FreeBSD/ports 8e15632mail/thunderbird distinfo Makefile

mail/thunderbird: update to 147.0.1 (rc2)

Release Notes:
  https://www.thunderbird.net/en-US/thunderbird/147.0.1/releasenotes/

(cherry picked from commit 8661e8c422f293e4e996e521a18aea25f8e3f2ac)
DeltaFile
+3-3mail/thunderbird/distinfo
+2-1mail/thunderbird/Makefile
+5-42 files

LLVM/project d1e588dlibc/src/stdio snprintf_modular.cpp sprintf_modular.cpp, libc/src/stdio/baremetal vprintf_modular.cpp printf_modular.cpp

[libc] Modular printf option (float only)

This adds LIBC_CONF_PRINTF_MODULAR, which causes floating point support
(later, others) to be weakly linked into the implementation.
__printf_modular becomes the main entry point of the implementaiton, an
printf itself wraps __printf_modular. printf it also contains a
BFD_RELOC_NONE relocation to bring in the float aspect.

See issue #146159 for context.
DeltaFile
+67-0libc/src/stdio/baremetal/vprintf_modular.cpp
+45-13libc/src/stdio/printf_core/parser.h
+56-0libc/src/stdio/snprintf_modular.cpp
+56-0libc/src/stdio/printf_core/float_impl.cpp
+55-0libc/src/stdio/sprintf_modular.cpp
+55-0libc/src/stdio/baremetal/printf_modular.cpp
+334-1342 files not shown
+772-3348 files

FreeBSD/ports 8661e8cmail/thunderbird distinfo Makefile

mail/thunderbird: update to 147.0.1 (rc2)

Release Notes:
  https://www.thunderbird.net/en-US/thunderbird/147.0.1/releasenotes/
DeltaFile
+3-3mail/thunderbird/distinfo
+2-1mail/thunderbird/Makefile
+5-42 files

LLVM/project 85812fdpolly/lib/Transform ZoneAlgo.cpp

[Polly][DeLICM] Check for error state (#178281)

When the ISL max-operations is exceeded, `is_wrapping` will return an
error state. Propagate the error state to the caller.

Fixes #175953
DeltaFile
+4-1polly/lib/Transform/ZoneAlgo.cpp
+4-11 files

LLVM/project 4239e85llvm/lib/Target/AArch64 AArch64TargetTransformInfo.h AArch64InstrInfo.td, llvm/test/CodeGen/AArch64 nontemporal-load.ll

[AArch64] Align nontemporal store/load little-endian checks (#177468)

This patch aims to align all nontemporal store/load handling to
systematically enforce a little-endian target. This has been the
effective support LLVM had for NT store/load lowering (there has been no
effective support for big-endian, even with the inconsistencies).

The change in `llvm/lib/Target/AArch64/AArch64InstrInfo.td` is
effectively a NFC, because the only lowering of LDNP, in
`llvm/lib/Target/AArch64/AArch64ISelLowering.cpp`, have already checked
for `isLittleEndian`. The change in
`llvm/lib/Target/AArch64/AArch64TargetTransformInfo.h` affects its
single caller
`llvm/lib/Transforms/Vectorize/LoopVectorizationLegality.cpp`. The
previous logic has been wrong, enabling vectorization of effectively
illegal nontemporal store/load instructions on big-endian.
DeltaFile
+189-189llvm/test/CodeGen/AArch64/nontemporal-load.ll
+115-65llvm/test/Transforms/LoopVectorize/AArch64/nontemporal-load-store.ll
+19-6llvm/lib/Target/AArch64/AArch64TargetTransformInfo.h
+14-2llvm/lib/Target/AArch64/AArch64InstrInfo.td
+10-0llvm/lib/Target/AArch64/AArch64ISelLowering.cpp
+347-2625 files

FreeNAS/freenas ffcbb47src/middlewared/middlewared/plugins/update_ download.py update.py

Lightweight plugin parts
DeltaFile
+170-173src/middlewared/middlewared/plugins/update_/download.py
+111-144src/middlewared/middlewared/plugins/update_/update.py
+122-120src/middlewared/middlewared/plugins/update_/install.py
+112-123src/middlewared/middlewared/plugins/update_/status.py
+115-114src/middlewared/middlewared/plugins/update_/trains.py
+170-0src/middlewared/middlewared/plugins/update_/__init__.py
+800-67420 files not shown
+1,114-93926 files

LLVM/project 5ac945fllvm/lib/Target/AMDGPU SIWholeQuadMode.cpp, llvm/test/CodeGen/AMDGPU wqm-debug-instr.mir

[AMDGPU] Fix crash in SIWholeQuadMode with debug instructions.

