From owner-svn-doc-head@freebsd.org Sun Oct 30 00:58:45 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id DF80DC1DDE5;
Sun, 30 Oct 2016 00:58:45 +0000 (UTC)
(envelope-from rcyu@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 92C3EB4;
Sun, 30 Oct 2016 00:58:45 +0000 (UTC)
(envelope-from rcyu@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u9U0wiDt067087;
Sun, 30 Oct 2016 00:58:44 GMT (envelope-from rcyu@FreeBSD.org)
Received: (from rcyu@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id u9U0wirW067086;
Sun, 30 Oct 2016 00:58:44 GMT (envelope-from rcyu@FreeBSD.org)
Message-Id: <201610300058.u9U0wirW067086@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: rcyu set sender to
rcyu@FreeBSD.org using -f
From: Ruey-Cherng Yu
Date: Sun, 30 Oct 2016 00:58:44 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49610 - head/zh_TW.UTF-8/htdocs
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Sun, 30 Oct 2016 00:58:46 -0000
Author: rcyu
Date: Sun Oct 30 00:58:44 2016
New Revision: 49610
URL: https://svnweb.freebsd.org/changeset/doc/49610
Log:
-Add zh_TW to the language selector links
-Fix the base directory of the language selector links (English base)
Approved by: kevlo(mentor)
Modified:
head/zh_TW.UTF-8/htdocs/index.xsl
Modified: head/zh_TW.UTF-8/htdocs/index.xsl
==============================================================================
--- head/zh_TW.UTF-8/htdocs/index.xsl Sat Oct 29 13:49:28 2016 (r49609)
+++ head/zh_TW.UTF-8/htdocs/index.xsl Sun Oct 30 00:58:44 2016 (r49610)
@@ -121,34 +121,37 @@
From owner-svn-doc-head@freebsd.org Sun Oct 30 01:30:18 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 740F7C24972;
Sun, 30 Oct 2016 01:30:18 +0000 (UTC)
(envelope-from ryusuke@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 32F6E1000;
Sun, 30 Oct 2016 01:30:18 +0000 (UTC)
(envelope-from ryusuke@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u9U1UH2q078563;
Sun, 30 Oct 2016 01:30:17 GMT (envelope-from ryusuke@FreeBSD.org)
Received: (from ryusuke@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id u9U1UH5R078562;
Sun, 30 Oct 2016 01:30:17 GMT (envelope-from ryusuke@FreeBSD.org)
Message-Id: <201610300130.u9U1UH5R078562@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: ryusuke set sender to
ryusuke@FreeBSD.org using -f
From: Ryusuke SUZUKI
Date: Sun, 30 Oct 2016 01:30:17 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49611 - head/ja_JP.eucJP/htdocs/security
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Sun, 30 Oct 2016 01:30:18 -0000
Author: ryusuke
Date: Sun Oct 30 01:30:17 2016
New Revision: 49611
URL: https://svnweb.freebsd.org/changeset/doc/49611
Log:
- Merge the following from the English version:
r49577 -> r49581 head/ja_JP.eucJP/htdocs/security/security.xml
Modified:
head/ja_JP.eucJP/htdocs/security/security.xml
Modified: head/ja_JP.eucJP/htdocs/security/security.xml
==============================================================================
--- head/ja_JP.eucJP/htdocs/security/security.xml Sun Oct 30 00:58:44 2016 (r49610)
+++ head/ja_JP.eucJP/htdocs/security/security.xml Sun Oct 30 01:30:17 2016 (r49611)
@@ -5,16 +5,16 @@
]>
-
+
- &title;
+ &title;
- $FreeBSD$
-
+ $FreeBSD$
+
-
+
FreeBSD/i386 10.3-RELEASE running as a guest
operating system on VirtualBox
can have a problem with disk I/O access. It depends on some
specific hardware configuration and does not depend on a
Modified: head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html Mon Oct 31 08:55:16 2016 (r49617)
+++ head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html Mon Oct 31 16:46:45 2016 (r49618)
@@ -1,5 +1,5 @@
-
FreeBSD 11.0-RELEASE Errata
FreeBSD 11.0-RELEASE Errata
The FreeBSD Project
Copyright 2016 The FreeBSD Documentation Project
FreeBSD is a registered trademark of
+
FreeBSD 11.0-RELEASE Errata
FreeBSD 11.0-RELEASE Errata
The FreeBSD Project
Copyright 2016 The FreeBSD Documentation Project
FreeBSD is a registered trademark of
the FreeBSD Foundation.
Intel, Celeron, Centrino, Core, EtherExpress, i386,
i486, Itanium, Pentium, and Xeon are trademarks or registered
trademarks of Intel Corporation or its subsidiaries in the United
@@ -36,7 +36,7 @@
which keep up-to-date mirrors of this location.
Source and binary snapshots of FreeBSD 11.0-STABLE also
contain up-to-date copies of this document (as of the time of
the snapshot).
An issue was discovered with Amazon EC2™
images which would cause the virtual machine to hang during
boot when upgrading from previous FreeBSD versions. New
EC2™ installations are not affected, but existing
Modified: head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Mon Oct 31 08:55:16 2016 (r49617)
+++ head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Mon Oct 31 16:46:45 2016 (r49618)
@@ -73,7 +73,9 @@
layer
@@ -187,7 +187,7 @@
- Google Inc.
+ Google Inc
@@ -545,8 +545,8 @@
x11-clocks/xfce4-datetime-plugin (0.6.99)
-
Currently, the unstable releases work fine with our Gtk3
- ports available in the ports tree, but in the future, support
+
Currently the unstable releases work fine with our Gtk3
+ ports available in the ports tree, but in the future support
for 3.18 will be removed in preference of 3.20.x.
@@ -662,7 +662,7 @@
- iXsystems, Inc.
+ iXsystems, Inc
@@ -957,7 +957,7 @@
- The igor Port.
+ The igor Port.BSD Family Tree in SubversionThe UNIX Heritage SocietyCat-V Manual Library
@@ -1418,7 +1418,7 @@
mtx_trylock_spin(9) was implemented and is used for
this purpose.
-
The userspace getttimeofday(2) implementation was
+
The userspace gettimeofday(2) implementation was
enhanced to allow syscall-less operation on machines that use
HPET hardwire for timecounters. The HPET algorithm coexists
with older RDTSC-based code, allowing dynamic switching of
@@ -1429,7 +1429,7 @@
but, not unexpectedly, even the syscall-less HPET timecounter
is slower than invoking a syscall for RDTSC.
-
Some not strictly interwined but related code is the
+
Some not strictly intertwined but related code is the
time-bound sleep implementation. Handling of races between
callouts and the top-half code that sets and processes the
timeouts depended on the many fine details of the
@@ -1610,13 +1610,13 @@
GitHub Repository
- Graphics Stack Roadmap and Supported Hardware Matrix
+ Graphics Stack Roadmap and Supported Hardware MatrixPorts Development RepositoryDRM 4.7 Development Repository
- GSoC 2016: Link /dev Entries to Sysctl Nodes
+ GSoC 2016: Link /dev Entries to Sysctl NodesGSoC 2016: Redesign libdevq Wayland Notes
- Graphics Team Blog
+ Graphics Team Blog
@@ -1724,7 +1724,7 @@
Provided kernel support for EFI Runtime Services
calls
-
Implemented getttimeofday(2) purely in userspace
+
Implemented gettimeofday(2) purely in userspace
for HPET timers
Held a Women in Tech BoF in partnership with ACM-W
Europe
-
Bennedict organized the EuroBSDCon Developer
+
Bennedict organized the EuroBSDcon Developer
Summit
Deb gave a Foundation Update talk and Hiroki Sato and
@@ -1929,7 +1929,7 @@
We sponsored three &os; contributors to attend
- EuroBSDCon.
+ EuroBSDcon.
Legal/&os; IP
@@ -2119,12 +2119,12 @@
EdMaste
- emaste@freebsd.org
+ emaste@FreeBSD.org
- LLD Wiki Page
+ LLD Wiki Page
@@ -2246,7 +2246,7 @@
machines, supervised the package builds for 11.0-RELEASE, and
added support for building arm64 packages.
-
At EuroBSDCon, rene visited a presentation by Landry Breuil
+
At EuroBSDcon, rene visited a presentation by Landry Breuil
<landry@openbsd.org> explaining how packages are built
in the OpenBSD world and explaining various design
decisions.
From owner-svn-doc-head@freebsd.org Wed Nov 2 07:39:01 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 150D6C2A46E;
Wed, 2 Nov 2016 07:39:01 +0000 (UTC)
(envelope-from delphij@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id BCA0611C5;
Wed, 2 Nov 2016 07:39:00 +0000 (UTC)
(envelope-from delphij@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA27cxTe082315;
Wed, 2 Nov 2016 07:38:59 GMT (envelope-from delphij@FreeBSD.org)
Received: (from delphij@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA27cxgo082314;
Wed, 2 Nov 2016 07:38:59 GMT (envelope-from delphij@FreeBSD.org)
Message-Id: <201611020738.uA27cxgo082314@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: delphij set sender to
delphij@FreeBSD.org using -f
From: Xin LI
Date: Wed, 2 Nov 2016 07:38:59 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49622 - head/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 02 Nov 2016 07:39:01 -0000
Author: delphij
Date: Wed Nov 2 07:38:59 2016
New Revision: 49622
URL: https://svnweb.freebsd.org/changeset/doc/49622
Log:
Use stylesheet for prints as well.
Modified:
head/share/xml/xhtml.xsl
Modified: head/share/xml/xhtml.xsl
==============================================================================
--- head/share/xml/xhtml.xsl Wed Nov 2 01:34:58 2016 (r49621)
+++ head/share/xml/xhtml.xsl Wed Nov 2 07:38:59 2016 (r49622)
@@ -42,7 +42,7 @@
-
+
&header1.googlejs;
From owner-svn-doc-head@freebsd.org Wed Nov 2 07:45:13 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4A59CC2A671;
Wed, 2 Nov 2016 07:45:13 +0000 (UTC)
(envelope-from delphij@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 14A631D59;
Wed, 2 Nov 2016 07:45:13 +0000 (UTC)
(envelope-from delphij@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA27jCeJ086135;
Wed, 2 Nov 2016 07:45:12 GMT (envelope-from delphij@FreeBSD.org)
Received: (from delphij@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA27jBZ2086123;
Wed, 2 Nov 2016 07:45:11 GMT (envelope-from delphij@FreeBSD.org)
Message-Id: <201611020745.uA27jBZ2086123@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: delphij set sender to
delphij@FreeBSD.org using -f
From: Xin LI
Date: Wed, 2 Nov 2016 07:45:11 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49623 - in head/share: security/advisories
security/patches/SA-16:33 security/patches/SA-16:34 security/patches/SA-16:35
xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 02 Nov 2016 07:45:13 -0000
Author: delphij
Date: Wed Nov 2 07:45:10 2016
New Revision: 49623
URL: https://svnweb.freebsd.org/changeset/doc/49623
Log:
Add SA-16:33, SA-16:34 and SA-16:35.
Added:
head/share/security/advisories/FreeBSD-SA-16:33.openssh.asc (contents, props changed)
head/share/security/advisories/FreeBSD-SA-16:34.bind.asc (contents, props changed)
head/share/security/advisories/FreeBSD-SA-16:35.openssl.asc (contents, props changed)
head/share/security/patches/SA-16:33/
head/share/security/patches/SA-16:33/openssh.patch (contents, props changed)
head/share/security/patches/SA-16:33/openssh.patch.asc (contents, props changed)
head/share/security/patches/SA-16:34/
head/share/security/patches/SA-16:34/bind.patch (contents, props changed)
head/share/security/patches/SA-16:34/bind.patch.asc (contents, props changed)
head/share/security/patches/SA-16:35/
head/share/security/patches/SA-16:35/openssl-10.patch (contents, props changed)
head/share/security/patches/SA-16:35/openssl-10.patch.asc (contents, props changed)
head/share/security/patches/SA-16:35/openssl-9.patch (contents, props changed)
head/share/security/patches/SA-16:35/openssl-9.patch.asc (contents, props changed)
Modified:
head/share/xml/advisories.xml
Added: head/share/security/advisories/FreeBSD-SA-16:33.openssh.asc
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/share/security/advisories/FreeBSD-SA-16:33.openssh.asc Wed Nov 2 07:45:10 2016 (r49623)
@@ -0,0 +1,143 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-SA-16:33.openssh Security Advisory
+ The FreeBSD Project
+
+Topic: OpenSSH Remote Denial of Service vulnerability
+
+Category: contrib
+Module: OpenSSH
+Announced: 2016-11-02
+Affects: All supported versions of FreeBSD.
+Corrected: 2016-11-02 06:56:35 UTC (stable/11, 11.0-STABLE)
+ 2016-11-02 07:23:19 UTC (releng/11.0, 11.0-RELEASE-p3)
+ 2016-11-02 06:58:47 UTC (stable/10, 10.3-STABLE)
+ 2016-11-02 07:23:36 UTC (releng/10.3, 10.3-RELEASE-p12)
+CVE Name: CVE-2016-8858
+
+For general information regarding FreeBSD Security Advisories,
+including descriptions of the fields above, security branches, and the
+following sections, please visit .
+
+I. Background
+
+OpenSSH is an implementation of the SSH protocol suite, providing an
+encrypted and authenticated transport for a variety of services,
+including remote shell access.
+
+During the SSH handshake procedure, the client and server exchanges the
+supported encryption, MAC and compression algorithms along with other
+information to negotiate algorithms for initial key exchange, with a
+message named SSH_MSG_KEXINIT.
+
+II. Problem Description
+
+When processing the SSH_MSG_KEXINIT message, the server could allocate
+up to a few hundreds of megabytes of memory per each connection, before
+any authentication take place.
+
+III. Impact
+
+A remote attacker may be able to cause a SSH server to allocate an excessive
+amount of memory. Note that the default MaxStartups setting on FreeBSD will
+limit the effectiveness of this attack.
+
+IV. Workaround
+
+No workaround is available, but systems where sshd(8) is not used are
+not vulnerable.
+
+V. Solution
+
+Perform one of the following:
+
+1) Upgrade your vulnerable system to a supported FreeBSD stable or
+release / security branch (releng) dated after the correction date.
+
+The sshd(8) service has to be restarted after the update. A reboot
+is recommended but not required.
+
+2) To update your vulnerable system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the i386 or amd64
+platforms can be updated via the freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+
+The sshd(8) service has to be restarted after the update. A reboot
+is recommended but not required.
+
+3) To update your vulnerable system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+# fetch https://security.FreeBSD.org/patches/SA-16:33/openssh.patch
+# fetch https://security.FreeBSD.org/patches/SA-16:33/openssh.patch.asc
+# gpg --verify openssh.patch.asc
+
+b) Apply the patch. Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+
+c) Recompile the operating system using buildworld and installworld as
+described in .
+
+The sshd(8) service has to be restarted after the update. A reboot
+is recommended but not required.
+
+VI. Correction details
+
+The following list contains the correction revision numbers for each
+affected branch.
