Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (3h)  netbsd-8 (5d)  netbsd-10 (5d)  netbsd-9 (11d)  thorpej-ifq (175d)  thorpej-altq-separation (178d) 

2024-05-10 06:42:48 UTC Now

2013-10-17 09:33:40 UTC MAIN commitmail json YAML

there is no assign command

(mbalmer)

2013-10-17 08:21:03 UTC MAIN commitmail json YAML

More markup, typo fixes, update date and NetBSD version for import.

(wiz)

2013-10-17 08:07:54 UTC MAIN commitmail json YAML

fold long line in a readable way; pass nil as query table if reading form data fails

(mbalmer)

2013-10-17 07:54:19 UTC MAIN commitmail json YAML

better approach to NUL terminate strings

(mbalmer)

2013-10-17 07:49:06 UTC MAIN commitmail json YAML

plug a memory leak

(mbalmer)

2013-10-17 07:31:31 UTC MAIN commitmail json YAML

zero allocated memory buffers

(mbalmer)

2013-10-17 06:40:02 UTC MAIN commitmail json YAML

Fix memset size argument, found by coverity.

(martin)

2013-10-17 02:58:56 UTC MAIN commitmail json YAML

2013-10-16 21:55:56 UTC MAIN commitmail json YAML

2013-10-16 19:59:29 UTC MAIN commitmail json YAML

Add TABSIZE, which is derived from terminfo init_tabs.
Use this when processing \t.
If TABSIZE is set in the environment, this takes precedence.

(roy)

2013-10-16 19:48:21 UTC MAIN commitmail json YAML

2013-10-16 19:47:19 UTC MAIN commitmail json YAML

2013-10-16 19:44:58 UTC MAIN commitmail json YAML

2013-10-16 19:40:45 UTC MAIN commitmail json YAML

header file needed for lua(4)

(mbalmer)

2013-10-16 19:32:30 UTC MAIN commitmail json YAML

2013-10-16 19:31:43 UTC MAIN commitmail json YAML

introduce __USE(variable) that uses a variable to squash unused variable
warnings.

(christos)

2013-10-16 18:55:31 UTC MAIN commitmail json YAML

fix incorrect variable use.
remove unused variable

(christos)

2013-10-16 18:23:39 UTC MAIN commitmail json YAML

remove unused variable

(christos)

2013-10-16 18:20:17 UTC MAIN commitmail json YAML

2013-10-16 18:18:54 UTC MAIN commitmail json YAML

use variables that are only used in debugging.

(christos)

2013-10-16 18:13:00 UTC MAIN commitmail json YAML

2013-10-16 18:07:56 UTC MAIN commitmail json YAML

2013-10-16 17:43:33 UTC MAIN commitmail json YAML

move all the unused stuff to ifdef notyet

(christos)

2013-10-16 17:40:55 UTC MAIN commitmail json YAML

2013-10-16 17:39:09 UTC MAIN commitmail json YAML

- use proper types (uint16_t instead of uint32_t)
- don't index past the end of arrays
- use __arraycount() consistently instead of manual cruft.
- remove useless cast

(christos)

2013-10-16 17:31:28 UTC MAIN commitmail json YAML

print a warning if we failed.

(christos)

2013-10-16 17:31:01 UTC MAIN commitmail json YAML

remove unused variable

(christos)

2013-10-16 17:30:42 UTC MAIN commitmail json YAML

remove unused variable

(christos)

2013-10-16 17:27:42 UTC MAIN commitmail json YAML

skip comment lines on password and group databases (Brooks Davis)

(christos)

2013-10-16 17:26:14 UTC MAIN commitmail json YAML

Default a bare "." with no type to F_DIR. For FreeBSD compatibility (Brooks
Davis)

(christos)

2013-10-16 17:24:20 UTC MAIN commitmail json YAML

Restore old behavior of not printing sizes for directories, since it varies
depending on filesystem implementation. (Brooks Davis)

(christos)

2013-10-16 15:28:27 UTC MAIN commitmail json YAML

2013-10-16 14:50:43 UTC MAIN commitmail json YAML

silence is golden

(christos)

2013-10-16 12:43:35 UTC MAIN commitmail json YAML

2013-10-16 10:04:26 UTC MAIN commitmail json YAML

Also depend on LIBLUA, and add -lm to allow static linking.

(he)

2013-10-16 07:34:20 UTC MAIN commitmail json YAML

Apply patch from PR/48310 - kue(4) cannot receive multicast packets.

(skrll)

2013-10-15 23:59:36 UTC MAIN commitmail json YAML

Hook complex operation support into libm when not using libgcc.

(joerg)

2013-10-15 22:15:17 UTC MAIN commitmail json YAML

Note that delwin(3) is a null-op if win is NULL.

(roy)

2013-10-15 19:27:49 UTC MAIN commitmail json YAML

Add devices:
  ISA soundblaster (#sb* at isapnp? tested on PC164LX)
  Broadcom 570x ethernet (supported cards in DS20L, etc.)
  ALI M7101 SMBus controller (found in DS20L)
  (commented out) LM81/LM87 enviromental monitoring (found in DS20L)

(jdc)

2013-10-15 19:22:42 UTC MAIN commitmail json YAML

Add sysmon (required for the envsys framework).

(jdc)

2013-10-15 19:20:19 UTC MAIN commitmail json YAML

Add lmenv.4 to the manual page makefile and to the set list.

