248379 Commits

Author SHA1 Message Date
christos
c16b94cc41 regen 2017-02-03 16:56:55 +00:00
christos
7042ca6ffd add unimple sendmmsg secvmmsg 2017-02-03 16:56:46 +00:00
christos
e0a67653f8 regen 2017-02-03 16:49:19 +00:00
christos
55493546ea add missing unimpl and sendmmsg and recvmmsg 2017-02-03 16:49:08 +00:00
christos
c5f5c7401c regen 2017-02-03 16:44:21 +00:00
christos
14d08d3108 and send and recv mmsg and unimpl 2017-02-03 16:44:12 +00:00
roy
49a353f899 rows is a uint ... it will always be greater than or equal to 0. 2017-02-03 16:42:26 +00:00
christos
91e51a1c17 regen 2017-02-03 16:28:42 +00:00
christos
b66d0eb2f1 add send recv mmsg and unimpl
XXX: fix base?
2017-02-03 16:28:34 +00:00
christos
06345ef5c0 regen 2017-02-03 16:18:38 +00:00
christos
69d5c34487 add sendmmsg and recvmmsg 2017-02-03 16:18:19 +00:00
christos
37eb9fdea3 regen 2017-02-03 16:17:17 +00:00
christos
3556667dfc add send/recv mmsg and comment on the unimpl ones. 2017-02-03 16:17:08 +00:00
christos
b4abffbdeb expose sendmsg_so and recvmsg_so. 2017-02-03 16:06:45 +00:00
plunky
fa2a659b6e update for addition (a while ago) of features2 page 2017-02-03 13:23:37 +00:00
christos
7c6b0dd313 handle accept4 for i386 2017-02-03 13:08:08 +00:00
martin
d3c441585a Do not compile accept4 on i386, there is no such syscall in Linux. 2017-02-03 08:43:02 +00:00
abhinav
b566e9d11b Remove comma after the last Nm entry. 2017-02-03 08:14:58 +00:00
martin
275517d3d4 regen 2017-02-03 07:57:22 +00:00
martin
1fd85a67cb Add accept4 2017-02-03 07:57:11 +00:00
martin
b47bda9001 regen 2017-02-03 07:54:39 +00:00
martin
135a99d720 Add accept4 2017-02-03 07:54:26 +00:00
abhinav
9cd4c38bd9 Use Xr to refer fnmatch(3). 2017-02-03 07:42:43 +00:00
martin
b38640c5c6 Regen for accept4 2017-02-03 06:07:29 +00:00
martin
be06eb4de6 Add accept4 definitions 2017-02-03 06:06:08 +00:00
martin
8bde12d789 Add test program for PR kern/51762 2017-02-02 22:07:33 +00:00
martin
06d5dce161 PR kern/51762: add a test program 2017-02-02 22:07:05 +00:00
uwe
11495586f9 Pass kernend as the start parameter to uvm_page_physload(). This
fixes pmap_steal_memory() as it can now unplug from the start of the
segment.  This might be the right thing to do too as the pages before
kernend are accessed via directly mapped P1, but i need to ask someone
with a clue.  This is also what evbsh3 always did.

Anyway, this at least unbreaks landisk after uvm hotplug fallout.
2017-02-02 21:57:03 +00:00
rin
9e3d987a53 PR port-mac68k/51923
Bump default MAXTSIZ to 32MB for m68k ports, which allos us to use GCC 5.4 on
GENERIC kernels.
Ok jklos
2017-02-02 21:53:54 +00:00
rin
6eadace49f PR port-mac68k/51923
Remove unused SYSPTSIZE and USRPTSIZE from m68k ports.
Ok jklos
2017-02-02 21:50:22 +00:00
uwe
06bb7d7f96 pmap_steal_memory - a few more s/start/avail_start/ fixes for the
hotplug conversion.
2017-02-02 21:35:29 +00:00
uwe
5465d902d6 Add missing spaces in split string literals. 2017-02-02 21:22:08 +00:00
uwe
4777ae6bba pmap_steal_memory - s/start/avail_start/ to fix mistake in the hotplug
conversion.  The kernel now panics (can't unplug memory from the
middle of a segment) instead of triggering a reset.
2017-02-02 21:17:40 +00:00
uwe
b9239b76ad It's completely bogus to pass physmem (i.e. the memory size) as the
"start" parameter to uvm_page_physload().  I guess it never exploded
only because it's the correct "avail_start" that is used.
2017-02-02 21:11:25 +00:00
christos
7e6c542685 add + 2017-02-02 20:49:55 +00:00
christos
8fb3f05024 set 7 and 8 to close on exec. 2017-02-02 20:01:36 +00:00
christos
168f1d4a50 Add fdflags builtin. Discussed with Chet and he has implemented it for
bash too.
2017-02-02 20:00:40 +00:00
macallan
246a181951 support anti-aliased fonts, glyphcache etc. 2017-02-02 19:55:05 +00:00
macallan
a0e93c0528 chipsfb needs glyphcache now 2017-02-02 19:50:35 +00:00
christos
afa63a6672 Who Ride Wit Us? 2017-02-02 19:26:37 +00:00
maxv
7faa8beef7 Fix these comments, we probably won't want to keep them up to date. 2017-02-02 19:12:09 +00:00
maxv
2b26583164 Increase KERNTEXTOFF from 1MB to 2MB on amd64. [1MB; 2MB[ is now handled
by UVM, so there is no physical loss.

On amd64 we always remap the kernel text with 2MB pages, and because of the
1MB start address we were forced to map [0MB; 2MB[ inside the first large
page. The problem is, the lower half is used by UVM to allocate physical
pages, and it is possible that some of these could be used by userland. We
could end up with userland-controllable data mapped into the kernel text on
a privileged page, which is far from being a good idea from a security pov.

I am not fixing i386 yet, because the large page size depends on PAE, and
we probably don't want to have a text located at 4MB on low-memory systems.

(note: I didn't introduce this issue, it was already there when I came in)
2017-02-02 19:09:08 +00:00
christos
3b775e5cd5 declare sockaddr_big; 2017-02-02 18:01:16 +00:00
maxv
7fbd00cfca The first va should depend on the text offset, not the kernel base. Use
rounddown. Note: this value is still wrong, it should be roundup. But
that's another issue that will be fixed in amd64 soon.
2017-02-02 17:37:49 +00:00
christos
8c06ed2feb expose copyout_sockname_sb 2017-02-02 15:37:42 +00:00
christos
98e9e0daa7 implement accept4 2017-02-02 15:36:55 +00:00
christos
c155f74a3f regen 2017-02-02 15:36:12 +00:00
christos
5e0e954523 implement accept4
XXX: mips looks busted (the syscalls file has lots of NOARGS syscalls that
should be STD).
2017-02-02 15:35:46 +00:00
njoly
cada2c18c7 Fix a typo : pthread_mutexaddr_init -> pthread_mutexattr_init. 2017-02-02 10:48:22 +00:00
knakahara
30becc464a remove WM_CORE_LOCK in deferred start routine.
It is enough to check each txq's txq_stopping with
mutex_enter(not mutex_tryenter).

reviewed by ozaki-r@n.o.
2017-02-02 10:29:10 +00:00