LLVM/project 983b202clang-tools-extra/test/clang-tidy/checkers/android cloexec-memfd-create.cpp cloexec-accept4.cpp, clang-tools-extra/test/clang-tidy/checkers/bugprone spuriously-wake-up-functions.c posix-return.cpp

[clang-tidy][NFC] Use mock header instead of #define NULL in tests (#188420)

Since stddef.h in the mock headers of clang-tidy tests now provides
`#define NULL 0L`, we can migrate manual `#define NULL` in these tests
to standard `#include`s.
DeltaFile
+3-4clang-tools-extra/test/clang-tidy/checkers/readability/implicit-bool-conversion.c
+2-1clang-tools-extra/test/clang-tidy/checkers/readability/isolate-declaration.cpp
+2-1clang-tools-extra/test/clang-tidy/checkers/bugprone/spuriously-wake-up-functions.c
+2-1clang-tools-extra/test/clang-tidy/checkers/bugprone/posix-return.cpp
+2-1clang-tools-extra/test/clang-tidy/checkers/android/cloexec-memfd-create.cpp
+2-1clang-tools-extra/test/clang-tidy/checkers/android/cloexec-accept4.cpp
+13-912 files not shown
+25-2118 files

NetBSD/pkgsrc Gp8kgnLwm/golem distinfo, wm/golem/patches patch-configure patch-configure.in

   wm/golem: fix build with gcc14
VersionDeltaFile
1.1+14-0wm/golem/patches/patch-configure
1.1+14-0wm/golem/patches/patch-configure.in
1.13+3-1wm/golem/distinfo
+31-13 files

FreeBSD/doc 7ccdaf4website/content/en/releases/15.0R/ec2-ami-ids latest.adoc

15.0: Update "latest" AMIs

We now have 15.0-RELEASE-p5 AMIs.

Note that, due to ongoing issues impacting hardware in the region, AMIs for
the me-south-1 region have not been updated.

Approved by:    re (implicit)
Sponsored by:   Amazon
DeltaFile
+464-464website/content/en/releases/15.0R/ec2-ami-ids/latest.adoc
+464-4641 files

GhostBSD/build 848baf6packages base

Merge pull request #273 from ghostbsd/bzip2-dev

Add GhostBSD-bzip2-dev to package list
DeltaFile
+1-0packages/base
+1-01 files

GhostBSD/build b811048packages base

Add GhostBSD-bzip2-dev to package list
DeltaFile
+1-0packages/base
+1-01 files

LLVM/project 048238blibcxx/include __hash_table

Format

Created using spr 1.3.6-beta.1
DeltaFile
+6-2libcxx/include/__hash_table
+6-21 files

LLVM/project b95b902lldb/include/lldb/Target Process.h, lldb/source/Target Process.cpp ProcessTrace.cpp

[LLDB] Use shared_ptr for m_current_private_state_thread (#188542)

Avoids manual memory management.

Uses `shared_ptr` instead of `unique_ptr` because we store references to
the current thread in a backup variable.

Simplifies the private thread `is_secondary` semantics by providing a
backup storage for the current thread instead of a boolean value with a
contract to manage the backup separately.
DeltaFile
+47-52lldb/include/lldb/Target/Process.h
+43-46lldb/source/Target/Process.cpp
+1-1lldb/source/Target/ProcessTrace.cpp
+91-993 files

Linux/linux 0138af2fs/erofs Kconfig ishare.c

Merge tag 'erofs-for-7.0-rc6-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/xiang/erofs

Pull erofs fixes from Gao Xiang:

 - Mark I/Os as failed when encountering short reads on file-backed
   mounts

 - Label GFP_NOIO in the BIO completion when the completion is in the
   process context, and directly call into the decompression to avoid
   deadlocks

 - Improve Kconfig descriptions to better highlight the overall efforts

 - Fix .fadvise() for page cache sharing

* tag 'erofs-for-7.0-rc6-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/xiang/erofs:
  erofs: fix .fadvise() for page cache sharing
  erofs: update the Kconfig description
  erofs: add GFP_NOIO in the bio completion if needed
  erofs: set fileio bio failed in short read case
DeltaFile
+29-14fs/erofs/Kconfig
+13-2fs/erofs/ishare.c
+2-4fs/erofs/fileio.c
+3-0fs/erofs/zdata.c
+47-204 files