(jdc)

2013-10-15 19:14:41 UTC MAIN commitmail json YAML

Add manual page for the LM81, LM87, and compatible iic hardware monitors
(lmenv).

(jdc)

2013-10-15 19:13:33 UTC MAIN commitmail json YAML

Add lmenv to the configuration framework.

(jdc)

2013-10-15 19:12:41 UTC MAIN commitmail json YAML

Add a driver for the LM81, LM87, and compatible iic hardware monitors
(lmenv).  Ported from OpenBSD's lm87.c, revision 1.20.

(jdc)

2013-10-15 15:18:41 UTC MAIN commitmail json YAML

More dotg(4) removal.

(skrll)

2013-10-15 15:13:18 UTC MAIN commitmail json YAML

2013-10-15 15:10:57 UTC MAIN commitmail json YAML

2013-10-15 14:51:58 UTC MAIN commitmail json YAML

s/with resolution/with a resolution/

Noticed by mbalmer@.

(rkujawa)

2013-10-15 13:45:09 UTC MAIN commitmail json YAML

Update man page to reflect latest changes (added sysctl knobs for temperature
limit and hysteresis).

(rkujawa)

2013-10-15 13:43:51 UTC MAIN commitmail json YAML

Add forgotten register definitions for previous commit.

(rkujawa)

2013-10-15 13:42:53 UTC MAIN commitmail json YAML

Add sysctl knobs to set temperature limit and hysteresis. Reaching the limit
causes alert line of the chip to be asserted. These limits could be tied to
critical limit set in envsys, but it's more versatile to keep it as separate
value.

(rkujawa)

2013-10-15 13:00:52 UTC MAIN commitmail json YAML

Instead of turning off the 8th bit on resume, turn it on, as it is on by
default. Problem reported by atatat@ when suspending vi and resuming loses
the ability to use the alt key.

(christos)

2013-10-15 11:53:16 UTC MAIN commitmail json YAML

2013-10-15 11:43:21 UTC MAIN commitmail json YAML

2013-10-15 11:22:58 UTC MAIN commitmail json YAML

Add information about user settable resolution via sysctl.

(rkujawa)

2013-10-15 10:27:55 UTC MAIN commitmail json YAML

Simplify sysctl handling.

(rkujawa)

2013-10-15 10:18:49 UTC MAIN commitmail json YAML

Clean up register read and write functions, add functions for 8-bit read and
write (needed to access config register). Add sysctl knob to set resolution
from user space.

(rkujawa)

2013-10-15 09:07:48 UTC MAIN commitmail json YAML

Switch to dwctwo(4) from dotg(4) for the RaspberryPi port.  This brings
DMA support and (initial) isoc transfer support.

Remove URTWN_DOTG_WORKAROUND as dwctwo doesn't appear to need it.

(skrll)

2013-10-15 07:38:37 UTC MAIN commitmail json YAML

Make this compile for more option combinations.

(skrll)

2013-10-15 07:37:54 UTC MAIN commitmail json YAML

Translate ENODEV to USBD_INVAL

(skrll)

2013-10-15 07:23:21 UTC MAIN commitmail json YAML

2013-10-15 07:18:18 UTC MAIN commitmail json YAML

Run ../bfd/configure under ${CONFIG_SHELL}, not under
the /bin/sh that happens to be mentioned in its "#!" line.

(apb)

2013-10-15 07:14:59 UTC MAIN commitmail json YAML

If the shell does not support the $LINENO variable, then use
"bfd_configure.lineno" instead of "configure.lineno" as the name of the
a version of the script that has had all uses of $LINENO converted to
literal line numbers.

Now building tools via "MKCROSSGDB=yes build.sh tools" works again, even
if the shell does not support $LINENO.

The previous problem was caused by an interaction
between the way .../gdb/dist/opcodes/configure executes
"${srcdir}/../bfd/configure --version", and the way both configure
scripts tried to create and then execute configure.lineno scripts.
Both configure.lineno scripts were created in the same OBJDIR,
with the configure.lineno from .../bfd/configure overwriting the
configure.lineno from .../opcodes/configure, while the latter was
still running.

(apb)

2013-10-14 22:23:22 UTC MAIN commitmail json YAML

No David, '\?' is not the del character.  Broken in rev 1.21.
XXX pullup-5, pullup-6.

(bad)

2013-10-14 21:19:17 UTC MAIN commitmail json YAML

Update LLVM/Clang snapshot to r192615, which defaults to libc++ and the
unwinder in libc on x86.

(joerg)

2013-10-14 18:15:12 UTC MAIN commitmail json YAML

Handle an error from uhidev_get_report in ucycom_get_cfg

(skrll)

2013-10-14 18:14:08 UTC MAIN commitmail json YAML

Fix size parameter to memset. Found by gcc 4.8.

(skrll)

2013-10-14 16:00:17 UTC MAIN commitmail json YAML

2013-10-14 12:20:05 UTC MAIN commitmail json YAML

Check whether we have an FPU regardless of FPU_EMULATE option.
It prevents a kernel panic when we don't have an FPU and FPU_EMULATE
option is not set.
Thanks tsutsui@ for advice.

(isaki)

2013-10-14 11:11:14 UTC MAIN commitmail json YAML

Invert logic to try to fix the !clang case.

(joerg)

2013-10-14 04:20:44 UTC MAIN commitmail json YAML

Add timer 2 and 3 for Discovery Innovation.

