FreeBSD/ports df75a74comms/rxtx Makefile

comms/rxtx: pin to java 8

jdk11: javah: not found
jdk17+: error: invalid use of a restricted identifier 'yield'

PR:     292216
Approved-by:    maintainer timeout
DeltaFile
+3-0comms/rxtx/Makefile
+3-01 files

FreeBSD/ports 3ebf8d9devel/libdispatch/files patch-src_event_workqueue.c patch-CMakeLists.txt

devel/libdispatch: update to 6.1.1 release (+)

Release notes:  https://github.com/swiftlang/swift-corelibs-libdispatch/releases/tag/swift-6.1.1-RELEASE
DeltaFile
+37-36devel/libdispatch/files/patch-src_event_workqueue.c
+16-8devel/libdispatch/files/patch-CMakeLists.txt
+12-10devel/libdispatch/files/patch-src_shims_lock.c
+21-0devel/libdispatch/files/patch-cmake_modules_PkgConfigGeneration.cmake
+12-2devel/libdispatch/files/patch-src_internal.h
+13-0devel/libdispatch/files/patch-cmake_libdispatch.pc.in
+111-566 files not shown
+140-7012 files

LLVM/project 3ca2a5fllvm/include/llvm/CodeGen LivePhysRegs.h, llvm/test/CodeGen/AArch64 no-xzr-liveins.mir

[LivePhysRegs][AArch64] Remove XZR from live registers (#176324)

XZR is always a zero, and cannot be clobbered.

Co-authored-by: Benjamin Lerman <qsr at google.com>
DeltaFile
+30-0llvm/test/CodeGen/AArch64/no-xzr-liveins.mir
+3-0llvm/include/llvm/CodeGen/LivePhysRegs.h
+33-02 files

OPNSense/src 1877dadsys/netinet6 ip6_input.c, tools/regression/sockets/udp_pingpong udp_pingpong.c

ip6: add SO_BINTIME support

This adds support for obtaining timestamps from IPv6 packets using the
SO_BINTIME socket option, bringing it in parity with IPv4 behavior.

Enable testing the SO_BINTIME option in the relevant (manual) regression
test.

PR:             289423
Reviewed by:    markj
MFC after:      2 weeks
Differential Revision:  https://reviews.freebsd.org/D52504

(cherry picked from commit cd02a8a9f8be2085d5242606a79668dc3720e7b0)
DeltaFile
+37-18sys/netinet6/ip6_input.c
+3-5tools/regression/sockets/udp_pingpong/udp_pingpong.c
+40-232 files

LLVM/project 30af9c5llvm/docs AMDGPUUsage.rst

Comments
DeltaFile
+7-4llvm/docs/AMDGPUUsage.rst
+7-41 files

OPNSense/src 35ea0e4sys/netinet tcp_timer.c

tcp: save progress timeout cause in connection end status

TCP stats are currently incremented for the persist and progress
timeout conditions, but only the persist cause was saved in the
connection end info status, which in turn is logged in the
blackbox "connection end" event.

Reviewed by:    tuexen
Sponsored by:   Netflix, Inc.

(cherry picked from commit 1a61a673a3700c0ebdb0c5847b5923d0e3641f89)
DeltaFile
+5-2sys/netinet/tcp_timer.c
+5-21 files

OPNSense/src 5eed60asys/netinet tcp_syncache.c

tcp: improve SEG.ACK validation in SYN-RECEIVED

According to the fifth step in SEGMENT ARRIVES, send a RST segment in
response to an ACK segment which fails the SEG.ACK check, but leave
the endpoint state unchanged.
FreeBSD handles this correctly when entering the SYN-RECEIVED state via
the SYN-SENT state, but not in the SYN-cache code, which handles the
SYN-RECEIVED state via the LISTEN state.

This also fixes a panic reported by Alexander Leidinger.

Reviewed by:            jtl, glebius
Sponsored by:           Netflix, Inc.
Differential Revision:  https://reviews.freebsd.org/D52934

(cherry picked from commit 8af2f06a99b10c0d3ab9021949e750852662672a)
DeltaFile
+2-1sys/netinet/tcp_syncache.c
+2-11 files

OPNSense/src e9cca1asys/netinet tcp_syncache.c

tcp: remove stray ;

Sponsored by:   Netflix, Inc.

