Skip to content
Commits on Jan 31, 2016
  1. PR/50729: Izumi Tsutsui: Add "small" disklabel

    christos committed
  2. flip amd64 and evbarm to the new binutils

    christos committed
  3. handle both binutils 2.23 and 2.26

    christos committed
  4. add nouveau lint file

    christos committed
  5. bump major for new binutils.

    christos committed
  6. include bsd.init.mk to get Makefile.inc

    christos committed
  7. define it when we have vaddr_t exposed.

    christos committed
  8. we don't keed page count in userland.

    christos committed
  9. only need pgcnt_t in kernel.

    christos committed
  10. PR/50730: Benny Siegert: Go kqueue test panics kernel.

    christos committed
    - use a marker knote from the stack instead of allocating and freeing on
      each scan.
    - add more KASSERTS
    - introduce a KN_BUSY bit that indicates that the knote is currently being
      scanned, so that knote_detach does not end up deleting it when the file
      descriptor gets closed and we don't end up using/trashing free memory from
      the scan.
  11. Disable PIE and CTF for standalone code

    christos committed
    XXX: Must be done centrally, and there must be a better way.
Commits on Jan 30, 2016
  1. Add ip6addrctl

    christos committed
  2. new openssl

    christos committed
  3. merge conflicts

    christos committed
  4. OpenSSL CHANGES

    christos committed
     _______________
    
     Changes between 1.0.1q and 1.0.1r [28 Jan 2016]
    
      *) Protection for DH small subgroup attacks
    
         As a precautionary measure the SSL_OP_SINGLE_DH_USE option has been
         switched on by default and cannot be disabled. This could have some
         performance impact.
         [Matt Caswell]
    
      *) SSLv2 doesn't block disabled ciphers
    
         A malicious client can negotiate SSLv2 ciphers that have been disabled on
         the server and complete SSLv2 handshakes even if all SSLv2 ciphers have
         been disabled, provided that the SSLv2 protocol was not also disabled via
         SSL_OP_NO_SSLv2.
    
         This issue was reported to OpenSSL on 26th December 2015 by Nimrod Aviram
         and Sebastian Schinzel.
         (CVE-2015-3197)
         [Viktor Dukhovni]
    
      *) Reject DH handshakes with parameters shorter than 1024 bits.
         [Kurt Roeckx]
  5. OpenSSL CHANGES

    christos committed
     _______________
    
     Changes between 1.0.1q and 1.0.1r [28 Jan 2016]
    
      *) Protection for DH small subgroup attacks
    
         As a precautionary measure the SSL_OP_SINGLE_DH_USE option has been
         switched on by default and cannot be disabled. This could have some
         performance impact.
         [Matt Caswell]
    
      *) SSLv2 doesn't block disabled ciphers
    
         A malicious client can negotiate SSLv2 ciphers that have been disabled on
         the server and complete SSLv2 handshakes even if all SSLv2 ciphers have
         been disabled, provided that the SSLv2 protocol was not also disabled via
         SSL_OP_NO_SSLv2.
    
         This issue was reported to OpenSSL on 26th December 2015 by Nimrod Aviram
         and Sebastian Schinzel.
         (CVE-2015-3197)
         [Viktor Dukhovni]
    
      *) Reject DH handshakes with parameters shorter than 1024 bits.
         [Kurt Roeckx]
  6. OpenSSL CHANGES

    christos committed
     _______________
    
     Changes between 1.0.1q and 1.0.1r [28 Jan 2016]
    
      *) Protection for DH small subgroup attacks
    
         As a precautionary measure the SSL_OP_SINGLE_DH_USE option has been
         switched on by default and cannot be disabled. This could have some
         performance impact.
         [Matt Caswell]
    
      *) SSLv2 doesn't block disabled ciphers
    
         A malicious client can negotiate SSLv2 ciphers that have been disabled on
         the server and complete SSLv2 handshakes even if all SSLv2 ciphers have
         been disabled, provided that the SSLv2 protocol was not also disabled via
         SSL_OP_NO_SSLv2.
    
         This issue was reported to OpenSSL on 26th December 2015 by Nimrod Aviram
         and Sebastian Schinzel.
         (CVE-2015-3197)
         [Viktor Dukhovni]
    
      *) Reject DH handshakes with parameters shorter than 1024 bits.
         [Kurt Roeckx]
  7. Use .PARSEDIR to set the TOP. It makes things more portable since they

    christos committed
    can work outside the tree.
  8. Some NFS servers return RPC_PROGNOTREGISTERED instead of RPC_PROGVERS…

    bouyer committed
    …MISMATCH
    
    when they don't support EXT_RQUOTAVERS but support RQUOTAVERS, so
    retry with RQUOTAVERS for both RPC_PROGNOTREGISTERED and RPC_PROGVERSMISMATCH
    return code.
    Fix issue against a NetApp server reported by 6bone on current-users
  9. Remove trailing whitespace from imported messages when adding now files.

    christos committed
    This is done in RCS_checkin() but we have a "fast path" for new files here
    that does not do it. Hooray for specialized code.
    
    XXX: pullup 6, 7
  10. Whitespace fix (Ingo Schwarze)

    christos committed
  11. New sentence, new line. Bump date.

    wiz committed
  12. Add support to msdosfs and makefs to generate correct Unicode (UCS-2)…

    mlelstv committed
    … directory
    
    entries from UTF8 encoded file names.
  13. Use local MTREECONF to omit unnecessary dirs.

    tsutsui committed
  14. Fix misplaced parentheses (Ingo Schwarze)

    christos committed
  15. If we are building CTF, keep debugging symbols.

    christos committed
  16. one left but evbarm64 but clang is busted.

    christos committed
  17. do riscv and earmeb

    christos committed
  18. more riscv fixes

    christos committed
Something went wrong with that request. Please try again.