@1.6
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/md5-586.S@1.7 / diff / nxr@1.7
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/rc4-586.S@1.6 / diff / nxr@1.6
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/rc5-586.S@1.4 / diff / nxr@1.4
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/rmd-586.S@1.7 / diff / nxr@1.7
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/sha1-586.S@1.7 / diff / nxr@1.7
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/sha256-586.S@1.6 / diff / nxr@1.6
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/sha512-586.S@1.6 / diff / nxr@1.6
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/uplink-x86.S@1.5 / diff / nxr@1.5
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/vpaes-x86.S@1.5 / diff / nxr@1.5
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/x86cpuid.S@1.14 / diff / nxr@1.14

new script does not know -D, regen

(christos)

2018-02-09 09:36:42 UTC MAIN commitmail json YAML

Reset ddb_regp to NULL. Reported by David Binderman in PR/52964.

(maxv)

2018-02-09 09:07:13 UTC MAIN commitmail json YAML

Use UVM_PROT_RW instead of UVM_PROT_ALL. This doesn't change anything,
since the protection code is not applied: the pages are manually kentered
as RW.

But fix it anyway, so that "pmap 0" does not say the map is executable.

(maxv)

2018-02-09 08:58:01 UTC MAIN commitmail json YAML

Force a reload of CW in fpu_set_default_cw(). This function is used only
in COMPAT_FREEBSD, it really needs to die.

(maxv)

2018-02-09 08:54:12 UTC MAIN commitmail json YAML

Don't restore segment registers when leaving NMIs. In nmitrap (and the
functions it later calls), we are not allowing the trap frame to change;
so the segregs don't change since we are running with interrupts disabled
and there is no rescheduling in this case.

(maxv)

2018-02-09 08:42:26 UTC MAIN commitmail json YAML

Define INTRSTUB_ARRAY, simplifies a lot.

(maxv)

2018-02-09 08:03:33 UTC MAIN commitmail json YAML

Style (realign everything correctly), and fix a typo.

(maxv)

2018-02-09 04:38:24 UTC MAIN commitmail json YAML

2018-02-09 04:20:38 UTC MAIN commitmail json YAML

2018-02-09 03:53:07 UTC MAIN commitmail json YAML

Fix ping_opts_gateway and ping_opts_recordroute

We need to enable the options of source routing on all rump kernels.

(ozaki-r)

2018-02-09 03:20:21 UTC MAIN commitmail json YAML

put .PATH after the variable is defined.

(christos)

2018-02-09 02:51:32 UTC MAIN commitmail json YAML

No RC5 for OpenSSL-1.1

(christos)

2018-02-09 02:37:20 UTC MAIN commitmail json YAML

disable compat api setting for openssl 1.1

(christos)

2018-02-09 02:23:32 UTC MAIN commitmail json YAML

only set api compat for 1.0

(christos)

2018-02-09 01:54:46 UTC MAIN commitmail json YAML

only set the compat version for OpenSSL-1.0

(christos)

2018-02-08 23:52:26 UTC MAIN commitmail json YAML

2018-02-08 23:41:26 UTC MAIN commitmail json YAML

include the right test directory for the right openssl version

(christos)

2018-02-08 23:32:38 UTC MAIN commitmail json YAML

2018-02-08 23:04:13 UTC MAIN commitmail json YAML

2018-02-08 22:51:06 UTC MAIN commitmail json YAML

2018-02-08 22:49:15 UTC MAIN commitmail json YAML

2018-02-08 22:48:55 UTC MAIN commitmail json YAML

2018-02-08 21:59:11 UTC MAIN commitmail json YAML

2018-02-08 21:57:29 UTC MAIN commitmail json YAML

src/crypto/external/bsd/openssl/bin/Makefile@1.8 / diff / nxr@1.8
src/crypto/external/bsd/openssl/include/internal/bn_conf.h@1.1 / diff / nxr@1.1
src/crypto/external/bsd/openssl/include/internal/dso_conf.h@1.1 / diff / nxr@1.1
src/crypto/external/bsd/openssl/include/openssl/opensslconf.h@1.1 / diff / nxr@1.1
src/crypto/external/bsd/openssl/include/progs.h@1.1 / diff / nxr@1.1
src/crypto/external/bsd/openssl/lib/libcrypto/Makefile@1.13 / diff / nxr@1.13
src/crypto/external/bsd/openssl/lib/libcrypto/aes.inc@1.4 / diff / nxr@1.4
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/aes-586.S@1.6 / diff / nxr@1.6
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/aesni-x86.S@1.7 / diff / nxr@1.7
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/bf-586.S@1.3 / diff / nxr@1.3
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/bf-686.S deleted
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/bn-586.S@1.8 / diff / nxr@1.8
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/cast-586.S@1.4 / diff / nxr@1.4
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/chacha-x86.S@1.1 / diff / nxr@1.1
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/chacha.inc@1.1 / diff / nxr@1.1
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/cmll-x86.S@1.4 / diff / nxr@1.4
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/co-586.S@1.6 / diff / nxr@1.6
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/crypt586.S@1.3 / diff / nxr@1.3
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/des-586.S@1.5 / diff / nxr@1.5
src/crypto/external/bsd/openssl/lib/libcrypto/arch/i386/e_padlock-x86.S@1.1 / diff / nxr@1.1
      :
(more 581 files)
update build glue

(christos)

2018-02-08 21:51:38 UTC MAIN commitmail json YAML

2018-02-08 21:02:06 UTC MAIN commitmail json YAML

Remove ovbcopy. It's long dead; only sparc has a reference to a function
of the same name, which too should be removed.