+
+Branch/path Revision
+- -------------------------------------------------------------------------
+stable/10/ r308199
+releng/10.3/ r308203
+stable/11/ r308198
+releng/11.0/ r308202
+- -------------------------------------------------------------------------
+
+To see which files were modified by a particular revision, run the
+following command, replacing NNNNNN with the revision number, on a
+machine with Subversion installed:
+
+# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
+
+Or visit the following URL, replacing NNNNNN with the revision number:
+
+
+
+VII. References
+
+
+
+
+
+The latest revision of this advisory is available at
+
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.1.15 (FreeBSD)
+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+=xyal
+-----END PGP SIGNATURE-----
Added: head/share/security/advisories/FreeBSD-SA-16:34.bind.asc
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/share/security/advisories/FreeBSD-SA-16:34.bind.asc Wed Nov 2 07:45:10 2016 (r49623)
@@ -0,0 +1,137 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-SA-16:34.bind Security Advisory
+ The FreeBSD Project
+
+Topic: BIND Remote Denial of Service vulnerability
+
+Category: contrib
+Module: bind
+Announced: 2016-11-02
+Credits: ISC
+Affects: FreeBSD 9.x
+Corrected: 2016-11-02 05:13:27 UTC (stable/9, 9.3-STABLE)
+ 2016-11-02 07:24:34 UTC (releng/9.3, 9.3-RELEASE-p50)
+CVE Name: CVE-2016-8864
+
+For general information regarding FreeBSD Security Advisories,
+including descriptions of the fields above, security branches, and the
+following sections, please visit .
+
+I. Background
+
+BIND 9 is an implementation of the Domain Name System (DNS) protocols.
+The named(8) daemon is an Internet Domain Name Server.
+
+II. Problem Description
+
+A defect in BIND's handling of responses containing a DNAME answer could
+cause a resolver to exit after encountering an assertion failure in
+db.c or resolver.c.
+
+During processing of a recursive response that contains a DNAME record
+in the answer section, BIND could stop executing after encountering an
+assertion error in resolver.c.
+
+III. Impact
+
+A remote attacker who could cause a server to make a query deliberately
+chosen to trigger the failed assertions could cause named(8) to stop,
+resulting in a Denial of Service condition to its clients.
+
+IV. Workaround
+
+No workaround is available, but hosts not running named(8) recursive
+servers are not affected.
+
+V. Solution
+
+Perform one of the following:
+
+1) Upgrade your vulnerable system to a supported FreeBSD stable or
+release / security branch (releng) dated after the correction date.
+
+The named service has to be restarted after the update. A reboot is
+recommended but not required.
+
+2) To update your vulnerable system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the i386 or amd64
+platforms can be updated via the freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+
+The named service has to be restarted after the update. A reboot is
+recommended but not required.
+
+3) To update your vulnerable system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+# fetch https://security.FreeBSD.org/patches/SA-16:34/bind.patch
+# fetch https://security.FreeBSD.org/patches/SA-16:34/bind.patch.asc
+# gpg --verify bind.patch.asc
+
+b) Apply the patch. Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+
+c) Recompile the operating system using buildworld and installworld as
+described in .
+
+Restart the named service, or reboot the system.
+
+VI. Correction details
+
+The following list contains the correction revision numbers for each
+affected branch.
+
+Branch/path Revision
+- -------------------------------------------------------------------------
+stable/9/ r308193
+releng/9.3/ r308205
+- -------------------------------------------------------------------------
+
+To see which files were modified by a particular revision, run the
+following command, replacing NNNNNN with the revision number, on a
+machine with Subversion installed:
+
+# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
+
+Or visit the following URL, replacing NNNNNN with the revision number:
+
+
+
+VII. References
+
+
+
+
+
+The latest revision of this advisory is available at
+
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.1.15 (FreeBSD)
+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+=F1Vx
+-----END PGP SIGNATURE-----
Added: head/share/security/advisories/FreeBSD-SA-16:35.openssl.asc
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/share/security/advisories/FreeBSD-SA-16:35.openssl.asc Wed Nov 2 07:45:10 2016 (r49623)
@@ -0,0 +1,148 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+=============================================================================
+FreeBSD-SA-16:35.openssl Security Advisory
+ The FreeBSD Project
+
+Topic: OpenSSL Remote DoS vulnerability
+
+Category: contrib
+Module: openssl
+Announced: 2016-11-02
+Affects: FreeBSD 9.x and FreeBSD 10.x.
+Corrected: 2016-11-02 07:09:31 UTC (stable/10, 10.3-STABLE)
+ 2016-11-02 07:23:36 UTC (releng/10.3, 10.3-RELEASE-p12)
+ 2016-11-02 07:24:14 UTC (releng/10.2, 10.2-RELEASE-p25)
+ 2016-11-02 07:24:14 UTC (releng/10.1, 10.1-RELEASE-p42)
+ 2016-11-02 07:09:31 UTC (stable/9, 9.3-STABLE)
+ 2016-11-02 07:24:34 UTC (releng/9.3, 9.3-RELEASE-p50)
+CVE Name: CVE-2016-8610
+
+For general information regarding FreeBSD Security Advisories,
+including descriptions of the fields above, security branches, and the
+following sections, please visit .
+
+I. Background
+
+FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is
+a collaborative effort to develop a robust, commercial-grade, full-featured
+Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3)
+and Transport Layer Security (TLS v1) protocols as well as a full-strength
+general purpose cryptography library.
+
+The SSL alert protocol is a way to communicate problems within a SSL/TLS session.
+
+II. Problem Description
+
+Due to improper handling of alert packets, OpenSSL would consume an excessive
+amount of CPU time processing undefined alert messages.
+
+III. Impact
+
+A remote attacker who can initiate handshakes with an OpenSSL based server
+can cause the server to consume a lot of computation power with very little
+bandwidth usage, and may be able to use this technique in a leveraged Denial
+of Service attack.
+
+IV. Workaround
+
+No workaround is available.
+
+V. Solution
+
+Perform one of the following:
+
+1) Upgrade your vulnerable system to a supported FreeBSD stable or
+release / security branch (releng) dated after the correction date.
+
+Restart all daemons that use the library, or reboot the system.
+
+2) To update your vulnerable system via a binary patch:
+
+Systems running a RELEASE version of FreeBSD on the i386 or amd64
+platforms can be updated via the freebsd-update(8) utility:
+
+# freebsd-update fetch
+# freebsd-update install
+
+Restart all daemons that use the library, or reboot the system.
+
+3) To update your vulnerable system via a source code patch:
+
+The following patches have been verified to apply to the applicable
+FreeBSD release branches.
+
+a) Download the relevant patch from the location below, and verify the
+detached PGP signature using your PGP utility.
+
+[FreeBSD 10.x]
+# fetch https://security.FreeBSD.org/patches/SA-16:35/openssl-10.patch
+# fetch https://security.FreeBSD.org/patches/SA-16:35/openssl-10.patch.asc
+# gpg --verify openssl-10.patch.asc
+
+[FreeBSD 9.3]
+# fetch https://security.FreeBSD.org/patches/SA-16:35/openssl-9.patch
+# fetch https://security.FreeBSD.org/patches/SA-16:35/openssl-9.patch.asc
+# gpg --verify openssl-9.patch.asc
+
+b) Apply the patch. Execute the following commands as root:
+
+# cd /usr/src
+# patch < /path/to/patch
+
+c) Recompile the operating system using buildworld and installworld as
+described in .
+
+Restart all daemons that use the library, or reboot the system.
+
+VI. Correction details
+
+The following list contains the correction revision numbers for each
+affected branch.
+
+Branch/path Revision
+- -------------------------------------------------------------------------
+stable/9/ r308200
+releng/9.3/ r308205
+stable/10/ r308200
+releng/10.1/ r308204
+releng/10.2/ r308204
+releng/10.3/ r308203
+- -------------------------------------------------------------------------
+
+To see which files were modified by a particular revision, run the
+following command, replacing NNNNNN with the revision number, on a
+machine with Subversion installed:
+
+# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
+
+Or visit the following URL, replacing NNNNNN with the revision number:
+
+
+
+VII. References
+
+
+
+
+
+The latest revision of this advisory is available at
+
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.1.15 (FreeBSD)
+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+=1gO7
+-----END PGP SIGNATURE-----
Added: head/share/security/patches/SA-16:33/openssh.patch
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/share/security/patches/SA-16:33/openssh.patch Wed Nov 2 07:45:10 2016 (r49623)
@@ -0,0 +1,10 @@
+--- crypto/openssh/kex.c.orig
++++ crypto/openssh/kex.c
+@@ -468,6 +468,7 @@
+ if (kex == NULL)
+ return SSH_ERR_INVALID_ARGUMENT;
+
++ ssh_dispatch_set(ssh, SSH2_MSG_KEXINIT, NULL);
+ ptr = sshpkt_ptr(ssh, &dlen);
+ if ((r = sshbuf_put(kex->peer, ptr, dlen)) != 0)
+ return r;
Added: head/share/security/patches/SA-16:33/openssh.patch.asc
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/share/security/patches/SA-16:33/openssh.patch.asc Wed Nov 2 07:45:10 2016 (r49623)
@@ -0,0 +1,17 @@
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.1.15 (FreeBSD)
+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+=qiKR
+-----END PGP SIGNATURE-----
Added: head/share/security/patches/SA-16:34/bind.patch
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/share/security/patches/SA-16:34/bind.patch Wed Nov 2 07:45:10 2016 (r49623)
@@ -0,0 +1,184 @@
+--- contrib/bind9/lib/dns/resolver.c.orig
++++ contrib/bind9/lib/dns/resolver.c
+@@ -524,7 +524,9 @@
+ valarg->addrinfo = addrinfo;
+
+ if (!ISC_LIST_EMPTY(fctx->validators))
+- INSIST((valoptions & DNS_VALIDATOR_DEFER) != 0);
++ valoptions |= DNS_VALIDATOR_DEFER;
++ else
++ valoptions &= ~DNS_VALIDATOR_DEFER;
+
+ result = dns_validator_create(fctx->res->view, name, type, rdataset,
+ sigrdataset, fctx->rmessage,
+@@ -4849,13 +4851,6 @@
+ rdataset,
+ sigrdataset,
+ valoptions, task);
+- /*
+- * Defer any further validations.
+- * This prevents multiple validators
+- * from manipulating fctx->rmessage
+- * simultaneously.
+- */
+- valoptions |= DNS_VALIDATOR_DEFER;
+ }
+ } else if (CHAINING(rdataset)) {
+ if (rdataset->type == dns_rdatatype_cname)
+@@ -4961,6 +4956,11 @@
+ eresult == DNS_R_NCACHENXRRSET);
+ }
+ event->result = eresult;
++ if (adbp != NULL && *adbp != NULL) {
++ if (anodep != NULL && *anodep != NULL)
++ dns_db_detachnode(*adbp, anodep);
++ dns_db_detach(adbp);
++ }
+ dns_db_attach(fctx->cache, adbp);
+ dns_db_transfernode(fctx->cache, &node, anodep);
+ clone_results(fctx);
+@@ -5208,6 +5208,11 @@
+ fctx->attributes |= FCTX_ATTR_HAVEANSWER;
+ if (event != NULL) {
+ event->result = eresult;
++ if (adbp != NULL && *adbp != NULL) {
++ if (anodep != NULL && *anodep != NULL)
++ dns_db_detachnode(*adbp, anodep);
++ dns_db_detach(adbp);
++ }
+ dns_db_attach(fctx->cache, adbp);
+ dns_db_transfernode(fctx->cache, &node, anodep);
+ clone_results(fctx);
+@@ -6016,13 +6021,15 @@
+ answer_response(fetchctx_t *fctx) {
+ isc_result_t result;
+ dns_message_t *message;
+- dns_name_t *name, *dname = NULL, *qname, tname, *ns_name;
++ dns_name_t *name, *dname = NULL, *qname, *dqname, tname, *ns_name;
++ dns_name_t *cname = NULL;
+ dns_rdataset_t *rdataset, *ns_rdataset;
+ isc_boolean_t done, external, chaining, aa, found, want_chaining;
+- isc_boolean_t have_answer, found_cname, found_type, wanted_chaining;
++ isc_boolean_t have_answer, found_cname, found_dname, found_type;
++ isc_boolean_t wanted_chaining;
+ unsigned int aflag;
+ dns_rdatatype_t type;
+- dns_fixedname_t fdname, fqname;
++ dns_fixedname_t fdname, fqname, fqdname;
+ dns_view_t *view;
+
+ FCTXTRACE("answer_response");
+@@ -6036,6 +6043,7 @@
+
+ done = ISC_FALSE;
+ found_cname = ISC_FALSE;
++ found_dname = ISC_FALSE;
+ found_type = ISC_FALSE;
+ chaining = ISC_FALSE;
+ have_answer = ISC_FALSE;
+@@ -6045,12 +6053,13 @@
+ aa = ISC_TRUE;
+ else
+ aa = ISC_FALSE;
+- qname = &fctx->name;
++ dqname = qname = &fctx->name;
+ type = fctx->type;
+ view = fctx->res->view;
++ dns_fixedname_init(&fqdname);
+ result = dns_message_firstname(message, DNS_SECTION_ANSWER);
+ while (!done && result == ISC_R_SUCCESS) {
+- dns_namereln_t namereln;
++ dns_namereln_t namereln, dnamereln;
+ int order;
+ unsigned int nlabels;
+
+@@ -6058,6 +6067,8 @@
+ dns_message_currentname(message, DNS_SECTION_ANSWER, &name);
+ external = ISC_TF(!dns_name_issubdomain(name, &fctx->domain));
+ namereln = dns_name_fullcompare(qname, name, &order, &nlabels);
++ dnamereln = dns_name_fullcompare(dqname, name, &order,
++ &nlabels);
+ if (namereln == dns_namereln_equal) {
+ wanted_chaining = ISC_FALSE;
+ for (rdataset = ISC_LIST_HEAD(name->list);
+@@ -6152,7 +6163,7 @@
+ }
+ } else if (rdataset->type == dns_rdatatype_rrsig
+ && rdataset->covers ==
+- dns_rdatatype_cname
++ dns_rdatatype_cname
+ && !found_type) {
+ /*
+ * We're looking for something else,
+@@ -6182,11 +6193,18 @@
+ * a CNAME or DNAME).
