FreeBSD/src e9d3512share/man/man4 ix.4, sys/dev/ixgbe ixgbe_e610.c ixgbe_fw_logging.c

ix(4): Add support for firmware logging for E610 adapters

This is part 3 of the support for the new Intel Ethernet E610
family of devices

The ix driver now enables firmware logging on Intel E610 devices
for debugging with Customer Support. Logs are enabled by default
and generated in binary format that requires decoding by support
teams. The collected data is firmware and hardware related for
debugging purposes only.

When the driver loads, it creates a fw_log sysctl node under the
debug section. Events are organized into categories (modules) for
targeted logging, and users can adjust verbosity levels as needed.

This adds sysctl support for the firmware logging feature and
updates the ix(4) manual page with documentation.

Signed-off-by: Yogesh Bhosale <yogesh.bhosale at intel.com>

    [8 lines not shown]
DeltaFile
+486-0sys/dev/ixgbe/ixgbe_e610.c
+467-0sys/dev/ixgbe/ixgbe_fw_logging.c
+36-0sys/dev/ixgbe/ixgbe_osdep.c
+33-1share/man/man4/ix.4
+18-4sys/dev/ixgbe/if_ix.c
+13-0sys/dev/ixgbe/ixgbe_e610.h
+1,053-56 files not shown
+1,066-512 files

FreeBSD/src b6dd9d3. CONTRIBUTING.md

CONTRIBUTING: fix typos in GitHub contribution guide

Signed-off-by: Roman <nnov.brody at gmail.com>
Pull-request: https://github.com/freebsd/freebsd-src/pull/2156
DeltaFile
+4-4CONTRIBUTING.md
+4-41 files

FreeBSD/src 69e8d8bsys/netinet tcp_hpts_test.c

tests/sys/netinet/tcp_hpts: Make a socket available in mock inpcbs

After commit 9b76228006d8, tcp_hptsi() dereferences inp_socket in order
to get the inpcb's VNET.  This means that mock inpcbs created by the
HPTS test fixture must set inp_socket.  Also set the current VNET there;
previously, it was NULL, and this was not noticed since VNET_DEBUG is
disabled even in debug kernels.

Fixes:  9b76228006d8 ("inpcb: retire inp_vnet")
DeltaFile
+8-0sys/netinet/tcp_hpts_test.c
+8-01 files

FreeBSD/src dce5659sys/kern kern_clocksource.c

epoch: Don't idle CPUs when there's pending epoch work

The epoch(9) subsystem implements per-CPU queues of object destructors
which get invoked once it is safe to do so.  These queues are polled via
hardclock().

When a CPU is about to go idle, we reduce the hardclock frequency to 1Hz
by default, to avoid unneeded wakeups.  This means that if there is any
garbage in these destructor queues, it won't be cleared for at least 1s
(and possibly longer) even if it would otherwise be safe to do so.

epoch_drain_callbacks() is used in some places to provide a barrier,
ensuring that all garbage present in the destructor queues is cleaned up
before returning.  It's implemented by adding a fake destructor in the
queues and blocking until it gets run on all CPUs.  The above-described
phenomenon means that it can take a long time for these calls to return,
even (especially) when some CPUs are idle.  This causes long delays when
destroying VNET jails, for instance, as epoch_drain_callbacks() is
invoked each time a network interface is destroyed.

    [11 lines not shown]
DeltaFile
+2-1sys/kern/kern_clocksource.c
+2-11 files

FreeBSD/src 30b7621tests/sys/net if_geneve.sh if_gif.sh

tests/sys/net: Set require.kmods where appropriate
DeltaFile
+14-85tests/sys/net/if_geneve.sh
+6-20tests/sys/net/if_gif.sh
+3-17tests/sys/net/if_stf.sh
+4-8tests/sys/net/if_wg.sh
+27-1304 files

FreeBSD/src 14a47a8sys/netinet in_pcb.c, sys/netinet6 in6_pcb.c

inpcb: remove always true condition in in_pcblookup_local()

We are searching through the hash that has only wildcard bindings.
This was missed by fdb987bebddf05e15a5af840379c7715a94aec1c.

