On Wed, Jul 29, 2009 at 01:23:24AM -0400, Randall Stewart wrote:
> >Instead of using additional argument to the sctp_add_to_readq()
> >function, wouldn't it be sufficient to just check with mtx_owned(9) if
> >the lock is already held?
>
> Hmm... I suppose one could go that way... but traditionally
Author: pjd
Date: Wed Jul 29 05:23:52 2009
New Revision: 195938
URL: http://svn.freebsd.org/changeset/base/195938
Log:
Currently there is a problem with fscking UFS file systems created on
top of ZVOLs. The problem is that rc.d/fsck runs before rc.d/zfs. The
latter makes ZVOLs to appear in /
On Jul 29, 2009, at 1:10 AM, Pawel Jakub Dawidek wrote:
On Tue, Jul 28, 2009 at 02:09:07PM +, Randall Stewart wrote:
Author: rrs
Date: Tue Jul 28 14:09:06 2009
New Revision: 195918
URL: http://svn.freebsd.org/changeset/base/195918
Log:
Turns out that when a receiver forwards through its
On Tue, Jul 28, 2009 at 02:09:07PM +, Randall Stewart wrote:
> Author: rrs
> Date: Tue Jul 28 14:09:06 2009
> New Revision: 195918
> URL: http://svn.freebsd.org/changeset/base/195918
>
> Log:
> Turns out that when a receiver forwards through its TNS's the
> processing code holds the read l
Author: dougb
Date: Wed Jul 29 00:15:39 2009
New Revision: 195936
URL: http://svn.freebsd.org/changeset/base/195936
Log:
Update to version 9.6.1-P1 which addresses a remote DoS vulnerability:
Receipt of a specially-crafted dynamic update message may
cause BIND 9 servers to exi
Author: simon
Date: Wed Jul 29 00:14:14 2009
New Revision: 195935
URL: http://svn.freebsd.org/changeset/base/195935
Log:
Fix BIND named(8) dynamic update message remote DoS.
Obtained from:ISC
Security: FreeBSD-SA-09:12.bind
Security: CVE-2009-0696
Approved by: so (sim
Author: dougb
Date: Wed Jul 29 00:13:47 2009
New Revision: 195934
URL: http://svn.freebsd.org/changeset/base/195934
Log:
Apply the patch derived from version 9.6.1-P1 which addresses a remote
DoS vulnerability:
Receipt of a specially-crafted dynamic update message may
cause
Author: dougb
Date: Tue Jul 28 23:59:22 2009
New Revision: 195933
URL: http://svn.freebsd.org/changeset/base/195933
Log:
Update to version 9.4.3-P3 which addresses a remote DoS vulnerability:
Receipt of a specially-crafted dynamic update message may
cause BIND 9 servers to exi
Author: dougb
Date: Tue Jul 28 23:42:39 2009
New Revision: 195932
URL: http://svn.freebsd.org/changeset/base/195932
Log:
These files don't belong in contrib at all anymore, so remove them.
Deleted:
stable/7/contrib/bind9/FREEBSD-Upgrade
stable/7/contrib/bind9/FREEBSD-Xlist
_
Author: dougb
Date: Tue Jul 28 23:24:45 2009
New Revision: 195931
URL: http://svn.freebsd.org/changeset/base/195931
Log:
Tag the 9.4.3-P3 release
Added:
vendor/bind9/9.4.3-P3/
- copied from r195930, vendor/bind9/dist-9.4/
___
svn-src-all@freebs
Author: dougb
Date: Tue Jul 28 23:23:48 2009
New Revision: 195930
URL: http://svn.freebsd.org/changeset/base/195930
Log:
Vendor import of BIND 9.4.3-P3
Modified:
vendor/bind9/dist-9.4/CHANGES
vendor/bind9/dist-9.4/bin/named/update.c
vendor/bind9/dist-9.4/version
Modified: vendor/bind9/di
Author: dougb
Date: Tue Jul 28 22:59:11 2009
New Revision: 195929
URL: http://svn.freebsd.org/changeset/base/195929
Log:
Tag the 9.6.1-P1 release
Added:
vendor/bind9/9.6.1-P1/
- copied from r195928, vendor/bind9/dist/
___
svn-src-all@freebsd.or
Author: dougb
Date: Tue Jul 28 22:58:40 2009
New Revision: 195928
URL: http://svn.freebsd.org/changeset/base/195928
Log:
Vendor import of BIND 9.6.1-P1
Modified:
vendor/bind9/dist/CHANGES
vendor/bind9/dist/bin/named/update.c
vendor/bind9/dist/version
Modified: vendor/bind9/dist/CHANGES
=
Author: rwatson
Date: Tue Jul 28 22:17:34 2009
New Revision: 195927
URL: http://svn.freebsd.org/changeset/base/195927
Log:
Revise header comments for vnet.h as we now implement VNET_SYSINIT, not
just VNET_DEFINE in vnet.h.
