Clone Tools
  • last updated a few seconds ago
Constraints: committers
Constraints: files
Constraints: dates
document SIOCGIFMEDIA add

Bring in a patch for SIOCGIFDATA

For interfaces that do not support SIOCGIFMEDIA (for which there are quite a few) the only fallback is to query the interface for if_data->ifi_link_state.

While it's possible to get at if_data for an interface via getifaddrs(3) or sysctl, both are heavy weight mechanisms.

SIOCGIFDATA is a simple ioctl to retrieve this fast with very little resource use in comparison.

This implementation mirrors that of other similar ioctls in FreeBSD.

Other BSD's support SIOCGIFDATA and I would like FreeBSD to as well.

Obtained from Roy Marples, FreeBSD

Merge branch 'master' of

udf: Validate the full file entry length

Otherwise a corrupted file entry containing invalid extended attribute

lengths or allocation descriptor lengths can trigger an overflow when

the file entry is loaded.

add some more quirks

update usb device list

add firmware loader

    • -0
    • +1
    • -0
    • +3
    • -0
    • +10
    • -0
    • +47
    • -0
    • +148
    • -0
    • +79
    • -0
    • +392
    • -0
    • +88
    • -0
    • +96
    • -0
    • +12
    • -0
    • +456
update kldxref


mention bt

bump version

Merge branch 'master' of ssh://

add some bug fixes from freebsd 12 for intel 8265 bluetooth. still needs a port for firmware and it's still a bit buggy

    • -2
    • +126
    • -0
    • +161
    • -0
    • +35
A ftpd(8) bug in the implementation of the file system sandbox, combined with capabilities available to an authenticated FTP user, can be used to escape the file system restriction configured in ftpchroot(5). Moreover, the bug allows a malicious client to gain root privileges.

A number of AMD virtualization instructions operate on host physical addresses, are not subject to nested page table translation, and guest use of these instructions was not trapped.

- From kernel mode a malicious guest can write to arbitrary host memory (with

some constraints), affording the guest full control of the host.

AMD and Intel CPUs support hardware virtualization using specialized data structures that control various aspects of guest operation. These are the Virtual Machine Control Structure (VMCS) on Intel CPUs, and the Virtual Machine Control Block (VMCB) on AMD CPUs. Insufficient access controls allow root users, including those running in a jail, to change these data structures.

A programming error in the ure(4) device driver caused some Realtek USB Ethernet interfaces to incorrectly report packets with more than 2048 bytes in a single USB transfer as having a length of only 2048 bytes.

An adversary can exploit this to cause the driver to misinterpret part of the

payload of a large packet as a separate packet, and thereby inject packets

across security boundaries such as VLANs.

teach mport about current

mandoc seems to crash right now when running as makewhatis. Go to legacy product for now.

fix text

remove old files.

disable tests by default for now.

fix mtree bug

Merge branch 'master' of ssh://

fix a symbol regression

add depend files.

    • -0
    • +11
    • -0
    • +11
    • -0
    • +11
Merge branch 'master' of ssh://

update test dirs

fix a typo

fix typos

    • -0
    • +14
    • -0
    • +180
fix makefile