From owner-svn-doc-head@FreeBSD.ORG Sun Jan 25 10:18:33 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 5F94DF43; Sun, 25 Jan 2015 10:18:33 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4B34817E; Sun, 25 Jan 2015 10:18:33 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0PAIXjn077825; Sun, 25 Jan 2015 10:18:33 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0PAIXYh077824; Sun, 25 Jan 2015 10:18:33 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <201501251018.t0PAIXYh077824@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Sun, 25 Jan 2015 10:18:33 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46232 - head/ja_JP.eucJP/books/handbook/cutting-edge X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 25 Jan 2015 10:18:33 -0000 Author: ryusuke Date: Sun Jan 25 10:18:32 2015 New Revision: 46232 URL: https://svnweb.freebsd.org/changeset/doc/46232 Log: - Merge the following from the English version: r46080 -> r46231 head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml ============================================================================== --- head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Sat Jan 24 19:53:22 2015 (r46231) +++ head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Sun Jan 25 10:18:32 2015 (r46232) @@ -3,7 +3,7 @@ The FreeBSD Documentation Project The FreeBSD Japanese Documentation Project - Original revision: r46080 + Original revision: r46231 $FreeBSD$ --> make buildworld の行程にかかる時間を短縮し、 依存問題に悩まされるようなトラブルを回避することができます。 - &prompt.root; cd /usr/obj -&prompt.root; chflags -R noschg * -&prompt.root; rm -rf * + &prompt.root; chflags -R noschg /usr/obj/* +&prompt.root; rm -rf /usr/obj From owner-svn-doc-head@FreeBSD.ORG Mon Jan 26 09:35:46 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 96CDACF1; Mon, 26 Jan 2015 09:35:46 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 779E4767; Mon, 26 Jan 2015 09:35:46 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0Q9ZkZX038298; Mon, 26 Jan 2015 09:35:46 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0Q9Zk7D038297; Mon, 26 Jan 2015 09:35:46 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <201501260935.t0Q9Zk7D038297@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Mon, 26 Jan 2015 09:35:46 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46233 - head/ja_JP.eucJP/htdocs X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Jan 2015 09:35:46 -0000 Author: ryusuke Date: Mon Jan 26 09:35:45 2015 New Revision: 46233 URL: https://svnweb.freebsd.org/changeset/doc/46233 Log: - Merge the following from the English version: r46192 -> r46228 head/ja_JP.eucJP/htdocs/where.xml Modified: head/ja_JP.eucJP/htdocs/where.xml Modified: head/ja_JP.eucJP/htdocs/where.xml ============================================================================== --- head/ja_JP.eucJP/htdocs/where.xml Sun Jan 25 10:18:32 2015 (r46232) +++ head/ja_JP.eucJP/htdocs/where.xml Mon Jan 26 09:35:45 2015 (r46233) @@ -6,7 +6,7 @@ ]> - + @@ -144,9 +144,9 @@ @@ -184,6 +184,7 @@ インストーライメージ 仮想マシンイメージ + 文書 @@ -202,6 +203,49 @@
  • i386
  • + + + + + + + +

     

    + +

    &os; &rel.current;-STABLE

    + + + + + + + + + + + +
    インストーライメージ仮想マシンイメージ文書
    + + + + + +
    From owner-svn-doc-head@FreeBSD.ORG Tue Jan 27 06:38:30 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id D66B1BC3; Tue, 27 Jan 2015 06:38:30 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id C276479D; Tue, 27 Jan 2015 06:38:30 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0R6cUbn049002; Tue, 27 Jan 2015 06:38:30 GMT (envelope-from bryanv@FreeBSD.org) Received: (from bryanv@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0R6cUt0049000; Tue, 27 Jan 2015 06:38:30 GMT (envelope-from bryanv@FreeBSD.org) Message-Id: <201501270638.t0R6cUt0049000@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: bryanv set sender to bryanv@FreeBSD.org using -f From: Bryan Venteicher Date: Tue, 27 Jan 2015 06:38:30 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46234 - head/en_US.ISO8859-1/books/porters-handbook/versions X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Jan 2015 06:38:31 -0000 Author: bryanv (src committer) Date: Tue Jan 27 06:38:29 2015 New Revision: 46234 URL: https://svnweb.freebsd.org/changeset/doc/46234 Log: Document __FreeBSD_version 1001507. Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Mon Jan 26 09:35:45 2015 (r46233) +++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Tue Jan 27 06:38:29 2015 (r46234) @@ -5231,6 +5231,14 @@ + 1001507 + January 27, 2015 + 10-STABLE after changes to the UDP tunneling callback + to provide a context pointer and the source sockaddr (rev + 277790). + + + 1100000 October 10, 2013 11.0-CURRENT From owner-svn-doc-head@FreeBSD.ORG Tue Jan 27 19:53:33 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id D1A89B2C; Tue, 27 Jan 2015 19:53:33 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id BA927D37; Tue, 27 Jan 2015 19:53:33 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0RJrXTF024795; Tue, 27 Jan 2015 19:53:33 GMT (envelope-from delphij@FreeBSD.org) Received: (from delphij@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0RJrWL0024785; Tue, 27 Jan 2015 19:53:32 GMT (envelope-from delphij@FreeBSD.org) Message-Id: <201501271953.t0RJrWL0024785@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: delphij set sender to delphij@FreeBSD.org using -f From: Xin LI Date: Tue, 27 Jan 2015 19:53:32 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46235 - in head/share: security/advisories security/patches/SA-15:02 security/patches/SA-15:03 xml X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Jan 2015 19:53:33 -0000 Author: delphij Date: Tue Jan 27 19:53:31 2015 New Revision: 46235 URL: https://svnweb.freebsd.org/changeset/doc/46235 Log: Add advisories and patches for SA-15:02.kmem and SA-15:03.sctp. Added: head/share/security/advisories/FreeBSD-SA-15:02.kmem.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-15:03.sctp.asc (contents, props changed) head/share/security/patches/SA-15:02/ head/share/security/patches/SA-15:02/sctp.patch (contents, props changed) head/share/security/patches/SA-15:02/sctp.patch.asc (contents, props changed) head/share/security/patches/SA-15:03/ head/share/security/patches/SA-15:03/sctp.patch (contents, props changed) head/share/security/patches/SA-15:03/sctp.patch.asc (contents, props changed) Modified: head/share/xml/advisories.xml Added: head/share/security/advisories/FreeBSD-SA-15:02.kmem.