summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* MFC r297848: l2arc: make sure that all writes honor ashift of a cache deviceavg2016-05-172-97/+157
| | | | | Note: no MFC stable/9 because it has become quite out of date with head, so the merge would be quite labourious and, thus, risky.
* MFC r298737: fix up r300036avg2016-05-171-0/+1
|
* MFC r298736: ensure that initial local apic id is sane on AMD 10h systemsavg2016-05-171-0/+13
|
* MFC r298106: zfs_rezget: z_vnode can not be NULL if zp is validavg2016-05-171-6/+4
|
* MFC r298473,298787: add invpcid, fix sahf/lahf in dtrace disassembleravg2016-05-171-2/+2
|
* MFC r298472: MFV r298471: 6052 decouple lzc_create() from theavg2016-05-174-7/+18
| | | | implementation details
* MFC r299350:kib2016-05-171-2/+6
| | | | Add locking annotations to amd64 struct md_page members.
* MFC r298769, r299315sephe2016-05-171-5/+18
| | | | | | | | | | | | | | | | | | | | | r298769 ============= tcp/syncache: Set flowid and hash type properly for SYN|ACK So the underlying drivers can use it to select the sending queue properly for SYN|ACK instead of rolling their own hash. Sponsored by: Microsoft OSTC Differential Revision: https://reviews.freebsd.org/D6120 r299315 ============= tcp/syncache: Add comment for syncache_respond Suggested by: hiren, hps Reviewed by: sbruno Sponsored by: Microsoft OSTC Differential Revision: https://reviews.freebsd.org/D6148
* Hide OPENSSL_cpuid_setup and OPENSSL_ia32cap_P symbols from libcrypto.so.jkim2016-05-164-0/+11
| | | | | | | Note this is a direct commit because it is merged from OpenSSL upstream and head (OpenSSL 1.0.2 branch) already has the same change: https://github.com/openssl/openssl/commit/6206682
* MFC r299276slm2016-05-161-44/+113
| | | | | | | | | Updates to mpr driver man page. - Add 3216 and 3224 support. - Add SSU, chain_alloc_fail, and spinup_wait_time information. - Clear up some sentences. - Correct some typos.
* - Make libcrypto.so position independent on i386.jkim2016-05-1668-27503/+59980
| | | | | | | | | | - Enable linker error when libcrypto.so contains a relocation against text. - Add "Do not modify" comment to generated source files. - Set CC environment variable for Perl scripts to enable AVX instructions. - Update __FreeBSD_version to indicate libcrypto.so is position independent. Note this is a direct commit because head has OpenSSL 1.0.2 branch but based on r299389, r299462, r299464, r299479, and r299480.
* Detect Clang to support AVX instructions on x86 platforms.jkim2016-05-163-0/+6
| | | | Note head (OpenSSL 1.0.2 branch) has similar changes.
* MFC r299263, r299265, r299266, r299267, r299268, r299269, r299270, r299271,slm2016-05-1624-287/+798
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | r299272, r299274, r299275 - (r299263) Update MPI headers to version 42. - (r299265) Several style changes and add copyrights for 2016. - (r299266) Add support for the Broadcom (Avago/LSI) 9305 16 and 24 port HBA's. - (r299267) No log bit in IOCStatus and endian-safe changes. Use MPI2_IOCSTATUS_MASK when checking IOCStatus to mask off the log bit, and make a few more things endian-safe. - (r299268) Change logging level for a debug string to use MPR_LOG instead of MPR_INFO. - (r299269) Fix possible use of invalid pointer. It was possible to use an invalid pointer to get the target ID value. To fix this, initialize a local Target ID variable to an invalid value and change that variable to a valid value only if the pointer to the Target ID is not NULL. - (r299270) No need to set the MPRSAS_SHUTDOWN flag because it's never used. - (r299271) Use callout_reset_sbt() instead of callout_reset() if FreeBSD ver is >= 1000029 - (r299272) done_ccb pointer can be used if it is NULL. To prevent this, move check for done_ccb == NULL to before done_ccb is used in mprsas_stop_unit_done(). - (r299274) Disks can go missing until a reboot is done in some cases. This is due to the DevHandle not being released, which causes the Firmware to not allow that disk to be re-added. - (r299275) Bump version of mpr driver to 13.00.00.00-fbsd
* MFC 298212asomers2016-05-162-0/+14
| | | | | | | | Add the ability to read a SAS device's Target Port NAA designator sys/cam/scsi/scsi_all.h sys/cam/scsi/scsi_all.c Add the scsi_devid_is_port_naa helper function
* MFC r298072asomers2016-05-161-3/+4
| | | | | | | | | | | | | Don't corrupt ZFS label's physpath attribute when booting while a disk is missing Prior to this change, vdev_geom_open_by_path would call vdev_geom_attach prior to verifying the device's GUIDs. vdev_geom_attach calls vdev_geom_attrchange to set the physpath in the vdev object. The result is that if the disk could not be found, then the labels for other disks in the same TLD would overwrite the missing disk's physpath with the physpath of whichever disk currently has the same devname as the missing one used to have.