Reviewed by:            markj
Differential Revision:  https://reviews.freebsd.org/D56488
DeltaFile
+1-2sys/netinet/in_pcb.c
+1-2sys/netinet6/in6_pcb.c
+2-42 files

FreeBSD/src 2862a33sys/kern tty.c, tests/sys/kern tiocnotty.c Makefile

tty: Avoid leaving dangling pointers in tty_drop_ctty()

The TIOCNOTTY handler detaches the calling process from its controlling
terminal.  It clears the link from the session to the tty, but not the
pointers from the tty to the session and process group.  This means that
sess_release() doesn't call tty_rel_sess(), and that pgdelete() doesn't
call tty_rel_pgrp(), so the pointers are left dangling.

Fix this by clearing pointers in tty_drop_ctty().  Add a standalone
regression test.

Approved by:    so
Security:       FreeBSD-SA-26:10.tty
Security:       CVE-2026-5398
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    kib, kevans
Fixes:          1b50b999f9b5 ("tty: implement TIOCNOTTY")
Differential Revision:  https://reviews.freebsd.org/D56046
DeltaFile
+82-0tests/sys/kern/tiocnotty.c
+4-0sys/kern/tty.c
+1-0tests/sys/kern/Makefile
+87-03 files

FreeBSD/src a2f6f2dlib/libc/x86/sys pkru.3, sys/amd64/amd64 sys_machdep.c pmap.c

pkru: Fix handling of 1GB largepage mappings

pmap_pkru_update_range() did not handle the case where a PDPE has PG_PS
set.  More generally, the SET_PKRU and CLEAR_PKRU sysarch
implementations did not check whether the request covers a "boundary" vm
map entry.  Fix this, add the missing PG_PS test, and add some tests.

Approved by:    so
Security:       FreeBSD-SA-26:11.amd64
Security:       CVE-2026-6386
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    kib, alc
Differential Revision:  https://reviews.freebsd.org/D56184
DeltaFile
+187-0tests/sys/posixshm/posixshm_test.c
+34-9sys/amd64/amd64/sys_machdep.c
+32-0sys/vm/vm_map.c
+17-3sys/amd64/amd64/pmap.c
+3-0lib/libc/x86/sys/pkru.3
+1-0sys/vm/vm_map.h
+274-126 files

FreeBSD/src 6c36e5d. UPDATING, sys/conf newvers.sh

Add UPDATING entries and bump version

Approved by:    so
DeltaFile
+11-0UPDATING
+1-1sys/conf/newvers.sh
+12-12 files

FreeBSD/src 6c9dd75sys/vm vm_fault.c

vm_fault: Reset m_needs_zeroing properly

- When allocating a page, we should only consider the PG_ZERO flag when
  handling the top-level page.
- Unconditionally reset the flag when restarting the fault handler.
  Previously, vm_fault_busy_sleep() would fail to reset it.

Approved by:    so
Security:       FreeBSD-EN-26:05.vm
PR:             294039
Reviewed by:    kib
Tested by:      Peter Much <pmc at citylink.dinoex.sub.org>
MFC after:      3 days
Fixes:          cff67bc43df1 ("vm_fault: only rely on PG_ZERO when the page was newly allocated")
Differential Revision:  https://reviews.freebsd.org/D56234

(cherry picked from commit 04132e01004316ddd0e0cde6ef15b100b7b1844d)
(cherry picked from commit 50f7b62f0862f764215cee98547d5b8c0979ec26)
DeltaFile
+3-4sys/vm/vm_fault.c
+3-41 files

FreeBSD/src 979e645lib/libc/x86/sys pkru.3, sys/amd64/amd64 sys_machdep.c pmap.c

pkru: Fix handling of 1GB largepage mappings

pmap_pkru_update_range() did not handle the case where a PDPE has PG_PS
set.  More generally, the SET_PKRU and CLEAR_PKRU sysarch
implementations did not check whether the request covers a "boundary" vm
map entry.  Fix this, add the missing PG_PS test, and add some tests.

