summaryrefslogtreecommitdiff
path: root/debian/patches
diff options
context:
space:
mode:
authorJustus Winter <4winter@informatik.uni-hamburg.de>2014-12-01 13:01:24 +0100
committerJustus Winter <4winter@informatik.uni-hamburg.de>2014-12-01 13:01:24 +0100
commitc749f9162783ee2dc12b0b2de9be98ece9e467e7 (patch)
treed88af0e4ae835e82a0f626c5ed29cba8dd2e73e5 /debian/patches
parentaa48e2cf4a80af7d26239a2e76e4214f211b9bb8 (diff)
add patch series
Diffstat (limited to 'debian/patches')
-rw-r--r--debian/patches/0001-libshouldbeinlibc-move-the-reference-counting-primit.patch733
-rw-r--r--debian/patches/0002-libports-add-ports_lookup_payload-and-ports_payload_.patch137
-rw-r--r--debian/patches/0003-libports-add-a-payload-aware-intrans-function.patch54
-rw-r--r--debian/patches/0004-libdiskfs-add-payload-aware-intrans-functions.patch109
-rw-r--r--debian/patches/0005-libnetfs-add-a-payload-aware-intrans-function.patch52
-rw-r--r--debian/patches/0006-libtrivfs-add-payload-aware-intrans-functions.patch113
-rw-r--r--debian/patches/0007-libpager-add-a-payload-aware-intrans-function.patch51
-rw-r--r--debian/patches/0008-libcons-add-a-payload-aware-intrans-function.patch44
-rw-r--r--debian/patches/0009-auth-add-a-payload-aware-intrans-function.patch43
-rw-r--r--debian/patches/0010-console-add-a-payload-aware-intrans-function.patch52
-rw-r--r--debian/patches/0011-console-client-make-the-demuxer-payload-aware.patch36
-rw-r--r--debian/patches/0012-exec-add-payload-aware-intrans-functions.patch53
-rw-r--r--debian/patches/0013-pfinet-add-payload-aware-intrans-functions.patch73
-rw-r--r--debian/patches/0014-pfinet-make-the-demuxers-payload-aware.patch74
-rw-r--r--debian/patches/0015-pflocal-add-payload-aware-intrans-functions.patch67
-rw-r--r--debian/patches/0016-proc-add-payload-aware-intrans-functions.patch88
-rw-r--r--debian/patches/0017-startup-disable-default-payload-to-port-mapping.patch32
-rw-r--r--debian/patches/0018-term-add-a-payload-aware-intrans-function.patch61
-rw-r--r--debian/patches/0019-trans-fakeroot-make-the-demuxer-payload-aware.patch48
-rw-r--r--debian/patches/0020-trans-ifsock-add-a-payload-aware-intrans-function.patch25
-rw-r--r--debian/patches/0021-trans-password-add-a-payload-aware-intrans-function.patch26
-rw-r--r--debian/patches/0022-trans-streamio-make-the-translator-payload-aware.patch27
-rw-r--r--debian/patches/0023-trans-symlink-disable-default-payload-to-port-mappin.patch34
-rw-r--r--debian/patches/0024-utils-rpctrace-make-trace_and_forward-payload-aware.patch65
-rw-r--r--debian/patches/0025-hurd-add-intranpayload-functions-to-all-hurd-types.patch280
-rw-r--r--debian/patches/0026-libports-use-protected-payloads-to-optimize-the-obje.patch364
-rw-r--r--debian/patches/0027-libports-Fix-build.patch25
-rw-r--r--debian/patches/0028-mach-defpager-fix-build.patch25
-rw-r--r--debian/patches/series28
29 files changed, 2819 insertions, 0 deletions
diff --git a/debian/patches/0001-libshouldbeinlibc-move-the-reference-counting-primit.patch b/debian/patches/0001-libshouldbeinlibc-move-the-reference-counting-primit.patch
new file mode 100644
index 00000000..da210e9b
--- /dev/null
+++ b/debian/patches/0001-libshouldbeinlibc-move-the-reference-counting-primit.patch
@@ -0,0 +1,733 @@
+From 0d3b80f04a1caee51b9995c9626838f85295bb06 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Sun, 23 Nov 2014 19:09:51 +0100
+Subject: [PATCH hurd 01/28] libshouldbeinlibc: move the reference counting
+ primitives here
+
+Declare all functions `extern inline' instead of `static inline'.
+This allows us to use them in functions declared as `extern inline'.
+
+* libshouldbeinlibc/refcount.h: Move here, and declare all functions
+`extern inline'.
+* libshouldbeinlibc/refcount.c: And define the functions here.
+* libshouldbeinlibc/Makefile: Add `refcount.{c,h}'.
+---
+ include/refcount.h | 320 ------------------------------------------
+ libshouldbeinlibc/Makefile | 8 +-
+ libshouldbeinlibc/refcount.c | 23 +++
+ libshouldbeinlibc/refcount.h | 326 +++++++++++++++++++++++++++++++++++++++++++
+ 4 files changed, 355 insertions(+), 322 deletions(-)
+ delete mode 100644 include/refcount.h
+ create mode 100644 libshouldbeinlibc/refcount.c
+ create mode 100644 libshouldbeinlibc/refcount.h
+
+diff --git a/include/refcount.h b/include/refcount.h
+deleted file mode 100644
+index ebde42d..0000000
+--- a/include/refcount.h
++++ /dev/null
+@@ -1,320 +0,0 @@
+-/* Lock-less reference counting primitives
+-
+- Copyright (C) 2014 Free Software Foundation, Inc.
+-
+- Written by Justus Winter <4winter@informatik.uni-hamburg.de>
+-
+- This file is part of the GNU Hurd.
+-
+- The GNU Hurd is free software; you can redistribute it and/or
+- modify it under the terms of the GNU General Public License as
+- published by the Free Software Foundation; either version 2, or (at
+- your option) any later version.
+-
+- The GNU Hurd is distributed in the hope that it will be useful, but
+- WITHOUT ANY WARRANTY; without even the implied warranty of
+- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+- General Public License for more details.
+-
+- You should have received a copy of the GNU General Public License
+- along with the GNU Hurd. If not, see <http://www.gnu.org/licenses/>. */
+-
+-#ifndef _HURD_REFCOUNT_H_
+-#define _HURD_REFCOUNT_H_
+-
+-#include <assert.h>
+-#include <limits.h>
+-#include <stdint.h>
+-
+-/* Simple reference counting. */
+-
+-/* An opaque type. You must not access these values directly. */
+-typedef unsigned int refcount_t;
+-
+-/* Initialize REF with REFERENCES. REFERENCES must not be zero. */
+-static inline void
+-refcount_init (refcount_t *ref, unsigned int references)
+-{
+- assert (references > 0 || !"references must not be zero!");
+- *ref = references;
+-}
+-
+-/* Increment REF. Return the result of the operation. This function
+- uses atomic operations. It is not required to serialize calls to
+- this function.
+-
+- This is the unsafe version of refcount_ref. refcount_ref also
+- checks for use-after-free errors. When in doubt, use that one
+- instead. */
+-static inline unsigned int
+-refcount_unsafe_ref (refcount_t *ref)
+-{
+- unsigned int r;
+- r = __atomic_add_fetch (ref, 1, __ATOMIC_RELAXED);
+- assert (r != UINT_MAX || !"refcount overflowed!");
+- return r;
+-}
+-
+-/* Increment REF. Return the result of the operation. This function
+- uses atomic operations. It is not required to serialize calls to
+- this function. */
+-static inline unsigned int
+-refcount_ref (refcount_t *ref)
+-{
+- unsigned int r;
+- r = refcount_unsafe_ref (ref);
+- assert (r != 1 || !"refcount detected use-after-free!");
+- return r;
+-}
+-
+-/* Decrement REF. Return the result of the operation. This function
+- uses atomic operations. It is not required to serialize calls to
+- this function. */
+-static inline unsigned int
+-refcount_deref (refcount_t *ref)
+-{
+- unsigned int r;
+- r = __atomic_sub_fetch (ref, 1, __ATOMIC_RELAXED);
+- assert (r != UINT_MAX || !"refcount underflowed!");
+- return r;
+-}
+-
+-/* Return REF. This function uses atomic operations. It is not
+- required to serialize calls to this function. */
+-static inline unsigned int
+-refcount_references (refcount_t *ref)
+-{
+- return __atomic_load_n (ref, __ATOMIC_RELAXED);
+-}
+-
+-/* Reference counting with weak references. */
+-
+-/* An opaque type. You must not access these values directly. */
+-typedef union _references refcounts_t;
+-
+-/* Instead, the functions manipulating refcounts_t values write the
+- results into this kind of objects. */
+-struct references {
+- /* We chose the layout of this struct so that when it is used in the
+- union _references, the hard reference counts occupy the least
+- significant bits. We rely on this layout for atomic promotion
+- and demotion of references. See refcounts_promote and
+- refcounts_demote for details. */
+-#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
+- uint32_t hard;
+- uint32_t weak;
+-#else
+- uint32_t weak;
+- uint32_t hard;
+-#endif
+-};
+-
+-/* We use a union to convert struct reference values to uint64_t which
+- we can manipulate atomically. While this behavior is not
+- guaranteed by the C standard, it is supported by all major
+- compilers. */
+-union _references {
+- struct references references;
+- uint64_t value;
+-};
+-
+-/* Initialize REF with HARD and WEAK references. HARD and WEAK must
+- not both be zero. */
+-static inline void
+-refcounts_init (refcounts_t *ref, uint32_t hard, uint32_t weak)
+-{
+- assert ((hard != 0 || weak != 0) || !"references must not both be zero!");
+- ref->references = (struct references) { .hard = hard, .weak = weak };
+-}
+-
+-/* Increment the hard reference count of REF. If RESULT is not NULL,
+- the result of the operation is written there. This function uses
+- atomic operations. It is not required to serialize calls to this
+- function.
+-
+- This is the unsafe version of refcounts_ref. refcounts_ref also
+- checks for use-after-free errors. When in doubt, use that one
+- instead. */
+-static inline void
+-refcounts_unsafe_ref (refcounts_t *ref, struct references *result)
+-{
+- const union _references op = { .references = { .hard = 1 } };
+- union _references r;
+- r.value = __atomic_add_fetch (&ref->value, op.value, __ATOMIC_RELAXED);
+- assert (r.references.hard != UINT32_MAX || !"refcount overflowed!");
+- if (result)
+- *result = r.references;
+-}
+-
+-/* Increment the hard reference count of REF. If RESULT is not NULL,
+- the result of the operation is written there. This function uses
+- atomic operations. It is not required to serialize calls to this
+- function. */
+-static inline void
+-refcounts_ref (refcounts_t *ref, struct references *result)
+-{
+- struct references r;
+- refcounts_unsafe_ref (ref, &r);
+- assert (! (r.hard == 1 && r.weak == 0)
+- || !"refcount detected use-after-free!");
+- if (result)
+- *result = r;
+-}
+-
+-/* Decrement the hard reference count of REF. If RESULT is not NULL,
+- the result of the operation is written there. This function uses
+- atomic operations. It is not required to serialize calls to this
+- function. */
+-static inline void
+-refcounts_deref (refcounts_t *ref, struct references *result)
+-{
+- const union _references op = { .references = { .hard = 1 } };
+- union _references r;
+- r.value = __atomic_sub_fetch (&ref->value, op.value, __ATOMIC_RELAXED);
+- assert (r.references.hard != UINT32_MAX || !"refcount underflowed!");
+- if (result)
+- *result = r.references;
+-}
+-
+-/* Promote a weak reference to a hard reference. If RESULT is not
+- NULL, the result of the operation is written there. This function
+- uses atomic operations. It is not required to serialize calls to
+- this function. */
+-static inline void
+-refcounts_promote (refcounts_t *ref, struct references *result)
+-{
+- /* To promote a weak reference, we need to atomically subtract 1
+- from the weak reference count, and add 1 to the hard reference
+- count.
+-
+- We can subtract by 1 by adding the two's complement of 1 = ~0 to
+- a fixed-width value, discarding the overflow.
+-
+- We do the same in our uint64_t value, but we have chosen the
+- layout of struct references so that when it is used in the union
+- _references, the weak reference counts occupy the most
+- significant bits. When we add ~0 to the weak references, the
+- overflow will be discarded as unsigned arithmetic is modulo 2^n.
+- So we just add a hard reference. In combination, this is the
+- desired operation. */
+- const union _references op =
+- { .references = { .weak = ~0U, .hard = 1} };
+- union _references r;
+- r.value = __atomic_add_fetch (&ref->value, op.value, __ATOMIC_RELAXED);
+- assert (r.references.hard != UINT32_MAX || !"refcount overflowed!");
+- assert (r.references.weak != UINT32_MAX || !"refcount underflowed!");
+- if (result)
+- *result = r.references;
+-}
+-
+-/* Demote a hard reference to a weak reference. If RESULT is not
+- NULL, the result of the operation is written there. This function
+- uses atomic operations. It is not required to serialize calls to
+- this function. */
+-static inline void
+-refcounts_demote (refcounts_t *ref, struct references *result)
+-{
+- /* To demote a hard reference, we need to atomically subtract 1 from
+- the hard reference count, and add 1 to the weak reference count.
+-
+- We can subtract by 1 by adding the two's complement of 1 = ~0 to
+- a fixed-width value, discarding the overflow.
+-
+- We do the same in our uint64_t value, but we have chosen the
+- layout of struct references so that when it is used in the union
+- _references, the hard reference counts occupy the least
+- significant bits. When we add ~0 to the hard references, it will
+- overflow into the weak references. This is the desired
+- operation. */
+- const union _references op = { .references = { .hard = ~0U } };
+- union _references r;
+- r.value = __atomic_add_fetch (&ref->value, op.value, __ATOMIC_RELAXED);
+- assert (r.references.hard != UINT32_MAX || !"refcount underflowed!");
+- assert (r.references.weak != UINT32_MAX || !"refcount overflowed!");
+- if (result)
+- *result = r.references;
+-}
+-
+-/* Increment the weak reference count of REF. If RESULT is not NULL,
+- the result of the operation is written there. This function uses
+- atomic operations. It is not required to serialize calls to this
+- function.
+-
+- This is the unsafe version of refcounts_ref_weak.
+- refcounts_ref_weak also checks for use-after-free errors. When in
+- doubt, use that one instead. */
+-static inline void
+-refcounts_unsafe_ref_weak (refcounts_t *ref, struct references *result)
+-{
+- const union _references op = { .references = { .weak = 1 } };
+- union _references r;
+- r.value = __atomic_add_fetch (&ref->value, op.value, __ATOMIC_RELAXED);
+- assert (r.references.weak != UINT32_MAX || !"refcount overflowed!");
+- if (result)
+- *result = r.references;
+-}
+-
+-/* Increment the weak reference count of REF. If RESULT is not NULL,
+- the result of the operation is written there. This function uses
+- atomic operations. It is not required to serialize calls to this
+- function. */
+-static inline void
+-refcounts_ref_weak (refcounts_t *ref, struct references *result)
+-{
+- struct references r;
+- refcounts_unsafe_ref_weak (ref, &r);
+- assert (! (r.hard == 0 && r.weak == 1)
+- || !"refcount detected use-after-free!");
+- if (result)
+- *result = r;
+-}
+-
+-/* Decrement the weak reference count of REF. If RESULT is not NULL,
+- the result of the operation is written there. This function uses
+- atomic operations. It is not required to serialize calls to this
+- function. */
+-static inline void
+-refcounts_deref_weak (refcounts_t *ref, struct references *result)
+-{
+- const union _references op = { .references = { .weak = 1 } };
+- union _references r;
+- r.value = __atomic_sub_fetch (&ref->value, op.value, __ATOMIC_RELAXED);
+- assert (r.references.weak != UINT32_MAX || !"refcount underflowed!");
+- if (result)
+- *result = r.references;
+-}
+-
+-/* Store the current reference counts of REF in RESULT. This function
+- uses atomic operations. It is not required to serialize calls to
+- this function. */
+-static inline void
+-refcounts_references (refcounts_t *ref, struct references *result)
+-{
+- union _references r;
+- r.value =__atomic_load_n (&ref->value, __ATOMIC_RELAXED);
+- *result = r.references;
+-}
+-
+-/* Return the hard reference count of REF. This function uses atomic
+- operations. It is not required to serialize calls to this
+- function. */
+-static inline uint32_t
+-refcounts_hard_references (refcounts_t *ref)
+-{
+- struct references result;
+- refcounts_references (ref, &result);
+- return result.hard;
+-}
+-
+-/* Return the weak reference count of REF. This function uses atomic
+- operations. It is not required to serialize calls to this
+- function. */
+-static inline uint32_t
+-refcounts_weak_references (refcounts_t *ref)
+-{
+- struct references result;
+- refcounts_references (ref, &result);
+- return result.weak;
+-}
+-
+-#endif /* _HURD_REFCOUNT_H_ */
+diff --git a/libshouldbeinlibc/Makefile b/libshouldbeinlibc/Makefile
+index 14a7939..633d60e 100644
+--- a/libshouldbeinlibc/Makefile
++++ b/libshouldbeinlibc/Makefile
+@@ -27,9 +27,13 @@ SRCS = termsize.c timefmt.c exec-reauth.c maptime-funcs.c \
+ idvec-impgids.c idvec-verify.c idvec-rep.c \
+ ugids.c ugids-argp.c ugids-rep.c ugids-verify.c ugids-subtract.c \
+ ugids-auth.c ugids-xinl.c ugids-merge.c ugids-imply.c ugids-posix.c \
+- ugids-verify-auth.c nullauth.c
++ ugids-verify-auth.c nullauth.c \
++ refcount.c \
++
+ installhdrs = idvec.h timefmt.h maptime.h \
+- wire.h portinfo.h portxlate.h cacheq.h ugids.h nullauth.h
++ wire.h portinfo.h portxlate.h cacheq.h ugids.h nullauth.h \
++ refcount.h \
++
+ installhdrsubdir = .
