Commit graph

9911 commits

Author SHA1 Message Date
Yan-Hao Wang
e73a8dd304 kyua manuals: Correct --results-file short form
PR:		290647
Ref:		kyua/cli/common.cpp#104
MFC after:	3 days
Reviewed by:	ziaee
Closes:		https://github.com/freebsd/kyua/issues/267

(cherry picked from commit bbaa7d628175ee484e31a054fb3cf7b7866cad13)
2026-01-10 08:58:29 +01:00
Gordon Tetlow
ffd7b3d7d4 Add a fix to scrub unsolicited NS RRSets to prevent cache poisoning.
Approved by:	so
Obtained from:	NLnet Labs
Security:	FreeBSD-SA-25:10.unbound
Security:	CVE-2025-11411
2025-12-03 12:04:50 +01:00
Igor Ostapenko
7668caa0cd kyua: Improve required_kmods metadata
- Make it platform agnostic
- Separate FreeBSD related code
- Fix tests
- Make it report all non-loaded modules instead of the first occurrence
  only
- Update kyuafile.5 man page

Reviewed by:	ngie
MFC after:	2 weeks
Pull Request:	https://github.com/freebsd/kyua/pull/270

(cherry picked from commit 939fec44a79323ba06cf0ad60d4b69300a8abbc6)
2025-10-07 12:08:43 +02:00
Dag-Erling Smørgrav
84a5cebd36 atf, kyua: Implement require.kmods.
This adds a metadata variable, require.kmods, and corresponding functions
or methods in C, C++, and shell, which allow a test to specify that it
requires particular kernel modules to run.  If the kernel modules are not
present, the test is skipped.  One might want to consider a kyua option
which makes it attempt to load the modules instead.

Differential Revision:	https://reviews.freebsd.org/D47470

(cherry picked from commit 83a1ee578c9d1ab7013e997289c7cd470c0e6902)
2025-10-07 12:08:43 +02:00
Dag-Erling Smørgrav
c46704b790 kyua: Stop using readdir_r()
It cannot be used safely, and Kyua doesn't even pretend to try.

MFC after:	1 week
Sponsored by:	Klara, Inc.
Reviewed by:	igoro
Differential Revision:	https://reviews.freebsd.org/D51680

(cherry picked from commit 65bae451c23b8d61b2433259d8e707250660eeff)
2025-08-11 11:14:49 +02:00
Martin Matuska
4e9261006a libarchive: merge from vendor branch
libarchive 3.8.1

New features:
 #2088 7-zip reader: improve self-extracting archive detection
 #2137 zip writer: added XZ, LZMA, ZSTD and BZIP2 support
 #2403 zip writer: added LZMA + RISCV BCJ filter
 #2601 bsdtar: support --mtime and --clamp-mtime
 #2602 libarchive: mbedtls 3.x compatibility

Security fixes:
 #2422 tar reader: Handle truncation in the middle of a GNU long linkname
       (CVE-2024-57970)
 #2532 tar reader: fix unchecked return value in list_item_verbose()
       (CVE-2025-25724)
 #2532 unzip: fix null pointer dereference (CVE-2025-1632)
 #2568 warc: prevent signed integer overflow (CVE-2025-5916)
 #2584 rar: do not skip past EOF while reading (CVE-2025-5918)
 #2588 tar: fix overflow in build_ustar_entry (CVE-2025-5917)
 #2598 rar: fix double free with over 4 billion nodes (CVE-2025-5914)
 #2599 rar: fix heap-buffer-overflow (CVE-2025-5915)

Important bugfixes:
 #2399 7-zip reader: add SPARC filter support for non-LZMA compressors
 #2405 tar reader: ignore ustar size when pax size is present
 #2435 tar writer: fix bug when -s/a/b/ used more than once with b flag
 #2459 7-zip reader: add POWERPC filter support for non-LZMA compressors
 #2519 libarchive: handle ARCHIVE_FILTER_LZOP in archive_read_append_filter
 #2539 libarchive: add missing seeker function to archive_read_open_FILE()
 #2544 gzip: allow setting the original filename for gzip compressed files
 #2564 libarchive: improve lseek handling
 #2582 rar: support large headers on 32 bit systems
 #2587 bsdtar: don't hardlink negative inode files together
 #2596 rar: support large headers on 32 bit systems
 #2606 libarchive: support @-prefixed Unix epoch timestamps as date strings
 #2634 tar: Support negative time values with pax
 #2637 tar: Keep block alignment after pax error
 #2642 libarchive: fix FILE_skip regression
 #2643 tar: Handle extra bytes after sparse entries
 #2649 compress: Prevent call stack overflow
 #2651 iso9660: always check archive_string_ensure return value

