aboutsummaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Update leap-seconds to leap-seconds.3676924800.stable/11Xin LI26 hours1-4/+4
| | | | | | | Obtained from: ftp://ftp.nist.gov/pub/time/leap-seconds.3676924800. MFC after: 3 days (cherry picked from commit 7ba7bf48d5bd6ca89f4e81579456b74ee7aa9e4f)
* readelf: document that -u / --unwind is not yet implementedEd Maste2 days1-0/+3
| | | | | | | | | | | | ELF tool chain readelf accepts -u / --unwind but just ignores the option. This was previously undocumented, which could be confusing for someone encountering `readelf -u` (in a script or GNU readelf example). Reported by: markj (in D32003) MFC after: 1 week Sponsored by: The FreeBSD Foundation (cherry picked from commit deef4b8ce8ba7292fe5088bf9f6d4e2e35662fe8)
* readelf: include notes (-n) and unwind (-u) in --all/-aEd Maste2 days2-2/+4
| | | | | | | | | | | | | | | This matches the GNU and LLVM versions of readelf. As markj noted in the review -u is not actually implemented yet and has no effect. The option is accepted and just ignored. Reported by: andrew Reviewed by: andrew, markj MFC after: 1 week Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D32003 (cherry picked from commit f161abf9f2cd7fdd28543f9774de82c89675477c)
* Update OptionalObsoleteFiles.inc with NTP docsEd Maste3 days1-0/+203
| | | | | | | | | | The list of files for MK_NTP was incomplete. PR: 218193 Submitted by: brnrd MFC after: 1 week (cherry picked from commit 4154e70ea8dc0ac0d1639374ea3bc7b6c9744b9f)
* apr: Merge r1889604, r1807975 from trunk:Joe Orton13 days2-2/+5
| | | | | | | | | | | | | | * random/unix/sha2.c (apr__SHA256_Final, apr__SHA256_End): Fix parameter buffer lengths to match declaration, avoiding GCC 11 warning. (no functional change) Bounds-check human-readable date fields (credit: Stefan Sperling) Submitted by: jorton, niq Reviewed by: jorton git-svn-id: https://svn.apache.org/repos/asf/apr/apr/branches/1.7.x@1891198 13f79535-47bb-0310-9956-ffa450edef68 (cherry picked from commit fc1b69d0311e50ed05c00c46ad7dd5d560e57cb6)
* libarchive: import bugfix from upstreamMartin Matuska2021-09-102-28/+78
| | | | | | | Reworked bugfix for upstream issue #1566: Do not follow symlinks when processing the fixup list (cherry picked from commit c577bdfce6b4451ab897bfe5013543e78a7f9b62)
* libarchive: import changes from upstreamMartin Matuska2021-09-1069-806/+2401
| | | | | | | | | | | | | | | | | | | | | | | | | Libarchive 3.5.2 New features: PR #1502: Support for PWB and v7 binary cpio formats PR #1509: Support of deflate algorithm in symbolic link decompression for ZIP archives Important bugfixes: IS #1044: fix extraction of hardlinks to symlinks PR #1480: Fix truncation of size values during 7zip archive extraction on 32bit architectures PR #1504: fix rar header skiming PR #1514: ZIP excessive disk read - fix location of central directory PR #1520: fix double-free in CAB reader PR #1521: Fixed leak of rar before ending with error PR #1530: Handle short writes from archive_write_callback PR #1532: 7zip: Use compression settings from file also for file header IS #1566: do not follow symlinks when processing the fixup list Relnotes: yes (cherry picked from commit ddce862ad8594542e1fa1af9ffae7264e12ffd27)
* pxeboot: improve and simplify rx handlingKyle Evans2021-09-041-48/+106