(kiyohara)

2013-10-14 04:18:00 UTC MAIN commitmail json YAML

Remove some #ifdef ARMADAXP.  We can enable simultaneously both ARMADAXP and
other SoC options.

(kiyohara)

2013-10-14 01:47:50 UTC MAIN commitmail json YAML

Don't pass -std=c++11 down to configure, it breaks C compiler detection.
Regen configuration.

(joerg)

2013-10-14 01:37:40 UTC MAIN commitmail json YAML

2013-10-14 01:30:21 UTC MAIN commitmail json YAML

2013-10-14 01:14:58 UTC MAIN commitmail json YAML

2013-10-13 22:34:13 UTC MAIN commitmail json YAML

More markup, whitespace.

(wiz)

2013-10-13 21:17:35 UTC MAIN commitmail json YAML

Add LFS options, both preexisting and UFS-derived. Leave the ones that
are not yet believed to work commented out. Ride previous date bump.

(dholland)

2013-10-13 21:09:35 UTC MAIN commitmail json YAML

Reorganize the file-system-related options; put options for each fs
type (or group of fs types) in its own subsection and put the
fs-independent options first.

Bump date.

(dholland)

2013-10-13 20:09:02 UTC MAIN commitmail json YAML

Let's not use uninitialized variables to write to random memory
locations, shall we?

(joerg)

2013-10-13 17:03:00 UTC MAIN commitmail json YAML

Add a late entry about addition of support for AlphaStation DS15.

(tsutsui)

2013-10-13 16:43:49 UTC MAIN commitmail json YAML

delete duplicate (and wrong) entry for Thanksgiving Day in Canada

(jnemeth)

2013-10-13 15:32:14 UTC MAIN commitmail json YAML

Fix another botch of my dumb patch in PR/45990; add missing braces.

The offset of MBR partition 0 was unintentionally set to 2048 even on
small (<=128GB) disks.  Probably we should rethink the threshold,
but anyway sysinst(8) should follow fdisk(8) default.
http://nxr.NetBSD.org/xref/src/sbin/fdisk/fdisk.c?r=1.145#1199
http://cvsweb.NetBSD.org/bsdweb.cgi/src/sbin/fdisk/fdisk.c#rev1.129

The problem is pointed out and analyzed by Simon Nicolussi in PR/48304.

Should be pulled up to all netbsd-6* branches.

(tsutsui)

2013-10-13 12:29:42 UTC MAIN commitmail json YAML

Fix pasto in previous; pass a correct device_t to config_pending_derc().

(tsutsui)

2013-10-13 09:48:14 UTC MAIN commitmail json YAML

2013-10-13 08:05:16 UTC MAIN commitmail json YAML

Mention httpd(8) Lua support

(mbalmer)

2013-10-13 07:46:26 UTC MAIN commitmail json YAML

Print the client_id (lwp address) as hex and avoid stack overflow. Use
snprintf while here.

Fixes PR/48287

(skrll)

2013-10-13 07:26:23 UTC netbsd-5-2 commitmail json YAML

2013-10-13 07:26:19 UTC netbsd-5-1 commitmail json YAML

2013-10-13 07:26:13 UTC netbsd-5 commitmail json YAML

2013-10-13 07:25:12 UTC netbsd-5-2 commitmail json YAML

Pull up revisions:
  xsrc/external/mit/xorg-server/dist/dix/dixfonts.c revision 1.2 via patch
  xsrc/xfree/xc/programs/Xserver/dix/dixfonts.c revision 1.4 via patch
(requested by spz in ticket #1884).

Fix CVE-2013-4396 using a patch from:

--- snip ---
>From a4d9bf1259ad28f54b6d59a480b2009cc89ca623 Mon Sep 17 00:00:00 2001
From: Alan Coopersmith <alan.coopersmith@oracle.com>
Date: Mon, 16 Sep 2013 21:47:16 -0700
Subject: [PATCH] Avoid use-after-free in dix/dixfonts.c: doImageText()

Save a pointer to the passed in closure structure before copying it
and overwriting the *c pointer to point to our copy instead of the
original.  If we hit an error, once we free(c), reset c to point to
the original structure before jumping to the cleanup code that
references *c.

Since one of the errors being checked for is whether the server was
able to malloc(c->nChars * itemSize), the client can potentially pass
a number of characters chosen to cause the malloc to fail and the
error path to be taken, resulting in the read from freed memory.

Since the memory is accessed almost immediately afterwards, and the
X server is mostly single threaded, the odds of the free memory having
invalid contents are low with most malloc implementations when not using
memory debugging features, but some allocators will definitely overwrite
the memory there, leading to a likely crash.

Reported-by: Pedro Ribeiro <pedrib@gmail.com>
Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>

(jdc)

2013-10-13 07:25:06 UTC netbsd-5-1 commitmail json YAML

Pull up revisions:
  xsrc/external/mit/xorg-server/dist/dix/dixfonts.c revision 1.2 via patch
  xsrc/xfree/xc/programs/Xserver/dix/dixfonts.c revision 1.4 via patch
(requested by spz in ticket #1884).

