FreeBSD/src 5c4e558. UPDATING, sys/conf newvers.sh

Add UPDATING entries and bump version

Approved by:    so
DeltaFile
+5-0UPDATING
+1-1sys/conf/newvers.sh
+6-12 files

FreeBSD/src c4f53a1lib/librpcsec_gss svc_rpcsec_gss.c, sys/rpc/rpcsec_gss svc_rpcsec_gss.c

rpcsec_gss: Fix a stack overflow in svc_rpc_gss_validate()

svc_rpc_gss_validate() copies the input message into a stack buffer
without ensuring that the buffer is large enough.  Sure enough,
oa_length may be up to 400 bytes, much larger than the provided space.
This enables an unauthenticated user to trigger an overflow and obtain
remote code execution.

Add a runtime check which verifies that the copy won't overflow.

Approved by:    so
Security:       FreeBSD-SA-26:08.rpcsec_gss
Security:       CVE-2026-4747
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    rmacklem
Fixes:          a9148abd9da5d
DeltaFile
+9-1sys/rpc/rpcsec_gss/svc_rpcsec_gss.c
+8-1lib/librpcsec_gss/svc_rpcsec_gss.c
+17-22 files

FreeBSD/src 99ec7f9lib/librpcsec_gss svc_rpcsec_gss.c, sys/rpc/rpcsec_gss svc_rpcsec_gss.c

rpcsec_gss: Fix a stack overflow in svc_rpc_gss_validate()

svc_rpc_gss_validate() copies the input message into a stack buffer
without ensuring that the buffer is large enough.  Sure enough,
oa_length may be up to 400 bytes, much larger than the provided space.
This enables an unauthenticated user to trigger an overflow and obtain
remote code execution.

Add a runtime check which verifies that the copy won't overflow.

Approved by:    so
Security:       FreeBSD-SA-26:08.rpcsec_gss
Security:       CVE-2026-4747
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    rmacklem
Fixes:          a9148abd9da5d

(cherry picked from commit 143293c14f8de00c6d3de88cd23fc224e7014206)
DeltaFile
+9-1sys/rpc/rpcsec_gss/svc_rpcsec_gss.c
+8-1lib/librpcsec_gss/svc_rpcsec_gss.c
+17-22 files

FreeBSD/src e5ed09flib/librpcsec_gss svc_rpcsec_gss.c, sys/rpc/rpcsec_gss svc_rpcsec_gss.c

rpcsec_gss: Fix a stack overflow in svc_rpc_gss_validate()

svc_rpc_gss_validate() copies the input message into a stack buffer
without ensuring that the buffer is large enough.  Sure enough,
oa_length may be up to 400 bytes, much larger than the provided space.
This enables an unauthenticated user to trigger an overflow and obtain
remote code execution.

Add a runtime check which verifies that the copy won't overflow.

Approved by:    so
Security:       FreeBSD-SA-26:08.rpcsec_gss
Security:       CVE-2026-4747
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    rmacklem
Fixes:          a9148abd9da5d

(cherry picked from commit 143293c14f8de00c6d3de88cd23fc224e7014206)
DeltaFile
+9-1sys/rpc/rpcsec_gss/svc_rpcsec_gss.c
+8-1lib/librpcsec_gss/svc_rpcsec_gss.c
+17-22 files

FreeBSD/src b45e753sys/netinet tcp_subr.c

tcp: plug an mbuf leak

When a challenge ACK should be sent via tcp_send_challenge_ack(),
but the rate limiter suppresses the sending, free the mbuf chain.
The caller of tcp_send_challenge_ack() expects this similar to the
callers of tcp_respond().

Approved by:    so
Security:       FreeBSD-SA-26:06.tcp
Security:       CVE-2026-4247
Reviewed by:    lstewart
Tested by:      lstewart
Sponsored by:   Netflix, Inc.