Approved by:    so
Security:       FreeBSD-SA-26:11.amd64
Security:       CVE-2026-6386
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    kib, alc
Differential Revision:  https://reviews.freebsd.org/D56184
DeltaFile
+187-0tests/sys/posixshm/posixshm_test.c
+34-9sys/amd64/amd64/sys_machdep.c
+32-0sys/vm/vm_map.c
+17-3sys/amd64/amd64/pmap.c
+3-0lib/libc/x86/sys/pkru.3
+1-0sys/vm/vm_map.h
+274-126 files

FreeBSD/src f37c6e3sys/kern sys_timerfd.c

timerfd: Fix interval callout scheduling

When a timerfd interval callout misses its scheduled activation time, a
differential is calculated based on the actual activation time and the
scheduled activation time. This differential is divided by the timerfd's
interval time and the quotient is added to the timerfd's counter.

Before this change, the next callout was scheduled to activate at:
scheduled activation time + timerfd interval.

This change fixes the scheduling of the next callout to activate at:
actual activation time + timerfd interval - remainder.

Security:               FreeBSD-26:06.timerfd
Approved by:            so
Reviewed by:            markj
Differential Revision:  https://reviews.freebsd.org/D55790
MFC after:              2 weeks


    [2 lines not shown]
DeltaFile
+13-11sys/kern/sys_timerfd.c
+13-111 files

FreeBSD/src 0224acf. UPDATING, sys/conf newvers.sh

Add UPDATING entries and bump version

Approved by:    so
DeltaFile
+14-0UPDATING
+1-1sys/conf/newvers.sh
+15-12 files

FreeBSD/src 44077c0sys/kern tty.c, tests/sys/kern tiocnotty.c Makefile

tty: Avoid leaving dangling pointers in tty_drop_ctty()

The TIOCNOTTY handler detaches the calling process from its controlling
terminal.  It clears the link from the session to the tty, but not the
pointers from the tty to the session and process group.  This means that
sess_release() doesn't call tty_rel_sess(), and that pgdelete() doesn't
call tty_rel_pgrp(), so the pointers are left dangling.

Fix this by clearing pointers in tty_drop_ctty().  Add a standalone
regression test.

Approved by:    so
Security:       FreeBSD-SA-26:10.tty
Security:       CVE-2026-5398
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    kib, kevans
Fixes:          1b50b999f9b5 ("tty: implement TIOCNOTTY")
Differential Revision:  https://reviews.freebsd.org/D56046
DeltaFile
+82-0tests/sys/kern/tiocnotty.c
+4-0sys/kern/tty.c
+1-0tests/sys/kern/Makefile
+87-03 files

FreeBSD/src 4d22b39sys/vm vm_fault.c

vm_fault: Reset m_needs_zeroing properly

- When allocating a page, we should only consider the PG_ZERO flag when
  handling the top-level page.
- Unconditionally reset the flag when restarting the fault handler.
  Previously, vm_fault_busy_sleep() would fail to reset it.

Approved by:    so
Security:       FreeBSD-EN-26:05.vm
PR:             294039
Reviewed by:    kib
Tested by:      Peter Much <pmc at citylink.dinoex.sub.org>
MFC after:      3 days
Fixes:          cff67bc43df1 ("vm_fault: only rely on PG_ZERO when the page was newly allocated")
Differential Revision:  https://reviews.freebsd.org/D56234

(cherry picked from commit 04132e01004316ddd0e0cde6ef15b100b7b1844d)
(cherry picked from commit 9b7c0f4f81f06424899094d4381dede79669b623)
DeltaFile
+3-4sys/vm/vm_fault.c
+3-41 files

FreeBSD/src 6dc9b78. UPDATING, sys/conf newvers.sh

Add UPDATING entries and bump version

Approved by:    so
DeltaFile
+14-0UPDATING
+1-1sys/conf/newvers.sh
+15-12 files

FreeBSD/src 5787df3lib/libc/x86/sys pkru.3, sys/amd64/amd64 sys_machdep.c pmap.c

pkru: Fix handling of 1GB largepage mappings

pmap_pkru_update_range() did not handle the case where a PDPE has PG_PS
set.  More generally, the SET_PKRU and CLEAR_PKRU sysarch
implementations did not check whether the request covers a "boundary" vm
map entry.  Fix this, add the missing PG_PS test, and add some tests.

