#
dc36d6f9 |
| 23-Nov-2023 |
Warner Losh <imp@FreeBSD.org> |
lib: Remove ancient SCCS tags.
Remove ancient SCCS tags from the tree, automated scripting, with two minor fixup to keep things compiling. All the common forms in the tree were removed with a perl s
lib: Remove ancient SCCS tags.
Remove ancient SCCS tags from the tree, automated scripting, with two minor fixup to keep things compiling. All the common forms in the tree were removed with a perl script.
Sponsored by: Netflix
show more ...
|
Revision tags: release/14.0.0 |
|
#
559a218c |
| 01-Nov-2023 |
Warner Losh <imp@FreeBSD.org> |
libc: Purge unneeded cdefs.h
These sys/cdefs.h are not needed. Purge them. They are mostly left-over from the $FreeBSD$ removal. A few in libc are still required for macros that cdefs.h defines. Kee
libc: Purge unneeded cdefs.h
These sys/cdefs.h are not needed. Purge them. They are mostly left-over from the $FreeBSD$ removal. A few in libc are still required for macros that cdefs.h defines. Keep those.
Sponsored by: Netflix Differential Revision: https://reviews.freebsd.org/D42385
show more ...
|
#
1d386b48 |
| 16-Aug-2023 |
Warner Losh <imp@FreeBSD.org> |
Remove $FreeBSD$: one-line .c pattern
Remove /^[\s*]*__FBSDID\("\$FreeBSD\$"\);?\s*\n/
|
#
8f79b075 |
| 19-Jun-2023 |
Gordon Bergling <gbe@FreeBSD.org> |
nameser: Fix a typo in a source code comment
-s /unknwon/unknown/
MFC after: 3 days
|
Revision tags: release/13.2.0, release/12.4.0, release/13.1.0, release/12.3.0, release/13.0.0, release/12.2.0, release/11.4.0, release/12.1.0 |
|
#
f993ed2f |
| 09-Sep-2019 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r351732 through r352104.
|
#
4effc021 |
| 05-Sep-2019 |
Cy Schubert <cy@FreeBSD.org> |
Bounds check again after advancing cp, otherwise we have a possible heap buffer overflow. This was discovered by a Google fuzzer test. This can lead to remote denial of service. User interaction and
Bounds check again after advancing cp, otherwise we have a possible heap buffer overflow. This was discovered by a Google fuzzer test. This can lead to remote denial of service. User interaction and execution privileges are not a prerequisite for exploitation.
Reported by: enh at Google, to FreeBSD by maya@NetBSD.org Obtained from: enh at Google See also: NetBSD ns_name.c r1.12 Reviewed by: delphij, ume MFC after: 3 days https://android-review.googlesource.com/c/platform/bionic/+/1093130 Differential Revision: https://reviews.freebsd.org/D21523
show more ...
|
Revision tags: release/11.3.0, release/12.0.0, release/11.2.0 |
|
#
6e778a7e |
| 08-Dec-2017 |
Pedro F. Giffuni <pfg@FreeBSD.org> |
SPDX: license IDs for some ISC-related files.
|
Revision tags: release/10.4.0, release/11.1.0, release/11.0.1, release/11.0.0, release/10.3.0, release/10.2.0 |
|
#
9268022b |
| 19-Nov-2014 |
Simon J. Gerraty <sjg@FreeBSD.org> |
Merge from head@274682
|
Revision tags: release/10.1.0 |
|
#
246e7a2b |
| 02-Sep-2014 |
Neel Natu <neel@FreeBSD.org> |
IFC @r269962
Submitted by: Anish Gupta (akgupt3@gmail.com)
|
#
1b833d53 |
| 13-Aug-2014 |
Alexander V. Chernikov <melifaro@FreeBSD.org> |
Sync to HEAD@r269943.
|
#
c397297c |
| 12-Aug-2014 |
Hajimu UMEMOTO <ume@FreeBSD.org> |
Fix broken pointer overflow check ns_name_unpack()
Many compilers may optimize away the overflow check `msg + l < msg', where `msg' is a pointer and `l' is an integer, because pointer overflow is un
Fix broken pointer overflow check ns_name_unpack()
Many compilers may optimize away the overflow check `msg + l < msg', where `msg' is a pointer and `l' is an integer, because pointer overflow is undefined behavior in C.
Use a safe precondition test `l >= eom - msg' instead.
Reference: https://android-review.googlesource.com/#/c/50570/
Requested by: pfg Obtained from: NetBSD (CVS rev. 1.10)
show more ...
|
#
e4576472 |
| 12-Aug-2014 |
Hajimu UMEMOTO <ume@FreeBSD.org> |
Update our stub resolver to final version of libbind.
