Module Name: src
Committed By: bouyer
Date: Sun Jan 13 17:16:06 UTC 2013
Modified Files:
src/doc [netbsd-5]: CHANGES-5.3
Log Message:
tickets 1823-1839
To generate a diff of this commit:
cvs rdiff -u -r1.1.2.1 -r1.1.2.2 src/doc/CHANGES-5.3
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: src/doc/CHANGES-5.3
diff -u src/doc/CHANGES-5.3:1.1.2.1 src/doc/CHANGES-5.3:1.1.2.2
--- src/doc/CHANGES-5.3:1.1.2.1 Tue Dec 18 21:59:28 2012
+++ src/doc/CHANGES-5.3 Sun Jan 13 17:16:06 2013
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-5.3,v 1.1.2.1 2012/12/18 21:59:28 riz Exp $
+# $NetBSD: CHANGES-5.3,v 1.1.2.2 2013/01/13 17:16:06 bouyer Exp $
A complete list of changes from the NetBSD 5.2 release to the NetBSD 5.3
release:
@@ -11,3 +11,123 @@ sys/sys/param.h patched by hand
Welcome to 5.2_STABLE.
[riz]
+sys/fs/smbfs/smbfs_node.c 1.48, 1.49 via patch
+sys/fs/smbfs/smbfs_node.h 1.13 via patch
+sys/fs/smbfs/smbfs_vnops.c 1.83, 1.84 via patch
+
+ Various fixes for smbfs:
+
+ - Implement NGONE to fix caching issue described in PR kern/25070.
+ Mostly taken from FreeBSD r125637.
+ - Revert revision 1.70 of smbfs_vnops.c to fix setattr to opened
+ direcotry. In case of SMB_CAP_NT_SMBS, NOPEN is set after
+ smbfs_smb_ntcreatex() call. If NOPEN is set in front, it will
+ immediately return by condition at do_open label.
+ - In smbfs_close(), call smbfs_smb_close() and drop NOPEN bit in
+ the case of direcotry. Otherwise smbfs_rmdir() fails when the
+ directory was opened.
+ - Remove redundant vput() before vgone().
+ - Avoid unnecessary mutex_exit() in smbfs_node_alloc().
+ - Set NGONE bit to from-name vnode to invalidate the smbnode cache.
+ [nakayama, ticket #1823]
+
+sys/fs/smbfs/smbfs_smb.c 1.44
+sys/fs/smbfs/smbfs_subr.c 1.16
+sys/fs/smbfs/smbfs_subr.h 1.21
+sys/fs/smbfs/smbfs_vnops.c 1.85
+sys/netsmb/smb.h 1.20
+
+ Improve smbfs timestamp handling.
+ Don't round timestamp to 2 seconds resolution if the server
+ supports the CAP_INFOLEVEL_PASSTHRU capability.
+ [nakayama, ticket #1824]
+
+sys/netsmb/smb_iod.c 1.31 - 1.35
+sys/netsmb/smb_rq.c 1.32
+
+ Do not call callout_stop() unless the structure was previoulsy
+ initialised for a non null timeout.
+ Do initialise the callout when fetching a new request structure from
+ the pool, not when starting the timer. Likewise, destroy the callout
+ when giving back the item to the pool.
+ Send data for as long as there is new data available. Otherwise
+ there was a danger of smb_iod_recvall() blocking, hence releasing
+ the kernel lock, new data creeping into the queue, and a wakeup
+ being missed (well, there's still a race, but since it's theoretical
+ enough for me to never have encountered it, I'll rather solve it
+ by periodic wakeups).
+ defensive programming: wake up iod thread once a second "just in case"
+ add comment to previous stating periodic wakeups can be nuked
+ once smb is mpsafe.
+ [nakayama, ticket #1825]
+
+sys/dev/lockstat.c 1.16
+
+ Fix off by one.
+ [msaitoh, ticket #1826]
+
+sys/dev/raidframe/rf_driver.c 1.131
+
+ Fix off by one read.
+ [msaitoh, ticket #1827]
+
+sys/external/isc/atheros_hal/dist/ah_eeprom_v14.c patch
+
+ Fix off by one read.
+ [msaitoh, ticket #1828]
+
+sys/compat/netbsd32/netbsd32_fs.c 1.64
+
+ Fix inverted error check.
+ [matt, ticket #1829]
+
+sys/dev/usb/ubsa_common.c 1.9
+
+ Fix off by one read error.
+ [msaitoh, ticket #1830]
+
+sys/external/bsd/drm/dist/shared-core/i915_suspend.c 1.6
+
+ Fix wrong reference to dev_priv->saveSWF1. It was clearly wrong.
+ [msaitoh, ticket #1831]
+
+sbin/sysctl/sysctl.c 1.149 via patch
+
+ Add missing free() in error path.
+ [msaitoh, ticket #1832]
+
+usr.bin/netstat/bpf.c 1.11
+
+ Fix memory leak.
+ [msaitoh, ticket #1833]
+
+sys/arch/i386/conf/XEN2_DOMU: patch
+sys/arch/amd64/conf/XEN3_DOMU: patch
+
+ Add drvctl to Xen DOMU kernels
+ [sborrill, ticket #1834]
+
+sbin/fsck_ffs/pass1.c 1.50
+
+ Show pass1 SIGINFO output on stderr like other passes, not on stdout.
+ [riastradh, ticket #1837]
+
+etc/namedb/root.cache 1.17
+
+ D.ROOT-SERVERS.NET changes IPv4 address.
+ [taca, ticket #1839]
+
+gnu/dist/grep/lib/getopt.c 1.2
+gnu/dist/grep/lib/regex.c 1.2
+gnu/dist/grep/src/ansi2knr.c 1.2
+gnu/dist/grep/src/dfa.c 1.3
+gnu/dist/grep/src/grep.c 1.14
+gnu/dist/grep/src/search.c 1.4
+
+ Change several int variables to size_t, ssize_t, or ptrdiff_t.
+ This should fix the bug described in CVE-2012-5667 when an input
+ line is so long that its length cannot be stored in an int
+ variable.
+
+ [apb, ticket #1838]
+