(cherry picked from commit 6b2d6ccad2552e46a5c9c3ba70b2d0ed27c70ca8)
DeltaFile
+2-0sys/netinet/tcp_subr.c
+2-01 files

FreeBSD/src 1b00fdclib/librpcsec_gss svc_rpcsec_gss.c, sys/rpc/rpcsec_gss svc_rpcsec_gss.c

rpcsec_gss: Fix a stack overflow in svc_rpc_gss_validate()

svc_rpc_gss_validate() copies the input message into a stack buffer
without ensuring that the buffer is large enough.  Sure enough,
oa_length may be up to 400 bytes, much larger than the provided space.
This enables an unauthenticated user to trigger an overflow and obtain
remote code execution.

Add a runtime check which verifies that the copy won't overflow.

Approved by:    so
Security:       FreeBSD-SA-26:08.rpcsec_gss
Security:       CVE-2026-4747
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    rmacklem
Fixes:          a9148abd9da5d

(cherry picked from commit 143293c14f8de00c6d3de88cd23fc224e7014206)
DeltaFile
+9-1sys/rpc/rpcsec_gss/svc_rpcsec_gss.c
+8-1lib/librpcsec_gss/svc_rpcsec_gss.c
+17-22 files

FreeBSD/src 1fddb54sys/netinet tcp_subr.c

tcp: plug an mbuf leak

When a challenge ACK should be sent via tcp_send_challenge_ack(),
but the rate limiter suppresses the sending, free the mbuf chain.
The caller of tcp_send_challenge_ack() expects this similar to the
callers of tcp_respond().

Approved by:    so
Security:       FreeBSD-SA-26:06.tcp
Security:       CVE-2026-4247
Reviewed by:    lstewart
Tested by:      lstewart
Sponsored by:   Netflix, Inc.

(cherry picked from commit 6b2d6ccad2552e46a5c9c3ba70b2d0ed27c70ca8)
DeltaFile
+2-0sys/netinet/tcp_subr.c
+2-01 files

LLVM/project 620d322llvm/test/CodeGen/AMDGPU memintrinsic-unroll.ll, llvm/test/CodeGen/X86 vector-interleaved-load-i64-stride-7.ll vector-interleaved-store-i64-stride-7.ll

Merge remote-tracking branch 'origin' into users/ziqingluo/eng/PR-171920065
DeltaFile
+6,835-6,798llvm/test/CodeGen/AMDGPU/memintrinsic-unroll.ll
+6,432-6,562llvm/test/CodeGen/X86/vector-interleaved-load-i64-stride-7.ll
+4,982-4,991llvm/test/CodeGen/X86/vector-interleaved-store-i64-stride-7.ll
+4,590-4,623llvm/test/CodeGen/X86/vector-interleaved-store-i64-stride-6.ll
+4,364-4,820llvm/test/CodeGen/X86/vector-interleaved-load-i8-stride-8.ll
+3,814-3,848llvm/test/CodeGen/X86/vector-interleaved-load-i16-stride-8.ll
+31,017-31,6424,731 files not shown
+248,747-112,5604,737 files

LLVM/project 2beba0ellvm/lib/Target/AMDGPU AMDGPUCoExecSchedStrategy.h

Add a comment

Change-Id: I447f7f1fb185b18924cfd98249b5a0a05fef2484
DeltaFile
+7-0llvm/lib/Target/AMDGPU/AMDGPUCoExecSchedStrategy.h
+7-01 files

LLVM/project bdbe816lldb/test/API/functionalities/scripted_frame_provider/circular_dependency TestFrameProviderCircularDependency.py, lldb/test/API/functionalities/scripted_frame_provider/pass_through_prefix TestFrameProviderPassThroughPrefix.py

[lldb/test] Remove stale Windows expectedFailure decorators (NFC)

The @expectedFailureAll decorators for Windows (llvm.org/pr24778) are no
longer needed on test_circular_dependency_handle_command_in_init and
test_provider_receives_parent_frames.

