sys

Clone Tools
  • last updated a few seconds ago
Constraints
Constraints: committers
 
Constraints: files
Constraints: dates
Fix CLEAR_HASH macro to be usable as a single statement.

Fix a security issue in inflate.c

bump os version

Bring in the following bugfixes for ipfilter from FreeBSD

commit 4f2d5aa364c4e45727760f767be62ec4d81fdef7 (HEAD -> stable/11, origin/stable/11)

Author: Cy Schubert <cy@FreeBSD.org>

Date: Fri Sep 24 17:00:20 2021 -0700

ipfilter: Print the correct TCP sequence index number

TCP sequence numbers in the FTP proxy are maintained in a two dimensional

array. The debug message prints the same seq[N] for both. Fix that.

(cherry picked from commit df38343e71304169ebca0e4c4fa24b339982d7be)

commit 0b72f4c82af8fe86cfc1034a16661430430f6f42

Author: Cy Schubert <cy@FreeBSD.org>

Date: Fri Sep 24 23:41:22 2021 -0700

ipfilter: Correct a comment

Correct a comment's grammar and while at it clarify its meaining.

(cherry picked from commit aa6cfcc820b438cec58fbe0af408d4457f8daf9d)

commit 370a229ea9c647806f85e18e3a514612d9ae773f

Author: Cy Schubert <cy@FreeBSD.org>

Date: Tue Sep 21 21:58:08 2021 -0700

ipfilter: Avoid a null if-then-else blocks

When WITHOUT_INET6 is selected we generate a null if-then-else blocks

due to incorrect placment of #if statments. Move the #if statements

reducing unnecessary runtime comparisons WITHOUT_INET6.

(cherry picked from commit 73db3b64f167972db3ee3f780cecb439b09492b1)

    • -53
    • +49
    ./contrib/ipfilter/netinet/ip_ftp_pxy.c
    • -15
    • +14
    ./contrib/ipfilter/netinet/ip_proxy.c
update version to 2.1.1

Introduce a patch from pfsense to increase the dummynet limit.

Obtained from: pfsense, https://github.com/pfsense/FreeBSD-src/commit/2085b4c32205d4b41c4cdc810db1b9531881c824.diff

  1. … 1 more file in changeset.
bump to 2.2 in current

bump to 2.2

bump version of midnightbsd

add sume(4)

    • -0
    • +242
    ./dev/sume/adapter.h
    • -0
    • +1602
    ./dev/sume/if_sume.c
    • -0
    • +7
    ./modules/sume/Makefile
  1. … 2 more files in changeset.
add sume(4)

    • -0
    • +242
    ./dev/sume/adapter.h
    • -0
    • +1602
    ./dev/sume/if_sume.c
    • -0
    • +7
    ./modules/sume/Makefile
  1. … 2 more files in changeset.
disable extra debug options

sync with freebsd 11 stable

ws

    • -2
    • +2
    ./dev/vxge/vxgehal/vxgehal-virtualpath.c
update vmapbuf calls

ws

Clear the IN_SIZEMOD and IN_IBLKDATA flags only when doing a synchronous inode update.

The IN_SIZEMOD and IN_IBLKDATA flags indicate changes to the

file size and block pointer fields in the inode. When these

fields have been changed, the fsync() and fsyncdata() system

calls must write the inode to ensure their semantics that the

file is on stable store.

The IN_SIZEMOD and IN_IBLKDATA flags cannot be cleared until

a synchronous write of the inode is done. If they are cleared

on an asynchronous write, then the inode may not yet have been

written to the disk when an fsync() or fsyncdata() call is done.

Absent these flags, these calls would not know that they needed

to write the inode. Thus, these flags only can be cleared on

synchronous writes of the inode. Since the inode will be locked

for the duration of the I/O that writes it to disk, no fsync()

or fsyncdata() will be able to run before the on-disk inode

is complete.

Obtained from: FreeBSD, mckusick

https://reviews.freebsd.org/rS361875

  1. … 21 more files in changeset.
fix ws

sync up

sync e1000 driver with freebsd 11-stable

  1. … 28 more files in changeset.
fix a whitespace issue

sync up chipset code

  1. … 7 more files in changeset.
fix white space

add riscv types

2.0.9

A programming error in the Linux compatibility layer futex(2) system call might allow attackers to cause a denial of service.

  1. … 1 more file in changeset.
A programming error in the Linux compatibility layer futex(2) system call might allow attackers to cause a denial of service.

  1. … 1 more file in changeset.
update MidnightBSD version to 2.0.8

bump version.

  1. … 1 more file in changeset.
Due to a race condition between lookup of ".." and remounting a filesystem, a process running inside a jail might access filesystem hierarchy outside of jail.

Obtained from: FreeBSD

Due to a race condition between lookup of ".." and remounting a filesystem, a process running inside a jail might access filesystem hierarchy outside of jail.

Obtained from: FreeBSD