+
+ OBJS = $(SRCS:.c=.o)
+diff --git a/libshouldbeinlibc/refcount.c b/libshouldbeinlibc/refcount.c
+new file mode 100644
+index 0000000..17e01c5
+--- /dev/null
++++ b/libshouldbeinlibc/refcount.c
+@@ -0,0 +1,23 @@
++/* Lock-less reference counting primitives
++
++ Copyright (C) 2014 Free Software Foundation, Inc.
++
++ Written by Justus Winter <4winter@informatik.uni-hamburg.de>
++
++ This file is part of the GNU Hurd.
++
++ The GNU Hurd is free software; you can redistribute it and/or
++ modify it under the terms of the GNU General Public License as
++ published by the Free Software Foundation; either version 2, or (at
++ your option) any later version.
++
++ The GNU Hurd is distributed in the hope that it will be useful, but
++ WITHOUT ANY WARRANTY; without even the implied warranty of
++ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
++ General Public License for more details.
++
++ You should have received a copy of the GNU General Public License
++ along with the GNU Hurd. If not, see <http://www.gnu.org/licenses/>. */
++
++#define REFCOUNT_DEFINE_EI
++#include "refcount.h"
+diff --git a/libshouldbeinlibc/refcount.h b/libshouldbeinlibc/refcount.h
+new file mode 100644
+index 0000000..e8b0f5b
+--- /dev/null
++++ b/libshouldbeinlibc/refcount.h
+@@ -0,0 +1,326 @@
++/* Lock-less reference counting primitives
++
++ Copyright (C) 2014 Free Software Foundation, Inc.
++
++ Written by Justus Winter <4winter@informatik.uni-hamburg.de>
++
++ This file is part of the GNU Hurd.
++
++ The GNU Hurd is free software; you can redistribute it and/or
++ modify it under the terms of the GNU General Public License as
++ published by the Free Software Foundation; either version 2, or (at
++ your option) any later version.
++
++ The GNU Hurd is distributed in the hope that it will be useful, but
++ WITHOUT ANY WARRANTY; without even the implied warranty of
++ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
++ General Public License for more details.
++
++ You should have received a copy of the GNU General Public License
++ along with the GNU Hurd. If not, see <http://www.gnu.org/licenses/>. */
++
++#ifndef _HURD_REFCOUNT_H_
++#define _HURD_REFCOUNT_H_
++
++#ifdef REFCOUNT_DEFINE_EI
++#define REFCOUNT_EI
++#else
++#define REFCOUNT_EI __extern_inline
++#endif
++
++#include <assert.h>
++#include <limits.h>
++#include <stdint.h>
++
++/* Simple reference counting. */
++
++/* An opaque type. You must not access these values directly. */
++typedef unsigned int refcount_t;
++
++/* Initialize REF with REFERENCES. REFERENCES must not be zero. */
++REFCOUNT_EI void
++refcount_init (refcount_t *ref, unsigned int references)
++{
++ assert (references > 0 || !"references must not be zero!");
++ *ref = references;
++}
++
++/* Increment REF. Return the result of the operation. This function
++ uses atomic operations. It is not required to serialize calls to
++ this function.
++
++ This is the unsafe version of refcount_ref. refcount_ref also
++ checks for use-after-free errors. When in doubt, use that one
++ instead. */
++REFCOUNT_EI unsigned int
++refcount_unsafe_ref (refcount_t *ref)
++{
++ unsigned int r;
++ r = __atomic_add_fetch (ref, 1, __ATOMIC_RELAXED);
++ assert (r != UINT_MAX || !"refcount overflowed!");
++ return r;
++}
++
++/* Increment REF. Return the result of the operation. This function
++ uses atomic operations. It is not required to serialize calls to
++ this function. */
++REFCOUNT_EI unsigned int
++refcount_ref (refcount_t *ref)
++{
++ unsigned int r;
++ r = refcount_unsafe_ref (ref);
++ assert (r != 1 || !"refcount detected use-after-free!");
++ return r;
++}
++
++/* Decrement REF. Return the result of the operation. This function
++ uses atomic operations. It is not required to serialize calls to
++ this function. */
++REFCOUNT_EI unsigned int
++refcount_deref (refcount_t *ref)
++{
++ unsigned int r;
++ r = __atomic_sub_fetch (ref, 1, __ATOMIC_RELAXED);
++ assert (r != UINT_MAX || !"refcount underflowed!");
++ return r;
++}
++
++/* Return REF. This function uses atomic operations. It is not
++ required to serialize calls to this function. */
++REFCOUNT_EI unsigned int
++refcount_references (refcount_t *ref)
++{
++ return __atomic_load_n (ref, __ATOMIC_RELAXED);
++}
++
++/* Reference counting with weak references. */
++
++/* An opaque type. You must not access these values directly. */
++typedef union _references refcounts_t;
++
++/* Instead, the functions manipulating refcounts_t values write the
++ results into this kind of objects. */
++struct references {
++ /* We chose the layout of this struct so that when it is used in the
++ union _references, the hard reference counts occupy the least
++ significant bits. We rely on this layout for atomic promotion
++ and demotion of references. See refcounts_promote and
++ refcounts_demote for details. */
++#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
++ uint32_t hard;
++ uint32_t weak;
++#else
++ uint32_t weak;
++ uint32_t hard;
++#endif
++};
++
++/* We use a union to convert struct reference values to uint64_t which
++ we can manipulate atomically. While this behavior is not
++ guaranteed by the C standard, it is supported by all major
++ compilers. */
++union _references {
++ struct references references;
++ uint64_t value;
++};
++
++/* Initialize REF with HARD and WEAK references. HARD and WEAK must
++ not both be zero. */
++REFCOUNT_EI void
++refcounts_init (refcounts_t *ref, uint32_t hard, uint32_t weak)
++{
++ assert ((hard != 0 || weak != 0) || !"references must not both be zero!");
++ ref->references = (struct references) { .hard = hard, .weak = weak };
++}
++
++/* Increment the hard reference count of REF. If RESULT is not NULL,
++ the result of the operation is written there. This function uses
++ atomic operations. It is not required to serialize calls to this
++ function.
++
++ This is the unsafe version of refcounts_ref. refcounts_ref also
++ checks for use-after-free errors. When in doubt, use that one
++ instead. */
++REFCOUNT_EI void
++refcounts_unsafe_ref (refcounts_t *ref, struct references *result)
++{
++ const union _references op = { .references = { .hard = 1 } };
++ union _references r;
++ r.value = __atomic_add_fetch (&ref->value, op.value, __ATOMIC_RELAXED);
++ assert (r.references.hard != UINT32_MAX || !"refcount overflowed!");
++ if (result)
++ *result = r.references;
++}
++
++/* Increment the hard reference count of REF. If RESULT is not NULL,
++ the result of the operation is written there. This function uses
++ atomic operations. It is not required to serialize calls to this
++ function. */
++REFCOUNT_EI void
++refcounts_ref (refcounts_t *ref, struct references *result)
++{
++ struct references r;
++ refcounts_unsafe_ref (ref, &r);
++ assert (! (r.hard == 1 && r.weak == 0)
++ || !"refcount detected use-after-free!");
++ if (result)
++ *result = r;
++}
++
++/* Decrement the hard reference count of REF. If RESULT is not NULL,
++ the result of the operation is written there. This function uses
++ atomic operations. It is not required to serialize calls to this
++ function. */
++REFCOUNT_EI void
++refcounts_deref (refcounts_t *ref, struct references *result)
++{
++ const union _references op = { .references = { .hard = 1 } };
++ union _references r;
++ r.value = __atomic_sub_fetch (&ref->value, op.value, __ATOMIC_RELAXED);
++ assert (r.references.hard != UINT32_MAX || !"refcount underflowed!");
++ if (result)
++ *result = r.references;
++}
++
++/* Promote a weak reference to a hard reference. If RESULT is not
++ NULL, the result of the operation is written there. This function
++ uses atomic operations. It is not required to serialize calls to
++ this function. */
++REFCOUNT_EI void
++refcounts_promote (refcounts_t *ref, struct references *result)
++{
++ /* To promote a weak reference, we need to atomically subtract 1
++ from the weak reference count, and add 1 to the hard reference
++ count.
++
++ We can subtract by 1 by adding the two's complement of 1 = ~0 to
++ a fixed-width value, discarding the overflow.
++
++ We do the same in our uint64_t value, but we have chosen the
++ layout of struct references so that when it is used in the union
++ _references, the weak reference counts occupy the most
++ significant bits. When we add ~0 to the weak references, the
++ overflow will be discarded as unsigned arithmetic is modulo 2^n.
++ So we just add a hard reference. In combination, this is the
++ desired operation. */
++ const union _references op =
++ { .references = { .weak = ~0U, .hard = 1} };
++ union _references r;
++ r.value = __atomic_add_fetch (&ref->value, op.value, __ATOMIC_RELAXED);
++ assert (r.references.hard != UINT32_MAX || !"refcount overflowed!");
++ assert (r.references.weak != UINT32_MAX || !"refcount underflowed!");
++ if (result)
++ *result = r.references;
++}
++
++/* Demote a hard reference to a weak reference. If RESULT is not
++ NULL, the result of the operation is written there. This function
++ uses atomic operations. It is not required to serialize calls to
++ this function. */
++REFCOUNT_EI void
++refcounts_demote (refcounts_t *ref, struct references *result)
++{
++ /* To demote a hard reference, we need to atomically subtract 1 from
++ the hard reference count, and add 1 to the weak reference count.
++
++ We can subtract by 1 by adding the two's complement of 1 = ~0 to
++ a fixed-width value, discarding the overflow.
++
++ We do the same in our uint64_t value, but we have chosen the
++ layout of struct references so that when it is used in the union
++ _references, the hard reference counts occupy the least
++ significant bits. When we add ~0 to the hard references, it will
++ overflow into the weak references. This is the desired
++ operation. */
++ const union _references op = { .references = { .hard = ~0U } };
++ union _references r;
++ r.value = __atomic_add_fetch (&ref->value, op.value, __ATOMIC_RELAXED);
++ assert (r.references.hard != UINT32_MAX || !"refcount underflowed!");
++ assert (r.references.weak != UINT32_MAX || !"refcount overflowed!");
++ if (result)
++ *result = r.references;
++}
++
++/* Increment the weak reference count of REF. If RESULT is not NULL,
++ the result of the operation is written there. This function uses
++ atomic operations. It is not required to serialize calls to this
++ function.
++
++ This is the unsafe version of refcounts_ref_weak.
++ refcounts_ref_weak also checks for use-after-free errors. When in
++ doubt, use that one instead. */
++REFCOUNT_EI void
++refcounts_unsafe_ref_weak (refcounts_t *ref, struct references *result)
++{
++ const union _references op = { .references = { .weak = 1 } };
++ union _references r;
++ r.value = __atomic_add_fetch (&ref->value, op.value, __ATOMIC_RELAXED);
++ assert (r.references.weak != UINT32_MAX || !"refcount overflowed!");
++ if (result)
++ *result = r.references;
++}
++
++/* Increment the weak reference count of REF. If RESULT is not NULL,
++ the result of the operation is written there. This function uses
++ atomic operations. It is not required to serialize calls to this
++ function. */
++REFCOUNT_EI void
++refcounts_ref_weak (refcounts_t *ref, struct references *result)
++{
++ struct references r;
++ refcounts_unsafe_ref_weak (ref, &r);
++ assert (! (r.hard == 0 && r.weak == 1)
++ || !"refcount detected use-after-free!");
++ if (result)
++ *result = r;
++}
++
++/* Decrement the weak reference count of REF. If RESULT is not NULL,
++ the result of the operation is written there. This function uses
++ atomic operations. It is not required to serialize calls to this
++ function. */
++REFCOUNT_EI void
++refcounts_deref_weak (refcounts_t *ref, struct references *result)
++{
++ const union _references op = { .references = { .weak = 1 } };
++ union _references r;
++ r.value = __atomic_sub_fetch (&ref->value, op.value, __ATOMIC_RELAXED);
++ assert (r.references.weak != UINT32_MAX || !"refcount underflowed!");
++ if (result)
++ *result = r.references;
++}
++
++/* Store the current reference counts of REF in RESULT. This function
++ uses atomic operations. It is not required to serialize calls to
++ this function. */
++REFCOUNT_EI void
++refcounts_references (refcounts_t *ref, struct references *result)
++{
++ union _references r;
++ r.value =__atomic_load_n (&ref->value, __ATOMIC_RELAXED);
++ *result = r.references;
++}
++
++/* Return the hard reference count of REF. This function uses atomic
++ operations. It is not required to serialize calls to this
++ function. */
++REFCOUNT_EI uint32_t
++refcounts_hard_references (refcounts_t *ref)
++{
++ struct references result;
++ refcounts_references (ref, &result);
++ return result.hard;
++}
++
++/* Return the weak reference count of REF. This function uses atomic
++ operations. It is not required to serialize calls to this
++ function. */
++REFCOUNT_EI uint32_t
++refcounts_weak_references (refcounts_t *ref)
++{
++ struct references result;
++ refcounts_references (ref, &result);
++ return result.weak;
++}
++
++#endif /* _HURD_REFCOUNT_H_ */
+--
+2.1.3
+
diff --git a/debian/patches/0002-libports-add-ports_lookup_payload-and-ports_payload_.patch b/debian/patches/0002-libports-add-ports_lookup_payload-and-ports_payload_.patch
new file mode 100644
index 00000000..87d7dfee
--- /dev/null
+++ b/debian/patches/0002-libports-add-ports_lookup_payload-and-ports_payload_.patch
@@ -0,0 +1,137 @@
+From 580b142c1e0c76195888f4a1101ee831e7f986be Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Sat, 23 Nov 2013 16:19:08 +0100
+Subject: [PATCH hurd 02/28] libports: add `ports_lookup_payload' and
+ `ports_payload_get_name'
+
+These two functions map payloads to objects and port names. The former
+can be used like `ports_lookup_port' to look up objects, the latter to
+map payloads to port names if the server function expects a
+`mach_port_t'.
+
+* libports/ports.h: Add function ports_payload_get_name.
+* libports/lookup-payload.c: New file.
+* libports/ports.h (ports_lookup_payload): Add declaration.
+* libports/Makefile (SRCS): Add lookup-payload.c.