(maxv)

2018-02-08 20:57:41 UTC MAIN commitmail json YAML

2018-02-08 20:57:02 UTC MAIN commitmail json YAML

try to make this match what I believe is current reality

(jakllsch)

2018-02-08 20:50:00 UTC MAIN commitmail json YAML

Style, rename a variable, and remove an unreachable case.

(maxv)

2018-02-08 20:41:36 UTC MAIN commitmail json YAML

Move the IPv4 multicast check earlier; we want to kick multicast packets
all the time, and not just when they are SYNs.

The IPv6 multicast check is already done earlier, so this block of code
can be removed.

(maxv)

2018-02-08 20:19:30 UTC MAIN commitmail json YAML

Remove the unused 'multicast' argument from tcp_vtw_input, and remove
the now-unused multicast detection code. It couldn't have been correct on
IPv6, since multicast packets are kicked at the beginning of the function.

(maxv)

2018-02-08 20:18:03 UTC MAIN commitmail json YAML

Add ASN1_STRING_get0_data() glue for OPENSSL_API_COMPAT >= 0x10100000L

(jakllsch)

2018-02-08 20:10:56 UTC MAIN commitmail json YAML

Remove the default case, the beginning of the function already ensures
af == AF_INET || af == AF_INET6.

(maxv)

2018-02-08 20:06:21 UTC MAIN commitmail json YAML

2018-02-08 19:58:05 UTC MAIN commitmail json YAML

Remove the IN6_IS_ADDR_V4MAPPED checks in the protocol functions. They
are useless, because the IPv6 entry point (ip6_input) already performs
them.

The checks were first added in the protocol functions:

Wed Dec 22 04:03:02 1999 UTC (18 years, 1 month ago) by itojun

"drop IPv6 packets with v4 mapped address on src/dst.  they are illegal
and may be used to fool IPv6 implementations (by using ::ffff:127.0.0.1 as
source you may be able to pretend the packet is from local node)"

Shortly afterwards they were also added in the IPv6 entry point, but
where not removed from the protocol functions:

Mon Jan 31 10:33:22 2000 UTC (18 years ago) by itojun

"be proactive about malicious packet on the wire.  we fear that v4 mapped
address to be used as a tool to hose security filters (like bypassing
"local host only" filter by using ::ffff:127.0.0.1)."

OpenBSD did the same a few months ago. FreeBSD has never had these checks.

(maxv)

2018-02-08 19:38:21 UTC MAIN commitmail json YAML

Style, and remove outdated comments.

(maxv)

2018-02-08 19:33:26 UTC MAIN commitmail json YAML

adjust the list of subdirs to elide.  don't need libitm, gnattools
or gotools.

(mrg)

2018-02-08 19:25:48 UTC MAIN commitmail json YAML

Remove this check, it is already done at the beginning of the function.

(maxv)

2018-02-08 19:16:24 UTC MAIN commitmail json YAML

Allow kdbpeek() to return failure. If it does, stop the stack trace.
Prevents an infinite loop in ddb if something goes wrong.

(bouyer)

2018-02-08 18:59:00 UTC MAIN commitmail json YAML

Reduce the indentation level of this huge block (without realigning yet,
for proofreadability). No functional change.

(maxv)

2018-02-08 18:55:11 UTC MAIN commitmail json YAML

Move the SO_DEBUG block earlier, to reduce the indentation level.

(maxv)

2018-02-08 18:28:42 UTC MAIN commitmail json YAML

define OPENSSL_API_COMPAT

(doesn't entirely unbreak build yet)

(jakllsch)

2018-02-08 17:45:30 UTC MAIN commitmail json YAML

2018-02-08 11:49:37 UTC MAIN commitmail json YAML

pr_send can be given a NULL lwp. It looks like the

control != NULL && lwp == NULL

condition is never supposed to happen, but add a panic for safety.

(maxv)

2018-02-08 11:34:35 UTC MAIN commitmail json YAML

Move udp6_output() into udp6_usrreq.c, and remove udp6_output.c. This is
more consistent with IPv4, and there is no good reason for keeping a
separate file only for one function. FreeBSD did the same.

(maxv)

2018-02-08 11:13:20 UTC MAIN commitmail json YAML

2018-02-08 10:52:05 UTC MAIN commitmail json YAML

update for GCC 6:

kbd_input_wskbd() has a missing {} issue.

(mrg)

2018-02-08 10:42:12 UTC MAIN commitmail json YAML

Use C99 types - in particular, stop using n_time and n_short -, style, and
remove prototype of icmp_sysctl (does not exist). No functional change.

