commit b6553cdb36c1bd7071d3bf0493216c5483325716
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Wed Jul 3 10:28:10 2013 +1000

    libXi 1.7.2
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit d804af99e2dfaf20b99822066a37d586f12c8a5f
Author: Thomas Klausner <wiz@NetBSD.org>
Date:   Thu Jun 27 17:16:38 2013 +0200

    Remove check that can never be true.
    
    clang warns:
    warning: comparison of constant 268435455 with expression of type
    'CARD16' (aka 'unsigned short') is always false
    
    Signed-off-by: Thomas Klausner <wiz@NetBSD.org>
    Reviewed-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 957a9d64afd76f878ce6c5570f369e2a7fc1e772
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Thu Jun 27 08:47:16 2013 +1000

    libXi 1.7.1.901
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 62033a9c83bcdc75b9f1452ce24729eefa8f4dc0
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Thu Jun 27 06:25:02 2013 +1000

    Include limits.h to prevent build error: missing INT_MAX
    
    Introduced in 4c8e9bcab459ea5f870d3e56eff15f931807f9b7.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 0f3f5a36d5fc6dc53f69f48a0c83aef6a1fcf381
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Tue May 28 15:52:34 2013 +1000

    If the XGetDeviceDontPropagateList reply has an invalid length, return 0
    
    If we skip over the reply data, return 0 as number of event classes.
    
    Follow-up to 6dd6dc51a2935c72774be81e5cc2ba2c30e9feff.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 35ae16dc2f16b24a22625b2d9f76a2128b673a6c
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Tue May 28 15:52:33 2013 +1000

    Change size += to size = in XGetDeviceControl
    
    size += blah is technically correct but it implies that we're looping or
    otherwise incrementing the size. Which we don't, it's only ever set once.
    
    Change this to avoid reviewer confusion.
    
    Reported-by: Dave "color-me-confused" Airlie <airlied@redhat.com>
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 4c8e9bcab459ea5f870d3e56eff15f931807f9b7
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Tue May 28 15:52:32 2013 +1000

    Fix potential corruption in mask_len handling
    
    First: check for allocation failure on the mask.
    XI2 requires that the mask is zeroed, so we can't just Data() the mask
    provided by the client (it will pad) - we need a tmp buffer. Make sure that
    doesn't fail.
    
    Second:
    req->mask_len is a uint16_t, so check against malicious mask_lens that would
    cause us to corrupt memory on copy, as the code always allocates
    req->mask_len * 4, but copies mask->mask_len bytes.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 661c45ca17c434dbd342a46fd3fb813852ae0ca9
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Tue May 21 12:23:05 2013 +1000

    Don't overwrite the cookies serial number
    
    serial != sequenceNumber, see _XSetLastRequestRead()
    
    cookie->serial is already set at this point, setting it again directly from
    the sequenceNumber of the event causes a bunch of weird issues such as
    scrollbars and text drag-n-drop breaking.
    
    https://bugzilla.redhat.com/show_bug.cgi?id=965347
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 81b4df8ac6aa1520c41c3526961014a6f115cc46
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sun Mar 10 00:16:22 2013 -0800

    sign extension issue in XListInputDevices() [CVE-2013-1995]
    
    nptr is (signed) char, which can be negative, and will sign extend
    when added to the int size, which means size can be subtracted from,
    leading to allocating too small a buffer to hold the data being copied
    from the X server's reply.
    
    v2: check that string size fits inside the data read from the server,
        so that we don't read out of bounds either
    
    Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>

commit ef82512288d8ca36ac0beeb289f158195b0a8cae
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sun Mar 10 00:22:14 2013 -0800

    Avoid integer overflow in XListInputDevices() [CVE-2013-1984 8/8]
    
    If the length of the reply as reported by the Xserver is too long, it
    could overflow the calculation for the size of the buffer to copy the
    reply into, causing memory corruption.
    
