LLVM/project e69c731clang/test/CodeGenOpenCL builtins-amdgcn-gfx1250-wmma-w32.cl, llvm/lib/IR AutoUpgrade.cpp

[AMDGPU] Disable neg_lo[0:1] and neg_hi[0:1] on wmma_f32_16x16x32_bf16 (#188649)

This is the pilot change, the rest will follow the same idea.
DeltaFile
+46-46clang/test/CodeGenOpenCL/builtins-amdgcn-gfx1250-wmma-w32.cl
+53-31llvm/lib/Target/AMDGPU/VOP3PInstructions.td
+30-30llvm/test/CodeGen/AMDGPU/wmma-nop-hoisting.mir
+51-9llvm/lib/IR/AutoUpgrade.cpp
+4-52llvm/test/CodeGen/AMDGPU/llvm.amdgcn.wmma.imod.gfx1250.w32.ll
+20-20llvm/test/CodeGen/AMDGPU/wmma-coexecution-valu-hazards.mir
+204-18813 files not shown
+268-21519 files

FreeBSD/src 6d8b2acusr.bin/diff pr.c

diff: prefer posix_spawn over pdfork/execl

MFC After:              1 week
Reviewed by:            kib
Differential Revision:  https://reviews.freebsd.org/D56076
DeltaFile
+39-23usr.bin/diff/pr.c
+39-231 files

FreeBSD/src 5f7f0efusr.bin/diff3 diff3.c

diff3: prefer posix_spawn over pdfork/execlp

MFC After:              1 week
Reviewed by:            kib
Differential Revision:  https://reviews.freebsd.org/D56075
DeltaFile
+29-18usr.bin/diff3/diff3.c
+29-181 files

LLVM/project a0181d0llvm/lib/Target/AArch64 AArch64TargetTransformInfo.cpp, llvm/test/CodeGen/AArch64 neon-bitwise-instructions.ll logical-op-with-not.ll

[AArch64] Sink NOT to be fold into BIC/ORN/EON (#176194)

Undoes a negation being hoisted out of a loop, so that if can be fold
into an inverted bitwise operation in the loop.

Implements #108840 on AArch64
DeltaFile
+664-0llvm/test/CodeGen/AArch64/neon-bitwise-instructions.ll
+418-0llvm/test/CodeGen/AArch64/logical-op-with-not.ll
+362-1llvm/test/CodeGen/AArch64/sve-int-log.ll
+47-0llvm/lib/Target/AArch64/AArch64TargetTransformInfo.cpp
+1,491-14 files

OPNSense/core 14c9eb1src/opnsense/mvc/app/controllers/OPNsense/Kea/forms dialogSubnet6.xml dialogSubnet4.xml, src/opnsense/mvc/app/models/OPNsense/Kea KeaDhcpv6.php KeaDhcpv4.php

Services: Kea: DDNS: Add subnet specific qualifying suffix and prevent updates if no server is set. (#10038)
DeltaFile
+12-4src/opnsense/mvc/app/models/OPNsense/Kea/KeaDhcpv6.php
+12-4src/opnsense/mvc/app/models/OPNsense/Kea/KeaDhcpv4.php
+10-1src/opnsense/mvc/app/controllers/OPNsense/Kea/forms/dialogSubnet6.xml
+10-1src/opnsense/mvc/app/controllers/OPNsense/Kea/forms/dialogSubnet4.xml
+1-0src/opnsense/mvc/app/models/OPNsense/Kea/KeaDhcpv6.xml
+1-0src/opnsense/mvc/app/models/OPNsense/Kea/KeaDhcpv4.xml
+46-106 files

FreeBSD/ports 325797cwww/garage distinfo pkg-plist, www/garage/files pkg-message.in garage.in

www/garage: Update to 2.2.0

* Take MAINTAINERSHIP.
* Pet portclippy/portfmt.
* Run garage as a unprivileged user.
* Create a sample configuration file to use /var/db/garage as default
  meta and data directory.
* Add DOCS option.
* Fix pkg-message formatting.