Signed-off-by: Med Ismail Bennani <ismail at bennani.ma>
DeltaFile
+0-1lldb/test/API/functionalities/scripted_frame_provider/pass_through_prefix/TestFrameProviderPassThroughPrefix.py
+0-1lldb/test/API/functionalities/scripted_frame_provider/circular_dependency/TestFrameProviderCircularDependency.py
+0-22 files

LLVM/project 47e4282libunwind/test floatregister.pass.cpp aarch64_za_unwind.pass.cpp, libunwind/test/support func_bounds.h

[libunwind][Apple] Improve test coverage on Apple platforms (#186423)

Introduces a macro abstraction around capturing the bounds of a
function, which many platforms handle subtly differently (Mach-O, and
ELF, for example).

Also introduce an arm64[^-]* -> aarch64 available feature, to enable
more tests that would otherwise be excluded on Apple platforms, whose
target triples tend to take the form e.g. 'arm64-apple-macosx', rather
than 'aarch64-apple-macosx'.

Third, we implement the has-sme check using the appropriate sysctl, as
getauxval is not available on Darwin platforms.
DeltaFile
+40-0libunwind/test/support/func_bounds.h
+8-9libunwind/test/floatregister.pass.cpp
+14-1libunwind/test/aarch64_za_unwind.pass.cpp
+5-10libunwind/test/unwind_leaffunction.pass.cpp
+5-10libunwind/test/signal_unwind.pass.cpp
+5-10libunwind/test/forceunwind.pass.cpp
+77-402 files not shown
+89-408 files

FreeBSD/src 143293clib/librpcsec_gss svc_rpcsec_gss.c, sys/rpc/rpcsec_gss svc_rpcsec_gss.c

rpcsec_gss: Fix a stack overflow in svc_rpc_gss_validate()

svc_rpc_gss_validate() copies the input message into a stack buffer
without ensuring that the buffer is large enough.  Sure enough,
oa_length may be up to 400 bytes, much larger than the provided space.
This enables an unauthenticated user to trigger an overflow and obtain
remote code execution.

Add a runtime check which verifies that the copy won't overflow.

Approved by:    so
Security:       FreeBSD-SA-26:08.rpcsec_gss
Security:       CVE-2026-4747
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    rmacklem
Fixes:          a9148abd9da5d
DeltaFile
+9-1sys/rpc/rpcsec_gss/svc_rpcsec_gss.c
+8-1lib/librpcsec_gss/svc_rpcsec_gss.c
+17-22 files

FreeBSD/src 6b2d6ccsys/netinet tcp_subr.c

tcp: plug an mbuf leak

When a challenge ACK should be sent via tcp_send_challenge_ack(),
but the rate limiter suppresses the sending, free the mbuf chain.
The caller of tcp_send_challenge_ack() expects this similar to the
callers of tcp_respond().

Approved by:    so
Security:       FreeBSD-SA-26:06.tcp
Security:       CVE-2026-4247
Reviewed by:    lstewart
Tested by:      lstewart
Sponsored by:   Netflix, Inc.
DeltaFile
+2-0sys/netinet/tcp_subr.c
+2-01 files

LLVM/project bc987f9mlir/test/CAPI smt.c

[mlir][CAPI] Fix unused-but-set-variable warning in smt.c (NFC) (#188473)

llvm-project/mlir/test/CAPI/smt.c:37:21: warning: variable 'result' set
but not used [-Wunused-but-set-variable]
   37 |   MlirLogicalResult result = mlirTranslateModuleToSMTLIB(
      |                     ^
1 warning generated.
DeltaFile
+1-0mlir/test/CAPI/smt.c
+1-01 files

FreeBSD/ports dbcf335. UPDATING, math/coq Makefile pkg-plist

math/coq: Remove USES=emacs and associated flavors

Upstream removed all elisp files in 2018:
https://github.com/rocq-prover/rocq/commit/41d597866d4f79fe5109c25c6f5cc57d0ebf7f0f

Since there will no longer be coq-emacs_* packages, add an UPDATING
entry with migration instructions.