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 17071c1c608247800b2ca03a35b1fcc9c4cabe6c
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sun Mar 10 13:30:55 2013 -0700

    Avoid integer overflow in XGetDeviceProperties() [CVE-2013-1984 7/8]
    
    If the number of items as reported by the Xserver is too large, it
    could overflow the calculation for the size of the buffer to copy the
    reply into, causing memory corruption.
    
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 528419b9ef437e7eeafb41bf45e8ff7d818bd845
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sat Mar 9 22:55:23 2013 -0800

    integer overflow in XIGetSelectedEvents() [CVE-2013-1984 6/8]
    
    If the number of events or masks reported by the server is large enough
    that it overflows when multiplied by the size of the appropriate struct,
    or the sizes overflow as they are totaled up, then memory corruption can
    occur when more bytes are copied from the X server reply than the size
    of the buffer we allocated to hold them.
    
    v2: check that reply size fits inside the data read from the server,
        so that we don't read out of bounds either
    
    Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 242f92b490a695fbab244af5bad11b71f897c732
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sat Mar 9 22:55:23 2013 -0800

    integer overflow in XIGetProperty() [CVE-2013-1984 5/8]
    
    If the number of items reported by the server is large enough that
    it overflows when multiplied by the size of the appropriate item type,
    then memory corruption can occur when more bytes are copied from the
    X server reply than the size of the buffer we allocated to hold them.
    
    Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>

commit bb922ed4253b35590f0369f32a917ff89ade0830
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sat Mar 9 22:55:23 2013 -0800

    integer overflow in XGetDeviceMotionEvents() [CVE-2013-1984 4/8]
    
    If the number of events or axes reported by the server is large enough
    that it overflows when multiplied by the size of the appropriate struct,
    then memory corruption can occur when more bytes are copied from the
    X server reply than the size of the buffer we allocated to hold them.
    
    Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 6dd6dc51a2935c72774be81e5cc2ba2c30e9feff
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sat Mar 9 22:55:23 2013 -0800

    integer overflow in XGetDeviceDontPropagateList() [CVE-2013-1984 3/8]
    
    If the number of event classes reported by the server is large enough
    that it overflows when multiplied by the size of the appropriate struct,
    then memory corruption can occur when more bytes are copied from the
    X server reply than the size of the buffer we allocated to hold them.
    
    V2: EatData if count is 0 but length is > 0 to avoid XIOErrors
    
    Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 322ee3576789380222d4403366e4fd12fb24cb6a
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sat Mar 9 22:55:23 2013 -0800

    integer overflow in XGetFeedbackControl() [CVE-2013-1984 2/8]
    
    If the number of feedbacks reported by the server is large enough that
    it overflows when multiplied by the size of the appropriate struct, or
    if the total size of all the feedback structures overflows when added
    together, then memory corruption can occur when more bytes are copied from
    the X server reply than the size of the buffer we allocated to hold them.
    
    v2: check that reply size fits inside the data read from the server, so
        we don't read out of bounds either
    
    Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>

commit b0b13c12a8079a5a0e7f43b2b8983699057b2cec
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sat Mar 9 22:55:23 2013 -0800

    integer overflow in XGetDeviceControl() [CVE-2013-1984 1/8]
    
    If the number of valuators reported by the server is large enough that
    it overflows when multiplied by the size of the appropriate struct, then
    memory corruption can occur when more bytes are copied from the X server
    reply than the size of the buffer we allocated to hold them.
    
    v2: check that reply size fits inside the data read from the server, so
    we don't read out of bounds either
    
    Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 5398ac0797f7516f2c9b8f2869a6c6d071437352
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Fri Apr 26 22:48:36 2013 -0700

    unvalidated lengths in XQueryDeviceState() [CVE-2013-1998 3/3]
    
    If the lengths given for each class state in the reply add up to more
    than the rep.length, we could read past the end of the buffer allocated
    to hold the data read from the server.
    
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 91434737f592e8f5cc1762383882a582b55fc03a
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sat Mar 9 23:37:23 2013 -0800

    memory corruption in _XIPassiveGrabDevice() [CVE-2013-1998 2/3]
    
    If the server returned more modifiers than the caller asked for,
    we'd just keep copying past the end of the array provided by the
    caller, writing over who-knows-what happened to be there.
    
