FreeBSD/releng/10.2.git
5 years agoFix multiple vulnerabilities of ntp. master
delphij [Thu, 22 Dec 2016 16:19:05 +0000 (16:19 +0000)]
Fix multiple vulnerabilities of ntp.

Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@310419 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

5 years agoMerge r309688: address regressions in SA-16:37.libc.
glebius [Wed, 7 Dec 2016 23:32:42 +0000 (23:32 +0000)]
Merge r309688: address regressions in SA-16:37.libc.

PR: 215105
Submitted by: <jtd2004a sbcglobal.net>
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@309694 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

5 years agoFix possible login(1) argument injection in telnetd(8). [SA-16:36]
glebius [Tue, 6 Dec 2016 18:49:54 +0000 (18:49 +0000)]
Fix possible login(1) argument injection in telnetd(8). [SA-16:36]
Fix link_ntoa(3) buffer overflow in libc. [SA-16:37]
Fix possible escape from bhyve(8) virtual machine. [SA-16:38]
Fix warnings about valid time zone abbreviations. [EN-16:19]
Update timezone database information. [EN-16:20]

Security: FreeBSD-SA-16:36.telnetd
Security: FreeBSD-SA-16:37.libc
Security: FreeBSD-SA-16:38.bhyve
Errata Notice: FreeBSD-EN-16:19.tzcode
Errata Notice: FreeBSD-EN-16:20.tzdata
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@309635 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

5 years agoUpdate tzdata to 2016i.
glebius [Mon, 5 Dec 2016 23:26:06 +0000 (23:26 +0000)]
Update tzdata to 2016i.

Note: because of what appears to be a missing MFC to stable branches,
these patches were generated by doing:

 % rsync -av stable/10/contrib/tzdata releng/10.x/contrib/tzdata
 % svn add releng/10.x/contrib/tzdata

Errata Notice: EN-16:19
Submitted by: gjb
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@309576 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

5 years agoMerge r307359 from stable/10:
glebius [Mon, 5 Dec 2016 23:12:22 +0000 (23:12 +0000)]
Merge r307359 from stable/10:

    Incorporate a change from OpenBSD by millert@OpenBSD.org

    Don't warn about valid time zone abbreviations.  POSIX
    through 2000 says that an abbreviation cannot start with ':', and
    cannot contain ',', '-', '+', NUL, or a digit.  POSIX from 2001
    on changes this rule to say that an abbreviation can contain only
    '-', '+', and alphanumeric characters from the portable character
    set in the current locale.  To be portable to both sets of rules,
    an abbreviation must therefore use only ASCII letters."  Adapted
    from tzcode2015f.

Errata Notice: EN-16:19.tzcode
Submitted by: bapt
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@309571 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

5 years agoFix OpenSSL remote DoS vulnerability. [SA-16:35]
delphij [Wed, 2 Nov 2016 07:24:14 +0000 (07:24 +0000)]
Fix OpenSSL remote DoS vulnerability. [SA-16:35]

Security: FreeBSD-SA-16:35.openssl
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@308204 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

5 years agoRevised SA-16:15. The initial patch didn't cover all possible overflows
glebius [Tue, 25 Oct 2016 17:11:11 +0000 (17:11 +0000)]
Revised SA-16:15.  The initial patch didn't cover all possible overflows
based on passing incorrect parameters to sysarch(2).

Security: SA-16:15
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@307933 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

5 years agoFix bspatch heap overflow vulnerability. [SA-16:29]
delphij [Mon, 10 Oct 2016 07:18:54 +0000 (07:18 +0000)]
Fix bspatch heap overflow vulnerability. [SA-16:29]

Fix multiple portsnap vulnerabilities. [SA-16:30]

Fix multiple libarchive vulnerabilities. [SA-16:31]

Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@306941 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

5 years agoApply upstream revision 3612ff6fcec0e3d1f2a598135fe12177c0419582:
delphij [Mon, 26 Sep 2016 08:21:29 +0000 (08:21 +0000)]
Apply upstream revision 3612ff6fcec0e3d1f2a598135fe12177c0419582:

Fix overflow check in BN_bn2dec()
Fix an off by one error in the overflow check added by 07bed46
("Check for errors in BN_bn2dec()").

This fixes a regression introduced in SA-16:26.openssl.

Submitted by: jkim
PR: 212921
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@306336 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

5 years agoFix multiple OpenSSL vulnerabilitites.
delphij [Fri, 23 Sep 2016 07:48:34 +0000 (07:48 +0000)]
Fix multiple OpenSSL vulnerabilitites.