CVE:		CVE-2024-57970, CVE-2025-1632, CVE-2025-25724,
		CVE-2025-5914, CVE-2025-5915, CVE-2025-5916,
		CVE-2025-5917, CVE-2025-5918
PR:		286944 (exp-run, main, libarchive 3.8.0)
Approved by:	so
Security:	FreeBSD-SA-25:07.libarchive

(cherry picked from commit 2e113ef82465598b8c26e0ca415fbe90677fbd47)
(cherry picked from commit 6dad4525a2910496ecf3c41de659aac906f6c1f4)
2025-08-08 11:49:21 +02:00
Dag-Erling Smørgrav
253d54ec6a kyua: Try harder to delete directories.
When recursing into a directory to delete it, start by chmod'ing it to
0700.  This fixes an issue where kyua is able to run, but not debug, a
test case that creates unwriteable directories, because when debugging
it tries (and fails) to delete the directory after the test completes.

MFC after:	1 week
Sponsored by:	Klara, Inc.
Reviewed by:	igoro
Differential Revision:	https://reviews.freebsd.org/D51229

(cherry picked from commit 9bf14f2a475e221c48488984dc5a02a4608bb877)
2025-07-28 10:15:47 +02:00
Kyle Evans
963dda014e wg: ipc: add allowed-ip flags support for FreeBSD
For $reasons, we can't rely on flags in wireguard-tools for the kernel
side of WireGuard.  Provide a mapping function that uses flags from the
kernel that we're building against and fail the operation if we made it
to the end without turning some wg(8) flag off.

Signed-off-by: Kyle Evans <kevans@FreeBSD.org>

Reviewed by:	ivy (previous version), Jason A. Donenfeld, jhb

(cherry picked from commit f6d9e22982a1d0354c0199e94ebdb4474eaa74b9)
2025-07-28 10:14:11 +02:00
Kyle Evans
c55717dc3e Merge commit '2a7e45eef31292cf9dd82caf3346eb2acb5b6225'
Update wireguard-tools to the latest version, which has some stubbed out support
for incremental Allowed-IPs updates that we would need to add kernel support
for.

(cherry picked from commit 137de4b34d45192985e21f6d6163533da547fbac)
2025-07-28 10:13:57 +02:00
Lexi Winter
39dd0520af kyua: increase cleanup_timeout to 300s
Test cleanup times out after 60 seconds, causing the test to fail if the
cleanup hasn't finished in time.  This timeout should be configurable,
but it currently is not.

Several tests (e.g. bridge, pf) are now reaching this limit; as a
workaround, increase the timeout to 300 seconds.

Reviewed by:	igoro, kevans, des
Approved by:	des (mentor), kevans (mentor)
Differential Revision:	https://reviews.freebsd.org/D50499

(cherry picked from commit 0e33211f911c906b47cd0c457a86372c4b5daf87)
2025-07-09 10:05:45 +02:00
Jordan Gordeev
a0d22d7934 libc++: fix compiling <locale> with -fmodules
In /usr/include/c++/v1/__locale_dir/locale_base_api.h, xlocale.h is
included without first including stdio.h and stdlib.h, which causes
functions like strtoll_l() or sscanf_l() to not be declared.

When compiling with -fmodules, locale_base_api.h is processed separately
due to a declaration in /usr/include/c++/v1/module.modulemap, and this
will cause errors due to the above undeclared symbols.

Meanwhile, upstream has substantially reorganized this part of libc++'s
headers, so apply a minimalistic workaround: specifically when compiling
with -fmodules, add includes of stdio.h and stdlib.h.