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>

commit f3e08e4fbe40016484ba795feecf1a742170ffc1
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sat Mar 9 22:26:52 2013 -0800

    Stack buffer overflow in XGetDeviceButtonMapping() [CVE-2013-1998 1/3]
    
    We copy the entire reply sent by the server into the fixed size
    mapping[] array on the stack, even if the server says it's a larger
    size than the mapping array can hold.  HULK SMASH STACK!
    
    Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 59b8e1388a687f871831ac5a9e0ac11de75e2516
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Wed May 1 23:58:39 2013 -0700

    Use _XEatDataWords to avoid overflow of rep.length bit shifting
    
    rep.length is a CARD32, so rep.length << 2 could overflow in 32-bit builds
    
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 5d43d4914dcabb6de69859567061e99300e56ef4
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Fri May 17 09:07:44 2013 +1000

    Copy the sequence number into the target event too (#64687)
    
    X.Org Bug 64687 <http://bugs.freedesktop.org/show_bug.cgi?id=64687>
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Jasper St. Pierre <jstpierre@mecheye.net>

commit bb82c72a1d69eaf60b7586570faf797df967f661
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Mon Apr 29 18:39:34 2013 -0700

    Expand comment on the memory vs. reply ordering in XIGetSelectedEvents()
    
    Unpacking from the wire involves un-interleaving the structs & masks,
    which wasn't obvious to me the first time I read it, so make notes
    before I forget again.
    
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 26cb4573cbb8808ce9d5c75c16bd613b2f03a368
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Fri Apr 5 09:34:48 2013 +1000

    libXi 1.7.1
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 0358bb20384b759d6d41dc44f3aed30583689d53
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Tue Mar 26 14:46:06 2013 +1000

    Require XFixes for PointerBarrier, remove duplicate typedef
    
    The PointerBarrier typedef is duplicate if a client includes both Xfixes.h
    and XInput2.h.
    
    gcc 4.6 won't complain about that, but earlier versions do:
    http://gcc.gnu.org/git/?p=gcc.git;a=commitdiff;h=ce3765bf44e49ef0568a1ad4a0b7f807591d6412
    
    gcc 4.6 with -pedantic-errors shows:
    /opt/xorg/include/X11/extensions/XInput2.h:172:13: error: redefinition of
    typedef ‘PointerBarrier’ [-pedantic]
    In file included from test.c:1:0:
    /opt/xorg/include/X11/extensions/Xfixes.h:255:13: note: previous declaration
    of ‘PointerBarrier’ was here
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Julien Cristau <jcristau@debian.org>

commit 081e06492c0ffd003d4a0c34418c882332e58ac3
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Thu Mar 7 11:16:02 2013 +1000

    libXi 1.7
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 9b26b81477cf3486e5aa0ef8d81af68a0f04df1b
Author: Colin Walters <walters@verbum.org>
Date:   Wed Jan 4 17:37:06 2012 -0500

    autogen.sh: Implement GNOME Build API
    
    http://people.gnome.org/~walters/docs/build-api.txt
    
    Signed-off-by: Adam Jackson <ajax@redhat.com>

commit fb67e7c99b8e95fa667b90837d312a98fa0a8a64
Author: Adam Jackson <ajax@redhat.com>
Date:   Tue Jan 15 14:28:48 2013 -0500

    configure: Remove AM_MAINTAINER_MODE
    
    Signed-off-by: Adam Jackson <ajax@redhat.com>

commit 236be512c81b76dad711bec481e2139584006c4c
Author: Benjamin Tissoires <benjamin.tissoires@gmail.com>
Date:   Mon Jan 14 18:32:05 2013 +0100

    Add missing XI_RawTouch* in XInputCopyCookie
    
    Looks like XI_RawTouch* events are missing in the big switch in this function.
    When running XIT tests for multitouch devices, several following errors appears:
    XInputCopyCookie: Failed to copy evtype 22
    XInputCopyCookie: Failed to copy evtype 23
    XInputCopyCookie: Failed to copy evtype 24
    
