Commit Graph

242024 Commits

Author SHA1 Message Date
christos d5fc259be3 WARNS=1 2016-04-20 17:18:52 +00:00
christos a56964c222 /32 and /128 are valid netmasks. 2016-04-20 15:46:08 +00:00
christos 5d9808ec41 Don't subtract base if not pie. 2016-04-20 14:00:16 +00:00
knakahara b76ec0b083 IFQ_ENQUEUE refactor (3/3) : eliminate pktattr argument from IFQ_ENQUEUE caller 2016-04-20 09:01:03 +00:00
knakahara 40b1061c07 IFQ_ENQUEUE refactor (2/3) : eliminate pktattr argument from altq implemantation 2016-04-20 08:58:48 +00:00
knakahara 6190bb13a7 IFQ_ENQUEUE refactor (1/3) : add altq_pktattr fields to m_pkthdr
Reviewed by joerg@n.o and tls@n.o, thanks.
2016-04-20 08:56:32 +00:00
roy 465626aae4 Note import of dhcpcd-6.10.3 2016-04-20 08:54:38 +00:00
knakahara 09d9e68fbe Apply mbuf initialize function to stack mbuf used as M_PKTHDR.
It is required to prevent unexpected behavior in future works abount m_pkthdr.
2016-04-20 08:53:11 +00:00
roy 302733a775 Sync 2016-04-20 08:53:01 +00:00
knakahara 10f2dc77bc Add init function for mbuf.
some functions use mbuf as stack variable instead of allocating by m_get().
They should use this function(s) to prevent access to uninitialized fields.

Currently, the mbuf stack allocating functions are the following.
    + sys/dev/ic/bwi.c
      - bwi_rxeof()
      - bwi_encap()
    + sys/dev/ic/dp8390.c
      - dp8390_ipkdb_send()
    + sys/dev/pci/if_txp.c
      - txp_download_fw_section()
    + sys/dev/ppbus/if_plip.c
      - lptap()
    + sys/net/bpf.c
      - _pf_mtap2()
      - _pf_mtap_af()
      - _pf_mtap_sl_out()
    + sys/netisdn/i4b_ipr.c
      - ipr_rx_data_rdy()
      - ipr_tx_queue_empty()

Reviewed by kre@n.o and christos@n.o, thanks.
2016-04-20 08:50:43 +00:00
skrll a7d674ca52 Re-order includes so that ARM_TARGET2_DWARF_FORMAT takes effect
Fixes PR/51066: C++ text relocations
2016-04-20 06:51:03 +00:00
christos dc12ea256d The gcc diagnostic formats handle %m 2016-04-19 21:11:44 +00:00
christos 3a8ea6fb2d Enable minimal warnings, disabling the unused and narrowing ones that gcc
authors don't seem to pay attention to.
2016-04-19 21:11:05 +00:00
christos 1364b6032a From Ingo Schwarze:
- Put the data type el_rfunc_t into the public header <histedit.h>.
 - Make el_read in struct editline an opaque pointer rather
   than an embedded struct.
 - Do not include "read.h" everywhere, but only in the two files
   needing access to el_read, read.c and el.c.
 - To functions that don't need more, pass the struct el_read_t *
   rather than the full EditLine *.
 - Of course, that means that read_init() can now fail from
   memory exhaustion, but it's easy to clean up after that.
2016-04-19 19:50:53 +00:00
nonaka 2a9c968127 regen 2016-04-19 15:51:21 +00:00
nonaka 37556f7a2a Added Buffalo WI-U2-300D. 2016-04-19 15:50:24 +00:00
kiyohara 6bacadfe0b OVERO's .ub file includes release 2016-04-19 12:02:55 +00:00
ozaki-r 5fd142cec8 Fix error path 2016-04-19 09:36:35 +00:00
ozaki-r 54748dcad2 Separate MPLS-related routines from ip_hresolv_output
No functional changes.
2016-04-19 09:29:54 +00:00
ozaki-r cc3dd2e07b Apply psref(9) to bridge(4)
Note that there is an issue that ioctls for an interface and a destruction
of the interface can run in parallel and it causes race conditions on
bridge as well (it rarely happens). The issue will be addressed in the
interface common code (if.c).
2016-04-19 07:10:22 +00:00
ozaki-r d81e97fa58 Remove BRIDGE_MPSAFE switch and enable MP-safe code by default
We need to enable it by default because bridge_input now runs
in softint, but bridge_input w/o BRIDGE_MPSAFE was designed as
it runs in hardware interrupt.

Note that there remains a racy code in bridge_output; it will be
solved in the upcoming change (applying psref(9)).
2016-04-19 07:03:12 +00:00
mrg 9cd640c618 revert rev 1.6. we don't have access to those files as normal files
and possible will get them directly elsewhere soon.