(maxv)

2018-02-08 10:30:30 UTC MAIN commitmail json YAML

Style, and remove prototype of udp_sysctl (does not exist).

(maxv)

2018-02-08 10:24:46 UTC MAIN commitmail json YAML

More style, no functional change.

(maxv)

2018-02-08 10:11:38 UTC MAIN commitmail json YAML

Don't call lltable_purge_entries from in_if_down if ARP isn't enabled

Reported by bouyer@

(ozaki-r)

2018-02-08 10:05:54 UTC MAIN commitmail json YAML

Convert inter.phone from iso-8859-1 to utf-8.

Suggested by Eitan Adler in PR 52990.

(wiz)

2018-02-08 10:03:52 UTC MAIN commitmail json YAML

Change the error stat from IP_STAT_BADFRAGS to IP_STAT_TOOLONG. The
ping_of_death ATF test expects this counter to get increased.

(maxv)

2018-02-08 09:56:19 UTC MAIN commitmail json YAML

Now that we don't allow source-routed packets by default, set allowsrcrt=1
and forwsrcrt=1. Should fix the ATF failure.

(maxv)

2018-02-08 09:32:02 UTC MAIN commitmail json YAML

Fix a possible buffer overflow in the IPv4 _ctlinput functions.

In _icmp_input we are guaranteeing that the ICMP_ADVLENMIN-byte area
starting from 'icp' is contiguous.

ICMP_ADVLENMIN = 8 + sizeof(struct ip) + 8 = 36

But the _ctlinput functions (eg udp_ctlinput) expect the area to be
larger. These functions read at:

(uint8_t *)icp + 8 + (icp->icmp_ip.ip_hl << 2)

which can be crafted to be:

(uint8_t *)icp + 68

So we end up reading 'icp+68' while the valid area ended at 'icp+36'.

Having said that, it seems pretty complicated to trigger this bug; it
would have to be a fragmented packet with half of the ICMP header in the
first fragment, and we would need to have a driver that did not allocate
a cluster for the first mbuf of the chain.

The check of icmplen against ICMP_ADVLEN(icp) was not sufficient: while it
did guarantee that the ICMP header fit the chain, it did not guarantee
that it fit 'm'.

Fix this bug by pulling up to hlen+ICMP_ADVLEN(icp). No need to log an
error. Rebase the pointers afterwards.

(maxv)

2018-02-08 09:05:21 UTC MAIN commitmail json YAML

2018-02-08 09:03:23 UTC MAIN commitmail json YAML

2018-02-08 08:32:30 UTC MAIN commitmail json YAML

2018-02-08 08:04:45 UTC MAIN commitmail json YAML

updates for GCC 6:

- frentry_4_1_0_to_current() has duplicated code section, found via
  the indent checker.  didn't setup a test to confirm the bug/fix,
  but the other 2 similar functions are similar here now.

(mrg)

2018-02-08 07:53:47 UTC MAIN commitmail json YAML

update for GCC 6:

- fix an array bounds violation and pass the right address to ether_crc32_be().

(i assume this actually makes et(4) multicast work.)

(mrg)

2018-02-08 07:48:19 UTC MAIN commitmail json YAML

update for GCC 6:
- nand_bbt_block_mark() has a left-shift of negative value issue.
  this change avoids it, but reviewers indicate this function has
  other problems.

(mrg)

2018-02-08 07:11:20 UTC MAIN commitmail json YAML

Style, and remove printfs.

(maxv)

2018-02-08 06:50:38 UTC MAIN commitmail json YAML

Fix three pretty bad mistakes in NAT-T:

* If we got a keepalive packet, we need to call m_freem, not m_free.
  Here the next mbufs in the chain are not freed. Seems easy to remotely
  DoS the system by sending fragmented keepalives in a loop.

* If !ipsec_used, free the mbuf.

* In udp_input, we need to update 'uh', because udp4_realinput may have
  modified the chain. Perhaps we also need to re-enforce alignment, so
  add an XXX.

(maxv)

2018-02-08 03:27:51 UTC MAIN commitmail json YAML

2018-02-08 03:18:38 UTC MAIN commitmail json YAML

Revert previous changes due to popular demand.  Instead, add a note at
the bottom of each document to provide the original ASCII characters'
names.

(pgoyette)

2018-02-08 02:51:57 UTC MAIN commitmail json YAML

While here, also update 014 - it's name is "ff" ("form feed"), and not
"np" ("new page").

(pgoyette)

2018-02-08 02:37:43 UTC MAIN commitmail json YAML

Since this is the ASCII charactger set, use the ASCII name for the
012 character - "lf" for "line feed", not "nl" for "new line".

Follow-on from PR misc/52989 (from Eitab Adler)

(pgoyette)

2018-02-08 02:30:08 UTC MAIN commitmail json YAML

Bump date for previous

(pgoyette)

2018-02-08 02:29:37 UTC MAIN commitmail json YAML

Since this is describing the ASCII character set, use the correct
ASCII abbreviation for character 012.  All references I can find
which seem to be even remotely authoritative and/or definitive use
"lf" (for "line feed") rather than "nl" (for "new line").