Approved by: re (vimage blanket)
Modified:
head/sys/net/vnet.h
Author: rwatson
Date: Tue Jul 28 21:52:24 2009
New Revision: 195926
URL: http://svn.freebsd.org/changeset/base/195926
Log:
Rework vnode argument auditing to follow the same structure, in order
to avoid exposing ARG_ macros/flag values outside of the audit code in
order to name which one of t
Author: rwatson
Date: Tue Jul 28 21:39:58 2009
New Revision: 195925
URL: http://svn.freebsd.org/changeset/base/195925
Log:
Audit file descriptors passed to fooat(2) system calls, which are used
instead of the root/current working directory as the starting point for
lookups. Up to two such d
Author: julian
Date: Tue Jul 28 19:58:07 2009
New Revision: 195923
URL: http://svn.freebsd.org/changeset/base/195923
Log:
Startup the vnet part of initialization a bit after the global part.
Fixes crash on boot if ipfw compiled in.
Submitted by: tegge@
Reviewed by: tegge@
Approved by
Author: julian
Date: Tue Jul 28 19:43:27 2009
New Revision: 195922
URL: http://svn.freebsd.org/changeset/base/195922
Log:
Somewhere along the line accept sockets stopped honoring the
FIB selected for them. Fix this.
Reviewed by: ambrisko
Approved by: re (kib)
MFC after:3 days
M
> ok I wonder where the "right" place to add it is.. probably keep it
> at SI_SUB_PROTO_IFATTACHDOMAIN, SI_ORDER_ANY - 256.
>
> an you check if that fixes it? possibly moving the 256 to 255?
That depends on the wanted order between ipfw_init() and vnet_ipfw_init().
Using (SI_SUB_PROTO_IFATTACH
Thanks for committing this fix.
___
svn-src-all@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/svn-src-all
To unsubscribe, send any mail to "svn-src-all-unsubscr...@freebsd.org"
Tor Egge wrote:
This commit causes my laptop to hang during boot.
ipfw and ipfw_nat are both compiled into the kernel:
options IPFIREWALL
options IPFIREWALL_VERBOSE
options IPFIREWALL_VERBOSE_LIMIT=100
options IPFIREWALL_FORWARD
options IPFIREWALL_NAT
opt
This commit causes my laptop to hang during boot.
ipfw and ipfw_nat are both compiled into the kernel:
options IPFIREWALL
options IPFIREWALL_VERBOSE
options IPFIREWALL_VERBOSE_LIMIT=100
options IPFIREWALL_FORWARD
options IPFIREWALL_NAT
options IPDI
Author: qingli
Date: Tue Jul 28 17:16:54 2009
New Revision: 195921
URL: http://svn.freebsd.org/changeset/base/195921
Log:
The new flow table caches both the routing table entry as well as the
L2 information. For an indirect route the cached L2 entry contains the
MAC address of the gateway. T
Author: tuexen
Date: Tue Jul 28 15:07:41 2009
New Revision: 195919
URL: http://svn.freebsd.org/changeset/base/195919
Log:
Fix a bug where wrong initialization value
in used for an SCTP specific sysctl variable.
Approved by: re, rrs(mentor).
MFC after: 2 weeks.
Modified:
head/sys/neti
Author: rrs
Date: Tue Jul 28 14:09:06 2009
New Revision: 195918
URL: http://svn.freebsd.org/changeset/base/195918
Log:
Turns out that when a receiver forwards through its TNS's the
processing code holds the read lock (when processing a
FWD-TSN for pr-sctp). If it finds stranded data that
c
On Tue, Jul 14, 2009 at 09:19:13PM +, Alexander Kabaev wrote:
> Author: kan
> Date: Tue Jul 14 21:19:13 2009
> New Revision: 195697
> URL: http://svn.freebsd.org/changeset/base/195697
>
> Log:
> Second attempt at eliminating .text relocations in shared libraries
> compiled with stack prote
26 matches
Mail list logo