The prepareInsertion function was crashing when debug instructions
appeared at positions being queried for slot indices. Debug instructions
don't have entries in the slot index map, so getInstructionIndex would
fail with an assertion.

Fixes SWDEV-480902.
DeltaFile
+122-0llvm/test/CodeGen/AMDGPU/wqm-debug-instr.mir
+12-6llvm/lib/Target/AMDGPU/SIWholeQuadMode.cpp
+134-62 files

LLVM/project e470fa2clang/test/CodeGen stack-protector-vars.cpp

Add -emit-llvm to RUN line for test added in #173311. (#178271)

Should fix the test failure on buildbots that do not build the x86
backend such as
https://lab.llvm.org/buildbot/#/builders/190/builds/35171 and
https://lab.llvm.org/buildbot/#/builders/154/builds/26976.
DeltaFile
+1-1clang/test/CodeGen/stack-protector-vars.cpp
+1-11 files

FreeNAS/freenas b79e484tests/api2 test_300_nfs.py test_200_ftp.py

rm bulk tests
DeltaFile
+0-2,107tests/api2/test_300_nfs.py
+0-1,411tests/api2/test_200_ftp.py
+0-936tests/api2/test_345_acl_nfs4.py
+0-700tests/api2/test_011_user.py
+0-495tests/api2/test_440_snmp.py
+0-487tests/api2/test_audit_websocket.py
+0-6,136253 files not shown
+0-31,631259 files

FreeNAS/freenas 884726csrc/middlewared/middlewared/plugins/service_/services base.py base_state.py

fix system dataset migration instability
DeltaFile
+142-35src/middlewared/middlewared/plugins/service_/services/base.py
+0-4src/middlewared/middlewared/plugins/service_/services/base_state.py
+142-392 files

NetBSD/pkgsrc SXx7hW0doc CHANGES-2026

   doc: Updated lang/joker to 1.6.0
VersionDeltaFile
1.683+2-1doc/CHANGES-2026
+2-11 files

LLVM/project bc6aab2llvm/lib/Target/AArch64 AArch64InstrInfo.td, llvm/test/CodeGen/AArch64 round-fptosi-sat-scalar.ll round-fptoui-sat-scalar.ll

[AArch64] Add missing GlobalISel patterns to round+convert multiclass (#177799)

This allows GlobalISel to fuse floating point round+convert operations
in the same way as SelectionDAG.
DeltaFile
+70-510llvm/test/CodeGen/AArch64/round-fptosi-sat-scalar.ll
+70-350llvm/test/CodeGen/AArch64/round-fptoui-sat-scalar.ll
+15-0llvm/lib/Target/AArch64/AArch64InstrInfo.td
+155-8603 files

NetBSD/pkgsrc SVOWoELlang/joker go-modules.mk distinfo

   joker: update to 1.6.0

   minor update to some go deps
VersionDeltaFile
1.7+7-7lang/joker/go-modules.mk
1.11+4-4lang/joker/distinfo
1.34+2-3lang/joker/Makefile
+13-143 files

FreeBSD/ports bbebe1cmail/nextcloud-mail distinfo Makefile

mail/nextcloud-mail: Update to 5.6.9
DeltaFile
+3-3mail/nextcloud-mail/distinfo
+1-1mail/nextcloud-mail/Makefile
+4-42 files

FreeBSD/ports 3fd929dwww/nextcloud-contacts distinfo Makefile

www/nextcloud-contacts: Update to 8.3.1
DeltaFile
+3-3www/nextcloud-contacts/distinfo
+1-1www/nextcloud-contacts/Makefile
+4-42 files

LLVM/project f2921e5llvm/lib/Transforms/InstCombine InstCombineCompares.cpp, llvm/test/Transforms/InstCombine icmp-with-selects.ll

[InstCombine][profcheck] More fixes for missing branch data in InstCombineCompares.cpp (#178084)

Again, these fixes are trivial as we're creating new select instructions
with predicates from existing select instructions.