See https://www.ascii-code.com and https://en.wikipedia.org/wiki/ASCII

From Eitan Adler in PR misc/52989

(pgoyette)

2018-02-08 00:10:26 UTC MAIN commitmail json YAML

2018-02-07 22:51:31 UTC MAIN commitmail json YAML

Oops forgot one openssl version name change

(christos)

2018-02-07 22:49:32 UTC MAIN commitmail json YAML

stopgap fix: restrict XSAVEOPT to Intel CPUs

The current code causes floating point miscalculations on AMD Ryzen.
PR port-amd64/52966: amd64 FPU handling broken on AMD

(maya)

2018-02-07 20:42:17 UTC MAIN commitmail json YAML

PR# port-evbarm/49468: Cortex GIC assertion triggered on Allwinner A80 SoC

The priority level is changed by writing to GICC_PMR with interrupts
disabled. However, interrupts are enabled/disabled downstream of the GICC
at the CPU. When raising priority level, there is a window between the time
that interrupts are disabled and the GICC_PMR register is written. If an
interrupt occurs at a previously allowed priority before GICC_PMR is
changed, the CPU will receive the signal when interrupts are re-enabled.
At this time, GICC_PMR is now the new priority level, so reads of
GICC_IAR will report a spurious IRQ.

Move the "old_ipl != IPL_HIGH" test until after we have confirmed that
there is at least one pending IRQ.

(jmcneill)

2018-02-07 15:55:58 UTC MAIN commitmail json YAML

xhci.c: avoid unused variable in non-DIAGNOSTIC build

(prlw1)

2018-02-07 15:51:35 UTC MAIN commitmail json YAML

Fix md(4) double attachment in TFTPROOT option

The mdattach() call in tftproot_dhcpboot() has probably always been
useless, but it seems it became harmful, as it causes 7.1.1 to deadlock
during boot.

(manu)

2018-02-07 14:42:07 UTC MAIN commitmail json YAML

Fix uninitialized variable use:
if there is an error, or if we are using a SPI controller,
sdmmc_mem_send_op_cond() doens't assign a value to *ocrp,
but it is used unconditionally in sdmmc_mem_enable() to see if we can switch
to low voltage.

In sdmmc_mem_send_op_cond(), if the new ocr is not returned by the
card for whatever reason, set *ocrp to the orig value.

(bouyer)

2018-02-07 14:03:18 UTC MAIN commitmail json YAML

Keep /dev/ksyms open in _kvm_open(). This way /dev/ksyms can be put into
$g_kmem without breaking the tools that need kmem+ksyms.

Discussed on tech-kern@ three weeks ago. The original issue was reported
by maya@, the patch was written by Tom Ivar Helbekkmo, ok christos@.

(maxv)

2018-02-07 13:22:42 UTC MAIN commitmail json YAML

Style and constify.

(maxv)

2018-02-07 13:18:33 UTC MAIN commitmail json YAML

md2 has been deprecated in OpenSSL-1.1

(christos)

2018-02-07 13:16:50 UTC MAIN commitmail json YAML

needs the OpenSSL-1.1 api to build

(christos)

2018-02-07 13:16:25 UTC MAIN commitmail json YAML

2018-02-07 12:15:32 UTC MAIN commitmail json YAML

More style. No functional change.

(maxv)

2018-02-07 12:09:55 UTC MAIN commitmail json YAML

Remove parentheses in return statements. No functional change.

(maxv)

2018-02-07 12:04:50 UTC MAIN commitmail json YAML

Style and remove unused macros. More to come.

(maxv)

2018-02-07 11:42:58 UTC MAIN commitmail json YAML

Remove RSVP_ISI, that's mostly dead code. FreeBSD and OpenBSD too removed
it; FreeBSD kept some pieces but they are mostly no-opts.

Sent on tech-net@, no comment.

(maxv)

2018-02-07 11:16:06 UTC MAIN commitmail json YAML

2018-02-07 10:52:20 UTC MAIN commitmail json YAML

Style, and localify IPV6FORWARDING. No functional change.

(maxv)

2018-02-07 10:22:00 UTC MAIN commitmail json YAML

Change ip6_hdrnestlimit to be 15 instead of 50. I couldn't find any
reference in RFCs about what a correct limit should be, but FreeBSD already
uses 15.

If an IPv6 packet has 50 options, there is clearly something wrong with it.

(maxv)

2018-02-07 09:59:56 UTC MAIN commitmail json YAML

Bump date for previous

(martin)

2018-02-07 09:55:35 UTC MAIN commitmail json YAML

Fix typo, from Eitan Adler.

(martin)

2018-02-07 09:53:09 UTC MAIN commitmail json YAML

Rename back to ip6af_mff. It was actually clearer than ip6af_more.

(maxv)

2018-02-07 08:50:13 UTC MAIN commitmail json YAML

Remove unnecessary assertions

KASSERT(!rw_lock_held()) just before rw_destroy() is useless because
rw_destroy does more strict check and provides better information on
failure.

