Commit Graph

122593 Commits

Author SHA1 Message Date
itojun
0169ab0afa minor KNF 2004-01-02 22:19:51 +00:00
martin
0d9a131abe On archictectures not supporting RAS make this regression tests
print a message to that effect and let them pass.
2004-01-02 22:16:43 +00:00
itojun
35f883b08a KNF 2004-01-02 21:49:35 +00:00
cjep
53e7abcff9 Update grep entry 2004-01-02 21:49:08 +00:00
oster
24b034a69e Fix the "We panic if we can't create a DAG" problem that's existed
~forever.  This requires a number of things:

1) If we can't create a DAG, set desc->numStripes to 0 in
rf_SelectAlgorithm.  This will ensure that we don't attempt to free
any dagArray[] elements in rf_StateCleanup.

2) Modify rf_State_CreateDAG() to not panic in the event of a DAG
failure.  Instead, set the bp->b_flags and bp->b_error, and set things
up to skip to rf_State_Cleanup().

3) Need to mark desc->status as "bad" so that we actually stop looking
for a different DAG.  (which we won't find... no matter how many times
we try).

4) rf_State_LastState() will then do the biodone(), and return EIO for
the IO in question.

5) Remove some " || 1 "'s from ProcessNode().  These were for
debugging, and we don't need the failure notices spewing
over and over again as the failing DAGs are processed.

6) Needed to change

       if (asmap->numDataFailed + asmap->numParityFailed > 1)

to

        if ((asmap->numDataFailed + asmap->numParityFailed > 1) ||
            (raidPtr->numFailures > 1)){

in rf_raid5.c so that it doesn't try to return
rf_CreateNonRedundantWriteDAG as the creation function.

7) Note that we can't apply the above change to the RAID 1 code as
with the silly "fake 2-D" RAID 1 sets, it is possible to have 2 failed
components in the RAID 1 set, and that would stop them from working.
(I really don't know why/how those "fake 2-D" RAID 1 sets even work
with all the "single-fault" assumptions present in the rest of the
code.)

8) Needed to protect rf_RAID0DagSelect() in a similar way -- it should
return NULL as the createFunc.

9) No point printing out "Multiple disks failed..." a zillion times.
2004-01-02 21:41:08 +00:00
itojun
1bbd0498b5 update on Citrus 2004-01-02 21:25:03 +00:00
itojun
188f796e5c add libintl TODO 2004-01-02 21:09:44 +00:00
itojun
4fc59b19d5 no need for tmp = arc4randomid here 2004-01-02 20:51:51 +00:00
martin
bbd16f6828 Don't set ksi_errno - other archs don't bother, so avoid being different.
OK'd by Christos. This makes sparc64 pass the siginfo regression tests.
2004-01-02 20:49:18 +00:00
jmmv
6667fc8b8c + B/W 2004-01-02 20:04:38 +00:00
cl
ab4f8b76c0 enable sigmask1 and siglongjmp1 2004-01-02 19:27:46 +00:00
cl
f44e43cd85 Regression test for siglongjmp out of a signal handler back into
its thread.
2004-01-02 19:27:06 +00:00
cl
ec7c3305d4 Regression test for pthread_sigmask when SA upcalls aren't started yet. 2004-01-02 19:26:24 +00:00
cl
f35871411a make siglongjmp out of a signal handler work:
- strong alias __sigprocmask14 to pthread_sigmask
- call _sys___sigprocmask14 where appropriate
- make pthread_sigmask not set the signal mask lazily when pthreads
  aren't started yet
2004-01-02 19:24:44 +00:00
cl
33622a5943 userland part of no-syscall upcall stack return
- add pt_stackinfo to struct __pthread_st
- add pthread__stackinfo_offset returning the offset from ss_sp to
  pt_stackinfo
- pass stackinfo_offset to sa_register and set SA_FLAG_STACKINFO to
  make the kernel use it
- call pthread__sa_recycle in pthread__resolve_locks; g/c recycleq and
  pthread__recycle_bulk
- return stack in pthread__sa_recycle by incrementing sasi_stackgen
- make pthread__sa_recycle debugging output formatting conditional on
  pthread__debug_newline
2004-01-02 19:14:00 +00:00
cl
90e89977d4 - libc.so.12.109 and libpthread.so.0.4
- add ssize_t stackinfo_offset argument to sa_register syscall
- remove sa_unblockyield syscall
- make __sigprocmask14 syscall weak
- in pthread__sa_start: catch up with 4-argument sa_register syscall
2004-01-02 18:56:39 +00:00
cl
d5645dec8e regen 2004-01-02 18:53:45 +00:00
cl
e7045955c7 kernel part of no-syscall upcall stack return: libpthread registers
an offset between ss_sp and struct sa_stackinfo_t (located in struct
__pthread_st) when calling sa_register.  The kernel increments the
sast_gen counter in struct sastack when an upcall stack is used.
libpthread increments the sasi_stackgen counter in struct
sa_stackinfo_t when an upcall stack is freed.  The kernel compares the
two counters to decide if a stack is free or in use.