PR:		286342
Approved by:	re (cperciva)
MFC after:	1 week

(cherry picked from commit c809b0184d0a6543bc5327d4252fa56a07ce4689)
(cherry picked from commit cab029073dc6cb5814df44556e585b8fdb1c9846)
2025-05-28 18:26:27 +02:00
Xin LI
9679eedea9 MFV: xz 5.8.1.
PR:		bin/286252
Approved by:	re (cperciva)

(cherry picked from commit 128836d304d93f2d00eb14069c27089ab46c38d4)
(cherry picked from commit 5cf27a49a2de91ae1f369912a7bf3859fbc79355)
2025-05-08 09:24:51 -07:00
Baptiste Daroussin
e7a517bee5 libedit: import vendor snapshot 2025-01-03
(cherry picked from commit 136d69caf03bc38de95c4df34c5a683e9ce81bfa)
2025-04-30 10:07:39 +02:00
John Baldwin
7485e6a867 telnet: Prevent buffer overflow in the user prompt for SRA
The Secure RPC authenticator for telnet prompts the local user for the
username to use for authentication.  Previously it was using sprintf()
into a buffer of 256 bytes, but the username received over the wire
can be up to 255 bytes long which would overflow the prompt buffer.
Fix this in two ways: First, use snprintf() and check for overflow.
If the prompt buffer overflows, fail authentication without prompting
the user.  Second, add 10 bytes to the buffer size to account for the
overhead of the prompt so that a maximally sized username fits.

While here, replace a bare 255 in the subsequent telnet_gets call with
an expression using sizeof() the relevant buffer.

PR:		270263
Reported by:	Robert Morris <rtm@lcs.mit.edu>
Tested on:	CHERI
Reviewed by:	emaste
Differential Revision:	https://reviews.freebsd.org/D49832

(cherry picked from commit 5737c2ae06e143e49496df2ab5a64f76d5456012)
2025-04-29 10:45:52 -04:00
Kyle Evans
73f88915a1 wireguard-tools: ipc: freebsd: use AF_LOCAL for the control socket
AF_INET assumes that IPv4 is built into the kernel, but it's completely
valid to build a kernel without it.  unix(4) sockets, on the other hand,
are not-optional in the kernel build.  Given that interface ioctls can
be invoked on any kind of socket, switch to the safer one to avoid
breaking on IPv6-only kernels.

Reported and tested by:	ivy

(cherry picked from commit 0d238bc50d453d7ac29476fa71edd1fc9a5fbbf9)
2025-04-25 22:19:49 -05:00
Philip Paeps
6f7ee9ac03 contrib/expat: import expat 2.7.1
Changes: https://github.com/libexpat/libexpat/blob/R_2_7_1/expat/Changes
         https://github.com/libexpat/libexpat/blob/R_2_7_0/expat/Changes

Security:	CVE-2024-8176

(cherry picked from commit fe9278888fd4414abe2d922e469cf608005f4c65)
2025-04-05 11:17:53 +08:00
Mark Johnston
8d95e941d4 netbsd-tests: Update a test case to chase grep symlink handling changes
This test case verifies that grep detects symlink loops when traversing
a directory hierarchy.

Fixes:		fc12c191c087 ("grep: Default to -p instead of -S.")
Reviewed by:	ngie, jhb
Reported by:	Jenkins
MFC after:	2 weeks
Differential Revision:	https://reviews.freebsd.org/D46544

(cherry picked from commit a700bef1e4ee3e6f4e1a86a374bf9b4044f69a70)
2025-03-31 14:27:25 -07:00
Philip Paeps
475082194a contrib/tzdata: import tzdata 2025b
Changes: https://github.com/eggert/tz/blob/2025b/NEWS

(cherry picked from commit d2cccdef30376b7de5643caae1ef035f8e6932f0)
2025-03-26 09:03:52 +08:00
Enji Cooper
1d67cec525 contrib/googletest: update from 1.14.0 to 1.15.2
The changes between the two versions can be found in this diff of the
two release tags:
https://github.com/google/googletest/compare/v1.14.0...v1.15.2

One notable change is that GoogleTest 1.15.x now officially requires
C++-14 (1.14.x required C++-11).

MFC after:	1 week
Differential Revision:	https://reviews.freebsd.org/D47197

Merge commit '14f7077fed7d82046bdcbe347004132f08aba886'

(cherry picked from commit 5ca8c28cd8c725b81781201cfdb5f9969396f934)
2025-03-25 13:21:40 -07:00
Slava Shwartsman
e39ee9b9ef libibverbs: Extend support of NDR rates
PR:             285305

(cherry picked from commit 5963423232e869b8dbe8e9a65134e92735dfb521)
2025-03-22 02:27:55 +02:00
Cy Schubert
4ac2d0f253 ntp: Replace the workaround from 98e34e8e2557 with a patch from upstream
98e34e8e2557 circumvented an upstream patch which caused an IPv6
pool regresson. This patch removes the circumvention and replaces
it with an upstream patch planned for the new release of ntp.

