Age | Commit message (Collapse) | Author |
|
let people know what changed.
ok kettenis, phessler
|
|
Coverity CID 1453358; Severity: unlikely, not user-visible
ok millert, visa
|
|
|
|
them one at a time. solves a problem where .d files were showing up with
static names.
ok deraadt
|
|
This is obviously useful in order to investigate a failure to mount an NFS
or other root device.
ok mpi
|
|
|
|
of mutexes. Use this immediately for the pool_cache futex pools.
Mostly worked out with dlg@ during e2k17
ok mpi@ tedu@
|
|
ok tedu@ mpi@
|
|
ok mpi@ deraadt@
|
|
|
|
libc and man page parts to come.
ok guenther
|
|
Tested by Hrvoje Popovski, ok bluhm@
|
|
|
|
in common checks for unix, inet, inet6 instead of partial checks
here and there. Some checks are already done at a higher layer,
but better be paranoid with user input.
OK claudio@ millert@
|
|
ok phessler@, visa@, bluhm@
|
|
This prevents deadlocks when doing 'boot reboot' after the kernel panic'd.
Discussed with bluhm@ and guenther@, ok visa@
|
|
OK mpi@ visa@
|
|
Protect the fields modifieds by sosetopt() and simplify the dance
with the stars.
ok bluhm@
|
|
truncate the length of a syslog message to 8192 bytes. Use one
global define LOG_MAXLINE for all of them.
OK deraadt@ millert@
|
|
accepted by both clang and gcc and safe given that varargs arguments are
promoted to int anyway. Using %h in the kernel is discouraged anyway according
to bluhm@.
Unbreaks the tree on gcc architectures.
ok pirofti@, bluhm@, florian@
|
|
ok jca@, florian@
|
|
if we compile pf, ipsec, pipex or nfsserver.
Suggested by mpi some time ago.
Tweak & OK bluhm
deraadt assumes it's fair
|
|
us from bogus input from file systems like fuse.
bug report Ilja Van Sprundel; OK deraadt@
|
|
ok deraadt@ benno@
|
|
selwakeup().
ok bluhm@
|
|
As a side effect, soconnect() and soconnect2() now expect a locked socket,
so update all the callers.
ok bluhm@
|
|
and `so_snd' are modified.
ok bluhm@, visa@
|
|
for use by the linux compatibility APIs in drm(4).
While I hate infecting code in sys/kern with this, untangling all the
of having different types and different signedness is too much for me
right now. The best strategy may be to change ticks itself to be long
but that needs some careful auditing.
ok deraadt@
|
|
for sa_len and sa_family is provided. This will make handling of
socket name mbufs within the kernel safer.
issue reported by Ilja Van Sprundel; OK claudio@
|
|
if TIOCGPGRP fail.
Issue found by Ilja van Sprundel.
ok bluhm@, millert@, deraadt@
|
|
splicing, another process may allocate it in the meantime. Then
one of the splicing structures leaked in sosplice(). Recheck that
no struct sosplice exists after a protential sleep.
reported by Ilja Van Sprundel; OK mpi@
|
|
and `so_rcv'.
ok bluhm@, claudio@, visa@
|
|
ok bluhm@, claudio@, visa@
|
|
Found by Ilja Van Sprundel
ok kettenis
|
|
uninitialised data can be dumped into the ktrace message.
Found by Ilja Van Sprundel
OK bluhm@
|
|
Do the same in sendsyslog(2) and document the behavior.
reported by Ilja Van Sprundel; OK millert@ deraadt@
|
|
with the socket lock.
This change is safe because sbreserve() already asserts that the lock is
held, but it acts as implicit documentation and indicates that I looked
at the function.
|
|
been acquired in sosend(). Fixes a kernel lock assertion panic.
OK visa@ mpi@
|
|
Buffercache performs read-ahead for cluster reads by extending
the length of an original read operation to the MAXPHYS (64k).
Upon I/O completion, the length is trimmed and the buffer is
returned to the filesystem and the remaining data is cached.
However, under certain circumstances, the underlying hardware
may fail to do a complete I/O operation and return with a non-
zero value of the residual length (i.e. data that wasn't read).
The residual length may exceed the size of an original request
and must be re-adjusted to uphold the contract with the caller,
e.g. the filesystem. At the same time, read-ahead buffers that
cover chunks of memory corresponding to the residual length
must be invalidated and not cached.
Discussed at length during d2k17, ok tedu
|
|
lock.
Prevents a future lock recursion since soo_ioctl() will need to grab
the lock.
ok bluhm@, visa@
|
|
Suggested by and OK dlg@
|
|
of items that a cache list is allowed to hold. This lets the cache
release resources back to the common pool after pressure on the cache
has decreased.
OK dlg@
|
|
this is almost a straightforward change of spl ops with mutex ops,
except the accounting has been shuffled around. memory is counted
as used before an attempt to allocate it from uvm is made to prevent
overcommitting memory. this is modelled on how pools limit allocations.
the uvm bits have been eyeballed by kettenis@ who says they should be safe.
visa@ found some nits which have been fixed.
tested by chris@ and amit kulkarni
ok kettenis@ visa@ mpi@
|
|
It is unsafe to sleep while iterating the list of pending events in
kqueue_scan().
Reported by abieber@ and juanfra@
|
|
add a little breathing room.
|
|
Implicitely protects `so_state' with the socket lock in sosend().
ok visa@, bluhm@
|
|
ok bluhm@, visa@
|
|
ok bluhm@, visa@
|
|
to KNOTE() as we are already holding the lock. Fixes "panic:
rw_enter: netlock locking against myself" reported by Gregor Best
and reproduced with src/regress/lib/libtls/gotls.
OK millert@
|
|
kqueue filters.
ok millert@, bluhm@, visa@
|