rpaulo
848d0be7cc
len should be socklen_t, not size_t. Spotted by
...
Juergen Hannken-Illjes <hannken@eis.cs.tu-bs.de>.
2006-05-05 12:49:23 +00:00
rpaulo
de8db47547
Add support for RFC 3542 Adv. Socket API for IPv6 (which obsoletes 2292).
...
* RFC 3542 isn't binary compatible with RFC 2292.
* RFC 2292 support is on by default but can be disabled.
* update ping6, telnet and traceroute6 to the new API.
From the KAME project (www.kame.net).
Reviewed by core.
2006-05-05 00:03:21 +00:00
christos
32c4e3d517
Since MNT_GETARGS is not allowed when any other flags are set, don't set
...
ASYNC in the getargs case.
2006-05-04 19:46:10 +00:00
christos
c543e3e4ab
since yamt prohibits any flag with MNT_GETARGS, don't set MNT_UPDATE for
...
/ when we do getargs.
2006-05-04 19:38:50 +00:00
perseant
efc48a3bfa
newfs_lfs(8) compoment of the recent superblock parameter addition. Change
...
the wording of the explanation of the -M option, detail a new -R option
that controls initial setting of the new parameter.
2006-05-04 04:39:15 +00:00
yamt
69f5e94d4e
define dummy NOCRED by ourselves, rather than assuming that kernel headers
...
provide it.
2006-05-03 15:04:51 +00:00
rpaulo
227effc121
Add two new options from FreeBSD:
...
hidessid | -hidessid: SSID broadcast control
apbridge | -apbridge: how to pass packets between wifi clients
2006-04-29 21:32:29 +00:00
perseant
00d9f4be09
Avoid a core dump if ginode() returns NULL. Correct an error message
...
while we're here.
2006-04-28 00:07:54 +00:00
wiz
94aa5cae8a
New sentence, new line.
2006-04-23 16:48:46 +00:00
jld
aab6081169
When testing seek speed (for the -A option), use sector-aligned offsets
...
so the reads don't always fail, and also be more careful not to read off
the end of the disk. If a read does fail, error out instead of silently
leaving the loop early (and possibly dividing by zero seconds), because
it means our idea of the disk size is wrong, or worse.
This fixes PR bin/33199.
2006-04-23 07:56:58 +00:00
skrll
7ba7efe154
Don't use cast expressions as lvalues as newer versions of gcc warn.
2006-04-21 15:00:49 +00:00
christos
23be85ae7f
"struct ucred" should not be exposed to userland. Instead make it a "void *"
...
since it is not really used.
2006-04-19 15:52:58 +00:00
hannken
f4729837b8
Emit "a snapshot of" message for snap_internal case too.
2006-04-19 15:42:12 +00:00
salo
b0b7590bc7
Add support for running multi-user in a chroot() environment.
...
How it works:
- after successful execution of /etc/rc, check the value of "init.root"
sysctl node, if it's different than "/", chroot() into its value and run
/etc/rc inside the chroot(),
- in single-user, return back to the original / file system.
Allows running with / file system on e.g., cgd(4), vnd(4) or ccd(4) volumes.
Idea first discussed with Matt Thomas, implemented by Jachym Holecek <freza
(at) liberouter.org> with some nitpicks by me. Successfully used by me for
almost a year with / on a cgd(4) volume (for more information about the setup
check ftp://ftp.NetBSD.org/pub/NetBSD/misc/salo/init-chroot/ ).
2006-04-18 11:40:26 +00:00
perseant
7700866e01
Remove the free list ordering/disordering code, since the kernel now keeps
...
the list in order (ordering it on mount).
Regularize error messages: these are now all in ALL CAPS, with all hex
numbers (not reported in caps) prefixed by 0x. (The non-fsck-specific
messages are an exception to this all-caps rule.)
2006-04-17 19:05:16 +00:00
perseant
1f429c3724
Don't update the superblock if we were run with -n, regardless of whether
...
the "clean" bit is set.
2006-04-13 19:50:10 +00:00
dbj
a015786b0d
the root directory of non fat32 filesystems is stored in a special area.
...
a couple of corner cases can cause it to fail to write out that area
after it performs repairs.
2006-04-10 03:25:11 +00:00
jnemeth
7b95c00460
Coverity CID 2784: Add more checks for value==NULL.
2006-03-30 08:02:40 +00:00
christos
fbe98ede0f
Coverity CID 2763: Add more checks for value==NULL.
2006-03-26 23:12:48 +00:00
christos
48ce3c5d75
Coverity CID 2764: Avoid null reference
2006-03-26 23:10:26 +00:00
christos
3c0ef79b7f
Coverity CID 2766: Don't leak memory.