Fix CVE-2013-4396 using a patch from:

--- snip ---
>From a4d9bf1259ad28f54b6d59a480b2009cc89ca623 Mon Sep 17 00:00:00 2001
From: Alan Coopersmith <alan.coopersmith@oracle.com>
Date: Mon, 16 Sep 2013 21:47:16 -0700
Subject: [PATCH] Avoid use-after-free in dix/dixfonts.c: doImageText()

Save a pointer to the passed in closure structure before copying it
and overwriting the *c pointer to point to our copy instead of the
original.  If we hit an error, once we free(c), reset c to point to
the original structure before jumping to the cleanup code that
references *c.

Since one of the errors being checked for is whether the server was
able to malloc(c->nChars * itemSize), the client can potentially pass
a number of characters chosen to cause the malloc to fail and the
error path to be taken, resulting in the read from freed memory.

Since the memory is accessed almost immediately afterwards, and the
X server is mostly single threaded, the odds of the free memory having
invalid contents are low with most malloc implementations when not using
memory debugging features, but some allocators will definitely overwrite
the memory there, leading to a likely crash.

Reported-by: Pedro Ribeiro <pedrib@gmail.com>
Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>

(jdc)

2013-10-13 07:24:36 UTC netbsd-5 commitmail json YAML

Pull up revisions:
  xsrc/external/mit/xorg-server/dist/dix/dixfonts.c revision 1.2 via patch
  xsrc/xfree/xc/programs/Xserver/dix/dixfonts.c revision 1.4 via patch
(requested by spz in ticket #1884).

Fix CVE-2013-4396 using a patch from:

--- snip ---
>From a4d9bf1259ad28f54b6d59a480b2009cc89ca623 Mon Sep 17 00:00:00 2001
From: Alan Coopersmith <alan.coopersmith@oracle.com>
Date: Mon, 16 Sep 2013 21:47:16 -0700
Subject: [PATCH] Avoid use-after-free in dix/dixfonts.c: doImageText()

Save a pointer to the passed in closure structure before copying it
and overwriting the *c pointer to point to our copy instead of the
original.  If we hit an error, once we free(c), reset c to point to
the original structure before jumping to the cleanup code that
references *c.

Since one of the errors being checked for is whether the server was
able to malloc(c->nChars * itemSize), the client can potentially pass
a number of characters chosen to cause the malloc to fail and the
error path to be taken, resulting in the read from freed memory.

Since the memory is accessed almost immediately afterwards, and the
X server is mostly single threaded, the odds of the free memory having
invalid contents are low with most malloc implementations when not using
memory debugging features, but some allocators will definitely overwrite
the memory there, leading to a likely crash.

Reported-by: Pedro Ribeiro <pedrib@gmail.com>
Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>

(jdc)

2013-10-13 07:22:18 UTC netbsd-5-2 commitmail json YAML

2013-10-13 07:22:07 UTC netbsd-5-1 commitmail json YAML

2013-10-13 06:55:35 UTC MAIN commitmail json YAML

2013-10-13 04:24:21 UTC MAIN commitmail json YAML

make the driver able to send scsi commands; now the disks are found.
it was converted incorrectly to device_t.

(christos)

2013-10-12 22:37:43 UTC MAIN commitmail json YAML

Sort.  More markup.

(wiz)

2013-10-12 21:11:42 UTC MAIN commitmail json YAML

adjust for recent deferred changes.

(christos)

2013-10-12 19:00:10 UTC netbsd-6-1 commitmail json YAML

2013-10-12 19:00:01 UTC netbsd-6-0 commitmail json YAML

2013-10-12 18:59:58 UTC netbsd-6 commitmail json YAML

2013-10-12 18:59:02 UTC netbsd-6-1 commitmail json YAML

Pull up revisions:
  xsrc/external/mit/xorg-server/dist/dix/dixfonts.c revision 1.2
  xsrc/xfree/xc/programs/Xserver/dix/dixfonts.c revision 1.4
(requested by spz in ticket #966).

Fix CVE-2013-4396 using a patch from:

--- snip ---
>From a4d9bf1259ad28f54b6d59a480b2009cc89ca623 Mon Sep 17 00:00:00 2001
From: Alan Coopersmith <alan.coopersmith@oracle.com>
Date: Mon, 16 Sep 2013 21:47:16 -0700
Subject: [PATCH] Avoid use-after-free in dix/dixfonts.c: doImageText()

Save a pointer to the passed in closure structure before copying it
and overwriting the *c pointer to point to our copy instead of the
original.  If we hit an error, once we free(c), reset c to point to
the original structure before jumping to the cleanup code that
references *c.

Since one of the errors being checked for is whether the server was
able to malloc(c->nChars * itemSize), the client can potentially pass
a number of characters chosen to cause the malloc to fail and the
error path to be taken, resulting in the read from freed memory.

Since the memory is accessed almost immediately afterwards, and the
X server is mostly single threaded, the odds of the free memory having
invalid contents are low with most malloc implementations when not using
memory debugging features, but some allocators will definitely overwrite
the memory there, leading to a likely crash.

Reported-by: Pedro Ribeiro <pedrib@gmail.com>
Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>

(jdc)

2013-10-12 18:58:59 UTC netbsd-6-0 commitmail json YAML

Pull up revisions:
  xsrc/external/mit/xorg-server/dist/dix/dixfonts.c revision 1.2
  xsrc/xfree/xc/programs/Xserver/dix/dixfonts.c revision 1.4
(requested by spz in ticket #966).