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-15:02.kmem.asc Tue Jan 27 19:53:31 2015 (r46235) @@ -0,0 +1,145 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-15:02.kmem Security Advisory + The FreeBSD Project + +Topic: SCTP SCTP_SS_VALUE kernel memory corruption and disclosure + +Category: core +Module: sctp +Announced: 2015-01-27 +Credits: Clement LECIGNE from Google Security Team and + Francisco Falcon from Core Security Technologies +Affects: All supported versions of FreeBSD. +Corrected: 2015-01-27 19:36:08 UTC (stable/10, 10.1-STABLE) + 2015-01-27 19:37:02 UTC (releng/10.1, 10.1-RELEASE-p5) + 2015-01-27 19:37:02 UTC (releng/10.0, 10.0-RELEASE-p17) + 2015-01-27 19:36:08 UTC (stable/9, 9.3-STABLE) + 2015-01-27 19:37:02 UTC (releng/9.3, 9.3-RELEASE-p9) + 2015-01-27 19:36:08 UTC (stable/8, 8.4-STABLE) + 2015-01-27 19:37:02 UTC (releng/8.4, 8.4-RELEASE-p23) +CVE Name: CVE-2014-8612 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +SCTP protocol provides reliable, flow-controlled, two-way transmission +of data. It is a message oriented protocol and can support the SOCK_STREAM +and SOCK_SEQPACKET abstractions. + +SCTP allows the user to choose between multiple scheduling algorithms to +optimize the sending behavior of SCTP in scenarios with different +requirements. + +II. Problem Description + +Due to insufficient validation of the SCTP stream ID, which serves as an array +index, a local unprivileged attacker can read or write 16-bits of kernel +memory. + +III. Impact + +An unprivileged process can read or modify 16-bits of memory which +belongs to the kernel. This smay lead to exposure of sensitive +information or allow privilege escalation. + +IV. Workaround + +No workaround is available. + +V. Solution + +Perform one of the following: + +1) Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +2) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-15:02/sctp.patch +# fetch https://security.FreeBSD.org/patches/SA-15:02/sctp.patch.asc +# gpg --verify sctp.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/8/ r277807 +releng/8.4/ r277808 +stable/9/ r277807 +releng/9.3/ r277808 +stable/10/ r277807 +releng/10.0/ r277808 +releng/10.1/ r277808 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + +We would like to acknowledge Clement LECIGNE from Google Security Team and +Francisco Falcon from Core Security Technologies who discovered the issue +independently and reported to the FreeBSD Security Team. + + + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.1 (FreeBSD) + +iQIcBAEBCgAGBQJUx+qPAAoJEO1n7NZdz2rndPwQAJYuUZhkBqt6Lj0Wnuu220QL +OwMQAVBDggfNMJj5GCMRYqniARGg53UpzBjbKyen9N7tQtjgF6ll9EcWQhUdQSSl +07iCLGkn7kAu5jRO7+S/fJLXaUBfo+KfrUakHBdrWGKD0VVp/DDMbjbzZWl8Yw0S +7g0tqSmNcR1uUbAAsSXUfN9N/8OZzkqCiDvmVcFtalw1CjFyl6XbYXxNS+/j7LrU +YQBJdz9F/X/oPe19VQ36olZWzTdlSLwa/ylwNW7O6K5NdoCq73Co4IDL0gkAgtdQ +s4A7h4UwEoYleRRX+g9Rbeq2tz9FwfIwSferFRF5/1thc0cVJ2e/oDq9lmzyepwa +rbH8jy/TMtSKHlali8I3w6KYfqRFs6whS9Bud1b0SgrqqZizsO64BbvSzkELxHJl +PMUPHHCh3w0CXnRcaxC+rY/kazPZeRzebMaxQLAV0KTEVp0aSGw7FBtEE+ldrHUd +rp1bLESjTjtagr1K1UsCKKZr/t9RSHSZ1I6vfxBPUsUu7oUgd+aOmEpiyYKxna0y +vS5ECCrJG4k9fsQ1emyB5NhROYCXdq2CavfWWOOi3LoUhVvh34N27HVZlqv2m3Y9 +sM20xOB3dSx3ufsv19nAclVpL76Pu7fD/MNe+lhUk1KKgqx0L7vdiJfMIrafLYsR +V2Rre46fapln8T+wvhQP +=o9yw +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-15:03.sctp.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-15:03.sctp.asc Tue Jan 27 19:53:31 2015 (r46235) @@ -0,0 +1,136 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-15:03.sctp Security Advisory + The FreeBSD Project + +Topic: SCTP stream reset vulnerability + +Category: core +Module: sctp +Announced: 2015-01-27 +Credits: Gerasimos Dimitriadis +Affects: All supported versions of FreeBSD. +Corrected: 2015-01-27 19:36:08 UTC (stable/10, 10.1-STABLE) + 2015-01-27 19:37:02 UTC (releng/10.1, 10.1-RELEASE-p5) + 2015-01-27 19:37:02 UTC (releng/10.0, 10.0-RELEASE-p17) + 2015-01-27 19:36:08 UTC (stable/9, 9.3-STABLE) + 2015-01-27 19:37:02 UTC (releng/9.3, 9.3-RELEASE-p9) + 2015-01-27 19:36:08 UTC (stable/8, 8.4-STABLE) + 2015-01-27 19:37:02 UTC (releng/8.4, 8.4-RELEASE-p23) +CVE Name: CVE-2014-8613 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +SCTP protocol provides reliable, flow-controlled, two-way transmission +of data. It is a message oriented protocol and can support the SOCK_STREAM +and SOCK_SEQPACKET abstractions. + +II. Problem Description + +The input validation of received SCTP RE_CONFIG chunks is insufficient, +and can result in a NULL pointer deference later. + +III. Impact + +A remote attacker who can send a malformed SCTP packet to a FreeBSD system +that serves SCTP can cause a kernel panic, resulting in a Denial of +Service. + +IV. Workaround + +On FreeBSD 10.1 or later systems, the system administrator can set +net.inet.sctp.reconfig_enable to 0 to disable processing of RE_CONFIG +chunks. This workaround is not available on earlier FreeBSD releases, +but systems that do not serve SCTP connections are not vulnerable. + +V. Solution + +Perform one of the following: + +1) Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +2) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-15:03/sctp.patch +# fetch https://security.FreeBSD.org/patches/SA-15:03/sctp.patch.asc +# gpg --verify sctp.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/8/ r277807 +releng/8.4/ r277808 +stable/9/ r277807 +releng/9.3/ r277808 +stable/10/ r277807 +releng/10.0/ r277808 +releng/10.1/ r277808 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.1 (FreeBSD) + +iQIcBAEBCgAGBQJUx+qbAAoJEO1n7NZdz2rnR98QAOWIIf7+akuopMxuVnppZKub +DKCgVAJznitKoxnBtYMAOTcKdf65dQqaAgznAWBRo+USue5LIOI0jjgLuQgepoG6 +eIosPiRXqvMQL6Qqx8ydwM3xiVQd+b9pMiLkh3cfljr1Oh6OV+YSRXC+HBKZXaR6 +sn5kHRR7xFiwV/HsX4RoSik3qPbDl1x66jeN5jL0Wqg2qjCagK6OxGOtkIlt3pDj +QrYNX/l20hXmvPjRojSEPhY+52X29/nlQjfJg/pwpsmiZJe3cqmfsh1aceUOH1Tu +BOVxwE3oYWrJ8NZBa2cKReU1Sdvl1FxtlaXwkE+sRBzh1/vA7AZU6jWL7fEV1wv0 +2mZYLoCrSHfBongLMohs4DQ8CCnH3iEoUBRbG9HGwlAh4s9CAre87oIdHHFWRSsg +oIHxNDG+lk+yNJuOKfjDT+poyuYw7TlBfYN+ifO5UHPOEIH430FWF3B3P2oH4I/M +7VQRClaxaNiPfAJxa11IwHKWM12yrrM7483AuPqdd1r9OUnx33y1jPY0ByemXv9d +LE8jJXs0cdR7zCJuV9R8Uif9xkdGLTj9emsqjaS1KxSJrSzPJaah4nkWq8BRmMXK +3xOxlIM/cGJLU+/cliDy3CqHipU4pt+S4RuAB41xx2k5g9YiAMH178xrfOgrklSH +xKfAM/gz4YqESK5QPjqO +=859G +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-15:02/sctp.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-15:02/sctp.patch Tue Jan 27 19:53:31 2015 (r46235) @@ -0,0 +1,45 @@ +Index: sys/netinet/sctp_usrreq.c +=================================================================== +--- sys/netinet/sctp_usrreq.c (revision 277788) ++++ sys/netinet/sctp_usrreq.c (working copy) +@@ -1863,8 +1863,9 @@ flags_out: + SCTP_CHECK_AND_CAST(av, optval, struct sctp_stream_value, *optsize); + SCTP_FIND_STCB(inp, stcb, av->assoc_id); + if (stcb) { +- if (stcb->asoc.ss_functions.sctp_ss_get_value(stcb, &stcb->asoc, &stcb->asoc.strmout[av->stream_id], +- &av->stream_value) < 0) { ++ if ((av->stream_id >= stcb->asoc.streamoutcnt) || ++ (stcb->asoc.ss_functions.sctp_ss_get_value(stcb, &stcb->asoc, &stcb->asoc.strmout[av->stream_id], ++ &av->stream_value) < 0)) { + SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL); + error = EINVAL; + } else { +@@ -4032,8 +4033,9 @@ sctp_setopt(struct socket *so, int optname, void * + SCTP_CHECK_AND_CAST(av, optval, struct sctp_stream_value, optsize); + SCTP_FIND_STCB(inp, stcb, av->assoc_id); + if (stcb) { +- if (stcb->asoc.ss_functions.sctp_ss_set_value(stcb, &stcb->asoc, &stcb->asoc.strmout[av->stream_id], +- av->stream_value) < 0) { ++ if ((av->stream_id >= stcb->asoc.streamoutcnt) || ++ (stcb->asoc.ss_functions.sctp_ss_set_value(stcb, &stcb->asoc, &stcb->asoc.strmout[av->stream_id], ++ av->stream_value) < 0)) { + SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_USRREQ, EINVAL); + error = EINVAL; + } +@@ -4043,10 +4045,12 @@ sctp_setopt(struct socket *so, int optname, void * + SCTP_INP_RLOCK(inp); + LIST_FOREACH(stcb, &inp->sctp_asoc_list, sctp_tcblist) { + SCTP_TCB_LOCK(stcb); +- stcb->asoc.ss_functions.sctp_ss_set_value(stcb, +- &stcb->asoc, +- &stcb->asoc.strmout[av->stream_id], +- av->stream_value); ++ if (av->stream_id < stcb->asoc.streamoutcnt) { ++ stcb->asoc.ss_functions.sctp_ss_set_value(stcb, ++ &stcb->asoc, ++ &stcb->asoc.strmout[av->stream_id], ++ av->stream_value); ++ } + SCTP_TCB_UNLOCK(stcb); + } + SCTP_INP_RUNLOCK(inp); Added: head/share/security/patches/SA-15:02/sctp.