Sponsored by: The FreeBSD Foundation
DeltaFile
+14-0UPDATING
+3-4math/coq/Makefile
+0-6math/coq/pkg-plist
+17-103 files

LLVM/project dfee017llvm/lib/Target/AMDGPU AMDGPUCoExecSchedStrategy.cpp AMDGPUCoExecSchedStrategy.h, llvm/test/CodeGen/AMDGPU coexec-sched-effective-stall.mir

[AMDGPU] Add MemoryPipeline scheduling to Coexec sched

Change-Id: I52c476834155823d1ba998cdbbcb3ad6a7e6f2f5
DeltaFile
+323-0llvm/test/CodeGen/AMDGPU/coexec-sched-effective-stall.mir
+77-23llvm/lib/Target/AMDGPU/AMDGPUCoExecSchedStrategy.cpp
+18-0llvm/lib/Target/AMDGPU/AMDGPUCoExecSchedStrategy.h
+418-233 files

LLVM/project cd394f7clang/include/clang/ScalableStaticAnalysisFramework/Analyses PointerAssignments.h, clang/lib/Analysis UnsafeBufferUsage.cpp

[SSAF][PointerAssignments] Add PointerAssignments summary and extractor

Implement PointerAssignments summary and extractor, which uses
EntityPointerLevel. An assignment is extracted as a pair of
EntityPointerLevels. Extracted assignments form a directed graph
encoding abstracted pointer flow information.

rdar://172429193
DeltaFile
+1,150-0clang/unittests/ScalableStaticAnalysisFramework/Analyses/PointerAssignmentsTest.cpp
+383-0clang/lib/ScalableStaticAnalysisFramework/Analyses/PointerAssignments/PointerAssignmentsExtractor.cpp
+105-0clang/lib/ScalableStaticAnalysisFramework/Analyses/PointerAssignments/PointerAssignments.cpp
+64-0clang/include/clang/ScalableStaticAnalysisFramework/Analyses/PointerAssignments.h
+40-0clang/test/Analysis/Scalable/UnsafeBufferUsage/tu-summary.json
+17-7clang/lib/Analysis/UnsafeBufferUsage.cpp
+1,759-77 files not shown
+1,808-2513 files

LLVM/project bc88773llvm/include/llvm/Analysis IncrementalUpdateProfileAnalysis.h, llvm/include/llvm/Transforms/Scalar JumpThreading.h

verify incremental prof updates
DeltaFile
+48-114llvm/lib/Transforms/Scalar/JumpThreading.cpp
+68-0llvm/lib/Analysis/IncrementalUpdateProfileAnalysis.cpp
+64-0llvm/include/llvm/Analysis/IncrementalUpdateProfileAnalysis.h
+20-16llvm/test/Transforms/JumpThreading/select.ll
+3-26llvm/include/llvm/Transforms/Scalar/JumpThreading.h
+3-6llvm/test/Transforms/JumpThreading/static-profile.ll
+206-16223 files not shown
+241-19229 files

LLVM/project 5e83028clang/include/clang/ScalableStaticAnalysisFramework/Analyses UnsafeBufferUsage.h, clang/lib/Analysis UnsafeBufferUsage.cpp

[SSAF][UnsafeBufferUsage] Implement AST visitor that respects the constribution model and refactor

Previously, the UnsafeBufferUsage Extractor relied on the
`-Wunsafe-buffer-usage` API to traverse ASTs. The traversal did not
fully respect the contribution model of SSAF---RecordDecls inside
functions were not treated as contributors. Their fields were counted
as contributions of the enclosing function.

This commit adds an AST visitor that respects the contribution model
and will be shared by SSAF analyses.  The UnsafeBufferUsage Extractor
still relies on `-Wunsafe-buffer-usage` to provide the unsafe pointer
matching function.