Fix CVE-2013-4396 using a patch from:

--- snip ---
>From a4d9bf1259ad28f54b6d59a480b2009cc89ca623 Mon Sep 17 00:00:00 2001
From: Alan Coopersmith <alan.coopersmith@oracle.com>
Date: Mon, 16 Sep 2013 21:47:16 -0700
Subject: [PATCH] Avoid use-after-free in dix/dixfonts.c: doImageText()

Save a pointer to the passed in closure structure before copying it
and overwriting the *c pointer to point to our copy instead of the
original.  If we hit an error, once we free(c), reset c to point to
the original structure before jumping to the cleanup code that
references *c.

Since one of the errors being checked for is whether the server was
able to malloc(c->nChars * itemSize), the client can potentially pass
a number of characters chosen to cause the malloc to fail and the
error path to be taken, resulting in the read from freed memory.

Since the memory is accessed almost immediately afterwards, and the
X server is mostly single threaded, the odds of the free memory having
invalid contents are low with most malloc implementations when not using
memory debugging features, but some allocators will definitely overwrite
the memory there, leading to a likely crash.

Reported-by: Pedro Ribeiro <pedrib@gmail.com>
Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>

(jdc)

2013-10-12 18:58:53 UTC netbsd-6 commitmail json YAML

Pull up revisions:
  xsrc/external/mit/xorg-server/dist/dix/dixfonts.c revision 1.2
  xsrc/xfree/xc/programs/Xserver/dix/dixfonts.c revision 1.4
(requested by spz in ticket #966).

Fix CVE-2013-4396 using a patch from:

--- snip ---
>From a4d9bf1259ad28f54b6d59a480b2009cc89ca623 Mon Sep 17 00:00:00 2001
From: Alan Coopersmith <alan.coopersmith@oracle.com>
Date: Mon, 16 Sep 2013 21:47:16 -0700
Subject: [PATCH] Avoid use-after-free in dix/dixfonts.c: doImageText()

Save a pointer to the passed in closure structure before copying it
and overwriting the *c pointer to point to our copy instead of the
original.  If we hit an error, once we free(c), reset c to point to
the original structure before jumping to the cleanup code that
references *c.

Since one of the errors being checked for is whether the server was
able to malloc(c->nChars * itemSize), the client can potentially pass
a number of characters chosen to cause the malloc to fail and the
error path to be taken, resulting in the read from freed memory.

Since the memory is accessed almost immediately afterwards, and the
X server is mostly single threaded, the odds of the free memory having
invalid contents are low with most malloc implementations when not using
memory debugging features, but some allocators will definitely overwrite
the memory there, leading to a likely crash.

Reported-by: Pedro Ribeiro <pedrib@gmail.com>
Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>

(jdc)

2013-10-12 18:55:40 UTC MAIN commitmail json YAML

zeroize the rest of the comparable struct before adding it to the rb tree

(kefren)

2013-10-12 18:53:47 UTC netbsd-6-1 commitmail json YAML

2013-10-12 18:53:18 UTC netbsd-6-0 commitmail json YAML

2013-10-12 18:46:12 UTC MAIN commitmail json YAML

2013-10-12 17:26:32 UTC MAIN commitmail json YAML

2013-10-12 17:25:18 UTC MAIN commitmail json YAML

2013-10-12 17:24:07 UTC MAIN commitmail json YAML

2013-10-12 16:52:21 UTC MAIN commitmail json YAML

- add 64 bit fifo support
- handle fibrilation better

(christos)

2013-10-12 16:49:01 UTC MAIN commitmail json YAML

2013-10-12 16:42:27 UTC MAIN commitmail json YAML

provide a better printf for the panic message

(christos)

2013-10-12 15:30:37 UTC MAIN commitmail json YAML

2013-10-12 15:29:16 UTC MAIN commitmail json YAML

new test to check if non-blocking sockets are reset to blocking on the
accepted file descriptor.

(christos)

2013-10-12 07:51:54 UTC MAIN commitmail json YAML

llib-lctf.ln is dtrace specific.

(njoly)

2013-10-12 07:49:40 UTC MAIN commitmail json YAML

2013-10-11 16:30:31 UTC MAIN commitmail json YAML

Rework previous (1.24) change.  Rather than depending on the
file's flags to decide if decompress cleanup is needed, just
check to see if the open() allocated the 'struct sd *' used for
decompression.

This fixes recent problem where presence of a "load=ffs" command
in my /boot.cfg resulted in a "heap full" error at boot time.

OK martin@

(pgoyette)

2013-10-11 03:37:08 UTC MAIN commitmail json YAML

FATANH(-0) is -0, not +0.
This bug was introduced by the mistake of my test program.
Last week, I talked about the probelm (my FATANH(-0) returns +0 ?)
by NetBSD seminar at Open Source Conference 2013 Hiroshima,
and tsutsui@ confirmed that returns -0.

(isaki)

2013-10-11 01:20:53 UTC MAIN commitmail json YAML

2013-10-10 16:01:55 UTC MAIN commitmail json YAML

make this work on linux

(christos)

2013-10-10 15:22:12 UTC MAIN commitmail json YAML

2013-10-10 12:28:10 UTC MAIN commitmail json YAML

2013-10-09 22:33:41 UTC MAIN commitmail json YAML

Use MACHINE_CPU for m68k.  Use similar logic for both tests.

(matt)

2013-10-09 20:15:39 UTC MAIN commitmail json YAML

delete extra m_len initialization.