+ */
+ INSIST(!external);
+- if (aflag ==
+- DNS_RDATASETATTR_ANSWER) {
++ if ((rdataset->type !=
++ dns_rdatatype_cname) ||
++ !found_dname ||
++ (aflag ==
++ DNS_RDATASETATTR_ANSWER))
++ {
+ have_answer = ISC_TRUE;
++ if (rdataset->type ==
++ dns_rdatatype_cname)
++ cname = name;
+ name->attributes |=
+- DNS_NAMEATTR_ANSWER;
++ DNS_NAMEATTR_ANSWER;
+ }
+ rdataset->attributes |= aflag;
+ if (aa)
+@@ -6280,11 +6298,11 @@
+ return (DNS_R_FORMERR);
+ }
+
+- if (namereln != dns_namereln_subdomain) {
++ if (dnamereln != dns_namereln_subdomain) {
+ char qbuf[DNS_NAME_FORMATSIZE];
+ char obuf[DNS_NAME_FORMATSIZE];
+
+- dns_name_format(qname, qbuf,
++ dns_name_format(dqname, qbuf,
+ sizeof(qbuf));
+ dns_name_format(name, obuf,
+ sizeof(obuf));
+@@ -6299,7 +6317,7 @@
+ want_chaining = ISC_TRUE;
+ POST(want_chaining);
+ aflag = DNS_RDATASETATTR_ANSWER;
+- result = dname_target(rdataset, qname,
++ result = dname_target(rdataset, dqname,
+ nlabels, &fdname);
+ if (result == ISC_R_NOSPACE) {
+ /*
+@@ -6316,10 +6334,13 @@
+
+ dname = dns_fixedname_name(&fdname);
+ if (!is_answertarget_allowed(view,
+- qname, rdataset->type,
+- dname, &fctx->domain)) {
++ dqname, rdataset->type,
++ dname, &fctx->domain))
++ {
+ return (DNS_R_SERVFAIL);
+ }
++ dqname = dns_fixedname_name(&fqdname);
++ dns_name_copy(dname, dqname, NULL);
+ } else {
+ /*
+ * We've found a signature that
+@@ -6344,6 +6365,10 @@
+ INSIST(!external);
+ if (aflag == DNS_RDATASETATTR_ANSWER) {
+ have_answer = ISC_TRUE;
++ found_dname = ISC_TRUE;
++ if (cname != NULL)
++ cname->attributes &=
++ ~DNS_NAMEATTR_ANSWER;
+ name->attributes |=
+ DNS_NAMEATTR_ANSWER;
+ }
Added: head/share/security/patches/SA-16:34/bind.patch.asc
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/share/security/patches/SA-16:34/bind.patch.asc Wed Nov 2 07:45:10 2016 (r49623)
@@ -0,0 +1,17 @@
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.1.15 (FreeBSD)
+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+=BP8h
+-----END PGP SIGNATURE-----
Added: head/share/security/patches/SA-16:35/openssl-10.patch
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/share/security/patches/SA-16:35/openssl-10.patch Wed Nov 2 07:45:10 2016 (r49623)
@@ -0,0 +1,94 @@
+--- crypto/openssl/ssl/d1_pkt.c.orig
++++ crypto/openssl/ssl/d1_pkt.c
+@@ -924,6 +924,13 @@
+ goto start;
+ }
+
++ /*
++ * Reset the count of consecutive warning alerts if we've got a non-empty
++ * record that isn't an alert.
++ */
++ if (rr->type != SSL3_RT_ALERT && rr->length != 0)
++ s->s3->alert_count = 0;
++
+ /* we now have a packet which can be read and processed */
+
+ if (s->s3->change_cipher_spec /* set when we receive ChangeCipherSpec,
+@@ -1190,6 +1197,14 @@
+
+ if (alert_level == SSL3_AL_WARNING) {
+ s->s3->warn_alert = alert_descr;
++
++ s->s3->alert_count++;
++ if (s->s3->alert_count == MAX_WARN_ALERT_COUNT) {
++ al = SSL_AD_UNEXPECTED_MESSAGE;
++ SSLerr(SSL_F_DTLS1_READ_BYTES, SSL_R_TOO_MANY_WARN_ALERTS);
++ goto f_err;
++ }
++
+ if (alert_descr == SSL_AD_CLOSE_NOTIFY) {
+ #ifndef OPENSSL_NO_SCTP
+ /*
+--- crypto/openssl/ssl/s3_pkt.c.orig
++++ crypto/openssl/ssl/s3_pkt.c
+@@ -1057,6 +1057,13 @@
+ return (ret);
+ }
+
++ /*
++ * Reset the count of consecutive warning alerts if we've got a non-empty
++ * record that isn't an alert.
++ */
++ if (rr->type != SSL3_RT_ALERT && rr->length != 0)
++ s->s3->alert_count = 0;
++
+ /* we now have a packet which can be read and processed */
+
+ if (s->s3->change_cipher_spec /* set when we receive ChangeCipherSpec,
+@@ -1271,6 +1278,14 @@
+
+ if (alert_level == SSL3_AL_WARNING) {
+ s->s3->warn_alert = alert_descr;
++
++ s->s3->alert_count++;
++ if (s->s3->alert_count == MAX_WARN_ALERT_COUNT) {
++ al = SSL_AD_UNEXPECTED_MESSAGE;
++ SSLerr(SSL_F_SSL3_READ_BYTES, SSL_R_TOO_MANY_WARN_ALERTS);
++ goto f_err;
++ }
++
+ if (alert_descr == SSL_AD_CLOSE_NOTIFY) {
+ s->shutdown |= SSL_RECEIVED_SHUTDOWN;
+ return (0);
+--- crypto/openssl/ssl/ssl.h.orig
++++ crypto/openssl/ssl/ssl.h
+@@ -2717,6 +2717,7 @@
+ # define SSL_R_TLS_HEARTBEAT_PENDING 366
+ # define SSL_R_TLS_ILLEGAL_EXPORTER_LABEL 367
+ # define SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST 157
++# define SSL_R_TOO_MANY_WARN_ALERTS 409
+ # define SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST 233
+ # define SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG 234
+ # define SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER 235
+--- crypto/openssl/ssl/ssl3.h.orig
++++ crypto/openssl/ssl/ssl3.h
+@@ -587,6 +587,8 @@
+ char is_probably_safari;
+ # endif /* !OPENSSL_NO_EC */
+ # endif /* !OPENSSL_NO_TLSEXT */
++ /* Count of the number of consecutive warning alerts received */
++ unsigned int alert_count;
+ } SSL3_STATE;
+
+ # endif
+--- crypto/openssl/ssl/ssl_locl.h.orig
++++ crypto/openssl/ssl/ssl_locl.h
+@@ -389,6 +389,8 @@
+ */
+ # define SSL_MAX_DIGEST 6
+
++# define MAX_WARN_ALERT_COUNT 5
++
+ # define TLS1_PRF_DGST_MASK (0xff << TLS1_PRF_DGST_SHIFT)
+
+ # define TLS1_PRF_DGST_SHIFT 10
Added: head/share/security/patches/SA-16:35/openssl-10.patch.asc
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/share/security/patches/SA-16:35/openssl-10.patch.asc Wed Nov 2 07:45:10 2016 (r49623)
@@ -0,0 +1,17 @@
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.1.15 (FreeBSD)
+
+iQIcBAABCgAGBQJYGZiEAAoJEO1n7NZdz2rnVlMP/iC0pDsRby5HftZwmlfd0oIA
+GsyDBXQf3H2lFrkb5rFKuiDEwMIV1s2uti64TFg5ipYejXXGjkl6r4ogsWFfa2gy
+KU6+R4psMOC4C5aVS7QvclIJiyaBNFuAKaoGgv6p/SXYcw9Rbta6BYIy4s0Mr2WB
+UiVzTsJg7Ye6ooKREFouZrW98o5VwcRHy22TONnvkTym2Qr1kDU3PuF/TRe6KK/n
+IrRs/VI0Hs+VNBRRxIo74zXJm6GLHcadjU8RejVH3iJfQvK6yfyD+S/zhZxLAc9c
+zfcNs9RTBxJhKhrfC/mYU+8pF/4t7viRjb/YrHMvnYZXiOygeRTCeIpcbNun/bqy
+hBYOZfzdfF0OgAzBviJSU3dx7HHCmzuKNgtxNFh9nsP41E28hy3/jXOkW6476JvK
+bfa3RNAIespSqMBR/8DOj16uuDiAp8nZdV5XcOlgcv/Cl992pf+V8+IpZiApJJpR
+yrbdS5oBTuiS5nWJRllH1XSEDPA5zpsfcIpbe+2ip81Uxn5cV2+nXI7nRhzGKcSm
+/KSqC5ois3EMyfBocTtexy4bDAZZRTSusauLxLh6qR7y92vbckukZLEUeo5XRtOk
+BZt63O16ALxUQbYhVoL6Wm/j4xWiL6+s9q/Y8CAgZniviih3UEcFzpKKxglnApZG
+XtVDN3i4EaZ2+8mriBp6
+=0PWO
+-----END PGP SIGNATURE-----
Added: head/share/security/patches/SA-16:35/openssl-9.patch
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/share/security/patches/SA-16:35/openssl-9.patch Wed Nov 2 07:45:10 2016 (r49623)
@@ -0,0 +1,94 @@
+--- crypto/openssl/ssl/d1_pkt.c.orig
++++ crypto/openssl/ssl/d1_pkt.c
+@@ -820,6 +820,13 @@
+ goto start;
+ }
+
++ /*
++ * Reset the count of consecutive warning alerts if we've got a non-empty
++ * record that isn't an alert.
++ */
++ if (rr->type != SSL3_RT_ALERT && rr->length != 0)
++ s->s3->alert_count = 0;
++
+ /* we now have a packet which can be read and processed */
+
+ if (s->s3->change_cipher_spec /* set when we receive ChangeCipherSpec,
+@@ -1043,6 +1050,14 @@
+
+ if (alert_level == 1) { /* warning */
+ s->s3->warn_alert = alert_descr;
++
++ s->s3->alert_count++;
++ if (s->s3->alert_count == MAX_WARN_ALERT_COUNT) {
++ al = SSL_AD_UNEXPECTED_MESSAGE;
++ SSLerr(SSL_F_DTLS1_READ_BYTES, SSL_R_TOO_MANY_WARN_ALERTS);
++ goto f_err;
++ }
++
+ if (alert_descr == SSL_AD_CLOSE_NOTIFY) {
+ s->shutdown |= SSL_RECEIVED_SHUTDOWN;
+ return (0);
+--- crypto/openssl/ssl/s3_pkt.c.orig
++++ crypto/openssl/ssl/s3_pkt.c
+@@ -922,6 +922,13 @@
+ return (ret);
+ }
+
++ /*
++ * Reset the count of consecutive warning alerts if we've got a non-empty
++ * record that isn't an alert.
++ */
++ if (rr->type != SSL3_RT_ALERT && rr->length != 0)
++ s->s3->alert_count = 0;
++
+ /* we now have a packet which can be read and processed */
+
+ if (s->s3->change_cipher_spec /* set when we receive ChangeCipherSpec,
+@@ -1121,6 +1128,14 @@
+
+ if (alert_level == 1) { /* warning */
+ s->s3->warn_alert = alert_descr;
++
++ s->s3->alert_count++;
++ if (s->s3->alert_count == MAX_WARN_ALERT_COUNT) {
++ al = SSL_AD_UNEXPECTED_MESSAGE;
++ SSLerr(SSL_F_SSL3_READ_BYTES, SSL_R_TOO_MANY_WARN_ALERTS);
++ goto f_err;
++ }
++
+ if (alert_descr == SSL_AD_CLOSE_NOTIFY) {
+ s->shutdown |= SSL_RECEIVED_SHUTDOWN;
+ return (0);
+--- crypto/openssl/ssl/ssl.h.orig
++++ crypto/openssl/ssl/ssl.h
+@@ -2195,6 +2195,7 @@
+ # define SSL_R_TLSV1_UNSUPPORTED_EXTENSION 1110
+ # define SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER 232
+ # define SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST 227
++# define SSL_R_TOO_MANY_WARN_ALERTS 409
+ # define SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST 233
+ # define SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG 234
+ # define SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER 235
+--- crypto/openssl/ssl/ssl3.h.orig
++++ crypto/openssl/ssl/ssl3.h
+@@ -491,6 +491,8 @@
+ char is_probably_safari;
+ # endif /* !OPENSSL_NO_EC */
+ # endif /* !OPENSSL_NO_TLSEXT */
++ /* Count of the number of consecutive warning alerts received */
++ unsigned int alert_count;
+ } SSL3_STATE;
+
+ /* SSLv3 */
+--- crypto/openssl/ssl/ssl_locl.h.orig
++++ crypto/openssl/ssl/ssl_locl.h
+@@ -247,6 +247,8 @@
+ # define DEC32(a) ((a)=((a)-1)&0xffffffffL)
+ # define MAX_MAC_SIZE 20 /* up from 16 for SSLv3 */
+
++# define MAX_WARN_ALERT_COUNT 5
++
+ /*
+ * Define the Bitmasks for SSL_CIPHER.algorithms.
+ * This bits are used packed as dense as possible. If new methods/ciphers
Added: head/share/security/patches/SA-16:35/openssl-9.patch.asc
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/share/security/patches/SA-16:35/openssl-9.patch.asc Wed Nov 2 07:45:10 2016 (r49623)
@@ -0,0 +1,17 @@
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.1.15 (FreeBSD)
+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+=bOQ8
+-----END PGP SIGNATURE-----
Modified: head/share/xml/advisories.xml
==============================================================================
--- head/share/xml/advisories.xml Wed Nov 2 07:38:59 2016 (r49622)
+++ head/share/xml/advisories.xml Wed Nov 2 07:45:10 2016 (r49623)
@@ -8,6 +8,26 @@
2016
+ 11
+
+
+ 2
+
+
+ FreeBSD-SA-16:35.openssl
+
+
+
+ FreeBSD-SA-16:34.bind
+
+
+
+ FreeBSD-SA-16:33.openssh
+
+
+
+
+ 10
From owner-svn-doc-head@freebsd.org Wed Nov 2 07:47:39 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 99496C2A8D9;
Wed, 2 Nov 2016 07:47:39 +0000 (UTC)
(envelope-from delphij@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 0219316F6;
Wed, 2 Nov 2016 07:47:38 +0000 (UTC)
(envelope-from delphij@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA27lctG086253;
Wed, 2 Nov 2016 07:47:38 GMT (envelope-from delphij@FreeBSD.org)
Received: (from delphij@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA27lcH7086252;
Wed, 2 Nov 2016 07:47:38 GMT (envelope-from delphij@FreeBSD.org)
Message-Id: <201611020747.uA27lcH7086252@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: delphij set sender to
delphij@FreeBSD.org using -f
From: Xin LI
Date: Wed, 2 Nov 2016 07:47:38 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49624 - head/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 02 Nov 2016 07:47:39 -0000
Author: delphij
Date: Wed Nov 2 07:47:37 2016
New Revision: 49624
URL: https://svnweb.freebsd.org/changeset/doc/49624
Log:
Remove a duplicated entry.