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-15:02/sctp.patch.asc Tue Jan 27 19:53:31 2015 (r46235) @@ -0,0 +1,17 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.1 (FreeBSD) + +iQIcBAABCgAGBQJUx+qbAAoJEO1n7NZdz2rn0EgP/0JAL3PGZvxezFy8oCtccfmK +8puU1nlEVq4f0CETGqH1x1bd/P5kMFtC6JAaGbXg4xk2BAi5PLLUf4jPEXu9V8Ok +a2IJ3uuVUAEmrccdyDq4N9ahrnODGNf0nsR6QhcZYJGWg5GoMeHQbMTIVLkF7yHz +5NztDnQO6YuWHYkOFw92zMxNxijH5rUBRbRPfgBxn+6YWL8aabWwrShNmWSIZykb +5NDVYwjl0WozEh0NNdXHwOi+14hUIWCAaNmxHBgkxursQI8G0/js8xLbf/ehVU8d +MuRtVRB1jWCjEIo/Uat6A5Uy6wwCZsTeIFU7RwVYPmF2LtMxYdPP8V6NINErSn/d +wcaRawS9pmbKHmRR3Xk4hnuLpbewu0qB+TS/z1UNCaoSsv//MuSFt4NTMafMMnee +PuwZXPtrjIpCLLDpWZ9o79eX3v3VnmMx2P3Cu+UADoDs/nhWMC0liJ3AlGQBFwso +Z2lXiaujjsqb4JY2VonySuRxkByO/AbJqc9BP+cN2H8EHgzZLUs+ACcmE9O8y/Th +gIWvszlu2gWVyhONIxUD39DGfTCfhQLgMWSaVtQOBL0BEltRJGjYn/RrbZjffGeo +RHG5Gp2212hclgES/mIbfknECixa8VK0u/+AlWmGW5Oahux/pDMnxuRqD9DkfEDS +BSWdWxJZ4q5YDH7GAvyP +=ZyyZ +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-15:03/sctp.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-15:03/sctp.patch Tue Jan 27 19:53:31 2015 (r46235) @@ -0,0 +1,119 @@ +Index: sys/netinet/sctp_input.c +=================================================================== +--- sys/netinet/sctp_input.c (revision 277788) ++++ sys/netinet/sctp_input.c (working copy) +@@ -3649,6 +3649,9 @@ sctp_handle_stream_reset_response(struct sctp_tcb + /* huh ? */ + return (0); + } ++ if (ntohs(respin->ph.param_length) < sizeof(struct sctp_stream_reset_response_tsn)) { ++ return (0); ++ } + if (action == SCTP_STREAM_RESET_RESULT_PERFORMED) { + resp = (struct sctp_stream_reset_response_tsn *)respin; + asoc->stream_reset_outstanding--; +@@ -4037,7 +4040,7 @@ __attribute__((noinline)) + sctp_handle_stream_reset(struct sctp_tcb *stcb, struct mbuf *m, int offset, + struct sctp_chunkhdr *ch_req) + { +- int chk_length, param_len, ptype; ++ uint16_t remaining_length, param_len, ptype; + struct sctp_paramhdr pstore; + uint8_t cstore[SCTP_CHUNK_BUFFER_SIZE]; + uint32_t seq = 0; +@@ -4050,7 +4053,7 @@ __attribute__((noinline)) + int num_param = 0; + + /* now it may be a reset or a reset-response */ +- chk_length = ntohs(ch_req->chunk_length); ++ remaining_length = ntohs(ch_req->chunk_length) - sizeof(struct sctp_chunkhdr); + + /* setup for adding the response */ + sctp_alloc_a_chunk(stcb, chk); +@@ -4088,20 +4091,27 @@ strres_nochunk: + ch->chunk_length = htons(chk->send_size); + SCTP_BUF_LEN(chk->data) = SCTP_SIZE32(chk->send_size); + offset += sizeof(struct sctp_chunkhdr); +- while ((size_t)chk_length >= sizeof(struct sctp_stream_reset_tsn_request)) { ++ while (remaining_length >= sizeof(struct sctp_paramhdr)) { + ph = (struct sctp_paramhdr *)sctp_m_getptr(m, offset, sizeof(pstore), (uint8_t *) & pstore); +- if (ph == NULL) ++ if (ph == NULL) { ++ /* TSNH */ + break; ++ } + param_len = ntohs(ph->param_length); +- if (param_len < (int)sizeof(struct sctp_stream_reset_tsn_request)) { +- /* bad param */ ++ if ((param_len > remaining_length) || ++ (param_len < (sizeof(struct sctp_paramhdr) + sizeof(uint32_t)))) { ++ /* bad parameter length */ + break; + } +- ph = (struct sctp_paramhdr *)sctp_m_getptr(m, offset, min(param_len, (int)sizeof(cstore)), ++ ph = (struct sctp_paramhdr *)sctp_m_getptr(m, offset, min(param_len, sizeof(cstore)), + (uint8_t *) & cstore); ++ if (ph == NULL) { ++ /* TSNH */ ++ break; ++ } + ptype = ntohs(ph->param_type); + num_param++; +- if (param_len > (int)sizeof(cstore)) { ++ if (param_len > sizeof(cstore)) { + trunc = 1; + } else { + trunc = 0; +@@ -4113,6 +4123,9 @@ strres_nochunk: + if (ptype == SCTP_STR_RESET_OUT_REQUEST) { + struct sctp_stream_reset_out_request *req_out; + ++ if (param_len < sizeof(struct sctp_stream_reset_out_request)) { ++ break; ++ } + req_out = (struct sctp_stream_reset_out_request *)ph; + num_req++; + if (stcb->asoc.stream_reset_outstanding) { +@@ -4126,6 +4139,9 @@ strres_nochunk: + } else if (ptype == SCTP_STR_RESET_ADD_OUT_STREAMS) { + struct sctp_stream_reset_add_strm *str_add; + ++ if (param_len < sizeof(struct sctp_stream_reset_add_strm)) { ++ break; ++ } + str_add = (struct sctp_stream_reset_add_strm *)ph; + num_req++; + sctp_handle_str_reset_add_strm(stcb, chk, str_add); +@@ -4132,6 +4148,9 @@ strres_nochunk: + } else if (ptype == SCTP_STR_RESET_ADD_IN_STREAMS) { + struct sctp_stream_reset_add_strm *str_add; + ++ if (param_len < sizeof(struct sctp_stream_reset_add_strm)) { ++ break; ++ } + str_add = (struct sctp_stream_reset_add_strm *)ph; + num_req++; + sctp_handle_str_reset_add_out_strm(stcb, chk, str_add); +@@ -4156,6 +4175,9 @@ strres_nochunk: + struct sctp_stream_reset_response *resp; + uint32_t result; + ++ if (param_len < sizeof(struct sctp_stream_reset_response)) { ++ break; ++ } + resp = (struct sctp_stream_reset_response *)ph; + seq = ntohl(resp->response_seq); + result = ntohl(resp->result); +@@ -4167,7 +4189,11 @@ strres_nochunk: + break; + } + offset += SCTP_SIZE32(param_len); +- chk_length -= SCTP_SIZE32(param_len); ++ if (remaining_length >= SCTP_SIZE32(param_len)) { ++ remaining_length -= SCTP_SIZE32(param_len); ++ } else { ++ remaining_length = 0; ++ } + } + if (num_req == 0) { + /* we have no response free the stuff */ Added: head/share/security/patches/SA-15:03/sctp.