(christos)

2013-10-09 20:15:20 UTC MAIN commitmail json YAML

- initialize m_len m_pkthgr.len to 0 in constructors, as discussed in tech-net.
- s/MGET/m_get
- s/0/NULL

(christos)

2013-10-09 18:55:56 UTC MAIN commitmail json YAML

PR/48292: Justin Cormack: paccept creates sockets that cannot be made blocking
Reset the socket flags not just the file flags for non-blocking I/O.
XXX: pullup 6

(christos)

2013-10-09 17:21:39 UTC MAIN commitmail json YAML

support WSDISPLAYIO_GET_FBINFO

(macallan)

2013-10-09 17:20:54 UTC MAIN commitmail json YAML

2013-10-09 17:18:23 UTC MAIN commitmail json YAML

2013-10-09 12:03:29 UTC MAIN commitmail json YAML

some cleanup:
- use macros to shorten a while lot of bus_space_write_4() lines
- update some comments
- remove debug goop and cargo culted leftovers

(macallan)

2013-10-09 09:38:21 UTC MAIN commitmail json YAML

Follow OpenGroup online specification[1], move
fchmodat/mkdirat/mkfifoat/mknodat prototypes to <sys.stat.h>.

[1] http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/sys_stat.h.html

(njoly)

2013-10-09 01:28:33 UTC MAIN commitmail json YAML

add hardware acceleration
For now this supports only GeForce2 MX cards but most NV1x chips should work
once their PCI iDs are added to gffb_match()
Tested only on macppc.

(macallan)

2013-10-08 21:25:51 UTC MAIN commitmail json YAML

Fix CVE-2013-4396 using a patch from:

--- snip ---
From a4d9bf1259ad28f54b6d59a480b2009cc89ca623 Mon Sep 17 00:00:00 2001
From: Alan Coopersmith <alan.coopersmith@oracle.com>
Date: Mon, 16 Sep 2013 21:47:16 -0700
Subject: [PATCH] Avoid use-after-free in dix/dixfonts.c: doImageText()

Save a pointer to the passed in closure structure before copying it
and overwriting the *c pointer to point to our copy instead of the
original.  If we hit an error, once we free(c), reset c to point to
the original structure before jumping to the cleanup code that
references *c.

Since one of the errors being checked for is whether the server was
able to malloc(c->nChars * itemSize), the client can potentially pass
a number of characters chosen to cause the malloc to fail and the
error path to be taken, resulting in the read from freed memory.

Since the memory is accessed almost immediately afterwards, and the
X server is mostly single threaded, the odds of the free memory having
invalid contents are low with most malloc implementations when not using
memory debugging features, but some allocators will definitely overwrite
the memory there, leading to a likely crash.

Reported-by: Pedro Ribeiro <pedrib@gmail.com>
Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
--- snip ---

the patch is shifted but otherwise applies. mrg@ to test (thanks)

(spz)

2013-10-08 19:59:49 UTC MAIN commitmail json YAML

2013-10-08 19:58:25 UTC MAIN commitmail json YAML

0 -> NULL
MGET -> m_get
No functional change.

(christos)

2013-10-08 18:05:31 UTC MAIN commitmail json YAML

Improve tests so that they check the sockaddr's returned by accept(2) and
getsockname(2). Test for accept success after closed client socket.

(christos)

2013-10-08 17:21:24 UTC MAIN commitmail json YAML

Centralize the sockaddr_un allocation code. Set sun_len appropriately so
that the address length returned is correct, not always 106. Note that
we do things slightly differently than linux and explain why. Unit-tests
to come.

(christos)

2013-10-08 15:09:51 UTC MAIN commitmail json YAML

- Instead of having accept(2) return a zero-filled sockaddr for the case
  where accept(2) was called on a unix socket that called connect(2) and
  then close(2), before the connection was accepted, return the empty
  sockaddr_un.
- Fix the length of the empty sockaddr_un socket so that it reflects reality.

(christos)

2013-10-08 14:54:29 UTC MAIN commitmail json YAML

POSIX says getsockopt(s, SOL_SOCKET, SO_ACCEPTCONN,,) needs to work.

(seanb)

2013-10-08 11:47:57 UTC MAIN commitmail json YAML

Note that sysalign checks for dev_t/time_t alignment too.

(njoly)

2013-10-08 00:29:24 UTC MAIN commitmail json YAML

PR/47591: Michael Plass: If the unix socket is closed before accept,
unp->unp_conn will be NULL in PRU_ACCEPT, as called from
sys_accept->so_accept. This will cause the usrreq to return with
no error, leaving the mbuf gotten from m_get() with an uninitialized
length, containing junk from a previous call. Initialize m_len to
be 0 to handle this case. This is yet another reason why Beverly's
idea of setting m_len = 0 in m_get() makes a lot of sense. Arguably
this could be an error, since the data we return now has 0 family
and length.

(christos)

2013-10-07 19:53:05 UTC MAIN commitmail json YAML

Drop trailing whitespace.

(jakllsch)

2013-10-07 19:51:55 UTC MAIN commitmail json YAML

2013-10-07 19:37:24 UTC MAIN commitmail json YAML

Remove unused structure.

(jakllsch)

2013-10-07 17:36:40 UTC MAIN commitmail json YAML

2013-10-07 15:17:24 UTC MAIN commitmail json YAML

fix the rest of the lint warnings [pass 1]

(christos)

2013-10-07 10:50:37 UTC MAIN commitmail json YAML

Belatedly note root on RAIDframe support for sandpoint.