(cherry picked from commit 0faa9ca827a5e91273ba757bd87bd9e8179a0862)
DeltaFile
+1-1sys/netinet/tcp_syncache.c
+1-11 files

OPNSense/src d06545dsys/netinet tcp_syncache.c

tcp: improve credential handling in syncache

When adding a syncache entry, take a reference count of the
credentials while the inp is still locked.
Thanks to markj@ for providing a hint regarding the root cause.

Reported by:            David Marker
Reviewed by:            glebius
Tested by:              David Marker
Fixes:                  cbc9438f0505 ("tcp: improve ref count handling when processing SYN")
Sponsored by:           Netflix, Inc.
Differential Revision:  https://reviews.freebsd.org/D53380

(cherry picked from commit 44cb1e857f048d2326bdc1a032ccd2c04d2bcdc9)
DeltaFile
+9-5sys/netinet/tcp_syncache.c
+9-51 files

LLVM/project a2a5cdaflang/lib/Lower OpenACC.cpp, flang/test/Lower/OpenACC acc-cache.f90

[flang][acc] Fix cache directive for derived type components (#176022)

Fix the OpenACC cache directive to correctly handle derived type
designators (e.g., `data%array(i-4:i+4)`). The original implementation
assumed all cache operands were simple variables with symbols in the
symbol map. For derived type components, use
`gatherDataOperandAddrAndBounds()` to get the component address and
`addComponentOverride()` so subsequent accesses use the cached value.
DeltaFile
+103-0flang/test/Lower/OpenACC/acc-cache.f90
+61-31flang/lib/Lower/OpenACC.cpp
+164-312 files

OPNSense/src 8069bc6sys/netinet tcp_syncache.c

tcp: cleanup of syncache_expand()

* Consistently free the string after unlocking the sch, if possible.
* Remove the failure handling in case of sc != NULL, since this is
  not possible anymore.
* Remove the use of goto and instead return 0 in the three cases.
The only change in behavior is that in three out of the four cases,
where 0 is returned, *lsop is not set to NULL anymore. So the behavior
is now consistent and also documented in a comment. The current in
tree callers only look at *lsop, if and only if syncache_expand()
returns 1.

Reviewed by:            Peter Lei
Sponsored by:           Netflix, Inc.
Differential Revision:  https://reviews.freebsd.org/D52948

(cherry picked from commit aafdbf83b926519cb47de8f16a1a40c1ef3c84b5)
DeltaFile
+15-18sys/netinet/tcp_syncache.c
+15-181 files

OPNSense/src 5e8113asys/netinet tcp_syncache.c

tcp: improve sending of SYN-cookies

Ensure that when the sysctl-variable net.inet.tcp.syncookies_only is
non zero, SYN-cookies are sent and no SYN-cache entry is added to the
SYN-cache. In particular, this behavior should not depend on the value
of the sysctl-variable net.inet.tcp.syncookies, which controls whether
SYN cookies are used in combination with the SYN-cache to deal with
bucket overflows.
Also ensure that tcps_sc_completed does not include TCP connections
established via a SYN-cookie.
While there, make V_tcp_syncookies and V_tcp_syncookiesonly bool
instead of int, since they are used as boolean variables.

Reviewed by:            rscheff, cc, Peter Lei, Nick Banks
Sponsored by:           Netflix, Inc.
Differential Revision:  https://reviews.freebsd.org/D52225

(cherry picked from commit 7b57f2513361fb98fd5e2262f130989fe65946c6)
DeltaFile
+46-39sys/netinet/tcp_syncache.c
+46-391 files

OPNSense/src 7e9fb66sys/netinet tcp_syncache.c

tcp: unlock before syncookie_expand()

The function doesn't need a lock on sch.  It uses the pointer as value for
the SipHash calculation.

Reviewed by:            tuexen
Differential Revision:  https://reviews.freebsd.org/D50898

(cherry picked from commit 0809d26de24defdc4a2ae161357566c02dc163d1)
DeltaFile
+3-4sys/netinet/tcp_syncache.c
+3-41 files

OPNSense/src 9c793e0sys/netinet tcp_syncache.c

tcp: increase tcps_sc_recvcookie only in the syncache_expand()

The syncookie_expand() is called from syncookie_cmp() in INVARIANTS mode
to confirm that values calculated via syncookies mechanism match those
stored in the syncache entry.  This creates a counting bug, that with
INVARIANTS every successful use of syncache also counts as use of a
syncookie.