Approved by:    so
Security:       FreeBSD-SA-26:11.amd64
Security:       CVE-2026-6386
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    kib, alc
Differential Revision:  https://reviews.freebsd.org/D56184
DeltaFile
+187-0tests/sys/posixshm/posixshm_test.c
+34-9sys/amd64/amd64/sys_machdep.c
+32-0sys/vm/vm_map.c
+17-3sys/amd64/amd64/pmap.c
+3-0lib/libc/x86/sys/pkru.3
+1-0sys/vm/vm_map.h
+274-126 files

FreeBSD/src df8d2f9sys/kern sys_timerfd.c

timerfd: Fix interval callout scheduling

When a timerfd interval callout misses its scheduled activation time, a
differential is calculated based on the actual activation time and the
scheduled activation time. This differential is divided by the timerfd's
interval time and the quotient is added to the timerfd's counter.

Before this change, the next callout was scheduled to activate at:
scheduled activation time + timerfd interval.

This change fixes the scheduling of the next callout to activate at:
actual activation time + timerfd interval - remainder.

Security:               FreeBSD-26:06.timerfd
Approved by:            so
Reviewed by:            markj
Differential Revision:  https://reviews.freebsd.org/D55790
MFC after:              2 weeks


    [2 lines not shown]
DeltaFile
+13-11sys/kern/sys_timerfd.c
+13-111 files

FreeBSD/src af29432sys/kern tty.c, tests/sys/kern/tty tiocnotty.c Makefile

tty: Avoid leaving dangling pointers in tty_drop_ctty()

The TIOCNOTTY handler detaches the calling process from its controlling
terminal.  It clears the link from the session to the tty, but not the
pointers from the tty to the session and process group.  This means that
sess_release() doesn't call tty_rel_sess(), and that pgdelete() doesn't
call tty_rel_pgrp(), so the pointers are left dangling.

Fix this by clearing pointers in tty_drop_ctty().  Add a standalone
regression test.

Approved by:    so
Security:       FreeBSD-SA-26:10.tty
Security:       CVE-2026-5398
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    kib, kevans
Fixes:          1b50b999f9b5 ("tty: implement TIOCNOTTY")
Differential Revision:  https://reviews.freebsd.org/D56046
DeltaFile
+82-0tests/sys/kern/tty/tiocnotty.c
+4-0sys/kern/tty.c
+1-0tests/sys/kern/tty/Makefile
+87-03 files

FreeBSD/src 1abe7easys/vm vm_fault.c

vm_fault: Reset m_needs_zeroing properly

- When allocating a page, we should only consider the PG_ZERO flag when
  handling the top-level page.
- Unconditionally reset the flag when restarting the fault handler.
  Previously, vm_fault_busy_sleep() would fail to reset it.

Approved by:    so
Security:       FreeBSD-EN-26:05.vm
PR:             294039
Reviewed by:    kib
Tested by:      Peter Much <pmc at citylink.dinoex.sub.org>
MFC after:      3 days
Fixes:          cff67bc43df1 ("vm_fault: only rely on PG_ZERO when the page was newly allocated")
Differential Revision:  https://reviews.freebsd.org/D56234

(cherry picked from commit 04132e01004316ddd0e0cde6ef15b100b7b1844d)
(cherry picked from commit 9b7c0f4f81f06424899094d4381dede79669b623)
DeltaFile
+3-4sys/vm/vm_fault.c
+3-41 files

FreeBSD/src 5eae7f2sys/kern tty.c, tests/sys/kern tiocnotty.c Makefile

tty: Avoid leaving dangling pointers in tty_drop_ctty()

The TIOCNOTTY handler detaches the calling process from its controlling
terminal.  It clears the link from the session to the tty, but not the
pointers from the tty to the session and process group.  This means that
sess_release() doesn't call tty_rel_sess(), and that pgdelete() doesn't
call tty_rel_pgrp(), so the pointers are left dangling.

Fix this by clearing pointers in tty_drop_ctty().  Add a standalone
regression test.

