christos
c16b94cc41
regen
2017-02-03 16:56:55 +00:00
christos
7042ca6ffd
add unimple sendmmsg secvmmsg
2017-02-03 16:56:46 +00:00
christos
e0a67653f8
regen
2017-02-03 16:49:19 +00:00
christos
55493546ea
add missing unimpl and sendmmsg and recvmmsg
2017-02-03 16:49:08 +00:00
christos
c5f5c7401c
regen
2017-02-03 16:44:21 +00:00
christos
14d08d3108
and send and recv mmsg and unimpl
2017-02-03 16:44:12 +00:00
roy
49a353f899
rows is a uint ... it will always be greater than or equal to 0.
2017-02-03 16:42:26 +00:00
christos
91e51a1c17
regen
2017-02-03 16:28:42 +00:00
christos
b66d0eb2f1
add send recv mmsg and unimpl
...
XXX: fix base?
2017-02-03 16:28:34 +00:00
christos
06345ef5c0
regen
2017-02-03 16:18:38 +00:00
christos
69d5c34487
add sendmmsg and recvmmsg
2017-02-03 16:18:19 +00:00
christos
37eb9fdea3
regen
2017-02-03 16:17:17 +00:00
christos
3556667dfc
add send/recv mmsg and comment on the unimpl ones.
2017-02-03 16:17:08 +00:00
christos
b4abffbdeb
expose sendmsg_so and recvmsg_so.
2017-02-03 16:06:45 +00:00
plunky
fa2a659b6e
update for addition (a while ago) of features2 page
2017-02-03 13:23:37 +00:00
christos
7c6b0dd313
handle accept4 for i386
2017-02-03 13:08:08 +00:00
martin
d3c441585a
Do not compile accept4 on i386, there is no such syscall in Linux.
2017-02-03 08:43:02 +00:00
abhinav
b566e9d11b
Remove comma after the last Nm entry.
2017-02-03 08:14:58 +00:00
martin
275517d3d4
regen
2017-02-03 07:57:22 +00:00
martin
1fd85a67cb
Add accept4
2017-02-03 07:57:11 +00:00
martin
b47bda9001
regen
2017-02-03 07:54:39 +00:00
martin
135a99d720
Add accept4
2017-02-03 07:54:26 +00:00
abhinav
9cd4c38bd9
Use Xr to refer fnmatch(3).
2017-02-03 07:42:43 +00:00
martin
b38640c5c6
Regen for accept4
2017-02-03 06:07:29 +00:00
martin
be06eb4de6
Add accept4 definitions
2017-02-03 06:06:08 +00:00
martin
8bde12d789
Add test program for PR kern/51762
2017-02-02 22:07:33 +00:00
martin
06d5dce161
PR kern/51762: add a test program
2017-02-02 22:07:05 +00:00
uwe
11495586f9
Pass kernend as the start parameter to uvm_page_physload(). This
...
fixes pmap_steal_memory() as it can now unplug from the start of the
segment. This might be the right thing to do too as the pages before
kernend are accessed via directly mapped P1, but i need to ask someone
with a clue. This is also what evbsh3 always did.
Anyway, this at least unbreaks landisk after uvm hotplug fallout.
2017-02-02 21:57:03 +00:00
rin
9e3d987a53
PR port-mac68k/51923
...
Bump default MAXTSIZ to 32MB for m68k ports, which allos us to use GCC 5.4 on
GENERIC kernels.
Ok jklos
2017-02-02 21:53:54 +00:00
rin
6eadace49f
PR port-mac68k/51923
...
Remove unused SYSPTSIZE and USRPTSIZE from m68k ports.
Ok jklos
2017-02-02 21:50:22 +00:00
uwe
06bb7d7f96
pmap_steal_memory - a few more s/start/avail_start/ fixes for the
...
hotplug conversion.
2017-02-02 21:35:29 +00:00
uwe
5465d902d6
Add missing spaces in split string literals.
2017-02-02 21:22:08 +00:00
uwe
4777ae6bba
pmap_steal_memory - s/start/avail_start/ to fix mistake in the hotplug
...
conversion. The kernel now panics (can't unplug memory from the
middle of a segment) instead of triggering a reset.
2017-02-02 21:17:40 +00:00
uwe
b9239b76ad
It's completely bogus to pass physmem (i.e. the memory size) as the
...
"start" parameter to uvm_page_physload(). I guess it never exploded
only because it's the correct "avail_start" that is used.
2017-02-02 21:11:25 +00:00
christos
7e6c542685
add +
2017-02-02 20:49:55 +00:00
christos
8fb3f05024
set 7 and 8 to close on exec.
2017-02-02 20:01:36 +00:00
christos
168f1d4a50
Add fdflags builtin. Discussed with Chet and he has implemented it for
...
bash too.
2017-02-02 20:00:40 +00:00
macallan
246a181951
support anti-aliased fonts, glyphcache etc.
2017-02-02 19:55:05 +00:00
macallan
a0e93c0528
chipsfb needs glyphcache now
2017-02-02 19:50:35 +00:00
christos
afa63a6672
Who Ride Wit Us?
2017-02-02 19:26:37 +00:00
maxv
7faa8beef7
Fix these comments, we probably won't want to keep them up to date.
2017-02-02 19:12:09 +00:00
maxv
2b26583164
Increase KERNTEXTOFF from 1MB to 2MB on amd64. [1MB; 2MB[ is now handled
...
by UVM, so there is no physical loss.
On amd64 we always remap the kernel text with 2MB pages, and because of the
1MB start address we were forced to map [0MB; 2MB[ inside the first large
page. The problem is, the lower half is used by UVM to allocate physical
pages, and it is possible that some of these could be used by userland. We
could end up with userland-controllable data mapped into the kernel text on
a privileged page, which is far from being a good idea from a security pov.
I am not fixing i386 yet, because the large page size depends on PAE, and
we probably don't want to have a text located at 4MB on low-memory systems.
(note: I didn't introduce this issue, it was already there when I came in)
2017-02-02 19:09:08 +00:00
christos
3b775e5cd5
declare sockaddr_big;
2017-02-02 18:01:16 +00:00
maxv
7fbd00cfca
The first va should depend on the text offset, not the kernel base. Use
...
rounddown. Note: this value is still wrong, it should be roundup. But
that's another issue that will be fixed in amd64 soon.
2017-02-02 17:37:49 +00:00
christos
8c06ed2feb
expose copyout_sockname_sb
2017-02-02 15:37:42 +00:00
christos
98e9e0daa7
implement accept4
2017-02-02 15:36:55 +00:00
christos
c155f74a3f
regen
2017-02-02 15:36:12 +00:00
christos
5e0e954523
implement accept4
...
XXX: mips looks busted (the syscalls file has lots of NOARGS syscalls that
should be STD).
2017-02-02 15:35:46 +00:00
njoly
cada2c18c7
Fix a typo : pthread_mutexaddr_init -> pthread_mutexattr_init.
2017-02-02 10:48:22 +00:00
knakahara
30becc464a
remove WM_CORE_LOCK in deferred start routine.
...
It is enough to check each txq's txq_stopping with
mutex_enter(not mutex_tryenter).
reviewed by ozaki-r@n.o.
2017-02-02 10:29:10 +00:00