(ozaki-r)

2018-02-07 08:12:25 UTC MAIN commitmail json YAML

Remove null check on ip, it can't be null. (Confuses code scanners.)

(maxv)

2018-02-07 06:21:23 UTC MAIN commitmail json YAML

ip_add_membership() has an missing {} issue, but solve it by
dropping the "goto out" that would have happened immediately
next anyway, ie, should be NFC.

(mrg)

2018-02-07 06:19:43 UTC MAIN commitmail json YAML

ppprcvframe() has indentation issues.

(mrg)

2018-02-07 06:18:46 UTC MAIN commitmail json YAML

XXX: add a NULL init to avoid a GCC 6 maybe uninit warning.

(mrg)

2018-02-07 06:18:11 UTC MAIN commitmail json YAML

avoid an indentation issue by adding "if (1)".

(mrg)

2018-02-07 06:17:45 UTC MAIN commitmail json YAML

update for GCC 6:

ignore -Wframe-address warnings for the ppc hack.

(mrg)

2018-02-07 06:17:07 UTC MAIN commitmail json YAML

update for GCC 6:

do_process has vfork() vs clobber issues

(mrg)

2018-02-07 05:34:22 UTC MAIN commitmail json YAML

2018-02-07 04:25:09 UTC MAIN commitmail json YAML

Spinkle ASSERT_SLEEPABLE to xcall functions

(ozaki-r)

2018-02-07 04:13:48 UTC MAIN commitmail json YAML

2018-02-07 03:59:03 UTC MAIN commitmail json YAML

2018-02-07 03:26:37 UTC MAIN commitmail json YAML

2018-02-07 02:33:05 UTC MAIN commitmail json YAML

make this actually work:
- use ${G_OBJS} directly, it avoids issues with .c vs .cc files.
- add a method to not rm -rf .ab for inspection.
- fix and add missing depends for many things.
- use -Wno-error for mips and arm insn-recog.c, due to eg:
    insn-recog.c:10304:7: error: this decimal constant is unsigned only in ISO C90 [-Werror]
    mips.md:3474:11: error: this decimal constant is unsigned only in ISO C90 [-Werror]

(mrg)

2018-02-07 02:32:39 UTC MAIN commitmail json YAML

some more/changed files need -O1 for vax.

(mrg)

2018-02-07 02:32:01 UTC MAIN commitmail json YAML

port to hppa, m68k, m68000, vax, and sh3.  this should complete
our list of ports.  it's only about obtaining some pointers in
this code, really.

(mrg)

2018-02-07 02:30:39 UTC MAIN commitmail json YAML

2018-02-07 02:29:09 UTC MAIN commitmail json YAML

src/external/gpl3/gcc/lib/libstdc++-v3/arch/arm/gstdint.h@1.15 / diff / nxr@1.15
src/external/gpl3/gcc/lib/libstdc++-v3/arch/armeb/gstdint.h@1.16 / diff / nxr@1.16
src/external/gpl3/gcc/lib/libstdc++-v3/arch/earm/gstdint.h@1.17 / diff / nxr@1.17
src/external/gpl3/gcc/lib/libstdc++-v3/arch/earmeb/gstdint.h@1.15 / diff / nxr@1.15
src/external/gpl3/gcc/lib/libstdc++-v3/arch/earmhf/gstdint.h@1.15 / diff / nxr@1.15
src/external/gpl3/gcc/lib/libstdc++-v3/arch/earmhfeb/gstdint.h@1.15 / diff / nxr@1.15
src/external/gpl3/gcc/lib/libstdc++-v3/arch/earmv4eb/gstdint.h@1.15 / diff / nxr@1.15
src/external/gpl3/gcc/lib/libstdc++-v3/arch/earmv6/gstdint.h@1.15 / diff / nxr@1.15
src/external/gpl3/gcc/lib/libstdc++-v3/arch/earmv6eb/gstdint.h@1.14 / diff / nxr@1.14
src/external/gpl3/gcc/lib/libstdc++-v3/arch/earmv6hf/gstdint.h@1.14 / diff / nxr@1.14
src/external/gpl3/gcc/lib/libstdc++-v3/arch/earmv6hfeb/gstdint.h@1.14 / diff / nxr@1.14
src/external/gpl3/gcc/lib/libstdc++-v3/arch/earmv7/gstdint.h@1.14 / diff / nxr@1.14
src/external/gpl3/gcc/lib/libstdc++-v3/arch/earmv7eb/gstdint.h@1.14 / diff / nxr@1.14
src/external/gpl3/gcc/lib/libstdc++-v3/arch/earmv7hf/gstdint.h@1.14 / diff / nxr@1.14
src/external/gpl3/gcc/lib/libstdc++-v3/arch/earmv7hfeb/gstdint.h@1.14 / diff / nxr@1.14
src/external/gpl3/gcc/lib/libstdc++-v3/arch/hppa/gstdint.h@1.15 / diff / nxr@1.15
src/external/gpl3/gcc/lib/libstdc++-v3/arch/m68000/gstdint.h@1.10 / diff / nxr@1.10
src/external/gpl3/gcc/lib/libstdc++-v3/arch/m68k/c++config.h@1.24 / diff / nxr@1.24
src/external/gpl3/gcc/lib/libstdc++-v3/arch/mips64el/c++config.h@1.23 / diff / nxr@1.23
src/external/gpl3/gcc/lib/libstdc++-v3/arch/mipseb/c++config.h@1.25 / diff / nxr@1.25
      :
(more 24 files)
regen mknative-gcc 6 for:
  arm armeb earm earmeb earmhf earmhfeb earmv4eb earmv6 earmv6eb
  earmv6hf earmv6hfeb earmv7 earmv7eb earmv7hf earmv7hfeb