* MFC r298901:pfg2016-05-163-31/+31
| | | | | | | | | | | | | | | restore: promote some getfiles() parameters to size_t. This is based on a change from OpenBSD: "Fix restore so that it can actually restore files larger than 4GB by changing the type of "size" to off_t in getfiles() plus little dependent type cleanup, from Daniel Lucq." It is an important for machines with 32 bit longs. While here unsign the flags, also from OpenBSD. Obtained from: OpenBSD (with changes)
* MFC r298982:kib2016-05-165-8/+79
| | | | | | | Add EVFILT_VNODE open, read and close notifications. MFC r298984: Correct wording.
* MFC r287831 (by cem):kib2016-05-163-3/+14
| | | | Note DOOMED vnodes with NOTE_REVOKE.
* MFC r298922:kib2016-05-162-2/+9
| | | | | | Issue NOTE_EXTEND when a directory entry is added to or removed from the monitored directory as the result of rename(2) operation. The renames staying in the directory are not reported.
* MFC r298921:kib2016-05-161-2/+18
| | | | | Fix reporting of NOTE_LINK when directory link count changes due to rename removing or adding subdirectory entry.
* MFC r298864:ngie2016-05-151-1/+1
| | | | Allow FILESGROUPS to be specified more than once by pruning out duplicates
* MFC r298881, 298882, 298883, 298885:pfg2016-05-1518-22/+22
| | | | | | | Minor spelling fixes in: tools, share, bluetooth, pmcstat, etc Many of these have user-visible strings.
* MFC r298031: Static pointers need not be initialized.cy2016-05-141-3/+3
|
* MFC r298030: Use NULL instead of 0 for pointer comparison.cy2016-05-142-5/+5
|
* MFC r275385 (by bapt):dim2016-05-14582-47702/+151911
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Sync the svn template with the one from ports MFC r289180 (by peter): Update from svn-1.8.14 to 1.9.2. Formal release notes are available: https://subversion.apache.org/docs/release-notes/1.9.html Of particular note, the client checkout format has *not* changed so upgrades should *not* be required. When reading a repository (file:// or running as a local server), an improved fsfs version 7 is available with significant performance improvements. An optional upgrade is possible to use the new features. Without the upgrade, this is fully read/write compatible with the version 6 fsfs as in svn-1.8. MFC r298845: Update from subversion 1.9.2 to 1.9.4. This contains only bug fixes, no new features. The repository format is also unchanged from 1.9.2. Full list of changes between 1.9.4 and earlier versions: https://svn.apache.org/repos/asf/subversion/tags/1.9.4/CHANGES Note that the two security issues fixed in 1.9.4 (CVE-2016-2167 and CVE-2016-2168) do not affect the version of Subversion in the FreeBSD base system, since neither SASL nor Apache modules are enabled. MFC r298996: Re-sync the FreeBSD-specific Subversion template with the one from ports. Relnotes: yes
* MFC r298831:pfg2016-05-145-11/+11
| | | | boot/forth: minor spelling fixes.