(cherry picked from commit bc02e655872021595c434850fbcbdb8dd11d4a46)
2025-03-19 21:26:46 -07:00
Cy Schubert
61e5e864ca ntp: Another patch to address IPv6 pool regression
98e34e8e2557 circumvented an upstream patch which caused an IPv6
pool regression. This patch, discussed in
https://bugs.ntp.org/show_bug.cgi?id=3958, addresses another
unworkable combination of link-local local address with
non-link-local server.

(cherry picked from commit c1767cf87cb64c25426fd7fe119be283b134509a)
2025-03-19 21:26:45 -07:00
Cy Schubert
a7aa1196d3 ntp: ntpd does not connect to NTP server with link local IPv6 address
Upstream bug 3943 (https://bugs.ntp.org/show_bug.cgi?id=3943) discusses:

Starting with 4.2.8p18 ntp does not synchronize or even connect to the
configured NTP server any more. ntp stays in .INIT. state indefinitely
and checking the network traffic shows that ntp does not attempt to
contact the NTP server.

This is regression introduced by the fix for upstream bug 3913. This
is a similar bug I reported upstream (ntp bug 3841).

(cherry picked from commit 381956e267569031883a516e10446c29490ee41d)
2025-03-19 21:26:45 -07:00
Igor Ostapenko
40a8746a77 kyua: Pass unprivileged user config prop to ATF using all known names
Kyua and ATF speak different naming styles. In this case, the
unprivileged user property can be named with underscore on the Kyua
side, and with a hyphen on the ATF side. Sometimes it is not obvious
which style should be used in which situation. For instance, a test case
may require this configuration property being set using require.config.
Also, a test case may want to read the property using something like
atf_tc_get_config_var(). Which names should be used in these cases?
From the perspective of the original code, it is expected to be this:
    require.config unprivileged-user
    atf_tc_get_config_var(tc, "unprivileged-user")

But, as long as Kyua is the main interface, its users expect to work
with kyua.conf(5), which says that it must be named as unprivileged_user
(with underscore). As a result, test authors tend to do this instead:
    require.config unprivileged_user
    atf_tc_get_config_var(tc, "unprivileged_user")

Kyua already has hacks to understand both unprivileged_user and
unprivileged-user coming from require.config. And this patch covers the
missing second part -- make Kyua pass both names back to ATF as two
identical configuration properties named different ways.

Reviewed by:	ngie, asomers
MFC after:	2 weeks
Differential Revision:	https://reviews.freebsd.org/D49039

(cherry picked from commit 51a8eb6410461c94c8e0f2b59e3417cfb5d7da75)
2025-03-16 10:46:22 +00:00
Igor Ostapenko
9383629ffc kyua: Support require.diskspace ATF metadata
Reviewed by:	ngie
MFC after:	1 month
Differential Revision:	https://reviews.freebsd.org/D48333

(cherry picked from commit 6befd3511105a17decdafbf9d3f55324c83aaea1)
2025-03-04 21:09:11 +00:00
Cy Schubert
859aa726fb ntp: NULL pointer deref when create_interface() fails
Fix NULL pointer dereference when create_interface() fails in
update_interfaces(). The upstream bug report says a typo was introduced
by https://bk.ntp.org/ntp-dev/ntpd/ntp_io.c?PAGE=diffs&REV=66175036PETA6g__fON8oNrjL54Ttw. ep should have been ep2.

Fix obtained from upstream bug report.

PR:		285065
Upstream bug:	https://bugs.ntp.org/show_bug.cgi?id=3939

(cherry picked from commit 628715fdcc9f2226bfe0f4ebe381aaa7761cb6cc)
2025-02-28 07:59:00 -08:00
Igor Ostapenko
db06c8fd7f kyuafile.5: ATF metadata mapping reference
Reviewed by:	ngie
MFC after:	1 month
Differential Revision:	https://reviews.freebsd.org/D48190

(cherry picked from commit 68206add1173920065092c06eea40c90bb73b5c5)
2025-02-27 21:43:35 +00:00
Dag-Erling Smørgrav
67cead936d unifdef: Fix collision check when adding symbols.
findsym() is intended for use while parsing input, so it should not be
called from addsym2() or indirectsym(), which are called before any
input is processed.

MFC after:	1 week
Sponsored by:	Klara, Inc.
Reviewed by:	kevans
Differential Revision:	https://reviews.freebsd.org/D48733

(cherry picked from commit c63af363c2458aebc30c01cd0b93b4b902580019)
2025-02-13 01:37:42 +01:00
Ed Maste
916ee8225f contrib: Remove now-unused cortex-strings
Replaced by arm-optimized-routines in commit 2e8ff4d1d5 ("Switch to
Arm Optimized Routines for mem* & str*").