+---
+ libports/Makefile | 2 +-
+ libports/extern-inline.c | 22 ++++++++++++++++++++
+ libports/ports.h | 53 ++++++++++++++++++++++++++++++++++++++++++++++++
+ 3 files changed, 76 insertions(+), 1 deletion(-)
+ create mode 100644 libports/extern-inline.c
+
+diff --git a/libports/Makefile b/libports/Makefile
+index 30da1c1..f49cb9f 100644
+--- a/libports/Makefile
++++ b/libports/Makefile
+@@ -36,7 +36,7 @@ SRCS = create-bucket.c create-class.c \
+ interrupt-operation.c interrupt-on-notify.c interrupt-notified-rpcs.c \
+ dead-name.c create-port.c import-port.c default-uninhibitable-rpcs.c \
+ claim-right.c transfer-right.c create-port-noinstall.c create-internal.c \
+- interrupted.c
++ interrupted.c extern-inline.c
+
+ installhdrs = ports.h
+
+diff --git a/libports/extern-inline.c b/libports/extern-inline.c
+new file mode 100644
+index 0000000..fbc9e53
+--- /dev/null
++++ b/libports/extern-inline.c
+@@ -0,0 +1,22 @@
++/* Run time callable functions for extern inlines.
++ Copyright (C) 2014 Free Software Foundation, Inc.
++
++ Written by Justus Winter <4winter@informatik.uni-hamburg.de>
++
++ This file is part of the GNU Hurd.
++
++ The GNU Hurd is free software; you can redistribute it and/or
++ modify it under the terms of the GNU General Public License as
++ published by the Free Software Foundation; either version 2, or (at
++ your option) any later version.
++
++ The GNU Hurd is distributed in the hope that it will be useful, but
++ WITHOUT ANY WARRANTY; without even the implied warranty of
++ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
++ General Public License for more details.
++
++ You should have received a copy of the GNU General Public License
++ along with the GNU Hurd. If not, see <http://www.gnu.org/licenses/>. */
++
++#define PORTS_DEFINE_EI
++#include "ports.h"
+diff --git a/libports/ports.h b/libports/ports.h
+index 652edb8..a625b47 100644
+--- a/libports/ports.h
++++ b/libports/ports.h
+@@ -29,6 +29,12 @@
+ #include <pthread.h>
+ #include <refcount.h>
+
++#ifdef PORTS_DEFINE_EI
++#define PORTS_EI
++#else
++#define PORTS_EI __extern_inline
++#endif
++
+ /* These are global values for common flags used in the various structures.
+ Not all of these are meaningful in all flag fields. */
+ #define PORTS_INHIBITED 0x0100 /* block RPC's */
+@@ -234,6 +240,53 @@ mach_port_t ports_get_send_right (void *port);
+ void *ports_lookup_port (struct port_bucket *bucket,
+ mach_port_t port, struct port_class *class);
+
++/* Like ports_lookup_port, but uses PAYLOAD to look up the object. If
++ this function is used, PAYLOAD must be a pointer to the port
++ structure. */
++extern void *ports_lookup_payload (struct port_bucket *bucket,
++ unsigned long payload,
++ struct port_class *class);
++
++/* This returns the ports name. This function can be used as
++ intranpayload function turning payloads back into port names. If
++ this function is used, PAYLOAD must be a pointer to the port
++ structure. */
++extern mach_port_t ports_payload_get_name (unsigned int payload);
++
++#if defined(__USE_EXTERN_INLINES) || defined(PORTS_DEFINE_EI)
++
++PORTS_EI void *
++ports_lookup_payload (struct port_bucket *bucket,
++ unsigned long payload,
++ struct port_class *class)
++{
++ struct port_info *pi = (struct port_info *) payload;
++
++ if (pi && bucket && pi->bucket != bucket)
++ pi = NULL;
++
++ if (pi && class && pi->class != class)
++ pi = NULL;
++
++ if (pi)
++ refcounts_unsafe_ref (&pi->refcounts, NULL);
++
++ return pi;
++}
++
++PORTS_EI mach_port_t
++ports_payload_get_name (unsigned int payload)
++{
++ struct port_info *pi = (struct port_info *) payload;
++
++ if (pi)
++ return pi->port_right;
++
++ return MACH_PORT_NULL;
++}
++
++#endif /* Use extern inlines. */
++
+ /* Allocate another reference to PORT. */
+ void ports_port_ref (void *port);
+
+--
+2.1.3
+
diff --git a/debian/patches/0003-libports-add-a-payload-aware-intrans-function.patch b/debian/patches/0003-libports-add-a-payload-aware-intrans-function.patch
new file mode 100644
index 00000000..c1b31f25
--- /dev/null
+++ b/debian/patches/0003-libports-add-a-payload-aware-intrans-function.patch
@@ -0,0 +1,54 @@
+From 466bacfa2728a9b164196d002a5c49d644ef9c95 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Tue, 8 Apr 2014 23:40:26 +0200
+Subject: [PATCH hurd 03/28] libports: add a payload-aware intrans function
+
+* libports/mig-decls.h (begin_using_port_info_payload): New function.
+* libports/mig-mutate.h: Add mutator.
+---
+ libports/mig-decls.h | 6 ++++++
+ libports/mig-mutate.h | 4 ++++
+ 2 files changed, 10 insertions(+)
+
+diff --git a/libports/mig-decls.h b/libports/mig-decls.h
+index f8c4f15..c88ff26 100644
+--- a/libports/mig-decls.h
++++ b/libports/mig-decls.h
+@@ -30,6 +30,12 @@ begin_using_port_info_port (mach_port_t port)
+ return ports_lookup_port (0, port, 0);
+ }
+
++static inline struct port_info * __attribute__ ((unused))
++begin_using_port_info_payload (unsigned long payload)
++{
++ return ports_lookup_payload (0, payload, 0);
++}
++
+ static inline void __attribute__ ((unused))
+ end_using_port_info (struct port_info *p)
+ {
+diff --git a/libports/mig-mutate.h b/libports/mig-mutate.h
+index 4c011b6..1c96fea 100644
+--- a/libports/mig-mutate.h
++++ b/libports/mig-mutate.h
+@@ -19,6 +19,8 @@
+
+ #define NOTIFY_INTRAN \
+ port_info_t begin_using_port_info_port (mach_port_t)
++#define NOTIFY_INTRAN_PAYLOAD \
++ port_info_t begin_using_port_info_payload
+ #define NOTIFY_DESTRUCTOR \
+ end_using_port_info (port_info_t)
+ #define NOTIFY_IMPORTS \
+@@ -26,6 +28,8 @@
+
+ #define INTERRUPT_INTRAN \
+ port_info_t begin_using_port_info_port (mach_port_t)
++#define INTERRUPT_INTRAN_PAYLOAD \
++ port_info_t begin_using_port_info_payload
+ #define INTERRUPT_DESTRUCTOR \
+ end_using_port_info (port_info_t)
+ #define INTERRUPT_IMPORTS \
+--
+2.1.3
+
diff --git a/debian/patches/0004-libdiskfs-add-payload-aware-intrans-functions.patch b/debian/patches/0004-libdiskfs-add-payload-aware-intrans-functions.patch
new file mode 100644
index 00000000..2801be45
--- /dev/null
+++ b/debian/patches/0004-libdiskfs-add-payload-aware-intrans-functions.patch
@@ -0,0 +1,109 @@
+From 23c08045d7afca712d0a22f5663e7e74cc420345 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 10:43:18 +0100
+Subject: [PATCH hurd 04/28] libdiskfs: add payload-aware intrans functions
+
+* libdiskfs/diskfs.h (diskfs_begin_using_protid_payload): New function.
+(diskfs_begin_using_control_payload): Likewise.
+(diskfs_begin_using_bootinfo_payload): Likewise.
+* libdiskfs/fsmutations.h: Add mutators.
+---
+ libdiskfs/diskfs.h | 29 +++++++++++++++++++++++++++++
+ libdiskfs/fsmutations.h | 5 +++++
+ 2 files changed, 34 insertions(+)
+
+diff --git a/libdiskfs/diskfs.h b/libdiskfs/diskfs.h
+index e59ba99..2818225 100644
+--- a/libdiskfs/diskfs.h
++++ b/libdiskfs/diskfs.h
+@@ -833,8 +833,14 @@ error_t diskfs_start_protid (struct peropen *po, struct protid **cred);
+ void diskfs_finish_protid (struct protid *cred, struct iouser *user);
+
+ extern struct protid * diskfs_begin_using_protid_port (file_t port);
++extern struct protid *
++diskfs_begin_using_protid_payload (unsigned long payload);
+ extern struct diskfs_control * diskfs_begin_using_control_port (fsys_t port);
++extern struct diskfs_control *
++diskfs_begin_using_control_port_payload (unsigned long payload);
+ extern struct bootinfo *diskfs_begin_using_bootinfo_port (exec_startup_t port);
++struct bootinfo *
++diskfs_begin_using_bootinfo_payload (unsigned long payload);
+
+ extern void diskfs_end_using_protid_port (struct protid *cred);
+ extern void diskfs_end_using_control_port (struct diskfs_control *cred);
+@@ -851,6 +857,14 @@ diskfs_begin_using_protid_port (file_t port)
+ return ports_lookup_port (diskfs_port_bucket, port, diskfs_protid_class);
+ }
+
++DISKFS_EXTERN_INLINE struct protid *
++diskfs_begin_using_protid_payload (unsigned long payload)
++{
++ return ports_lookup_payload (diskfs_port_bucket,
++ payload,
++ diskfs_protid_class);
++}
++
+ /* And for the fsys interface. */
+ DISKFS_EXTERN_INLINE struct diskfs_control *
+ diskfs_begin_using_control_port (fsys_t port)
+@@ -858,6 +872,14 @@ diskfs_begin_using_control_port (fsys_t port)
+ return ports_lookup_port (diskfs_port_bucket, port, NULL);
+ }
+
++DISKFS_EXTERN_INLINE struct diskfs_control *
++diskfs_begin_using_control_port_payload (unsigned long payload)
++{
++ return ports_lookup_payload (diskfs_port_bucket,
++ payload,
++ NULL);
++}
++
+ /* And for the exec_startup interface. */
+ DISKFS_EXTERN_INLINE struct bootinfo *
+ diskfs_begin_using_bootinfo_port (exec_startup_t port)
+@@ -865,6 +887,13 @@ diskfs_begin_using_bootinfo_port (exec_startup_t port)
+ return ports_lookup_port (diskfs_port_bucket, port, diskfs_execboot_class);
+ }
+
++DISKFS_EXTERN_INLINE struct bootinfo *
++diskfs_begin_using_bootinfo_payload (unsigned long payload)
++{
++ return ports_lookup_payload (diskfs_port_bucket,
++ payload,
++ diskfs_execboot_class);
++}
+
+ /* Called by MiG after server routines have been run; this
+ balances begin_using_protid_port, and is arranged for the io
+diff --git a/libdiskfs/fsmutations.h b/libdiskfs/fsmutations.h
+index 3f9362b..c2167c6 100644
+--- a/libdiskfs/fsmutations.h
++++ b/libdiskfs/fsmutations.h
+@@ -18,12 +18,15 @@
+ /* Only CPP macro definitions should go in this file. */
+
+ #define FILE_INTRAN protid_t diskfs_begin_using_protid_port (file_t)
++#define FILE_INTRAN_PAYLOAD protid_t diskfs_begin_using_protid_payload
+ #define FILE_DESTRUCTOR diskfs_end_using_protid_port (protid_t)
+
+ #define IO_INTRAN protid_t diskfs_begin_using_protid_port (io_t)
++#define IO_INTRAN_PAYLOAD protid_t diskfs_begin_using_protid_payload
+ #define IO_DESTRUCTOR diskfs_end_using_protid_port (protid_t)
+
+ #define FSYS_INTRAN control_t diskfs_begin_using_control_port (fsys_t)
++#define FSYS_INTRAN_PAYLOAD control_t diskfs_begin_using_control_port_payload
+ #define FSYS_DESTRUCTOR diskfs_end_using_control_port (control_t)
+
+ #define FILE_IMPORTS import "libdiskfs/priv.h";
+@@ -33,6 +36,8 @@
+
+ #define EXEC_STARTUP_INTRAN \
+ bootinfo_t diskfs_begin_using_bootinfo_port (exec_startup_t)
++#define EXEC_STARTUP_INTRAN_PAYLOAD \
++ bootinfo_t diskfs_begin_using_bootinfo_payload
+ #define EXEC_STARTUP_DESTRUCTOR \
+ diskfs_end_using_bootinfo (bootinfo_t)
+ #define EXEC_STARTUP_IMPORTS \
+--
+2.1.3
+
diff --git a/debian/patches/0005-libnetfs-add-a-payload-aware-intrans-function.patch b/debian/patches/0005-libnetfs-add-a-payload-aware-intrans-function.patch
new file mode 100644
index 00000000..9fd9beca
--- /dev/null
+++ b/debian/patches/0005-libnetfs-add-a-payload-aware-intrans-function.patch
@@ -0,0 +1,52 @@
+From 9a4bee5a8d6726d71002889a9e9d54dc417ce9d6 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 10:45:44 +0100
+Subject: [PATCH hurd 05/28] libnetfs: add a payload-aware intrans function
+
+* libnetfs/priv.h (begin_using_protid_payload): New function.
+* libnetfs/mutations.h: Add mutator.
+---
+ libnetfs/mutations.h | 3 +++
+ libnetfs/priv.h | 6 ++++++
+ 2 files changed, 9 insertions(+)
+
+diff --git a/libnetfs/mutations.h b/libnetfs/mutations.h
+index e60a220..088d8a0 100644
+--- a/libnetfs/mutations.h
++++ b/libnetfs/mutations.h
+@@ -23,12 +23,15 @@
+ #define IO_SELECT_REPLY_PORT
+
+ #define FILE_INTRAN protid_t begin_using_protid_port (file_t)
++#define FILE_INTRAN_PAYLOAD protid_t begin_using_protid_payload
+ #define FILE_DESTRUCTOR end_using_protid_port (protid_t)
+
+ #define IO_INTRAN protid_t begin_using_protid_port (io_t)
++#define IO_INTRAN_PAYLOAD protid_t begin_using_protid_payload
+ #define IO_DESTRUCTOR end_using_protid_port (protid_t)
+
+ #define FSYS_INTRAN control_t begin_using_control_port (fsys_t)
++#define FSYS_INTRAN_PAYLOAD control_t begin_using_control_payload
+ #define FSYS_DESTRUCTOR end_using_control_port (control_t)
+
+ #define FILE_IMPORTS import "libnetfs/netfs.h"; import "libnetfs/priv.h";
+diff --git a/libnetfs/priv.h b/libnetfs/priv.h
+index ba31080..36c8f53 100644
+--- a/libnetfs/priv.h
++++ b/libnetfs/priv.h
+@@ -44,6 +44,12 @@ begin_using_control_port (fsys_t port)
+ return ports_lookup_port (netfs_port_bucket, port, netfs_control_class);
+ }
+
++static inline struct netfs_control * __attribute__ ((unused))
++begin_using_control_payload (unsigned long payload)
++{
++ return ports_lookup_payload (netfs_port_bucket, payload, netfs_control_class);
++}
++
+ static inline void __attribute__ ((unused))
+ end_using_control_port (struct netfs_control *cred)
+ {
+--
+2.1.3
+
diff --git a/debian/patches/0006-libtrivfs-add-payload-aware-intrans-functions.patch b/debian/patches/0006-libtrivfs-add-payload-aware-intrans-functions.patch
new file mode 100644
index 00000000..baf1cfc5
--- /dev/null
+++ b/debian/patches/0006-libtrivfs-add-payload-aware-intrans-functions.patch
@@ -0,0 +1,113 @@
+From a3f0d8a363f7c872757f99523c737918c369d522 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 11:04:38 +0100
+Subject: [PATCH hurd 06/28] libtrivfs: add payload-aware intrans functions
+
+* libtrivfs/mig-decls.h (trivfs_begin_using_protid_payload): New function.
+(trivfs_begin_using_control_payload): Likewise.
