Commit Graph

247102 Commits

Author SHA1 Message Date
rmind
40a029b661 npf_tcp_fsm: fix for the NPF_TCPS_SYN_RECEIVED state.
SYN re-transmission after SYN-ACK was seen by NPF should not terminate
the connection.  Thanks to: Alexander Kiselev <kiselev99 at gmail com>
2016-12-26 23:10:46 +00:00
christos
f75d79eb69 Sync NPF with the version on github: backport standalone NPF changes,
which allow us to create and run separate NPF instances. Minor fixes.
(from rmind@)
2016-12-26 23:05:05 +00:00
rin
879c3fe377 Remove wrong comment which was copy-and-pasted from somewhere. 2016-12-26 21:54:00 +00:00
rin
b72e1d6d7b Assert that the size of a trap handler does not exceed its room.
XXX
The debug exception is critical for ibm4xx. Since rev 1.24, we use the critical
trap hundler for it. Sorry for the wrong commit log for rev 1.24.
2016-12-26 21:25:08 +00:00
rmind
e8a8032d56 Fix kmem_free() in hashmap_remove(). 2016-12-26 21:16:06 +00:00
rin
f637bb05bd simplify logic; there must be no CPU usage when p_swtime is zero 2016-12-26 20:52:39 +00:00
rin
0000e45fe1 No need to have same trap handlers in trap_subr.S.
No functional changes.
2016-12-26 20:28:00 +00:00
rin
4a63f69046 We cannot have DDB and IPKDB at the same time. 2016-12-26 20:16:29 +00:00
scole
90ac05fa24 Fix some comments and add new comment explaining probable bug in cpu_switchto(). Not sure of a fix for it yet 2016-12-26 19:46:59 +00:00
cherry
ce8e005d0a Add copyright info.
After sufficient poking by Taylor.
2016-12-26 18:47:00 +00:00
cherry
5ce70471e3 xen dom0 SMP is now bootable again.
add the 'options MULTIPROCESSOR' in respective configs, but mark them
experimental - and thus disabled by default.
2016-12-26 18:04:31 +00:00
cherry
9db6d2188c the i386 and amd64 boot time msgbuf init code is nearly identical.
Unify them into x86/x86_machdep.c:init_x86_msgbuf()

Boot tested on GENERIC (i386, amd64), XEN3_DOM0 (amd64)
2016-12-26 17:54:06 +00:00
rjs
d2b805b7ce Remove more trailing whitespace. 2016-12-26 16:20:17 +00:00
wiz
a823b333c5 New sentence, new line. 2016-12-26 16:03:50 +00:00
flxd
a910009158 Add tcu(4) for TC-USB. 2016-12-26 15:59:26 +00:00
cherry
66362f2cd9 Make the msgbuf initialisation track closer to the original
pre-uvm_physseg.h one.

To see the exact changes with the original, line for line, do:

cvs rdiff -u -r1.772 -r1.775 src/sys/arch/i386/i386/machdep.c
2016-12-26 15:47:48 +00:00
christos
b074a61a87 - use UTC
- initialize tm_isdst
- use accpath to handle relative paths
2016-12-26 14:53:17 +00:00
cherry
c2337c4f0f remove spurious printf() 2016-12-26 13:55:13 +00:00
rjs
024e0031c7 Remove trailing whitespace, no functional change. 2016-12-26 13:28:59 +00:00
cherry
808dc02031 Make the msgbuf initialisation track closer to the original
pre-uvm_physseg.h one.

To see the exact changes with the original, line for line, do:

cvs diff -u -r 1.241 sys/arch/amd64/amd64/machdep.c
2016-12-26 12:54:42 +00:00
leot
2b0c6991fb Implement the `c' command in "interactive mode" that displays only commands
that match a specified string.

Reviewed by and thanks to <Riastradh>
2016-12-26 12:46:31 +00:00
rmind
50c1611937 Fix kmem_free() sizes in hashmap_rehash() and lpm_clear(). 2016-12-26 12:44:10 +00:00
abhinav
c95a15e71b Add missing full stop. 2016-12-26 10:16:43 +00:00
cherry
85a999caa3 In the MP case,
do not attempt to pmap_tlb_shootdown() after a pmap_kenter_ma() during
boot. pmap_tlb_shootdown() assumes post boot. Instead invalidate the
entry on the local CPU only.

XXX: to DTRT, probably this assumption needs re-examination.
XXX: The tradeoff is a (predicted) single word size comparison
     penalty, so perhaps a decision needs performance stats.
2016-12-26 08:53:11 +00:00
kamil
228925b54a Add new entry in TODO.ptrace
+ add support to read and write siginfo_t from and to tracee (reuse PT_IO?)