In this case, we create one select instruction from two existing select
instructions, but since both existing select instructions have the same
predicate, their profile data should be the same, so we can reuse the
profile data from either instruction. Therefore, we arbitrarily reuse
the profile data from the first select instruction.

Tracking issue: #147390
DeltaFile
+20-11llvm/test/Transforms/InstCombine/icmp-with-selects.ll
+6-2llvm/lib/Transforms/InstCombine/InstCombineCompares.cpp
+0-1llvm/utils/profcheck-xfail.txt
+26-143 files

LLVM/project f7968dallvm/lib/Target/AMDGPU SIWholeQuadMode.cpp, llvm/test/CodeGen/AMDGPU wqm-debug-instr.mir

[AMDGPU] Fix crash in SIWholeQuadMode with debug instructions.

The prepareInsertion function was crashing when debug instructions
appeared at positions being queried for slot indices. Debug instructions
don't have entries in the slot index map, so getInstructionIndex would
fail with an assertion.
DeltaFile
+122-0llvm/test/CodeGen/AMDGPU/wqm-debug-instr.mir
+12-6llvm/lib/Target/AMDGPU/SIWholeQuadMode.cpp
+134-62 files

LLVM/project 5780afbllvm/include/llvm/CodeGen LiveIntervals.h, llvm/lib/CodeGen LiveIntervals.cpp

Use yet another allocator for LiveRanges

Not sure it's worth it for these, there should never be all that
many. We could pre-allocate the maximum size up front.
DeltaFile
+5-3llvm/include/llvm/CodeGen/LiveIntervals.h
+1-2llvm/lib/CodeGen/LiveIntervals.cpp
+6-52 files

LLVM/project 6ba0245llvm/include/llvm/CodeGen LiveIntervals.h, llvm/lib/CodeGen LiveIntervals.cpp

Use SpecificBumpPtrAllocator for LiveInterval

I didn't realize we used a singly linked list for storing subranges,
but that seems bad.

I didn't realize we used a singly linked list for storing subranges.
That seems bad and we should probably switch this to an array
DeltaFile
+5-5llvm/lib/CodeGen/LiveIntervals.cpp
+5-1llvm/include/llvm/CodeGen/LiveIntervals.h
+10-62 files

FreeBSD/ports add1f8csecurity/openssl distinfo Makefile, security/openssl/files extra-patch-ktls patch-crypto_ppccap.c

security/openssl: Security update to 3.0.19

Security:       4b824428-fb93-11f0-b194-8447094a420f
MFH:            2026Q1
DeltaFile
+124-124security/openssl/files/extra-patch-ktls
+11-11security/openssl/files/patch-crypto_ppccap.c
+6-6security/openssl/files/patch-crypto_async_arch_async__posix.h
+3-3security/openssl/distinfo
+1-1security/openssl/Makefile
+145-1455 files

LLVM/project 1545952llvm/include/llvm/CodeGen LiveIntervals.h, llvm/lib/CodeGen LiveIntervals.cpp

LiveIntervals: Use BumpPtrAllocator
DeltaFile
+8-4llvm/include/llvm/CodeGen/LiveIntervals.h
+5-4llvm/lib/CodeGen/LiveIntervals.cpp
+13-82 files

FreeBSD/ports 4a16449security/fakeroot distinfo Makefile, security/fakeroot/files patch-communicate.c

security/fakeroot: Update to 1.37.2

Changelog: https://salsa.debian.org/clint/fakeroot/-/blob/debian/1.37.2-1/debian/changelog?ref_type=tags
DeltaFile
+0-11security/fakeroot/files/patch-communicate.c
+3-3security/fakeroot/distinfo
+1-1security/fakeroot/Makefile
+4-153 files

OPNSense/core fcab636src/opnsense/mvc/app/models/OPNsense/Kea KeaDhcpv6.php

Services: Kea DHCP: Kea DHCPv6 - add validation "Invalid Pool boundaries, offered address is not the first address in the prefix." for https://github.com/opnsense/core/issues/9343
DeltaFile
+3-0src/opnsense/mvc/app/models/OPNsense/Kea/KeaDhcpv6.php
+3-01 files