Modified:
head/share/xml/advisories.xml
Modified: head/share/xml/advisories.xml
==============================================================================
--- head/share/xml/advisories.xml Wed Nov 2 07:45:10 2016 (r49623)
+++ head/share/xml/advisories.xml Wed Nov 2 07:47:37 2016 (r49624)
@@ -36,10 +36,6 @@
FreeBSD-SA-16:32.bhyve
-
-
- FreeBSD-SA-16:15.sysarch
-
From owner-svn-doc-head@freebsd.org Wed Nov 2 09:26:42 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1618AC2B9F6;
Wed, 2 Nov 2016 09:26:42 +0000 (UTC)
(envelope-from ryusuke@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id B4EFD16F7;
Wed, 2 Nov 2016 09:26:41 +0000 (UTC)
(envelope-from ryusuke@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA29QeA7025524;
Wed, 2 Nov 2016 09:26:40 GMT (envelope-from ryusuke@FreeBSD.org)
Received: (from ryusuke@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA29QeYB025523;
Wed, 2 Nov 2016 09:26:40 GMT (envelope-from ryusuke@FreeBSD.org)
Message-Id: <201611020926.uA29QeYB025523@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: ryusuke set sender to
ryusuke@FreeBSD.org using -f
From: Ryusuke SUZUKI
Date: Wed, 2 Nov 2016 09:26:40 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49625 - head/ja_JP.eucJP/books/handbook/kernelconfig
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 02 Nov 2016 09:26:42 -0000
Author: ryusuke
Date: Wed Nov 2 09:26:40 2016
New Revision: 49625
URL: https://svnweb.freebsd.org/changeset/doc/49625
Log:
- Merge the following from the English version:
r46043 -> r49609 head/ja_JP.eucJP/books/handbook/kernelconfig/chapter.xml
Modified:
head/ja_JP.eucJP/books/handbook/kernelconfig/chapter.xml
Modified: head/ja_JP.eucJP/books/handbook/kernelconfig/chapter.xml
==============================================================================
--- head/ja_JP.eucJP/books/handbook/kernelconfig/chapter.xml Wed Nov 2 07:47:37 2016 (r49624)
+++ head/ja_JP.eucJP/books/handbook/kernelconfig/chapter.xml Wed Nov 2 09:26:40 2016 (r49625)
@@ -3,7 +3,7 @@
The FreeBSD Documentation Project
The FreeBSD Japanese Documentation Project
- Original revision: r46043
+ Original revision: r49609
$FreeBSD$
-->
&man.man.1; ե饰Ǽ¹Ԥȡ
ͭѤʾ뤳ȤǤޤȤС
- ñޤޥ˥奢ڡΰɽˤϡ
- ʲΤ褦ˤʤޤ
+ ΥǥХ֥ɤ̾ޤޥ˥奢ڡΰɽˤϡ
+ ʲΤ褦˼¹ԤƤ
&prompt.root; man -k Atheros
From owner-svn-doc-head@freebsd.org Wed Nov 2 13:49:24 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2122EC2B8FB;
Wed, 2 Nov 2016 13:49:24 +0000 (UTC)
(envelope-from wblock@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 9C37E1F36;
Wed, 2 Nov 2016 13:49:23 +0000 (UTC)
(envelope-from wblock@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2DnMcX027992;
Wed, 2 Nov 2016 13:49:22 GMT (envelope-from wblock@FreeBSD.org)
Received: (from wblock@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2DnM19027991;
Wed, 2 Nov 2016 13:49:22 GMT (envelope-from wblock@FreeBSD.org)
Message-Id: <201611021349.uA2DnM19027991@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: wblock set sender to
wblock@FreeBSD.org using -f
From: Warren Block
Date: Wed, 2 Nov 2016 13:49:22 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49626 - head/en_US.ISO8859-1/htdocs/news/status
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 02 Nov 2016 13:49:24 -0000
Author: wblock
Date: Wed Nov 2 13:49:22 2016
New Revision: 49626
URL: https://svnweb.freebsd.org/changeset/doc/49626
Log:
Fix name, expand contraction.
Modified:
head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml
Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Wed Nov 2 09:26:40 2016 (r49625)
+++ head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Wed Nov 2 13:49:22 2016 (r49626)
@@ -1840,7 +1840,7 @@
We also published monthly newsletters to highlight work being
done to support &os;, tell you about upcoming events, and
- provide other information to keep you in the loop of what we’re doing
+ provide other information to keep you in the loop of what we are doing
to support the &os; Project and community https://www.FreeBSDFoundation.org/news-and-events/newsletter/.
@@ -1895,7 +1895,7 @@
Held a Women in Tech BoF in partnership with ACM-W
Europe
-
Bennedict organized the EuroBSDcon Developer
+
Benedict organized the EuroBSDcon Developer
Summit
Deb gave a Foundation Update talk and Hiroki Sato and
From owner-svn-doc-head@freebsd.org Wed Nov 2 13:51:39 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id BFFC6C2BA5E;
Wed, 2 Nov 2016 13:51:39 +0000 (UTC)
(envelope-from rcyu@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 511281A31;
Wed, 2 Nov 2016 13:51:39 +0000 (UTC)
(envelope-from rcyu@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2Dpc51030836;
Wed, 2 Nov 2016 13:51:38 GMT (envelope-from rcyu@FreeBSD.org)
Received: (from rcyu@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2Dpc9p030834;
Wed, 2 Nov 2016 13:51:38 GMT (envelope-from rcyu@FreeBSD.org)
Message-Id: <201611021351.uA2Dpc9p030834@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: rcyu set sender to
rcyu@FreeBSD.org using -f
From: Ruey-Cherng Yu
Date: Wed, 2 Nov 2016 13:51:38 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49627 - in head/zh_TW.UTF-8: htdocs share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 02 Nov 2016 13:51:40 -0000
Author: rcyu
Date: Wed Nov 2 13:51:38 2016
New Revision: 49627
URL: https://svnweb.freebsd.org/changeset/doc/49627
Log:
Change the css layout link to &enbase
Approved by: kevlo(mentor)
Modified:
head/zh_TW.UTF-8/htdocs/Makefile
head/zh_TW.UTF-8/share/xml/header.l10n.ent
Modified: head/zh_TW.UTF-8/htdocs/Makefile
==============================================================================
--- head/zh_TW.UTF-8/htdocs/Makefile Wed Nov 2 13:49:22 2016 (r49626)
+++ head/zh_TW.UTF-8/htdocs/Makefile Wed Nov 2 13:51:38 2016 (r49627)
@@ -38,7 +38,7 @@ SUBDIR+= doc
.endif
# Non-XML
-SUBDIR+= layout
+#SUBDIR+= layout
WEBDIR?= data/zh_TW
Modified: head/zh_TW.UTF-8/share/xml/header.l10n.ent
==============================================================================
--- head/zh_TW.UTF-8/share/xml/header.l10n.ent Wed Nov 2 13:49:22 2016 (r49626)
+++ head/zh_TW.UTF-8/share/xml/header.l10n.ent Wed Nov 2 13:51:38 2016 (r49627)
@@ -16,8 +16,8 @@
-
-
+
+
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 14E33C2B59F;
Wed, 2 Nov 2016 18:13:44 +0000 (UTC) (envelope-from gjb@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 6BDAF1783;
Wed, 2 Nov 2016 18:13:43 +0000 (UTC) (envelope-from gjb@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2IDgTm031948;
Wed, 2 Nov 2016 18:13:42 GMT (envelope-from gjb@FreeBSD.org)
Received: (from gjb@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2IDgNR031945;
Wed, 2 Nov 2016 18:13:42 GMT (envelope-from gjb@FreeBSD.org)
Message-Id: <201611021813.uA2IDgNR031945@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org
using -f
From: Glen Barber
Date: Wed, 2 Nov 2016 18:13:42 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49628 - in head/en_US.ISO8859-1/htdocs/releases: 10.3R
11.0R 9.3R
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 02 Nov 2016 18:13:44 -0000
Author: gjb
Date: Wed Nov 2 18:13:42 2016
New Revision: 49628
URL: https://svnweb.freebsd.org/changeset/doc/49628
Log:
Regen after r308226.
Sponsored by: The FreeBSD Foundation
Modified:
head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html
head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html
head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html
Modified: head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html Wed Nov 2 13:51:38 2016 (r49627)
+++ head/en_US.ISO8859-1/htdocs/releases/10.3R/errata.html Wed Nov 2 18:13:42 2016 (r49628)
@@ -1,5 +1,5 @@
-FreeBSD 10.3-RELEASE Errata
FreeBSD 10.3-RELEASE Errata
The FreeBSD Project
Copyright 2016 The FreeBSD Documentation
+
FreeBSD 10.3-RELEASE Errata
FreeBSD 10.3-RELEASE Errata
The FreeBSD Project
Copyright 2016 The FreeBSD Documentation
Project
FreeBSD is a registered trademark of
the FreeBSD Foundation.
Intel, Celeron, Centrino, Core, EtherExpress, i386,
i486, Itanium, Pentium, and Xeon are trademarks or registered
@@ -43,7 +43,9 @@
vulnerability
Better handle unknown options received from
Modified: head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html Wed Nov 2 13:51:38 2016 (r49627)
+++ head/en_US.ISO8859-1/htdocs/releases/11.0R/errata.html Wed Nov 2 18:13:42 2016 (r49628)
@@ -1,5 +1,5 @@
-
FreeBSD 11.0-RELEASE Errata
FreeBSD 11.0-RELEASE Errata
The FreeBSD Project
Copyright 2016 The FreeBSD Documentation Project
FreeBSD is a registered trademark of
+
FreeBSD 11.0-RELEASE Errata
FreeBSD 11.0-RELEASE Errata
The FreeBSD Project
Copyright 2016 The FreeBSD Documentation Project
FreeBSD is a registered trademark of
the FreeBSD Foundation.
Intel, Celeron, Centrino, Core, EtherExpress, i386,
i486, Itanium, Pentium, and Xeon are trademarks or registered
trademarks of Intel Corporation or its subsidiaries in the United
@@ -36,7 +36,8 @@
which keep up-to-date mirrors of this location.
Source and binary snapshots of FreeBSD 11.0-STABLE also
contain up-to-date copies of this document (as of the time of
the snapshot).
An issue was discovered with Amazon EC2™
images which would cause the virtual machine to hang during
boot when upgrading from previous FreeBSD versions. New
EC2™ installations are not affected, but existing
Modified: head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html
==============================================================================
--- head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Wed Nov 2 13:51:38 2016 (r49627)
+++ head/en_US.ISO8859-1/htdocs/releases/9.3R/errata.html Wed Nov 2 18:13:42 2016 (r49628)
@@ -1,5 +1,5 @@
-
FreeBSD 9.3-RELEASE Errata
FreeBSD 9.3-RELEASE Errata
+FreeBSD 9.3-RELEASE Errata
FreeBSD 9.3-RELEASE Errata
The FreeBSD Project
Copyright 2016 The FreeBSD Documentation Project
FreeBSD is a registered trademark of
the FreeBSD Foundation.
vt(4) crash with improper ioctl
From owner-svn-doc-head@freebsd.org Wed Nov 2 18:42:56 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2C717C2C19E;
Wed, 2 Nov 2016 18:42:56 +0000 (UTC) (envelope-from bhd@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id BC93518A6;
Wed, 2 Nov 2016 18:42:55 +0000 (UTC) (envelope-from bhd@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2IgsVO043799;
Wed, 2 Nov 2016 18:42:54 GMT (envelope-from bhd@FreeBSD.org)
Received: (from bhd@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2IgsEJ043798;
Wed, 2 Nov 2016 18:42:54 GMT (envelope-from bhd@FreeBSD.org)
Message-Id: <201611021842.uA2IgsEJ043798@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org
using -f
From: Bjoern Heidotting
Date: Wed, 2 Nov 2016 18:42:54 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49629 -
head/de_DE.ISO8859-1/books/handbook/virtualization
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 02 Nov 2016 18:42:56 -0000
Author: bhd
Date: Wed Nov 2 18:42:54 2016
New Revision: 49629
URL: https://svnweb.freebsd.org/changeset/doc/49629
Log:
Update to r49599:
USB pass-through in VirtualBox is currently not supported.
Modified:
head/de_DE.ISO8859-1/books/handbook/virtualization/chapter.xml
Modified: head/de_DE.ISO8859-1/books/handbook/virtualization/chapter.xml
==============================================================================
--- head/de_DE.ISO8859-1/books/handbook/virtualization/chapter.xml Wed Nov 2 18:13:42 2016 (r49628)
+++ head/de_DE.ISO8859-1/books/handbook/virtualization/chapter.xml Wed Nov 2 18:42:54 2016 (r49629)
@@ -5,7 +5,7 @@
$FreeBSD$
$FreeBSDde: de-docproj/books/handbook/virtualization/chapter.xml,v 1.14 2010/07/03 14:29:30 jkois Exp $
- basiert auf: r49368
+ basiert auf: r49599
-->
USB Untersttzung fr &virtualbox;
- Um auf USB-Gerte lesend und schreibend
- zuzugreifen, mssen Benutzer Mitglied der Gruppe
- operator
- sein:
-
- &prompt.root; pw groupmod operator -m jerry
-
- Fgen Sie dann folgenden Eintrag in
- /etc/devfs.rules hinzu. Erstellen Sie
- die Datei, wenn sie nicht bereits existiert:
-
- [system=10]
-add path 'usb/*' mode 0660 group operator
-
- Um diese neuen Regeln zu laden, fgen Sie folgenden
- Eintrag in /etc/rc.conf hinzu:
-
- devfs_system_ruleset="system"
-
- Danach starten Sie devfs neu:
-
- &prompt.root; service devfs restart
-
- USB kann nun im Gastsystem aktiviert
- werden. Die USB-Gerte sollten nun in den
- &virtualbox; Einstellungen sichtbar sein.
+ Das &virtualbox;
+ Erweiterungspaket ist fr &os;-Hosts nicht verfgbar. Ohne
+ dieses Erweiterungspaket kann der &os;-Host keine
+ USB-Ports an das Gastsystem
+ durchreichen.
From owner-svn-doc-head@freebsd.org Wed Nov 2 22:52:56 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 46487C2C970;
Wed, 2 Nov 2016 22:52:56 +0000 (UTC) (envelope-from mat@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 002B9188D;
Wed, 2 Nov 2016 22:52:55 +0000 (UTC) (envelope-from mat@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2Mqt5Z041632;
Wed, 2 Nov 2016 22:52:55 GMT (envelope-from mat@FreeBSD.org)
Received: (from mat@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2MqtT6041631;
Wed, 2 Nov 2016 22:52:55 GMT (envelope-from mat@FreeBSD.org)
Message-Id: <201611022252.uA2MqtT6041631@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: mat set sender to mat@FreeBSD.org
using -f
From: Mathieu Arnold
Date: Wed, 2 Nov 2016 22:52:55 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49630 -
head/en_US.ISO8859-1/books/porters-handbook/versions
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 02 Nov 2016 22:52:56 -0000
Author: mat
Date: Wed Nov 2 22:52:54 2016
New Revision: 49630
URL: https://svnweb.freebsd.org/changeset/doc/49630
Log:
Split up the __FreeBSD_version table per releases.
Move the note about FreeBSD 2.2-STABLE after the FreeBSD 2.2 table.
Approved by: wblock
Sponsored by: Absolight
Differential Revision: https://reviews.freebsd.org/D8362
Modified:
head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml
Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 18:42:54 2016 (r49629)
+++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 22:52:54 2016 (r49630)
@@ -16,8 +16,8 @@
sys/param.h:
-
+ &os; 2.2 __FreeBSD_version Values
+
+
+
+ Value
+
+ Date
+
+ Release
+
+
+
+
220000February 19, 1997
@@ -186,7 +204,36 @@
November 29, 19982.2-STABLE after 2.2.8-RELEASE
+
+
+
+
+
+ Note that 2.2-STABLE sometimes identifies itself as
+ 2.2.5-STABLE after the 2.2.5-RELEASE. The
+ pattern used to be year followed by the month, but we decided to
+ change it to a more straightforward major/minor system starting
+ from 2.2. This is because the parallel development on several
+ branches made it infeasible to classify the releases merely by
+ their real release dates. Do not worry about old -CURRENTs;
+ they are listed here just for reference.