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-15:03/sctp.patch.asc Tue Jan 27 19:53:31 2015 (r46235) @@ -0,0 +1,17 @@ +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.1 (FreeBSD) + +iQIcBAABCgAGBQJUx+qbAAoJEO1n7NZdz2rng3MP/3a6EgYQFrHJZ0f89jJh+tgC +tnj7NSHGAYI4LjwqBMLngfwVw7lzqd46dE9VUc5E123RE7HOwYCkllebWKkQdMxa +6NvCxmIT0jRcmMb2TWteS6Tp1DE7I2COJHBA4BLN0T+3/KwgvSEU3p1947uumlL1 +m7qh69thHqi5tbqLkBh6j5CVPZj/hM+wBX+GRHm4s6Bo/NsnVWS2iCscsiOYFylP +IIYl8puXa8zv4EV/Jqco779BpJ71Bqr+zIcOq9uf8dcWAHrOTCYx85e4xNQ2sCmB +KlA8kYqdFR4XdgSJC9UhMpq9V206+wjAUiJz1JvpEd2+IaEs1RyFDl3MUxQoWDHU +cXS1Bg9/z/mP1PzC4XQxSgcqgjD3q94AoOLKIFLsdvqXZ4aQ8VXrWAm0hAC4DMLd +e3t+Np0XXE3IpUEnp50GEqkrAKKkcbvUT40HFqS/v/jHE48X5ISd4vAjFPEd0ANV +5a7IsrYiDDFOLltTuk2zrOfCfEj6QonVs4/SqTApcOsrCP6Jxy0OqmyKNy6bgps+ +vmzaQl0/I7d/JEclNpXFl8BdxWsXL354KhI83/JKftP33cjA5p9y4Yor9nG5EAFx +8YpJ1MQtjVu2S0fyxhvCGSsaepob5R4Wzb3q5uRsGbU2RMwqXNbyOlLOaETD1FSC +17CUlhlbHpMGss4B09S8 +=j7hV +-----END PGP SIGNATURE----- Modified: head/share/xml/advisories.xml ============================================================================== --- head/share/xml/advisories.xml Tue Jan 27 06:38:29 2015 (r46234) +++ head/share/xml/advisories.xml Tue Jan 27 19:53:31 2015 (r46235) @@ -11,6 +11,18 @@ 1 + 27 + + + FreeBSD-SA-15:03.sctp + + + + FreeBSD-SA-15:02.kmem + + + + 14 From owner-svn-doc-head@FreeBSD.ORG Tue Jan 27 21:13:18 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 66112A96; Tue, 27 Jan 2015 21:13:18 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 3864EBCB; Tue, 27 Jan 2015 21:13:18 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0RLDIY6067445; Tue, 27 Jan 2015 21:13:18 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0RLDIQO067444; Tue, 27 Jan 2015 21:13:18 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201501272113.t0RLDIQO067444@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Tue, 27 Jan 2015 21:13:18 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46236 - head/share/examples X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Jan 2015 21:13:18 -0000 Author: gjb Date: Tue Jan 27 21:13:17 2015 New Revision: 46236 URL: https://svnweb.freebsd.org/changeset/doc/46236 Log: In build_manpages(), evaluate the 'package' variable which, if zero-length, turns on NO_MLINKS mode for comparing against man-refs.ent. After processing (and updating man-refs.ent if needed), run build_manpages() again without NO_MLINKS, which then produces an archive containing manual pages that are installed as hard links (MLINKS), such as tar(1), sound(4), etc., which people do expect to be available on the website. Sponsored by: The FreeBSD Foundation Modified: head/share/examples/missing-manrefs.sh Modified: head/share/examples/missing-manrefs.sh ============================================================================== --- head/share/examples/missing-manrefs.sh Tue Jan 27 19:53:31 2015 (r46235) +++ head/share/examples/missing-manrefs.sh Tue Jan 27 21:13:17 2015 (r46236) @@ -36,12 +36,12 @@ # against man-refs.ent. # -PATH="/usr/bin:/bin:/usr/local/bin:/usr/sbin:/sbin" -export PATH +export PATH="/usr/bin:/bin:/usr/local/bin:/usr/sbin:/sbin" docs=${1} srcs=${2} sects=$(seq 1 9) +package= usage() { echo "Usage:" @@ -57,6 +57,10 @@ outdir=$(mktemp -d /tmp/manrefresh.outdi objdir=$(mktemp -d /tmp/manrefresh.objdir.XXXXXX) build_manpages() { + MAKE_FLAGS= + if [ -z "${package}" ]; then + MAKE_FLAGS="NO_MLINKS=1" + fi export MAKEOBJDIRPREFIX=${objdir} export DESTDIR=${outdir} export TESTSBASE=${DESTDIR}/usr/tests @@ -64,16 +68,18 @@ build_manpages() { make -s -C ${srcs} DESTDIR=${DESTDIR} \ SRCCONF=/dev/null __MAKE_CONF=/dev/null \ MANOWN=$USER MANGRP=$USER MANMODE=0666 \ - NO_MLINKS=1 -DNO_ROOT obj hier all-man maninstall - echo "Packaging manual pages..." - tar -zcvf ${outdir}.tgz -C ${outdir} \ - usr/share/man usr/share/openssl + ${MAKE_FLAGS} -DNO_ROOT obj hier all-man maninstall + if [ ! -z "${package}" ]; then + echo "Packaging manual pages..." + tar -zcvf ${outdir}.tgz -C ${outdir} \ + usr/share/man usr/share/openssl + fi } build_cleanup() { make -s -C ${srcs} DESTDIR=${outdir} \ SRCCONF=/dev/null __MAKE_CONF=/dev/null \ - NO_MLINKS=1 -DNO_ROOT cleandir + -DNO_ROOT cleandir } add_manref() { @@ -102,8 +108,10 @@ main() { || add_manref ${_m} done done + package=1 + build_manpages build_cleanup - rm -vr ${outdir} ${objdir} + rm -fvr ${outdir} ${objdir} echo "Packaged manual pages are in: ${outdir}.tgz" } From owner-svn-doc-head@FreeBSD.ORG Tue Jan 27 21:15:55 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 69B86B80; Tue, 27 Jan 2015 21:15:55 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 533CCBF5; Tue, 27 Jan 2015 21:15:55 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0RLFtfl067830; Tue, 27 Jan 2015 21:15:55 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0RLFtSu067829; Tue, 27 Jan 2015 21:15:55 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201501272115.t0RLFtSu067829@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Tue, 27 Jan 2015 21:15:55 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46237 - head/share/xml X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Jan 2015 21:15:55 -0000 Author: gjb Date: Tue Jan 27 21:15:54 2015 New Revision: 46237 URL: https://svnweb.freebsd.org/changeset/doc/46237 Log: Add missing manual pages from CURRENT: - pmcstudy(1) - utimensat(2) - xo_error(3) - cc_dctcp(4) - ixl(4) - ixlv(4) Sponsored by: The FreeBSD Foundation Modified: head/share/xml/man-refs.ent Modified: head/share/xml/man-refs.ent ============================================================================== --- head/share/xml/man-refs.ent Tue Jan 27 21:13:17 2015 (r46236) +++ head/share/xml/man-refs.ent Tue Jan 27 21:15:54 2015 (r46237) @@ -551,6 +551,7 @@ pkgdb1"> pkill1"> pl2pm1"> +pmcstudy1"> pod2html1"> pod2man1"> popd1"> @@ -1096,6 +1097,7 @@ undelete2"> unlink2"> unmount2"> +utimensat2"> utimes2"> utrace2"> uuidgen2"> @@ -4083,6 +4085,7 @@ xo_create3"> xo_emit3"> xo_err3"> +xo_error3"> xo_finish3"> xo_flush3"> xo_no_setlocale3"> @@ -4215,6 +4218,7 @@ cc_cdg4"> cc_chd4"> cc_cubic4"> +cc_dctcp4"> cc_hd4"> cc_htcp4"> cc_newreno4"> @@ -4411,6 +4415,8 @@ iwnfw4"> ixgb4"> ixgbe4"> +ixl4"> +ixlv4"> jme4"> joy4"> k8temp4"> From owner-svn-doc-head@FreeBSD.ORG Wed Jan 28 14:58:52 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id DC3FFC41; Wed, 28 Jan 2015 14:58:52 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id C7EA6E27; Wed, 28 Jan 2015 14:58:52 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0SEwq3M075466; Wed, 28 Jan 2015 14:58:52 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0SEwqa3075465; Wed, 28 Jan 2015 14:58:52 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <201501281458.t0SEwqa3075465@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Wed, 28 Jan 2015 14:58:52 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46238 - head/en_US.ISO8859-1/articles/committers-guide X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Jan 2015 14:58:53 -0000 Author: gjb Date: Wed Jan 28 14:58:51 2015 New Revision: 46238 URL: https://svnweb.freebsd.org/changeset/doc/46238 Log: Note that doc committers are allowed to update the documentation within the ports/ tree as necessary. Update copyright year while here. Sponsored by: The FreeBSD Foundation Modified: head/en_US.ISO8859-1/articles/committers-guide/article.xml Modified: head/en_US.ISO8859-1/articles/committers-guide/article.xml ============================================================================== --- head/en_US.ISO8859-1/articles/committers-guide/article.xml Tue Jan 27 21:15:54 2015 (r46237) +++ head/en_US.ISO8859-1/articles/committers-guide/article.xml Wed Jan 28 14:58:51 2015 (r46238) @@ -32,6 +32,7 @@ 2012 2013 2014 + 2015 The &os; Documentation Project @@ -388,7 +389,7 @@ You need a Passphrase to protect your se doc doceng@ - doc/, src/ documentation + doc/, ports/, src/ documentation From owner-svn-doc-head@FreeBSD.ORG Thu Jan 29 20:01:41 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 057AA53A; Thu, 29 Jan 2015 20:01:41 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E534A107; Thu, 29 Jan 2015 20:01:40 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0TK1ekc008475; Thu, 29 Jan 2015 20:01:40 GMT (envelope-from jhb@FreeBSD.org) Received: (from jhb@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0TK1eqW008474; Thu, 29 Jan 2015 20:01:40 GMT (envelope-from jhb@FreeBSD.org) Message-Id: <201501292001.t0TK1eqW008474@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: jhb set sender to jhb@FreeBSD.org using -f From: John Baldwin Date: Thu, 29 Jan 2015 20:01:40 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46239 - head/en_US.ISO8859-1/books/porters-handbook/versions X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Jan 2015 20:01:41 -0000 Author: jhb Date: Thu Jan 29 20:01:40 2015 New Revision: 46239 URL: https://svnweb.freebsd.org/changeset/doc/46239 Log: Document FreeBSD versions 1100054 through 1100057. Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Wed Jan 28 14:58:51 2015 (r46238) +++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Thu Jan 29 20:01:40 2015 (r46239) @@ -5662,6 +5662,38 @@ 11.0-CURRENT after MCLGET() gained a return value (276750). + + + 1100054 + January 15, 2015 + 11.0-CURRENT after rewrite of callout subsystem + (277213). + + + + 1100055 + January 22, 2015 + 11.0-CURRENT after reverting callout changes in + 277213 + (277528). + + + + 1100056 + January 23, 2015 + 11.0-CURRENT after addition of + futimens and + utimensat system calls + (277610). + + + + + 1100057 + January 29, 2015 + 11.0-CURRENT after removal of d_thread_t + (277897). + From owner-svn-doc-head@FreeBSD.ORG Fri Jan 30 04:17:18 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 94D07531; Fri, 30 Jan 2015 04:17:18 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 805D1AE9; Fri, 30 Jan 2015 04:17:18 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0U4HII7051493; Fri, 30 Jan 2015 04:17:18 GMT (envelope-from jgh@FreeBSD.org) Received: (from jgh@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0U4HIax051492; Fri, 30 Jan 2015 04:17:18 GMT (envelope-from jgh@FreeBSD.org) Message-Id: <201501300417.t0U4HIax051492@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: jgh set sender to jgh@FreeBSD.org using -f From: Jason Helfman Date: Fri, 30 Jan 2015 04:17:18 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46240 - head/en_US.ISO8859-1/books/arch-handbook/boot X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Jan 2015 04:17:18 -0000 Author: jgh Date: Fri Jan 30 04:17:17 2015 New Revision: 46240 URL: https://svnweb.freebsd.org/changeset/doc/46240 Log: - fix typo in directory path PR: 197067 Differential Revision: https://reviews.freebsd.org/D1713 Submitted by: mathias@monnerville.com Approved by: wblock (mentor) Modified: head/en_US.ISO8859-1/books/arch-handbook/boot/chapter.xml Modified: head/en_US.ISO8859-1/books/arch-handbook/boot/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/arch-handbook/boot/chapter.xml Thu Jan 29 20:01:40 2015 (r46239) +++ head/en_US.ISO8859-1/books/arch-handbook/boot/chapter.xml Fri Jan 30 04:17:17 2015 (r46240) @@ -70,8 +70,8 @@ $FreeBSD$ The boot process is an extremely machine-dependent activity. Not only must code be written for every computer architecture, but there may also be multiple types of booting on - the same architecture. For example, looking at - /usr/sys/src/boot + the same architecture. For example, a directory listing of + /usr/src/sys/boot reveals a great amount of architecture-dependent code. There is a directory for each of the various supported architectures. In the x86-specific i386 From owner-svn-doc-head@FreeBSD.ORG Fri Jan 30 04:22:34 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 8BA5F5B8; Fri, 30 Jan 2015 04:22:34 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 779FEB9F; Fri, 30 Jan 2015 04:22:34 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0U4MYpv055811; Fri, 30 Jan 2015 04:22:34 GMT (envelope-from jgh@FreeBSD.org) Received: (from jgh@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0U4MYxW055810; Fri, 30 Jan 2015 04:22:34 GMT (envelope-from jgh@FreeBSD.org) Message-Id: <201501300422.t0U4MYxW055810@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: jgh set sender to jgh@FreeBSD.org using -f From: Jason Helfman Date: Fri, 30 Jan 2015 04:22:34 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46241 - head/en_US.ISO8859-1/articles/laptop X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Jan 2015 04:22:34 -0000 Author: jgh Date: Fri Jan 30 04:22:33 2015 New Revision: 46241 URL: https://svnweb.freebsd.org/changeset/doc/46241 Log: - fix dead link and point to FreeBSD wiki PR: 196751 Differential Revision: https://reviews.freebsd.org/D1714 Submitted by: info@juanmolina.eu Approved by: wblock (mentor) Modified: head/en_US.ISO8859-1/articles/laptop/article.xml Modified: head/en_US.ISO8859-1/articles/laptop/article.xml ============================================================================== --- head/en_US.ISO8859-1/articles/laptop/article.xml Fri Jan 30 04:17:17 2015 (r46240) +++ head/en_US.ISO8859-1/articles/laptop/article.xml Fri Jan 30 04:22:33 2015 (r46241) @@ -44,7 +44,7 @@ &os; into a search engine of your choice. Additionally there is a &os;-specific online database which aims to give information on hardware issues with laptops, The &os; Laptop + xlink:href="https://wiki.freebsd.org/Laptops/">The &os; Laptop Compatibility List. If you want to communicate with other &os; laptop users, check From owner-svn-doc-head@FreeBSD.ORG Fri Jan 30 07:29:56 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 6B7E7571; Fri, 30 Jan 2015 07:29:56 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 57C97E44; Fri, 30 Jan 2015 07:29:56 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0U7TuJU049736; Fri, 30 Jan 2015 07:29:56 GMT (envelope-from jgh@FreeBSD.org) Received: (from jgh@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0U7Tu4r049735; Fri, 30 Jan 2015 07:29:56 GMT (envelope-from jgh@FreeBSD.org) Message-Id: <201501300729.t0U7Tu4r049735@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: jgh set sender to jgh@FreeBSD.org using -f From: Jason Helfman Date: Fri, 30 Jan 2015 07:29:56 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46242 - head/en_US.ISO8859-1/books/handbook/install X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Jan 2015 07:29:56 -0000 Author: jgh Date: Fri Jan 30 07:29:55 2015 New Revision: 46242 URL: https://svnweb.freebsd.org/changeset/doc/46242 Log: - fix command-line arguments [1] http://lists.freebsd.org/pipermail/freebsd-doc/2015-January/024903.html