FreeNAS/freenas ce30cfftests/unit test_pwenc.py

NAS-139512 / 26.0.0-BETA.1 / Fix import (#18111)

pwenc_data no longer exists, so don't try to import.
DeltaFile
+0-1tests/unit/test_pwenc.py
+0-11 files

FreeBSD/ports 943c352net/asterisk22 distinfo Makefile

net/asterisk22: Update 22.7.0 => 22.8.0

Changelog:
https://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-22.8.0.html

This update incorporates an important fix for FreeBSD users:
- rtp/rtcp: Configure dual-stack behavior via IPV6_V6ONLY

PR:             262386 292712
Approved by:    Oleksandr Kryvulia <o.kryvulia at flex-it.com.ua> (maintainer)
Sponsored by:   PANS Jarosław
MFH:            2026Q1

(cherry picked from commit a2afefa7ccdbe67ec3ac17d1e2e541a49efee64e)
DeltaFile
+3-3net/asterisk22/distinfo
+1-1net/asterisk22/Makefile
+2-0net/asterisk22/pkg-plist
+6-43 files

FreeBSD/src 1741502crypto/openssl/crypto/asn1 a_strex.c, crypto/openssl/crypto/bio bf_lbuf.c

openssl: Fix multiple vulnerabilities

This is a rollup commit from upstream to fix:
  Heap out-of-bounds write in BIO_f_linebuffer on short writes (CVE-2025-68160)
  Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (CVE-2025-69418)
  Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (CVE-2025-69419)
  Missing ASN1_TYPE validation in TS_RESP_verify_response() function (CVE-2025-69420)
  NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (CVE-2025-69421)
  Missing ASN1_TYPE validation in PKCS#12 parsing (CVE-2026-22795)
  ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (CVE-2026-22796)

See https://openssl-library.org/news/secadv/ for additional details.

Approved by:    so
Obtained from:  OpenSSL
Security:       FreeBSD-SA-26:01.openssl
Security:       CVE-2025-68160
Security:       CVE-2025-69418
Security:       CVE-2025-69419

    [4 lines not shown]
DeltaFile
+26-6crypto/openssl/crypto/bio/bf_lbuf.c
+8-2crypto/openssl/crypto/pkcs12/p12_kiss.c
+8-2crypto/openssl/crypto/modes/ocb128.c
+6-0crypto/openssl/crypto/pkcs12/p12_decr.c
+4-2crypto/openssl/crypto/asn1/a_strex.c
+5-0crypto/openssl/crypto/pkcs12/p12_utl.c
+57-123 files not shown
+63-159 files

FreeBSD/src ee8d50bcrypto/openssl/crypto/asn1 evp_asn1.c a_strex.c, crypto/openssl/crypto/bio bf_lbuf.c

openssl: Fix multiple vulnerabilities

This is a rollup commit from upstream to fix:
  Stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467)
  Heap out-of-bounds write in BIO_f_linebuffer on short writes (CVE-2025-68160)
  Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (CVE-2025-69418)
  Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (CVE-2025-69419)
  Missing ASN1_TYPE validation in TS_RESP_verify_response() function (CVE-2025-69420)
  NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (CVE-2025-69421)
  Missing ASN1_TYPE validation in PKCS#12 parsing (CVE-2026-22795)
  ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (CVE-2026-22796)

See https://openssl-library.org/news/secadv/ for additional details.

Approved by:    so
Obtained from:  OpenSSL
Security:       FreeBSD-SA-26:01.openssl
Security:       CVE-2025-15467
Security:       CVE-2025-68160

    [6 lines not shown]
DeltaFile
+26-6crypto/openssl/crypto/bio/bf_lbuf.c
+20-0crypto/openssl/crypto/asn1/evp_asn1.c
+8-2crypto/openssl/crypto/pkcs12/p12_kiss.c
+8-2crypto/openssl/crypto/modes/ocb128.c
+4-2crypto/openssl/crypto/asn1/a_strex.c
+2-3crypto/openssl/crypto/evp/evp_lib.c
+68-155 files not shown
+84-1811 files