* MFC r298829pfg2016-05-145-5/+5
| | | | sys/compat/linux*: minor spelling fixes.
* MFC r299694:markj2016-05-131-1/+1
| | | | Fix a bug in r298340: "sim" was referenced after being unset.
* MFC r298809, r298817pfg2016-05-133-14/+14
| | | | Minor spelling fixes.
* MFC r298839:ngie2016-05-131-3/+12
| | | | | | | | | Fix memory allocation edgecases in kvm_argv(..) - Don't leak nbufp on realloc failure in kvm_argv - Catch malloc errors with bufp - Set buflen last in the "buflen == 0" case to ensure that bufp/nbufp is properly reallocated on the next go around
* MFC r298842:ngie2016-05-131-0/+1
| | | | | | Don't leak PML4 in _amd64_initvtop(..) if kvm_read2(..) fails CID: 1341474
* MFC r298844:ngie2016-05-132-1/+2
| | | | | | | Make SERVERS REQUIRE clean when MK_KERBEROS==no Make kdc run BEFORE SERVERS instead of being REQUIREd by SERVERS, so systems that pedantically check REQUIREs function after r270782
* MFC r299162,r299163:ngie2016-05-132-1/+11
| | | | | | | | | | | | | | | | | r299162: Only install NIS section 8 manpages if MK_NIS != no r299163: Fix r299162 share/man/man8/Makefile: - Add src.opts.mk so MK_NIS can be tested - Fix typo in MK_NIS conditional tools/build/mk/OptionalObsoleteFiles.inc: - Remove WIP diff from ^/user/ngie/detangle-rc
* MFC r298463:ngie2016-05-131-0/+2
| | | | | | | | Add FEATURE knob for testing for UFS extended attribute kernel support Support can be verified via `feature_present("ufs_extattr")`, etc. Relnotes: yes
* MFC r298462:ngie2016-05-131-1/+1
| | | | | | | | | | | Return `ret` in op_ifentry(..) to mute a -Wunused-but-set-variable warning This will also now detect error conditions with value->var.subs[sub - 1] == LEAF_ifPhysAddress where `string_get(..)` could fail if iifp->physaddr and/or iifp->physaddrlen were deemed invalid. CID: 1006551
* MFC r298665:ngie2016-05-131-3/+5
| | | | | | | | | | | | r298665 (by cem): aacraid(4): Fix some mostly trivial buffer overruns strcpy(3) emits a trailing nul byte, trampling fields after the intended destination. Instead, use strncpy(3), intentionally leaving these fields not nul-terminated. CIDs: 1031024, 1305463, 1305494, 1305545
* MFC r298670:ngie2016-05-131-2/+2
| | | | | | | | | | | | r298670 (by cem): ciss(4): Fix overrun of array The softc member 'ciss_logical' is an array of 'ciss_max_logical_bus' members. Most of the time it is iterated correctly. This patch fixes the two instances where the driver iterated off the end of the array. CID: 1305492
* MFC r298339:ngie2016-05-131-4/+4
| | | | | | | | | | r298339 (by cem): sound(4): Don't use-after-free in midi module unload Also, use ANSI function parameter definitions (void) while here. CID: 1006107
* MFC r298340:ngie2016-05-131-0/+1
| | | | | | | | r298340 (by cem): sym(4): Don't double-free 'sim' in failure case CID: 1006106
* MFC r298671,r298672:ngie2016-05-131-3/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | r298671 (by cem): g_part_bsd64: Check for valid on-disk npartitions value This value is u32 on disk, but assigned to an int in memory. After we do the implicit conversion via assignment, check that the result is at least one[1] (non-negative[2]). 1. The subsequent for-loop iterates from gpt_entries minus one, down, until reaching zero. A negative or zero initial index results in undefined signed integer overflow. 2. It is also used to index into arrays later. In practice, we expected non-malicious disks to contain small positive values. CID: 1223202 r298672 (by cem): g_part_bsd64: Delete duplicate/dead code RAW_PART is handled earlier in the loop. CID: 1223201