+
+
+
-
-
- Note that 2.2-STABLE sometimes identifies itself as
- 2.2.5-STABLE after the 2.2.5-RELEASE. The
- pattern used to be year followed by the month, but we decided to
- change it to a more straightforward major/minor system starting
- from 2.2. This is because the parallel development on several
- branches made it infeasible to classify the releases merely by
- their real release dates. Do not worry about old -CURRENTs;
- they are listed here just for reference.
-
From owner-svn-doc-head@freebsd.org Wed Nov 2 22:53:00 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0537AC2C97D;
Wed, 2 Nov 2016 22:53:00 +0000 (UTC) (envelope-from mat@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id C7D6918C8;
Wed, 2 Nov 2016 22:52:59 +0000 (UTC) (envelope-from mat@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2MqwEm041676;
Wed, 2 Nov 2016 22:52:58 GMT (envelope-from mat@FreeBSD.org)
Received: (from mat@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2Mqw2m041675;
Wed, 2 Nov 2016 22:52:58 GMT (envelope-from mat@FreeBSD.org)
Message-Id: <201611022252.uA2Mqw2m041675@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: mat set sender to mat@FreeBSD.org
using -f
From: Mathieu Arnold
Date: Wed, 2 Nov 2016 22:52:58 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49631 -
head/en_US.ISO8859-1/books/porters-handbook/versions
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 02 Nov 2016 22:53:00 -0000
Author: mat
Date: Wed Nov 2 22:52:58 2016
New Revision: 49631
URL: https://svnweb.freebsd.org/changeset/doc/49631
Log:
Put each version in its section.
Approved by: wblock
Sponsored by: Absolight
Differential Revision: https://reviews.freebsd.org/D8362
Modified:
head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml
Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 22:52:54 2016 (r49630)
+++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 22:52:58 2016 (r49631)
@@ -16,6 +16,9 @@
sys/param.h:
+
+ &os; 2 before 2.2-RELEASE versions
+
&os; 2 before 2.2-RELEASE __FreeBSD_version Values
@@ -93,6 +96,10 @@
+
+
+
+ &os; 2.2 versions
&os; 2.2 __FreeBSD_version Values
@@ -218,6 +225,10 @@
their real release dates. Do not worry about old -CURRENTs;
they are listed here just for reference.
+
+
+
+ &os; 3 versions
+
From owner-svn-doc-head@freebsd.org Wed Nov 2 22:53:04 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 24289C2C9A3;
Wed, 2 Nov 2016 22:53:04 +0000 (UTC) (envelope-from mat@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 6071D1926;
Wed, 2 Nov 2016 22:53:03 +0000 (UTC) (envelope-from mat@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2Mr2KQ041727;
Wed, 2 Nov 2016 22:53:02 GMT (envelope-from mat@FreeBSD.org)
Received: (from mat@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2Mr2MZ041726;
Wed, 2 Nov 2016 22:53:02 GMT (envelope-from mat@FreeBSD.org)
Message-Id: <201611022253.uA2Mr2MZ041726@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: mat set sender to mat@FreeBSD.org
using -f
From: Mathieu Arnold
Date: Wed, 2 Nov 2016 22:53:02 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49632 -
head/en_US.ISO8859-1/books/porters-handbook/versions
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 02 Nov 2016 22:53:04 -0000
Author: mat
Date: Wed Nov 2 22:53:02 2016
New Revision: 49632
URL: https://svnweb.freebsd.org/changeset/doc/49632
Log:
Reverse the order of the sections, newest first.
Approved by: wblock
Sponsored by: Absolight
Differential Revision: https://reviews.freebsd.org/D8362
Modified:
head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml
Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 22:52:58 2016 (r49631)
+++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 22:53:02 2016 (r49632)
@@ -16,11 +16,11 @@
sys/param.h:
-
- &os; 2 before 2.2-RELEASE versions
+
+ &os; 12 versions
-
- &os; 2 before 2.2-RELEASE __FreeBSD_version Values
+
+ &os; 12 __FreeBSD_version Values
@@ -34,75 +34,29 @@
-
- 119411
-
- 2.0-RELEASE
-
-
-
- 199501, 199503
- March 19, 1995
- 2.1-CURRENT
-
-
-
- 199504
- April 9, 1995
- 2.0.5-RELEASE
-
-
-
- 199508
- August 26, 1995
- 2.2-CURRENT before 2.1
-
-
-
- 199511
- November 10, 1995
- 2.1.0-RELEASE
-
-
-
- 199512
- November 10, 1995
- 2.2-CURRENT before 2.1.5
-
-
-
- 199607
- July 10, 1996
- 2.1.5-RELEASE
-
-
-
- 199608
- July 12, 1996
- 2.2-CURRENT before 2.1.6
-
-
-
- 199612
- November 15, 1996
- 2.1.6-RELEASE
-
+
+ 1200000
+ July 7, 2016
+ 12.0-CURRENT
+ (rev 302409).
+
- 199612
-
- 2.1.7-RELEASE
+ 1200004
+ August 24, 2016
+ 12.0-CURRENT after fixing LC_*_MASK for newlocale(3) and querylocale(3)
+ (rev 304703).
-
- &os; 2.2 versions
+
+ &os; 11 versions
-
- &os; 2.2 __FreeBSD_version Values
+
+ &os; 11 __FreeBSD_version Values
@@ -117,741 +71,783 @@
- 220000
- February 19, 1997
- 2.2-RELEASE
+ 1100000
+ October 10, 2013
+ 11.0-CURRENT
+ (rev 256284).
- (not changed)
-
- 2.2.1-RELEASE
+ 1100001
+ October 19, 2013
+
+ 11.0-CURRENT after addition of support for "first
+ boot" rc.d scripts, so ports can make
+ use of this (rev 256776).
- (not changed)
-
- 2.2-STABLE after 2.2.1-RELEASE
+ 1100002
+ November 5, 2013
+
+ 11.0-CURRENT after dropping support for historic
+ ioctls (rev 257696).
- 221001
- April 15, 1997
- 2.2-STABLE after texinfo-3.9
+ 1100003
+ November 17, 2013
+ 11.0-CURRENT after iconv changes
+ (rev 258284).
- 221002
- April 30, 1997
- 2.2-STABLE after top
+ 1100004
+ December 15, 2013
+ 11.0-CURRENT after the behavior change of
+ gss_pseudo_random introduced in
+ r259286 (rev 259424).
- 222000
- May 16, 1997
- 2.2.2-RELEASE
+ 1100005
+ December 28, 2013
+
+ 11.0-CURRENT after r259951 - Do not coalesce entries
+ in vm_map_stack() (rev
+ 260010).
- 222001
- May 19, 1997
- 2.2-STABLE after 2.2.2-RELEASE
+ 1100006
+ January 28, 2014
+ 11.0-CURRENT after upgrades of libelf and libdwarf
+ (rev 261246).
- 225000
- October 2, 1997
- 2.2.5-RELEASE
+ 1100007
+ January 30, 2014
+ 11.0-CURRENT after upgrade of libc++ to 3.4 release
+ (rev 261283).
- 225001
- November 20, 1997
- 2.2-STABLE after 2.2.5-RELEASE
+ 1100008
+ February 14, 2014
+ 11.0-CURRENT after libc++ 3.4 ABI compatibility fix
+ (rev 261801).
- 225002
- December 27, 1997
- 2.2-STABLE after ldconfig -R merge
+ 1100009
+ February 16, 2014
+ 11.0-CURRENT after upgrade of llvm/clang to 3.4
+ release (rev 261991).
- 226000
- March 24, 1998
- 2.2.6-RELEASE
+ 1100010
+ February 28, 2014
+ 11.0-CURRENT after upgrade of ncurses to 5.9 release
+ (rev 262629).
- 227000
- July 21, 1998
- 2.2.7-RELEASE
+ 1100011
+ March 13, 2014
+ 11.0-CURRENT after ABI change in struct if_data
+ (rev 263102).
- 227001
- July 21, 1998
- 2.2-STABLE after 2.2.7-RELEASE
+ 1100012
+ March 14, 2014
+ 11.0-CURRENT after removal of Novell IPX protocol
+ support (rev 263140).
- 227002
- September 19, 1998
- 2.2-STABLE after &man.semctl.2; change
+ 1100013
+ March 14, 2014
+ 11.0-CURRENT after removal of AppleTalk protocol
+ support (rev 263152).
- 228000
- November 29, 1998
- 2.2.8-RELEASE
+ 1100014
+ March 16, 2014
+ 11.0-CURRENT after renaming
+ <sys/capability.h> to
+ <sys/capsicum.h> to avoid a
+ clash with similarly named headers in other operating
+ systems. A compatibility header is left in place to limit
+ build breakage, but will be deprecated in due course
+ (rev 263235).
- 228001
- November 29, 1998
- 2.2-STABLE after 2.2.8-RELEASE
+ 1100015
+ March 22, 2014
+ 11.0-CURRENT after cnt rename to
+ vm_cnt (rev
+ 263620).
-
-
-
-
-
- Note that 2.2-STABLE sometimes identifies itself as
- 2.2.5-STABLE after the 2.2.5-RELEASE. The
- pattern used to be year followed by the month, but we decided to
- change it to a more straightforward major/minor system starting
- from 2.2. This is because the parallel development on several
- branches made it infeasible to classify the releases merely by
- their real release dates. Do not worry about old -CURRENTs;
- they are listed here just for reference.
-
-
-
-
- &os; 3 versions
-
- &os; 3 __FreeBSD_version Values
-
-
-
- Value
-
- Date
-
- Release
+ 1100016
+ March 23, 2014
+ 11.0-CURRENT after addition of
+ armv6hfTARGET_ARCH
+ (rev 263660).
-
-
- 300000
- February 19, 1996
- 3.0-CURRENT before &man.mount.2; change
+ 1100017
+ April 4, 2014
+ 11.0-CURRENT after GCC support for
+ __block definition (rev
+ 264121).
- 300001
- September 24, 1997
- 3.0-CURRENT after &man.mount.2; change
+ 1100018
+ April 6, 2014
+ 11.0-CURRENT after support for UDP-Lite protocol (RFC
+ 3828) (rev 264212).
- 300002
- June 2, 1998
- 3.0-CURRENT after &man.semctl.2; change
+ 1100019
+ April 8, 2014
+ 11.0-CURRENT after FreeBSD-SA-14:06.openssl (rev
+ 264265).
- 300003
- June 7, 1998
- 3.0-CURRENT after ioctl arg changes
+ 1100020
+ May 1, 2014
+ 11.0-CURRENT after removing lindev in favor of having
+ /dev/full by default (rev
+ 265212).
- 300004
- September 3, 1998
- 3.0-CURRENT after ELF conversion
+ 1100021
+ May 6, 2014
+ 11.0-CURRENT after src.opts.mk
+ changes, decoupling &man.make.conf.5; from
+ buildworld (rev
+ 265419).
- 300005
- October 16, 1998
- 3.0-RELEASE
+ 1100022
+ May 30, 2014
+ 11.0-CURRENT after changes to &man.strcasecmp.3;,
+ moving strcasecmp_l() and
+ strncasecmp_l() from
+ <string.h> to
+ <strings.h> for POSIX 2008
+ compliance (rev 266865).
- 300006
- October 16, 1998
- 3.0-CURRENT after 3.0-RELEASE
+ 1100023
+ June 13, 2014
+ 11.0-CURRENT after the CUSE library and kernel module
+ have been attached to the build by default (rev
+ 267440).
- 300007
- January 22, 1999
- 3.0-STABLE after 3/4 branch
+ 1100024
+ June 27, 2014
+ 11.0-CURRENT after &man.sysctl.3;
+ API change (rev
+ 267992).
- 310000
- February 9, 1999
- 3.1-RELEASE
+ 1100025
+ June 30, 2014
+ 11.0-CURRENT after &man.regex.3; library update
+ to add > and <
+ delimiters (rev 268066).
- 310001
- March 27, 1999
- 3.1-STABLE after 3.1-RELEASE
+ 1100026
+ July 1, 2014
+ 11.0-CURRENT after the internal interface between the
+ NFS modules, including the krpc, was changed by (rev
+ 268115).
- 310002
- April 14, 1999
- 3.1-STABLE after C++ constructor/destructor order
- change
+ 1100027
+ July 8, 2014
+ 11.0-CURRENT after FreeBSD-SA-14:17.kmem
+ (rev 268431).
- 320000
-
- 3.2-RELEASE
+ 1100028
+ July 21, 2014
+ 11.0-CURRENT after hdestroy()
+ compliance fix changed ABI (rev
+ 268945).
- 320001
- May 8, 1999
- 3.2-STABLE
+ 1100029
+ August 3, 2014
+ 11.0-CURRENT after SOCK_DGRAM
+ bug fix (rev 269489).
- 320002
- August 29, 1999
- 3.2-STABLE after binary-incompatible IPFW and
- socket changes
+ 1100030
+ September 1, 2014
+ 11.0-CURRENT after SOCK_RAW
+ sockets were changed to not modify packets at all (rev
+ 270929).
- 330000
- September 2, 1999
- 3.3-RELEASE
+ 1100031
+ September 9, 2014
+ 11.0-CURRENT after FreeBSD-SA-14:18.openssl
+ (rev 269686).
- 330001
- September 16, 1999
- 3.3-STABLE
+ 1100032
+ September 11, 2014
+ 11.0-CURRENT after API changes to
+ ifa_ifwithbroadaddr,
+ ifa_ifwithdstaddr,
+ ifa_ifwithnet, and
+ ifa_ifwithroute (rev
+ 271438).
- 330002
- November 24, 1999
- 3.3-STABLE after adding &man.mkstemp.3;
- to libc
+ 1100033
+ September 9, 2014
+ 11.0-CURRENT after changing
+ access, eaccess, and
+ faccessat to validate the mode argument
+ (rev 271657).
- 340000
- December 5, 1999
- 3.4-RELEASE
+ 1100034
+ September 16, 2014
+ 11.0-CURRENT after FreeBSD-SA-14:19.tcp
+ (rev 271666).
- 340001
- December 17, 1999
- 3.4-STABLE
+ 1100035
+ September 17, 2014
+ 11.0-CURRENT after i915 HW context support
+ (rev 271705).
- 350000
- June 20, 2000
- 3.5-RELEASE
+ 1100036
+ September 17, 2014
+ Version bump to have ABI note distinguish binaries
+ ready for strict &man.mmap.2; flags checking
+ (rev 271724).
- 350001
- July 12, 2000
- 3.5-STABLE
+ 1100037
+ October 6, 2014
+ 11.0-CURRENT after addition of
+ &man.explicit.bzero.3; (rev
+ 272673).
-
-
-
-
-
-
- &os; 4 versions
-
- &os; 4 __FreeBSD_version Values
-
-
-
- Value
-
- Date
-
- Release
+ 1100038
+ October 11, 2014
+ 11.0-CURRENT after cleanup of TCP wrapper headers
+ (rev 272951).
-
-
- 400000
- January 22, 1999
- 4.0-CURRENT after 3.4 branch
+ 1100039
+ October 18, 2014
+ 11.0-CURRENT after removal of
+ MAP_RENAME and
+ MAP_NORESERVE (rev
+ 273250).