| | | | | | | | | | | | | | | | | This pushes the bulk of the rx servicing into a single loop that's only slightly convoluted, and it addresses a problem with rx handling in the process. If we hit a tx interrupt while we're processing, we'd previously drop the frame on the floor completely and ultimately timeout, increasing boot time on particularly busy hosts as we keep having to backoff and resend. After this patch, we don't seem to hit timeouts at all on zoo anymore though loading a 27M kernel is still relatively slow (~1m20s). Sponsored By: National Bureau of Economic Research Sponsored by: Klara, Inc. (cherry picked from commit 3daa8e165c661c1b45e759f4997f447384c15446)
* caroot: cumulative cert updateKyle Evans2021-09-04146-0/+994
| | | | | | | | | | | | | This adds a note in all existing certs that they are explicitly trusted for server auth, and also: - Seven (7) added - Nineteen (19) removed (cherry picked from commit 446169e0b6f04b96960540784539c218f5a14c86) (cherry picked from commit 3016c5c2bf68d8c6ebf303939f20092478e7a4ca) (cherry picked from commit fac832b27105d926d9f8728d7147adb547b937d8) (cherry picked from commit 76461921dac18b300489e326ba3df61d2809f364)
* caroot: update CA bundle processorKyle Evans2021-09-041-12/+43
| | | | | | | | | | | | Our current processor was identified as trusting cert not explicitly marked for SERVER_AUTH, as well as certs that were tagged with DISTRUST_AFTER. Update the script to handle both scenarios. This patch was originally authored by mandree@ for ports, and it was subsequently ported to base caroot. (cherry picked from commit c3510c941c0dddd09389915a9395e6f059088bab)
* Cirrus-CI: reduce VM memory to 8GEd Maste2021-09-021-1/+1
| | | | | | | | | Cirrus-CI now provides a task memory use graph, and it is clear we do not need to provision the VM with 24GB. Sponsored by: The FreeBSD Foundation (cherry picked from commit bbf70270551d8defb427316e5d0e0f368b9aac96)
* OpenSSL: Fix the RSA_SSLV23_PADDING padding typeMatt Caswell2021-09-011-2/+8
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This also fixes the public function RSA_padding_check_SSLv23. Commit 6555a89 changed the padding check logic in RSA_padding_check_SSLv23 so that padding is rejected if the nul delimiter byte is not immediately preceded by at least 8 bytes containing 0x03. Prior to that commit the padding is rejected if it *is* preceded by at least 8 bytes containing 0x03. Presumably this change was made to be consistent with what it says in appendix E.3 of RFC 5246. Unfortunately that RFC is in error, and the original behaviour was correct. This is fixed in later errata issued for that RFC. Applications that use SSLv2 or call RSA_paddin_check_SSLv23 directly, or use the RSA_SSLV23_PADDING mode may be impacted. The effect of the original error is that an RSA message encrypted by an SSLv2 only client will fail to be decrypted properly by a TLS capable server, or a message encrypted by a TLS capable client will fail to decrypt on an SSLv2 only server. Most significantly an RSA message encrypted by a TLS capable client will be successfully decrypted by a TLS capable server. This last case should fail due to a rollback being detected. Thanks to D. Katz and Joel Luellwitz (both from Trustwave) for reporting this issue. CVE-2021-23839 https://github.com/openssl/openssl/commit/30919ab80a478f2d81f2e9acdcca3fa4740cd547