2006-03-26 23:06:45 +00:00
jmmv
862d1d4e18
There is no need to check for the resulting value of a strto*l call after
...
ERANGE has been raised. Just remove the extra checks, which were incorrect
anyway in almost all calls because they did not match their corresponding
strto*l function.
This caused mount_tmpfs to not catch some error cases in, e.g., i386, as
strtoll was returning LLONG_MAX instead of LONG_MAX, which are different
in this platform (but not on 64-bit ones).
Problem found by martin@; thanks!
2006-03-26 16:15:15 +00:00
reed
f21a315136
In the DIAGNOSTICS section, document that mismatched LKM and kernel
...
versions will be reported to the console and to the system message
buffer.
And update documentation date.
2006-03-24 00:38:23 +00:00
wiz
d292467748
Remove Kerberos4/NFSKERB settings.
2006-03-23 23:53:23 +00:00
wiz
637b6cf962
unifdef NFSKERB (Kerberos 4 support). Update man page and usage() for
...
-K and -m removal (Kerberos 4 specific options).
2006-03-23 23:23:27 +00:00
wiz
c1bf91bf36
Fix typo in Xref.
2006-03-23 20:15:49 +00:00
christos
fbdfb6fbf0
Coverity CID 2753: Free the correct variable.
2006-03-22 16:35:44 +00:00
christos
bd5a805fc3
fix compile problem.
2006-03-22 15:45:16 +00:00
christos
86bc6ef985
Coverity CID 786: Avoid NULL dereference.
2006-03-22 02:25:44 +00:00
christos
9a02e676ef
Coverity CID 1301: Return early if we could not open /dev/null
2006-03-22 02:23:11 +00:00
christos
7ef824757b
Coverity CID 1593: Plug memory leak
2006-03-22 02:21:20 +00:00
pavel
d8e5c31820
Clarify and correct the description of the -R (Record Route) flag.
...
Reviewed by jnemeth, whith help from him.
2006-03-21 22:54:46 +00:00
christos
aa1540d7a7
Coverity CID 2742: Avoid NULL deref.
2006-03-21 21:50:44 +00:00
christos
b771b70f76
Coverity CID 1601: Fix memory leak.
2006-03-21 21:43:03 +00:00
christos
22eda87ac9
Coverity CID 1603: Fix memory leak.
2006-03-21 21:41:00 +00:00
christos
0c9dfbbbdf
Coverity CID 1688: Fix memory leak.
2006-03-21 21:37:34 +00:00
christos
1f5c810a97
Coverity CID 782: Don't dereference NULL was not going to happen, but:
...
1. return error instead of the trashed errno.
2. don't return -1, but return ENAMETOOLONG.
3. eliminate unused code.
2006-03-21 21:34:01 +00:00
christos
7067dcb9a4
Always check the results of getmntopts() and free them.
2006-03-21 21:11:41 +00:00
pavel
c38d26c2d6
Bump date, requested by wiz.
2006-03-21 09:54:12 +00:00
pavel
104eb3fa9f
-I does work for unicast pings too (it sets the source address).
...
With some language help from dsl.
Reviewed by jnemeth.
2006-03-21 09:15:53 +00:00
christos
db80529cf2
Delete an obvious free(NULL) pointed out by erh.
2006-03-20 22:44:25 +00:00
christos
731d9b0c04
Coverity CID 2305: Fix memory leak.
2006-03-20 01:51:54 +00:00
christos
ef75a584c1
Coverity CID 2301: FIx memory leak.
2006-03-20 01:45:12 +00:00
christos
4b15f35af4
Coverity CID 2302: Free fat if fatal error to avoid leak.
2006-03-20 01:42:47 +00:00
christos
74f7dc651d
Coverity CID 2299: Fix memory leak.
2006-03-20 01:37:10 +00:00
christos
16f27d8161
Coverity CID 2298: Fix memory leak.
2006-03-20 01:34:16 +00:00
christos
3401a36160
Coverity CID 2074: Fix memory leak.
2006-03-20 01:30:34 +00:00
christos
635d729786
Coverity CID 1745: Fix memory leak.
2006-03-20 01:27:44 +00:00
christos
e5919d97fc
Coverity CID 1078: Add assertion check for NULL pointer.
2006-03-20 01:25:14 +00:00
christos
0794bfc81d
Coverity CID 2551: Don't use LIST_FOREACH() if you are going to free the
...
current element (bp) in the body of the loop; the foreach does bp = bp->next;
2006-03-20 01:20:55 +00:00