Reviewed by:            tuexen
Differential Revision:  https://reviews.freebsd.org/D50897

(cherry picked from commit 3ed8d5645dd42a7c080ba800cf6d25cb7e147d7e)
DeltaFile
+3-2sys/netinet/tcp_syncache.c
+3-21 files

OPNSense/src 653fe47sys/netinet tcp_syncache.c

tcp: refactor debug function syncookie_cmp()

- Don't bzero() the test structure.  All fields checked are set by
  syncache_expand().
- Don't allocate TCP address logging string if there is nothing to report.
- Mark hash bucket argument as pointer to const.
- Make it void.

Differential Revision:  https://reviews.freebsd.org/D50896

(cherry picked from commit e9e6a025b4523c9aa2885e892495601964e03056)
DeltaFile
+22-21sys/netinet/tcp_syncache.c
+22-211 files

OPNSense/src 7c4a53csys/netinet tcp_syncache.c

tcp: rename syncookie_lookup() into syncookie_expand() and make it bool

This function always returns the same pointer it was passed.  With new
name and return type the code is easier to understand.  Mark the hash
bucket argument as pointer to const, since function doesn't modify it,
just uses value as integer.  No functional changes.

Reviewed by:            tuexen
Differential Revision:  https://reviews.freebsd.org/D50895

(cherry picked from commit 6538742c1aaca3ce522ccea95007dfa9686c78dd)
DeltaFile
+13-11sys/netinet/tcp_syncache.c
+13-111 files

OPNSense/src 3e999afsys/netinet tcp_syncache.c

tcp: micro-optimize SYN-cookie expansion

Only compute wscale when it is actually used. While there, change the
type of wscale to u_int as suggested by glebius.
No functional change intended.

Reviewed by:            glebius, rscheff (older version)
Sponsored by:           Netflix, Inc.
Differential Revision:  https://reviews.freebsd.org/D52296

(cherry picked from commit 341d1aabc13e47911d2eb38e857b90f7d356134e)
DeltaFile
+8-6sys/netinet/tcp_syncache.c
+8-61 files

OPNSense/src a15cc76sys/netinet tcp_syncache.c

tcp: fix typo in comment

Reviewed by:    tuexen
Sponsored by:   Netflix, Inc.

(cherry picked from commit daac364e611532c7bfd4bb20f9fea8d365496aa1)
DeltaFile
+1-1sys/netinet/tcp_syncache.c
+1-11 files

NetBSD/pkgsrc 8QHOUxXeditors/joe Makefile

   joe: fix build on NetBSD-current
VersionDeltaFile
1.43+3-1editors/joe/Makefile
+3-11 files

OPNSense/src 3cb252bsys/netinet tcp_syncache.c

tcp: remove stray ;

No functional change intended.

Sponsored by:           Netflix, Inc.

(cherry picked from commit 941b8ecdc08749eeec1b88aac0442dad8cb8fb09)
DeltaFile
+1-1sys/netinet/tcp_syncache.c
+1-11 files

FreeBSD/ports 1e4d3faeditors/openoffice-devel/files patch-configure.ac

editors/openoffice-devel: fix previous commit

Fix the previous commit for the python 3.12 build fix.  The incorrect
version of the configure change was inadvertently committed.

PR:             292190
Fixes:          96fb41419355 - main - editors/openoffice-devel: Fix with python >= 3.12
DeltaFile
+1-1editors/openoffice-devel/files/patch-configure.ac
+1-11 files

OPNSense/src 90725e4sys/netinet tcp_syncache.c

tcp: close two minor races with debug messages

The syncache entry is locked by the hash bucket lock. After running
SCH_UNLOCK(), we have no guarantee that the syncache entry still
exists.

Resolve the race by moving SCH_UNLOCK() after the log() call which
reads variables from the syncache entry.

Reviewed by:    rrs, tuexen, Nick Banks
Sponsored by:   Netflix
MFC after:      3 days
Differential Revision:  https://reviews.freebsd.org/D52868

(cherry picked from commit ad38f6a0b466bf05a0d40ce1daa8c7bce0936271)
DeltaFile
+2-2sys/netinet/tcp_syncache.c
+2-21 files

OPNSense/src fa831e1sys/netinet tcp_syncache.c

tcp: improve segment validation in SYN-RECEIVED

The validation of SEG.SEQ (first step in SEGMENT ARRIVES of RFC 9293)
should be done before the validation of SEG.ACK (fifth step in
SEGMENT ARRIVES in RFC 9293).
Furthermore, when the SEG.SEQ validation fails, a challenge ACK
should be sent instead of sending a RST-segment and moving the
endpoint to CLOSED.