Differential Revision: https://reviews.freebsd.org/D1730 Reported by: Chad Smith [1] Approved by: remko (mentor) Modified: head/en_US.ISO8859-1/books/handbook/install/chapter.xml Modified: head/en_US.ISO8859-1/books/handbook/install/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/install/chapter.xml Fri Jan 30 04:22:33 2015 (r46241) +++ head/en_US.ISO8859-1/books/handbook/install/chapter.xml Fri Jan 30 07:29:55 2015 (r46242) @@ -4190,7 +4190,7 @@ Please press any key to reboot. port: &prompt.root; mkisofs -v -b boot/cdboot -no-emul-boot -r -J -V "Headless_install" \ - -o Headless-&os;-&rel2.current;-RELEASE-i386-disc1.iso/path/to/headless-iso + -o Headless-&os;-&rel2.current;-RELEASE-i386-disc1.iso /path/to/headless-iso Now that the ISO image is configured correctly, burn it to a CD/DVD media using a burning application. From owner-svn-doc-head@FreeBSD.ORG Fri Jan 30 08:25:48 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 8C5C7B41; Fri, 30 Jan 2015 08:25:48 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 78B11617; Fri, 30 Jan 2015 08:25:48 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0U8PmYI079721; Fri, 30 Jan 2015 08:25:48 GMT (envelope-from jgh@FreeBSD.org) Received: (from jgh@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0U8Pmus079720; Fri, 30 Jan 2015 08:25:48 GMT (envelope-from jgh@FreeBSD.org) Message-Id: <201501300825.t0U8Pmus079720@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: jgh set sender to jgh@FreeBSD.org using -f From: Jason Helfman Date: Fri, 30 Jan 2015 08:25:48 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46243 - head/en_US.ISO8859-1/books/faq X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Jan 2015 08:25:48 -0000 Author: jgh Date: Fri Jan 30 08:25:47 2015 New Revision: 46243 URL: https://svnweb.freebsd.org/changeset/doc/46243 Log: - address outdated infomation regarding memory limits for amd64 in faq PR: 196997 Differential Revision: https://reviews.freebsd.org/D1731 Reported by: ports@toco-domains.de Approved by: bcr (mentor) Modified: head/en_US.ISO8859-1/books/faq/book.xml Modified: head/en_US.ISO8859-1/books/faq/book.xml ============================================================================== --- head/en_US.ISO8859-1/books/faq/book.xml Fri Jan 30 07:29:55 2015 (r46242) +++ head/en_US.ISO8859-1/books/faq/book.xml Fri Jan 30 08:25:47 2015 (r46243) @@ -46,6 +46,8 @@ 2012 2013 2014 + 2015 + The &os; Documentation Project @@ -1496,9 +1498,8 @@ without PAE supports at most 4 GB of memory (and usually less than that because of PCI address space) and &i386; with PAE supports at - most 64 GB memory. AMD64 platforms currently - deployed support up to 1 TB of physical - memory. + most 64 GB memory. As of &os; 10, AMD64 + platforms support up to 4 TB of physical memory. From owner-svn-doc-head@FreeBSD.ORG Fri Jan 30 18:11:27 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id BDC1E1D6; Fri, 30 Jan 2015 18:11:27 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id A8F3623D; Fri, 30 Jan 2015 18:11:27 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0UIBRus082809; Fri, 30 Jan 2015 18:11:27 GMT (envelope-from mat@FreeBSD.org) Received: (from mat@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0UIBRGi082808; Fri, 30 Jan 2015 18:11:27 GMT (envelope-from mat@FreeBSD.org) Message-Id: <201501301811.t0UIBRGi082808@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: mat set sender to mat@FreeBSD.org using -f From: Mathieu Arnold Date: Fri, 30 Jan 2015 18:11:27 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46244 - head/en_US.ISO8859-1/books/porters-handbook/makefiles X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Jan 2015 18:11:27 -0000 Author: mat (ports committer) Date: Fri Jan 30 18:11:26 2015 New Revision: 46244 URL: https://svnweb.freebsd.org/changeset/doc/46244 Log: Catch up with options changes. Various sentence rearranging and rewording. Differential Revision: https://reviews.freebsd.org/D1599 Approved by: wblock Sponsored by: Absolight Modified: head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml Fri Jan 30 08:25:47 2015 (r46243) +++ head/en_US.ISO8859-1/books/porters-handbook/makefiles/chapter.xml Fri Jan 30 18:11:26 2015 (r46244) @@ -3711,6 +3711,7 @@ SSL_DESC= Build with OpenSSL support OPTIONS_DEFAULT= PGSQL LDAP SSL +# Will add USE_PGSQL=yes PGSQL_USE= pgsql=yes # Will add --enable-postgres / --disable-postgres PGSQL_CONFIGURE_ENABLE= postgres @@ -3856,16 +3857,17 @@ SUB_LIST+= OPT1="@comment " NO_OPT1="" <varname><replaceable>OPT</replaceable>_USE</varname> - For each + When option OPT is selected, + for each key=value pair in - OPT_USE the + OPT_USE, + value is appended to the corresponding - USE_KEY - will be set to value. - If value has spaces in it, - replace them with commas, they will be changed back to - spaces during processing. For example: + USE_KEY. If + value has spaces in it, replace + them with commas and they will be changed back to spaces + during processing. For example: OPTIONS_DEFINE= OPT1 OPT1_USE= mysql=yes xorg=x11,xextproto,xext,xrandr @@ -3882,22 +3884,56 @@ USE_XORG= x11 xextproto xext xrandr .endif + + <varname><replaceable>OPT</replaceable>_USE_OFF</varname> + + When option OPT is + not selected, for each + key=value + pair in + OPT_USE_OFF, + value is appended to the + corresponding + USE_KEY. If + value has spaces in it, replace + them with commas and they will be changed back to spaces + during processing. For example: + + OPTIONS_DEFINE= OPT1 +OPT1_USE_OFF= mysql=yes xorg=x11,xextproto,xext,xrandr + + is equivalent to: + + OPTIONS_DEFINE= OPT1 + +.include <bsd.port.options.mk> + +.if ! ${PORT_OPTIONS:MOPT1} +USE_MYSQL= yes +USE_XORG= x11 xextproto xext xrandr +.endif + + <varname><replaceable>OPT</replaceable>_CONFIGURE_ENABLE</varname> - If + When option OPT is selected, + for each entry in OPT_CONFIGURE_ENABLE - is set then - --enable-${OPT_CONFIGURE_ENABLE} - or - --disable-${OPT_CONFIGURE_ENABLE} - will be added to CONFIGURE_ARGS depending - on the value of the option - OPT, for - example: + then + --enable-entry + is appended to CONFIGURE_ARGS. When option + OPT is not selected, + --disable-entry + is appended to CONFIGURE_ARGS. An optional + argument can be specified with an = + symbol. This argument is only appended to the + --enable-entry + configure option. For example: - OPTIONS_DEFINE= OPT1 -OPT1_CONFIGURE_ENABLE= test + OPTIONS_DEFINE= OPT1 OPT2 +OPT1_CONFIGURE_ENABLE= test1 test2 +OPT2_CONFIGURE_ENABLE= test2=exhaustive is equivalent to: @@ -3906,33 +3942,38 @@ OPT1_CONFIGURE_ENABLE= test <varname><replaceable>OPT</replaceable>_CONFIGURE_WITH</varname> - If - OPT_CONFIGURE_WITH - is set then - --with-${OPT_CONFIGURE_WITH} - or - --without-${OPT_CONFIGURE_WITH} - will be added to CONFIGURE_ARGS depending - on the status of the option - OPT. An - optional argument can be specified with an - = symbol. This argument is only appended - to the - --with-opt + When option OPT is selected, + for each entry