| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
Move common code from kern_statfs() and kern_fstatfs() into a new helper.
|
|
|
|
| |
Change knlist_destroy() to assertion.
|
|
|
|
| |
Remove unneeded externs keywords. Reindent long lines.
|
|
|
|
|
|
|
|
|
|
| |
sfxge(4): allow DMA descs to cross 4k boundary on EF10
Siena has limitation on maximum byte count and 4k boundary crosssing
(which is stricter than maximum byte count).
EF10 has limitation on maximum byte count only.
Sponsored by: Solarflare Communications, Inc.
|
|
|
|
|
|
|
|
|
| |
sfxge(4): treat EFX_LINK_UNKOWN as link down
It is safer to consider EFX_LINK_UNKNOWN as link down.
link_mode is set to EFX_LINK_UNKNOWN on port stop and fini.
Sponsored by: Solarflare Communications, Inc.
|
|
|
|
|
|
| |
sfxge(4): use SFXGE_LINK_UP() to report link up state
Sponsored by: Solarflare Communications, Inc.
|
| |
|
|
|
|
|
|
| |
- pstat(8) does not accept any arguments other than getopt() args,
so don't bother to adjust argc/argv after getopt() loop.
- Make a string pointer constant.
|
|
|
|
| |
portion is used.
|
| |
|
|
|
|
| |
Build libexec/kadmind when MK_GSSAPI != no because it requires gssapi
|
|
|
|
|
|
|
|
|
|
|
|
| |
r311112:
libgssapi_{krb5,ntlm,spnego} requires MK_GSSAPI != no; conditionalize
their building on the knob
r311115:
Conditionalize adding ${KRB5DIR}/lib/gssapi/krb5/gkrb5_err.et to ETSRCS
if MK_GSSAPI != "no"
|
|
|
|
| |
Remove unnecessary __unused attribute attached to `ctx` in op_begemot_mibII(..)
|
|
|
|
| |
op_usm_users: fix indentation in SNMP_OP_SET block
|
|
|
|
| |
Use calloc instead of malloc + memset(.., 0, ..)
|
|
|
|
|
| |
OS_getSystemUptime: use nitems for calculating the number of elements
in a sysctl mib instead of hardcoding the number 2
|
|
|
|
|
|
|
|
|
|
| |
r310984:
Use calloc instead of malloc + memset(.., 0, ..)
r311102 (by pfg):
Cleanup inelegant calloc(3) introduced in r310984.
|
|
|
|
|
|
|
|
|
|
|
| |
The kernel uses a few negative errno values for internal conditions
such as requesting a system call restart. Normally these errno values
are not exposed to userland. However, kdump needs access to these
values as some of then can be present in a ktrace system call return
record. Previously kdump was defining _KERNEL to gain access to ehse
values, but was then having to manually declare 'errno' (and doing it
incorrectly). Now, kdump uses _WANT_KERNEL_ERRNO instead of _KERNEL
and uses the system-provided declaration of errno.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Tidy up the early parts of vm_map_insert().
MFC r267645 (by alc):
When MAP_STACK_GROWS_{DOWN,UP} are passed to vm_map_insert() set the
corresponding flag(s) in the new map entry.
Pass MAP_STACK_GROWS_DOWN to vm_map_insert() from vm_map_growstack() when
extending the stack in the downward direction.
MFC r267850 (by alc):
Place the check that blocks map entry coalescing on stack entries in
vm_map_simplify_entry().
MFC r267917 (by alc):
Delay the call to crhold() in vm_map_insert() until we know that we won't
have to undo it by calling crfree().
Eliminate an unnecessary variable from vm_map_insert().
MFC r311014:
Style fixes for vm_map_insert().
Tested by: pho
|
|
|
|
| |
Reported by: Jilles Tjoelker <jilles@stack.nl>
|
|
|
|
|
| |
In particular, decode the off_t argument as a 64-bit argument to fix
decoding for 32-bit processes.
|
|
|
|
| |
Ansify vm/vm_pager.c. Style.
|
|
|
|
| |
Remove unused declaration.