    Signed-off-by: Benjamin Tissoires <benjamin.tissoires@gmail.com>
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit db3b9ba3404f6d128e7826aa489a34fd206b20ea
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Wed Dec 26 15:29:43 2012 +1000

    libXi 1.6.99.1
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit af9f26510d87eee71f1cd688d7dcfbf173c13943
Merge: 31c6cf9 9e8a55d
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Mon Dec 17 14:34:53 2012 +1000

    Merge branch 'barriers'

commit 9e8a55dfcb3dc2b42cd7e08e8e6e65ea1dd54251
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Fri Dec 7 15:47:41 2012 +1000

    man: add man-page for XIBarrierReleasePointer
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 60d7386a1b98cc7760d55d6df1f90e6259d122fa
Author: Jasper St. Pierre <jstpierre@mecheye.net>
Date:   Thu Nov 1 17:00:19 2012 -0400

    Add support for pointer barrier events
    
    Signed-off-by: Jasper St. Pierre <jstpierre@mecheye.net>
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit f694bd3fcf38213ae787a3ebe4e8b2df8b2dcdc7
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Fri Dec 7 14:39:50 2012 +1000

    Bump to 1.6.99
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 31c6cf9f6fbcc7e90e3d6b7927664cbe54e27edf
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Thu Dec 6 10:38:16 2012 +1000

    Fix const compiler warnings
    
    XExtInt.c:80:38: warning: initialization discards 'const' qualifier from
    pointer target type [enabled by default]
    XExtInt.c:150:5: warning: initialization discards 'const' qualifier from
    pointer target type [enabled by default]
    XExtInt.c:151:5: warning: initialization discards 'const' qualifier from
    pointer target type [enabled by default]
    XExtInt.c:152:5: warning: initialization discards 'const' qualifier from
    pointer target type [enabled by default]
    XExtInt.c:153:5: warning: initialization discards 'const' qualifier from
    pointer target type [enabled by default]
    XExtInt.c:154:5: warning: initialization discards 'const' qualifier from
    pointer target type [enabled by default]
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Dan Nicholson <dbn.lists@gmail.com>

commit b4e07e7acc84f68ed2d37557d64d5655cc262ed5
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Thu Dec 6 10:27:35 2012 +1000

    Fix compiler warnings
    
    XIQueryVersion.c: In function '_xiQueryVersion':
    XIQueryVersion.c:63:26: warning: declaration of 'info' shadows a parameter
    [-Wshadow]
    XIQueryVersion.c:53:73: warning: shadowed declaration is here [-Wshadow]
    
    XExtInt.c: In function 'XInputWireToEvent':
    XExtInt.c:823:25: warning: declaration of 'i' shadows a previous local
    [-Wshadow]
    XExtInt.c:502:18: warning: shadowed declaration is here [-Wshadow]
    XExtInt.c:850:25: warning: declaration of 'i' shadows a previous local
    [-Wshadow]
    XExtInt.c:502:18: warning: shadowed declaration is here [-Wshadow]
    
    In file included from XExtInt.c:64:0:
    ../include/X11/extensions/XInput.h:166:17: note: previous declaration of
    '_xidevicebusy' was here
    XExtInt.c:101:12: warning: redundant redeclaration of
    '_XiGetDevicePresenceNotifyEvent' [-Wredundant-decls]
    