Reviewed by:	andrew
Sponsored by:	The FreeBSD Foundation
Differential Revision: https://reviews.freebsd.org/D48500

(cherry picked from commit 4a7d6666c5ddd135b2023b4b3b4962770ff2e73b)
2025-02-11 16:30:59 -05:00
Bjoern A. Zeeb
8552e8de6d contrib/wpa: pass IFM_IEEE80211_VHT5G if vht_enabled on the channel
Set media mode correctly to IFM_IEEE80211_VHT5G if vht_enabled is set
on the channel.  Otherwise we'll end up setting 11NA.
Not a problem on first sight given net80211 does the upgrade to VHT
for us.  But we would not set iv_des_mode ("desired mode") on the vap.
Setting this will put a contraint on/help scanning for our desired
(VHT) channels to my understanding of the code.

Sponsored by:	The FreeBSD Foundation
Reviewed by:	cy, adrian
Differential Revision:	https://reviews.freebsd.org/D35978

(cherry picked from commit a0e45db6f6eb6660e78921bbd5307fa7fc13d0a9)
2025-02-10 14:52:12 +00:00
Ed Maste
5a7daf0199 blocklistd: Remove obsolete network class reference
This was a comment in a configuration example.

Reported by:	bapt
Reviewed by:	bapt, jlduran
Sponsored by:	The FreeBSD Foundation
Differential Revision: https://reviews.freebsd.org/D48810

(cherry picked from commit 513c4e20790a24526cb1c2f5a4725971a09d928a)
2025-02-07 10:56:56 -05:00
Warner Losh
2a777f2030 ota: Merge One True Awk 20250116 bsd-feature 2dce54b053d4
Jan 14, 2025
	Fix incorrect error line number issues. unput has
	no business managing lineno. Thanks to Ozan Yigit.

Jan 05, 2025
	Fix hex detection in is_valid_number.
	Fix indirect field specification with non-numeric string
	eg. $("foo") in indirect. This is not illegal.
	Thanks to Arnold Robbins.

Jan 01, 2025
	Fixed openfile to not try to read from a directory.
	Thanks to Arnold Robbins.

Sponsored by:		Netflix

(cherry picked from commit dd78d987cb38ef162d40aad86229f1dc19884f78)
2025-02-06 08:10:46 -07:00
Igor Ostapenko
b40ca26721 kyua: Support is_exclusive metadata coming from an ATF test case
On ATF side it is named "is.exclusive".

Reviewed by:	ngie, markj
MFC after:	1 month
Differential Revision:	https://reviews.freebsd.org/D47671

(cherry picked from commit 2ed24e28d1d95c62cc37ca3534d4d33360b4cef2)
2025-01-25 19:42:59 +00:00
Ed Maste
26336203d3 contrib/spleen: Update to Spleen 2.1.0
Merge commit 'e364562a4012d6d9cb334795b97e929cfa2a5dff'

(cherry picked from commit 18270a76e24e7f17f533a7a683eed3327a3c135a)
2025-01-24 14:57:10 -05:00
Minsoo Choo
880f1dee7e tcp_wrappers: Use default C standard version
Reviewed by:	emaste, arichardson, jhb
Differential Revision: https://reviews.freebsd.org/D43236

(cherry picked from commit 2cadbe468a8e8aef193429565b729d34ec48b266)
2025-01-24 14:50:38 -05:00
Joseph Koshy
2dd706b9c4 libelftc: Fix a typo - FreeBSD's riscv port is little-endian.
This change brings the descriptor for target "elf64-riscv-freebsd"
in line with its documentation.

I missed this somehow when reviewing https://reviews.freebsd.org/D20768.

