Module Name:    src
Committed By:   snj
Date:           Thu May 20 05:59:43 UTC 2010

Modified Files:
        src/doc [netbsd-5]: CHANGES-5.1

Log Message:
Backout ticket 1357.

Pull up tickets 1353, 1375, 1381, 1384, 1388, 1396, 1400, and 1401.


To generate a diff of this commit:
cvs rdiff -u -r1.1.2.228 -r1.1.2.229 src/doc/CHANGES-5.1

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/doc/CHANGES-5.1
diff -u src/doc/CHANGES-5.1:1.1.2.228 src/doc/CHANGES-5.1:1.1.2.229
--- src/doc/CHANGES-5.1:1.1.2.228	Sat Apr 24 07:03:20 2010
+++ src/doc/CHANGES-5.1	Thu May 20 05:59:43 2010
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-5.1,v 1.1.2.228 2010/04/24 07:03:20 snj Exp $
+# $NetBSD: CHANGES-5.1,v 1.1.2.229 2010/05/20 05:59:43 snj Exp $
 
 A complete list of changes from the NetBSD 5.0 release to the NetBSD 5.1
 release:
@@ -17133,11 +17133,6 @@
 	under NetBSD dom0.
 	[jym, ticket #1334]
 
-sys/netinet/in.c				1.137 via patch
-
-	Fixed a number of race conditions when receiving ipv4 packets.
-	[bouyer, ticket #1357]
-
 xsrc/external/mit/xorg-server/dist/render/glyph.c 1.2
 
 	Merge fdo git change 185185eeb44a277c324be0f58a4b4a469b56b69b.
@@ -17223,3 +17218,83 @@
 	Welcome to 5.1_RC1!
 	[snj]
 
+lib/libpthread/pthread.c			1.114, 1.115
+
+	Correctly set pt_lid in the child, after a fork
+	--
+	Fix the pthread pt_lid in the fork callback function that runs in
+	the child instead of a function that may be going away.
+	[explorer, ticket #1353]
+
+distrib/utils/sysinst/mbr.c			1.83
+
+	The 16bit "bootmenu valid" magic is slightly weak; collisions have
+	been seen in the wild. So, before accepting arbitrary strings from
+	there, validate at least slightly and ignore if the entries are
+	not properly 0 terminated or contain control characters.
+	[martin, ticket #1375]
+
+sys/net/bpf_filter.c				1.36
+
+	The correct check for BPF_K is with BPF_SRC for BPF_ALU ops.
+	Fixes possible division-by-zero crashes by evil filter expressions
+	like "len / 0 = 1".  Fixes PR kern/43185.
+	[drochner, ticket #1381]
+
+crypto/external/bsd/openssh/dist/ssh_config	1.3 via patch
+crypto/external/bsd/openssh/dist/ssh_config.5	1.3 via patch
+crypto/external/bsd/openssh/dist/sshd_config.5	1.4 via patch
+
+	Don't mention "umac...@openssh.com" MAC algorithm which is not
+	enabled in our SSH client and daemon as it causes crashes on
+	architectures which strict aligment requirements (e.g.,
+	NetBSD/sparc64).  PR bin/43221.
+	[drochner, ticket #1384]
+
+sys/conf/copyright				1.7
+
+	Welcome to 2010.
+	[tsutsui, ticket #1388]
+
+distrib/utils/sysinst/mbr.c			1.84
+distrib/utils/sysinst/msg.mbr.de		1.10
+distrib/utils/sysinst/msg.mbr.en		1.14
+distrib/utils/sysinst/msg.mbr.es		1.5
+distrib/utils/sysinst/msg.mbr.fr		1.16
+distrib/utils/sysinst/msg.mbr.pl		1.12
+
+	Fix a varargs argument type mismatch on 32bit archs - change format
+	to explicitly use %lu and cast the passed value accordingly.
+	[martin, ticket #1396]
+
+distrib/amd64/floppies/common/boot.cfg		1.3
+
+	Update boot.cfg banner/menu to reflect that installation floppies
+	have ACPI support.
+	[dholland, ticket #1400]
+
+sys/arch/i386/i386/trap.c			1.251-1.253 via patch
+sys/arch/i386/i386/vector.S			1.50-1.51 via patch
+
+	If we fault on the 'iret' during return to userpace (eg if %eip is
+	outside the bounds of %cs) then hack the stack to contain a normal
+	fault frame for the signal setup code (etc).
+	Previously the code assumed that the original user trap frame was
+	still present - at it is for faults when loading the segment
+	registers.
+	--
+	If we fault on the iret during return to userspace, see if we need
+	to do a lazy update of %cs to make the stack executable.  If a
+	change is made, just retry the failing sequence.  Signal handlers
+	as gcc nested local functions now work!
+	--
+	Fix 'fault on load of %gs during retirn to userspace' to look for
+	the correct instruction bytes.  Take the 'fault on load segment
+	register' through the same path as 'fault on iret' so we don't have
+	to fixup the broken stackframe that contains a mix of user and
+	kernel registers. Update comments about how the faults during
+	return to userspace are processed.  Setting an invalid %gs in the
+	saved context of a signal handler causes a SIGSEGV handler to be
+	entered with what look like valid registers.
+	[riz, ticket #1401]
+

Reply via email to