- 400001
- February 20, 1999
- 4.0-CURRENT after change in dynamic linker
- handling
+ 1100040
+ October 21, 2014
+ 11.0-CURRENT after FreeBSD-SA-14:23 (rev
+ 273146).
- 400002
- March 13, 1999
- 4.0-CURRENT after C++ constructor/destructor
- order change
+ 1100041
+ October 30, 2014
+ 11.0-CURRENT after API changes to
+ syscall_register,
+ syscall32_register,
+ syscall_register_helper and
+ syscall32_register_helper (rev
+ 273707).
- 400003
- March 27, 1999
- 4.0-CURRENT after functioning
- &man.dladdr.3;
+ 1100042
+ November 3, 2014
+ 11.0-CURRENT after a change to struct
+ tcpcb (rev
+ 274046).
- 400004
- April 5, 1999
- 4.0-CURRENT after __deregister_frame_info dynamic
- linker bug fix (also 4.0-CURRENT after EGCS 1.1.2
- integration)
+ 1100043
+ November 4, 2014
+ 11.0-CURRENT after enabling &man.vt.4; by default
+ (rev 274085).
- 400005
- April 27, 1999
- 4.0-CURRENT after &man.suser.9; API change
- (also 4.0-CURRENT after newbus)
+ 1100044
+ November 4, 2014
+ 11.0-CURRENT after adding new libraries/utilities
+ (dpv and figpar) for data throughput visualization (rev
+ 274116).
- 400006
- May 31, 1999
- 4.0-CURRENT after cdevsw registration
- change
+ 1100045
+ November 4, 2014
+ 11.0-CURRENT after FreeBSD-SA-14:23,
+ FreeBSD-SA-14:24, and FreeBSD-SA-14:25 (rev
+ 274162).
- 400007
- June 17, 1999
- 4.0-CURRENT after the addition of so_cred for
- socket level credentials
+ 1100046
+ November 13, 2014
+ 11.0-CURRENT after kern_poll
+ signature change (rev
+ 274462).
- 400008
- June 20, 1999
- 4.0-CURRENT after the addition of a poll syscall
- wrapper to libc_r
+ 1100047
+ November 13, 2014
+ 11.0-CURRENT after removal of no-at version
+ of VFS syscalls helpers, like kern_open
+ (rev 274476).
- 400009
- July 20, 1999
- 4.0-CURRENT after the change of the kernel's
- dev_t type to struct
- specinfo pointer
+ 1100048
+ December 1, 2014
+ 11.0-CURRENT after starting the process of removing
+ the use of the deprecated "M_FLOWID" flag from the network
+ code (rev 275358).
- 400010
- September 25, 1999
- 4.0-CURRENT after fixing a hole
- in &man.jail.2;
+ 1100049
+ December 9, 2014
+ 11.0-CURRENT after importing an important fix to the
+ LLVM vectorizer, which could lead to buffer overruns in
+ some cases (rev 275633).
- 400011
- September 29, 1999
- 4.0-CURRENT after the sigset_t
- datatype change
+ 1100050
+ December 12, 2014
+ 11.0-CURRENT after adding AES-ICM and AES-GCM to
+ OpenCrypto (rev 275732).
- 400012
- November 15, 1999
- 4.0-CURRENT after the cutover to the GCC 2.95.2
- compiler
+ 1100051
+ December 23, 2014
+ 11.0-CURRENT after removing old NFS client and server
+ code from the kernel (rev
+ 276096).
- 400013
- December 4, 1999
- 4.0-CURRENT after adding pluggable linux-mode
- ioctl handlers
+ 1100052
+ December 31, 2014
+ 11.0-CURRENT after upgrade of clang, llvm and lldb to
+ 3.5.0 release (rev 276479).
- 400014
- January 18, 2000
- 4.0-CURRENT after importing OpenSSL
+ 1100053
+ January 7, 2015
+ 11.0-CURRENT after MCLGET() gained a return value
+ (rev 276750).
- 400015
- January 27, 2000
- 4.0-CURRENT after the C++ ABI change in GCC
- 2.95.2 from -fvtable-thunks to -fno-vtable-thunks by
- default
+ 1100054
+ January 15, 2015
+ 11.0-CURRENT after rewrite of callout subsystem
+ (rev 277213).
- 400016
- February 27, 2000
- 4.0-CURRENT after importing OpenSSH
+ 1100055
+ January 22, 2015
+ 11.0-CURRENT after reverting callout changes in
+ r277213 (rev 277528).
- 400017
- March 13, 2000
- 4.0-RELEASE
+ 1100056
+ January 23, 2015
+ 11.0-CURRENT after addition of
+ futimens and
+ utimensat system calls
+ (rev 277610).
+
- 400018
- March 17, 2000
- 4.0-STABLE after 4.0-RELEASE
+ 1100057
+ January 29, 2015
+ 11.0-CURRENT after removal of d_thread_t
+ (rev 277897).
- 400019
- May 5, 2000
- 4.0-STABLE after the introduction of delayed
- checksums.
+ 1100058
+ February 5, 2015
+ 11.0-CURRENT after addition of support for probing
+ the SCSI VPD Extended Inquiry page (0x86)
+ (rev 278228).
- 400020
- June 4, 2000
- 4.0-STABLE after merging libxpg4 code into
- libc.
+ 1100059
+ February 9, 2015
+ 11.0-CURRENT after import of xz 5.2.0,
+ which added multi-threaded compression and lzma
+ gained libthr dependency
+ (rev 278433).
- 400021
- July 8, 2000
- 4.0-STABLE after upgrading Binutils to 2.10.0,
- ELF branding changes, and tcsh in the base
- system.
+ 1100060
+ February 16, 2015
+ 11.0-CURRENT after forwarding
+ FBIO_BLANK
+ to framebuffer clients
+ (rev 278846).
- 410000
- July 14, 2000
- 4.1-RELEASE
+ 1100061
+ February 18, 2015
+ 11.0-CURRENT after CDAI_FLAG_NONE
+ addition (rev 278964).
- 410001
- July 29, 2000
- 4.1-STABLE after 4.1-RELEASE
+ 1100062
+ February 23, 2015
+ 11.0-CURRENT after &man.mtio.4; and &man.sa.4;
+ API and &man.ioctl.2; additions
+ (rev 279221).
- 410002
- September 16, 2000
- 4.1-STABLE after &man.setproctitle.3; moved from
- libutil to libc.
+ 1100063
+ March 7, 2015
+ 11.0-CURRENT after adding mutex support to the
+ pps_ioctl() API in the kernel (rev
+ 279728).
- 411000
- September 25, 2000
- 4.1.1-RELEASE
+ 1100064
+ March 7, 2015
+ 11.0-CURRENT after adding PPS support to USB serial
+ drivers (rev 279729).
- 411001
-
- 4.1.1-STABLE after 4.1.1-RELEASE
+ 1100065
+ March 15, 2015
+ 11.0-CURRENT after upgrading clang, llvm and lldb to
+ 3.6.0 (rev 280031).
- 420000
- October 31, 2000
- 4.2-RELEASE
+ 1100066
+ March 20, 2015
+
+ 11.0-CURRENT after removal of SSLv2 support from
+ OpenSSL (rev 280306).
- 420001
- January 10, 2001
- 4.2-STABLE after combining libgcc.a and
- libgcc_r.a, and associated GCC linkage
- changes.
+ 1100067
+ March 25, 2015
+ 11.0-CURRENT after removal of SSLv2 support from
+ &man.fetch.1; and &man.fetch.3; (rev
+ 280630).
- 430000
- March 6, 2001
- 4.3-RELEASE
+ 1100068
+ April 6, 2015
+ 11.0-CURRENT after change to net.inet6.ip6.mif6table
+ sysctl (rev 281172).
- 430001
- May 18, 2001
- 4.3-STABLE after wint_t introduction.
+ 1100069
+ April 15, 2015
+ 11.0-CURRENT after removal of const qualifier from
+ &man.iconv.3; (rev 281550).
- 430002
- July 22, 2001
- 4.3-STABLE after PCI powerstate API
- merge.
+ 1100071
+ April 29, 2015
+ 11.0-CURRENT after API/ABI change to
+ &man.smb.4; (rev 281985).
- 440000
- August 1, 2001
- 4.4-RELEASE
+ 1100072
+ May 1, 2015
+ 11.0-CURRENT after adding &man.reallocarray.3; in
+ libc (rev 282314).
- 440001
- October 23, 2001
- 4.4-STABLE after d_thread_t introduction.
+ 1100073
+ May 8, 2015
+ 11.0-CURRENT after extending the maximum number of
+ allowed PCM channels in a PCM stream to 127 and decreasing
+ the maximum number of sub-channels to 1 (rev
+ 282650).
- 440002
- November 4, 2001
- 4.4-STABLE after mount structure changes (affects
- filesystem klds).
+ 1100074
+ May 25, 2015
+ 11.0-CURRENT after adding preliminary support for
+ x86-64 Linux binaries (rev 283424),
+ and upgrading clang and llvm to 3.6.1 (rev
+ 283526).
- 440003
- December 18, 2001
- 4.4-STABLE after the userland components of smbfs
- were imported.
+ 1100075
+ May 27, 2015
+ 11.0-CURRENT after dounmount() requiring a reference
+ on the passed struct mount (rev
+ 283602).
*** DIFF OUTPUT TRUNCATED AT 1000 LINES ***
From owner-svn-doc-head@freebsd.org Wed Nov 2 22:53:07 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id B4FB9C2C9C6;
Wed, 2 Nov 2016 22:53:07 +0000 (UTC) (envelope-from mat@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 61CF8199E;
Wed, 2 Nov 2016 22:53:07 +0000 (UTC) (envelope-from mat@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA2Mr6uV041771;
Wed, 2 Nov 2016 22:53:06 GMT (envelope-from mat@FreeBSD.org)
Received: (from mat@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA2Mr6KF041770;
Wed, 2 Nov 2016 22:53:06 GMT (envelope-from mat@FreeBSD.org)
Message-Id: <201611022253.uA2Mr6KF041770@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: mat set sender to mat@FreeBSD.org
using -f
From: Mathieu Arnold
Date: Wed, 2 Nov 2016 22:53:06 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49633 -
head/en_US.ISO8859-1/books/porters-handbook/versions
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Wed, 02 Nov 2016 22:53:07 -0000
Author: mat
Date: Wed Nov 2 22:53:06 2016
New Revision: 49633
URL: https://svnweb.freebsd.org/changeset/doc/49633
Log:
Correct indentation in after the reorganisation.
Approved by: wblock
Sponsored by: Absolight
Differential Revision: https://reviews.freebsd.org/D8362
Modified:
head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml
Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 22:53:02 2016 (r49632)
+++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Nov 2 22:53:06 2016 (r49633)
@@ -8,8 +8,7 @@
- __FreeBSD_version
- Values
+ __FreeBSD_version ValuesHere is a convenient list of
__FreeBSD_version values as defined in
@@ -17,6480 +16,6454 @@
xlink:href="http://svnweb.FreeBSD.org/base/head/sys/sys/param.h?view=markup">sys/param.h:
- &os; 12 versions
+ &os; 12 Versions
-
- &os; 12 __FreeBSD_version Values
-
-
-
-
- Value
-
- Date
-
- Release
-
-
-
-
-
- 1200000
- July 7, 2016
- 12.0-CURRENT
- (rev 302409).
-
-
-
- 1200004
- August 24, 2016
- 12.0-CURRENT after fixing LC_*_MASK for newlocale(3) and querylocale(3)
- (rev 304703).
-
-
-
-
+
+ &os; 12 __FreeBSD_version
+ Values
+
+
+
+
+ Value
+
+ Date
+
+ Release
+
+
+
+
+
+ 1200000
+ July 7, 2016
+ 12.0-CURRENT (rev
+ 302409).
+
+
+
+ 1200004
+ August 24, 2016
+ 12.0-CURRENT after fixing LC_*_MASK for
+ newlocale(3) and querylocale(3) (rev
+ 304703).
+
+
+
+
- &os; 11 versions
-
-
- &os; 11 __FreeBSD_version Values
+ &os; 11 Versions
-
-
-
- Value
-
- Date
-
- Release
-
-
-
-
-
- 1100000
- October 10, 2013
- 11.0-CURRENT
- (rev 256284).
-
-
-
- 1100001
- October 19, 2013
-
- 11.0-CURRENT after addition of support for "first
- boot" rc.d scripts, so ports can make
- use of this (rev 256776).
-
-
-
- 1100002
- November 5, 2013
-
- 11.0-CURRENT after dropping support for historic
- ioctls (rev 257696).
-
-
-
- 1100003
- November 17, 2013
- 11.0-CURRENT after iconv changes
- (rev 258284).
-
-
-
- 1100004
- December 15, 2013
- 11.0-CURRENT after the behavior change of
- gss_pseudo_random introduced in
- r259286 (rev 259424).
-
-
-
- 1100005
- December 28, 2013
-
- 11.0-CURRENT after r259951 - Do not coalesce entries
- in vm_map_stack() (rev
- 260010).
-
-
-
- 1100006
- January 28, 2014
- 11.0-CURRENT after upgrades of libelf and libdwarf
- (rev 261246).
-
-
-
- 1100007
- January 30, 2014
- 11.0-CURRENT after upgrade of libc++ to 3.4 release
- (rev 261283).
-
-
-
- 1100008
- February 14, 2014
- 11.0-CURRENT after libc++ 3.4 ABI compatibility fix
- (rev 261801).
-
-
-
- 1100009
- February 16, 2014
- 11.0-CURRENT after upgrade of llvm/clang to 3.4
- release (rev 261991).
-
-
-
- 1100010
- February 28, 2014
- 11.0-CURRENT after upgrade of ncurses to 5.9 release
- (rev 262629).
-
-
-
- 1100011
- March 13, 2014
- 11.0-CURRENT after ABI change in struct if_data
- (rev 263102).
-
-
-
- 1100012
- March 14, 2014
- 11.0-CURRENT after removal of Novell IPX protocol
- support (rev 263140).
-
-
-
- 1100013
- March 14, 2014
- 11.0-CURRENT after removal of AppleTalk protocol
- support (rev 263152).
-
-
-
- 1100014
- March 16, 2014
- 11.0-CURRENT after renaming
- <sys/capability.h> to
- <sys/capsicum.h> to avoid a
- clash with similarly named headers in other operating
- systems. A compatibility header is left in place to limit
- build breakage, but will be deprecated in due course
- (rev 263235).
-
-
-
- 1100015
- March 22, 2014
- 11.0-CURRENT after cnt rename to
- vm_cnt (rev
- 263620).
-
-
-
- 1100016
- March 23, 2014
- 11.0-CURRENT after addition of
- armv6hfTARGET_ARCH
- (rev 263660).
-
-
-
- 1100017
- April 4, 2014
- 11.0-CURRENT after GCC support for
- __block definition (rev
- 264121).
-
-
-
- 1100018
- April 6, 2014
- 11.0-CURRENT after support for UDP-Lite protocol (RFC
- 3828) (rev 264212).
-
-
-
- 1100019
- April 8, 2014
- 11.0-CURRENT after FreeBSD-SA-14:06.openssl (rev
- 264265).
-
-
-
- 1100020
- May 1, 2014
- 11.0-CURRENT after removing lindev in favor of having
- /dev/full by default (rev
- 265212).