Reported by: Haowu Ge (on elftoolchain-developers)
Reviewed by: emaste, imp
Differential Revision: https://reviews.freebsd.org/D48271

(cherry picked from commit aac74b708b3dc49466b0fb5365bc2923b7727a1c)
2025-01-24 14:48:56 -05:00
Gleb Smirnoff
c4cae8cbc3 libbsnmp: avoid division by zero with empty password
PR:		283909
(cherry picked from commit 4dc1820a16b9b6108e0ff8a0265c08c67fa34146)
2025-01-20 09:25:14 -05:00
Philip Paeps
a158d26e89 contrib/tzdata: import tzdata 2025a
Changes: https://github.com/eggert/tz/blob/2025a/NEWS

(cherry picked from commit 46226b0162ba03986b1de2c790804b37dd8e64d6)
2025-01-20 08:23:58 +08:00
Dimitry Andric
dc3f24ea8a Merge llvm-project release/19.x llvmorg-19.1.7-0-gcd708029e0b2
This updates llvm, clang, compiler-rt, libc++, libunwind, lld, lldb and
openmp to llvm-project release/19.x llvmorg-19.1.7-0-gcd708029e0b2,
a.k.a. 19.1.7 release.

PR:		280562
MFC after:	3 days

(cherry picked from commit 6c05f3a74f30934ee60919cc97e16ec69b542b06)
2025-01-19 12:05:53 +01:00
Baptiste Daroussin
88f55c3150 nvi: import version 2.2.1-52c07e8
(cherry picked from commit 4087ffdbce725367566bc3fc60a959292daac99d)
2025-01-15 10:55:01 +01:00
Eric A. Borisch
9110e31e1d
tcpdump/print-pflog: Print uid with host endianness
PR:		283799
Reported by:	Eric A. Borisch <eborisch@gmail.com>
Reviewed by:	jrm, kp
Fixes:		0a7e5f1f02aad2ff5fff1c60f44c6975fd07e1d9

(cherry picked from commit d72f87c0fd1418bdb814594ea8fc76a202f7d5c6)
2025-01-13 22:49:14 -04:00
Kyle Evans
ba667efb53 Add 'contrib/libder/' from commit '9c40c4de4c33b2ba1124fb752ebea0bebaa6013f'
git-subtree-dir: contrib/libder
git-subtree-mainline: d11904b350214943dedb64c7121d4602799d7afd
git-subtree-split: 9c40c4de4c33b2ba1124fb752ebea0bebaa6013f
(cherry picked from commit 35c0a8c449fd2b7f75029ebed5e10852240f0865)
2025-01-10 20:48:21 -06:00
Cy Schubert
a653e8317f ntp: Undo upstream (ntp.org) fix for upstream Bug 3851
The patch for upstream (ntp.org) fix for upstream Bug 3851 may have
fixed a Linux bug but it caused a regression when ntpd is run on
FreeBSD.

Suggested that so@ publish an errata and merge this to releng/14.2.

PR:		283116
(cherry picked from commit 98e34e8e255767e18dd8a6c348cff8bfc01b2662)
2024-12-27 09:59:03 -08:00
Xin LI
0bb4c188d3 MFC: MFV: less v668.
(cherry picked from commit c77c488926555ca344ae3a417544cf7a720e1de1)
2024-12-21 23:46:59 -08:00
Xin LI
78ab4c182b MFC: MFV: expat 2.6.4.
(cherry picked from commit 908f215e80fa482aa953c39afa6bb516f561fc00)
2024-12-21 23:45:34 -08:00
Enji Cooper
7fcc9d6095 MFC: MFV: expat 2.6.3
The 2.6.1 - 2.6.3 releases address several security issues with the
library.

The release notes for the 2.6.1-2.6.3 releases can be found at
https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes .

Differential Revision:	https://reviews.freebsd.org/D46829

Merge commit '8e1eae2319cd3a651941c88b46d95e8ee8507c6c'

(cherry picked from commit ffd294a1f4c23863c3e515d16dce31d5509bcb01)
2024-12-21 23:42:50 -08:00
Xin LI
71c92e6b94 MFC: MFV: file 5.46.
(cherry picked from commit ae316d1d1cffd71ab7751f94e10118777a88e027)
2024-12-21 23:37:20 -08:00
Xin LI
edf0691b19 MFC: MFV: xz 5.6.3
(cherry picked from commit 26743408e9ff53ac0e041407c359ed3c17c15596)
2024-12-21 23:32:54 -08:00
Xin LI
679e924056 MFC: MFV: xz 5.6.2.
(cherry picked from commit 3b35e7ee8de9b0260149a2b77e87a2b9c7a36244)
2024-12-21 23:32:38 -08:00
Zhihao Yuan
c71b427bfa nvi: Replace Clang-only __builtin_is_aligned with C code (#124)
We should use alignof in the future.

Obtained from: 25c4d7db4e

(cherry picked from commit 06a98fefd3d3ff42b7e7832af6c0736b98f167ac)
2024-12-13 21:05:24 +00:00