(jdc)

2013-10-07 07:11:40 UTC MAIN commitmail json YAML

Use uint32_t, not u_int32_t; makes this file standalone like it ought
to be. PR 45693.

(dholland)

2013-10-07 05:19:23 UTC MAIN commitmail json YAML

Remove stray KERNEL_UNLOCK_ONE() in error path of lfs_markv().
From Wolfgang Stukenbrock in PR 44370.

This error path is only reachable if lfs_markv is handed an out of
range inode number, so it's unlikely that it gets tickled very often.

It isn't clear to me that we need the kernel lock in here at all, as
the path to lfs_markv that's actually used at this point (via fcntl)
doesn't take it. But, one thing at a time.

(dholland)

2013-10-07 05:06:45 UTC MAIN commitmail json YAML

english usage patrol

(dholland)

2013-10-07 04:04:58 UTC MAIN commitmail json YAML

Update SYNOPSIS; PR 48080. Bump date.

(dholland)

2013-10-07 02:00:46 UTC MAIN commitmail json YAML

Save errno around fwrite(), which can otherwise trash it; PR 47813.
This appears to fully resolve the problem described in the PR, even
though one might think it wouldn't.

(dholland)

2013-10-07 00:16:19 UTC MAIN commitmail json YAML

Merge some of the cleanup from PR 21894. Do a bit more of my own.
lint still squawks quite a bit, and it woudl probably be worthwhile
for someone to go through and make all the signedness consistent, but
I think I've got the valuable bits.

(dholland)

2013-10-06 21:05:50 UTC MAIN commitmail json YAML

Fix PR bin/48202 [non-critical/low]:
  sh +nounset and `for X; do` iteration fails if parameter set empty
by applying and testing FreeBSD's patch of Oct 24 2009 for this; see
  http://svnweb.freebsd.org/base/head/bin/sh/expand.c?r1=198453&r2=198454
Also created an ATF test in tests/bin/sh/t_expand.sh for this error and
corrected a space->tabs problem there as well.

(ast)

2013-10-06 17:25:34 UTC MAIN commitmail json YAML

Enable VerifyHostKeyDNS (SSHFP records verification) from DNS for hosts
under NetBSD.org domain.

Multiple TNF hosts have an up-to-date SSHFP record inside the DNS.
This offers a second channel verification for host key fingerprints
(weaker than known_hosts, but spoofing a host on first connect would
also require DNS forgery).

This can provide a trusted second channel (like DANE TLSA records) once
DNSSEC gets more widely used, but for now it is purely informational.

No regression expected, except that the ssh client will print a message
upon first connect to confirm/infirm that it got a correct SSHFP record
from DNS.

Only done for NetBSD.org domain, SSHFP are sadly more an exception than
the rule.

Notified on netbsd-users@, no objection after a week -- committed.

(jym)

2013-10-06 17:14:49 UTC MAIN commitmail json YAML

add more compression suffixes and local suffixes.

(christos)

2013-10-06 16:43:41 UTC MAIN commitmail json YAML

Recognize .gz and .bz2 suffixes so $ man ./man.1.gz works. From Franco Fichter
via dfly.

(christos)

2013-10-06 16:34:49 UTC MAIN commitmail json YAML

Correct acpi_md_OsWritable() logic so that it can return TRUE.
From Masanori Kanaoka in PR 47571.

(jakllsch)

2013-10-06 16:29:26 UTC MAIN commitmail json YAML

Be more permissive in interpreting man pages as filenames, from Franco
Fichter via dfly. fixes:
$ man usr.bin/man/man.1

(christos)

2013-10-06 12:27:15 UTC MAIN commitmail json YAML

Suggest using -b 1023/255/63 for modern disks where the BIOS is
configured to use LBA-Assisted translation.

(apb)

2013-10-06 08:27:00 UTC MAIN commitmail json YAML

bump date for previous.

(wiz)

2013-10-06 05:45:19 UTC MAIN commitmail json YAML

I'm a document, Jim, not a shell script.

Fix this to not use .sy to generate portions of the document.
Instead, generate the necessary bits with sed beforehand.

Apparently -ms is too feeble to be able to generate tables of contents
with automatically generated page numbers, so add the expected page
numbers into the document and make it possible to turn on a
rudimentary mechanism for crosschecking them. (This mechanism still
requires .sy though. Improvements welcome.)

This makes it unnecessary to build the document twice, or to use
groff in unsafe mode.

(dholland)

2013-10-06 01:21:24 UTC MAIN commitmail json YAML

remove unrelated diff.

(christos)

2013-10-06 00:48:03 UTC MAIN commitmail json YAML

update gcc info

(christos)

2013-10-06 00:46:07 UTC MAIN commitmail json YAML

2013-10-05 23:34:33 UTC MAIN commitmail json YAML

mention increased tcp window size, from logan

(christos)

2013-10-05 23:22:34 UTC MAIN commitmail json YAML

fix the source too, not just the doc.

(christos)

2013-10-05 23:16:54 UTC MAIN commitmail json YAML

2013-10-05 22:38:52 UTC MAIN commitmail json YAML

bpf_filter: re-use some code.  No functional change intended.