ChangeLog: https://git.deuxfleurs.fr/Deuxfleurs/garage/releases/tag/v2.2.0

PR:             293011
Reported by:    yds at Necessitu.de
Approved by:    ashish@ (email)
DeltaFile
+453-437www/garage/distinfo
+478-121www/garage/pkg-plist
+225-217www/garage/Makefile.crates
+38-6www/garage/files/pkg-message.in
+28-9www/garage/Makefile
+11-7www/garage/files/garage.in
+1,233-7973 files not shown
+1,251-7999 files

NetBSD/pkgsrc-wip 8c55058rust192 rust.mk, rust193 rust.mk buildlink3.mk

Minimum rust version supporting  edition 2024
DeltaFile
+2-2rust192/rust.mk
+2-2rust193/rust.mk
+2-2rust194/rust.mk
+1-1rust193/buildlink3.mk
+1-1rust194-bin/buildlink3.mk
+1-1rust194/buildlink3.mk
+9-93 files not shown
+12-129 files

OPNSense/src ff0b11e. UPDATING, sys/conf newvers.sh

Add UPDATING entries and bump version

Approved by:    so
DeltaFile
+11-0UPDATING
+1-1sys/conf/newvers.sh
+12-12 files

OPNSense/src 5d8b34asys/netpfil/pf pf_ioctl.c

pf: include all elements when hashing rules

Approved by:    so
Security:       FreeBSD-SA-26:09.pf
Security:       CVE-2026-4748
Sponsored by:   Rubicon Communications, LLC ("Netgate")

(cherry picked from commit c6bcf6e6fd507d952a48226b51cc161b8ef972a2)
(cherry picked from commit e3b801edded92c1ccef67f9aef8653e996493460)
DeltaFile
+83-8sys/netpfil/pf/pf_ioctl.c
+83-81 files

OPNSense/src 3aa9ae8sbin/pfctl pfctl.c

pfctl: always warn if a duplicate rule was detected

Approved by:    so
Security:       FreeBSD-SA-26:09.pf
Security:       CVE-2026-4748
Sponsored by:   Rubicon Communications, LLC ("Netgate")

(cherry picked from commit 66d66dd0f6f83926980fc1d68dd366c0057350c5)
(cherry picked from commit e79818ec36efafc994d8c5a912dcb94986c038c5)
DeltaFile
+2-2sbin/pfctl/pfctl.c
+2-21 files

OPNSense/src 9b77f8ctests/sys/netpfil/pf pass_block.sh

pf tests: verify that we handle address range rules correctly

There's been a problem where rules which differed only in address ranges
were considered duplicates and not added. Test for this.

Approved by:    so
Security:       FreeBSD-SA-26:09.pf
Security:       CVE-2026-4748
Sponsored by:   Rubicon Communications, LLC ("Netgate")

(cherry picked from commit ab74151e8d097b263237942c0b12277098bc9533)
(cherry picked from commit 958dbc87e9c59a2e9f83d84115ce03fb96e9b249)
DeltaFile
+38-0tests/sys/netpfil/pf/pass_block.sh
+38-01 files

OPNSense/src 4b1f421sys/netpfil/pf pf_ioctl.c

pf: Fix hashing of IP address ranges

This corrects the false detection of duplicate rules.

Approved by:    so
Security:       FreeBSD-SA-26:09.pf
Security:       CVE-2026-4748
Reviewed by:    kp

(cherry picked from commit 1fa873c93c8b08561c53107c7b90c53dfad30ddc)
(cherry picked from commit ac6bb58a715eaf0afb7a80dc87083f9819e10ac1)
DeltaFile
+1-0sys/netpfil/pf/pf_ioctl.c
+1-01 files

OPNSense/src 97ff478lib/librpcsec_gss svc_rpcsec_gss.c, sys/rpc/rpcsec_gss svc_rpcsec_gss.c

rpcsec_gss: Fix a stack overflow in svc_rpc_gss_validate()

svc_rpc_gss_validate() copies the input message into a stack buffer
without ensuring that the buffer is large enough.  Sure enough,
oa_length may be up to 400 bytes, much larger than the provided space.
This enables an unauthenticated user to trigger an overflow and obtain
remote code execution.