FreeBSD/src 5626e81crypto/openssl/apps pkeyutl.c, crypto/openssl/apps/lib apps.c

openssl: Fix multiple vulnerabilities

This is a rollup commit from upstream to fix:
  Improper validation of PBMAC1 parameters in PKCS#12 MAC verification (CVE-2025-11187)
  Stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467)
  NULL dereference in SSL_CIPHER_find() function on unknown cipher ID (CVE-2025-15468)
  "openssl dgst" one-shot codepath silently truncates inputs >16MB (CVE-2025-15469)
  TLS 1.3 CompressedCertificate excessive memory allocation (CVE-2025-66199)
  Heap out-of-bounds write in BIO_f_linebuffer on short writes (CVE-2025-68160)
  Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (CVE-2025-69418)
  Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (CVE-2025-69419)
  Missing ASN1_TYPE validation in TS_RESP_verify_response() function (CVE-2025-69420)
  NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (CVE-2025-69421)
  Missing ASN1_TYPE validation in PKCS#12 parsing (CVE-2026-22795)
  ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (CVE-2026-22796)

See https://openssl-library.org/news/secadv/ for additional details.

Approved by:    so

    [14 lines not shown]
DeltaFile
+28-27crypto/openssl/apps/lib/apps.c
+18-18crypto/openssl/apps/pkeyutl.c
+26-6crypto/openssl/crypto/bio/bf_lbuf.c
+20-0crypto/openssl/crypto/asn1/evp_asn1.c
+16-2crypto/openssl/crypto/pkcs12/p12_mutl.c
+8-2crypto/openssl/crypto/modes/ocb128.c
+116-5512 files not shown
+158-7018 files

FreeBSD/src 9c151e1crypto/openssl/apps pkeyutl.c, crypto/openssl/apps/lib apps.c

openssl: Fix multiple vulnerabilities

This is a rollup commit from upstream to fix:
  Improper validation of PBMAC1 parameters in PKCS#12 MAC verification (CVE-2025-11187)
  Stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467)
  NULL dereference in SSL_CIPHER_find() function on unknown cipher ID (CVE-2025-15468)
  "openssl dgst" one-shot codepath silently truncates inputs >16MB (CVE-2025-15469)
  TLS 1.3 CompressedCertificate excessive memory allocation (CVE-2025-66199)
  Heap out-of-bounds write in BIO_f_linebuffer on short writes (CVE-2025-68160)
  Unauthenticated/unencrypted trailing bytes with low-level OCB function calls (CVE-2025-69418)
  Out of bounds write in PKCS12_get_friendlyname() UTF-8 conversion (CVE-2025-69419)
  Missing ASN1_TYPE validation in TS_RESP_verify_response() function (CVE-2025-69420)
  NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex function (CVE-2025-69421)
  Missing ASN1_TYPE validation in PKCS#12 parsing (CVE-2026-22795)
  ASN1_TYPE Type Confusion in the PKCS7_digest_from_attributes() function (CVE-2026-22796)

See https://openssl-library.org/news/secadv/ for additional details.

Approved by:    so

    [14 lines not shown]
DeltaFile
+28-27crypto/openssl/apps/lib/apps.c
+18-18crypto/openssl/apps/pkeyutl.c
+26-6crypto/openssl/crypto/bio/bf_lbuf.c
+20-0crypto/openssl/crypto/asn1/evp_asn1.c
+16-2crypto/openssl/crypto/pkcs12/p12_mutl.c
+8-2crypto/openssl/crypto/modes/ocb128.c
+116-5512 files not shown
+158-7018 files

FreeBSD/ports a2afefanet/asterisk22 distinfo pkg-plist

net/asterisk22: Update 22.7.0 => 22.8.0

Changelog:
https://downloads.asterisk.org/pub/telephony/asterisk/ChangeLog-22.8.0.html

This update incorporates an important fix for FreeBSD users:
- rtp/rtcp: Configure dual-stack behavior via IPV6_V6ONLY

PR:             262386 292712
Approved by:    Oleksandr Kryvulia <o.kryvulia at flex-it.com.ua> (maintainer)
Sponsored by:   PANS Jarosław
MFH:            2026Q1
DeltaFile
+3-3net/asterisk22/distinfo
+2-0net/asterisk22/pkg-plist
+1-1net/asterisk22/Makefile
+6-43 files