* MFC r298676:ngie2016-05-131-0/+1
| | | | | | | | r298676 (by cem): netipsec: Don't leak memory when deep copy fails CID: 1331693
* MFC r298677:ngie2016-05-131-4/+1
| | | | | | | | | | | | | r298677 (by cem): subr_mbpool: Don't free bogus pointer in error paths An mbpool is allocated with a contiguous array of mbpages. Freeing an individual mbpage has never been valid. Don't do it. This bug has been present since this code was introduced in r117624 (2003). CID: 1009687
* MFC r298337:ngie2016-05-131-1/+1
| | | | | | | | | | | | r298337 (by cem): pty(4): Use strlcpy to guarantee destination buffer isn't overrun The devtoname() name is strcpyed into a small stack buffer. Sure, we always expect the name to be ttyXX (or ptyXX). If that's the case, strlcpy() doesn't hurt. CID: 1006768
* MFC r298334:ngie2016-05-131-1/+3
| | | | | | | | | | r298334 (by cem): drm2(4): Fix double-free in low-memory error path Reallocf frees 'block'; don't attempt to free it again. CID: 1091165
* MFC r298669:ngie2016-05-131-2/+0
| | | | | | | | | | | | r298669 (by cem): iscsi_initiator(4): Fix use-after-free, double-free ism_stop() already destroys and frees 'sp', including a call to ic_destroy(). Don't dereference 'sp' after ism_stop() and don't invoke ic_destroy() on the freed memory either. CIDs: 1006109, 1304861
* MFC r298336:ngie2016-05-131-1/+1
| | | | | | | | | | | r298336 (by cem): kgssapi(4): Fix string overrun in Kerberos principal construction 'buf.value' was previously treated as a nul-terminated string, but only allocated with strlen() space. Rectify this. CID: 1007639
* MFC r295134,r298338,r298655:ngie2016-05-133-30/+44
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | r295134 (by cem): kcrypto_aes: Use separate sessions for AES and SHA1 Some hardware supports AES acceleration but not SHA1, e.g., AES-NI extensions. It is useful to have accelerated AES even if SHA1 must be software. Suggested by: asomers r298338 (by cem): kgssapi(4): Don't allow user-provided arguments to overrun stack buffer An over-long path argument to gssd_syscall could overrun the stack sockaddr_un buffer. Fix gssd_syscall to not permit that. If an over-long path is provided, gssd_syscall now returns EINVAL. It looks like PRIV_NFS_DAEMON isn't granted anywhere, so my best guess is that this is likely only triggerable by root. CID: 1006751 r298655 (by cem): kgssapi: Don't leak memory in error cases CIDs: 1007046, 1007047, 1007048
* MFC r298333:ngie2016-05-131-1/+2
| | | | | | | | | | | | | r298333 (by cem): Make Racct macro slightly more gracious given RACCT_UNDEFINED rctl_string_to_rule could previously index below the zeroth element of racct_types via the macro. Maybe it shouldn't use the macro on RACCT_UNDEFINED. But given every other RACCT_ definition is non-negative, it seems pretty easy to foot-shoot this one without the check. CID: 1305574
* MFC r298328:ngie2016-05-131-1/+1
| | | | | | | | | | | r298328 (by cem): bpf_getdltlist: Don't overrun 'lst' 'lst' is allocated with 'n1' members. 'n' indexes 'lst'. So 'n == n1' is an invalid 'lst' index. This is a follow-up to r296009. CID: 1352743
* MFC r298678:ngie2016-05-131-3/+3
| | | | | | | | | | | | r298678 (by cem): posix4_mib: Don't overrun facility_initialized array The facility_initialized and facility arrays are the same size and were intended to be indexed the same. I believe this mismatch was just a typo/braino in r208731. CID: 1017430
OpenPOWER on IntegriCloud