+* libtrivfs/mig-mutate.h: Add mutators.
+---
+ libtrivfs/mig-decls.h | 58 ++++++++++++++++++++++++++++++++++++++++++++++++++
+ libtrivfs/mig-mutate.h | 3 +++
+ 2 files changed, 61 insertions(+)
+
+diff --git a/libtrivfs/mig-decls.h b/libtrivfs/mig-decls.h
+index 2baaee8..13a9eb7 100644
+--- a/libtrivfs/mig-decls.h
++++ b/libtrivfs/mig-decls.h
+@@ -61,6 +61,35 @@ trivfs_begin_using_protid (mach_port_t port)
+ return ports_lookup_port (0, port, trivfs_dynamic_protid_port_classes[0]);
+ }
+
++static inline struct trivfs_protid * __attribute__ ((unused))
++trivfs_begin_using_protid_payload (unsigned long payload)
++{
++ if (trivfs_protid_nportclasses + trivfs_num_dynamic_protid_port_classes > 1)
++ {
++ struct port_info *pi = ports_lookup_payload (NULL, payload, NULL);
++ int i;
++
++ if (pi)
++ {
++ for (i = 0; i < trivfs_protid_nportclasses; i++)
++ if (pi->class == trivfs_protid_portclasses[i])
++ return (struct trivfs_protid *) pi;
++ for (i = 0; i < trivfs_num_dynamic_protid_port_classes; i++)
++ if (pi->class == trivfs_dynamic_protid_port_classes[i])
++ return (struct trivfs_protid *) pi;
++ ports_port_deref (pi);
++ }
++
++ return NULL;
++ }
++ else if (trivfs_protid_nportclasses == 1)
++ return ports_lookup_payload (NULL, payload,
++ trivfs_protid_portclasses[0]);
++ else
++ return ports_lookup_payload (NULL, payload,
++ trivfs_dynamic_protid_port_classes[0]);
++}
++
+ static inline void __attribute__ ((unused))
+ trivfs_end_using_protid (struct trivfs_protid *cred)
+ {
+@@ -95,6 +124,35 @@ trivfs_begin_using_control (mach_port_t port)
+ return ports_lookup_port (0, port, trivfs_dynamic_control_port_classes[0]);
+ }
+
++static inline struct trivfs_control * __attribute__ ((unused))
++trivfs_begin_using_control_payload (unsigned long payload)
++{
++ if (trivfs_cntl_nportclasses + trivfs_num_dynamic_control_port_classes > 1)
++ {
++ struct port_info *pi = ports_lookup_payload (NULL, payload, NULL);
++ int i;
++
++ if (pi)
++ {
++ for (i = 0; i < trivfs_cntl_nportclasses; i++)
++ if (pi->class == trivfs_cntl_portclasses[i])
++ return (struct trivfs_control *) pi;
++ for (i = 0; i < trivfs_num_dynamic_control_port_classes; i++)
++ if (pi->class == trivfs_dynamic_control_port_classes[i])
++ return (struct trivfs_control *) pi;
++ ports_port_deref (pi);
++ }
++
++ return NULL;
++ }
++ else if (trivfs_cntl_nportclasses == 1)
++ return ports_lookup_payload (NULL, payload,
++ trivfs_cntl_portclasses[0]);
++ else
++ return ports_lookup_payload (NULL, payload,
++ trivfs_dynamic_control_port_classes[0]);
++}
++
+ static inline void __attribute__ ((unused))
+ trivfs_end_using_control (struct trivfs_control *cred)
+ {
+diff --git a/libtrivfs/mig-mutate.h b/libtrivfs/mig-mutate.h
+index cc15d38..dcbebf6 100644
+--- a/libtrivfs/mig-mutate.h
++++ b/libtrivfs/mig-mutate.h
+@@ -20,13 +20,16 @@
+ #define REPLY_PORTS
+
+ #define FILE_INTRAN trivfs_protid_t trivfs_begin_using_protid (file_t)
++#define FILE_INTRAN_PAYLOAD trivfs_protid_t trivfs_begin_using_protid_payload
+ #define FILE_DESTRUCTOR trivfs_end_using_protid (trivfs_protid_t)
+ #define FILE_IMPORTS import "libtrivfs/mig-decls.h";
+
+ #define IO_INTRAN trivfs_protid_t trivfs_begin_using_protid (io_t)
++#define IO_INTRAN_PAYLOAD trivfs_protid_t trivfs_begin_using_protid_payload
+ #define IO_DESTRUCTOR trivfs_end_using_protid (trivfs_protid_t)
+ #define IO_IMPORTS import "libtrivfs/mig-decls.h";
+
+ #define FSYS_INTRAN trivfs_control_t trivfs_begin_using_control (fsys_t)
++#define FSYS_INTRAN_PAYLOAD trivfs_control_t trivfs_begin_using_control_payload
+ #define FSYS_DESTRUCTOR trivfs_end_using_control (trivfs_control_t)
+ #define FSYS_IMPORTS import "libtrivfs/mig-decls.h";
+--
+2.1.3
+
diff --git a/debian/patches/0007-libpager-add-a-payload-aware-intrans-function.patch b/debian/patches/0007-libpager-add-a-payload-aware-intrans-function.patch
new file mode 100644
index 00000000..64961849
--- /dev/null
+++ b/debian/patches/0007-libpager-add-a-payload-aware-intrans-function.patch
@@ -0,0 +1,51 @@
+From 1cafbbf8d116b131cb41f734d4feb65560ac5034 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Fri, 4 Apr 2014 14:19:59 +0200
+Subject: [PATCH hurd 07/28] libpager: add a payload-aware intrans function
+
+* libpager/mig-decls.h (begin_using_pager_payload): New function.
+* libpager/mig-mutate.h: Add mutators.
+---
+ libpager/mig-decls.h | 6 ++++++
+ libpager/mig-mutate.h | 3 +++
+ 2 files changed, 9 insertions(+)
+
+diff --git a/libpager/mig-decls.h b/libpager/mig-decls.h
+index 0c7b402..7e6b64f 100644
+--- a/libpager/mig-decls.h
++++ b/libpager/mig-decls.h
+@@ -32,6 +32,12 @@ begin_using_pager (mach_port_t port)
+ return ports_lookup_port (0, port, _pager_class);
+ }
+
++static inline struct pager * __attribute__ ((unused))
++begin_using_pager_payload (unsigned long payload)
++{
++ return ports_lookup_payload (0, payload, _pager_class);
++}
++
+ static inline void __attribute__ ((unused))
+ end_using_pager (struct pager *p)
+ {
+diff --git a/libpager/mig-mutate.h b/libpager/mig-mutate.h
+index 9e9065f..c4f30ce 100644
+--- a/libpager/mig-mutate.h
++++ b/libpager/mig-mutate.h
+@@ -18,11 +18,14 @@
+ along with the GNU Hurd. If not, see <http://www.gnu.org/licenses/>. */
+
+ #define MEMORY_OBJECT_INTRAN pager_t begin_using_pager (memory_object_t)
++#define MEMORY_OBJECT_INTRAN_PAYLOAD pager_t begin_using_pager_payload
+ #define MEMORY_OBJECT_DESTRUCTOR end_using_pager (pager_t)
+ #define MEMORY_OBJECT_IMPORTS import "mig-decls.h";
+
+ #define NOTIFY_INTRAN \
+ port_info_t begin_using_port_info_port (mach_port_t)
++#define NOTIFY_INTRAN_PAYLOAD \
++ port_info_t begin_using_port_info_payload
+ #define NOTIFY_DESTRUCTOR \
+ end_using_port_info (port_info_t)
+ #define NOTIFY_IMPORTS \
+--
+2.1.3
+
diff --git a/debian/patches/0008-libcons-add-a-payload-aware-intrans-function.patch b/debian/patches/0008-libcons-add-a-payload-aware-intrans-function.patch
new file mode 100644
index 00000000..1480f324
--- /dev/null
+++ b/debian/patches/0008-libcons-add-a-payload-aware-intrans-function.patch
@@ -0,0 +1,44 @@
+From e36f31c6aecdc4ac1653b18aa99c23c0bba62e37 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 14:12:25 +0100
+Subject: [PATCH hurd 08/28] libcons: add a payload-aware intrans function
+
+* libcons/mutations.h: Add mutator.
+* libcons/priv.h (begin_using_notify_payload): New function.
+---
+ libcons/mutations.h | 1 +
+ libcons/priv.h | 6 ++++++
+ 2 files changed, 7 insertions(+)
+
+diff --git a/libcons/mutations.h b/libcons/mutations.h
+index c895447..4751340 100644
+--- a/libcons/mutations.h
++++ b/libcons/mutations.h
+@@ -21,6 +21,7 @@
+ /* Only CPP macro definitions should go in this file. */
+
+ #define FS_NOTIFY_INTRAN cons_notify_t begin_using_notify_port (fs_notify_t)
++#define FS_NOTIFY_INTRAN_PAYLOAD cons_notify_t begin_using_notify_payload
+ #define FS_NOTIFY_DESTRUCTOR end_using_notify_port (cons_notify_t)
+
+ #define FS_NOTIFY_IMPORTS import "priv.h";
+diff --git a/libcons/priv.h b/libcons/priv.h
+index 38971ff..6cdf3db 100644
+--- a/libcons/priv.h
++++ b/libcons/priv.h
+@@ -80,6 +80,12 @@ begin_using_notify_port (fs_notify_t port)
+ return ports_lookup_port (cons_port_bucket, port, cons_port_class);
+ }
+
++static inline cons_notify_t
++begin_using_notify_payload (unsigned long payload)
++{
++ return ports_lookup_payload (cons_port_bucket, payload, cons_port_class);
++}
++
+ /* Called by MiG after server routines have been run; this balances
+ begin_using_notify_port, and is arranged for the fs_notify
+ interfaces by mutations.h. */
+--
+2.1.3
+
diff --git a/debian/patches/0009-auth-add-a-payload-aware-intrans-function.patch b/debian/patches/0009-auth-add-a-payload-aware-intrans-function.patch
new file mode 100644
index 00000000..225f1264
--- /dev/null
+++ b/debian/patches/0009-auth-add-a-payload-aware-intrans-function.patch
@@ -0,0 +1,43 @@
+From 74f2d9a3a4b74b8e4984348d34cb9c920fc86570 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 14:43:31 +0100
+Subject: [PATCH hurd 09/28] auth: add a payload-aware intrans function
+
+* auth/mig-mutate.h: Add mutator.
+* auth/mig-decls.h (auth_payload_to_handle): New function.
+---
+ auth/mig-decls.h | 6 ++++++
+ auth/mig-mutate.h | 1 +
+ 2 files changed, 7 insertions(+)
+
+diff --git a/auth/mig-decls.h b/auth/mig-decls.h
+index 09c7c70..fa7b06d 100644
+--- a/auth/mig-decls.h
++++ b/auth/mig-decls.h
+@@ -32,6 +32,12 @@ auth_port_to_handle (mach_port_t auth)
+ return ports_lookup_port (auth_bucket, auth, authhandle_portclass);
+ }
+
++static inline struct authhandle * __attribute__ ((unused))
++auth_payload_to_handle (unsigned long payload)
++{
++ return ports_lookup_payload (auth_bucket, payload, authhandle_portclass);
++}
++
+ static inline void __attribute__ ((unused))
+ end_using_authhandle (struct authhandle *auth)
+ {
+diff --git a/auth/mig-mutate.h b/auth/mig-mutate.h
+index ea40c70..5cc8914 100644
+--- a/auth/mig-mutate.h
++++ b/auth/mig-mutate.h
+@@ -20,5 +20,6 @@
+ /* CPP definitions for MiG processing of auth.defs for auth server. */
+
+ #define AUTH_INTRAN authhandle_t auth_port_to_handle (auth_t)
++#define AUTH_INTRAN_PAYLOAD authhandle_t auth_payload_to_handle
+ #define AUTH_DESTRUCTOR end_using_authhandle (authhandle_t)
+ #define AUTH_IMPORTS import "mig-decls.h";
+--
+2.1.3
+
diff --git a/debian/patches/0010-console-add-a-payload-aware-intrans-function.patch b/debian/patches/0010-console-add-a-payload-aware-intrans-function.patch
new file mode 100644
index 00000000..bac472b6
--- /dev/null
+++ b/debian/patches/0010-console-add-a-payload-aware-intrans-function.patch
@@ -0,0 +1,52 @@
+From 928ba7f02e91f2bc64a8ffa1bb7bcd8cc2fe4a56 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 10:40:56 +0100
+Subject: [PATCH hurd 10/28] console: add a payload-aware intrans function
+
+* console/priv.h (begin_using_protid_payload): New function.
+* console/mutations.h: Add mutators.
+---
+ console/mutations.h | 3 +++
+ libnetfs/priv.h | 6 ++++++
+ 2 files changed, 9 insertions(+)
+
+diff --git a/console/mutations.h b/console/mutations.h
+index 4e1cc7e..87906cc 100644
+--- a/console/mutations.h
++++ b/console/mutations.h
+@@ -21,12 +21,15 @@
+ /* Only CPP macro definitions should go in this file. */
+
+ #define IO_INTRAN protid_t begin_using_protid_port (io_t)
++#define IO_INTRAN_PAYLOAD protid_t begin_using_protid_payload
+ #define IO_DESTRUCTOR end_using_protid_port (protid_t)
+
+ #define TIOCTL_IMPORTS import "libnetfs/priv.h";
+
+ #define NOTIFY_INTRAN \
+ port_info_t begin_using_port_info_port (mach_port_t)
++#define NOTIFY_INTRAN_PAYLOAD \
++ port_info_t begin_using_port_info_payload
+ #define NOTIFY_DESTRUCTOR \
+ end_using_port_info (port_info_t)
+ #define NOTIFY_IMPORTS \
+diff --git a/libnetfs/priv.h b/libnetfs/priv.h
+index 36c8f53..3c5bcd4 100644
+--- a/libnetfs/priv.h
++++ b/libnetfs/priv.h
+@@ -31,6 +31,12 @@ begin_using_protid_port (file_t port)
+ return ports_lookup_port (netfs_port_bucket, port, netfs_protid_class);
+ }
+
++static inline struct protid * __attribute__ ((unused))
++begin_using_protid_payload (unsigned long payload)
++{
++ return ports_lookup_payload (netfs_port_bucket, payload, netfs_protid_class);
++}
++
+ static inline void __attribute__ ((unused))
+ end_using_protid_port (struct protid *cred)
+ {
+--
+2.1.3
+
diff --git a/debian/patches/0011-console-client-make-the-demuxer-payload-aware.patch b/debian/patches/0011-console-client-make-the-demuxer-payload-aware.patch
new file mode 100644
index 00000000..7e2aed27
--- /dev/null
+++ b/debian/patches/0011-console-client-make-the-demuxer-payload-aware.patch
@@ -0,0 +1,36 @@
+From 445eb03674d068963456eb4eb1085c5f245b33f7 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Fri, 4 Apr 2014 16:53:25 +0200
+Subject: [PATCH hurd 11/28] console-client: make the demuxer payload-aware
+
+* console-client/trans.c (console_demuxer): make the demuxer payload-aware.
+---
+ console-client/trans.c | 12 ++++++++++--
+ 1 file changed, 10 insertions(+), 2 deletions(-)
+
+diff --git a/console-client/trans.c b/console-client/trans.c
+index 67cd149..224229e 100644
+--- a/console-client/trans.c
++++ b/console-client/trans.c
+@@ -63,8 +63,16 @@ console_demuxer (mach_msg_header_t *inp,
+ ret = netfs_demuxer (inp, outp);
+ if (ret)
+ return ret;
+-
+- user = ports_lookup_port (netfs_port_bucket, inop->msgh_local_port, netfs_protid_class);
++
++ if (MACH_MSGH_BITS_LOCAL (inp->msgh_bits) ==
++ MACH_MSG_TYPE_PROTECTED_PAYLOAD)
++ user = ports_lookup_payload (netfs_port_bucket,
++ inop->msgh_protected_payload,
++ netfs_protid_class);
++ else
++ user = ports_lookup_port (netfs_port_bucket,
++ inop->msgh_local_port,
++ netfs_protid_class);
+ if (!user)
+ return ret;
+
+--
+2.1.3
+
diff --git a/debian/patches/0012-exec-add-payload-aware-intrans-functions.patch b/debian/patches/0012-exec-add-payload-aware-intrans-functions.patch
new file mode 100644
index 00000000..b9aa41fd
--- /dev/null
+++ b/debian/patches/0012-exec-add-payload-aware-intrans-functions.patch
@@ -0,0 +1,53 @@
+From 11bcfb23a9de36ad424d050a705dd8b37dbd5ff2 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 11:08:39 +0100
+Subject: [PATCH hurd 12/28] exec: add payload-aware intrans functions
+
+* exec/execmutations.h: Add mutators.