- add struct sa_stackinfo_t with sasi_stackgen to count stack use in
  userland
- add sast_gen to struct sastack to count stack use in kernel
- add SA_FLAG_STACKINFO to enable the stackinfo_offset argument in the
  sa_register syscall
- add sa_stackinfo_offset to struct sadata for offset between ss_sp
  and struct sa_stackinfo_t
- add ssize_t stackinfo_offset argument to sa_register, initialize
  struct sadata's sa_stackinfo_offset from it if SA_FLAG_STACKINFO is
  set
- add sa_getstack, sa_getstack0, sa_stackused and sa_setstackfree
  functions to find/use/free upcall stacks and use these where
  appropriate
- don't record stack for upcall in sa_upcall0
- pass sau to sa_switchcall instead of l2 (l2 = curlwp in sa_switchcall)
- add sa_vp_blocker to struct sadata to pass recently blocked lwp to
  sa_switchcall
- delay finding a stack for blocked upcalls to sa_switchcall
- add sa_stacknext to struct sadata pointing to next most likely free
  upcall stack; also g/c sa_stackslist in struct sadata and sast_list
  in struct sastack
- add L_SA_WOKEN flag: LWP is on sa_woken queue
- add L_SA_RECYCLE flag: LWP should be recycled in sa_setwoken
- replace l_upcallstack with L_SA_WOKEN/L_SA_RECYCLE/L_SA_BLOCKING
  flags
- g/c now unused sast_blocker in struct sastack
- make sa_switchcall, sa_upcall0 and sa_upcall_getstate static in
  kern_sa.c
- call sa_upcall_userret only once in userret
- split sa_makeupcalls out of sa_upcall_userret and use to process
  the sa_upcalls queue
- on process exit: mark LWPs sleeping in saunblock interruptible; also
  there are no LWPs sleeping on l->l_upcallstack anymore; also clear
  sa_wokenq_head to prevent unblocked upcalls

additional changes:
- cleanup timerupcall sa_vp == curlwp check
- add check in sa_yield if we didn't block on our way here and we
  wouldn't any longer be the LWP on the VP
- invalidate sa_vp_ofaultaddr after resolving pagefault
2004-01-02 18:52:17 +00:00
lukem
b5b40b6c35 Define CHOOSERPATH to /usr/X11R6/libexec/chooser, and use appropriately. 2004-01-02 17:19:51 +00:00
jmmv
8ab300d124 Fix typo; from Aidan Kehoe in PR lib/23951. 2004-01-02 17:06:21 +00:00
jmmv
2fec59e8d0 Fix typo; from Aidan Kehoe in PR lib/23950. 2004-01-02 17:04:52 +00:00
lukem
ac0037bc31 Don't bother with local (custom) version of rstartd.cpp; go back to
using server.cpp from the xsrc/xfree dist directory, because I've
modified the latter to allow a separate BINDIR from LIBDIR.
2004-01-02 16:38:14 +00:00
lukem
4c6d23c4a8 Provide custom version of rstartd.cpp that supports a BINDIR
(for rstartd.real) separate to the LIBDIR (for the configuration)
and install rstartd.real into /usr/X11R6/libexec.
(Installing binaries under /usr/X11R6/lib/X11 (which may be a
symlink to /etc/X11) is Bad.0

Override BINDIR after the .include of <bsd.own.mk>, so that rstartd.real
is installed in the correct location.
2004-01-02 16:32:12 +00:00
lukem
bce7c4948b add usr/X11R6/libexec 2004-01-02 16:23:02 +00:00
lukem
02e913d52d Consistently test all variables that support a "yes"/"no" value with
${VAR} == "no"
or
	${VAR} != "no"
(instead of against "yes").  Variables affected:
	TOOLCHAIN_MISSING
	HAVE_GCC3
	USE_TOOLS_TOOLCHAIN
	NEED_OWN_INSTALL_TARGET
	USE_SHLIBDIR

Improve the documentation.
2004-01-02 16:12:36 +00:00
itojun
7cddb2827b whitespace 2004-01-02 15:51:45 +00:00
itojun
344b08b44b some corrections from markus@openbsd;
- callout_ack() was called with wrong argument
2004-01-02 15:51:04 +00:00
wiz
1fa878c4d4 Bump date for previous; new sentence, new line. 2004-01-02 15:19:47 +00:00
itojun
6d206bfa62 skip ai_canonname from testing, as it can be vary by /etc/hosts setting.
pointed out by Martin Husemann
2004-01-02 15:07:39 +00:00
cjep
26e45f0c9a Import of our changes to grep developed in othersrc. A very
brief summary:

* Add NetBSD RCS Ids. Change to use a date based version number.
* Remove unused variables and functions.
* Move towards NetBSD code style.
* Add missing GNU options (except for --include, --exclude and
	--line-buffered)
* Bug fixes
* Bug fixes and changes from OpenBSD's src/usr.bin/grep

A full list of changes can be viewed in the NetBSD CVS repository at
othersrc/usr.bin/grep. A ChangeLog is also available at:
	ftp://ftp.NetBSD.org/pub/NetBSD/misc/cjep/grep-ChangeLog.txt

If you want to help out, please let me (cjep@) know so that we can
organise our efforts efficiently.
2004-01-02 15:00:29 +00:00
pk
b0c225da03 Document the -C option. 2004-01-02 15:00:28 +00:00
cjep
9ffc49ef33 Import of our changes to grep developed in othersrc. A very
brief summary:

* Add NetBSD RCS Ids. Change to use a date based version number.
* Remove unused variables and functions.
* Move towards NetBSD code style.
* Add missing GNU options (except for --include, --exclude and
	--line-buffered)
* Bug fixes
* Bug fixes and changes from OpenBSD's src/usr.bin/grep

A full list of changes can be viewed in the NetBSD CVS repository at
othersrc/usr.bin/grep. A ChangeLog is also available at:
	ftp://ftp.NetBSD.org/pub/NetBSD/misc/cjep/grep-ChangeLog.txt

If you want to help out, please let me (cjep@) know so that we can
organise our efforts efficiently.
2004-01-02 15:00:25 +00:00
cjep
232a750c61 Import of BSD-licensed grep by James Howard and Dag-Erling Coïdan
Smørgrav. This import is of version 0.16.
2004-01-02 14:58:43 +00:00
martin
ce5186b58b Restore stack frames on error return. 2004-01-02 14:31:31 +00:00
cl
91d9c8c22f pthread__upcall: output LWPid in SA_UPCALL_BLOCKED case 2004-01-02 14:29:22 +00:00
cl
677748c645 logging/debugging changes:
- add PTHREAD_PID_DEBUG which prints the pid before each debuglog line
- output thread returned in pthread__next
- add asserts in pthread__sched akin to asserts in pthread__sched_bulk:
  check if scheduled thread is at front/end of queue
- pthread__upcall: output event/interrupted LWP count instead of LWPid
  of the first event/interrupted LWP (since unblock upcalls can have
  multiple event LWPs).
- pthread__find_interrupted: output LWPid here
2004-01-02 14:13:16 +00:00
martin
97ab4e62e3 Restore stack frames on error exit. This makes us pass dynamic and static
linked versions of the clonetest regression test.
While here, some cosmetics: branch prediction, avoid depreceated instructions.
2004-01-02 14:06:51 +00:00
itojun
855852a04b comment on values from 0x80000000 to 0xffffffff 2004-01-02 12:27:41 +00:00
itojun
5d489a8a2a safer realloc 2004-01-02 12:25:46 +00:00
itojun
64d2443254 safer realloc, some KNF. noted by deraadt@openbsd 2004-01-02 12:19:25 +00:00
uwe
9f2e9e23a0 Update the root window after showing the 'Last chance...' dialog. 2004-01-02 12:13:36 +00:00
itojun
edffd45884 use strlcpy 2004-01-02 12:10:48 +00:00
itojun
3d7bc49491 use snprintf, dude 2004-01-02 12:09:48 +00:00
itojun
5377ace199 some corrections from markus@openbsd;
- callout_ack() was called with wrong argument
- no need for xor with timestamp as we are using arc4random()
- minor typo/cleanup
2004-01-02 12:01:39 +00:00
skrll
2879279c43 Move libgcc3/*.mk to libgcc3/arch.
Update mknative-gcc.
2004-01-02 11:58:32 +00:00
hannken
897a1fc008 Remove "row" from DEBUG statements. 2004-01-02 11:52:15 +00:00
itojun
4a9d521ae4 cvs to 1.11.11 2004-01-02 11:35:47 +00:00
itojun
9e43fcd62e cvs 1.11.11
warn that BIND 8.4.3 must not be imported
2004-01-02 11:35:24 +00:00
itojun
ce7a5bd52c upgrade to 1.11.11 for security reason 2004-01-02 11:34:40 +00:00
itojun
977212b1bf import 1.11.11 for security reasons
from GENTOO LINUX SECURITY ANNOUNCEMENT 200312-08

   "Stable CVS 1.11.11 has been released. Stable releases contain only
   bug fixes from previous versions of CVS. This release adds code to
   the CVS server to prevent it from continuing as root after a user
   login, as an extra failsafe against a compromise of the
   CVSROOT/passwd file. Previously, any user with the ability to write
   the CVSROOT/passwd file could execute arbitrary code as the root
   user on systems with CVS pserver access enabled. We recommend this
   upgrade for all CVS servers!"
2004-01-02 11:29:56 +00:00