FreeBSD/ports 34ccb57sysutils/nut-devel pkg-plist distinfo

sysutils/nut-devel: Update to the latest networkupstools/nut github commit
DeltaFile
+38-1sysutils/nut-devel/pkg-plist
+3-3sysutils/nut-devel/distinfo
+2-2sysutils/nut-devel/Makefile
+43-63 files

FreeBSD/ports a2b1a68net/kea-devel pkg-plist distinfo

net/kea-devel: Update to 3.1.7
DeltaFile
+40-32net/kea-devel/pkg-plist
+3-3net/kea-devel/distinfo
+1-2net/kea-devel/Makefile
+44-373 files

FreeBSD/ports a41eed0mail/spamassassin-devel pkg-plist distinfo

mail/spamassassin-devel: update to latest github commit
DeltaFile
+7-0mail/spamassassin-devel/pkg-plist
+3-3mail/spamassassin-devel/distinfo
+3-2mail/spamassassin-devel/Makefile
+13-53 files

FreeBSD/ports 481298dsysutils/nut-devel pkg-plist

sysutils/nut-devel: Sort MANPAGES in pkg-plist
DeltaFile
+53-53sysutils/nut-devel/pkg-plist
+53-531 files

FreeBSD/ports e338121security/krb5-devel distinfo Makefile

security/krb5-devel: update to the latest MIT/KRB5 github commit
DeltaFile
+3-3security/krb5-devel/distinfo
+2-2security/krb5-devel/Makefile
+5-52 files

FreeBSD/ports b807219security/nmap-devel distinfo Makefile, security/nmap-devel/files patch-libdnet-stripped_configure patch-libdnet-stripped_src_intf.c

security/nmap-devel: Update to the latest GH commit
DeltaFile
+0-26security/nmap-devel/files/patch-libdnet-stripped_configure
+0-11security/nmap-devel/files/patch-libdnet-stripped_src_intf.c
+3-3security/nmap-devel/distinfo
+2-2security/nmap-devel/Makefile
+5-424 files

FreeBSD/ports ea7d843sysutils/cfengine-masterfiles-devel distinfo Makefile

sysutils/cfengine-masterfiles-devel: Update to latest GH commit
DeltaFile
+3-3sysutils/cfengine-masterfiles-devel/distinfo
+2-2sysutils/cfengine-masterfiles-devel/Makefile
+5-52 files

FreeBSD/ports 49f5627shells/ksh-devel distinfo Makefile

shells/ksh-devel: update to the latest ksh93/ksh github commit
DeltaFile
+3-3shells/ksh-devel/distinfo
+2-2shells/ksh-devel/Makefile
+5-52 files

FreeBSD/ports 4374ce3sysutils/cfengine-devel distinfo Makefile

sysutils/cfengine-devel: Update to latest GH commit
DeltaFile
+5-5sysutils/cfengine-devel/distinfo
+3-3sysutils/cfengine-devel/Makefile
+8-82 files

FreeBSD/ports dde09ffnet/hostapd-devel distinfo Makefile

net/hostapd-devel: Update to the latest GH commit

Update to the latest w1.fi commit, proxied through my GH account
DeltaFile
+3-3net/hostapd-devel/distinfo
+2-2net/hostapd-devel/Makefile
+5-52 files

FreeBSD/ports bb914easecurity/wpa_supplicant-devel distinfo Makefile

security/wpa_supplicant-devel: Update to latest GH commit

Update to the latest w1.fi commit, proxied through my GH account.
DeltaFile
+3-3security/wpa_supplicant-devel/distinfo
+2-2security/wpa_supplicant-devel/Makefile
+5-52 files

NetBSD/src AVHAuyObin/sh expand.c

   Fix an off by one land mine in PR 60099 fix

   While here, fix another, identical land mine, that
   has been buried in the absolute wilderness for years.
   Someone would have stepped on it one day.