    XExtInt.c:76:13: warning: redundant redeclaration of '_xibaddevice'
    [-Wredundant-decls]
    In file included from XExtInt.c:64:0:
    ../include/X11/extensions/XInput.h:162:17: note: previous declaration of
    '_xibaddevice' was here
    XExtInt.c:81:13: warning: redundant redeclaration of '_xibadclass'
    [-Wredundant-decls]
    In file included from XExtInt.c:64:0:
    ../include/X11/extensions/XInput.h:163:17: note: previous declaration of
    '_xibadclass' was here
    XExtInt.c:86:13: warning: redundant redeclaration of '_xibadevent'
    [-Wredundant-decls]
    In file included from XExtInt.c:64:0:
    ../include/X11/extensions/XInput.h:164:17: note: previous declaration of
    '_xibadevent' was here
    XExtInt.c:91:13: warning: redundant redeclaration of '_xibadmode'
    [-Wredundant-decls]
    In file included from XExtInt.c:64:0:
    ../include/X11/extensions/XInput.h:165:17: note: previous declaration of
    '_xibadmode' was here
    XExtInt.c:96:13: warning: redundant redeclaration of '_xidevicebusy'
    [-Wredundant-decls]
    In file included from XExtInt.c:64:0:
    ../include/X11/extensions/XInput.h:166:17: note: previous declaration of
    '_xidevicebusy' was here
    
    XListDev.c: In function 'ParseClassInfo':
    XListDev.c:116:33: warning: declaration of 'k' shadows a previous local
    [-Wshadow]
    XListDev.c:109:12: warning: shadowed declaration is here [-Wshadow]
    
    XGetFCtl.c: In function 'XGetFeedbackControl':
    XGetFCtl.c:184:26: warning: declaration of 'i' shadows a previous local
    [-Wshadow]
    XGetFCtl.c:72:17: warning: shadowed declaration is here [-Wshadow]
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Dan Nicholson <dbn.lists@gmail.com>

commit 845550471fcd95d77e8d738ab8798d8e6e568b4a
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Wed Nov 7 08:51:23 2012 +1000

    man: add generation of missing man pages for XIGrabTouchBegin
    
    The man page itself already contained the description, but it was missing
    from NAME so the shadow man pages were not generated.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Chase Douglas <chase.douglas@ubuntu.com>

commit 8c0eb1b6b4017b1e886981dc32cea90f2d4b9b64
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Thu Oct 11 13:33:45 2012 +1000

    man: fix formatting issues in XGetDeviceControl(3)
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit ae163b6202d844a46541928d00049b29cbdf930f
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Thu May 3 16:01:35 2012 +1000

    libXi 1.6.1
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit fd5e000308925f703ecd15c288127ab33a456425
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Mon Apr 23 13:32:59 2012 +1000

    man: update XIQueryVersion for current server behaviour
    
    XIQueryVersion(v1);
    XIQueryVersion(v2);
    
    is now ok as long as v1 <= v2.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Jeremy Huddleston <jeremyhu@apple.com>

commit f8f44f42eb543ecd944a84facba6c09bf48e7711
Author: Chase Douglas <chase.douglas@canonical.com>
Date:   Fri Apr 20 15:30:30 2012 -0700

    Destroy extension record after last display is removed
    
    The extension record is currently leaked and never freed.
    
    Signed-off-by: Chase Douglas <chase.douglas@canonical.com>
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 2ac185d2fd2b884f4f59a7f7f61f414d139859aa
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Mon Mar 26 09:07:34 2012 +1000

    Set the RawEvent sourceid (#34240)
    
    XI 2.2 and later include the sourceid in raw events.
    
    X.Org Bug 34240 <http://bugs.freedesktop.org/show_bug.cgi?id=34240>
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Chase Douglas <chase.douglas@canonical.com>

commit dfc101e4c6cdac4ff9a51732b2754287fbdc8582
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Mon Mar 26 09:05:24 2012 +1000

    Move version comparison into a helper function.
    
    No functional changes, this simply introduces a version helper function that
    returns -1, 0 or 1 depending on the version comparison result. To be used
    internally only.
    
    Needed for fix to #34240
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Chase Douglas <chase.douglas@canonical.com>

commit 8436c920953f288aea2d6d5f370f8eaaaef82d97
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Thu Mar 15 11:51:41 2012 +1000

    Fix wrong button label and mask copy on OS X
    
    Regression introduced in c1a5a70b51f12dedf354102217c7cd4247ed3a4b.
    