Approved by:    so
Security:       FreeBSD-SA-26:10.tty
Security:       CVE-2026-5398
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    kib, kevans
Fixes:          1b50b999f9b5 ("tty: implement TIOCNOTTY")
Differential Revision:  https://reviews.freebsd.org/D56046
DeltaFile
+82-0tests/sys/kern/tiocnotty.c
+4-0sys/kern/tty.c
+1-0tests/sys/kern/Makefile
+87-03 files

FreeBSD/src b8fc561lib/libc/x86/sys pkru.3, sys/amd64/amd64 sys_machdep.c pmap.c

pkru: Fix handling of 1GB largepage mappings

pmap_pkru_update_range() did not handle the case where a PDPE has PG_PS
set.  More generally, the SET_PKRU and CLEAR_PKRU sysarch
implementations did not check whether the request covers a "boundary" vm
map entry.  Fix this, add the missing PG_PS test, and add some tests.

Approved by:    so
Security:       FreeBSD-SA-26:11.amd64
Security:       CVE-2026-6386
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    kib, alc
Differential Revision:  https://reviews.freebsd.org/D56184
DeltaFile
+187-0tests/sys/posixshm/posixshm_test.c
+34-9sys/amd64/amd64/sys_machdep.c
+32-0sys/vm/vm_map.c
+17-3sys/amd64/amd64/pmap.c
+3-0lib/libc/x86/sys/pkru.3
+1-0sys/vm/vm_map.h
+274-126 files

FreeBSD/src f46210asys/kern tty.c, tests/sys/kern/tty tiocnotty.c Makefile

tty: Avoid leaving dangling pointers in tty_drop_ctty()

The TIOCNOTTY handler detaches the calling process from its controlling
terminal.  It clears the link from the session to the tty, but not the
pointers from the tty to the session and process group.  This means that
sess_release() doesn't call tty_rel_sess(), and that pgdelete() doesn't
call tty_rel_pgrp(), so the pointers are left dangling.

Fix this by clearing pointers in tty_drop_ctty().  Add a standalone
regression test.

Approved by:    so
Security:       FreeBSD-SA-26:10.tty
Security:       CVE-2026-5398
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    kib, kevans
Fixes:          1b50b999f9b5 ("tty: implement TIOCNOTTY")
Differential Revision:  https://reviews.freebsd.org/D56046
DeltaFile
+82-0tests/sys/kern/tty/tiocnotty.c
+4-0sys/kern/tty.c
+1-0tests/sys/kern/tty/Makefile
+87-03 files

FreeBSD/src 4c0e5e3lib/libc/x86/sys pkru.3, sys/amd64/amd64 sys_machdep.c pmap.c

pkru: Fix handling of 1GB largepage mappings

pmap_pkru_update_range() did not handle the case where a PDPE has PG_PS
set.  More generally, the SET_PKRU and CLEAR_PKRU sysarch
implementations did not check whether the request covers a "boundary" vm
map entry.  Fix this, add the missing PG_PS test, and add some tests.

Approved by:    so
Security:       FreeBSD-SA-26:11.amd64
Security:       CVE-2026-6386
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    kib, alc
Differential Revision:  https://reviews.freebsd.org/D56184
DeltaFile
+187-0tests/sys/posixshm/posixshm_test.c
+34-9sys/amd64/amd64/sys_machdep.c
+32-0sys/vm/vm_map.c
+17-3sys/amd64/amd64/pmap.c
+3-0lib/libc/x86/sys/pkru.3
+1-0sys/vm/vm_map.h
+274-126 files

FreeBSD/src 9331e62lib/libsys/x86 pkru.3, sys/amd64/amd64 sys_machdep.c pmap.c

pkru: Fix handling of 1GB largepage mappings

pmap_pkru_update_range() did not handle the case where a PDPE has PG_PS
set.  More generally, the SET_PKRU and CLEAR_PKRU sysarch
implementations did not check whether the request covers a "boundary" vm
map entry.  Fix this, add the missing PG_PS test, and add some tests.