* openssl: Fix a read buffer overrun in X509_CERT_AUX_print()Matt Caswell2021-08-311-1/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is a backport of commit c5dc9ab965f to 1.0.2. That commit fixed the same bug but in master/1.1.1 it is in the function X509_aux_print(). The original commit had the following description: Fix a read buffer overrun in X509_aux_print(). The ASN1_STRING_get0_data(3) manual explitely cautions the reader that the data is not necessarily NUL-terminated, and the function X509_alias_set1(3) does not sanitize the data passed into it in any way either, so we must assume the return value from X509_alias_get0(3) is merely a byte array and not necessarily a string in the sense of the C language. I found this bug while writing manual pages for X509_print_ex(3) and related functions. Theo Buehler <tb@openbsd.org> checked my patch to fix the same bug in LibreSSL, see http://cvsweb.openbsd.org/src/lib/libcrypto/asn1/t_x509a.c#rev1.9 As an aside, note that the function still produces incomplete and misleading results when the data contains a NUL byte in the middle and that error handling is consistently absent throughout, even though the function provides an "int" return value obviously intended to be 1 for success and 0 for failure, and even though this function is called by another function that also wants to return 1 for success and 0 for failure and even does so in many of its code paths, though not in others. But let's stay focussed. Many things would be nice to have in the wide wild world, but a buffer overflow must not be allowed to remain in our backyard. CVE-2021-3712 Reviewed-by: Paul Dale <pauli@openssl.org>
* Add Cirrus CI config file to support CI buildsEd Maste2021-08-311-0/+22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Also followup commits: r346121: Cirrus-CI: pass OVMF env var to test script for upcoming changes r350302: cirrus.yml: use OVMF.fd from uefi-edk2-qemu-x86_64 package r350449: cirrus.yml: stop fetching OVMF.fd now that we're using the pkg r356867: Cirrus-CI: bump VM image to FreeBSD 12.1 Sponsored by: The FreeBSD Foundation (cherry picked from commit 9ce187bf83c0593d9639662417923f0e054c19d3) Cirrus-CI: use FreeBSD 12.2 image Direct commit to stable/12 as main has other changes here, using the llvm package to avoid building the toolchain. (cherry picked from commit 046f91f21ac619f7307a8e853f863ded4df7f322) Cirrus-CI: avoid boot smoke test on stable/12 The boot smoke test boots from a FAT filesystem (created in-memory by QEMU), but this does not work on stable/12: mountroot: waiting for device /dev/ada0s1... Mounting from msdosfs:/dev/ada0s1 failed with error 19. For now on stable/12 use Cirrus-CI as only a build test. Sponsored by: The FreeBSD Foundation (cherry picked from commit 05b9673637feedb3ef0cf51fd9b7e914b08f7554) Cirrus-CI: Add descriptive task name Previously it appeared only as "main" in places like GitHub's list of checks run as part of a pull request. MFC after: 1 week Sponsored by: The FreeBSD Foundation (cherry picked from commit 903526542ac2309c08c769e517ea173a9f67cdb2) "boot smoke test" dropped from task name for the MFC, because Cirrus runs a build test only on stable/12 (see 05b9673637fe for details). (cherry picked from commit 20c918af7a3de84a6fc7d840a712fc4aa4dcdb69)
* Apply clang fix for assertion failure compiling multimedia/minitubeDimitry Andric2021-08-261-2/+5