+* exec/mig-decls.h (begin_using_bootinfo_payload): New function.
+---
+ exec/execmutations.h | 3 +++
+ exec/mig-decls.h | 6 ++++++
+ 2 files changed, 9 insertions(+)
+
+diff --git a/exec/execmutations.h b/exec/execmutations.h
+index 2acca7a..0b5b8bb 100644
+--- a/exec/execmutations.h
++++ b/exec/execmutations.h
+@@ -1,6 +1,7 @@
+ /* CPP definitions for MiG processing of exec.defs for exec server. */
+
+ #define FILE_INTRAN trivfs_protid_t trivfs_begin_using_protid (file_t)
++#define FILE_INTRAN_PAYLOAD trivfs_protid_t trivfs_begin_using_protid_payload
+ #define FILE_DESTRUCTOR trivfs_end_using_protid (trivfs_protid_t)
+
+ #define EXEC_IMPORTS \
+@@ -9,6 +10,8 @@
+
+ #define EXEC_STARTUP_INTRAN \
+ bootinfo_t begin_using_bootinfo_port (exec_startup_t)
++#define EXEC_STARTUP_INTRAN_PAYLOAD \
++ bootinfo_t begin_using_bootinfo_payload
+ #define EXEC_STARTUP_DESTRUCTOR \
+ end_using_bootinfo (bootinfo_t)
+ #define EXEC_STARTUP_IMPORTS \
+diff --git a/exec/mig-decls.h b/exec/mig-decls.h
+index 0437414..cf3e17d 100644
+--- a/exec/mig-decls.h
++++ b/exec/mig-decls.h
+@@ -30,6 +30,12 @@ begin_using_bootinfo_port (mach_port_t port)
+ return ports_lookup_port (port_bucket, port, execboot_portclass);
+ }
+
++static inline struct bootinfo * __attribute__ ((unused))
++begin_using_bootinfo_payload (unsigned long payload)
++{
++ return ports_lookup_payload (port_bucket, payload, execboot_portclass);
++}
++
+ static inline void __attribute__ ((unused))
+ end_using_bootinfo (struct bootinfo *b)
+ {
+--
+2.1.3
+
diff --git a/debian/patches/0013-pfinet-add-payload-aware-intrans-functions.patch b/debian/patches/0013-pfinet-add-payload-aware-intrans-functions.patch
new file mode 100644
index 00000000..7cde5c1e
--- /dev/null
+++ b/debian/patches/0013-pfinet-add-payload-aware-intrans-functions.patch
@@ -0,0 +1,73 @@
+From 9b34b8da7e4f3a0378b864e649c0345b43ff2b63 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 11:10:20 +0100
+Subject: [PATCH hurd 13/28] pfinet: add payload-aware intrans functions
+
+* pfinet/mig-mutate.h: Add mutators.
+* pfinet/mig-decls.h (begin_using_socket_payload): New function.
+(begin_using_sockaddr_payload): Likewise.
+---
+ pfinet/mig-decls.h | 12 ++++++++++++
+ pfinet/mig-mutate.h | 4 ++++
+ 2 files changed, 16 insertions(+)
+
+diff --git a/pfinet/mig-decls.h b/pfinet/mig-decls.h
+index ec8fb23..67bcbfc 100644
+--- a/pfinet/mig-decls.h
++++ b/pfinet/mig-decls.h
+@@ -32,6 +32,12 @@ begin_using_socket_port (mach_port_t port)
+ return ports_lookup_port (pfinet_bucket, port, socketport_class);
+ }
+
++static inline struct sock_user * __attribute__ ((unused))
++begin_using_socket_payload (unsigned long payload)
++{
++ return ports_lookup_payload (pfinet_bucket, payload, socketport_class);
++}
++
+ static inline void __attribute__ ((unused))
+ end_using_socket_port (struct sock_user *user)
+ {
+@@ -45,6 +51,12 @@ begin_using_sockaddr_port (mach_port_t port)
+ return ports_lookup_port (pfinet_bucket, port, addrport_class);
+ }
+
++static inline struct sock_addr * __attribute__ ((unused))
++begin_using_sockaddr_payload (unsigned long payload)
++{
++ return ports_lookup_payload (pfinet_bucket, payload, addrport_class);
++}
++
+ static inline void __attribute__ ((unused))
+ end_using_sockaddr_port (struct sock_addr *addr)
+ {
+diff --git a/pfinet/mig-mutate.h b/pfinet/mig-mutate.h
+index 0a1eeb8..2bc385b 100644
+--- a/pfinet/mig-mutate.h
++++ b/pfinet/mig-mutate.h
+@@ -23,18 +23,22 @@
+ #define IO_SELECT_REPLY_PORT
+
+ #define IO_INTRAN sock_user_t begin_using_socket_port (io_t)
++#define IO_INTRAN_PAYLOAD sock_user_t begin_using_socket_payload
+ #define IO_DESTRUCTOR end_using_socket_port (sock_user_t)
+ #define IO_IMPORTS import "mig-decls.h";
+ #define IIOCTL_IMPORTS import "mig-decls.h";
+
+ #define SOCKET_INTRAN sock_user_t begin_using_socket_port (socket_t)
++#define SOCKET_INTRAN_PAYLOAD sock_user_t begin_using_socket_payload
+ #define SOCKET_DESTRUCTOR end_using_socket_port (sock_user_t)
+ #define SOCKET_IMPORTS \
+ import "mig-decls.h"; \
+ import "../libtrivfs/mig-decls.h"; \
+
+ #define ADDRPORT_INTRAN sock_addr_t begin_using_sockaddr_port (addr_port_t)
++#define ADDRPORT_INTRAN_PAYLOAD sock_addr_t begin_using_sockaddr_payload
+ #define ADDRPORT_DESTRUCTOR end_using_sockaddr_port (sock_addr_t)
+
+ #define PF_INTRAN trivfs_protid_t trivfs_begin_using_protid (pf_t)
++#define PF_INTRAN_PAYLOAD trivfs_protid_t trivfs_begin_using_protid_payload
+ #define PF_DESTRUCTOR trivfs_end_using_protid (trivfs_protid_t)
+--
+2.1.3
+
diff --git a/debian/patches/0014-pfinet-make-the-demuxers-payload-aware.patch b/debian/patches/0014-pfinet-make-the-demuxers-payload-aware.patch
new file mode 100644
index 00000000..2ec833f4
--- /dev/null
+++ b/debian/patches/0014-pfinet-make-the-demuxers-payload-aware.patch
@@ -0,0 +1,74 @@
+From 09be8ecd3a467ab1772f9fd533212afaefd1e814 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Sun, 13 Apr 2014 14:03:48 +0200
+Subject: [PATCH hurd 14/28] pfinet: make the demuxers payload-aware
+
+* pfinet/ethernet.c (ethernet_demuxer): Make the demuxer payload-aware.
+* pfinet/main.c (pfinet_demuxer): Likewise.
+---
+ pfinet/ethernet.c | 20 +++++++++++++++++++-
+ pfinet/main.c | 12 ++++++++++--
+ 2 files changed, 29 insertions(+), 3 deletions(-)
+
+diff --git a/pfinet/ethernet.c b/pfinet/ethernet.c
+index 053fd1b..1678243 100644
+--- a/pfinet/ethernet.c
++++ b/pfinet/ethernet.c
+@@ -116,12 +116,30 @@ ethernet_demuxer (mach_msg_header_t *inp,
+ int datalen;
+ struct ether_device *edev;
+ struct device *dev = 0;
++ mach_port_t local_port;
+
+ if (inp->msgh_id != NET_RCV_MSG_ID)
+ return 0;
+
++ if (MACH_MSGH_BITS_LOCAL (inp->msgh_bits) ==
++ MACH_MSG_TYPE_PROTECTED_PAYLOAD)
++ {
++ struct port_info *pi = ports_lookup_payload (NULL,
++ inp->msgh_protected_payload,
++ NULL);
++ if (pi)
++ {
++ local_port = pi->port_right;
++ ports_port_deref (pi);
++ }
++ else
++ local_port = MACH_PORT_NULL;
++ }
++ else
++ local_port = inp->msgh_local_port;
++
+ for (edev = ether_dev; edev; edev = edev->next)
+- if (inp->msgh_local_port == edev->readptname)
++ if (local_port == edev->readptname)
+ dev = &edev->dev;
+
+ if (! dev)
+diff --git a/pfinet/main.c b/pfinet/main.c
+index 0f1fbfc..8716fdb 100644
+--- a/pfinet/main.c
++++ b/pfinet/main.c
+@@ -86,8 +86,16 @@ pfinet_demuxer (mach_msg_header_t *inp,
+
+ /* We have several classes in one bucket, which need to be demuxed
+ differently. */
+- pi = ports_lookup_port(pfinet_bucket, inp->msgh_local_port, socketport_class);
+-
++ if (MACH_MSGH_BITS_LOCAL (inp->msgh_bits) ==
++ MACH_MSG_TYPE_PROTECTED_PAYLOAD)
++ pi = ports_lookup_payload (pfinet_bucket,
++ inp->msgh_protected_payload,
++ socketport_class);
++ else
++ pi = ports_lookup_port (pfinet_bucket,
++ inp->msgh_local_port,
++ socketport_class);
++
+ if (pi)
+ {
+ ports_port_deref (pi);
+--
+2.1.3
+
diff --git a/debian/patches/0015-pflocal-add-payload-aware-intrans-functions.patch b/debian/patches/0015-pflocal-add-payload-aware-intrans-functions.patch
new file mode 100644
index 00000000..69deb1a4
--- /dev/null
+++ b/debian/patches/0015-pflocal-add-payload-aware-intrans-functions.patch
@@ -0,0 +1,67 @@
+From c1466449b07279e97488459cb05869b9168d681f Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 11:13:29 +0100
+Subject: [PATCH hurd 15/28] pflocal: add payload-aware intrans functions
+
+* pflocal/mig-mutate.h: Add mutators.
+* pflocal/mig-decls.c (begin_using_sock_user_payload): New function.
+(begin_using_addr_payload): Likewise.
+---
+ pflocal/mig-decls.h | 12 ++++++++++++
+ pflocal/mig-mutate.h | 3 +++
+ 2 files changed, 15 insertions(+)
+
+diff --git a/pflocal/mig-decls.h b/pflocal/mig-decls.h
+index 983de9d..b1da797 100644
+--- a/pflocal/mig-decls.h
++++ b/pflocal/mig-decls.h
+@@ -36,6 +36,12 @@ begin_using_sock_user_port(mach_port_t port)
+ return (sock_user_t)ports_lookup_port (0, port, sock_user_port_class);
+ }
+
++static inline sock_user_t __attribute__ ((unused))
++begin_using_sock_user_payload (unsigned long payload)
++{
++ return ports_lookup_payload (NULL, payload, sock_user_port_class);
++}
++
+ static inline void __attribute__ ((unused))
+ end_using_sock_user_port (sock_user_t sock_user)
+ {
+@@ -49,6 +55,12 @@ begin_using_addr_port(mach_port_t port)
+ return (addr_t)ports_lookup_port (0, port, addr_port_class);
+ }
+
++static inline addr_t __attribute__ ((unused))
++begin_using_addr_payload (unsigned long payload)
++{
++ return ports_lookup_port (NULL, payload, addr_port_class);
++}
++
+ static inline void __attribute__ ((unused))
+ end_using_addr_port (addr_t addr)
+ {
+diff --git a/pflocal/mig-mutate.h b/pflocal/mig-mutate.h
+index b149473..238c806 100644
+--- a/pflocal/mig-mutate.h
++++ b/pflocal/mig-mutate.h
+@@ -21,13 +21,16 @@
+ #define IO_SELECT_REPLY_PORT
+
+ #define IO_INTRAN sock_user_t begin_using_sock_user_port (io_t)
++#define IO_INTRAN_PAYLOAD sock_user_t begin_using_sock_user_payload
+ #define IO_DESTRUCTOR end_using_sock_user_port (sock_user_t)
+
+ #define IO_IMPORTS import "mig-decls.h";
+
+ #define SOCKET_INTRAN sock_user_t begin_using_sock_user_port (socket_t)
++#define SOCKET_INTRAN_PAYLOAD sock_user_t begin_using_sock_user_payload
+ #define SOCKET_DESTRUCTOR end_using_sock_user_port (sock_user_t)
+ #define ADDRPORT_INTRAN addr_t begin_using_addr_port (addr_port_t)
++#define ADDRPORT_INTRAN_PAYLOAD addr_t begin_using_addr_payload
+ #define ADDRPORT_DESTRUCTOR end_using_addr_port (addr_t)
+
+ #define SOCKET_IMPORTS import "mig-decls.h";
+--
+2.1.3
+
diff --git a/debian/patches/0016-proc-add-payload-aware-intrans-functions.patch b/debian/patches/0016-proc-add-payload-aware-intrans-functions.patch
new file mode 100644
index 00000000..055133be
--- /dev/null
+++ b/debian/patches/0016-proc-add-payload-aware-intrans-functions.patch
@@ -0,0 +1,88 @@
+From 54d9dfbeefd2d427822cf74e8556044fb3626300 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 10:31:08 +0100
+Subject: [PATCH hurd 16/28] proc: add payload-aware intrans functions
+
+* proc/mig-decls.h (begin_using_proc_payload): New function.
+(begin_using_exc_payload): Likewise.
+* proc/mig-mutate.h: Add mutators.
+* proc/proc_exc.defs (exception_t): Add payload-aware in-translator
+function.
+---
+ proc/mig-decls.h | 17 +++++++++++++++++
+ proc/mig-mutate.h | 4 ++++
+ proc/proc_exc.defs | 1 +
+ 3 files changed, 22 insertions(+)
+
+diff --git a/proc/mig-decls.h b/proc/mig-decls.h
+index 7d36a87..eb33ef3 100644
+--- a/proc/mig-decls.h
++++ b/proc/mig-decls.h
+@@ -35,6 +35,17 @@ begin_using_proc_port (mach_port_t port)
+ return (!p || p->p_dead) ? NULL : p;
+ }
+
++static inline struct proc * __attribute__ ((unused))
++begin_using_proc_payload (unsigned long payload)
++{
++ struct proc *p;
++ p = ports_lookup_payload (proc_bucket, payload, proc_class);
++ if (p && p->p_dead)
++ ports_port_deref (p);
++ return (!p || p->p_dead) ? 0 : p;
++}
++
++
+ static inline void __attribute__ ((unused))
+ end_using_proc (struct proc *p)
+ {
+@@ -50,6 +61,12 @@ begin_using_exc_port (mach_port_t port)
+ return ports_lookup_port (NULL, port, exc_class);
+ }
+
++static inline exc_t __attribute__ ((unused))
++begin_using_exc_payload (unsigned long payload)
++{
++ return ports_lookup_payload (NULL, payload, exc_class);
++}
++
+ static inline void __attribute__ ((unused))
+ end_using_exc (exc_t exc)
+ {
+diff --git a/proc/mig-mutate.h b/proc/mig-mutate.h
+index ce9f88e..62dc2a5 100644
+--- a/proc/mig-mutate.h
++++ b/proc/mig-mutate.h
+@@ -20,6 +20,8 @@
+
+ #define PROCESS_INTRAN \
+ pstruct_t begin_using_proc_port (process_t)
++#define PROCESS_INTRAN_PAYLOAD \
++ pstruct_t begin_using_proc_payload
+ #define PROCESS_DESTRUCTOR \
+ end_using_proc (pstruct_t)
+ #define PROCESS_IMPORTS \
+@@ -27,6 +29,8 @@
+
+ #define NOTIFY_INTRAN \
+ port_info_t begin_using_port_info_port (mach_port_t)
++#define NOTIFY_INTRAN_PAYLOAD \
++ port_info_t begin_using_port_info_payload
+ #define NOTIFY_DESTRUCTOR \
+ end_using_port_info (port_info_t)
+ #define NOTIFY_IMPORTS \
+diff --git a/proc/proc_exc.defs b/proc/proc_exc.defs
+index c910824..9dc3626 100644
+--- a/proc/proc_exc.defs
++++ b/proc/proc_exc.defs
+@@ -38,6 +38,7 @@ import "mig-decls.h";
+ type exception_t = mach_port_copy_send_t
+ cusertype: mach_port_t
+ intran: exc_t begin_using_exc_port (exception_t)
++ intranpayload: exc_t begin_using_exc_payload
+ destructor: end_using_exc (exc_t);
+
+ routine proc_exception_raise (
+--
+2.1.3
+
diff --git a/debian/patches/0017-startup-disable-default-payload-to-port-mapping.patch b/debian/patches/0017-startup-disable-default-payload-to-port-mapping.patch
new file mode 100644
index 00000000..d205a128
--- /dev/null
+++ b/debian/patches/0017-startup-disable-default-payload-to-port-mapping.patch
@@ -0,0 +1,32 @@
+From b8ec92af4bb14115ad14bbfa14a3dbece34f1ff1 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 20:57:40 +0100
+Subject: [PATCH hurd 17/28] startup: disable default payload to port mapping
+
+startup does not use libports. Therefor, it is not necessary to use the
+default payload to port translation function.
