239087 Commits

Author SHA1 Message Date
martin
76713fa86f We never exec(2) with a kernel vmspace, so do not test for that, but instead
KASSERT() that we don't.
When calculating the load address for the interpreter (e.g. ld.elf_so),
we need to take into account wether the exec'd process will run with
topdown memory or bottom up. We can not use the current vmspace's flags
to test for that, as this happens too early. Luckily the execpack already
knows what the new state will be later, so instead of testing the current
vmspace, pass the info as additional argument to struct emul
e_vm_default_addr.
Fix all such functions and adopt all callers.
2015-11-26 13:15:34 +00:00
wiz
a1d408828c Sort sections. Mark up NULL. End Bl with El. 2015-11-26 09:48:21 +00:00
ozaki-r
f373fa78e6 Fix build dependency of if_llatbl.c
if_llatbl.c is required if inet or inet6 is enabled. Depending on ether
doesn't suit for NDP case.
2015-11-26 01:41:20 +00:00
christos
600fe0a3fe fix memory leaks (from Rin Okuyama) 2015-11-26 01:05:08 +00:00
christos
f5cb16e708 Always copy the area buffer, even when the length was the same
(from Rin Okuyama)
2015-11-26 01:03:22 +00:00
christos
55be0c146d Fix documentation inconsistencies, and add some clarifications (from kre) 2015-11-26 01:00:54 +00:00
christos
51dbeaccf4 Patch from kre:
- fix missing/inconsistent abbreviations
- set dst only if we are using localtime.
- properly check for errors where there were missing checks
- handle errno properly including saving and restoring.
2015-11-26 01:00:02 +00:00
sjg
8098e1a571 ParseTrackInput: do not access beyond end of buffer.
Detected by Address Sanitizer - dim at FreeBSD.org
2015-11-26 00:23:04 +00:00
jmcneill
4f2f3d26d2 disable watchdog at startup 2015-11-26 00:06:59 +00:00
christos
d4ec6dff41 PR/50092: Rin Okuyama: Fix memory leaks in vi when resizing. 2015-11-25 20:25:20 +00:00
christos
f464a786c5 From PR/50092:
- handle calling _ti_readterm with an existing initialized terminal
- simplify free code
Also:
- fix an inconsistency in userdefs count computation
2015-11-25 19:13:49 +00:00
christos
30fc0caf54 We have the max length; use snprintf. 2015-11-25 18:46:59 +00:00
christos
db71acfd71 PR/50092: Rin Okuyama: Fix memory leak. 2015-11-25 18:46:24 +00:00
christos
7ddef8633d PR/50092: Fix memory leak. 2015-11-25 18:38:21 +00:00
macallan
ec89d49df5 build EXA support 2015-11-25 18:02:08 +00:00
wiz
516ffc06d2 Sort options in usage to match man page order. 2015-11-25 16:32:20 +00:00
wiz
9c188db61b "file system" as two words. 2015-11-25 16:32:00 +00:00
maxv
386a6446d1 Cosmetic changes. 2015-11-25 16:00:09 +00:00
skrll
24c4f56c61 G/C TEGRAK1_PMAP_WORKAROUND.
Using XN (eXecute Never) properly means speculative reads from devices
aren't done.  Pretty sure this was the cause of the wedges.
2015-11-25 08:39:45 +00:00
skrll
58ba3c2d62 In the ARM_MMU_EXTENDED case make sure the kernel mappings are marked with
XN (eXecute Never) appropriately.

The XN logic is inconsistent and could do with changing to XN always set
and cleared for VM_PROT_EXECUTE (or the inverse) everywhere.
2015-11-25 08:36:50 +00:00
skrll
ebd4a8ed79 Trailing whitespace. 2015-11-25 08:32:33 +00:00
pgoyette
dd025ffd3b Be a bit more paranoid about hijacking (and restoring) syscall function
pointers.  Ensure that we have the correct "old" values before setting
new values, for both "intall" and "deinstall".

XXX This is NOT intended to encourage additional cases of hijacking!  If
XXX some other hijack feature ever gets committed, this code should be
XXX moved to (most likely) kern/kern_syscall.c.
2015-11-25 07:34:49 +00:00
ozaki-r
ff97010dea Declare __debugused for no DIAGNOSTIC kernels
This unbreaks hpcsh GENERIC kernel build.
2015-11-25 07:06:19 +00:00
ozaki-r
ecd5b23eef Use lltable/llentry for NDP
lltable and llentry were introduced to replace ARP cache data structure
for further restructuring of the routing table: L2 nexthop cache
separation. This change replaces the NDP cache data structure
(llinfo_nd6) with them as well as ARP.