-
-
-
- 1100021
- May 6, 2014
- 11.0-CURRENT after src.opts.mk
- changes, decoupling &man.make.conf.5; from
- buildworld (rev
- 265419).
-
-
-
- 1100022
- May 30, 2014
- 11.0-CURRENT after changes to &man.strcasecmp.3;,
- moving strcasecmp_l() and
- strncasecmp_l() from
- <string.h> to
- <strings.h> for POSIX 2008
- compliance (rev 266865).
-
-
-
- 1100023
- June 13, 2014
- 11.0-CURRENT after the CUSE library and kernel module
- have been attached to the build by default (rev
- 267440).
-
-
-
- 1100024
- June 27, 2014
- 11.0-CURRENT after &man.sysctl.3;
- API change (rev
- 267992).
-
-
-
- 1100025
- June 30, 2014
- 11.0-CURRENT after &man.regex.3; library update
- to add > and <
- delimiters (rev 268066).
-
-
-
- 1100026
- July 1, 2014
- 11.0-CURRENT after the internal interface between the
- NFS modules, including the krpc, was changed by (rev
- 268115).
-
-
-
- 1100027
- July 8, 2014
- 11.0-CURRENT after FreeBSD-SA-14:17.kmem
- (rev 268431).
-
-
-
- 1100028
- July 21, 2014
- 11.0-CURRENT after hdestroy()
- compliance fix changed ABI (rev
- 268945).
-
-
-
- 1100029
- August 3, 2014
- 11.0-CURRENT after SOCK_DGRAM
- bug fix (rev 269489).
-
-
-
- 1100030
- September 1, 2014
- 11.0-CURRENT after SOCK_RAW
- sockets were changed to not modify packets at all (rev
- 270929).
-
-
-
- 1100031
- September 9, 2014
- 11.0-CURRENT after FreeBSD-SA-14:18.openssl
- (rev 269686).
-
-
-
- 1100032
- September 11, 2014
- 11.0-CURRENT after API changes to
- ifa_ifwithbroadaddr,
- ifa_ifwithdstaddr,
- ifa_ifwithnet, and
- ifa_ifwithroute (rev
- 271438).
-
-
-
- 1100033
- September 9, 2014
- 11.0-CURRENT after changing
- access, eaccess, and
- faccessat to validate the mode argument
- (rev 271657).
-
-
-
- 1100034
- September 16, 2014
- 11.0-CURRENT after FreeBSD-SA-14:19.tcp
- (rev 271666).
-
-
-
- 1100035
- September 17, 2014
- 11.0-CURRENT after i915 HW context support
- (rev 271705).
-
-
-
- 1100036
- September 17, 2014
- Version bump to have ABI note distinguish binaries
- ready for strict &man.mmap.2; flags checking
- (rev 271724).
-
-
-
- 1100037
- October 6, 2014
- 11.0-CURRENT after addition of
- &man.explicit.bzero.3; (rev
- 272673).
-
-
-
- 1100038
- October 11, 2014
- 11.0-CURRENT after cleanup of TCP wrapper headers
- (rev 272951).
-
-
-
- 1100039
- October 18, 2014
- 11.0-CURRENT after removal of
- MAP_RENAME and
- MAP_NORESERVE (rev
- 273250).
-
-
-
- 1100040
- October 21, 2014
- 11.0-CURRENT after FreeBSD-SA-14:23 (rev
- 273146).
-
-
-
- 1100041
- October 30, 2014
- 11.0-CURRENT after API changes to
- syscall_register,
- syscall32_register,
- syscall_register_helper and
- syscall32_register_helper (rev
- 273707).
-
-
-
- 1100042
- November 3, 2014
- 11.0-CURRENT after a change to struct
- tcpcb (rev
- 274046).
-
-
-
- 1100043
- November 4, 2014
- 11.0-CURRENT after enabling &man.vt.4; by default
- (rev 274085).
-
-
-
- 1100044
- November 4, 2014
- 11.0-CURRENT after adding new libraries/utilities
- (dpv and figpar) for data throughput visualization (rev
- 274116).
-
-
-
- 1100045
- November 4, 2014
- 11.0-CURRENT after FreeBSD-SA-14:23,
- FreeBSD-SA-14:24, and FreeBSD-SA-14:25 (rev
- 274162).
-
-
-
- 1100046
- November 13, 2014
- 11.0-CURRENT after kern_poll
- signature change (rev
- 274462).
-
-
-
- 1100047
- November 13, 2014
- 11.0-CURRENT after removal of no-at version
- of VFS syscalls helpers, like kern_open
- (rev 274476).
-
-
-
- 1100048
- December 1, 2014
- 11.0-CURRENT after starting the process of removing
- the use of the deprecated "M_FLOWID" flag from the network
- code (rev 275358).
-
-
-
- 1100049
- December 9, 2014
- 11.0-CURRENT after importing an important fix to the
- LLVM vectorizer, which could lead to buffer overruns in
- some cases (rev 275633).
-
-
-
- 1100050
- December 12, 2014
- 11.0-CURRENT after adding AES-ICM and AES-GCM to
- OpenCrypto (rev 275732).
-
-
-
- 1100051
- December 23, 2014
- 11.0-CURRENT after removing old NFS client and server
- code from the kernel (rev
- 276096).
-
-
-
- 1100052
- December 31, 2014
- 11.0-CURRENT after upgrade of clang, llvm and lldb to
- 3.5.0 release (rev 276479).
-
-
-
- 1100053
- January 7, 2015
- 11.0-CURRENT after MCLGET() gained a return value
- (rev 276750).
-
-
-
- 1100054
- January 15, 2015
- 11.0-CURRENT after rewrite of callout subsystem
- (rev 277213).
-
-
-
- 1100055
- January 22, 2015
- 11.0-CURRENT after reverting callout changes in
- r277213 (rev 277528).
-
-
-
- 1100056
- January 23, 2015
- 11.0-CURRENT after addition of
- futimens and
- utimensat system calls
- (rev 277610).
-
-
-
-
- 1100057
- January 29, 2015
- 11.0-CURRENT after removal of d_thread_t
- (rev 277897).
-
-
-
- 1100058
- February 5, 2015
- 11.0-CURRENT after addition of support for probing
- the SCSI VPD Extended Inquiry page (0x86)
- (rev 278228).
-
-
-
- 1100059
- February 9, 2015
- 11.0-CURRENT after import of xz 5.2.0,
- which added multi-threaded compression and lzma
- gained libthr dependency
- (rev 278433).
-
-
-
- 1100060
- February 16, 2015
- 11.0-CURRENT after forwarding
- FBIO_BLANK
- to framebuffer clients
- (rev 278846).
-
-
-
- 1100061
- February 18, 2015
- 11.0-CURRENT after CDAI_FLAG_NONE
- addition (rev 278964).
-
-
-
- 1100062
- February 23, 2015
- 11.0-CURRENT after &man.mtio.4; and &man.sa.4;
- API and &man.ioctl.2; additions
- (rev 279221).
-
-
-
- 1100063
- March 7, 2015
- 11.0-CURRENT after adding mutex support to the
- pps_ioctl() API in the kernel (rev
- 279728).
-
-
-
- 1100064
- March 7, 2015
- 11.0-CURRENT after adding PPS support to USB serial
- drivers (rev 279729).
-
-
-
- 1100065
- March 15, 2015
- 11.0-CURRENT after upgrading clang, llvm and lldb to
- 3.6.0 (rev 280031).
-
-
-
- 1100066
- March 20, 2015
-
- 11.0-CURRENT after removal of SSLv2 support from
- OpenSSL (rev 280306).
-
-
-
- 1100067
- March 25, 2015
- 11.0-CURRENT after removal of SSLv2 support from
- &man.fetch.1; and &man.fetch.3; (rev
- 280630).
-
-
-
- 1100068
- April 6, 2015
- 11.0-CURRENT after change to net.inet6.ip6.mif6table
- sysctl (rev 281172).
-
-
-
- 1100069
- April 15, 2015
- 11.0-CURRENT after removal of const qualifier from
- &man.iconv.3; (rev 281550).
-
-
-
- 1100071
- April 29, 2015
- 11.0-CURRENT after API/ABI change to
- &man.smb.4; (rev 281985).
-
-
-
- 1100072
- May 1, 2015
- 11.0-CURRENT after adding &man.reallocarray.3; in
- libc (rev 282314).
-
-
-
- 1100073
- May 8, 2015
- 11.0-CURRENT after extending the maximum number of
- allowed PCM channels in a PCM stream to 127 and decreasing
- the maximum number of sub-channels to 1 (rev
- 282650).
-
-
-
- 1100074
- May 25, 2015
- 11.0-CURRENT after adding preliminary support for
- x86-64 Linux binaries (rev 283424),
- and upgrading clang and llvm to 3.6.1 (rev
- 283526).
-
-
-
- 1100075
- May 27, 2015
- 11.0-CURRENT after dounmount() requiring a reference
- on the passed struct mount (rev
- 283602).
-
-
-
- 1100076
- June 4, 2015
- 11.0-CURRENT after disabled generation of legacy
- formatted password databases entries by default. (rev
- 283983).
-
-
-
- 1100077
- June 10, 2015
- 11.0-CURRENT after API changes to
- lim_cur,
- lim_max, and
- lim_rlimit (rev
- 284215).
-
-
-
- 1100079
- August 18, 2015
- 11.0-CURRENT after import of jemalloc 4.0.0
- (rev 286866).
-
-
-
- 1100080
- October 5, 2015
- 11.0-CURRENT after upgrading clang, llvm, lldb,
- compiler-rt and libc++ to 3.7.0 (rev
- 288943).
-
-
-
- 1100081
- October 16, 2015
- 11.0-CURRENT after undating ZFS to support resumable
- send/receive (rev r289362).
-
-
-
- 1100085
- October 30, 2015
- 11.0-CURRENT after import of OpenSSL 1.0.2d (rev
- 290207).
-
-
-
- 1100088
- November 7, 2015
- 11.0-CURRENT after string collation and locales
- rework (rev 290495).
-
-
-
- 1100089
- November 7, 2015
- 11.0-CURRENT after API change to
- &man.sysctl.add.oid.9; (rev 290475
- and r290505).
-
-
-
- 1100090
- November 10, 2015
- 11.0-CURRENT after API change to callout_stop macro;
- (rev 290664).
-
-
-
- 1100092
- December 19, 2015
- 11.0-CURRENT after removal of vm_pageout_grow_cache
- (rev 292469).
-
-
-
- 1100093
- December 30, 2015
- 11.0-CURRENT after removal of sys/crypto/sha2.h
- (rev 292782).
-
-
-
- 1100094
- January 15, 2016
- 11.0-CURRENT after LinuxKPI PCI changes
- (rev 294086).
-
-
-
- 1100095
- January 19, 2016
- 11.0-CURRENT after LRO optimizations
- (rev 294327).
-
-
-
- 1100096
- January 21, 2016
- 11.0-CURRENT after LinuxKPI idr_* additions
- (rev 294505).
-
-
-
- 1100097
- January 26, 2016
- 11.0-CURRENT after API change to dpv(3)
- (rev 294860).
-
-
-
- 1100098
- February 16, 2016
- 11.0-CURRENT after API change to rman
- (rev 294883).
-
-
-
- 1100100
- February 26, 2016
- 11.0-CURRENT after bus_alloc_resource_anywhere() API
- addition (rev 296136).
-
-
-
- 1100116
- May 31, 2016
- 11.0-CURRENT after SHA-512t256 (rev
- 300903) and Skein (rev
- 300966) where added to
- libmd, libcrypt, the kernel, and ZFS (rev
- 301010).
-
-
-
- 1100117
- June 6, 2016
- 11.0-CURRENT after libpam was synced with stock
- 301602, bumping library version.
-
-
-
- 1100118
- June 21, 2016
- 11.0-CURRENT after breaking binary compatibility of struct disk
- 302069.
-
-
-
- 1100119
- June 23, 2016
- 11.0-CURRENT after switching geom_disk to using a pool mutex
- 302150.
-
-
-
- 1100120
- June 23, 2016
- 11.0-CURRENT after adding spares to struct ifnet
- 302153.
-
-
-
- 1100500
- August 12, 2016
- 11.0-STABLE adding branched
- 303976.
-
-
-
- 1100121
- August 12, 2015
- 11-STABLE after releng/11.0
- branched from 11-STABLE (rev
- 303975).
-
-
-
-
+
+ &os; 11 __FreeBSD_version
+ Values
+
+
+
+
+ Value
+
+ Date
+
+ Release
+
+
+
+
+
+ 1100000
+ October 10, 2013
+ 11.0-CURRENT (rev
+ 256284).
+
+
+
+ 1100001
+ October 19, 2013
+
+ 11.0-CURRENT after addition of support for "first
+ boot" rc.d scripts, so ports can
+ make use of this (rev
+ 256776).
+
+
+
+ 1100002
+ November 5, 2013
+
+ 11.0-CURRENT after dropping support for historic
+ ioctls (rev 257696).
+
+
+
+ 1100003
+ November 17, 2013
+ 11.0-CURRENT after iconv changes (rev
+ 258284).
+
+
+
+ 1100004
+ December 15, 2013
+ 11.0-CURRENT after the behavior change of
+ gss_pseudo_random introduced in
+ r259286 (rev 259424).
+
+
+
+ 1100005
+ December 28, 2013
+
+ 11.0-CURRENT after r259951 - Do not coalesce
+ entries in vm_map_stack() (rev
+ 260010).
+
+
+
+ 1100006
+ January 28, 2014
+ 11.0-CURRENT after upgrades of libelf and libdwarf
+ (rev 261246).
+
+
+
+ 1100007
+ January 30, 2014
+ 11.0-CURRENT after upgrade of libc++ to 3.4 release
+ (rev 261283).
+
+
+
+ 1100008
+ February 14, 2014
+ 11.0-CURRENT after libc++ 3.4 ABI compatibility fix
+ (rev 261801).
+
+
+
+ 1100009
+ February 16, 2014
+ 11.0-CURRENT after upgrade of llvm/clang to 3.4
+ release (rev 261991).
+
+
+
+ 1100010
+ February 28, 2014
+ 11.0-CURRENT after upgrade of ncurses to 5.9
+ release (rev 262629).
+
+
+
+ 1100011
+ March 13, 2014
+ 11.0-CURRENT after ABI change in struct if_data
+ (rev 263102).
+
+
+
+ 1100012
+ March 14, 2014
+ 11.0-CURRENT after removal of Novell IPX protocol
+ support (rev 263140).
+
+
+
+ 1100013
+ March 14, 2014
+ 11.0-CURRENT after removal of AppleTalk protocol
+ support (rev 263152).