   Also fix a field splitting bug handling : or = in
   IFS when generated from ${var-string1:string2} type
   expansions.   This one is even older.

   Clean up some dead code that didn't get removed with
   the initial 60099 fixes, but probably should have been.

   DEBUG mode improvements (the last couple of days have
   really needed the DEBUG code).
VersionDeltaFile
1.149+30-31bin/sh/expand.c
+30-311 files

LLVM/project bf1287blibcxx/include __hash_table, libcxx/test/extensions/gnu/hash_map copy.pass.cpp

[𝘀𝗽𝗿] initial version

Created using spr 1.3.6-beta.1
DeltaFile
+8-4libcxx/include/__hash_table
+4-0libcxx/test/extensions/gnu/hash_map/copy.pass.cpp
+12-42 files

FreeBSD/src 5c4e558. UPDATING, sys/conf newvers.sh

Add UPDATING entries and bump version

Approved by:    so
DeltaFile
+5-0UPDATING
+1-1sys/conf/newvers.sh
+6-12 files

FreeBSD/src c4f53a1lib/librpcsec_gss svc_rpcsec_gss.c, sys/rpc/rpcsec_gss svc_rpcsec_gss.c

rpcsec_gss: Fix a stack overflow in svc_rpc_gss_validate()

svc_rpc_gss_validate() copies the input message into a stack buffer
without ensuring that the buffer is large enough.  Sure enough,
oa_length may be up to 400 bytes, much larger than the provided space.
This enables an unauthenticated user to trigger an overflow and obtain
remote code execution.

Add a runtime check which verifies that the copy won't overflow.

Approved by:    so
Security:       FreeBSD-SA-26:08.rpcsec_gss
Security:       CVE-2026-4747
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    rmacklem
Fixes:          a9148abd9da5d
DeltaFile
+9-1sys/rpc/rpcsec_gss/svc_rpcsec_gss.c
+8-1lib/librpcsec_gss/svc_rpcsec_gss.c
+17-22 files

FreeBSD/src 99ec7f9lib/librpcsec_gss svc_rpcsec_gss.c, sys/rpc/rpcsec_gss svc_rpcsec_gss.c

rpcsec_gss: Fix a stack overflow in svc_rpc_gss_validate()

svc_rpc_gss_validate() copies the input message into a stack buffer
without ensuring that the buffer is large enough.  Sure enough,
oa_length may be up to 400 bytes, much larger than the provided space.
This enables an unauthenticated user to trigger an overflow and obtain
remote code execution.

Add a runtime check which verifies that the copy won't overflow.

Approved by:    so
Security:       FreeBSD-SA-26:08.rpcsec_gss
Security:       CVE-2026-4747
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    rmacklem
Fixes:          a9148abd9da5d

(cherry picked from commit 143293c14f8de00c6d3de88cd23fc224e7014206)
DeltaFile
+9-1sys/rpc/rpcsec_gss/svc_rpcsec_gss.c
+8-1lib/librpcsec_gss/svc_rpcsec_gss.c
+17-22 files

FreeBSD/src e5ed09flib/librpcsec_gss svc_rpcsec_gss.c, sys/rpc/rpcsec_gss svc_rpcsec_gss.c

rpcsec_gss: Fix a stack overflow in svc_rpc_gss_validate()

svc_rpc_gss_validate() copies the input message into a stack buffer
without ensuring that the buffer is large enough.  Sure enough,
oa_length may be up to 400 bytes, much larger than the provided space.
This enables an unauthenticated user to trigger an overflow and obtain
remote code execution.

Add a runtime check which verifies that the copy won't overflow.

Approved by:    so
Security:       FreeBSD-SA-26:08.rpcsec_gss
Security:       CVE-2026-4747
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    rmacklem
Fixes:          a9148abd9da5d

(cherry picked from commit 143293c14f8de00c6d3de88cd23fc224e7014206)
DeltaFile
+9-1sys/rpc/rpcsec_gss/svc_rpcsec_gss.c
+8-1lib/librpcsec_gss/svc_rpcsec_gss.c
+17-22 files

FreeBSD/src b45e753sys/netinet tcp_subr.c

tcp: plug an mbuf leak

When a challenge ACK should be sent via tcp_send_challenge_ack(),
but the rate limiter suppresses the sending, free the mbuf chain.
The caller of tcp_send_challenge_ack() expects this similar to the
callers of tcp_respond().

