On Tue, Jul 14, 2009 at 09:19:13PM +, Alexander Kabaev wrote:
Author: kan
Date: Tue Jul 14 21:19:13 2009
New Revision: 195697
URL: http://svn.freebsd.org/changeset/base/195697
Log:
Second attempt at eliminating .text relocations in shared libraries
compiled with stack protector.
Author: rrs
Date: Tue Jul 28 14:09:06 2009
New Revision: 195918
URL: http://svn.freebsd.org/changeset/base/195918
Log:
Turns out that when a receiver forwards through its TNS's the
processing code holds the read lock (when processing a
FWD-TSN for pr-sctp). If it finds stranded data that
Author: tuexen
Date: Tue Jul 28 15:07:41 2009
New Revision: 195919
URL: http://svn.freebsd.org/changeset/base/195919
Log:
Fix a bug where wrong initialization value
in used for an SCTP specific sysctl variable.
Approved by: re, rrs(mentor).
MFC after: 2 weeks.
Modified:
Author: qingli
Date: Tue Jul 28 17:16:54 2009
New Revision: 195921
URL: http://svn.freebsd.org/changeset/base/195921
Log:
The new flow table caches both the routing table entry as well as the
L2 information. For an indirect route the cached L2 entry contains the
MAC address of the gateway.
This commit causes my laptop to hang during boot.
ipfw and ipfw_nat are both compiled into the kernel:
options IPFIREWALL
options IPFIREWALL_VERBOSE
options IPFIREWALL_VERBOSE_LIMIT=100
options IPFIREWALL_FORWARD
options IPFIREWALL_NAT
options
Tor Egge wrote:
This commit causes my laptop to hang during boot.
ipfw and ipfw_nat are both compiled into the kernel:
options IPFIREWALL
options IPFIREWALL_VERBOSE
options IPFIREWALL_VERBOSE_LIMIT=100
options IPFIREWALL_FORWARD
options IPFIREWALL_NAT
Thanks for committing this fix.
___
svn-src-all@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/svn-src-all
To unsubscribe, send any mail to svn-src-all-unsubscr...@freebsd.org
ok I wonder where the right place to add it is.. probably keep it
at SI_SUB_PROTO_IFATTACHDOMAIN, SI_ORDER_ANY - 256.
an you check if that fixes it? possibly moving the 256 to 255?
That depends on the wanted order between ipfw_init() and vnet_ipfw_init().
Using
Author: julian
Date: Tue Jul 28 19:43:27 2009
New Revision: 195922
URL: http://svn.freebsd.org/changeset/base/195922
Log:
Somewhere along the line accept sockets stopped honoring the
FIB selected for them. Fix this.
Reviewed by: ambrisko
Approved by: re (kib)
MFC after:3 days
Author: julian
Date: Tue Jul 28 19:58:07 2009
New Revision: 195923
URL: http://svn.freebsd.org/changeset/base/195923
Log:
Startup the vnet part of initialization a bit after the global part.
Fixes crash on boot if ipfw compiled in.
Submitted by: tegge@
Reviewed by: tegge@
Approved
Author: rwatson
Date: Tue Jul 28 21:39:58 2009
New Revision: 195925
URL: http://svn.freebsd.org/changeset/base/195925
Log:
Audit file descriptors passed to fooat(2) system calls, which are used
instead of the root/current working directory as the starting point for
lookups. Up to two such
Author: rwatson
Date: Tue Jul 28 21:52:24 2009
New Revision: 195926
URL: http://svn.freebsd.org/changeset/base/195926
Log:
Rework vnode argument auditing to follow the same structure, in order
to avoid exposing ARG_ macros/flag values outside of the audit code in
order to name which one of
Author: rwatson
Date: Tue Jul 28 22:17:34 2009
New Revision: 195927
URL: http://svn.freebsd.org/changeset/base/195927
Log:
Revise header comments for vnet.h as we now implement VNET_SYSINIT, not
just VNET_DEFINE in vnet.h.