    If double-padding is applied, the length of the mask on the wire may be
    smaller than libXi's mask_len. When copying, only the wire length must be
    copied, with the remainder set to 0.
    When advancing to the button labels, the wire length matters, not libXi's
    internal length.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Jeremy Huddleston <jeremyhu@apple.com>
    Tested-by: Jeremy Huddleston <jeremyhu@apple.com>

commit 70b730b0548ca9e408f14f2576b972beb32a0ad0
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Thu Mar 8 16:03:50 2012 +1000

    libXi 1.6.0
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 1b9f0394c3d4d3833f8560ae8170a4d5842419ab
Author: Chase Douglas <chase.douglas@canonical.com>
Date:   Wed Mar 7 14:52:54 2012 -0800

    Fix XIScrollClass increment value on 32-bit machines
    
    This fixes scroll class increment values on 32-bit machines. Performing
    1UL << 32 shifts the bit off the end of a 32-bit unsigned long value. By
    expanding to 1ULL, we have the full 64-bits of an unsigned long long
    including on 32-bit machines.
    
    Before this change, xinput list --long would output scroll increment
    values of -nan.
    
    Signed-off-by: Chase Douglas <chase.douglas@canonical.com>
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit c1a5a70b51f12dedf354102217c7cd4247ed3a4b
Author: Michał Masłowski <mtjm@mtjm.eu>
Date:   Tue Feb 21 20:54:40 2012 +0100

    Fix bus error on MIPS N32 for bug #38331.
    
    XIValuatorClassInfo and XIScrollClassInfo might have an address
    of 4 bytes modulo 8, while they contain doubles which need 8 byte
    alignment.  This is fixed by adding extra padding after each structure
    or array in sizeDeviceClassType and adding helper functions to
    determine sizes and padding only in one place.
    
    Fixes: https://bugs.freedesktop.org/show_bug.cgi?id=38331
    Signed-off-by: Michał Masłowski <mtjm@mtjm.eu>
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 34964b05c16161de65709d60799b9ad97ce56296
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Fri Jan 27 15:35:44 2012 +1000

    libXi 1.5.99.3
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit b355b7300235395717de06809ee6631ce55d3189
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Fri Jan 27 13:28:52 2012 +1000

    Handle new XIAllowEvent request size
    
    inputproto 2.1.99.6 restored the previous request for ABI compatibility
    reasons, and it introduced a new XI 2.2 specific define.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Keith Packard <keithp@keithp.com>

commit 07ced7b48219e3bc0c98806f3d7106f86d1b2ca0
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Tue Jan 17 21:26:14 2012 +0100

    Force class alignment to a multiple of sizeof(XID).
    
    Calculate length field to a multiples of sizeof(XID). XIDs are typedefs
    to ulong and thus may be 8 bytes on some platforms. This can trigger a
    SIGBUS if a class ends up not being 8-aligned (e.g. after XAxisInfo).
    
    Reported-by: Nicolai Stange <nicolai.stange@zmaw.de>
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Signed-off-by: Matthieu Herrb <matthieu.herrb@laas.fr>

commit 15feb92b30e13e7439a3434bea9f454645b97444
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Thu Jan 5 13:55:41 2012 +1000

    man: fix typo Mappiing → Mapping
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 8576ae6b9ee974829e2fb8a834087652a6e9e1a2
Author: Cyril Brulebois <kibi@debian.org>
Date:   Thu Dec 22 15:50:47 2011 +0100

    configure.ac: Fix a typo in comments.
    
    Signed-off-by: Cyril Brulebois <kibi@debian.org>
    Reviewed-by: Chase Douglas <chase.douglas@canonical.com>
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit ae0187c8708d2378373889827117911086581fdd
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Thu Dec 22 09:42:43 2011 +1000

    libXi 1.5.99.2
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 47f3d887a7731f4ab68a69ed31dbe7acf6d13270
Merge: 82a6312 e73e2fe
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Wed Dec 21 15:40:37 2011 +1000

    Merge branch 'multitouch'
    
    Conflicts:
    	configure.ac

commit 82a631263ef4e6f46c1f33748089db8bf603b095
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Wed Dec 21 15:33:17 2011 +1000

    libXi 1.5.0
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit e73e2fe95dab3e0048b24d16327adbe54326ff3f
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Wed Sep 14 22:33:57 2011 -0700

    Implement support for XI 2.2
    
    Adds support for the new TouchClass for multitouch-capable servers/devices.
    