mipsel, ppc64 and ia64 didn't work properly this time, and vax
has a problem with libstdc++.

(mrg)

2018-02-06 23:12:35 UTC MAIN commitmail json YAML

2018-02-06 23:12:02 UTC MAIN commitmail json YAML

2018-02-06 22:04:22 UTC MAIN commitmail json YAML

Correct misleading indentation.

(maya)

2018-02-06 21:36:47 UTC MAIN commitmail json YAML

2018-02-06 21:27:49 UTC MAIN commitmail json YAML

Restore default paths to what they were before prior import.

(roy)

2018-02-06 20:33:35 UTC netbsd-8 commitmail json YAML

2018-02-06 20:31:13 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by pgoyette in ticket #524):
sys/modules/Makefile: revision 1.199
sys/modules/amdsmn/Makefile: revision 1.1
sys/modules/amdsmn/amdsmn.ioconf: revision 1.1
sys/modules/amdzentemp/Makefile: revision 1.1
Create amdsmn(4) amd amdzentemp(4) modules for X86

(snj)

2018-02-06 20:22:41 UTC MAIN commitmail json YAML

2018-02-06 20:22:23 UTC MAIN commitmail json YAML

fix duplicate declaration of pthread_atfork in unistd.h

(christos)

2018-02-06 20:21:21 UTC MAIN commitmail json YAML

detect duplicate declaration of pthread_atfork() in pthread.h

(christos)

2018-02-06 20:15:39 UTC MAIN commitmail json YAML

mark old compat functions.

(christos)

2018-02-06 20:10:36 UTC MAIN commitmail json YAML

2018-02-06 20:10:05 UTC MAIN commitmail json YAML

use OPENSSL_API_COMPAT

(christos)

2018-02-06 19:58:31 UTC MAIN commitmail json YAML

2018-02-06 19:57:59 UTC MAIN commitmail json YAML

src/external/gpl3/gcc/lib/libstdc++-v3/arch/m68k/c++config.h@1.23 / diff / nxr@1.23
src/external/gpl3/gcc/lib/libstdc++-v3/arch/m68k/gstdint.h@1.13 / diff / nxr@1.13
src/external/gpl3/gcc/lib/libstdc++-v3/arch/mips64el/c++config.h@1.22 / diff / nxr@1.22
src/external/gpl3/gcc/lib/libstdc++-v3/arch/mips64el/gstdint.h@1.14 / diff / nxr@1.14
src/external/gpl3/gcc/lib/libstdc++-v3/arch/mipsel/c++config.h@1.23 / diff / nxr@1.23
src/external/gpl3/gcc/lib/libstdc++-v3/arch/mipsel/gstdint.h@1.13 / diff / nxr@1.13
src/external/gpl3/gcc/lib/libstdc++-v3/arch/sh3el/c++config.h@1.25 / diff / nxr@1.25
src/external/gpl3/gcc/lib/libstdc++-v3/arch/sh3el/gstdint.h@1.14 / diff / nxr@1.14
src/external/gpl3/gcc/lib/libstdc++-v3/arch/sparc/gstdint.h@1.15 / diff / nxr@1.15
src/external/gpl3/gcc/lib/libstdc++-v3/arch/sparc64/gstdint.h@1.15 / diff / nxr@1.15
src/external/gpl3/gcc/lib/libstdc++-v3/arch/x86_64/gstdint.h@1.17 / diff / nxr@1.17
src/external/gpl3/gcc/usr.bin/gcc/arch/m68k/configargs.h@1.23 / diff / nxr@1.23
src/external/gpl3/gcc/usr.bin/gcc/arch/m68k/defs.mk@1.14 / diff / nxr@1.14
src/external/gpl3/gcc/usr.bin/gcc/arch/mips64eb/auto-host.h@1.13 / diff / nxr@1.13
src/external/gpl3/gcc/usr.bin/gcc/arch/mips64eb/configargs.h@1.25 / diff / nxr@1.25
src/external/gpl3/gcc/usr.bin/gcc/arch/mips64eb/defs.mk@1.13 / diff / nxr@1.13
src/external/gpl3/gcc/usr.bin/gcc/arch/mips64el/configargs.h@1.25 / diff / nxr@1.25
src/external/gpl3/gcc/usr.bin/gcc/arch/mips64el/defs.mk@1.13 / diff / nxr@1.13
src/external/gpl3/gcc/usr.bin/gcc/arch/mipseb/auto-host.h@1.13 / diff / nxr@1.13
src/external/gpl3/gcc/usr.bin/gcc/arch/mipseb/configargs.h@1.24 / diff / nxr@1.24
      :
(more 14 files)
more mknative-gcc 6.4 for m68k, mips*, powerpc, sh*, sparc* and amd64.