+
+* startup/Makefile (MIGSFLAGS): Disable the default payload to port
+translation function.
+---
+ startup/Makefile | 4 ++++
+ 1 file changed, 4 insertions(+)
+
+diff --git a/startup/Makefile b/startup/Makefile
+index 23d35cb..ee2ecdd5 100644
+--- a/startup/Makefile
++++ b/startup/Makefile
+@@ -25,6 +25,10 @@ OBJS = $(SRCS:.c=.o) \
+ target = startup
+ HURDLIBS = shouldbeinlibc
+
++# startup does not use libports. Disable the default payload to port
++# conversion.
++MIGSFLAGS="-DHURD_DEFAULT_PAYLOAD_TO_PORT=1"
++
+ include ../Makeconf
+
+ mung_msg_S.h: msg_S.h
+--
+2.1.3
+
diff --git a/debian/patches/0018-term-add-a-payload-aware-intrans-function.patch b/debian/patches/0018-term-add-a-payload-aware-intrans-function.patch
new file mode 100644
index 00000000..600770a2
--- /dev/null
+++ b/debian/patches/0018-term-add-a-payload-aware-intrans-function.patch
@@ -0,0 +1,61 @@
+From 856c00ad058dec984e629a05d6f61a80cde14acc Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Mon, 14 Apr 2014 14:21:16 +0200
+Subject: [PATCH hurd 18/28] term: add a payload-aware intrans function
+
+* term/mig-mutate.h: Add mutator.
+---
+ term/Makefile | 1 +
+ term/mig-decls.h | 6 ++++++
+ term/mig-mutate.h | 3 +++
+ 3 files changed, 10 insertions(+)
+
+diff --git a/term/Makefile b/term/Makefile
+index 5006c0d..1419d2a 100644
+--- a/term/Makefile
++++ b/term/Makefile
+@@ -33,5 +33,6 @@ include ../Makeconf
+
+ device_replyServer-CPPFLAGS = -DTypeCheck=0 -Wno-unused # XXX
+
++device_reply-MIGSFLAGS = -DMACH_PAYLOAD_TO_PORT=ports_payload_get_name
+ tioctl-MIGSFLAGS = -imacros $(srcdir)/mig-mutate.h
+ term-MIGSFLAGS = -imacros $(srcdir)/mig-mutate.h
+diff --git a/term/mig-decls.h b/term/mig-decls.h
+index c91b133..09b45c6 100644
+--- a/term/mig-decls.h
++++ b/term/mig-decls.h
+@@ -32,6 +32,12 @@ begin_using_ctty_port (mach_port_t port)
+ return ports_lookup_port (term_bucket, port, cttyid_class);
+ }
+
++static inline struct port_info * __attribute__ ((unused))
++begin_using_ctty_payload (unsigned long payload)
++{
++ return ports_lookup_payload (term_bucket, payload, cttyid_class);
++}
++
+ static inline void __attribute__ ((unused))
+ end_using_ctty (struct port_info *p)
+ {
+diff --git a/term/mig-mutate.h b/term/mig-mutate.h
+index 1545719..af8877e 100644
+--- a/term/mig-mutate.h
++++ b/term/mig-mutate.h
+@@ -20,10 +20,13 @@
+ /* Only CPP macro definitions should go in this file. */
+
+ #define IO_INTRAN trivfs_protid_t trivfs_begin_using_protid (io_t)
++#define IO_INTRAN_PAYLOAD trivfs_protid_t trivfs_begin_using_protid_payload
+ #define IO_DESTRUCTOR trivfs_end_using_protid (trivfs_protid_t)
+
+ #define CTTY_INTRAN \
+ port_info_t begin_using_ctty_port (mach_port_t)
++#define CTTY_INTRAN_PAYLOAD \
++ port_info_t begin_using_ctty_payload
+ #define CTTY_DESTRUCTOR \
+ end_using_ctty (port_info_t)
+
+--
+2.1.3
+
diff --git a/debian/patches/0019-trans-fakeroot-make-the-demuxer-payload-aware.patch b/debian/patches/0019-trans-fakeroot-make-the-demuxer-payload-aware.patch
new file mode 100644
index 00000000..52c1b7df
--- /dev/null
+++ b/debian/patches/0019-trans-fakeroot-make-the-demuxer-payload-aware.patch
@@ -0,0 +1,48 @@
+From ee388ad55279fd8c0be5dfdb36961304c73512b7 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Sun, 23 Nov 2014 19:24:49 +0100
+Subject: [PATCH hurd 19/28] trans/fakeroot: make the demuxer payload-aware
+
+* trans/fakeroot.c (netfs_demuxer): Make the demuxer payload-aware.
+---
+ trans/fakeroot.c | 17 +++++++++++++----
+ 1 file changed, 13 insertions(+), 4 deletions(-)
+
+diff --git a/trans/fakeroot.c b/trans/fakeroot.c
+index df2de64..12173bd 100644
+--- a/trans/fakeroot.c
++++ b/trans/fakeroot.c
+@@ -964,9 +964,16 @@ netfs_demuxer (mach_msg_header_t *inp,
+ {
+ /* We didn't recognize the message ID, so pass the message through
+ unchanged to the underlying file. */
+- struct protid *cred = ports_lookup_port (netfs_port_bucket,
+- inp->msgh_local_port,
+- netfs_protid_class);
++ struct protid *cred;
++ if (MACH_MSGH_BITS_LOCAL (inp->msgh_bits) ==
++ MACH_MSG_TYPE_PROTECTED_PAYLOAD)
++ cred = ports_lookup_payload (netfs_port_bucket,
++ inp->msgh_protected_payload,
++ netfs_protid_class);
++ else
++ cred = ports_lookup_port (netfs_port_bucket,
++ inp->msgh_local_port,
++ netfs_protid_class);
+ if (cred == 0)
+ /* This must be an unknown message on our fsys control port. */
+ return 0;
+@@ -974,7 +981,9 @@ netfs_demuxer (mach_msg_header_t *inp,
+ {
+ error_t err;
+ assert (MACH_MSGH_BITS_LOCAL (inp->msgh_bits)
+- == MACH_MSG_TYPE_MOVE_SEND);
++ == MACH_MSG_TYPE_MOVE_SEND
++ || MACH_MSGH_BITS_LOCAL (inp->msgh_bits)
++ == MACH_MSG_TYPE_PROTECTED_PAYLOAD);
+ inp->msgh_bits = (inp->msgh_bits & MACH_MSGH_BITS_COMPLEX)
+ | MACH_MSGH_BITS (MACH_MSG_TYPE_COPY_SEND,
+ MACH_MSGH_BITS_REMOTE (inp->msgh_bits));
+--
+2.1.3
+
diff --git a/debian/patches/0020-trans-ifsock-add-a-payload-aware-intrans-function.patch b/debian/patches/0020-trans-ifsock-add-a-payload-aware-intrans-function.patch
new file mode 100644
index 00000000..56603ddb
--- /dev/null
+++ b/debian/patches/0020-trans-ifsock-add-a-payload-aware-intrans-function.patch
@@ -0,0 +1,25 @@
+From 7b96b43cdd6809af47ef23b9e6c63168c0130aae Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Sun, 13 Apr 2014 17:08:38 +0200
+Subject: [PATCH hurd 20/28] trans/ifsock: add a payload-aware intrans function
+
+* trans/Makefile (ifsock-MIGSFLAGS): Add mutator.
+---
+ trans/Makefile | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/trans/Makefile b/trans/Makefile
+index 71e6424..eecaeeb 100644
+--- a/trans/Makefile
++++ b/trans/Makefile
+@@ -39,6 +39,7 @@ password-MIGSFLAGS=\
+
+ ifsock-MIGSFLAGS=\
+ "-DFILE_INTRAN=trivfs_protid_t trivfs_begin_using_protid (io_t)" \
++ "-DFILE_INTRAN_PAYLOAD=trivfs_protid_t trivfs_begin_using_protid_payload" \
+ "-DFILE_DESTRUCTOR=trivfs_end_using_protid (trivfs_protid_t)" \
+ "-DIFSOCK_IMPORTS=import \"../libtrivfs/mig-decls.h\";"
+
+--
+2.1.3
+
diff --git a/debian/patches/0021-trans-password-add-a-payload-aware-intrans-function.patch b/debian/patches/0021-trans-password-add-a-payload-aware-intrans-function.patch
new file mode 100644
index 00000000..72f10f5c
--- /dev/null
+++ b/debian/patches/0021-trans-password-add-a-payload-aware-intrans-function.patch
@@ -0,0 +1,26 @@
+From a30e0ced6a227705241586dfc118fb8a81f795ab Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 16:51:42 +0100
+Subject: [PATCH hurd 21/28] trans/password: add a payload-aware intrans
+ function
+
+* trans/Makefile (password-MIGSFLAGS): Add mutator.
+---
+ trans/Makefile | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/trans/Makefile b/trans/Makefile
+index eecaeeb..04fd276 100644
+--- a/trans/Makefile
++++ b/trans/Makefile
+@@ -34,6 +34,7 @@ LDLIBS += -lpthread
+ password-LDLIBS = -lcrypt
+ password-MIGSFLAGS=\
+ "-DIO_INTRAN=trivfs_protid_t trivfs_begin_using_protid (io_t)" \
++ "-DIO_INTRAN_PAYLOAD=trivfs_protid_t trivfs_begin_using_protid_payload" \
+ "-DIO_DESTRUCTOR=trivfs_end_using_protid (trivfs_protid_t)" \
+ "-DPASSWORD_IMPORTS=import \"../libtrivfs/mig-decls.h\";"
+
+--
+2.1.3
+
diff --git a/debian/patches/0022-trans-streamio-make-the-translator-payload-aware.patch b/debian/patches/0022-trans-streamio-make-the-translator-payload-aware.patch
new file mode 100644
index 00000000..f380b702
--- /dev/null
+++ b/debian/patches/0022-trans-streamio-make-the-translator-payload-aware.patch
@@ -0,0 +1,27 @@
+From 0b6e61e8a879fa696351831c9176826fa9eb6d91 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Fri, 21 Nov 2014 05:29:36 +0100
+Subject: [PATCH hurd 22/28] trans/streamio: make the translator payload-aware
+
+* trans/Makefile (device_reply-MIGSFLAGS): Define MACH_PAYLOAD_TO_PORT.
+---
+ trans/Makefile | 3 +++
+ 1 file changed, 3 insertions(+)
+
+diff --git a/trans/Makefile b/trans/Makefile
+index 04fd276..b6edb97 100644
+--- a/trans/Makefile
++++ b/trans/Makefile
+@@ -44,6 +44,9 @@ ifsock-MIGSFLAGS=\
+ "-DFILE_DESTRUCTOR=trivfs_end_using_protid (trivfs_protid_t)" \
+ "-DIFSOCK_IMPORTS=import \"../libtrivfs/mig-decls.h\";"
+
++# device_replyServer is used by the streamio translator.
++device_reply-MIGSFLAGS="-DMACH_PAYLOAD_TO_PORT=ports_payload_get_name"
++
+ include ../Makeconf
+
+ vpath elfcore.c $(top_srcdir)/exec
+--
+2.1.3
+
diff --git a/debian/patches/0023-trans-symlink-disable-default-payload-to-port-mappin.patch b/debian/patches/0023-trans-symlink-disable-default-payload-to-port-mappin.patch
new file mode 100644
index 00000000..7d3688a8
--- /dev/null
+++ b/debian/patches/0023-trans-symlink-disable-default-payload-to-port-mappin.patch
@@ -0,0 +1,34 @@
+From 79e0ee0fab3b79b64c4bb1d15d30af67622b9631 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 21:00:48 +0100
+Subject: [PATCH hurd 23/28] trans/symlink: disable default payload to port
+ mapping
+
+`fsysServer' is only used by the symlink translator which does not use
+libports. Therefor, it is not necessary to use the default payload to
+port translation function.
+
+* trans/Makefile (fsys-MIGSFLAGS): Disable the default payload to port
+translation function.
+---
+ trans/Makefile | 4 ++++
+ 1 file changed, 4 insertions(+)
+
+diff --git a/trans/Makefile b/trans/Makefile
+index b6edb97..ce1eae7 100644
+--- a/trans/Makefile
++++ b/trans/Makefile
+@@ -47,6 +47,10 @@ ifsock-MIGSFLAGS=\
+ # device_replyServer is used by the streamio translator.
+ device_reply-MIGSFLAGS="-DMACH_PAYLOAD_TO_PORT=ports_payload_get_name"
+
++# fsysServer is only used by the symlink translator which does not use
++# libports. Disable the default payload to port conversion.
++fsys-MIGSFLAGS = "-DHURD_DEFAULT_PAYLOAD_TO_PORT=1"
++
+ include ../Makeconf
+
+ vpath elfcore.c $(top_srcdir)/exec
+--
+2.1.3
+
diff --git a/debian/patches/0024-utils-rpctrace-make-trace_and_forward-payload-aware.patch b/debian/patches/0024-utils-rpctrace-make-trace_and_forward-payload-aware.patch
new file mode 100644
index 00000000..ed0a4274
--- /dev/null
+++ b/debian/patches/0024-utils-rpctrace-make-trace_and_forward-payload-aware.patch
@@ -0,0 +1,65 @@
+From 2f8b47d3c7d991f9f030dd688b2bffb2f228d48a Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 12:21:49 +0100
+Subject: [PATCH hurd 24/28] utils/rpctrace: make `trace_and_forward'
+ payload-aware
+
+As the protected payloads were retrofitted into the Mach message
+format, the local port type is lost.
+
+* utils/rpctrace.c (is_notification): New function
+(trace_and_forward): Recover the original local port type.