|
|
|
|
|
|
| |
tty: don't leak s after opening it with openpty
CID: 978321
|
|
|
|
|
|
| |
mkfifoat_fd: close dfd after use to avoid leaking it
CID: 978286
|
|
|
|
|
|
| |
mknodat_fd: close dfd after use to avoid leaking it
CID: 978287
|
|
|
|
|
|
| |
ttyname_err: close fd if it was opened successfully
CID: 978292
|
|
|
|
|
|
|
|
| |
kqueue_desc_passing: initialize m.msg_flags to 0
This mutes an uninitialized scalar warning from Coverity
CID: 979620
|
|
|
|
|
|
| |
setrlimit_basic: don't leak buf; free it on completion
CID: 978311
|
|
|
|
|
|
| |
ftok_link: don't leak fd
CID: 978291
|
|
|
|
|
|
| |
mincore_resid: free buf after use
CID: 978304
|
|
|
|
|
|
| |
stat_symlink: don't leak fd; close the file descriptor when done
CID: 978314
|
|
|
|
|
|
|
|
| |
swapcontext1: test for getcontext(3) and swapcontext(3) success properly
The beforementioned libcalls both succeed if the return codes aren't -1
CID: 976790, 976791
|
|
|
|
|
|
| |
{strchr,strlen}_basic: don't leak the dlopen'ed handle; close after use
CID: 978299, 978300
|
|
|
|
|
|
|
|
|
| |
revoke_perm: don't leak fd at the end of the test; close it
This code is unused on FreeBSD, but it mutes a valid Coverity warning
which would be true on NetBSD
CID: 978311
|
|
|
|
|
|
| |
fexecve: don't leak fd on fexecve(2) failure; close before calling err
CID: 978285
|
|
|
|
|
|
| |
pipe_restart: free f on function exit to quell complaint from Coverity
CID: 978307
|
|
|
|
| |
bridge_get_pfval: use nitems instead of spelling it out longhand
|
|
|
|
|
|
|
|
|
|
|
|
| |
Be more strict about IpAddress type in snmp_value_parse(..)
- Use inet_pton with AF_INET instead of doing longhand with sscanf.
- Use gethostbyname2 with AF_INET to ensure that the hostname isn't
accidentally parsed with another address family, e.g. AF_INET6.
NB: IpAddress per RFC-2578 is IPv4 only. Work is in progress to add
the InetAddress type and friends documented in RFC-4001 and
elsewhere (which supports IPv4, IPv6, and more).
|
|
|
|
|
|
|
|
|
|
|
| |
MIB-II: use strlcpy instead of strcpy when copying {descr,name}
This is of course to avoid buffer overruns
The remaining strcpy instance in the module needs to be audited for
correctness
CID: 1006827, 1006828
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
r310957:
Use strlcpy when copying `com` to pdu->community to avoid potential
buffer overruns
CID: 1006823, 1006824
r310958:
Initialize ret to SNMPD_INPUT_OK at the top of snmp_input_start(..) to
avoid returning an uninitialized value
There are some really complicated, snakey if-statements combined with
switch statements that could result in an invalid value being returned
as `ret`
CID: 1006551
r310960:
Similar to r310954, set .len to 0 on malloc failure and to `len` only
on success
|
|
|
|
|
|
|
|
| |
Warning message cleanup
- Use warn instead of warnx + strerror(errno)
- Remove unnecessary trailing newline from a warnx call
- Add missing spaces following "," in syslog and warn* calls
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
r310931:
Use strdup in snmp_parse_server(..) when possible instead of malloc+strcpy
This simplifies the code and mutes a Coverity warning about sc->cport being
improperly allocated
CID: 1018247
r310942:
Unbreak the build by passing the string to strdup, not its length
Pointyhat to: ngie
r310988:
snmp_discover_engine: fix up req/resp (PDU object) handling a bit
- Call snmp_pdu_free on req and resp when done with the objects
- Call snmp_pdu_free on req before calling snmp_pdu_create on it
again
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
r310954:
Set value->v.octetstring.len to a correct value on malloc success/failure
The previous code always set value->v.octetstring.len to len, regardless
of the result from the malloc call. This misleads the caller on malloc
failure. Set .len to len on success and 0 on failure.
CID: 1007590
r310987:
snmp_output_err_resp, snmp_output_resp: allocate `object` using calloc, not
on the stack
Some of the callers try to determine whether or not `object` is valid by
testing the value for NULL, which will never be true if it's a stack value,
so in order to be clear and correct down the call stack, use a heap
allocated object.
This also addresses a Coverity issue by initializing all of `object` via
calloc
CID: 1006392
r311222:
Fix logical inversion when checking result from calloc
in snmp_output_err_resp(..)
CID: 1368195
|
|
|
|
|
|
| |
listen_low_port: check for errors from socket(2) before continuing
CID: 976778
|
|
|
|
|
|
| |
umask_open: don't leak fd on success
CID: 978315
|
| |
|
|
|
|
|
|
| |
MFC r311136:
Add WITH_SSP to silence complaints from mkman about there not being a file
|
|
|
|
|
|
|
|
|
|
|
|
| |
In particular, 64-bit system call arguments use up two register_t
arguments for 32-bit processes. They must also be aligned on a 64-bit
boundary on 32-bit powerpc processes. This fixes the decoding of
lseek(), procctl(), and wait6() arguments for 32-bit processes (both
native and via freebsd32).
Note that the ktrace system call return record only returns a single
register, so the return value of lseek is always truncated to the low
32-bits for 32-bit processes.
|
|
|
|
| |
Style.
|