in + OPT_CONFIGURE_ENABLE + then + --with-entry + is appended to CONFIGURE_ARGS. When option + OPT is not selected, + --without-entry + is appended to CONFIGURE_ARGS. An optional + argument can be specified with an = + symbol. This argument is only appended to the + --with-entry configure option. For example: OPTIONS_DEFINE= OPT1 OPT2 OPT1_CONFIGURE_WITH= test1 -OPT1_CONFIGURE_WITH= test2=exhaustive +OPT2_CONFIGURE_WITH= test2=exhaustive is equivalent to: @@ -3956,13 +3997,11 @@ CONFIGURE_ARGS+= --without-test2 <varname><replaceable>OPT</replaceable>_CONFIGURE_ON</varname> - If - OPT_CONFIGURE_ON - is set then its value will be appended to - CONFIGURE_ARGS depending on the status of - the option - OPT, for - example: + When option OPT is selected, + the value of + OPT_CONFIGURE_ON, + if defined, is appended to + CONFIGURE_ARGS. For example: OPTIONS_DEFINE= OPT1 OPT1_CONFIGURE_ON= --add-test @@ -3981,13 +4020,11 @@ CONFIGURE_ARGS+= --add-test <varname><replaceable>OPT</replaceable>_CONFIGURE_OFF</varname> - If - OPT_CONFIGURE_OFF - is set then its value will be appended to - CONFIGURE_ARGS depending on the status of - the option - OPT, for - example: + When option OPT is + not selected, the value of + OPT_CONFIGURE_ON, + if defined, is appended to + CONFIGURE_ARGS. For example: OPTIONS_DEFINE= OPT1 OPT1_CONFIGURE_OFF= --no-test @@ -4006,12 +4043,11 @@ CONFIGURE_ARGS+= --no-test <varname><replaceable>OPT</replaceable>_CMAKE_ON</varname> - If - OPT_CMAKE_ON - is set then its value will be appended to - CMAKE_ARGS depending on the status of the - option OPT, - for example: + When option OPT is selected, + the value of + OPT_CMAKE_ON, + if defined, is appended to CMAKE_ARGS. + For example: OPTIONS_DEFINE= OPT1 OPT1_CMAKE_ON= -DTEST:BOOL=true @@ -4030,12 +4066,11 @@ CMAKE_ARGS+= -DTEST:BOOL=true <varname><replaceable>OPT</replaceable>_CMAKE_OFF</varname> - If - OPT_CMAKE_OFF - is set then its value will be appended to - CMAKE_ARGS depending on the status of the - option OPT, - for example: + When option OPT is + not selected, the value of + OPT_CMAKE_OFF, + if defined, is appended to CMAKE_ARGS. + For example: OPTIONS_DEFINE= OPT1 OPT1_CMAKE_OFF= -DTEST:BOOL=false @@ -4051,6 +4086,52 @@ CMAKE_ARGS+= -DTEST:BOOL=false .endif + + <varname><replaceable>OPT</replaceable>_QMAKE_ON</varname> + + When option OPT is selected, + the value of + OPT_QMAKE_ON, + if defined, is appended to + QMAKE_ARGS. For example: + + OPTIONS_DEFINE= OPT1 +OPT1_QMAKE_ON= -DTEST:BOOL=true + + is equivalent to: + + OPTIONS_DEFINE= OPT1 + +.include <bsd.port.options.mk> + +.if ${PORT_OPTIONS:MOPT1} +QMAKE_ARGS+= -DTEST:BOOL=true +.endif + + + + <varname><replaceable>OPT</replaceable>_QMAKE_OFF</varname> + + When option OPT is + not selected, the value of + OPT_QMAKE_OFF, + if defined, is appended to + QMAKE_ARGS. For example: + + OPTIONS_DEFINE= OPT1 +OPT1_QMAKE_OFF= -DTEST:BOOL=false + + is equivalent to: + + OPTIONS_DEFINE= OPT1 + +.include <bsd.port.options.mk> + +.if ! ${PORT_OPTIONS:MOPT1} +QMAKE_ARGS+= -DTEST:BOOL=false +.endif + + Dependencies @@ -4089,13 +4170,12 @@ CMAKE_ARGS+= -DTEST:BOOL=false <varname><replaceable>OPT</replaceable>_<replaceable>ABOVEVARIABLE</replaceable></varname> - If - OPT_ABOVEVARIABLE - is defined then its value will be appended to - ABOVEVARIABLE - depending on the status of the option - OPT, for - example: + When option OPT is + selected, the value of + OPT_ABOVEVARIABLE, + if defined, is appended to + ABOVEVARIABLE. + For example: OPTIONS_DEFINE= OPT1 OPT1_LIB_DEPENDS= liba.so:${PORTSDIR}/devel/a @@ -4115,13 +4195,12 @@ LIB_DEPENDS+= liba.so:${PORTSDIR}/devel/ <varname><replaceable>OPT</replaceable>_<replaceable>ABOVEVARIABLE</replaceable>_OFF</varname> - If - OPT_ABOVEVARIABLE_OFF - is set then a dependency of type - ABOVEVARIABLE - will be added when option - OPT is not - selected. For example: + When option OPT + is not selected, the value of + OPT_ABOVEVARIABLE_OFF, + if defined, is appended to + ABOVEVARIABLE. + For example: OPTIONS_DEFINE= OPT1 OPT1_LIB_DEPENDS_OFF= liba.so:${PORTSDIR}/devel/a @@ -4270,13 +4349,12 @@ DOCS_ALL_TARGET= doc <varname><replaceable>OPT</replaceable>_<replaceable>ABOVEVARIABLE</replaceable></varname> - If - OPT_ABOVEVARIABLE - is defined then its value will be appended to - ABOVEVARIABLE - depending on the status of the option - OPT, for - example: + When option OPT is + selected, the value of + OPT_ABOVEVARIABLE, + if defined, is appended to + ABOVEVARIABLE. + For example: OPTIONS_DEFINE= OPT1 OPT1_USES= gmake @@ -4297,13 +4375,11 @@ CFLAGS+= -DTEST <varname><replaceable>OPT</replaceable>_<replaceable>ABOVEVARIABLE</replaceable>_OFF</varname> - If - OPT_ABOVEVARIABLE_OFF - is set then a flag - ABOVEVARIABLE - will be automatically set when option - OPT is not - selected. For example: + When option OPT is not selected, the value of + OPT_ABOVEVARIABLE_OFF, + if defined, is appended to + ABOVEVARIABLE. + For example: OPTIONS_DEFINE= OPT1 OPT1_USES_OFF=gmake From owner-svn-doc-head@FreeBSD.ORG Fri Jan 30 18:22:48 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 540A288E; Fri, 30 Jan 2015 18:22:48 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 3F3CC377; Fri, 30 Jan 2015 18:22:48 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0UIMmGI088488; Fri, 30 Jan 2015 18:22:48 GMT (envelope-from erj@FreeBSD.org) Received: (from erj@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0UIMk9X088478; Fri, 30 Jan 2015 18:22:46 GMT (envelope-from erj@FreeBSD.org) Message-Id: <201501301822.t0UIMk9X088478@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: erj set sender to erj@FreeBSD.org using -f From: Eric Joyner Date: Fri, 30 Jan 2015 18:22:46 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46245 - in head: en_US.ISO8859-1/articles/contributors share/pgpkeys share/xml X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Jan 2015 18:22:48 -0000 Author: erj (src committer) Date: Fri Jan 30 18:22:46 2015 New Revision: 46245 URL: https://svnweb.freebsd.org/changeset/doc/46245 Log: Add Eric Joyner (erj)'s information to doc/ per New Committer's Guide. Approved by: gnn (mentor), jfv (mentor) Added: head/share/pgpkeys/erj.key (contents, props changed) Modified: head/en_US.ISO8859-1/articles/contributors/contrib.committers.xml head/share/pgpkeys/pgpkeys-developers.xml head/share/pgpkeys/pgpkeys.ent head/share/xml/authors.ent head/share/xml/news.xml Modified: head/en_US.ISO8859-1/articles/contributors/contrib.committers.xml ============================================================================== --- head/en_US.ISO8859-1/articles/contributors/contrib.committers.xml Fri Jan 30 18:11:26 2015 (r46244) +++ head/en_US.ISO8859-1/articles/contributors/contrib.committers.xml Fri Jan 30 18:22:46 2015 (r46245) @@ -583,6 +583,10 @@ + &a.erj.email; + + + &a.allanjude.email; Added: head/share/pgpkeys/erj.key ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/pgpkeys/erj.key Fri Jan 30 18:22:46 2015 (r46245) @@ -0,0 +1,231 @@ + + + +uid Eric Joyner +uid Eric Joyner +uid Eric Joyner +uid [jpeg image of size 5419] +sub rsa4096/D2427EB089BCF21B 2015-01-28 [expires: 2018-01-27] + +]]> + Modified: head/share/pgpkeys/pgpkeys-developers.xml ============================================================================== --- head/share/pgpkeys/pgpkeys-developers.xml Fri Jan 30 18:11:26 2015 (r46244) +++ head/share/pgpkeys/pgpkeys-developers.xml Fri Jan 30 18:22:46 2015 (r46245) @@ -861,6 +861,11 @@ &pgpkey.trevor; + + &a.erj.email; + &pgpkey.erj; + + &a.allanjude.email; &pgpkey.allanjude; Modified: head/share/pgpkeys/pgpkeys.ent ============================================================================== --- head/share/pgpkeys/pgpkeys.ent Fri Jan 30 18:11:26 2015 (r46244) +++ head/share/pgpkeys/pgpkeys.ent Fri Jan 30 18:22:46 2015 (r46245) @@ -137,6 +137,7 @@ + Modified: head/share/xml/authors.ent ============================================================================== --- head/share/xml/authors.ent Fri Jan 30 18:11:26 2015 (r46244) +++ head/share/xml/authors.ent Fri Jan 30 18:22:46 2015 (r46245) @@ -675,6 +675,9 @@ erik@FreeBSD.org"> + +erj@FreeBSD.org"> + erwin@FreeBSD.org"> Modified: head/share/xml/news.xml ============================================================================== --- head/share/xml/news.xml Fri Jan 30 18:11:26 2015 (r46244) +++ head/share/xml/news.xml Fri Jan 30 18:22:46 2015 (r46245) @@ -68,6 +68,11 @@

    New committer: Muhammad Moinur Rahman (ports)

    + + +

    New committer: + Eric Joyner (src)

    +
    From owner-svn-doc-head@FreeBSD.ORG Sat Jan 31 07:00:58 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id ED96F966; Sat, 31 Jan 2015 07:00:57 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id D9665667; Sat, 31 Jan 2015 07:00:57 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0V70vIR074353; Sat, 31 Jan 2015 07:00:57 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0V70vY5074352; Sat, 31 Jan 2015 07:00:57 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <201501310700.t0V70vY5074352@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Sat, 31 Jan 2015 07:00:57 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46247 - head/ja_JP.eucJP/books/handbook/install X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 31 Jan 2015 07:00:58 -0000 Author: ryusuke Date: Sat Jan 31 07:00:56 2015 New Revision: 46247 URL: https://svnweb.freebsd.org/changeset/doc/46247 Log: - Merge the following from the English version: r44550 -> r46242 head/ja_JP.eucJP/books/handbook/install/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/install/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/install/chapter.xml ============================================================================== --- head/ja_JP.eucJP/books/handbook/install/chapter.xml Sat Jan 31 06:50:10 2015 (r46246) +++ head/ja_JP.eucJP/books/handbook/install/chapter.xml Sat Jan 31 07:00:56 2015 (r46247) @@ -3,10 +3,12 @@ The FreeBSD Documentation Project The FreeBSD Japanese Documentation Project - Original revision: r44550 + Original revision: r46242 $FreeBSD$ --> - + &os; 8.<replaceable>X</replaceable> のインストール @@ -250,8 +252,6 @@ 14 0x1f0 - -
    @@ -3681,9 +3681,8 @@ Retype new password : - RPC。 - &man.rpcbind.8; は、NFS - サーバとクライアントの通信を取り扱い、 + &man.rpcbind.8; は、NFS + サーバとクライアントの RPC 通信を取り扱い、 NFS サーバが正しく機能するために必要です。 &man.rpc.statd.8; デーモンは、ステータスを監視し、 報告されたステータスは、通常 @@ -4327,7 +4326,7 @@ Please press any key to reboot. または port の &man.mkisofs.8; を使っています。 &prompt.root; mkisofs -v -b boot/cdboot -no-emul-boot -r -J -V "Headless_install" \ - -o Headless-&os;-&rel2.current;-RELEASE-i386-disc1.iso/path/to/headless-iso + -o Headless-&os;-&rel2.current;-RELEASE-i386-disc1.iso /path/to/headless-iso 適切な ISO イメージを作成できたので、 お気に入りの CD ライタ用のアプリケーションを使って @@ -4368,7 +4367,7 @@ Please press any key to reboot.
    - &man.cu.1;を通して画面がないマシンを操作することができます。 + &man.cu.1; を通して画面がないマシンを操作することができます。 カーネルを読み込み、 その後どの種類の端末を使うか選択する画面が表示されます。 &os; カラーコンソールを選んでインストールを続行してください! @@ -4554,7 +4553,6 @@ Please press any key to reboot. 次に、ダウンロードしたイメージをディスクに書き込んでください。 他の &os; システムで書き込みを行う場合には、 - および の手順を参考にしてください。 他のプラットフォーム上で書き込みを行う場合には、 From owner-svn-doc-head@FreeBSD.ORG Sat Jan 31 06:50:11 2015 Return-Path: Delivered-To: svn-doc-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 21585780; Sat, 31 Jan 2015 06:50:11 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 028C13B4; Sat, 31 Jan 2015 06:50:11 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t0V6oAI5067634; Sat, 31 Jan 2015 06:50:10 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t0V6oACE067633; Sat, 31 Jan 2015 06:50:10 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <201501310650.t0V6oACE067633@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Sat, 31 Jan 2015 06:50:10 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r46246 - head/ja_JP.eucJP/books/handbook/cutting-edge X-SVN-Group: doc-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Mailman-Approved-At: Sat, 31 Jan 2015 12:34:06 +0000 X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 31 Jan 2015 06:50:11 -0000 Author: ryusuke Date: Sat Jan 31 06:50:10 2015 New Revision: 46246 URL: https://svnweb.freebsd.org/changeset/doc/46246 Log: Refine translation. Modified: head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml ============================================================================== --- head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Fri Jan 30 18:22:46 2015 (r46245) +++ head/ja_JP.eucJP/books/handbook/cutting-edge/chapter.xml Sat Jan 31 06:50:10 2015 (r46246) @@ -1443,14 +1443,13 @@ before running "/usr/sbin/freebsd-update 例えば、古いコンパイラは、 バグを含み、新しいカーネルをコンパイルできない可能性があります。 - そのため、新しいカーネルの構築には、 - 新しいコンパイラを使う必要があり、 - 新しいコンパイラを構築しなくてはいけませんが、 + そのため、新しいカーネルは新しいコンパイラで構築しなければならないので、 + 新しいコンパイラの構築が必要となりますが、 必ずしも、 - 新しいコンパイラがインストールされている必要があるわけではありません。 + 新しいコンパイラがインストールされている必要はありません。 新しい world は、 - 新しいカーネルの機能に依存している可能性があるため、 + 新しいカーネルの機能に依存している可能性があるので、 新しい world をインストールする前に、 新しいカーネルがインストールされていなければなりません。 古い world は、新しいカーネルでは正しく動かないかも知れません。 @@ -1460,8 +1459,7 @@ before running "/usr/sbin/freebsd-update 設定の中には、新しい world をインストールする前に変更すべきものがありますが、 古い world を壊す可能性があります。 - そのため、一般的に設定のアップデートは、 - 2 つの手順が使われます。 + そのため、設定のアップデートは 2 つの手順で行われます。 多くの場合、アップデートのプロセスは、ファイルを置き換えたり、 追加のみを行い、古いファイルを削除しません。 このことが問題を引き起こす可能性があるため、 @@ -1476,9 +1474,9 @@ before running "/usr/sbin/freebsd-update 何か障害が発生した場合には、エラーメッセージのコピーを &os; メーリングリストに投稿してください。 - ファイルに保存する最も簡単な方法は、script - コマンドを使い、 - 引数として出力の保存先のファイル名を指定することです。 + ファイルに保存する最も簡単な方法は、 + 引数として出力の保存先のファイル名を指定して + script コマンドを使うことです。 /tmp に出力を保存しないようにしてください。 このディレクトリは、次の再起動で削除されてしまう可能性があります。 出力の保存には、/var/tmp が適しています。 @@ -1502,9 +1500,9 @@ Script started, output file is /var/tmp/ /usr/obj に存在するはずです。 このディレクトリが存在しているのであれば、 - このディレクトリを削除して、 + このディレクトリを削除することで make buildworld の行程にかかる時間を短縮し、 - 依存問題に悩まされるようなトラブルを回避することができます。 + 依存問題に悩まされるようなトラブルを回避できます。 &prompt.root; chflags -R noschg /usr/obj/* &prompt.root; rm -rf /usr/obj