| | | | | | | | | | | | | | | | | | | | | Merge commit 79f9cfbc21e0 from llvm git (by Yaxun (Sam) Liu): Do not merge LocalInstantiationScope for template specialization A lambda in a function template may be recursively instantiated. The recursive lambda will cause a lambda function instantiated multiple times, one inside another. The inner LocalInstantiationScope should not be marked as MergeWithParentScope since it already has references to locals properly substituted, otherwise it causes assertion due to the check for duplicate locals in merged LocalInstantiationScope. Reviewed by: Richard Smith Differential Revision: https://reviews.llvm.org/D98068 Reported by: yuri PR: 257978 (cherry picked from commit efa485d5c390b745f53761da9159721243c48b7b)
* dhclient: support supersede statement for option 54Fabian Kurtz2021-08-261-4/+13
| | | | | | | | | | | PR: 217978 Reported by: Franco Fichtner <franco@opnsense.org> Reviewed by: markj Obtained from: OPNsense MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D31503 (cherry picked from commit 0a539a0f005e8acbe4974ede30aa928099c988b9)
* Allow the pseudo-errnos to be returned as well in boot loaderWarner Losh2021-08-251-1/+1
| | | | | | | | Expose the pseudo-errno values in _STANDALONE is defined so that code in the boot loader can make use of them. Nothing uses them today, but the zstd support that's coming will need them. (cherry picked from commit 0c35b860913807d4937098d5238c5f4363fb6362)
* bhyve: Fix vq_getchain() error handling bugs in various device modelsMark Johnston2021-08-242-5/+7
| | | | | | | | | Reviewed by: grehan, khng Approved by: so Security: CVE-2021-29631 Security: FreeBSD-SA-21:13.bhyve (cherry picked from commit 71fbc6faed62e8eb5864f7c40839740f5e9f5558)
* Fix libfetch out of bounds read.Gordon Tetlow2021-08-241-1/+4
| | | | | | | | Approved by: so Security: SA-21:15.libfetch Security: CVE-2021-36159 (cherry picked from commit 3be62d49ae2b6f9050f39fe74210c88f35901fa5)
* Fix remote code execution in ggatec(8).Gordon Tetlow2021-08-241-0/+20
| | | | | | | | Approved by: so Security: SA-21:14.ggatec Security: CVE-2021-29630 (cherry picked from commit 515216929c40169cc72b62466ff9238682661613)
* ftpd: delete dead codeAlan Somers2021-08-222-52/+0
| | | | | | | | | | | Delete code killed by SVN r13139 in 1996. Little chance that it would still compile today. PR: 257317 Reported by: Alan Shearer <sakison@gmail.com> Sponsored by: Axcient (cherry picked from commit 674400eb20b65369a88b1cb778d729bc297832c9)
* Apply upstream clang fix for assertion failure compiling devel/capnprotoDimitry Andric2021-08-211-2/+4
| | | | | | | | | | | | | | | | Merge commit 48c70c1664aa from llvm git (by Richard Smith): Extend memset-to-zero optimization to C++11 aggregate functional casts Aggr{...}. We previously missed these cases due to not stepping over the additional AST nodes representing their syntactic form. Direct commit to stable/11, as both main and stable/13 already have this fix as part of clang 12.0.1. Reported by: fernape PR: 257961
* ipfilter: remove doubled semicolonsEd Maste2021-08-192-3/+3
| | | | | | | | | Local commit; ipfilter upstream is inactive. Discussed with: cy MFC after: 3 days (cherry picked from commit 8fa63f44e64ebac444a4ac6451ac5e150cdcf8b1)
* ar: remove invalid extra param in bsdar_warnc callsEd Maste2021-08-181-6/+6
| | | | | | | | | | A number of warnings passed an exit status code to bsdar_warnc, but it does not take exit status (as a warning, it does not exit). MFC after: 1 week Sponsored by: The FreeBSD Foundation (cherry picked from commit 09319f7d3f8aefe8a6b37b1c2a6d842126a2c181)
* Add ElfW() macro for compatibility with LinuxDimitry Andric2021-08-141-0/+3
