Age | Commit message (Collapse) | Author |
|
largely derived from aarch64 code.
usertc.c taken from hppa
with cleanup to Symbols.list and tfork_thread.S
Further cleanup and enhancement will be performed in-tree.
ok kettenis@
|
|
This adds support for front-ending httpd(8) with a TLS-terminating
gateway like relayd(8) that forwards unencrypted http traffic.
Previously httpd(8) would use a full URL in the Location header in 301
redirects when a user-agent requests a directory but without the
trailing '/'. If the user-agent originally connected with https, this
caused the redirected url to be http.
This change conforms to RFC7231 section 7.1.2.
Reported by Vincent Lee.
OK claudio@
|
|
hardware. Implement fp[gs]etround(3) and fp[gs]etsticky(3) and tweak
the fp[gs]etmask(3) implementation to provide the right weak symbols.
This implementation deliberately ignores the additional
"round to nearest, away from zero" as this interface is derived from
i386-specific code and the i387 FPU doesn't implement such a rounding
mode. This is a legacy API and code should use <fenv.h> instead.
ok drahn@
|
|
The chunk with mapping for pm_pdir_intel causes crashes for sthen@
and bluhm@. i386 pagedaemon panic: kernel diagnostic assertion
"pg->wire_count == 0" failed: file "/usr/src/sys/uvm/uvm_page.c",
line 1265
One of my 8 CPU 3 GB RAM machines can reproduce it when building
clang with make -j 9. This commit hides the underlying bug.
OK mpi@
|
|
contents executable using pmap_kenter_pa(9) since uvm stops us from doing
so using higher-level interfaces (for good reasons).
Maintaining W^X of course!
ok mpi@
|
|
30 processes with 30 threads each.
|
|
|
|
|
|
ok drahn@ kettenis@
|
|
|
|
|
|
With several fixes from review integrated.
ok patrick@
|
|
From trondd, OK pjanzen@
|
|
to understand)
from Edgar Pettijohn
|
|
|
|
ok kettenis@
|
|
getWCookie() is an OpenBSD addition that is needed on new architectures.
ok kettenis@
|
|
mbuf list to if_output().
OK sashan@ mvs@
|
|
|
|
|
|
ok and help from espie@
|
|
Ported from arm64 with changes for riscv64.
Initial effort by Mickael Torres, with additional updates
ACPI api removed per request
ok kettenis@
|
|
Fork 300 children that sleep. Kill them together as process group.
Sleeping can optionally be done with individual memory layout by
executing sleep(1).
|
|
verifier." (r1.27). While this may have "fixed" one corner case, it
broke expectations of Perl Net::SSLeay and Ruby OpenSSL regression
tests.
ok bcook
|
|
|
|
implements a variation on the traditional "to nearest" rounding mode that
rounds away from zero when tied. The upcoming C2x includes support for that
and LLVM already implements this so provide an implementation that matches
our system compiler.
ok drahn@
|
|
Based on arm64 versions
this implementation is missing jmpxor security enhancement.
Good enough deraadt@
|
|
derived from arm64
go ahead deraadt@
|
|
|
|
ok deraadt@
|
|
|
|
ok jmc@ deraadt@
|
|
ok deraadt@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Heavy lifting by mortimer@, thank you so much!
|
|
|
|
|
|
Support to skip frames is missing on arm64 and i386, but the stack
traces are useful anyway. sparc64 should work, but I could not
test it. Other architectures do not have stacktrace_save_at() and
dynamic tracer does not link.
from patrick@; OK semarie@
|
|
The global list of ARP llinfo is protected by net lock. This is
not sufficent when we switch to shared netlock. Add a mutex for
insertion and removal when net lock is not exclusive. This is
needed if we want run IP output on multiple CPU.
Put an assertion for shared net lock into arp_rtrequest.
input mvs@; OK sashan@
|
|
|
|
|
|
ok hackroom
tested by plenty
|
|
ok hackroom
tested by plenty
|
|
without the KERNEL_LOCK.
This moves VXLOCK and VXWANT to a mutex protected v_lflag field and also
v_lockcount is protected by this mutex.
The vn_lock() dance is overly complex and all of this should probably replaced
by a proper lock on the vnode but such a diff is a lot more complex. This
is an intermediate step so that at least some calls can be modified to grab
the KERNEL_LOCK later or not at all.
OK mpi@
|