In addition, this commit
- Factors common code in analyses to 'lib/ScalableStaticAnalysisFramework/Analyses/SSAFAnalysesCommon.h'.
- Registers the UnsafeBufferUsage extractor.
- Removes 'UnsafeBufferUsageExtractor.h' since it is useless except
  for the unit test. The unit test now directly uses proxy functions
  defined in 'UnsafeBufferUsageExtractor.cpp'.
DeltaFile
+723-0clang/unittests/ScalableStaticAnalysisFramework/Analyses/UnsafeBufferUsageTest.cpp
+0-702clang/unittests/ScalableStaticAnalysisFramework/Analyses/UnsafeBufferUsage/UnsafeBufferUsageTest.cpp
+119-134clang/lib/ScalableStaticAnalysisFramework/Analyses/UnsafeBufferUsage/UnsafeBufferUsageExtractor.cpp
+146-0clang/lib/ScalableStaticAnalysisFramework/Analyses/SSAFAnalysesCommon.h
+60-57clang/lib/Analysis/UnsafeBufferUsage.cpp
+61-0clang/include/clang/ScalableStaticAnalysisFramework/Analyses/UnsafeBufferUsage.h
+1,109-8938 files not shown
+1,128-1,04614 files

LLVM/project ff4d49bclang/test/CodeGenOpenCL builtins-amdgcn-gfx1250-wmma-w32.cl, llvm/lib/IR AutoUpgrade.cpp

[AMDGPU] Disable neg_lo[0:1] and neg_hi[0:1] on wmma_f32_16x16x32_bf16

This is the pilot change, the rest will follow the same idea.
DeltaFile
+46-46clang/test/CodeGenOpenCL/builtins-amdgcn-gfx1250-wmma-w32.cl
+53-31llvm/lib/Target/AMDGPU/VOP3PInstructions.td
+51-9llvm/lib/IR/AutoUpgrade.cpp
+30-30llvm/test/CodeGen/AMDGPU/wmma-nop-hoisting.mir
+4-52llvm/test/CodeGen/AMDGPU/llvm.amdgcn.wmma.imod.gfx1250.w32.ll
+20-20llvm/test/CodeGen/AMDGPU/wmma-coexecution-valu-hazards.mir
+204-18813 files not shown
+268-21519 files

LLVM/project daf7fe2clang/include/clang/Analysis/Analyses UnsafeBufferUsage.h, clang/include/clang/ScalableStaticAnalysisFramework/Analyses/UnsafeBufferUsage UnsafeBufferUsage.h

[ssaf][UnsafeBufferUsage] Add support for extracting unsafe pointers from all kinds of contributors (#184899)

- Generalize the `-Wunsafe-buffer-usage` API for finding unsafe pointers
in all kinds of `Decl`s
- Add support in SSAF-based UnsafeBufferUsage analysis for extracting
from various contributors
- Mock implementation of HandleTranslationUnit

rdar://171735836

This is a follow-up PR to
https://github.com/llvm/llvm-project/pull/182941
DeltaFile
+138-4clang/unittests/ScalableStaticAnalysisFramework/Analyses/UnsafeBufferUsage/UnsafeBufferUsageTest.cpp
+113-25clang/lib/ScalableStaticAnalysisFramework/Analyses/UnsafeBufferUsage/UnsafeBufferUsageExtractor.cpp
+44-17clang/lib/Analysis/UnsafeBufferUsage.cpp
+8-1clang/include/clang/Analysis/Analyses/UnsafeBufferUsage.h
+2-0clang/include/clang/ScalableStaticAnalysisFramework/Analyses/UnsafeBufferUsage/UnsafeBufferUsage.h
+305-475 files

FreeBSD/ports 3448203net/kea pkg-plist distinfo

net/kea: Update 3.0.2 => 3.0.3

Release Notes:
https://downloads.isc.org/isc/kea/3.0.3/Kea-3.0.3-ReleaseNotes.txt

PR:             294045
Security:       CVE-2026-3608
MFH:            2026Q1
(cherry picked from commit 74997bb77e7c4924c390d884b82772956195d4c4)
DeltaFile
+10-10net/kea/pkg-plist
+3-3net/kea/distinfo
+1-2net/kea/Makefile
+14-153 files

FreeBSD/ports 70fc40dnet/kea Makefile, net/kea-devel Makefile

net/kea{,-devel}: Use documented placeholder NETWOKING in RC scripts

PR:             293652
Approved by:    apevnev at me.com (maintainer)
Differential Revision:  https://reviews.freebsd.org/D55712