    New events:
      XITouchOwnershipEvent
    
    New event types handled:
      XITouchBegin, XITouchUpdate, XITouchEnd
      XIRawTouchBegin, XIRawTouchUpdate, XIRawTouchEnd
    
    New functions:
      XIGrabTouchBegin ... passive grabs on touches
      XIUngrabTouchBegin
      XIAllowTouchEvents ... Allow/reject touch event sequences
    
    New XIQueryDevice classes:
      XITouchClassInfo
    
    Requires libX11 1.5 for GetReqSized
    
    Co-authored by: Chase Douglas <chase.douglas@canonical.com>
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 7888d14a499062a1c3b333f31f1330cecf1e97c1
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Tue Oct 25 13:30:47 2011 +1000

    Bump to 1.5.99.1
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit fa6505f0a86b296e8f12f0fb8f472ef17b501fdb
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Mon Dec 19 09:36:34 2011 +1000

    man: minor formatting fix in XIGrabButton

commit 49408e39e4b084fe362e9ee197bfa0aa1c55384d
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Fri Nov 11 15:32:21 2011 +1000

    Include config.h from source files
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Gaetan Nadon <memsize@videotron.ca>
    Reviewed-by: Jeremy Huddleston <jeremyhu@apple.com>

commit ba83a1e58592e41f207524f106ba26dd71fe4171
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Wed Oct 26 08:55:35 2011 +1000

    Stop unnecessary calls to size_classes
    
    Xmalloc is a macro evaluating its argument twice.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Jeremy Huddleston <jeremyhu@apple.com>

commit 6d6ae8fc8b9620bf864ac7dff8d818573eee3e4f
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Wed Oct 26 08:54:53 2011 +1000

    Fix duplicate sizeof in copy_classes
    
    sizeof(bla * sizeof()) is'nt right.
    
    Plus add some () to the next_block call too to emphasise that *nclasses is
    the multiplicator.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Jeremy Huddleston <jeremyhu@apple.com>

commit 323730f7fa70190d2ea00e62c6964fee524ca430
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Thu Oct 27 10:27:49 2011 +1000

    man: passive grabs return the number of failed modifier combinations
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 5189df57e18c79327848fb117a8ede59868c8fdb
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Fri Oct 21 08:49:31 2011 +1000

    man: XIGrabButton returns error codes, not status codes
    
    Reword slightly that the returned value is the error code for this
    particular grab.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 05aaf65b3b6b7dc7268137ce4ee516f08eefb62f
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Fri Oct 21 08:07:45 2011 +1000

    man: fix #include for XIGrabButton
    
    Reported-by: Matthias Clasen <mclasen@redhat.com>
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit c25debae73be50b9a77454ed4d72ffeaab726846
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Mon Oct 10 10:24:38 2011 +1000

    Bump to 1.4.99.1
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 7ca05f3094958c04e8f78a786061124c58f8e1f3
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Wed Sep 28 11:16:42 2011 +1000

    Remove superfluous assignment of lib->classes in XIQueryDevices.
    
    A few lines south from here we malloc lib->classes, this assignment is a
    leftover from 225071e2e67fb65a0258397212f9826c9b25e078.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Chase Douglas <chase.douglas@canonical.com>

commit e97c3dd00369b47af067e30e910335b199a2f147
Author: Matt Dew <marcoz@osource.org>
Date:   Mon Oct 3 22:05:51 2011 -0600

        1 - fix the capitalization of the ID attriutes to match either the
            <title> or <funcdef> string it goes with.
        2 - fix any <linkend>'s that were affected by 1.
        3 - any <function> in the docs that has an actual funcdef,
            will become an olink.
    