Add a runtime check which verifies that the copy won't overflow.

Approved by:    so
Security:       FreeBSD-SA-26:08.rpcsec_gss
Security:       CVE-2026-4747
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    rmacklem
Fixes:          a9148abd9da5d
DeltaFile
+9-1sys/rpc/rpcsec_gss/svc_rpcsec_gss.c
+8-1lib/librpcsec_gss/svc_rpcsec_gss.c
+17-22 files

OPNSense/src 0da18fbsys/netinet tcp_subr.c

tcp: plug an mbuf leak

When a challenge ACK should be sent via tcp_send_challenge_ack(),
but the rate limiter suppresses the sending, free the mbuf chain.
The caller of tcp_send_challenge_ack() expects this similar to the
callers of tcp_respond().

Approved by:    so
Security:       FreeBSD-SA-26:06.tcp
Security:       CVE-2026-4247
Reviewed by:    lstewart
Tested by:      lstewart
Sponsored by:   Netflix, Inc.
DeltaFile
+2-0sys/netinet/tcp_subr.c
+2-01 files

OPNSense/src fb61125sys/net if.c

ifnet: Fix decreasing the vnet interface count

It should be decreased only when the interface has been successfully
removed from the "active" list.

This prevents vnet_if_return() from potential OOB writes to the
allocated memory "pending".

Reviewed by:    kp, pouria
Fixes:          a779388f8bb3 if: Protect V_ifnet in vnet_if_return()
MFC after:      3 days
Differential Revision:  https://reviews.freebsd.org/D55873

(cherry picked from commit 8065ff63c0e5c3bb4abb02f55b20cb47bb51d1a7)
(cherry picked from commit 1b7687f053afcf251ee7643ee5a4f22a225f4a02)
DeltaFile
+3-3sys/net/if.c
+3-31 files

OPNSense/src 4dcd148sys/compat/linuxkpi/common/include/linux sort.h

LinuxKPI: avoid -Werror=unused-value in sort() from BUILD_BUG_ON_ZERO()

The BUILD_BUG_ON_ZERO() macro returns an (int)0 if it does not fail
at build time. LinuxKPI sort() has it as a guard for an unsupported
argument but ignores the return value.

This leads to gcc complaining:

/usr/src/sys/compat/linuxkpi/common/include/linux/build_bug.h:60:33: error: statement with no effect [-Werror=unused-value]
   60 | #define BUILD_BUG_ON_ZERO(x)    ((int)sizeof(struct { int:-((x) != 0); }))
      |                                 ^
/usr/src/sys/compat/linuxkpi/common/include/linux/sort.h:37:9: note: in expansion of macro 'BUILD_BUG_ON_ZERO'
   37 |         BUILD_BUG_ON_ZERO(swap);                        \
      |         ^~~~~~~~~~~~~~~~~
/usr/src/sys/contrib/dev/rtw89/core.c:2575:9: note: in expansion of macro 'sort'
 2575 |         sort(drift, RTW89_BCN_TRACK_STAT_NR, sizeof(*drift), cmp_u16, NULL);

Change to BUILD_BUG_ON() for the statement version.


    [8 lines not shown]
DeltaFile
+1-1sys/compat/linuxkpi/common/include/linux/sort.h
+1-11 files

LLVM/project bd5e296llvm/lib/Analysis DependenceAnalysis.cpp, llvm/test/Analysis/DependenceAnalysis weak-crossing-siv-overflow.ll

[DA] Fix overflow of calculation in weakCrossingSIVtest

This patch fixes a correctness issue where integer overflow in the
upper bound calculation of weakCrossingSIVtest caused the pass to
incorrectly prove independence.

The previous logic used `SCEV::getMulExpr` to calculate
`2 * ConstCoeff * UpperBound` and compared it to `Delta` using
`isKnownPredicate`. In the presence of overflow, this could yield
unsafe results.

This change replaces the SCEV arithmetic with `ConstantRange` and
its operation (`smul_fast`). If the calculation overflows,
`intersectWith(MLRange).isEmptySet()` would be false, ensures we
conservatively assume a dependence if the bounds cannot be proven
safe.