| | | | | | | | | | | | | | Some Linux software using ELF headers assumes the existence of an ElfW(type) macro, which concatenates 'Elf', the default ELF word size, and the given type. This is identical to our __ElfN(x) macro in <sys/elf_generic.h>. Add the macro for compatibility, with a comment that we prefer the __ElfN() macro for FreeBSD. Reviewed by: emaste, kib Differential Revision: https://reviews.freebsd.org/D31427 MFC after: 1 week (cherry picked from commit 34e7e4b6a059eee5e4e3e34de5b9d5f0d6e589f9)
* bsdinstall: Only show menu if there are more items to be installedRenato Botelho2021-07-271-10/+12
| | | | | | | Obtained from: Rubicon Communications, LLC ("Netgate") Sponsored by: Rubicon Communications, LLC ("Netgate") (cherry picked from commit 95f0da5be1e3456c930f5f9538cbc099c65f2014)
* mergemaster: handle symbolic links during update.Warner Losh2021-07-081-2/+116
| | | | | | | | | | | | | /etc/os-release is now a symbolic link to a generated file. Make mergemaster cope with symbolic links generically. I'm no longer a big mergemaster user, so this has only been lightly tested by me, though Kimura-san has ran it through its paces. Submitted by: Yasushiro KIMURA-san PR: 242212 MFC After: 2 weeks (cherry picked from commit 30a56f9ef72705f2f3646ce4330cbc20675a465e)
* linux(4): Prevent integer overflow in futex_requeue.Dmitry Chagin2021-06-291-7/+16
| | | | | | | To prevent a signed integer overflow in futex_requeue add a sanity check to catch negative values of nrwake or nrrequeue. (cherry picked from commit 25b09d6f398ea8a260ee8e2e8209fd76c61e13ee)
* Fix a use-after-free in an error case.Takanori Watanabe2021-06-281-0/+1
| | | | | | | | PR: 255872 Submitted by: lylgood Differential Revision: https://reviews.freebsd.org/D30454 (cherry picked from commit 14803ec8d193d8d46f4137a7dba61b277c6a2fed)
* Disable llvm generating 128-bit multiply libcalls on 32-bit ARMDimitry Andric2021-06-251-0/+1
| | | | | | | | | | | | | | | | | | Merge commit 789708617d20 from llvm git (Koutheir Attouchi): Do not generate calls to the 128-bit function __multi3() on 32-bit ARM Re-applying this patch after bots failures. Should be fine now. The function __multi3() is undefined on 32-bit ARM, so a call to it should never be emitted. Instead, plain instructions need to be generated to perform 128-bit multiplications. Differential Revision: https://reviews.llvm.org/D103906 Reported by: mmel (cherry picked from commit 014a40f8f643a5dad6a6ba5c4bf6ea5d4f445fe6)
* Fix clang assertion while building recent www/chromiumDimitry Andric2021-06-251-1/+1
| | | | | | | | | | | | | | | | | Merge commit c8227f06b335 from llvm git (by Arthur Eubanks): [clang] Don't assert in EmitAggregateCopy on trivial_abi types Fixes PR42961. Reviewed By: rnk Differential Revision: https://reviews.llvm.org/D97872 PR: 256721, 255570 Reported by: jbeich (cherry picked from commit e7e517981a6591c79fb49cd8810361b0f3ad5983)
* jail: Don't allow substitution of valueless jail parameters.Jamie Gritton2021-06-241-1/+1
| | | | | | | PR: 256544 Reported by: cryptogranny at gmail.com (cherry picked from commit 5bf6dca2c6dbf63d382e97905e205ded3e8525d2)
* tests/netgraph: Fix build error due to missing directoryLutz Donnerhacke2021-06-241-0/+2
| | | | | | | | | | | | While MFCing the tests into stable/11 the test directory needs to be added, because earlier netgraph tests were not MFCed to this train. PR: 256773 Reported by: Arrigo Marchiori Submitted by: Arrigo Marchiori Tested by: Arrigo Marchiori This is a direct commit into the stable/11 branch.