Approved by: so
Security: FreeBSD-SA-16:26.openssl

git-svn-id: https://svn.freebsd.org/base/releng/10.2@306230 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

5 years agoFix bspatch heap overflow vulnerability. [SA-16:25]
delphij [Mon, 25 Jul 2016 15:04:17 +0000 (15:04 +0000)]
Fix bspatch heap overflow vulnerability. [SA-16:25]

Fix freebsd-update(8) support of FreeBSD 11.0 release
distribution. [EN-16:09]

Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@303304 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix multiple ntp vulnerabilities.
delphij [Sat, 4 Jun 2016 05:46:52 +0000 (05:46 +0000)]
Fix multiple ntp vulnerabilities.

Security: FreeBSD-SA-16:24.ntp
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@301301 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix kernel stack disclosure in Linux compatibility layer. [SA-16:20]
glebius [Tue, 31 May 2016 16:55:45 +0000 (16:55 +0000)]
Fix kernel stack disclosure in Linux compatibility layer. [SA-16:20]
Fix kernel stack disclosure in 4.3BSD compatibility layer. [SA-16:21]

Security: SA-16:20
Security: SA-16:21
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@301051 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMerge r300361 by mm@:
glebius [Tue, 31 May 2016 16:33:56 +0000 (16:33 +0000)]
Merge r300361 by mm@:

  Backport security fix for absolute path traversal
  vulnerability in bsdcpio.

Security: CVE-2015-2304
Security: SA-16:22
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@301047 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years ago- Use unsigned version of min() when handling arguments of SETFKEY ioctl.
glebius [Tue, 17 May 2016 22:28:20 +0000 (22:28 +0000)]
- Use unsigned version of min() when handling arguments of SETFKEY ioctl.
- Validate that user supplied control message length in sendmsg(2)
  is not negative.

Security: SA-16:18
Security: CVE-2016-1886
Security: SA-16:19
Security: CVE-2016-1887
Submitted by: C Turt <cturt hardenedbsd.org>
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@300086 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix multiple OpenSSL vulnerabilitites. [SA-16:17]
delphij [Wed, 4 May 2016 15:26:23 +0000 (15:26 +0000)]
Fix multiple OpenSSL vulnerabilitites. [SA-16:17]

Fix excessive latency in x86 IPI delivery. [EN-16:07]

Fix memory leak in ZFS. [EN-16:08]

Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@299067 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix ntp multiple vulnerabilities.
delphij [Fri, 29 Apr 2016 08:02:31 +0000 (08:02 +0000)]
Fix ntp multiple vulnerabilities.

Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@298770 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoo Fix OpenSSH xauth(1) command injection. [SA-16:14]
glebius [Wed, 16 Mar 2016 22:31:04 +0000 (22:31 +0000)]
o Fix OpenSSH xauth(1) command injection. [SA-16:14]
o Fix incorrect argument validation in sysarch(2). [SA-16:15]
o Fix Hyper-V KVP (Key-Value Pair) daemon indefinite sleep. [EN-16:04]
o Fix hv_netvsc(4) incorrect TCP/IP checksums. [EN-16:05]

Errata:         FreeBSD-EN-16:04.hyperv
Errata:         FreeBSD-EN-16:05.hv_netvsc
Security:       FreeBSD-SA-16:14.openssh-xauth, CVE-2016-3115
Security:       FreeBSD-SA-16:15.sysarch, CVE-2016-1885
Approved by:    so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@296955 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix multiple OpenSSL vulnerabilities.
delphij [Thu, 3 Mar 2016 07:30:55 +0000 (07:30 +0000)]
Fix multiple OpenSSL vulnerabilities.

Security: FreeBSD-SA-16:12.openssl
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@296341 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix OpenSSL SSLv2 ciphersuite downgrade vulnerability.
delphij [Sat, 30 Jan 2016 06:12:03 +0000 (06:12 +0000)]
Fix OpenSSL SSLv2 ciphersuite downgrade vulnerability.

Security: CVE-2015-3197
Security: FreeBSD-SA-16:11.openssl
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@295061 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix multiple vulnerabilities of ntp. [SA-16:09]
delphij [Wed, 27 Jan 2016 07:41:31 +0000 (07:41 +0000)]
Fix multiple vulnerabilities of ntp. [SA-16:09]

Fix Linux compatibility layer issetugid(2) system call
vulnerability. [SA-16:10]

Security: FreeBSD-SA-16:09.ntp
Security: FreeBSD-SA-16:10.linux
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@294904 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix typo.
glebius [Thu, 14 Jan 2016 22:48:13 +0000 (22:48 +0000)]
Fix typo.

Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@294052 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix OpenSSH client information leak.
glebius [Thu, 14 Jan 2016 22:45:33 +0000 (22:45 +0000)]
Fix OpenSSH client information leak.