Signed-off-by: Ruoyu Qiu <cabbaken at outlook.com>
DeltaFile
+12-6llvm/lib/Analysis/DependenceAnalysis.cpp
+2-2llvm/test/Analysis/DependenceAnalysis/weak-crossing-siv-overflow.ll
+14-82 files

LLVM/project 9247950llvm/lib/Analysis DependenceAnalysis.cpp

[DA] Hoist division check for early exit in weakCrossingSIVtest (NFC)

This patch moves the check that `Coeff` divides `Delta` earlier in the
function to enable an early exit. Potentially improve performance.

Signed-off-by: Ruoyu Qiu <cabbaken at outlook.com>
DeltaFile
+21-21llvm/lib/Analysis/DependenceAnalysis.cpp
+21-211 files

LLVM/project 8e2a5e3llvm/include/llvm/Analysis DependenceAnalysis.h, llvm/lib/Analysis DependenceAnalysis.cpp

[DA] Consolidate the core logic of the Weak Zero SIV tests (NFCI) (#185577)

There have existed two functions `weakZeroSrcSIVtest` and
`weakZeroDstSIVtest`, which are almost identical, except for some minor
differences (e.g., the Direction to be updated). This patch consolidates
the shared core logic into a single function `weakZeroSIVtestImpl` then
calls it from both `weakZeroSrcSIVtest` and `weakZeroDstSIVtest`,
passing the appropriate parameters to handle the differences. This
reduces code duplication and improves maintainability.
DeltaFile
+80-124llvm/lib/Analysis/DependenceAnalysis.cpp
+5-0llvm/include/llvm/Analysis/DependenceAnalysis.h
+85-1242 files

LLVM/project 3009211flang/include/flang/Optimizer/Passes Pipelines.h, flang/lib/Frontend FrontendActions.cpp

[LLVM-Flang] Add support for -fdebug-info-for-profiling option (#188022)

Added support for option "-fdebug-info-for-profiling" in flang.

- When the option `-fdebug-info-for-profiling` option is passed, 
compiler sets the `DebugInfoForProfiling` flag and triggers the
`AddDiscriminatorsPass`. This pass inserts additional debug metadata,
specifically discriminator values into the IR to improve the profiling
precision.
- Additionally `-add-debug-info` pass has been updated to emit an extra
field, `debugInfoForProfiling: true` inside the generated DICompileUnit
metadata node.
DeltaFile
+23-23mlir/test/Target/LLVMIR/llvmir-debug.mlir
+34-0flang/test/Driver/fdebug-info-for-profiling.f90
+13-21flang/lib/Optimizer/Passes/Pipelines.cpp
+32-0flang/test/Integration/debug-info-for-profiling.f90
+15-9flang/lib/Frontend/FrontendActions.cpp
+4-10flang/include/flang/Optimizer/Passes/Pipelines.h
+121-6320 files not shown
+170-8526 files

NetBSD/pkgsrc U4BG2C7doc CHANGES-2026 TODO

   Updated devel/meson, devel/py-coverage
VersionDeltaFile
1.1862+3-1doc/CHANGES-2026
1.26970+1-3doc/TODO
+4-42 files

NetBSD/pkgsrc fR2nw5Vdevel/py-coverage distinfo Makefile

   py-coverage: updated to 7.13.5

   Version 7.13.5 — 2026-03-17

   - Fix: `issue 2138`_ describes a memory leak that happened when repeatedly
     using the Coverage API with in-memory data. This is now fixed.

   - Fix: the markdown-formatted coverage report didn't fully escape special
     characters in file paths (`issue 2141`_). This would be very unlikely to
     cause a problem, but now it's done properly, thanks to `Ellie Ayla
     <pull 2142_>`_.