Approved by:    so
Security:       FreeBSD-SA-26:06.tcp
Security:       CVE-2026-4247
Reviewed by:    lstewart
Tested by:      lstewart
Sponsored by:   Netflix, Inc.

(cherry picked from commit 6b2d6ccad2552e46a5c9c3ba70b2d0ed27c70ca8)
DeltaFile
+2-0sys/netinet/tcp_subr.c
+2-01 files

FreeBSD/src 1b00fdclib/librpcsec_gss svc_rpcsec_gss.c, sys/rpc/rpcsec_gss svc_rpcsec_gss.c

rpcsec_gss: Fix a stack overflow in svc_rpc_gss_validate()

svc_rpc_gss_validate() copies the input message into a stack buffer
without ensuring that the buffer is large enough.  Sure enough,
oa_length may be up to 400 bytes, much larger than the provided space.
This enables an unauthenticated user to trigger an overflow and obtain
remote code execution.

Add a runtime check which verifies that the copy won't overflow.

Approved by:    so
Security:       FreeBSD-SA-26:08.rpcsec_gss
Security:       CVE-2026-4747
Reported by:    Nicholas Carlini <npc at anthropic.com>
Reviewed by:    rmacklem
Fixes:          a9148abd9da5d

(cherry picked from commit 143293c14f8de00c6d3de88cd23fc224e7014206)
DeltaFile
+9-1sys/rpc/rpcsec_gss/svc_rpcsec_gss.c
+8-1lib/librpcsec_gss/svc_rpcsec_gss.c
+17-22 files

FreeBSD/src 1fddb54sys/netinet tcp_subr.c

tcp: plug an mbuf leak

When a challenge ACK should be sent via tcp_send_challenge_ack(),
but the rate limiter suppresses the sending, free the mbuf chain.
The caller of tcp_send_challenge_ack() expects this similar to the
callers of tcp_respond().

Approved by:    so
Security:       FreeBSD-SA-26:06.tcp
Security:       CVE-2026-4247
Reviewed by:    lstewart
Tested by:      lstewart
Sponsored by:   Netflix, Inc.

(cherry picked from commit 6b2d6ccad2552e46a5c9c3ba70b2d0ed27c70ca8)
DeltaFile
+2-0sys/netinet/tcp_subr.c
+2-01 files

LLVM/project 620d322llvm/test/CodeGen/AMDGPU memintrinsic-unroll.ll, llvm/test/CodeGen/X86 vector-interleaved-load-i64-stride-7.ll vector-interleaved-store-i64-stride-7.ll

Merge remote-tracking branch 'origin' into users/ziqingluo/eng/PR-171920065
DeltaFile
+6,835-6,798llvm/test/CodeGen/AMDGPU/memintrinsic-unroll.ll
+6,432-6,562llvm/test/CodeGen/X86/vector-interleaved-load-i64-stride-7.ll
+4,982-4,991llvm/test/CodeGen/X86/vector-interleaved-store-i64-stride-7.ll
+4,590-4,623llvm/test/CodeGen/X86/vector-interleaved-store-i64-stride-6.ll
+4,364-4,820llvm/test/CodeGen/X86/vector-interleaved-load-i8-stride-8.ll
+3,814-3,848llvm/test/CodeGen/X86/vector-interleaved-load-i16-stride-8.ll
+31,017-31,6424,731 files not shown
+248,747-112,5604,737 files

LLVM/project 2beba0ellvm/lib/Target/AMDGPU AMDGPUCoExecSchedStrategy.h

Add a comment

Change-Id: I447f7f1fb185b18924cfd98249b5a0a05fef2484
DeltaFile
+7-0llvm/lib/Target/AMDGPU/AMDGPUCoExecSchedStrategy.h
+7-01 files