(cherry picked from commit 524b57fcc54dedb49920b8fec0ca8f19b82018b1)
DeltaFile
+1-1net/kea/Makefile
+1-1net/kea-devel/files/kea.in
+1-1net/kea/files/kea.in
+1-0net/kea-devel/Makefile
+4-34 files

FreeBSD/ports 74997bbnet/kea pkg-plist distinfo

net/kea: Update 3.0.2 => 3.0.3

Release Notes:
https://downloads.isc.org/isc/kea/3.0.3/Kea-3.0.3-ReleaseNotes.txt

PR:             294045
Security:       CVE-2026-3608
MFH:            2026Q1
DeltaFile
+10-10net/kea/pkg-plist
+3-3net/kea/distinfo
+1-2net/kea/Makefile
+14-153 files

NetBSD/src 6DWRMbkshare/misc acronyms.comp

   +ARC  Authenticated Received Chain
VersionDeltaFile
1.423+2-1share/misc/acronyms.comp
+2-11 files

LLVM/project 0dd85a0clang/include/clang/ScalableStaticAnalysisFramework/Analyses PointerAssignments.h, clang/lib/Analysis UnsafeBufferUsage.cpp

[SSAF][PointerAssignments] Add PointerAssignments summary and extractor

Implement PointerAssignments summary and extractor, which uses
EntityPointerLevel. An assignment is extracted as a pair of
EntityPointerLevels. Extracted assignments form a directed graph
encoding abstracted pointer flow information.

rdar://172429193
DeltaFile
+1,150-0clang/unittests/ScalableStaticAnalysisFramework/Analyses/PointerAssignmentsTest.cpp
+383-0clang/lib/ScalableStaticAnalysisFramework/Analyses/PointerAssignments/PointerAssignmentsExtractor.cpp
+105-0clang/lib/ScalableStaticAnalysisFramework/Analyses/PointerAssignments/PointerAssignments.cpp
+64-0clang/include/clang/ScalableStaticAnalysisFramework/Analyses/PointerAssignments.h
+40-0clang/test/Analysis/Scalable/UnsafeBufferUsage/tu-summary.json
+17-7clang/lib/Analysis/UnsafeBufferUsage.cpp
+1,759-77 files not shown
+1,808-2513 files

FreeBSD/ports ee116f6games/veloren-weekly distinfo Makefile

games/veloren-weekly: update to s20260323

Changes:        https://gitlab.com/veloren/veloren/-/compare/8e3f8d2e6b...4ad64ff186
(cherry picked from commit 0463bc247ac7ad086fe2047223ee77fa4be44eb7)
DeltaFile
+3-3games/veloren-weekly/distinfo
+2-2games/veloren-weekly/Makefile
+5-52 files

FreeBSD/ports 8f87ce5graphics/mesa-devel distinfo Makefile

graphics/mesa-devel: update to 26.0.b.2925

Changes:        https://gitlab.freedesktop.org/mesa/mesa/-/compare/402bd37f9d1...a6992c7bbee
DeltaFile
+3-3graphics/mesa-devel/distinfo
+2-3graphics/mesa-devel/Makefile
+5-62 files

FreeBSD/ports 0463bc2games/veloren-weekly distinfo Makefile

games/veloren-weekly: update to s20260323

Changes:        https://gitlab.com/veloren/veloren/-/compare/8e3f8d2e6b...4ad64ff186
DeltaFile
+3-3games/veloren-weekly/distinfo
+2-3games/veloren-weekly/Makefile
+5-62 files

FreeNAS/freenas 0751039src/middlewared/middlewared/etc_files scst.conf.mako

add dev_vdisk devices to DEVICE_GROUP on BACKUP

Without this, set_node_optimized fires bind_alua only for the dev_disk
passthrough devices in the DEVICE_GROUP, bypassing the dev_vdisk devices
entirely.
DeltaFile
+12-0src/middlewared/middlewared/etc_files/scst.conf.mako
+12-01 files