Sponsored by <The NetBSD Foundation>
2016-12-26 08:43:55 +00:00
skrll
244ca08653 Hold the interlock when calling cv_broadcast as per condvar(9) 2016-12-26 08:21:09 +00:00
skrll
fb73e3c1d6 Hold the interlock before cv_broadcast as per condvar(9) 2016-12-26 08:16:28 +00:00
msaitoh
416fb8dc73 0x10cb is not 82801H but 82801I. No functional change (The macro name
was changed but the vaule is the same).
2016-12-26 07:55:00 +00:00
msaitoh
0ff895f1bd Regen. 2016-12-26 07:53:31 +00:00
msaitoh
ec914f9d81 0x10cb is not 82801H(ICH8) but 82801I(ICH9). 2016-12-26 07:53:03 +00:00
ozaki-r
78a5509e4b Use psz/psref to hold ifa 2016-12-26 07:25:00 +00:00
kamil
c3bf78f467 Add new entry in TODO.ptrace
+ add ATF tests for PT_SYSCALL and PT_SYSCALLEMU

Sponsored by <The NetBSD Foundation>
2016-12-26 03:24:11 +00:00
christos
56b5e39636 Don't trash the logical $PWD if a component is a symlink; no other shell
does this.
2016-12-26 02:27:57 +00:00
ozaki-r
aeb848823f Fix typo 2016-12-26 01:26:25 +00:00
knakahara
52f944e4de pserialize_perform() is required an additionally serialization. see pserialize(9).
ok by ozaki-r@n.o.
2016-12-26 00:30:07 +00:00
khorben
22024d321d Typo 2016-12-26 00:11:14 +00:00
nat
160e0571ac Add mulaw to audio device for auconv_set_converter.
This should address PR kern/51707.
2016-12-25 23:23:46 +00:00
nat
b0396bf5c6 Fix suspend/resume logic. 2016-12-25 22:44:24 +00:00
christos
9388ae5cb6 put also MAKEFILES in the MKREPRO section since they vary since they contain
paths.
2016-12-25 16:44:39 +00:00
kim
ca8ef46246 Make precedence between {cat,man}[39]{,lua} logical:
- Search man3 right after cat3, before cat3lua (and man3lua).
- Search man9 right after cat9, before cat9lua (and man9lua).
2016-12-25 12:10:52 +00:00
wiz
d2bf829be4 Whitespace, sort, remove some superfluous macros/quoting. 2016-12-25 11:10:53 +00:00
mlelstv
015f574c37 Lock correctly around CV calls.
Fix handling of session termination.
Enable MPSAFE processing for scsipi.
2016-12-25 06:55:28 +00:00
abhinav
b2f786d04e As per the IEEE 1003.1-2008 standard, the range of values for the %S
format specifier is [0,60].
2016-12-25 06:37:50 +00:00
cherry
6b706f8888 Make uvm_physseg_set_avail_start(9) available unconditional to UVM_HOTPLUG 2016-12-25 06:30:58 +00:00
christos
16a824ca6b fix printf format 2016-12-25 04:35:30 +00:00
christos
6419995e46 Provide a set_available_start method for the non UVM_HOTPLUG case. 2016-12-25 03:39:26 +00:00
christos
7404e8f3e1 new OpenSSH 2016-12-25 00:10:33 +00:00
christos
a54d067ee5 bump libssh 2016-12-25 00:09:20 +00:00
christos
ee85abc417 merge conflicts 2016-12-25 00:07:46 +00:00
christos
210ad7912c Import OpenSSH-7.4
OpenSSH 7.4 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.

OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support. OpenSSH also includes
transitional support for the legacy SSH 1.3 and 1.5 protocols
that may be enabled at compile-time.

Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested snapshots or donated to the
project. More information on donations may be found at:
http://www.openssh.com/donations.html

Future deprecation notice
=========================

We plan on retiring more legacy cryptography in future releases,
specifically:

 * In approximately August 2017, removing remaining support for the
   SSH v.1 protocol (client-only and currently compile-time disabled).

 * In the same release, removing support for Blowfish and RC4 ciphers
   and the RIPE-MD160 HMAC. (These are currently run-time disabled).

 * Refusing all RSA keys smaller than 1024 bits (the current minimum
   is 768 bits)

 * The next release of OpenSSH will remove support for running sshd(8)
   with privilege separation disabled.

 * The next release of portable OpenSSH will remove support for
   OpenSSL version prior to 1.0.1.

This list reflects our current intentions, but please check the final
release notes for future releases.

Potentially-incompatible changes
================================

This release includes a number of changes that may affect existing
configurations:

 * This release removes server support for the SSH v.1 protocol.

 * ssh(1): Remove 3des-cbc from the client's default proposal. 64-bit
   block ciphers are not safe in 2016 and we don't want to wait until
   attacks like SWEET32 are extended to SSH. As 3des-cbc was the
   only mandatory cipher in the SSH RFCs, this may cause problems
   connecting to older devices using the default configuration,
   but it's highly likely that such devices already need explicit
   configuration for key exchange and hostkey algorithms already
   anyway.

 * sshd(8): Remove support for pre-authentication compression.
   Doing compression early in the protocol probably seemed reasonable
   in the 1990s, but today it's clearly a bad idea in terms of both
   cryptography (cf. multiple compression oracle attacks in TLS) and
   attack surface. Pre-auth compression support has been disabled by
   default for >10 years. Support remains in the client.

 * ssh-agent will refuse to load PKCS#11 modules outside a whitelist
   of trusted paths by default. The path whitelist may be specified
   at run-time.

 * sshd(8): When a forced-command appears in both a certificate and
   an authorized keys/principals command= restriction, sshd will now
   refuse to accept the certificate unless they are identical.
   The previous (documented) behaviour of having the certificate
   forced-command override the other could be a bit confusing and
   error-prone.

 * sshd(8): Remove the UseLogin configuration directive and support
   for having /bin/login manage login sessions.
2016-12-25 00:00:13 +00:00