Security:       SA-16:07.openssh
Security:       CVE-2016-0777
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@294050 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoo Fix filemon and bmake meta-mode stability issues. [EN-16:01]
glebius [Thu, 14 Jan 2016 09:10:46 +0000 (09:10 +0000)]
o Fix filemon and bmake meta-mode stability issues. [EN-16:01]
o Fix invalid TCP checksums with pf(4). [EN-16:02.pf]
o Fix YP/NIS client library critical bug. [EN-16:03.yplib]
o Fix SCTP ICMPv6 error message vulnerability. [SA-16:01.sctp]
o Fix ntp panic threshold bypass vulnerability. [SA-16:02.ntp]
o Fix Linux compatibility layer incorrect futex handling. [SA-16:03.linux]
o Fix Linux compatibility layer setgroups(2) system call. [SA-16:04.linux]
o Fix TCP MD5 signature denial of service. [SA-16:05.tcp]
o Fix insecure default bsnmpd.conf permissions. [SA-16:06.bsnmpd]

Errata: FreeBSD-EN-16:01.filemon
Errata: FreeBSD-EN-16:02.pf
Errata: FreeBSD-EN-16:03.yplib
Security: FreeBSD-SA-16:01.sctp, CVE-2016-1879
Security: FreeBSD-SA-16:02.ntp, CVE-2015-5300
Security: FreeBSD-SA-16:03.linux, CVE-2016-1880
Security: FreeBSD-SA-16:04.linux, CVE-2016-1881
Security: FreeBSD-SA-16:05.tcp, CVE-2016-1882
Security: FreeBSD-SA-16:06.bsnmpd, CVE-2015-5677
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@293893 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix OpenSSL multiple vulnerabilities.
delphij [Sat, 5 Dec 2015 09:53:58 +0000 (09:53 +0000)]
Fix OpenSSL multiple vulnerabilities.

Security: FreeBSD-SA-15:26.openssl
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@291854 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoo Fix regressions related to SA-15:25 upgrade of NTP. [1]
glebius [Wed, 4 Nov 2015 11:27:13 +0000 (11:27 +0000)]
o Fix regressions related to SA-15:25 upgrade of NTP. [1]
o Fix kqueue write events never fired for files greater 2GB. [2]
o Fix kpplications exiting due to segmentation violation on a correct
  memory address. [3]

PR: 204046 [1]
PR: 204203 [1]
Errata Notice: FreeBSD-EN-15:19.kqueue [2]
Errata Notice: FreeBSD-EN-15:20.vm [3]
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@290361 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoUpgrade NTP to 4.2.8p4.
glebius [Mon, 26 Oct 2015 11:36:55 +0000 (11:36 +0000)]
Upgrade NTP to 4.2.8p4.

Security: FreeBSD-SA-15:25.ntp
Security: CVE-2015-7871
Security: CVE-2015-7855
Security: CVE-2015-7854
Security: CVE-2015-7853
Security: CVE-2015-7852
Security: CVE-2015-7851
Security: CVE-2015-7850
Security: CVE-2015-7849
Security: CVE-2015-7848
Security: CVE-2015-7701
Security: CVE-2015-7703
Security: CVE-2015-7704, CVE-2015-7705
Security: CVE-2015-7691, CVE-2015-7692, CVE-2015-7702
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@289999 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix a regression with SA-15:24 patch that prevented NIS from
delphij [Fri, 2 Oct 2015 16:37:06 +0000 (16:37 +0000)]
Fix a regression with SA-15:24 patch that prevented NIS from
working.

Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@288512 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoThe Sun RPC framework uses a netbuf structure to represent the
delphij [Tue, 29 Sep 2015 18:07:18 +0000 (18:07 +0000)]
The Sun RPC framework uses a netbuf structure to represent the
transport specific form of a universal transport address.  The
structure is expected to be opaque to consumers.  In the current
implementation, the structure contains a pointer to a buffer
that holds the actual address.

In rpcbind(8), netbuf structures are copied directly, which would
result in two netbuf structures that reference to one shared
address buffer.  When one of the two netbuf structures is freed,
access to the other netbuf structure would result in an undefined
result that may crash the rpcbind(8) daemon.

Fix this by making a copy of the buffer that is going to be freed
instead of doing a shallow copy.

Security: FreeBSD-SA-15:24.rpcbind
Security: CVE-2015-7236
Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@288385 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix regression in pw(8) when creating numeric users or groups.
delphij [Wed, 16 Sep 2015 20:59:41 +0000 (20:59 +0000)]
Fix regression in pw(8) when creating numeric users or groups.
[EN-15:16]

Fix libc handling of signals for multi-threaded processes.
[EN-15:17]

Implement pubkey support for pkg(7) bootstrap. [EN-15:18]

Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@287872 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix OpenSSH multiple vulnerabilities. [SA-15:22]
delphij [Tue, 25 Aug 2015 20:48:51 +0000 (20:48 +0000)]
Fix OpenSSH multiple vulnerabilities. [SA-15:22]

Fix insufficient check of unsupported pkg(7) signature methods.
[EN-15:15]

Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@287145 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix multiple integer overflows in expat.
delphij [Tue, 18 Aug 2015 19:30:17 +0000 (19:30 +0000)]
Fix multiple integer overflows in expat.