+---
+ utils/rpctrace.c | 29 ++++++++++++++++++++++++++++-
+ 1 file changed, 28 insertions(+), 1 deletion(-)
+
+diff --git a/utils/rpctrace.c b/utils/rpctrace.c
+index c954e51..62d3c87 100644
+--- a/utils/rpctrace.c
++++ b/utils/rpctrace.c
+@@ -1195,6 +1195,16 @@ wrap_new_task (mach_msg_header_t *inp, struct req_info *req)
+ ports_port_deref (task_wrapper1);
+ }
+
++/* Returns true if the given message is a Mach notification. */
++static inline int
++is_notification (const mach_msg_header_t *InHeadP)
++{
++ int msgh_id = InHeadP->msgh_id - 64;
++ if ((msgh_id > 8) || (msgh_id < 0))
++ return 0;
++ return 1;
++}
++
+ int
+ trace_and_forward (mach_msg_header_t *inp, mach_msg_header_t *outp)
+ {
+@@ -1219,7 +1229,24 @@ trace_and_forward (mach_msg_header_t *inp, mach_msg_header_t *outp)
+ /* Look up our record for the receiving port. There is no need to check
+ the class, because our port bucket only ever contains one class of
+ ports (traced_class). */
+- info = ports_lookup_port (traced_bucket, inp->msgh_local_port, 0);
++
++ if (MACH_MSGH_BITS_LOCAL (inp->msgh_bits) == MACH_MSG_TYPE_PROTECTED_PAYLOAD)
++ {
++ info = ports_lookup_payload (traced_bucket, inp->msgh_protected_payload,
++ NULL);
++ if (info)
++ {
++ /* Undo the protected payload optimization. */
++ inp->msgh_bits = MACH_MSGH_BITS (
++ MACH_MSGH_BITS_REMOTE (inp->msgh_bits),
++ is_notification (inp)? MACH_MSG_TYPE_MOVE_SEND_ONCE: info->type)
++ | MACH_MSGH_BITS_OTHER (inp->msgh_bits);
++ inp->msgh_local_port = ports_payload_get_name (info);
++ }
++ }
++ else
++ info = ports_lookup_port (traced_bucket, inp->msgh_local_port, NULL);
++
+ assert (info);
+
+ /* A notification message from the kernel appears to have been sent
+--
+2.1.3
+
diff --git a/debian/patches/0025-hurd-add-intranpayload-functions-to-all-hurd-types.patch b/debian/patches/0025-hurd-add-intranpayload-functions-to-all-hurd-types.patch
new file mode 100644
index 00000000..7ec5c0d9
--- /dev/null
+++ b/debian/patches/0025-hurd-add-intranpayload-functions-to-all-hurd-types.patch
@@ -0,0 +1,280 @@
+From abf2968653b3faa82f623b99d20de64f69c8d5e6 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Thu, 28 Nov 2013 10:24:26 +0100
+Subject: [PATCH hurd 25/28] hurd: add intranpayload functions to all hurd
+ types
+
+For each hurd type defined in hurd_types.h, add a intranpayload
+function. If an X_INTRAN mutation is defined for a type, a
+corresponding X_INTRAN_PAYLOAD has to be defined. If no X_INTRAN
+mutation is defined, use ports_payload_get_name as intranpayload
+function, turning the payload back into an port name.
+
+* hurd/hurd_types.defs: Add intranpayload functions.
+* hurd/term.defs: Likewise.
+* hurd/default_pager.defs: Include `hurd_types.defs' for
+`MACH_PAYLOAD_TO_PORT'.
+---
+ hurd/default_pager.defs | 1 +
+ hurd/hurd_types.defs | 120 +++++++++++++++++++++++++++++++++++++++++++++++-
+ hurd/term.defs | 3 ++
+ 3 files changed, 123 insertions(+), 1 deletion(-)
+
+diff --git a/hurd/default_pager.defs b/hurd/default_pager.defs
+index 1a4290d..a97bff2 100644
+--- a/hurd/default_pager.defs
++++ b/hurd/default_pager.defs
+@@ -29,6 +29,7 @@
+
+ subsystem default_pager 2275;
+
++#include <hurd/hurd_types.defs> /* For `MACH_PAYLOAD_TO_PORT'. */
+ #include <mach/std_types.defs>
+ #include <mach/mach_types.defs>
+ #include <mach/default_pager_types.defs>
+diff --git a/hurd/hurd_types.defs b/hurd/hurd_types.defs
+index 129a68c..57af6dc 100644
+--- a/hurd/hurd_types.defs
++++ b/hurd/hurd_types.defs
+@@ -18,13 +18,67 @@ along with the GNU Hurd; see the file COPYING. If not, write to
+ the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA. */
+
+
++/* The Hurd uses protected payloads to quickly look up the object
++ receiving a message. Looking up objects is optimized at the cost
++ of having to translate payloads back to port names if the server
++ function expect a port name rather than an object.
++
++ Support for this is implemented in libports. Almost all of Hurd's
++ servers use libports. For servers using libports, the optimized
++ lookup is completely transparent.
++
++ Servers not using libports are not using protected payloads
++ automatically. Define HURD_DEFAULT_PAYLOAD_TO_PORT to 1 (1 like
++ the identity function) for programs not using libports to avoid
++ injecting the default payload-to-port translation function which is
++ in libports. If you want to use protected payloads without
++ libports, you can use HURD_DEFAULT_PAYLOAD_TO_PORT to inject a
++ custom translation function. */
++
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++#if HURD_DEFAULT_PAYLOAD_TO_PORT
++/* Any non-numeric value will fail this test. If 1 (or any number) is
++ given, do not inject the default translator function. */
++#undef HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
++#else
++ import <hurd/ports.h>;
++#define HURD_DEFAULT_PAYLOAD_TO_PORT ports_payload_get_name
++#endif
++
++/* Override the mach_port_t. Use the default payload to port
++ translation function to convert payloads back to port names for
++ this type. */
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++#define MACH_PAYLOAD_TO_PORT HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
++
+ #include <mach/std_types.defs>
+ #include <mach/mach_types.defs>
+ #include <device/device_types.defs>
++
++/* The Hurd types. You can inject translation functions for type X
++ using the X_INTRAN, X_INTRAN_PAYLOAD, X_OUTTRAN, and X_DESTRUCTOR.
++
++ If you define X_INTRAN and your server is using libports, you also
++ have to define X_INTRAN_PAYLOAD.
++
++ If you do not use libports, and do not want to use the protected
++ payload mechanism, but you do want to use X_INTRAN, you must
++ provide a X_INTRAN_PAYLOAD that either ignores the message by
++ returning NULL, or indicates an error condition in some appropriate
++ way. If you do want to use the protected payload mechanism, make
++ sure you also define an appropriate HURD_DEFAULT_PAYLOAD_TO_PORT
++ translation function. */
+
+ type file_t = mach_port_copy_send_t
+ #ifdef FILE_INTRAN
+ intran: FILE_INTRAN
++intranpayload: FILE_INTRAN_PAYLOAD
++#else
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++intranpayload: file_t HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
+ #endif
+ #ifdef FILE_OUTTRAN
+ outtran: FILE_OUTTRAN
+@@ -37,6 +91,11 @@ destructor: FILE_DESTRUCTOR
+ type fsys_t = mach_port_copy_send_t
+ #ifdef FSYS_INTRAN
+ intran: FSYS_INTRAN
++intranpayload: FSYS_INTRAN_PAYLOAD
++#else
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++intranpayload: fsys_t HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
+ #endif
+ #ifdef FSYS_OUTTRAN
+ outtran: FSYS_OUTTRAN
+@@ -50,6 +109,11 @@ destructor: FSYS_DESTRUCTOR
+ type io_t = mach_port_copy_send_t
+ #ifdef IO_INTRAN
+ intran: IO_INTRAN
++intranpayload: IO_INTRAN_PAYLOAD
++#else
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++intranpayload: io_t HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
+ #endif
+ #ifdef IO_OUTTRAN
+ outtran: IO_OUTTRAN
+@@ -62,6 +126,11 @@ destructor: IO_DESTRUCTOR
+ type process_t = mach_port_copy_send_t
+ #ifdef PROCESS_INTRAN
+ intran: PROCESS_INTRAN
++intranpayload: PROCESS_INTRAN_PAYLOAD
++#else
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++intranpayload: process_t HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
+ #endif
+ #ifdef PROCESS_OUTTRAN
+ outtran: PROCESS_OUTTRAN
+@@ -74,6 +143,11 @@ destructor: PROCESS_DESTRUCTOR
+ type auth_t = mach_port_copy_send_t
+ #ifdef AUTH_INTRAN
+ intran: AUTH_INTRAN
++intranpayload: AUTH_INTRAN_PAYLOAD
++#else
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++intranpayload: auth_t HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
+ #endif
+ #ifdef AUTH_OUTTRAN
+ outtran: AUTH_OUTTRAN
+@@ -86,6 +160,11 @@ destructor: AUTH_DESTRUCTOR
+ type socket_t = mach_port_copy_send_t
+ #ifdef SOCKET_INTRAN
+ intran: SOCKET_INTRAN
++intranpayload: SOCKET_INTRAN_PAYLOAD
++#else
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++intranpayload: socket_t HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
+ #endif
+ #ifdef SOCKET_OUTTRAN
+ outtran: SOCKET_OUTTRAN
+@@ -99,6 +178,11 @@ destructor: SOCKET_DESTRUCTOR
+ type pf_t = mach_port_copy_send_t
+ #ifdef PF_INTRAN
+ intran: PF_INTRAN
++intranpayload: PF_INTRAN_PAYLOAD
++#else
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++intranpayload: pf_t HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
+ #endif
+ #ifdef PF_OUTTRAN
+ outtran: PF_OUTTRAN
+@@ -111,6 +195,11 @@ destructor: PF_DESTRUCTOR
+ type addr_port_t = mach_port_copy_send_t
+ #ifdef ADDRPORT_INTRAN
+ intran: ADDRPORT_INTRAN
++intranpayload: ADDRPORT_INTRAN_PAYLOAD
++#else
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++intranpayload: addr_port_t HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
+ #endif
+ #ifdef ADDRPORT_OUTTRAN
+ outtran: ADDRPORT_OUTTRAN
+@@ -123,6 +212,11 @@ destructor: ADDRPORT_DESTRUCTOR
+ type term_t = mach_port_copy_send_t
+ #ifdef TERM_INTRAN
+ intran: TERM_INTRAN
++intranpayload: TERM_INTRAN_PAYLOAD
++#else
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++intranpayload: term_t HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
+ #endif
+ #ifdef TERM_OUTTRAN
+ outtran: TERM_OUTTRAN
+@@ -135,6 +229,11 @@ destructor: TERM_DESTRUCTOR
+ type startup_t = mach_port_copy_send_t
+ #ifdef STARTUP_INTRAN
+ intran: STARTUP_INTRAN
++intranpayload: STARTUP_INTRAN_PAYLOAD
++#else
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++intranpayload: startup_t HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
+ #endif
+ #ifdef STARTUP_OUTTRAN
+ outtran: STARTUP_OUTTRAN
+@@ -147,6 +246,11 @@ destructor: STARTUP_DESTRUCTOR
+ type fs_notify_t = mach_port_copy_send_t
+ #ifdef FS_NOTIFY_INTRAN
+ intran: FS_NOTIFY_INTRAN
++intranpayload: FS_NOTIFY_INTRAN_PAYLOAD
++#else
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++intranpayload: fs_notify_t HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
+ #endif
+ #ifdef FS_NOTIFY_OUTTRAN
+ outtran: FS_NOTIFY_OUTTRAN
+@@ -159,6 +263,11 @@ destructor: FS_NOTIFY_DESTRUCTOR
+ type exec_startup_t = mach_port_copy_send_t
+ #ifdef EXEC_STARTUP_INTRAN
+ intran: EXEC_STARTUP_INTRAN
++intranpayload: EXEC_STARTUP_INTRAN_PAYLOAD
++#else
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++intranpayload: exec_startup_t HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
+ #endif
+ #ifdef EXEC_STARTUP_OUTTRAN
+ outtran: EXEC_STARTUP_OUTTRAN
+@@ -171,6 +280,11 @@ destructor: EXEC_STARTUP_DESTRUCTOR
+ type interrupt_t = mach_port_copy_send_t
+ #ifdef INTERRUPT_INTRAN
+ intran: INTERRUPT_INTRAN
++intranpayload: INTERRUPT_INTRAN_PAYLOAD
++#else
++#ifdef HURD_DEFAULT_PAYLOAD_TO_PORT
++intranpayload: exec_startup_t HURD_DEFAULT_PAYLOAD_TO_PORT
++#endif
+ #endif
+ #ifdef INTERRUPT_OUTTRAN
+ outtran: INTERRUPT_OUTTRAN
+@@ -184,7 +298,11 @@ destructor: INTERRUPT_DESTRUCTOR
+ type proccoll_t = mach_port_copy_send_t;
+
+ type sreply_port_t = MACH_MSG_TYPE_MAKE_SEND_ONCE | polymorphic
+- ctype: mach_port_t;
++ ctype: mach_port_t
++#ifdef MACH_PAYLOAD_TO_PORT
++intranpayload: mach_port_t MACH_PAYLOAD_TO_PORT
++#endif /* MACH_PAYLOAD_TO_PORT */
++;
+
+ /* These macros are used in some .defs files so that every routine has a
+ server reply port argument #ifdef REPLY_PORTS. */
+diff --git a/hurd/term.defs b/hurd/term.defs
+index 45d825d..29b94ef 100644
+--- a/hurd/term.defs
++++ b/hurd/term.defs
+@@ -33,6 +33,9 @@ type ctty_t = mach_port_copy_send_t
+ #ifdef CTTY_INTRAN
+ intran: CTTY_INTRAN
+ #endif
++#ifdef CTTY_INTRAN_PAYLOAD
++intranpayload: CTTY_INTRAN_PAYLOAD
++#endif
+ #ifdef CTTY_OUTTRAN
+ outtran: CTTY_OUTTRAN
+ #endif
+--
+2.1.3
+
diff --git a/debian/patches/0026-libports-use-protected-payloads-to-optimize-the-obje.patch b/debian/patches/0026-libports-use-protected-payloads-to-optimize-the-obje.patch
new file mode 100644
index 00000000..cf70ee11
--- /dev/null
+++ b/debian/patches/0026-libports-use-protected-payloads-to-optimize-the-obje.patch
@@ -0,0 +1,364 @@
+From 17a4eebe9b0de469be71b931601dbde49f8fa9cd Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Sat, 23 Nov 2013 16:12:55 +0100
+Subject: [PATCH hurd 26/28] libports: use protected payloads to optimize the
+ object lookup
+
+* libports/create-internal.c (_ports_create_port_internal): Set the
+protected payload to the objects address.
+* libports/import-port.c (ports_import_port): Likewise.
+* libports/reallocate-from-external.c (ports_reallocate_from_external):
+Likewise.
+* libports/reallocate-port.c (ports_reallocate_port): Likewise.
+* libports/transfer-right.c (ports_transfer_right): Likewise.
+* libports/manage-multithread.c (ports_manage_port_operations_multithread):
+Use the protected payload as the objects address if provided.
+* libports/manage-one-thread.c (ports_manage_port_operations_one_thread):
+Likewise.
+* libports/destroy-right.c (ports_destroy_right): Defer the
+dereferencing of outstanding send rights to avoid a port_info
+use-after-free if a no-senders notification is dispatched.
+(struct deferred_dereference, gc_loop, start_gc, defer_dereferencing):
+Simple generational garbage collection of outstanding send rights.
+---
+ libports/complete-deallocate.c | 2 +-
+ libports/create-internal.c | 6 +-
+ libports/destroy-right.c | 133 ++++++++++++++++++++++++++++++++++--
+ libports/import-port.c | 6 +-
+ libports/manage-multithread.c | 22 +++++-
+ libports/manage-one-thread.c | 22 +++++-
+ libports/reallocate-from-external.c | 4 ++
+ libports/reallocate-port.c | 4 ++
+ libports/transfer-right.c | 3 +
+ 9 files changed, 193 insertions(+), 9 deletions(-)
+
+diff --git a/libports/complete-deallocate.c b/libports/complete-deallocate.c
+index 0d852f5..6799dfd 100644
+--- a/libports/complete-deallocate.c
++++ b/libports/complete-deallocate.c
+@@ -27,7 +27,7 @@ _ports_complete_deallocate (struct port_info *pi)
+ {
+ assert ((pi->flags & PORT_HAS_SENDRIGHTS) == 0);
+
+- if (pi->port_right)
++ if (MACH_PORT_VALID (pi->port_right))
+ {
+ struct references result;
+
+diff --git a/libports/create-internal.c b/libports/create-internal.c
+index 2d85931..d79dc78 100644
+--- a/libports/create-internal.c
++++ b/libports/create-internal.c
+@@ -99,7 +99,11 @@ _ports_create_port_internal (struct port_class *class,
+ bucket->count++;
+ class->count++;
+ pthread_mutex_unlock (&_ports_lock);
+-
++
++ /* This is an optimization. It may fail. */
++ mach_port_set_protected_payload (mach_task_self (), port,
++ (unsigned long) pi);
++
+ if (install)
+ {
+ err = mach_port_move_member (mach_task_self (), pi->port_right,
+diff --git a/libports/destroy-right.c b/libports/destroy-right.c
+index 448b379..c229d77 100644
+--- a/libports/destroy-right.c
++++ b/libports/destroy-right.c
+@@ -1,5 +1,5 @@
+ /*
+- Copyright (C) 1995, 1996, 1999 Free Software Foundation, Inc.