* kern.mk: fix -Wno-error style to fix build with Clang 12Greg V2021-06-221-8/+8
| | | | | | | | | | Clang 12 no longer supports -Wno-error-..., only the -Wno-error=... style (which is already used everywhere else in the tree). Differential Revision: https://reviews.freebsd.org/D29157 (cherry picked from commit 15565e0a2177f53b086609fecd48991c52dad5eb) (cherry picked from commit 742d315019789de01d5dbf736cbafd49cc603276)
* Export various 128 bit long double functions from libgcc_s.so.1Dimitry Andric2021-06-212-0/+32
| | | | | | | | | | | | | | | | These were already compiled for some time on aarch64 and riscv, by including lib/libcompiler_rt/Makefile.inc, but never exported in the shared library. Since gcc exports these under version GCC_4.6.0, we do the same. This review should replace D11482 for now. For e.g. amd64 more work is still to be done, as compiler-rt does not seem to support 128 bit long double math for that architecture. Reviewed by: cem Differential Revision: https://reviews.freebsd.org/D28690 (cherry picked from commit 790a6be5a1699291c6da87871426d0c56dedcc89)
* cpucontrol: fix extended signature matching code to avoid fallthoughDan Nelson2021-06-201-2/+2
| | | | | | PR: 256502 (cherry picked from commit 87799c5f85dc0aed7e53ca841504e3b2ffc88498)
* ipfw.8: synopsis misses nat show formLutz Donnerhacke2021-06-181-5/+11
| | | | | | | | | | | Document the existing behavior, which is currently only available by reading third party documentation or the source code itself. PR: 254617 Submitted by: Oliver Kiddle Differential Revision: https://reviews.freebsd.org/D30189 (cherry picked from commit c8250c5ada85fec8936e8eb8695d7cb80a3ce8ab)
* libcasper: add missing unistd.hMariusz Zaborski2021-06-181-0/+1
| | | | Reported by: Arrigo Marchiori <ardovm (at) yahoo.it>
* Do not forward datagrams originated by link-local addressesZhenlei Huang2021-06-171-7/+12
| | | | | | | | | | | | | | | | | The current implement of ip_input() reject packets destined for 169.254.0.0/16, but not those original from 169.254.0.0/16 link-local addresses. Fix to fully respect RFC 3927 section 2.7. PR: 255388 Reviewed by: donner, rgrimes, karels Differential Revision: https://reviews.freebsd.org/D29968 Reviewed by: rgrimes, donner, karels, marcus, emaste Differential Revision: https://reviews.freebsd.org/D30374 (cherry picked from commit 3d846e48227e2e78c1e7b35145f57353ffda56ba) (cherry picked from commit 03b0505b8fe848f33f2f38fe89dd5538908c847e)
* tests/netgraph: Tests for ng_vlan_rotateLutz Donnerhacke2021-06-162-3/+340
| | | | | | | | | | | | | Test functionality of ng_vlan_rotate(4): - Rotate 1 to 9 stagged vlans in any possible direction and length - Rotate random combinations of ethertypes (8100, 88a8, 9100) - Automatic reverse rotating for backward data flow - Test too many and too few vlans Reviewed by: kp (earlier version) Differential Revision: https://reviews.freebsd.org/D30670 (cherry picked from commit 6b08e68be111d50931b0d30145f8b7e3402decaf)
* tests/netgraph: Tests for ng_hubLutz Donnerhacke2021-06-162-0/+233
| | | | | | | | | | | | | Test functionality of ng_hub(4): - replicting traffic to anything but the sending hook - persistence - an unrestricted loop - implementation limits with many hooks. Reviewed by: kp Differential Revision: https://reviews.freebsd.org/D30633 (cherry picked from commit 7863faa78ae271017c404c635b2a9d07379d4316)
* tests/netgraph: Tests for ng_bridgeLutz Donnerhacke2021-06-162-0/+634
| | | | | | | | | | | | | | | | Test functionality of ng_bridge(4): - replicating traffic to anything but the sending hook - persistence - detect loops - unicast to only one link of many - stretch to implementation limits on broadcast Reviewed by: kp Differential Revision: https://reviews.freebsd.org/D30647 Differential Revision: https://reviews.freebsd.org/D30699 (cherry picked from commit 61814702398ce29430b2bef75cbdd6fd2c07ad12) (cherry picked from commit 5554abd9cc9702af30af90925b33c5efff4e7d88)
* tests/netgraph: Inital framework for testing libnetgraphLutz Donnerhacke2021-06-164-0/+588