Reported by:            Tilnel on freebsd-net
Reviewed by:            Nick Banks
Sponsored by:           Netflix, Inc.
Differential Revision:  https://reviews.freebsd.org/D52849

(cherry picked from commit b7118461f9099876cb2c2923948f8fb647defd57)
DeltaFile
+17-15sys/netinet/tcp_syncache.c
+17-151 files

OPNSense/src f7726fesys/netinet tcp_syncache.c

tcp: cleanup syncache_expand()

Only validate SEG.SEQ and SEG.ACK when processing a real SYN-cache
entry. In the SYN-cookie case, these conditions are always true, since
the SYN-cache entry on the stack is constructed from the incoming
TCP segment.
While there, fix the logging messages.

Reviewed by:            Nick Banks
Sponsored by:           Netflix, Inc.
Differential Revision:  https://reviews.freebsd.org/D52816

(cherry picked from commit 3034fa3d4321fdc487428c9050711de9ce234567)
DeltaFile
+29-23sys/netinet/tcp_syncache.c
+29-231 files

OPNSense/src f380f0csys/netinet tcp_syncache.c

tcp: keep SYN-cache entry when sending of challenge ACK fails

Don't drop a SYN-cache entry just because a challenge ACK couldn't
be sent. This might only be a temporary failure.

Reviewed by:            Nick Banks, glebius, jtl
Sponsored by:           Netflix, Inc.
Differential Revision:  https://reviews.freebsd.org/D52840

(cherry picked from commit 7841b44f8491d69c75207d0f3a1eb34501d99edd)
DeltaFile
+4-13sys/netinet/tcp_syncache.c
+4-131 files

LLVM/project 3eed051llvm/lib/CodeGen/SelectionDAG SelectionDAG.cpp

[SelectionDAG] NFC: Remove redundant assert in ComputeNumSignBits.

This assert should not have existed, because just below it the code
bails out for that same condition. The case of the vector being a
scalable vector also shouldn't cause the compiler to crash with an
assertion failure, and instead it should just avoid analysing the
expression.
DeltaFile
+0-1llvm/lib/CodeGen/SelectionDAG/SelectionDAG.cpp
+0-11 files

OPNSense/src a3bbe4asys/netinet tcp_syncache.c tcp_syncache.h

tcp: apply rate limits to challenge ACKs

When sending challenge ACKs from the SYN-cache, apply the same rate
limiting as in other states.

Reviewed by:            cc, rrs
Sponsored by:           Netflix, Inc.
Differential Revision:  https://reviews.freebsd.org/D52754

(cherry picked from commit c2900b6e8255ba4f54dbd897cf42427db577ed3d)
DeltaFile
+24-4sys/netinet/tcp_syncache.c
+2-0sys/netinet/tcp_syncache.h
+26-42 files

OPNSense/src 4e8b404sys/netinet tcp_syncache.h

tcp: whitespace cleanup

No functional change intended.

Sponsored by:   Netflix, Inc.

(cherry picked from commit 40417930f6ba50f61990fb995dd071c6fd42d080)
DeltaFile
+2-2sys/netinet/tcp_syncache.h
+2-21 files

OPNSense/src d206fa4sys/netinet tcp_syncache.c

tcp: improve comments in the syncache code

Add a comment explaining why syncache entries are dropped and fix a
typo in a comment.

Reviewed by:            rrs, glebius
Sponsored by:           Netflix, Inc.
Differential Revision:  https://reviews.freebsd.org/D53564

(cherry picked from commit 17fb082104ee281365b72bd5135604cea5051df2)
DeltaFile
+12-1sys/netinet/tcp_syncache.c
+12-11 files

NetBSD/pkgsrc jeSOJMXmail/wmmail Makefile distinfo, mail/wmmail/patches patch-configure

   wmmail: fix build on NetBSD-current
VersionDeltaFile
1.1+15-0mail/wmmail/patches/patch-configure
1.40+3-1mail/wmmail/Makefile
1.9+2-1mail/wmmail/distinfo
+20-23 files