Approved by: re (vimage blanket)
Modified:
Author: dougb
Date: Tue Jul 28 22:58:40 2009
New Revision: 195928
URL: http://svn.freebsd.org/changeset/base/195928
Log:
Vendor import of BIND 9.6.1-P1
Modified:
vendor/bind9/dist/CHANGES
vendor/bind9/dist/bin/named/update.c
vendor/bind9/dist/version
Modified: vendor/bind9/dist/CHANGES
Author: dougb
Date: Tue Jul 28 22:59:11 2009
New Revision: 195929
URL: http://svn.freebsd.org/changeset/base/195929
Log:
Tag the 9.6.1-P1 release
Added:
vendor/bind9/9.6.1-P1/
- copied from r195928, vendor/bind9/dist/
___
Author: dougb
Date: Tue Jul 28 23:23:48 2009
New Revision: 195930
URL: http://svn.freebsd.org/changeset/base/195930
Log:
Vendor import of BIND 9.4.3-P3
Modified:
vendor/bind9/dist-9.4/CHANGES
vendor/bind9/dist-9.4/bin/named/update.c
vendor/bind9/dist-9.4/version
Modified:
Author: dougb
Date: Tue Jul 28 23:24:45 2009
New Revision: 195931
URL: http://svn.freebsd.org/changeset/base/195931
Log:
Tag the 9.4.3-P3 release
Added:
vendor/bind9/9.4.3-P3/
- copied from r195930, vendor/bind9/dist-9.4/
___
Author: dougb
Date: Tue Jul 28 23:42:39 2009
New Revision: 195932
URL: http://svn.freebsd.org/changeset/base/195932
Log:
These files don't belong in contrib at all anymore, so remove them.
Deleted:
stable/7/contrib/bind9/FREEBSD-Upgrade
stable/7/contrib/bind9/FREEBSD-Xlist
Author: dougb
Date: Tue Jul 28 23:59:22 2009
New Revision: 195933
URL: http://svn.freebsd.org/changeset/base/195933
Log:
Update to version 9.4.3-P3 which addresses a remote DoS vulnerability:
Receipt of a specially-crafted dynamic update message may
cause BIND 9 servers to
Author: dougb
Date: Wed Jul 29 00:13:47 2009
New Revision: 195934
URL: http://svn.freebsd.org/changeset/base/195934
Log:
Apply the patch derived from version 9.6.1-P1 which addresses a remote
DoS vulnerability:
Receipt of a specially-crafted dynamic update message may
cause
Author: simon
Date: Wed Jul 29 00:14:14 2009
New Revision: 195935
URL: http://svn.freebsd.org/changeset/base/195935
Log:
Fix BIND named(8) dynamic update message remote DoS.
Obtained from:ISC
Security: FreeBSD-SA-09:12.bind
Security: CVE-2009-0696
Approved by: so
Author: dougb
Date: Wed Jul 29 00:15:39 2009
New Revision: 195936
URL: http://svn.freebsd.org/changeset/base/195936
Log:
Update to version 9.6.1-P1 which addresses a remote DoS vulnerability:
Receipt of a specially-crafted dynamic update message may
cause BIND 9 servers to
On Tue, Jul 28, 2009 at 02:09:07PM +, Randall Stewart wrote:
Author: rrs
Date: Tue Jul 28 14:09:06 2009
New Revision: 195918
URL: http://svn.freebsd.org/changeset/base/195918
Log:
Turns out that when a receiver forwards through its TNS's the
processing code holds the read lock
On Jul 29, 2009, at 1:10 AM, Pawel Jakub Dawidek wrote:
On Tue, Jul 28, 2009 at 02:09:07PM +, Randall Stewart wrote:
Author: rrs
Date: Tue Jul 28 14:09:06 2009
New Revision: 195918
URL: http://svn.freebsd.org/changeset/base/195918
Log:
Turns out that when a receiver forwards through its
Author: pjd
Date: Wed Jul 29 05:23:52 2009
New Revision: 195938
URL: http://svn.freebsd.org/changeset/base/195938
Log:
Currently there is a problem with fscking UFS file systems created on
top of ZVOLs. The problem is that rc.d/fsck runs before rc.d/zfs. The
latter makes ZVOLs to appear in
On Wed, Jul 29, 2009 at 01:23:24AM -0400, Randall Stewart wrote:
Instead of using additional argument to the sctp_add_to_readq()
function, wouldn't it be sufficient to just check with mtx_owned(9) if
the lock is already held?
Hmm... I suppose one could go that way... but traditionally upper
26 matches
Mail list logo