Security: CVE-2015-1283
Security: FreeBSD-SA-15:20.expat

Fix make(1) syntax errors when upgrading from 9.x and earlier.
[EN-15:11]

Fix incorrect netstat(1) data handling on 32-bit systems.
[EN-15:12]

Allow size argument to vidcontrol(1) for syscons(4). [EN-15:13]

Approved by: so

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286901 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoUpdate releng/10.2 to -RELEASE status, and prepare for final
gjb [Wed, 12 Aug 2015 14:17:41 +0000 (14:17 +0000)]
Update releng/10.2 to -RELEASE status, and prepare for final
10.2-RELEASE builds.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286666 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoAnticipate the expected 10.2-RELEASE date.
gjb [Wed, 12 Aug 2015 14:08:06 +0000 (14:08 +0000)]
Anticipate the expected 10.2-RELEASE date.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286665 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoSet static abitag to the current value of __FreeBSD_version.
gjb [Wed, 12 Aug 2015 14:02:56 +0000 (14:02 +0000)]
Set static abitag to the current value of __FreeBSD_version.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286664 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoUpdate releng/10.2 to RC2 in preparation for the next set of builds.
gjb [Thu, 6 Aug 2015 22:01:09 +0000 (22:01 +0000)]
Update releng/10.2 to RC2 in preparation for the next set of builds.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286391 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r286384: MFC r286375:
delphij [Thu, 6 Aug 2015 19:52:28 +0000 (19:52 +0000)]
MFS r286384: MFC r286375:

Now that stable/8 is EOL, stop building INDEX-8.

Approved by: re (gjb)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286386 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix a typo.
gjb [Thu, 6 Aug 2015 14:13:44 +0000 (14:13 +0000)]
Fix a typo.

Submitted by: pkelsey
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286365 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r286340 (bapt):
gjb [Thu, 6 Aug 2015 01:39:23 +0000 (01:39 +0000)]
MFS r286340 (bapt):
  Fix segfault in pw(8) when modifying the UID of
  a user.

PR: 202111
Approved by: re (delphij)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286357 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoDocument SA-15:18, SA-15:19.
gjb [Wed, 5 Aug 2015 22:31:41 +0000 (22:31 +0000)]
Document SA-15:18, SA-15:19.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286356 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix patch(1) shell injection vulnerability via ed(1). [SA-15:18]
delphij [Wed, 5 Aug 2015 22:05:12 +0000 (22:05 +0000)]
Fix patch(1) shell injection vulnerability via ed(1). [SA-15:18]

Fix routed remote denial of service vulnerability. [SA-15:19]

Approved by: re (so blanket)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286350 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoSwitch the pkg(8) repository to use the release package set
gjb [Wed, 5 Aug 2015 19:56:23 +0000 (19:56 +0000)]
Switch the pkg(8) repository to use the release package set
to populate dvd1.iso.

This is a direct commit to releng/10.2.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286339 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r286322:
trasz [Wed, 5 Aug 2015 16:58:04 +0000 (16:58 +0000)]
MFS r286322:

Make the kern.racct.enable tunable actually work.

This is a direct commit to 10-STABLE - 11-CURRENT is not affected,
because tunables are automatically fetched there.

Approved by: re (gjb)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286326 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoCleanup pass through the relnotes file:
gjb [Tue, 4 Aug 2015 19:43:48 +0000 (19:43 +0000)]
Cleanup pass through the relnotes file:
- Reword a few entries for consistency throughout the document.
- Remove the 'role="arm"' from the arm-specific section, as it
  is redundant.
- s/&man.geom.4;/GEOM/ in a title, because it looks ridiculous.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286295 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r286286:
gjb [Tue, 4 Aug 2015 13:42:44 +0000 (13:42 +0000)]
MFS r286286:
MFC r286285:
 Ensure the local MANIFEST is always used when verifying remote
 distribution sets.

Approved by: re (glebius)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286287 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFC r285878 (stable/10 r286145):
kib [Tue, 4 Aug 2015 05:18:24 +0000 (05:18 +0000)]
MFC r285878 (stable/10 r286145):
Revert r173708's modifications to vm_object_page_remove().
This fixes inconsistencies encountered by vm_object_unwire() or
by the buffer cache when the file is truncated.