+
+
+
+ 1100014
+ March 16, 2014
+ 11.0-CURRENT after renaming
*** DIFF OUTPUT TRUNCATED AT 1000 LINES ***
From owner-svn-doc-head@freebsd.org Thu Nov 3 09:58:19 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 23353C2C469;
Thu, 3 Nov 2016 09:58:19 +0000 (UTC)
(envelope-from rcyu@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id DC0FD1332;
Thu, 3 Nov 2016 09:58:18 +0000 (UTC)
(envelope-from rcyu@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA39wIq8000412;
Thu, 3 Nov 2016 09:58:18 GMT (envelope-from rcyu@FreeBSD.org)
Received: (from rcyu@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA39wIBi000411;
Thu, 3 Nov 2016 09:58:18 GMT (envelope-from rcyu@FreeBSD.org)
Message-Id: <201611030958.uA39wIBi000411@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: rcyu set sender to
rcyu@FreeBSD.org using -f
From: Ruey-Cherng Yu
Date: Thu, 3 Nov 2016 09:58:18 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49634 - head/zh_TW.UTF-8/share/xml
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 03 Nov 2016 09:58:19 -0000
Author: rcyu
Date: Thu Nov 3 09:58:17 2016
New Revision: 49634
URL: https://svnweb.freebsd.org/changeset/doc/49634
Log:
Update and translate the navigation bar
Approved by: kevlo(mentor)
Modified:
head/zh_TW.UTF-8/share/xml/header.l10n.ent
Modified: head/zh_TW.UTF-8/share/xml/header.l10n.ent
==============================================================================
--- head/zh_TW.UTF-8/share/xml/header.l10n.ent Wed Nov 2 22:53:06 2016 (r49633)
+++ head/zh_TW.UTF-8/share/xml/header.l10n.ent Thu Nov 3 09:58:17 2016 (r49634)
@@ -21,19 +21,83 @@
-
@@ -338,6 +338,6 @@
FreeBSD 標誌是 FreeBSD 基金會的註冊商標
由 FreeBSD 基金會 授權 FreeBSD 計劃使用。
- &header2.word.contact;
+ &header2.word.contact;
From owner-svn-doc-head@freebsd.org Thu Nov 3 18:34:21 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5ED32C2E444;
Thu, 3 Nov 2016 18:34:21 +0000 (UTC)
(envelope-from emaste@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 13F991BE8;
Thu, 3 Nov 2016 18:34:21 +0000 (UTC)
(envelope-from emaste@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA3IYKPj005163;
Thu, 3 Nov 2016 18:34:20 GMT (envelope-from emaste@FreeBSD.org)
Received: (from emaste@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA3IYKgp005162;
Thu, 3 Nov 2016 18:34:20 GMT (envelope-from emaste@FreeBSD.org)
Message-Id: <201611031834.uA3IYKgp005162@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: emaste set sender to
emaste@FreeBSD.org using -f
From: Ed Maste
Date: Thu, 3 Nov 2016 18:34:20 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49636 - head/en_US.ISO8859-1/htdocs/news/status
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 03 Nov 2016 18:34:21 -0000
Author: emaste (src committer)
Date: Thu Nov 3 18:34:20 2016
New Revision: 49636
URL: https://svnweb.freebsd.org/changeset/doc/49636
Log:
Update/clarify core@ licensing issues for the quarter
Modified:
head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml
Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Thu Nov 3 15:41:42 2016 (r49635)
+++ head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Thu Nov 3 18:34:20 2016 (r49636)
@@ -1302,25 +1302,23 @@
Importing Concurrency Kit. In consultation with the
- Foundation's legal counsel, it was determined that the
- relevant patents on the 'Read Copy Update' synchronization
- mechanisms have expired, and consequently the import of
- selected parts of concurrency kit was approved.
+ Foundation's legal counsel, it was determined that
+ importing selected parts of concurrency kit is acceptable,
+ and has been approved.
The proposal to create a shadow GPLv3 toolchain repository
was put to the community. Ultimately the whole idea has
been rendered largely redundant by faster than anticipated
- progress at integrating the latest LLVM toolchain on most of
- the interesting system architectures. The goal of a
- GPL-free base system is within our grasp.
-
-
Reports that GPL code has been pasted into linuxkpi
- sources are under investigation. Core would like to stress
- that great care must be taken to avoid inadvertent license
- infringement, especially when implementing hardware
- interfaces or similar where there is limited scope to invent
- new constants or otherwise make it clear this is a novel
- implementation.
+ progress on the external toolchain ports and packages for
+ those architectures where LLVM is not yet sufficieintly
+ mature.
+
+
Concerns were raised about handling GPL code in work in
+ progress on the linuxkpi shim. This issue is not related to
+ the FreeBSD svn repository but Core would like to stress
+ that care must be taken to avoid license infringement and
+ plans to write a set of guidelines for handling GPL
+ code.
Work on LLVM has thrown up problems with the presence of
From owner-svn-doc-head@freebsd.org Thu Nov 3 18:46:16 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2952EC2E784;
Thu, 3 Nov 2016 18:46:16 +0000 (UTC)
(envelope-from emaste@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id ECA0B1111;
Thu, 3 Nov 2016 18:46:15 +0000 (UTC)
(envelope-from emaste@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA3IkFke009097;
Thu, 3 Nov 2016 18:46:15 GMT (envelope-from emaste@FreeBSD.org)
Received: (from emaste@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA3IkFDR009096;
Thu, 3 Nov 2016 18:46:15 GMT (envelope-from emaste@FreeBSD.org)
Message-Id: <201611031846.uA3IkFDR009096@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: emaste set sender to
emaste@FreeBSD.org using -f
From: Ed Maste
Date: Thu, 3 Nov 2016 18:46:15 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49637 - head/en_US.ISO8859-1/htdocs/news/status
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 03 Nov 2016 18:46:16 -0000
Author: emaste (src committer)
Date: Thu Nov 3 18:46:14 2016
New Revision: 49637
URL: https://svnweb.freebsd.org/changeset/doc/49637
Log:
Correct typo introduced in r49636
Submitted by: bcr
Modified:
head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml
Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Thu Nov 3 18:34:20 2016 (r49636)
+++ head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Thu Nov 3 18:46:14 2016 (r49637)
@@ -1310,7 +1310,7 @@
was put to the community. Ultimately the whole idea has
been rendered largely redundant by faster than anticipated
progress on the external toolchain ports and packages for
- those architectures where LLVM is not yet sufficieintly
+ those architectures where LLVM is not yet sufficiently
mature.
Concerns were raised about handling GPL code in work in
From owner-svn-doc-head@freebsd.org Thu Nov 3 19:22:39 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1E60DC2D64D;
Thu, 3 Nov 2016 19:22:39 +0000 (UTC)
(envelope-from emaste@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id E0C4B12B7;
Thu, 3 Nov 2016 19:22:38 +0000 (UTC)
(envelope-from emaste@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA3JMcXD024493;
Thu, 3 Nov 2016 19:22:38 GMT (envelope-from emaste@FreeBSD.org)
Received: (from emaste@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA3JMcPT024492;
Thu, 3 Nov 2016 19:22:38 GMT (envelope-from emaste@FreeBSD.org)
Message-Id: <201611031922.uA3JMcPT024492@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: emaste set sender to
emaste@FreeBSD.org using -f
From: Ed Maste
Date: Thu, 3 Nov 2016 19:22:38 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49638 - head/en_US.ISO8859-1/htdocs/news/status
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 03 Nov 2016 19:22:39 -0000
Author: emaste (src committer)
Date: Thu Nov 3 19:22:37 2016
New Revision: 49638
URL: https://svnweb.freebsd.org/changeset/doc/49638
Log:
Remove an incomplete core topic
Modified:
head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml
Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Thu Nov 3 18:46:14 2016 (r49637)
+++ head/en_US.ISO8859-1/htdocs/news/status/report-2016-07-2016-09.xml Thu Nov 3 19:22:37 2016 (r49638)
@@ -1321,13 +1321,6 @@
code.
-
Work on LLVM has thrown up problems with the presence of
- certain pre-compiled binary-only drivers as part of the
- GENERIC kernel. Core has adopted the policy that such
- binary-only code should be moved to loadable modules and that
- the GENERIC kernel must be compiled entirely from original
- sources.
-
The item that has absorbed the largest portion of Core's
attention this quarter concerns the project's handling of
security vulnerabilities in bspatch(1),
From owner-svn-doc-head@freebsd.org Thu Nov 3 19:41:55 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 66AA8C2DB84;
Thu, 3 Nov 2016 19:41:55 +0000 (UTC)
(envelope-from sevan@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 2F2411D05;
Thu, 3 Nov 2016 19:41:55 +0000 (UTC)
(envelope-from sevan@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA3Jfstj028587;
Thu, 3 Nov 2016 19:41:54 GMT (envelope-from sevan@FreeBSD.org)
Received: (from sevan@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA3JfsZX028586;
Thu, 3 Nov 2016 19:41:54 GMT (envelope-from sevan@FreeBSD.org)
Message-Id: <201611031941.uA3JfsZX028586@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: sevan set sender to
sevan@FreeBSD.org using -f
From: Sevan Janiyan
Date: Thu, 3 Nov 2016 19:41:54 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49639 -
head/en_US.ISO8859-1/books/handbook/advanced-networking
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 03 Nov 2016 19:41:55 -0000
Author: sevan
Date: Thu Nov 3 19:41:54 2016
New Revision: 49639
URL: https://svnweb.freebsd.org/changeset/doc/49639
Log:
Use the correct variable name & command to setup the gif tunnel endpoints.
PR: 214153
Submitted by: John W. O'Brien
Approved by: bcr (mentor)
Differential Revision: https://reviews.freebsd.org/D8427
Modified:
head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Thu Nov 3 19:22:37 2016 (r49638)
+++ head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Thu Nov 3 19:41:54 2016 (r49639)
@@ -4672,7 +4672,7 @@ rtsold_enable="YES"
and REMOTE_IPv4_ADDR with the
actual IPv4 addresses:
- cloned_interfaces_gif0="MY_IPv4_ADDR REMOTE_IPv4_ADDR"
+ create_args_gif0="tunnel MY_IPv4_ADDR REMOTE_IPv4_ADDR"To apply the IPv6 address that has been
assigned for use as the IPv6 tunnel
From owner-svn-doc-head@freebsd.org Thu Nov 3 19:48:37 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id 39AE3C2DE1E;
Thu, 3 Nov 2016 19:48:37 +0000 (UTC)
(envelope-from sevan@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id 08E601024;
Thu, 3 Nov 2016 19:48:36 +0000 (UTC)
(envelope-from sevan@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA3JmaY4032541;
Thu, 3 Nov 2016 19:48:36 GMT (envelope-from sevan@FreeBSD.org)
Received: (from sevan@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA3Jmawj032540;
Thu, 3 Nov 2016 19:48:36 GMT (envelope-from sevan@FreeBSD.org)
Message-Id: <201611031948.uA3Jmawj032540@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: sevan set sender to
sevan@FreeBSD.org using -f
From: Sevan Janiyan
Date: Thu, 3 Nov 2016 19:48:36 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49640 -
head/en_US.ISO8859-1/books/handbook/advanced-networking
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Thu, 03 Nov 2016 19:48:37 -0000
Author: sevan
Date: Thu Nov 3 19:48:36 2016
New Revision: 49640
URL: https://svnweb.freebsd.org/changeset/doc/49640
Log:
Fix spelling mistakes picked up by igor.
Approved by: bcr (mentor)
Differential Revision: https://reviews.freebsd.org/D8428
Modified:
head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Thu Nov 3 19:41:54 2016 (r49639)
+++ head/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.xml Thu Nov 3 19:48:36 2016 (r49640)
@@ -3231,7 +3231,7 @@ bridge0: flags=8843<UP,BROADCAST,RUNN
address is seen on a different interface. This gives
the benefit of static address entries without the need
to pre-populate the forwarding table. Clients learned
- on a particular segment of the bridge can not roam to
+ on a particular segment of the bridge cannot roam to
another segment.An example of using sticky addresses is to combine
@@ -3251,7 +3251,7 @@ bridge0: flags=8843<UP,BROADCAST,RUNN
In this example, both clients see 192.168.0.1 as their
default gateway. Since the bridge cache is sticky, one
- host can not spoof the MAC address of
+ host cannot spoof the MAC address of
the other customer in order to intercept their
traffic.
From owner-svn-doc-head@freebsd.org Fri Nov 4 12:49:23 2016
Return-Path:
Delivered-To: svn-doc-head@mailman.ysv.freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org
[IPv6:2001:1900:2254:206a::19:1])
by mailman.ysv.freebsd.org (Postfix) with ESMTP id F3E03C2F491;
Fri, 4 Nov 2016 12:49:22 +0000 (UTC)
(envelope-from ryusuke@FreeBSD.org)
Received: from repo.freebsd.org (repo.freebsd.org
[IPv6:2610:1c1:1:6068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(Client did not present a certificate)
by mx1.freebsd.org (Postfix) with ESMTPS id C1EF6D35;
Fri, 4 Nov 2016 12:49:22 +0000 (UTC)
(envelope-from ryusuke@FreeBSD.org)
Received: from repo.freebsd.org ([127.0.1.37])
by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id uA4CnMEO029822;
Fri, 4 Nov 2016 12:49:22 GMT (envelope-from ryusuke@FreeBSD.org)
Received: (from ryusuke@localhost)
by repo.freebsd.org (8.15.2/8.15.2/Submit) id uA4CnMHg029821;
Fri, 4 Nov 2016 12:49:22 GMT (envelope-from ryusuke@FreeBSD.org)
Message-Id: <201611041249.uA4CnMHg029821@repo.freebsd.org>
X-Authentication-Warning: repo.freebsd.org: ryusuke set sender to
ryusuke@FreeBSD.org using -f
From: Ryusuke SUZUKI
Date: Fri, 4 Nov 2016 12:49:21 +0000 (UTC)
To: doc-committers@freebsd.org, svn-doc-all@freebsd.org,
svn-doc-head@freebsd.org
Subject: svn commit: r49641 - head/ja_JP.eucJP/books/handbook/introduction
X-SVN-Group: doc-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-doc-head@freebsd.org
X-Mailman-Version: 2.1.23
Precedence: list
List-Id: SVN commit messages for the doc tree for head
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Fri, 04 Nov 2016 12:49:23 -0000
Author: ryusuke
Date: Fri Nov 4 12:49:21 2016
New Revision: 49641
URL: https://svnweb.freebsd.org/changeset/doc/49641
Log:
- Merge the following from the English version:
r48529 -> r49507 head/ja_JP.eucJP/books/handbook/introduction/chapter.xml
Modified:
head/ja_JP.eucJP/books/handbook/introduction/chapter.xml
Modified: head/ja_JP.eucJP/books/handbook/introduction/chapter.xml
==============================================================================
--- head/ja_JP.eucJP/books/handbook/introduction/chapter.xml Thu Nov 3 19:48:36 2016 (r49640)
+++ head/ja_JP.eucJP/books/handbook/introduction/chapter.xml Fri Nov 4 12:49:21 2016 (r49641)
@@ -3,7 +3,7 @@
The FreeBSD Documentation Project
The FreeBSD Japanese Documentation Project
- Original revision: r48529
+ Original revision: r49507
$FreeBSD$
-->
@@ -612,6 +612,18 @@
+ Stormshield
+
+ Stormshield
+
+ - Stormshield ͥåȥƥץ饤
+ ϡ줿 &os; ١Ǥ
+ BSD 饤ˤꡢƥ˲桹ŪǤǡ
+ ߥ˥ƥ¿ζ̣ȯ̤⤿餷Ƥޤ
+
+
+ The Weather
Channel