++ Copyright (C) 1995, 1996, 1999, 2014 Free Software Foundation, Inc.
+ Written by Michael I. Bushnell.
+
+ This file is part of the GNU Hurd.
+@@ -22,30 +22,155 @@
+ #include <hurd/ihash.h>
+ #include <assert.h>
+
++#include <pthread.h>
++#include <error.h>
++#include <time.h>
++#include <unistd.h>
++
++/* To prevent protected payloads from becoming stale, we defer the
++ derefercing of port_info objects. Consumes PI. */
++static error_t defer_dereferencing (struct port_info *pi);
++
+ error_t
+ ports_destroy_right (void *portstruct)
+ {
+ struct port_info *pi = portstruct;
+ error_t err;
+
++ mach_port_clear_protected_payload (mach_task_self (),
++ pi->port_right);
++
++ pthread_mutex_lock (&_ports_lock);
+ if (pi->port_right != MACH_PORT_NULL)
+ {
+ pthread_rwlock_wrlock (&_ports_htable_lock);
+ hurd_ihash_locp_remove (&_ports_htable, pi->ports_htable_entry);
+ hurd_ihash_locp_remove (&pi->bucket->htable, pi->hentry);
+ pthread_rwlock_unlock (&_ports_htable_lock);
++
+ err = mach_port_mod_refs (mach_task_self (), pi->port_right,
+ MACH_PORT_RIGHT_RECEIVE, -1);
+ assert_perror (err);
+
+- pi->port_right = MACH_PORT_NULL;
+-
+ if (pi->flags & PORT_HAS_SENDRIGHTS)
+ {
+ pi->flags &= ~PORT_HAS_SENDRIGHTS;
+- ports_port_deref (pi);
++
++ /* There are outstanding send rights, so we might get a
++ no-senders notification. Attached to the notification
++ is a reference to the port_info object. Of course we
++ destroyed the receive right these were send to above, but
++ the message could already have been send and dequeued.
++
++ Previously, those messages would have carried an stale
++ name, which would have caused a hash table lookup
++ failure. However, stale payloads results in port_info
++ use-after-free. Therefore, we cannot release the
++ reference here, but defer that instead. */
++ defer_dereferencing (pi);
+ }
++
++ pi->port_right = MACH_PORT_DEAD;
+ }
++ pthread_mutex_unlock (&_ports_lock);
++
++ return 0;
++}
++
++/* Simple lock-less generational garbage collection. */
++
++/* We maintain three lists of objects. Producers add objects to the
++ current generation G using defer_dereferencing. G-1 holds old
++ objects, G-2 holds garbage. */
++static struct deferred_dereference
++{
++ struct deferred_dereference *next;
++ struct port_info *pi; /* We hold a reference for these objects. */
++} *generations[3]; /* Must be accessed using atomic
++ operations. */
++
++/* The current generation. Must be accessed using atomic operations. */
++static int generation;
++
++/* The garbage collection thread. Does not return. */
++static void *
++gc_loop (void *arg)
++{
++ while (1)
++ {
++ int old, garbage;
++ struct deferred_dereference *d;
++
++ sleep (5);
++
++ /* We are the only one updating generation, so this is safe. */
++ old = generation;
++
++ /* Update generation. */
++ __atomic_store_n (&generation, (old + 1) % 3, __ATOMIC_RELAXED);
++
++ /* This is the garbage generation. As all writers are long
++ gone, we do not need to bother with atomic operations. */
++ garbage = (old + 2) % 3;
++ d = generations[garbage];
++ generations[garbage] = NULL;
++ while (d != NULL)
++ {
++ struct deferred_dereference *next = d->next;
++
++ /* Get rid of our reference. */
++ ports_port_deref (d->pi);
++
++ free (d);
++ d = next;
++ }
++ }
++
++ assert (! "reached");
++ return NULL;
++}
++
++/* Start the gc thread. */
++static void
++start_gc (void)
++{
++ error_t err;
++ pthread_attr_t attr;
++ pthread_t thread;
++
++ pthread_attr_init (&attr);
++#define STACK_SIZE (64 * 1024)
++ pthread_attr_setstacksize (&attr, STACK_SIZE);
++#undef STACK_SIZE
++
++ err = pthread_create (&thread, &attr, gc_loop, NULL);
++ assert_perror (err);
++ err = pthread_detach (thread);
++ assert_perror (err);
++}
++
++/* Defer the derefercing of port_info objects. Consumes PI. */
++static error_t
++defer_dereferencing (struct port_info *pi)
++{
++ static pthread_once_t once = PTHREAD_ONCE_INIT;
++ int g;
++ struct deferred_dereference *d;
++ pthread_once (&once, start_gc);
++
++ d = malloc (sizeof *d);
++ if (d == NULL)
++ return ENOMEM;
++ d->pi = pi;
++
++ retry:
++ /* Append to the current generation. */
++ g = __atomic_load_n (&generation, __ATOMIC_RELAXED);
++
++ d->next = __atomic_load_n (&generations[g], __ATOMIC_RELAXED);
++ if (! __atomic_compare_exchange_n (&generations[g], &d->next, d,
++ 0, __ATOMIC_RELAXED, __ATOMIC_RELAXED))
++ goto retry;
+
+ return 0;
+ }
+diff --git a/libports/import-port.c b/libports/import-port.c
+index c337c85..2c638e1 100644
+--- a/libports/import-port.c
++++ b/libports/import-port.c
+@@ -93,7 +93,11 @@ ports_import_port (struct port_class *class, struct port_bucket *bucket,
+ bucket->count++;
+ class->count++;
+ pthread_mutex_unlock (&_ports_lock);
+-
++
++ /* This is an optimization. It may fail. */
++ mach_port_set_protected_payload (mach_task_self (), port,
++ (unsigned long) pi);
++
+ mach_port_move_member (mach_task_self (), port, bucket->portset);
+
+ if (stat.mps_srights)
+diff --git a/libports/manage-multithread.c b/libports/manage-multithread.c
+index 2067cba..90b3044 100644
+--- a/libports/manage-multithread.c
++++ b/libports/manage-multithread.c
+@@ -162,7 +162,27 @@ ports_manage_port_operations_multithread (struct port_bucket *bucket,
+ outp->RetCodeType = RetCodeType;
+ outp->RetCode = MIG_BAD_ID;
+
+- pi = ports_lookup_port (bucket, inp->msgh_local_port, 0);
++ if (MACH_MSGH_BITS_LOCAL (inp->msgh_bits) ==
++ MACH_MSG_TYPE_PROTECTED_PAYLOAD)
++ {
++ pi = (struct port_info *) inp->msgh_protected_payload;
++ if (pi && pi->bucket == bucket)
++ ports_port_ref (pi);
++ else
++ pi = NULL;
++ }
++ else
++ {
++ pi = ports_lookup_port (bucket, inp->msgh_local_port, 0);
++ if (pi)
++ {
++ inp->msgh_bits = MACH_MSGH_BITS (
++ MACH_MSGH_BITS_REMOTE (inp->msgh_bits),
++ MACH_MSG_TYPE_PROTECTED_PAYLOAD);
++ inp->msgh_protected_payload = (unsigned long) pi;
++ }
++ }
++
+ if (pi)
+ {
+ error_t err = ports_begin_rpc (pi, inp->msgh_id, &link);
+diff --git a/libports/manage-one-thread.c b/libports/manage-one-thread.c
+index cbd2df7..58c0f36 100644
+--- a/libports/manage-one-thread.c
++++ b/libports/manage-one-thread.c
+@@ -57,7 +57,27 @@ ports_manage_port_operations_one_thread (struct port_bucket *bucket,
+ outp->RetCodeType = RetCodeType;
+ outp->RetCode = MIG_BAD_ID;
+
+- pi = ports_lookup_port (bucket, inp->msgh_local_port, 0);
++ if (MACH_MSGH_BITS_LOCAL (inp->msgh_bits) ==
++ MACH_MSG_TYPE_PROTECTED_PAYLOAD)
++ {
++ pi = (struct port_info *) inp->msgh_protected_payload;
++ if (pi && pi->bucket == bucket)
++ ports_port_ref (pi);
++ else
++ pi = NULL;
++ }
++ else
++ {
++ pi = ports_lookup_port (bucket, inp->msgh_local_port, 0);
++ if (pi)
++ {
++ inp->msgh_bits = MACH_MSGH_BITS (
++ MACH_MSGH_BITS_REMOTE (inp->msgh_bits),
++ MACH_MSG_TYPE_PROTECTED_PAYLOAD);
++ inp->msgh_protected_payload = (unsigned long) pi;
++ }
++ }
++
+ if (pi)
+ {
+ err = ports_begin_rpc (pi, inp->msgh_id, &link);
+diff --git a/libports/reallocate-from-external.c b/libports/reallocate-from-external.c
+index 7205bd9..d0fae1a 100644
+--- a/libports/reallocate-from-external.c
++++ b/libports/reallocate-from-external.c
+@@ -71,6 +71,10 @@ ports_reallocate_from_external (void *portstruct, mach_port_t receive)
+ pthread_mutex_unlock (&_ports_lock);
+ assert_perror (err);
+
++ /* This is an optimization. It may fail. */
++ mach_port_set_protected_payload (mach_task_self (), pi->port_right,
++ (unsigned long) pi);
++
+ mach_port_move_member (mach_task_self (), receive, pi->bucket->portset);
+
+ if (stat.mps_srights)
+diff --git a/libports/reallocate-port.c b/libports/reallocate-port.c
+index cc534eb..4e859a1 100644
+--- a/libports/reallocate-port.c
++++ b/libports/reallocate-port.c
+@@ -59,6 +59,10 @@ ports_reallocate_port (void *portstruct)
+ pthread_mutex_unlock (&_ports_lock);
+ assert_perror (err);
+
++ /* This is an optimization. It may fail. */
++ mach_port_set_protected_payload (mach_task_self (), pi->port_right,
++ (unsigned long) pi);
++
+ err = mach_port_move_member (mach_task_self (), pi->port_right,
+ pi->bucket->portset);
+ assert_perror (err);
+diff --git a/libports/transfer-right.c b/libports/transfer-right.c
+index 776a8d2..64de7f7 100644
+--- a/libports/transfer-right.c
++++ b/libports/transfer-right.c
+@@ -91,6 +91,9 @@ ports_transfer_right (void *tostruct,
+ err = hurd_ihash_add (&topi->bucket->htable, port, topi);
+ pthread_rwlock_unlock (&_ports_htable_lock);
+ assert_perror (err);
++ /* This is an optimization. It may fail. */
++ mach_port_set_protected_payload (mach_task_self (), port,
++ (unsigned long) topi);
+ if (topi->bucket != frompi->bucket)
+ {
+ err = mach_port_move_member (mach_task_self (), port,
+--
+2.1.3
+
diff --git a/debian/patches/0027-libports-Fix-build.patch b/debian/patches/0027-libports-Fix-build.patch
new file mode 100644
index 00000000..5f8332d3
--- /dev/null
+++ b/debian/patches/0027-libports-Fix-build.patch
@@ -0,0 +1,25 @@
+From da5f88d7fa960c4676ac479eaa67b14a58fc17ee Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Wed, 27 Nov 2013 11:22:29 +0100
+Subject: [PATCH hurd 27/28] libports: Fix build
+
+---
+ libports/Makefile | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/libports/Makefile b/libports/Makefile
+index f49cb9f..6e25cd7 100644
+--- a/libports/Makefile
++++ b/libports/Makefile
+@@ -42,7 +42,7 @@ installhdrs = ports.h
+
+ HURDLIBS= ihash
+ LDLIBS += -lpthread
+-OBJS = $(SRCS:.c=.o) notifyServer.o interruptServer.o
++OBJS = $(SRCS:.c=.o) notifyServer.o interruptServer.o mach_portUser.o
+
+ MIGCOMSFLAGS = -prefix ports_
+ MIGSFLAGS = -imacros $(srcdir)/mig-mutate.h
+--
+2.1.3
+
diff --git a/debian/patches/0028-mach-defpager-fix-build.patch b/debian/patches/0028-mach-defpager-fix-build.patch
new file mode 100644
index 00000000..42ef3847
--- /dev/null
+++ b/debian/patches/0028-mach-defpager-fix-build.patch
@@ -0,0 +1,25 @@
+From 1f33d9bf82670af8b70f157d87698319a6d793f8 Mon Sep 17 00:00:00 2001
+From: Justus Winter <4winter@informatik.uni-hamburg.de>
+Date: Fri, 14 Mar 2014 00:32:52 +0100
+Subject: [PATCH hurd 28/28] mach-defpager: fix build
+
+---
+ mach-defpager/Makefile | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/mach-defpager/Makefile b/mach-defpager/Makefile
+index 09debed..ed115bd 100644
+--- a/mach-defpager/Makefile
++++ b/mach-defpager/Makefile
+@@ -27,7 +27,7 @@ SRCS := default_pager.c kalloc.c wiring.c main.c setup.c
+ OBJS := $(SRCS:.c=.o) \
+ $(addsuffix Server.o,\
+ memory_object default_pager memory_object_default exc) \
+- default_pager_replyUser.o
++ default_pager_replyUser.o mach_portUser.o
+
+ HURDLIBS:= ihash
+ OTHERLIBS:= -lpthread
+--
+2.1.3
+
diff --git a/debian/patches/series b/debian/patches/series
index 1d4dcafa..d6f3ef2f 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -45,3 +45,31 @@ xkb-compat.patch
dde-protected-payloads.patch
+0001-libshouldbeinlibc-move-the-reference-counting-primit.patch
+0002-libports-add-ports_lookup_payload-and-ports_payload_.patch
+0003-libports-add-a-payload-aware-intrans-function.patch
+0004-libdiskfs-add-payload-aware-intrans-functions.patch
+0005-libnetfs-add-a-payload-aware-intrans-function.patch
+0006-libtrivfs-add-payload-aware-intrans-functions.patch
+0007-libpager-add-a-payload-aware-intrans-function.patch
+0008-libcons-add-a-payload-aware-intrans-function.patch
+0009-auth-add-a-payload-aware-intrans-function.patch
+0010-console-add-a-payload-aware-intrans-function.patch
+0011-console-client-make-the-demuxer-payload-aware.patch
+0012-exec-add-payload-aware-intrans-functions.patch
+0013-pfinet-add-payload-aware-intrans-functions.patch
+0014-pfinet-make-the-demuxers-payload-aware.patch
+0015-pflocal-add-payload-aware-intrans-functions.patch
+0016-proc-add-payload-aware-intrans-functions.patch
+0017-startup-disable-default-payload-to-port-mapping.patch
+0018-term-add-a-payload-aware-intrans-function.patch
+0019-trans-fakeroot-make-the-demuxer-payload-aware.patch
+0020-trans-ifsock-add-a-payload-aware-intrans-function.patch
+0021-trans-password-add-a-payload-aware-intrans-function.patch
+0022-trans-streamio-make-the-translator-payload-aware.patch
+0023-trans-symlink-disable-default-payload-to-port-mappin.patch
+0024-utils-rpctrace-make-trace_and_forward-payload-aware.patch
+0025-hurd-add-intranpayload-functions-to-all-hurd-types.patch
+0026-libports-use-protected-payloads-to-optimize-the-obje.patch
+0027-libports-Fix-build.patch
+0028-mach-defpager-fix-build.patch