One noticeable change is for neighbor cache GC mechanism that was
introduced to prevent IPv6 DoS attacks. net.inet6.ip6.neighborgcthresh
was the max number of caches that we store in the system. After
introducing lltable/llentry, the value is changed to be per-interface
basis because lltable/llentry stores neighbor caches in each interface
separately. And the change brings one degradation; the old GC mechanism
dropped exceeded packets based on LRU while the new implementation drops
packets in order from the beginning of lltable (a hash table + linked
lists). It would be improved in the future.

Added functions in in6.c come from FreeBSD (as of r286629) and are
tweaked for NetBSD.

Proposed on tech-kern and tech-net.
2015-11-25 06:21:26 +00:00
marty
cfcf2b60eb snapshot: Does NOT boot 2015-11-25 04:04:13 +00:00
marty
aed5bf48c5 something temporary that will go away once odroid xu4 works 2015-11-25 04:03:34 +00:00
christos
27a26957d4 PR/50360: Thomas Klausner: Fix MKREPRO builds 2015-11-25 01:20:11 +00:00
christos
1ef9a127cf PR/50360: Thomas Klausner: Fix MKREPRO issue 2015-11-25 01:12:03 +00:00
christos
ec8137f3d4 PR/50360: Thomas Klausner: MKREPRO fix 2015-11-25 01:08:34 +00:00
christos
f7d3cc6004 PR/50360: Thomas Klausner: if MKREPRO is set, provide a consistent timestamp
for the files in the cdroms to be built. For now we copy the timestamp of
<sys/param.h>. We could set an absolute timestamp too like -T 0 for the epoch.
2015-11-25 00:50:57 +00:00
christos
799916c021 Provide a -T option to set timestamps to a consistent value for MKREPRO 2015-11-25 00:48:49 +00:00
christos
62320ab8fc fix sets 2015-11-24 23:33:46 +00:00
leot
da9851d4a9 Add NetBSD RCS Id. 2015-11-24 23:30:04 +00:00
plunky
6741d295e4 newer versions of the Bluetooth Core specification state that
service record number values of 0x00000001->0x0000FFFF are
reserved, so comply with that here.
2015-11-24 21:11:39 +00:00
christos
f184794dc1 kern/50456: Freddy DISSAUX: Fix packets lost with tcpdump. 2015-11-24 20:13:12 +00:00
jakllsch
aabeaec83d Revert previous. At least AR9280 and AR9285 apparently do not have
working-by-default MSI functionality, despite advertising such.

Fixes PR kern/50465.
2015-11-24 18:17:37 +00:00
christos
2e0dfabb5f fix crash(8) printing of callouts. 2015-11-24 15:48:23 +00:00
christos
35da36c439 CID 1340063: fix TOCTOU 2015-11-24 14:07:18 +00:00
jklos
2f385a84d2 One too many parenthesis removed. 2015-11-24 08:48:25 +00:00
ozaki-r
bb7b9eed2e Add fastforward6 test 2015-11-24 02:37:33 +00:00
christos
7099a15c75 PR/50092: don't leak screen on multiple setterms. 2015-11-24 01:59:32 +00:00
pgoyette
5a91b3ef3b Add missing /* $NetBSD$ */ keyword 2015-11-24 01:05:50 +00:00
pgoyette
d511d03d04 finish previous - remove no-longer-used variables 2015-11-24 01:01:42 +00:00
joerg
6d8db05630 Replace left shifts of negative values with appropiate unsigned values. 2015-11-23 23:46:33 +00:00
joerg
b735893a87 Cast argument to uint64_t first before shifting to avoid UB for
left-shifting negative values.
2015-11-23 23:45:44 +00:00
pgoyette
94e1cb8831 It is no longer required that the target process be a descendant of the
tracking process.
2015-11-23 23:28:33 +00:00
pgoyette
8ed3d37d0b Remove the requirement that the target (tracked) process be a descendant
of the tracking process.  The call to kauth() should be sufficient to
address any security concerns.
2015-11-23 23:27:38 +00:00
pgoyette
f4bbc3f78c Minor rephrasing for English grammar police. 2015-11-23 23:23:25 +00:00
pgoyette
52b76a516b Include additional info, including potential security consideration. 2015-11-23 23:00:29 +00:00
christos
e804370940 fix ti_puts prototype 2015-11-23 22:35:28 +00:00