(if i hack my nouveau to ignore fireware failure, it end up having
a vaguely working console and slowly working X, which is better than
the current situation.)
2016-04-19 06:57:37 +00:00
ozaki-r 220ff4e7a0 Prevent LWP migrations between CPUs during upper layer processing
This is a contract of psref(9) that is used by upper layer componenets,
e.g., bridge(4).
2016-04-19 05:48:10 +00:00
ozaki-r 07d863c903 Constify rtentry of arpresolve
We don't need to (rather shouldn't) modify rtentry in there.
2016-04-19 04:13:56 +00:00
riastradh cd8d344cdd Make sure rbtrees are empty on desctruction.
If related to PR kern/51076, might help catch the bug a bit earlier.
2016-04-19 02:52:29 +00:00
christos c28087f0a3 be more specific about what needs to be cleaned for libedit. 2016-04-18 19:37:41 +00:00
christos 6bc428858e mention libedit 2016-04-18 18:58:04 +00:00
christos 4fc1f47d56 From Ingo Schwarze:
* Replace fcns.c by a shorter and simpler func.h
   and include it only in the one file needing it, map.c.
 * Combine help.h and help.c into a simplified help.h
   and include it only in the one file needing it, map.c.
 * Check the very simple, static files editline.c, historyn.c, and
   tokenizern.c into CVS rather than needlessly generating them.
 * So we no longer autogenerate any C files.  :-)
 * Shorten and simplify makelist by deleting the options -n, -e, -bc,
   and -m; the latter was unused and useless in the first place.
 * Move the declaration of el_func_t from fcns.h to the header
   actually needing it, map.h.  Since that header is already
   included by el.h for unrelated reasons, that makes el_func_t
   just as globally available as before.
 * No longer include the simplified fcns.h into el.h,
   include it directly into the *.c files needing it.
2016-04-18 17:01:19 +00:00
ozaki-r 095fdb0468 Add a test case for static ARP
It tests receiving an ARP request that has a spa (i.e., IP address) whose
ARP entry already exists in the table as a static ARP entry.
2016-04-18 02:27:34 +00:00
ozaki-r 805fe96546 Fix panic on receiving an ARP request
The panic happened if an ARP request has a spa (i.e., IP address) whose
ARP entry already exists in the table as a static ARP entry.
2016-04-18 02:24:42 +00:00
ozaki-r 4ace575dc7 Get rid of meaningless RTF_UP check from ip_hresolv_output
The check is meaningless because
- An obtained rtentry is ensured that it's always RTF_UP by rtcache,
  rtalloc1 and rtlookup. If the rtentry isn't changed (i.e., RTF_UP gets
  dropped) during processing, the check should be unnecessary
- Even if not, i.e., an obtained rtentry can be changed during processing,
  checking only at the point doesn't help; the rtentry can be changed after
  the check

Instead we have to ensure that RTF_UP isn't dropped if someone is using it
somehow. Note that we already ensure that a rtentry being used isn't freed
by rt_refcnt.

Proposed on tech-kern and tech-net.
2016-04-18 01:28:06 +00:00
palle 5254ca51fa Update sparc64 TODO file: note issue with interrupt handling + issue when booting from iso image 2016-04-17 19:54:32 +00:00
christos a2eaeedb12 Remove empty callbacks (Ingo Schwartze) 2016-04-17 18:39:14 +00:00
martin c0a2d7e484 Move the SMP-disabled hack for SUN4V a bit earlier 2016-04-17 14:32:03 +00:00
nakayama d3ef62dc17 Fix NetBSD RCS keyword. 2016-04-17 02:16:26 +00:00
nakayama 161d0b9e5f Use xorg-pkg-ver.mk to retrieve PACKAGE_STRING. 2016-04-16 20:52:07 +00:00
dholland b48722eeda Note that deleting objdirs (not just cleandir) may be necessary for the
gcc update.
2016-04-16 19:47:45 +00:00
riastradh 761e23db0b Add a note about PIE for amd64 requiring clean objdir. 2016-04-16 18:28:22 +00:00
nakayama af72fa8d05 Set PACKAGE_STRING properly. 2016-04-16 16:57:06 +00:00
martin d6fc88e543 If compiling with SUN4V support, bump MAXCPUS to 256. 2016-04-15 20:29:13 +00:00
mrg 0a7cdc80ba use %zu instead of %lu for size_t. 2016-04-15 20:00:13 +00:00
mrg 27da98ff14 updates and bozohttpd 20160415:
o  add search-word support for CGI
o  fix a security issue in CGI suffix handler support which would
   allow remote code execution, from shm@netbsd.org
o  -C option supports now CGI scripts only
2016-04-15 17:57:21 +00:00
riastradh 10a4418ee6 Tweak wording. Use \(em for emdash. 2016-04-15 17:55:58 +00:00
ozaki-r c73a69e593 Add a new test case for PPPoE using PAP
From s-yamaguchi@IIJ (with some tweaks by me)
2016-04-15 01:38:16 +00:00
ozaki-r 4da47673a2 Rump-ify if_pppoe
From s-yamaguchi@IIJ
2016-04-15 01:35:25 +00:00
ozaki-r c49e748c57 Hide PPPoE variables from if_ethersubr.c
This improves modularity of if_pppoe.

From s-yamaguchi@IIJ
2016-04-15 01:31:29 +00:00
salazar 1adc2ecbd6 add lneto 2016-04-14 21:16:18 +00:00
skrll 42fe483061 Remove duplicated __RCSIDs I added years ago - I blame CVS.
Spotted by Miod Vallat
2016-04-14 20:17:07 +00:00
rjs b4a446b522 Remove stray debug printf(). 2016-04-14 18:36:56 +00:00
christos db1e653281 If PAM is configured to read user-specified environment variables
and UseLogin=yes in sshd_config, then a hostile local user may
attack /bin/login via LD_PRELOAD or similar environment variables
set via PAM.

CVE-2015-8325, found by Shayan Sadigh, via Colin Watson
https://anongit.mindrot.org/openssh.git/commit/?\
id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755

XXX: pullup-7
2016-04-14 16:42:09 +00:00