Obtained from: ISC
|
#
a4636111 |
| 07-Aug-2014 |
Pedro F. Giffuni <pfg@FreeBSD.org> |
Fix broken pointer overflow check ns_name_unpack()
Many compilers may optimize away the overflow check `msg + l < msg', where `msg' is a pointer and `l' is an integer, because pointer overflow is un
Fix broken pointer overflow check ns_name_unpack()
Many compilers may optimize away the overflow check `msg + l < msg', where `msg' is a pointer and `l' is an integer, because pointer overflow is undefined behavior in C.
Use a safe precondition test `l >= eom - msg' instead.
Reference: https://android-review.googlesource.com/#/c/50570/
Obtained from: NetBSD (CVS rev. 1.10) MFC after: 3 weeks
show more ...
|
#
046c3635 |
| 06-Aug-2014 |
Pedro F. Giffuni <pfg@FreeBSD.org> |
Bring final version of libbind:
From http://www.isc.org/downloads/libbind/
The libbind functions have been separated from the BIND suite as of BIND 9.6.0. Originally from older versions of BIND, th
Bring final version of libbind:
From http://www.isc.org/downloads/libbind/
The libbind functions have been separated from the BIND suite as of BIND 9.6.0. Originally from older versions of BIND, they have been continually maintained and improved but not installed by default with BIND 9. This standard resolver library contains the same historical functions and headers included with many Unix operating systems. In fact, most implementations are based on the same original code.
At present, NetBSD maintains libbind code, now known as "netresolv".
show more ...
|
Revision tags: release/9.3.0, release/10.0.0, release/9.2.0, release/8.4.0, release/9.1.0, release/8.3.0_cvs, release/8.3.0, release/9.0.0, release/7.4.0_cvs, release/8.2.0_cvs, release/7.4.0, release/8.2.0, release/8.1.0_cvs, release/8.1.0, release/7.3.0_cvs, release/7.3.0, release/8.0.0_cvs, release/8.0.0, release/7.2.0_cvs, release/7.2.0, release/7.1.0_cvs, release/7.1.0, release/6.4.0_cvs, release/6.4.0, release/7.0.0_cvs, release/7.0.0, release/6.3.0_cvs, release/6.3.0 |
|
#
861249f5 |
| 03-Jun-2007 |
Hajimu UMEMOTO <ume@FreeBSD.org> |
Vendor import of BIND 9.4.1
|
#
46cf4f09 |
| 03-Jun-2007 |
Hajimu UMEMOTO <ume@FreeBSD.org> |
This commit was generated by cvs2svn to compensate for changes in r170242, which included commits to RCS files with non-trunk default branches.
|
Revision tags: release/6.2.0_cvs, release/6.2.0, release/5.5.0_cvs, release/5.5.0, release/6.1.0_cvs, release/6.1.0 |
|
#
65e96449 |
| 21-Mar-2006 |
Hajimu UMEMOTO <ume@FreeBSD.org> |
Vendor import of BIND 9.3.2
|
#
29537ed8 |
| 21-Mar-2006 |
Hajimu UMEMOTO <ume@FreeBSD.org> |
This commit was generated by cvs2svn to compensate for changes in r156952, which included commits to RCS files with non-trunk default branches.
|
Revision tags: release/9.3.0, release/10.0.0, release/9.2.0, release/8.4.0, release/9.1.0, release/8.3.0_cvs, release/8.3.0, release/9.0.0, release/7.4.0_cvs, release/8.2.0_cvs, release/7.4.0, release/8.2.0, release/8.1.0_cvs, release/8.1.0, release/7.3.0_cvs, release/7.3.0, release/8.0.0_cvs, release/8.0.0, release/7.2.0_cvs, release/7.2.0, release/7.1.0_cvs, release/7.1.0, release/6.4.0_cvs, release/6.4.0, release/7.0.0_cvs, release/7.0.0, release/6.3.0_cvs, release/6.3.0 |
|
#
861249f5 |
| 03-Jun-2007 |
Hajimu UMEMOTO <ume@FreeBSD.org> |
Vendor import of BIND 9.4.1
|
#
46cf4f09 |
| 03-Jun-2007 |
Hajimu UMEMOTO <ume@FreeBSD.org> |
This commit was generated by cvs2svn to compensate for changes in r170242, which included commits to RCS files with non-trunk default branches.
|
Revision tags: release/6.2.0_cvs, release/6.2.0, release/5.5.0_cvs, release/5.5.0, release/6.1.0_cvs, release/6.1.0 |
|
#
65e96449 |
| 21-Mar-2006 |
Hajimu UMEMOTO <ume@FreeBSD.org> |
Vendor import of BIND 9.3.2
|
#
29537ed8 |
| 21-Mar-2006 |
Hajimu UMEMOTO <ume@FreeBSD.org> |
This commit was generated by cvs2svn to compensate for changes in r156952, which included commits to RCS files with non-trunk default branches.
|