Approved by: re (gjb)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286276 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMF-stable/10 r286263:
imp [Tue, 4 Aug 2015 00:11:38 +0000 (00:11 +0000)]
MF-stable/10 r286263:

Only match devices that belong to this driver.
Approved by: re@ (gjb@)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286264 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoRemove another stray empty section.
gjb [Mon, 3 Aug 2015 19:08:47 +0000 (19:08 +0000)]
Remove another stray empty section.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286253 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix a whitespace nit.
gjb [Mon, 3 Aug 2015 19:08:45 +0000 (19:08 +0000)]
Fix a whitespace nit.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286252 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoRemove a few empty sections.
gjb [Mon, 3 Aug 2015 19:08:43 +0000 (19:08 +0000)]
Remove a few empty sections.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286251 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoAdd a ports-versions section.
gjb [Mon, 3 Aug 2015 19:08:40 +0000 (19:08 +0000)]
Add a ports-versions section.
Document a few interesting package versions for 10.2-RELEASE.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286250 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoDocument r283990, mpr(4) updated to version 9.255.01.00-fbsd.
gjb [Mon, 3 Aug 2015 19:08:38 +0000 (19:08 +0000)]
Document r283990, mpr(4) updated to version 9.255.01.00-fbsd.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286249 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoDocument r284935, hptnr(4) updated to version 1.1.4.
gjb [Mon, 3 Aug 2015 19:08:35 +0000 (19:08 +0000)]
Document r284935, hptnr(4) updated to version 1.1.4.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286248 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoDocument r284879, htp27xx(4) updated to version 1.2.7.
gjb [Mon, 3 Aug 2015 19:08:33 +0000 (19:08 +0000)]
Document r284879, htp27xx(4) updated to version 1.2.7.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286247 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoDocument r281963, snd_hda(4) support for ThinkPad X1 20BS model.
gjb [Mon, 3 Aug 2015 19:08:31 +0000 (19:08 +0000)]
Document r281963, snd_hda(4) support for ThinkPad X1 20BS model.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286246 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoDocument r278407, r279924, uart(4) updates for ThinkPad AMT
gjb [Mon, 3 Aug 2015 19:08:29 +0000 (19:08 +0000)]
Document r278407, r279924, uart(4) updates for ThinkPad AMT
serial devices.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286245 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoForced commit to mark the real 10.2-RC2 point.
gjb [Fri, 31 Jul 2015 16:46:30 +0000 (16:46 +0000)]
Forced commit to mark the real 10.2-RC2 point.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286137 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r286132:
gjb [Fri, 31 Jul 2015 16:44:57 +0000 (16:44 +0000)]
MFS r286132:
MFC r286131:
 Pull pmspcv (pms(4)) from GENERIC.  It has PCI ID conflicts
 with ahd(4), mvs(4), and likely other drivers.

Approved by: re (implicit, release blocker)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286135 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoUpdate releng/10.2 to RC2 in preparation for the next set of builds.
gjb [Fri, 31 Jul 2015 00:00:59 +0000 (00:00 +0000)]
Update releng/10.2 to RC2 in preparation for the next set of builds.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286098 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoDocument r286084, tar(1) sparse file fix.
gjb [Thu, 30 Jul 2015 23:58:55 +0000 (23:58 +0000)]
Document r286084, tar(1) sparse file fix.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286097 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoDocument r285830, specifically that the default pkg(8) repository
gjb [Thu, 30 Jul 2015 23:58:53 +0000 (23:58 +0000)]
Document r285830, specifically that the default pkg(8) repository
was switched from 'latest' to 'quarterly' for 10.2-RELEASE.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286096 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r286082:
bdrewery [Thu, 30 Jul 2015 18:00:37 +0000 (18:00 +0000)]
MFS r286082:

  MFC r285972:

    MFV r285970:

      Apply upstream changeset bf4f6ec64e:

      Fix issue 356: properly skip a sparse file entry in a tar file.

PR: 201506
Relnotes: yes
Approved by: re (gjb)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286084 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS 286079:
gjb [Thu, 30 Jul 2015 17:06:28 +0000 (17:06 +0000)]
MFS 286079:
MFC r285999 (kp):
  pf: Always initialise pf_fragment.fr_flags

  When we allocate the struct pf_fragment in pf_fillup_fragment() we
  forgot to initialise the fr_flags field. As a result we sometimes
  mistakenly thought the fragment to not be a buffered fragment.
  This resulted in panics because we'd end up freeing the pf_fragment
  but not removing it from V_pf_fragqueue (believing it to be part of
  V_pf_cachequeue).  The next time we iterated V_pf_fragqueue we'd use
  a freed object and panic.

  While here also fix a pf_fragment use after free in pf_normalize_ip().
  pf_reassemble() frees the pf_fragment, so we can't use it any more.