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Provide a framework of functions to test various netgraph modules. Tests contain: - creating, renaming, and destroying nodes - connecting and removing hooks - sending and receiving data - sending ASCII messages and receiving binary responses - errors can be passed for indiviual inspection or fail the test Reviewed by: kp Differential Revision: https://reviews.freebsd.org/D30629 Differential Revision: https://reviews.freebsd.org/D30657 Differential Revision: https://reviews.freebsd.org/D30671 Differential Revision: https://reviews.freebsd.org/D30699 (cherry picked from commit 24ea1dbf257aa6757f469bcd859f90e9ad851e59) (cherry picked from commit 09307dbfb888a98232096c751a96ecb3344aa77c) (cherry picked from commit 9021c46603bf29b9700f24b8dce8796b434d7c8f) (cherry picked from commit 5554abd9cc9702af30af90925b33c5efff4e7d88) Also contains some fixups: - indent all files correctly - finish factoring out - remove debugging code - check for renaming issues reported in PR241954 PR: 241954 Differential Revision: https://reviews.freebsd.org/D30692 Differential Revision: https://reviews.freebsd.org/D30714 Differential Revision: https://reviews.freebsd.org/D30713 (cherry picked from commit a664ade93972ce617f0888ff79e715dff9cf0f87) (cherry picked from commit 0afa9be03937d60cb5aeba64c81e3e2165bd3737) (cherry picked from commit 43e4821315c31db067e23564b9bfafb519e77b2b)
* tests/netgraph: Prebuild tests directoryLutz Donnerhacke2021-06-162-0/+9
| | | | (partially cherry picked from commit e8db04c38959c882fe17e7c2b26fbabe74f26311)
* libcasper: fix descriptors numbersMariusz Zaborski2021-06-154-16/+50
| | | | | | | | | | | | | | | | Casper services expect that the first 3 descriptors (stdin/stdout/stderr) will point to /dev/null. Which Casper will ensure later. The Casper services are forked from the original process. If the initial process closes one of those descriptors, Casper may reuse one of them for it on purpose. If this is the case, then renumarate the descriptors used by Casper to higher numbers. This is done already after the fork, so it doesn't break the parent process. PR: 255339 Reported by: Borja Marcos <borjam (at) sarenet.es> Tested by: jkim@ (cherry picked from commit aa310ebfba3d49a0b6b03a103b969731a8136a73)
* LinuxKPI: add pr_err_onceGreg V2021-06-141-0/+2
| | | | | | | | Reviewed by: hselasky, emaste MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D30672 (cherry picked from commit 05c2d94a081d5948560a01c26c7f432960cde606)
* Fix test case header function nameMath Ieu2021-06-101-1/+1
| | | | | | | | | This restores the expected behavior (skip) when running with non-root user MFC after: 3 days Differential Revision: https://reviews.freebsd.org/D30584 (cherry picked from commit 847b7d505490ae407a5c876e14e7788a4add7737)
* netgraph/ng_base: Renaming a node to the same name is a noopLutz Donnerhacke2021-06-101-0/+4
| | | | | | | | | | | | | Detailed analysis in https://github.com/genneko/freebsd-vimage-jails/issues/2 brought the problem down to a double call of ng_node_name() before and after a vnet move. Because the name of the node is already known (occupied by itself), the second call fails. PR: 241954 Reported by: Paul Armstrong Differential Revision: https://reviews.freebsd.org/D30110 (cherry picked from commit 0345fd891fe13a191fc0fae9463ea9458bfaff5a)
* ng_parse: IP address parsing in netgraph eating too many charactersMarkus Stoff2021-06-081-3/+5
| | | | | | | | | | | | Once the final component of the IP address has been parsed, the offset on the input must not be advanced, as this would remove an unparsed character from the input. Submitted by: Markus Stoff Reviewed by: donner Differential Revision: https://reviews.freebsd.org/D26489 (cherry picked from commit 63b6a08ce2467b8e230e7a4ecb3e1ddf1b48851c)
* sqlite3: import sqlite3 3.35.5Cy Schubert2021-06-069-4857/+7708
| | | | | | | | | | Merge commit '0511e356f5e2106928ee352ee974d1470c860a9a' into new_merge Changes at https://www.sqlite.org/releaselog/3_35_5.html. MFC after: 1 month (cherry picked from commit ce9de47260d4edc963a94140789e4a52642c28e6)