(mrg)

2018-02-06 19:51:25 UTC MAIN commitmail json YAML

2018-02-06 19:51:03 UTC MAIN commitmail json YAML

2018-02-06 19:32:49 UTC MAIN commitmail json YAML

2018-02-06 19:26:02 UTC MAIN commitmail json YAML

explicitly include <string.h> since OpenSSL-1.1 does not do it for us.

(christos)

2018-02-06 17:58:19 UTC MAIN commitmail json YAML

2018-02-06 17:08:19 UTC MAIN commitmail json YAML

Several changes, mostly cosmetic:

* Add a KASSERT in ip_output(), we expect (at least) the IP header to be
  here.

* In ip_fragment(), declare two variables instead of recomputing the
  values each time. Add an XXX for ipoff, it seems to me we should also
  remove IP_RF.

* Rename the arguments of ip_optcopy().

* Style: use NULL for pointers, remove ()s for return statements, and
  add whitespaces for clarity.

No real functional change.

(maxv)

2018-02-06 16:53:27 UTC MAIN commitmail json YAML

fix for OpenSSL-1.1

(christos)

2018-02-06 15:48:46 UTC MAIN commitmail json YAML

- need string.h
- cast options to long for OpenSSL-1.1

(christos)

2018-02-06 15:48:02 UTC MAIN commitmail json YAML

Add one more check in ip_reass_packet(): make sure that the end of each
fragment does not exceed IP_MAXPACKET.

In ip_reass(), we only check the final length of the reassembled packet
against IP_MAXPACKET.

But there is an integer overflow that can happen a little earlier. We
are doing:

i = ntohs(p->ipqe_ip->ip_off) + ntohs(p->ipqe_ip->ip_len) -
    ntohs(ip->ip_off);
[...]
ip->ip_off = htons(ntohs(ip->ip_off) + i);

It is possible that

ntohs(p->ipqe_ip->ip_off) + ntohs(p->ipqe_ip->ip_len) > 65535

so the computation of ip_off wraps to zero. This breaks an assumption in
the reassembler - it expects the list of fragments to be ordered by
offset, and here it's not ordered anymore. (Un)Fortunately I couldn't
turn this into anything exploitable.

With the new check, it is guaranteed that ip_off+ip_len<=65535.

(maxv)

2018-02-06 13:26:32 UTC MAIN commitmail json YAML

Remove misplaced semicolon, found by GCC 6.

(rin)

2018-02-06 12:58:17 UTC MAIN commitmail json YAML

Avoid gcc 6 specific options when compiling with gcc 5

(martin)

2018-02-06 12:45:39 UTC MAIN commitmail json YAML

Add register definitions file for sun6i_spi I forgot to add earlier.

(jakllsch)

2018-02-06 10:56:35 UTC MAIN commitmail json YAML

style: remove spurious {} added in 1.12

(maya)

2018-02-06 10:02:09 UTC MAIN commitmail json YAML

dbcool_read_volt() has a missing {} issue.

(mrg)

2018-02-06 10:00:00 UTC MAIN commitmail json YAML

2018-02-06 09:41:55 UTC MAIN commitmail json YAML

fix mips64 & GCC 6 builds.

(mrg)

2018-02-06 09:36:34 UTC MAIN commitmail json YAML

regen for GCC 6.4 (no real change)

(mrg)

2018-02-06 09:33:45 UTC MAIN commitmail json YAML

update for GCC 6:

hide octeon_pip_dump_regs_[] under OCTEON_ETH_DEBUG, the only user.

(mrg)

2018-02-06 09:33:07 UTC MAIN commitmail json YAML

update for GCC 6:

- read_rt() has a missing {} issue.

(mrg)

2018-02-06 09:31:57 UTC MAIN commitmail json YAML

2018-02-06 09:30:08 UTC netbsd-8 commitmail json YAML

2018-02-06 09:29:21 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #535):
share/man/man4/vnd.4: revision 1.19
Remove outdated BUGS entry - vnd does work on sparse files.
(thanks hannken in 2011-06-29)

(martin)

2018-02-06 09:28:48 UTC MAIN commitmail json YAML

- remove two more _DIAGASSERT() checks against not NULL for functions
  with arguments with nonnull attributes.  in two cases, leave
  code behind that should set defaults to "(null)".

(mrg)

2018-02-06 09:28:03 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #534):
external/mit/xorg/lib/fontconfig/etc/conf.d/Makefile: revision 1.5
distrib/sets/lists/xetc/mi: revision 1.29
Don't fc-match bitmap fonts by default.
Now things using Helvetica won't look terrible, and will use the fallback
font instead.
Idea by jakllsch, thanks!