(rmind)

2013-10-05 22:01:12 UTC MAIN commitmail json YAML

2013-10-05 22:00:28 UTC MAIN commitmail json YAML

add Keyspan USA-19H serial adapter

(jnemeth)

2013-10-05 21:24:36 UTC MAIN commitmail json YAML

Fixed spelling of 'appeared'.

(ast)

2013-10-05 18:38:03 UTC MAIN commitmail json YAML

2013-10-05 18:37:16 UTC MAIN commitmail json YAML

mother's little helper.

(christos)

2013-10-05 16:52:55 UTC MAIN commitmail json YAML

2013-10-05 16:50:31 UTC MAIN commitmail json YAML

2013-10-05 11:20:35 UTC MAIN commitmail json YAML

Force PCI mode 1 when running under QEMU, to work around QEMU bug 897771.
This should also make it possible to boot NetBSD under versions of KVM
that have inherited said QEMU bug.  Fixes PR kern/45671.

(gson)

2013-10-05 09:22:43 UTC MAIN commitmail json YAML

2013-10-05 09:22:01 UTC MAIN commitmail json YAML

2013-10-05 09:18:56 UTC MAIN commitmail json YAML

Add missing El macro.

(njoly)

2013-10-05 08:20:23 UTC MAIN commitmail json YAML

2013-10-05 08:06:35 UTC MAIN commitmail json YAML

No code change: corrected spelling in comment, removed trailing white spaces.

(ast)

2013-10-05 07:05:01 UTC MAIN commitmail json YAML

Trailing whitespace.

(skrll)

2013-10-05 07:00:42 UTC MAIN commitmail json YAML

2013-10-05 06:51:43 UTC MAIN commitmail json YAML

2013-10-05 06:15:51 UTC MAIN commitmail json YAML

2013-10-05 06:14:48 UTC MAIN commitmail json YAML

Add comment-outed mvgbec1 and mvgbe for A7.

(kiyohara)

2013-10-05 06:10:35 UTC MAIN commitmail json YAML

2013-10-05 03:59:49 UTC MAIN commitmail json YAML

Change some comments and coment-outed options.

(kiyohara)

2013-10-05 02:47:44 UTC MAIN commitmail json YAML

Add options COM_16750.  It is requiring now.

(kiyohara)

2013-10-05 02:43:16 UTC MAIN commitmail json YAML

Add defparam MVSOC_FIXUP_DEVID to opt_mvsoc.h.

(kiyohara)

2013-10-05 02:39:06 UTC MAIN commitmail json YAML

2013-10-04 23:42:00 UTC MAIN commitmail json YAML

src/external/gpl3/gdb/lib/libbfd/arch/alpha/bfd-in3.h@1.2 / diff / nxr@1.2
src/external/gpl3/gdb/lib/libbfd/arch/alpha/bfd.h@1.2 / diff / nxr@1.2
src/external/gpl3/gdb/lib/libbfd/arch/alpha/bfd_stdint.h@1.3 / diff / nxr@1.3
src/external/gpl3/gdb/lib/libbfd/arch/alpha/bfdver.h@1.2 / diff / nxr@1.2
src/external/gpl3/gdb/lib/libbfd/arch/alpha/config.h@1.2 / diff / nxr@1.2
src/external/gpl3/gdb/lib/libbfd/arch/alpha/targmatch.h@1.3 / diff / nxr@1.3
src/external/gpl3/gdb/lib/libdecnumber/arch/alpha/config.h@1.2 / diff / nxr@1.2
src/external/gpl3/gdb/lib/libdecnumber/arch/alpha/gstdint.h@1.3 / diff / nxr@1.3
src/external/gpl3/gdb/lib/libgdb/arch/alpha/build-gnulib/config.h@1.1 / diff / nxr@1.1
src/external/gpl3/gdb/lib/libgdb/arch/alpha/config.h@1.3 / diff / nxr@1.3
src/external/gpl3/gdb/lib/libgdb/arch/alpha/defs.mk@1.4 / diff / nxr@1.4
src/external/gpl3/gdb/lib/libgdb/arch/alpha/init.c@1.4 / diff / nxr@1.4
src/external/gpl3/gdb/lib/libgdb/arch/alpha/jit-reader.h@1.1 / diff / nxr@1.1
src/external/gpl3/gdb/lib/libgdb/arch/alpha/observer.h@1.2 / diff / nxr@1.2
src/external/gpl3/gdb/lib/libgdb/arch/alpha/observer.inc@1.2 / diff / nxr@1.2
src/external/gpl3/gdb/lib/libgdb/arch/alpha/version.c@1.2 / diff / nxr@1.2
src/external/gpl3/gdb/lib/libgdb/arch/alpha/xml-builtin.c@1.2 / diff / nxr@1.2
src/external/gpl3/gdb/lib/libiberty/arch/alpha/config.h@1.2 / diff / nxr@1.2
src/external/gpl3/gdb/lib/libiberty/arch/alpha/defs.mk@1.2 / diff / nxr@1.2
src/external/gpl3/gdb/lib/libopcodes/arch/alpha/config.h@1.2 / diff / nxr@1.2
      :
(more 2 files)
fix alpha

(christos)

2013-10-04 23:40:17 UTC MAIN commitmail json YAML

2013-10-04 22:31:12 UTC MAIN commitmail json YAML

2013-10-04 21:10:18 UTC MAIN commitmail json YAML

Move an assert to the point where the referenced variable is initialized.

(joerg)

2013-10-04 21:07:37 UTC MAIN commitmail json YAML