        Signed-off-by: Matt Dew <marcoz@osource.org>

commit 5f9df47340e192d095127e3c7da180b0fb3dc286
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Fri Sep 23 09:04:21 2011 +1000

    Use a separate nclasses variable in XIQueryDevice
    
    No functional changes, just clarifying the code. If we skip over unknown
    classes, lib->num_classes != wire->num_classe. Use a separate variable to
    make that change more explicit and align the code closer with
    wireToDeviceChangedEvent.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Daniel Stone <daniel@fooishbar.org>

commit 2eb34db82dbd8429594c7ce1d361cabf3571edf1
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Fri Sep 16 21:00:19 2011 -0700

    Make shadow man pages generated by asciidoc work with Solaris man
    
    Solaris man requires .so entries in man pages include the man section
    directory, not just the man page filename, even when it's in the same
    directory, so use sed to add it in.
    
    Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    
    This may be a temporary fix only. See
    http://lists.freedesktop.org/archives/xorg-devel/2011-September/025219.html
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit a43c0a5d2a6cf80df314c96e0b58804dd87868be
Author: Gaetan Nadon <memsize@videotron.ca>
Date:   Tue Sep 20 15:11:13 2011 -0400

    specs: refactor and complete copyright legal text
    
    Signed-off-by: Gaetan Nadon <memsize@videotron.ca>

commit 552f60789263ad2a1d983cf5b479af63d90f7591
Author: Jeremy Huddleston <jeremyhu@apple.com>
Date:   Sun Sep 18 00:53:56 2011 -0700

    Use AM_CPPFLAGS to use in tree headers before installed headers
    
    This addresses a build failure found by the tinderbox.
    
    Signed-off-by: Jeremy Huddleston <jeremyhu@apple.com>
    Reviewed-by: Gaetan Nadon <memsize@videotron.ca>

commit 69f2580fd47cfe24105892e9ffb79cd046954b7d
Merge: fc5d478 3ed1b46
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Sat Sep 17 06:41:30 2011 +1000

    Merge branch 'smooth-scrolling'
    
    Conflicts:
    	src/XExtInt.c

commit 3ed1b463205295a5ebba7d570a4cb8dfade51a38
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Wed Aug 17 14:50:39 2011 +1000

    Support XI 2.1 XIScrollClass
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 00382417331d0b38373796fd31757be9fd3e9971
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Thu Jun 2 13:23:32 2011 +1000

    Support XI 2.1 internally
    
    Add the required constants to pretend to support XI 2.1.
    Having named constants for 2.1 seems a bit pointless, so let's just use the
    numbers directly.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Jeremy Huddleston <jeremyhu@apple.com>

commit fc5d47895c1361763aa7f088b6d8cb3859e3fda8
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Sat Sep 17 06:40:01 2011 +1000

    Require inputproto 2.0.99.1 or later
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 4dcbad7e10289317edc22113c1f451d79df221e1
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Fri Jun 3 15:46:47 2011 +1000

    man: update property and grab man pages for new constants
    
    Suggest the use of the new XIGrabModeAsync, etc. defines instead of the core
    defines. Add a BUGS section to each man page explaining
    backwards-compatibility.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>
    Reviewed-by: Daniel Stone <daniel@fooishbar.org>

commit 14f674296bc23b3cd50f6d302c3064250132c2c1
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Mon Aug 22 13:55:56 2011 +1000

    man: fix typo in XIQueryDevice man page
    
    struct name is XIValuatorClassInfo.
    
    Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net>

commit 91f928a70246c26cbee00bf59a8e318e9317142e
Author: Peter Hutterer <peter.hutterer@who-t.net>
Date:   Wed Aug 17 15:20:48 2011 +1000

    Handle unknown device classes.
    
    If the server sends an unknown device class in response to an XIQueryDevice
    call, no memory is allocated for these classes but we still write type
    and sourceid as well as setting to->classes[i]. The latter causes multiple
    classes to point to the same memory field.
    
    Move the common code of assigning these three into the respective class type
    handlers so to automatically skip any unknown classes.
    
[--snip--]