Approved by: re (glebius)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286083 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFC: r285843 (r286059 in stable/10)
marius [Thu, 30 Jul 2015 03:06:11 +0000 (03:06 +0000)]
MFC: r285843 (r286059 in stable/10)

- Since r253161, uart_intr() abuses FILTER_SCHEDULE_THREAD for signaling
  uart_bus_attach() during its test that 20 iterations weren't sufficient
  for clearing all pending interrupts, assuming this means that hardware
  is broken and doesn't deassert interrupts. However, under pressure, 20
  iterations also can be insufficient for clearing all pending interrupts,
  leading to a panic as intr_event_handle() tries to schedule an interrupt
  handler not registered. Solve this by introducing a flag that is set in
  test mode and otherwise restores pre-r253161 behavior of uart_intr(). The
  approach of additionally registering uart_intr() as handler as suggested
  in PR 194979 is not taken as that in turn would abuse special pccard and
  pccbb handling code of intr_event_handle(). [1]
- Const'ify uart_driver_name.
- Fix some minor style bugs.

PR: 194979 [1]
Reviewed by: marcel (earlier version)
Approved by: re (gjb)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286061 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFC: r285839 (r286055 in stable/10)
marius [Thu, 30 Jul 2015 02:45:35 +0000 (02:45 +0000)]
MFC: r285839 (r286055 in stable/10)

o Revert the other functional half of r239864, i. e. the merge of r134227
  from x86 to use smp_ipi_mtx spin lock not only for smp_rendezvous_cpus()
  but also for the MD cache invalidation, TLB demapping and remote register
  reading IPIs due to the following reasons:
  - The cross-IPI SMP deadlock x86 otherwise is subject to can't happen on
    sparc64. That's because on sparc64, spin locks don't disable interrupts
    completely but only raise the processor interrupt level to PIL_TICK. This
    means that IPIs still get delivered and direct dispatch IPIs such as the
    cache invalidation etc. IPIs in question are still executed.
  - In smp_rendezvous_cpus(), smp_ipi_mtx is held not only while sending an
    IPI_RENDEZVOUS, but until all CPUs have processed smp_rendezvous_action().
    Consequently, smp_ipi_mtx may be locked for an extended amount of time as
    queued IPIs (as opposed to the direct ones) such as IPI_RENDEZVOUS are
    scheduled via a soft interrupt. Moreover, given that this soft interrupt
    is only delivered at PIL_RENDEZVOUS, processing of smp_rendezvous_action()
    on a target may be interrupted by f. e. a tick interrupt at PIL_TICK, in
    turn leading to the target in question trying to send an IPI by itself
    while IPI_RENDEZVOUS isn't fully handled, yet, and, thus, resulting in a
    deadlock.
o As mentioned in the commit message of r245850, on least some sun4u platforms
  concurrent sending of IPIs by different CPUs is fatal. Therefore, hold the
  reintroduced MD ipi_mtx also while delivering cross-traps via MI helpers,
  i. e. ipi_{all_but_self,cpu,selected}().
o Akin to x86, let the last CPU to process cpu_mp_bootstrap() set smp_started
  instead of the BSP in cpu_mp_unleash(). This ensures that all APs actually
  are started, when smp_started is no longer 0.
o In all MD and MI IPI helpers, check for smp_started == 1 rather than for
  smp_cpus > 1 or nothing at all. This avoids races during boot causing IPIs
  trying to be delivered to APs that in fact aren't up and running, yet.
  While at it, move setting of the cpu_ipi_{selected,single}() pointers to
  the appropriate delivery functions from mp_init() to cpu_mp_start() where
  it's better suited and allows to get rid of the global isjbus variable.
o Given that now concurrent IPI delivery no longer is possible, also nuke
  the delays before completely disabling interrupts again in the CPU-specific
  cross-trap delivery functions, previously giving other CPUs a window for
  sending IPIs on their part. Actually, we now should be able to entirely get
  rid of completely disabling interrupts in these functions. Such a change
  needs more testing, though.
o In {s,}tick_get_timecount_mp(), make the {s,}tick variable static. While not
  necessary for correctness, this avoids page faults when accessing the stack
  of a foreign CPU as {s,}tick now is locked into the TLBs as part of static
  kernel data. Hence, {s,}tick_get_timecount_mp() always execute as fast as
  possible, avoiding jitter.

PR: 201245
Approved by: re (gjb)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286060 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFC r285928 Do not enable UDP checksum offloading when running on the
whu [Thu, 30 Jul 2015 02:22:38 +0000 (02:22 +0000)]
MFC r285928 Do not enable UDP checksum offloading when running on the
Hyper-V on Windows Server 2012 and earlier hosts.

Submitted by: whu
Reviewed by: royger
Approved by: re (gjb)
Sponsored by: Microsoft OSTC
Differential Revision: https://reviews.freebsd.org/D3102

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286058 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoSet the default VHD file format to the fixed-size image for the
gjb [Wed, 29 Jul 2015 23:34:38 +0000 (23:34 +0000)]
Set the default VHD file format to the fixed-size image for the
10.2-RELEASE, as the issue preventing the dynamic-size image from
booting is not yet resolved.