Approved by:    so
Security:       FreeBSD-SA-26:11.amd64
Security:       CVE-2026-6386
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    kib, alc
Differential Revision:  https://reviews.freebsd.org/D56184
DeltaFile
+187-0tests/sys/posixshm/posixshm_test.c
+34-9sys/amd64/amd64/sys_machdep.c
+32-0sys/vm/vm_map.c
+17-3sys/amd64/amd64/pmap.c
+3-0lib/libsys/x86/pkru.3
+1-0sys/vm/vm_map.h
+274-126 files

FreeBSD/src 0c6b1e0sys/kern tty.c, tests/sys/kern/tty tiocnotty.c Makefile

tty: Avoid leaving dangling pointers in tty_drop_ctty()

The TIOCNOTTY handler detaches the calling process from its controlling
terminal.  It clears the link from the session to the tty, but not the
pointers from the tty to the session and process group.  This means that
sess_release() doesn't call tty_rel_sess(), and that pgdelete() doesn't
call tty_rel_pgrp(), so the pointers are left dangling.

Fix this by clearing pointers in tty_drop_ctty().  Add a standalone
regression test.

Approved by:    so
Security:       FreeBSD-SA-26:10.tty
Security:       CVE-2026-5398
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    kib, kevans
Fixes:          1b50b999f9b5 ("tty: implement TIOCNOTTY")
Differential Revision:  https://reviews.freebsd.org/D56046
DeltaFile
+82-0tests/sys/kern/tty/tiocnotty.c
+4-0sys/kern/tty.c
+1-0tests/sys/kern/tty/Makefile
+87-03 files

FreeBSD/src ca87c0blib/libsys/x86 pkru.3, sys/amd64/amd64 sys_machdep.c pmap.c

pkru: Fix handling of 1GB largepage mappings

pmap_pkru_update_range() did not handle the case where a PDPE has PG_PS
set.  More generally, the SET_PKRU and CLEAR_PKRU sysarch
implementations did not check whether the request covers a "boundary" vm
map entry.  Fix this, add the missing PG_PS test, and add some tests.

Approved by:    so
Security:       FreeBSD-SA-26:11.amd64
Security:       CVE-2026-6386
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    kib, alc
Differential Revision:  https://reviews.freebsd.org/D56184
DeltaFile
+187-0tests/sys/posixshm/posixshm_test.c
+34-9sys/amd64/amd64/sys_machdep.c
+32-0sys/vm/vm_map.c
+17-3sys/amd64/amd64/pmap.c
+3-0lib/libsys/x86/pkru.3
+1-0sys/vm/vm_map.h
+274-126 files

FreeBSD/src 093903asys/kern tty.c, tests/sys/kern/tty tiocnotty.c Makefile

tty: Avoid leaving dangling pointers in tty_drop_ctty()

The TIOCNOTTY handler detaches the calling process from its controlling
terminal.  It clears the link from the session to the tty, but not the
pointers from the tty to the session and process group.  This means that
sess_release() doesn't call tty_rel_sess(), and that pgdelete() doesn't
call tty_rel_pgrp(), so the pointers are left dangling.

Fix this by clearing pointers in tty_drop_ctty().  Add a standalone
regression test.

Approved by:    so
Security:       FreeBSD-SA-26:10.tty
Security:       CVE-2026-5398
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    kib, kevans
Fixes:          1b50b999f9b5 ("tty: implement TIOCNOTTY")
Differential Revision:  https://reviews.freebsd.org/D56046
DeltaFile
+82-0tests/sys/kern/tty/tiocnotty.c
+4-0sys/kern/tty.c
+1-0tests/sys/kern/tty/Makefile
+87-03 files

FreeBSD/src e8156a7share/man/man5 src.conf.5

src.conf.5: Regenerate

Last time I generated this, there were many copies of WITH_CASPER for
reasons unknown.

Sponsored by:           Netflix
DeltaFile
+7-435share/man/man5/src.conf.5
+7-4351 files

FreeBSD/src 3d2fd71share/mk src.opts.mk

src.opts.mk: Sort options

Sort the options in each of the sections alphabetically.

Sponsored by:           Netflix
DeltaFile
+4-4share/mk/src.opts.mk
+4-41 files