(martin)

2018-02-06 09:22:58 UTC MAIN commitmail json YAML

workaround a problem -Warray-bounds triggers but isn't a problem
in practise, as described from this old commment:

/*
* Set up pm_regmap for kernel to point NUREG *below* the beginning
* of kernel regmap storage. Since the kernel only uses regions
* above NUREG, we save storage space and can index kernel and
* user regions in the same way.
*/

(mrg)

2018-02-06 09:21:07 UTC MAIN commitmail json YAML

db_esp() has a missing {} issue in debug code.

(mrg)

2018-02-06 09:20:50 UTC MAIN commitmail json YAML

pf_table.c has many left-shift of negative value issues.

(mrg)

2018-02-06 09:20:30 UTC MAIN commitmail json YAML

uvm_map_extract() has an indentation issue.

(mrg)

2018-02-06 09:18:35 UTC MAIN commitmail json YAML

src/external/gpl3/gcc/lib/libbacktrace/arch/arm/backtrace-supported.h@1.5 / diff / nxr@1.5
src/external/gpl3/gcc/lib/libbacktrace/arch/armeb/backtrace-supported.h@1.5 / diff / nxr@1.5
src/external/gpl3/gcc/lib/libbacktrace/arch/earmeb/backtrace-supported.h@1.5 / diff / nxr@1.5
src/external/gpl3/gcc/lib/libbacktrace/arch/earmhf/backtrace-supported.h@1.5 / diff / nxr@1.5
src/external/gpl3/gcc/lib/libbacktrace/arch/earmhfeb/backtrace-supported.h@1.5 / diff / nxr@1.5
src/external/gpl3/gcc/lib/libbacktrace/arch/earmv4eb/backtrace-supported.h@1.5 / diff / nxr@1.5
src/external/gpl3/gcc/lib/libbacktrace/arch/earmv6/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/earmv6eb/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/earmv6hf/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/earmv6hfeb/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/earmv7/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/earmv7eb/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/earmv7hf/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/earmv7hfeb/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/hppa/backtrace-supported.h@1.5 / diff / nxr@1.5
src/external/gpl3/gcc/lib/libbacktrace/arch/ia64/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/m68000/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/m68k/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/mips64el/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/mipseb/backtrace-supported.h@1.5 / diff / nxr@1.5
      :
(more 572 files)
rebuild mknative GCC 6.4 for these targets:
arm armeb earmeb earmhf earmhfeb earmv4eb
earmv6 earmv6eb earmv6hf earmv6hfeb
earmv7 earmv7eb earmv7hf earmv7hfeb
hppa ia64 m68000 m68k
mips64eb mips64el mipseb mipsel
powerpc64 sh3eb sh3el vax

(mrg)

2018-02-06 09:06:36 UTC netbsd-8 commitmail json YAML

Ammend #524 for additional pullups

(martin)

2018-02-06 09:05:27 UTC netbsd-8 commitmail json YAML

Additionally pull up rev 1.3 of sys/arch/x86/pci/amdsmn.c, requested by
pgoyette in ticket #524:

rescan amdsmnbus instead of amdsmn (fixes panic)

(martin)

2018-02-06 07:46:24 UTC MAIN commitmail json YAML

Check if adaptive mutex isn't called in interrupt context

By this check, we can notice this programming error without LOCKDEBUG.
The same check exists in rw_enter.

(ozaki-r)

2018-02-06 07:04:01 UTC MAIN commitmail json YAML

also fetch GCOV_DUMP_OBJS.

(mrg)

2018-02-06 06:36:40 UTC MAIN commitmail json YAML

Typos and style a bit, no functional change.

(maxv)

2018-02-06 06:32:26 UTC MAIN commitmail json YAML

2018-02-06 06:28:20 UTC MAIN commitmail json YAML

2018-02-06 04:39:18 UTC MAIN commitmail json YAML

Revert my wrong r1.380 and add a comment instead.

(isaki)

2018-02-06 04:21:24 UTC MAIN commitmail json YAML

2018-02-06 03:48:39 UTC MAIN commitmail json YAML

Check the length of a passed name to avoid slient truncation

(ozaki-r)

2018-02-06 03:37:00 UTC MAIN commitmail json YAML

Shorten the name of a workqueue instance to fit to the limit (15)

(ozaki-r)

2018-02-06 03:30:18 UTC MAIN commitmail json YAML

2018-02-06 03:29:57 UTC MAIN commitmail json YAML

provide 2 configs: one for openssl-1.0 and one for openssl-1.1 since they
chose to configure each function separately.

(christos)

2018-02-06 03:15:15 UTC MAIN commitmail json YAML

Fix breaking character limit. Pointed out by ozaki-r@n.o, thanks.

(knakahara)

2018-02-06 03:06:41 UTC MAIN commitmail json YAML

2018-02-06 03:05:48 UTC MAIN commitmail json YAML

2018-02-06 01:59:02 UTC MAIN commitmail json YAML

2018-02-06 01:57:24 UTC MAIN commitmail json YAML

2018-02-05 23:56:01 UTC MAIN commitmail json YAML