Age | Commit message (Collapse) | Author |
|
From Simon Perreault <simon dot perreault at viagenie dot ca> via tech@
|
|
outputs.master.slaves group. lets outputs.master by default control
more than just the internal speaker on some Dell desktops.
|
|
|
|
8 bytes smaller when a raw socket is used.
OK jmc, deraadt.
|
|
Instead of a false data mismatch report, we now print (TRUNC!).
This also fixes two out of bounds accesses.
The "wrong data byte #XXX" counter was also wrong and off by 8 bytes.
OK djm@ on an earlier version, OK deraadt@.
|
|
just use nitems(). (this leaves NENTS() alone for now)
ok deraadt@ krw@
|
|
|
|
|
|
|
|
doesn't test it, so factor out the two places that test it into a
routine and do the refreshing there. With this, arch4random_buf()
doesn't trigger superfluous calls to getpid() when filling large
buffers.
ok deraadt@, "looks nicer indeed" otto@
|
|
the first try
vgone doesn't work in other cases of this. I must fix this slightly differntly
|
|
in nfs_inactive, on a reboot.
The core of the problem was in nfs_nget, when we lose the race to put a new
nfsnode in the tree, we have previously allocated a vnode, which getnewvnode
has done an insmntque into the nfs mp's mntlist. The problem being we then
try again with a new vnode, abandoning this one on the mntlist, leaving
junk there for us to die on when we unmount.
analysis and bogus fix by art@, correct fix by me. much painful testing by
krw@
ok oga@, art@
|
|
picking a name meant that more than 58 sillys in a directory and we fail
with EINVAL, resulting in strange problems for nfs which in turn causes
pain and stress in building, and PTSD in nfs and vfs hackers. Has bit us
in the butt since the vienna f2k7 hackathon.
good suggestions from deraadt@ guenther@ and otto@
ok deraadt@,oga@,blambert@,krw@,guenther@, and a "very special ok" tedu@
Oh god, I'm an nfs hacker..
|
|
"Love it!" marco@
|
|
ok claudio@
|
|
ok claudio@
|
|
"in, in, in!" marco@
|
|
ok krw@
|
|
panic that is caused by vnode aliasing, where checkalias() switches the
vnode ops for our vnode. This means that we end up using ufs unlocking
rather than specfs unlocking (which is a no-op).
ok marco@
|
|
|
|
Fixes PR6274.
ok claudio@
|
|
put () around all sizeof uses.
OK ratchov@
|
|
|
|
|
|
SK-9E21M board. From Brad.
|
|
|
|
|
|
Bug found while auditing the same complaint by parfait,
see the previous commit; still not shutting parfait up.
"wow, that's nasty" deraadt@
|
|
|
|
changes. Don't initiate the handshake when the LDC channel link state comes
up, to avoid a race where both sides initiate the handshake simultaniously,
which leads to a guaranteed failure. Instead rely on the handshake done as
a result of ifconfig up on the interface to succeed. Some retry logic may
be needed there...
This makes it possible to run OpenBSD (diskless) in a guest domain on a
machine running OpenBSD in its control domain.
|
|
ok oga@ during h2k9.
|
|
us from sending an icmp error along with the dhcp reply.
OK henning@
|
|
colours).
|
|
when checking out xenocara from a server running OpenBSD/amd64.
While processing RCS deltas, don't allocate twice as much memory as
needed when copying a line vector to a vector which has less lines.
Also, when switching back from a branch to trunk while searching an
RCS file for a revision, free the trunklines vector immediately after
lines saved in it have been copied back into the currentlines vector.
Somehow, these two changes together make the problem go away.
ok tobias@, "this has been a serious annoyance" sthen@, "sure" deraadt@
|
|
a change we're not readdy for yet.
|
|
|
|
prevents interrupt storms I'm hitting when running OpenBSD as a control domain.
|
|
to get upset by custom soft/hard ulimit settings.
Suggested by todd@
|
|
in absence of all other real listening sockets.
Spotted by todd@
|
|
|
|
|
|
get rid of EX_* since ifconfig(8) is not sysexits program.
discussed with claudio
|
|
are now controlled.
|
|
bounce mails visible in mailq output.
|
|
This is more complex and simpler at the same time...
|
|
one of the src/dst addrs as AID_UNSPEC. So we need to check for NULL before
copying. Fixes a crash seen with tcp-md5 enabled peers.
|
|
|
|
to rewrite it because it was another mangled diff in mail. When will
people learn that the tabs and spaces are important?
|
|
|
|
Buffer overflow (CWE 120): In memcpy of msg.msg with length 'size'
Array size is 2048 bytes, size <= 2080
at line 317 of /usr/src/usr.sbin/afs/src/arlad/nnpfs.c in function 'nnpf
s_send_message_wakeup_data'.
tesing by todd@ and jj@ and me
|