This is a direct commit to releng/10.2.

Approved by: re (kib)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286048 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoAdd ixl(4) to the hardware notes.
gjb [Wed, 29 Jul 2015 20:17:29 +0000 (20:17 +0000)]
Add ixl(4) to the hardware notes.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286039 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoUpdate copyright after r286023.
gjb [Wed, 29 Jul 2015 20:17:26 +0000 (20:17 +0000)]
Update copyright after r286023.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286038 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFC: r285859 (via r286019)
brueffer [Wed, 29 Jul 2015 17:28:04 +0000 (17:28 +0000)]
MFC: r285859 (via r286019)

Auto-generate hardware notes for pms(4).

Approved by: re (gjb)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286023 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFC: r285858, r286017
brueffer [Wed, 29 Jul 2015 17:25:18 +0000 (17:25 +0000)]
MFC: r285858, r286017

Add a basic manpage for the pms driver.

Approved by: re (gjb)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286022 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMerge r285939-285941,285943,286004 from stable/10:
glebius [Wed, 29 Jul 2015 14:16:25 +0000 (14:16 +0000)]
Merge r285939-285941,285943,286004 from stable/10:
- Protect against ioctl() vs ioctl() races.
- Always lock hash row of a source node when updating
  its 'states' counter. [1]
- Don't dereference NULL is pf_get_mtag() fails. [2]
- During module unload drop locks before destroying UMA zone.

PR: 182401 [1]
PR: 200222 [2]
Approved by: re (gjb)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@286014 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r285863 (jhb):
gjb [Wed, 29 Jul 2015 00:57:54 +0000 (00:57 +0000)]
MFS r285863 (jhb):
 Partially revert r284034.  In particular, revert the final change in
 this MFC (281874).  It broke suspend and resume on several Thinkpads
 (though not all) in 10 even though it works fine on the same laptops
 in HEAD.

PR: 201239
Reported by: Kevin Oberman and several others
Approved by: re (kib)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285991 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoDocument SA-15:14 through SA-15:16.
gjb [Tue, 28 Jul 2015 20:42:36 +0000 (20:42 +0000)]
Document SA-15:14 through SA-15:16.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285983 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix patch(1) shell injection vulnerability. [SA-15:14]
delphij [Tue, 28 Jul 2015 19:59:04 +0000 (19:59 +0000)]
Fix patch(1) shell injection vulnerability. [SA-15:14]

Fix resource exhaustion in TCP reassembly. [SA-15:15]

Fix OpenSSH multiple vulnerabilities. [SA-15:16]

Approved by: re (so blanket)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285978 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFC r285134 (by mjg):
kib [Tue, 28 Jul 2015 17:00:03 +0000 (17:00 +0000)]
MFC r285134 (by mjg):
fd: de-k&r-ify functions + some whitespace fixes

MFC r285269:
Handle copyout for the fcntl(F_OGETLK) using oflock structure.

Approved by: re (gjb)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285964 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix the description for r274486.
gjb [Tue, 28 Jul 2015 15:05:19 +0000 (15:05 +0000)]
Fix the description for r274486.

Submitted by: glebius
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285962 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r285951: Avoid creating invalid UEFI device path
emaste [Tue, 28 Jul 2015 13:11:31 +0000 (13:11 +0000)]
MFS r285951: Avoid creating invalid UEFI device path

The UEFI loader on the 10.1 release install disk (disc1) modifies an
existing EFI_DEVICE_PATH_PROTOCOL instance in an apparent attempt to
truncate the device path.  In doing so it creates an invalid device
path.

Perform the equivalent action without modification of structures
allocated by firmware.

PR: 197641
Submitted by: Chris Ruffin <chris.ruffin at intel.com>
Approved by: re (gjb)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285956 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r285950: mfiutil: increase buffer size to accommodate sprintf string
emaste [Tue, 28 Jul 2015 12:52:22 +0000 (12:52 +0000)]
MFS r285950: mfiutil: increase buffer size to accommodate sprintf string

PR: 201289
Approved by: re (gjb)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285953 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r285918:
jimharris [Mon, 27 Jul 2015 17:53:11 +0000 (17:53 +0000)]
MFS r285918:
MFC r285816:

  nvme: ensure csts.rdy bit is cleared before returning from nvme_ctrlr_disable

Approved by: re (gjb)
Sponsored by: Intel

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285922 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r285917:
jimharris [Mon, 27 Jul 2015 17:52:17 +0000 (17:52 +0000)]
MFS r285917:
MFC r285815:

  nvme: properly handle case where pci_alloc_msix does not alloc all vectors

Approved by: re (gjb)
Sponsored by: Intel

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285921 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r285916:
jimharris [Mon, 27 Jul 2015 17:51:12 +0000 (17:51 +0000)]
MFS r285916:
MFC r285796:

  nvmecontrol: read controller identify data before any log page operations

Approved by: re (gjb)
Sponsored by: Intel

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285920 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r285915:
jimharris [Mon, 27 Jul 2015 17:50:05 +0000 (17:50 +0000)]
MFS r285915:
MFC r285767:

  nvd: set d_delmaxsize to full capacity of NVMe namespace

  The NVMe specification has no ability to specify a maximum delete size
  that is less than the full capacity of the namespace - so just using the
  namespace size is the correct value here.