   - Fix: the C extension wouldn't build on VS2019, but now it does (`issue
     2145`_).
VersionDeltaFile
1.74+4-4devel/py-coverage/distinfo
1.88+2-2devel/py-coverage/Makefile
+6-62 files

NetBSD/pkgsrc ZDjTCTIdevel/meson distinfo Makefile

   meson: updated to 1.10.2

   1.10.2
   Bug fixes
VersionDeltaFile
1.78+4-4devel/meson/distinfo
1.90+2-2devel/meson/Makefile
+6-62 files

NetBSD/pkgsrc qpuJZG9doc CHANGES-2026

   Updated devel/libgsf, graphics/freetype2
VersionDeltaFile
1.1861+3-1doc/CHANGES-2026
+3-11 files

NetBSD/pkgsrc tJ321HKgraphics/freetype2 distinfo Makefile

   freetype2: updated to 2.14.3

   FreeType 2.14.3

   This is a maintenance release, fixing potential security issues. All users should upgrade.
VersionDeltaFile
1.82+4-4graphics/freetype2/distinfo
1.140+2-2graphics/freetype2/Makefile
+6-62 files

LLVM/project f2f9459lldb/source/Target Thread.cpp

[lldb] Protect frame provider construction from re-entrant frame access

When a scripted frame provider calls HandleCommand or other
frame-accessing APIs during __init__, GetStackFrameList() re-enters
without the re-entrancy guard, causing infinite recursion. On Windows
(1MB default stack), this results in a stack overflow (0xC00000FD)
before Python's recursion limit can intervene.

The existing PushProviderFrameList/PopProviderFrameList guard only
protected GetFrameAtIndex calls in FetchFramesUpTo. This wraps the
CreateInstance call in LoadScriptedFrameProvider with the same guard
so that provider construction is also protected.

Signed-off-by: Med Ismail Bennani <ismail at bennani.ma>
DeltaFile
+7-0lldb/source/Target/Thread.cpp
+7-01 files

NetBSD/pkgsrc RnFdMHFdevel/libgsf distinfo Makefile

   libgsf: updated to 1.14.56

   libgsf 1.14.56

   liren:
   * Fix problems with ole files using codepage 1200 (unicode).
   * Restore check for ole cycles accidentally removed in fixing 43.
VersionDeltaFile
1.62+4-4devel/libgsf/distinfo
1.126+2-2devel/libgsf/Makefile
1.45+2-1devel/libgsf/PLIST
+8-73 files

LLVM/project 8f195e7llvm/test/CodeGen/X86 vector-interleaved-store-i64-stride-7.ll vector-interleaved-store-i64-stride-6.ll

Merge branch 'main' into users/kasuga-fj/da-refactor-weak-zero-siv-tests
DeltaFile
+4,978-4,984llvm/test/CodeGen/X86/vector-interleaved-store-i64-stride-7.ll
+4,590-4,623llvm/test/CodeGen/X86/vector-interleaved-store-i64-stride-6.ll
+3,850-4,310llvm/test/CodeGen/X86/vector-interleaved-load-i8-stride-8.ll
+3,562-3,632llvm/test/CodeGen/X86/vector-interleaved-load-i16-stride-8.ll
+2,430-2,474llvm/test/CodeGen/X86/vector-interleaved-load-i8-stride-7.ll
+1,815-1,852llvm/test/CodeGen/X86/vector-interleaved-load-i16-stride-7.ll
+21,225-21,8751,274 files not shown
+58,767-41,8181,280 files

LLVM/project 74ece21lld/wasm SyntheticSections.cpp

Fix lld/wasm/SyntheticSections.cpp after SyntheticSections.h #undef

SyntheticSections.cpp uses LLVM_DEBUG but had no #define DEBUG_TYPE,
relying on the leaked "lld" from SyntheticSections.h. Add an
explicit #define DEBUG_TYPE.
DeltaFile
+2-0lld/wasm/SyntheticSections.cpp
+2-01 files

LLVM/project 25904accompiler-rt/lib/sanitizer_common sanitizer_unwind_aix.cpp CMakeLists.txt

[sanitizer_common] Implement address sanitizer on AIX: stack unwinding (#138188)

Implement unwind.h-based stack unwinding routines on AIX.

Issue: https://github.com/llvm/llvm-project/issues/138916
DeltaFile
+68-0compiler-rt/lib/sanitizer_common/sanitizer_unwind_aix.cpp
+1-0compiler-rt/lib/sanitizer_common/CMakeLists.txt
+69-02 files