Module Name:    src
Committed By:   bouyer
Date:           Sun Jan 13 17:16:06 UTC 2013

Modified Files:
        src/doc [netbsd-5]: CHANGES-5.3

Log Message:
tickets 1823-1839


To generate a diff of this commit:
cvs rdiff -u -r1.1.2.1 -r1.1.2.2 src/doc/CHANGES-5.3

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/doc/CHANGES-5.3
diff -u src/doc/CHANGES-5.3:1.1.2.1 src/doc/CHANGES-5.3:1.1.2.2
--- src/doc/CHANGES-5.3:1.1.2.1	Tue Dec 18 21:59:28 2012
+++ src/doc/CHANGES-5.3	Sun Jan 13 17:16:06 2013
@@ -1,4 +1,4 @@
-# $NetBSD: CHANGES-5.3,v 1.1.2.1 2012/12/18 21:59:28 riz Exp $
+# $NetBSD: CHANGES-5.3,v 1.1.2.2 2013/01/13 17:16:06 bouyer Exp $
 
 A complete list of changes from the NetBSD 5.2 release to the NetBSD 5.3
 release:
@@ -11,3 +11,123 @@ sys/sys/param.h					patched by hand
 	Welcome to 5.2_STABLE.
 	[riz]
 
+sys/fs/smbfs/smbfs_node.c			1.48, 1.49 via patch
+sys/fs/smbfs/smbfs_node.h			1.13 via patch
+sys/fs/smbfs/smbfs_vnops.c			1.83, 1.84 via patch
+
+	Various fixes for smbfs:
+
+	- Implement NGONE to fix caching issue described in PR kern/25070.
+	  Mostly taken from FreeBSD r125637.
+	- Revert revision 1.70 of smbfs_vnops.c to fix setattr to opened
+	  direcotry.  In case of SMB_CAP_NT_SMBS, NOPEN is set after
+	  smbfs_smb_ntcreatex() call.  If NOPEN is set in front, it will
+	  immediately return by condition at do_open label.
+	- In smbfs_close(), call smbfs_smb_close() and drop NOPEN bit in
+	  the case of direcotry.  Otherwise smbfs_rmdir() fails when the
+	  directory was opened.
+	- Remove redundant vput() before vgone().
+	- Avoid unnecessary mutex_exit() in smbfs_node_alloc().
+	- Set NGONE bit to from-name vnode to invalidate the smbnode cache.
+	[nakayama, ticket #1823]
+
+sys/fs/smbfs/smbfs_smb.c			1.44
+sys/fs/smbfs/smbfs_subr.c			1.16
+sys/fs/smbfs/smbfs_subr.h			1.21
+sys/fs/smbfs/smbfs_vnops.c			1.85
+sys/netsmb/smb.h				1.20
+
+	Improve smbfs timestamp handling.
+	Don't round timestamp to 2 seconds resolution if the server
+	supports the CAP_INFOLEVEL_PASSTHRU capability.
+	[nakayama, ticket #1824]
+
+sys/netsmb/smb_iod.c				1.31 - 1.35
+sys/netsmb/smb_rq.c				1.32
+
+	Do not call callout_stop() unless the structure was previoulsy
+	initialised for a non null timeout.
+	Do initialise the callout when fetching a new request structure from
+	the pool, not when starting the timer. Likewise, destroy the callout
+	when giving back the item to the pool.
+	Send data for as long as there is new data available.  Otherwise
+	there was a danger of smb_iod_recvall() blocking, hence releasing
+	the kernel lock, new data creeping into the queue, and a wakeup
+	being missed (well, there's still a race, but since it's theoretical
+	enough for me to never have encountered it, I'll rather solve it
+	by periodic wakeups).
+	defensive programming: wake up iod thread once a second "just in case"
+	add comment to previous stating periodic wakeups can be nuked
+	once smb is mpsafe.
+	[nakayama, ticket #1825]
+
+sys/dev/lockstat.c				1.16
+
+	Fix off by one.
+	[msaitoh, ticket #1826]
+
+sys/dev/raidframe/rf_driver.c			1.131
+
+	Fix off by one read.
+	[msaitoh, ticket #1827]
+
+sys/external/isc/atheros_hal/dist/ah_eeprom_v14.c		patch
+
+	Fix off by one read.
+	[msaitoh, ticket #1828]
+
+sys/compat/netbsd32/netbsd32_fs.c		1.64
+
+	Fix inverted error check.
+	[matt, ticket #1829]
+
+sys/dev/usb/ubsa_common.c			1.9
+
+	Fix off by one read error.
+	[msaitoh, ticket #1830]
+
+sys/external/bsd/drm/dist/shared-core/i915_suspend.c 1.6
+
+	Fix wrong reference to dev_priv->saveSWF1. It was clearly wrong.
+	[msaitoh, ticket #1831]
+
+sbin/sysctl/sysctl.c				1.149 via patch
+
+	Add missing free() in error path.
+	[msaitoh, ticket #1832]
+
+usr.bin/netstat/bpf.c				1.11
+
+	Fix memory leak.
+	[msaitoh, ticket #1833]
+
+sys/arch/i386/conf/XEN2_DOMU:			patch
+sys/arch/amd64/conf/XEN3_DOMU:			patch
+
+	Add drvctl to Xen DOMU kernels
+	[sborrill, ticket #1834]
+
+sbin/fsck_ffs/pass1.c				1.50
+
+	Show pass1 SIGINFO output on stderr like other passes, not on stdout.
+	[riastradh, ticket #1837]
+
+etc/namedb/root.cache				1.17
+
+	D.ROOT-SERVERS.NET changes IPv4 address.
+	[taca, ticket #1839]
+
+gnu/dist/grep/lib/getopt.c			1.2
+gnu/dist/grep/lib/regex.c			1.2
+gnu/dist/grep/src/ansi2knr.c			1.2
+gnu/dist/grep/src/dfa.c				1.3
+gnu/dist/grep/src/grep.c			1.14
+gnu/dist/grep/src/search.c			1.4
+
+	Change several int variables to size_t, ssize_t, or ptrdiff_t.
+	This should fix the bug described in CVE-2012-5667 when an input
+	line is so long that its length cannot be stored in an int
+	variable.
+
+	[apb, ticket #1838]
+

Reply via email to