  This fixes reported issues where ZFS trim on init looked like it was
  hanging the system - previously the default I/O max size (128KB on
  Intel NVMe controllers) was used for delete operations which worked out
  to only about 8MB/s.  With this patch I can add an 800GB DC P3700
  drive to a ZFS pool in about 15-20 seconds.

Approved by: re (gjb)
Sponsored by: Intel

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285919 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoDocument r285721, bsdinstall aligns zfs partitions on 1Mb boundaries.
gjb [Sun, 26 Jul 2015 19:47:46 +0000 (19:47 +0000)]
Document r285721, bsdinstall aligns zfs partitions on 1Mb boundaries.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285902 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoDocument r285750, ssh(1) hostname canonicalization before looking
gjb [Sun, 26 Jul 2015 19:47:43 +0000 (19:47 +0000)]
Document r285750, ssh(1) hostname canonicalization before looking
for the host in known_hosts.
Add Dell, Inc. to sponsors.ent.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285901 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoDocument r285769, bsdinstall(8) updates to workaround various
gjb [Sun, 26 Jul 2015 19:47:41 +0000 (19:47 +0000)]
Document r285769, bsdinstall(8) updates to workaround various
problematic BIOSes when booting from GPT, and partition scheme
selection in the UFS partition menu.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285900 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoDocument r273838, PLPMTUD blackhole detection (RFC 4821).
gjb [Sun, 26 Jul 2015 19:47:38 +0000 (19:47 +0000)]
Document r273838, PLPMTUD blackhole detection (RFC 4821).

Submitted by: sbruno
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285899 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFurther refine the PAE_TABLES entry, based on feedback from
gjb [Sun, 26 Jul 2015 17:57:53 +0000 (17:57 +0000)]
Further refine the PAE_TABLES entry, based on feedback from
alc.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285895 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r285856:
delphij [Fri, 24 Jul 2015 22:08:57 +0000 (22:08 +0000)]
MFS r285856:

MFC r285701:

Use fixed date/time (the time choosen was the time the import was done
on -HEAD) in libntp so we can make reproducible build.

PR: bin/201661
Differential Revision: https://reviews.freebsd.org/D3122

While I'm there also remove libmd from linkage as reported in bin/201738

PR: bin/201738
Submitted by: John Marshall
Approved by: re (gjb)

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285861 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoAdd a local entity for the pms(4) driver.
gjb [Fri, 24 Jul 2015 22:00:44 +0000 (22:00 +0000)]
Add a local entity for the pms(4) driver.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285860 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoFix rendering of a URL.
gjb [Fri, 24 Jul 2015 19:50:55 +0000 (19:50 +0000)]
Fix rendering of a URL.
Update entities to reflect 10.2-RELEASE in preparation for
adding the hardware, relnotes, and installation pages to the
website.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285855 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoMFS r285849: Fix minor errors found by coverity.
emaste [Fri, 24 Jul 2015 19:37:30 +0000 (19:37 +0000)]
MFS r285849: Fix minor errors found by coverity.

PR: 201594
Approved by: re (gjb)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285853 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoUpdate the pkg.conf(5) for the dvd1.iso packages to use the
gjb [Fri, 24 Jul 2015 19:16:16 +0000 (19:16 +0000)]
Update the pkg.conf(5) for the dvd1.iso packages to use the
'quarterly' branch, which was missed in r285830.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285850 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years agoPrune svn:mergeinfo after branching stable/10 -> releng/10.2
gjb [Thu, 23 Jul 2015 23:37:03 +0000 (23:37 +0000)]
Prune svn:mergeinfo after branching stable/10 -> releng/10.2

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285832 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f

6 years ago- Copy stable/10@285827 to releng/10.2 in preparation for 10.2-RC1
gjb [Thu, 23 Jul 2015 23:31:40 +0000 (23:31 +0000)]
- Copy stable/10@285827 to releng/10.2 in preparation for 10.2-RC1
  builds.
- Update newvers.sh to reflect RC1.
- Update __FreeBSD_version to reflect 10.2.
- Update default pkg(8) configuration to use the quarterly branch.[1]

Discussed with: re, portmgr [1]
Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

git-svn-id: https://svn.freebsd.org/base/releng/10.2@285830 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f