]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/log
FreeBSD/FreeBSD.git
23 years agoLog denied IXFR, too.
dirk [Sat, 14 Apr 2001 10:05:01 +0000 (10:05 +0000)]
Log denied IXFR, too.

MFC canidate.

23 years agoToss into attic stuff we don't use.
markm [Sat, 14 Apr 2001 09:48:26 +0000 (09:48 +0000)]
Toss into attic stuff we don't use.

23 years agoThis checkin adds support in ufs/ffs for the FS_NEEDSFSCK flag.
mckusick [Sat, 14 Apr 2001 05:26:28 +0000 (05:26 +0000)]
This checkin adds support in ufs/ffs for the FS_NEEDSFSCK flag.
It is described in ufs/ffs/fs.h as follows:

/*
 * Filesystem flags.
 *
 * Note that the FS_NEEDSFSCK flag is set and cleared only by the
 * fsck utility. It is set when background fsck finds an unexpected
 * inconsistency which requires a traditional foreground fsck to be
 * run. Such inconsistencies should only be found after an uncorrectable
 * disk error. A foreground fsck will clear the FS_NEEDSFSCK flag when
 * it has successfully cleaned up the filesystem. The kernel uses this
 * flag to enforce that inconsistent filesystems be mounted read-only.
 */
#define FS_UNCLEAN    0x01 /* filesystem not clean at mount */
#define FS_DOSOFTDEP  0x02 /* filesystem using soft dependencies */
#define FS_NEEDSFSCK  0x04 /* filesystem needs sync fsck before mount */

23 years agoAdd ``RETURN VALUES'' and ``ERRORS'' sections since getpgid(2) can
dd [Sat, 14 Apr 2001 02:34:59 +0000 (02:34 +0000)]
Add ``RETURN VALUES'' and ``ERRORS'' sections since getpgid(2) can
fail.  Also fix a minor grammar nit (it's -> its).

PR: 26520

23 years ago*sigh*... when trying to dike out the `ncr' driver, I was getting the `sym'
obrien [Sat, 14 Apr 2001 02:10:05 +0000 (02:10 +0000)]
*sigh*... when trying to dike out the `ncr' driver, I was getting the `sym'
driver too because it had "ncr" in its comment.

Submitted by: joerg

23 years agoRemove the filename_completion_function() extern that conflicts with the
obrien [Sat, 14 Apr 2001 01:49:32 +0000 (01:49 +0000)]
Remove the filename_completion_function() extern that conflicts with the
latest version of this fuction in Readline 4.2

23 years agoDo not allow the soft updates flag to be set if the filesystem is dirty.
mckusick [Fri, 13 Apr 2001 23:54:49 +0000 (23:54 +0000)]
Do not allow the soft updates flag to be set if the filesystem is dirty.
Because the kernel will allow the mounting of unclean filesystems when
the soft updates flag is set, it is important that only soft updates
style inconsistencies (missing blocks and inodes) be present. Otherwise
a panic may ensue. It is also important that the filesystem be in a clean
state when the soft updates flag is set because the background fsck uses
the fact that the flag is set to indicate that it is safe to run. If
background fsck encounters non-soft updates style inconsistencies, it
will exit with unexpected inconsistencies.

23 years agoTurn -b (BSD socket compat mode) back on by default, as we don't have TLI/XTI
alfred [Fri, 13 Apr 2001 23:20:16 +0000 (23:20 +0000)]
Turn -b (BSD socket compat mode) back on by default, as we don't have TLI/XTI

23 years agomdoc(7) police: misc. markup fixes in the DIAGNOSTICS section.
dd [Fri, 13 Apr 2001 20:43:59 +0000 (20:43 +0000)]
mdoc(7) police: misc. markup fixes in the DIAGNOSTICS section.

Submitted by: ru

23 years agomdoc(7) police: properly use a -diag list in the DIAGNOSTICS section.
dd [Fri, 13 Apr 2001 19:59:47 +0000 (19:59 +0000)]
mdoc(7) police: properly use a -diag list in the DIAGNOSTICS section.

Reviewed by: ru

23 years agomdoc(7) police: rename the DIAGNOSTICS section to ERRORS to match the
dd [Fri, 13 Apr 2001 19:49:07 +0000 (19:49 +0000)]
mdoc(7) police: rename the DIAGNOSTICS section to ERRORS to match the
content, and correct the parameters to the -tag list therein.

Reviewed by: ru

23 years agoUpdate boot capabilities for Adaptec 2940-series
wilko [Fri, 13 Apr 2001 19:47:07 +0000 (19:47 +0000)]
Update boot capabilities for Adaptec 2940-series

Obtained from: axp-list@redhat.com / Jay.Estabrook@compaq.com

23 years agoAdd acl_get_perm_np(3), a non-portable function to check if a
jedgar [Fri, 13 Apr 2001 19:37:04 +0000 (19:37 +0000)]
Add acl_get_perm_np(3), a non-portable function to check if a
permission is in a permission set, required for third-party
applications such as Samba.

Reviewed by: rwatson
Obtained from: TrustedBSD Project

23 years agoConvert getfacl to the ACL editing library functions. getfacl should
jedgar [Fri, 13 Apr 2001 19:24:28 +0000 (19:24 +0000)]
Convert getfacl to the ACL editing library functions.  getfacl should
now compile/work on any POSIX.1e-compliant implementation (also tested
against the current Linux patches).

Review by: rwatson
Obtained from: TrustedBSD Project

23 years agoAdd the remaining POSIX.1e ACL definitions:
jedgar [Fri, 13 Apr 2001 19:14:38 +0000 (19:14 +0000)]
Add the remaining POSIX.1e ACL definitions:
  ACL_UNDEFINED_TAG, ACL_UNDEFINED_ID, ACL_FIRST_ENTRY, ACL_NEXT_ENTRY

Reviewed by: rwatson
Obtained from: TrustedBSD Project

23 years agoPeople are still having problems with i586_* on UP machines and SMP
jhb [Fri, 13 Apr 2001 17:14:53 +0000 (17:14 +0000)]
People are still having problems with i586_* on UP machines and SMP
machines, so just hack it to disable them for now until it can be fixed.

Inspired by hair pulling of: asmodai

23 years agoo Add a comment identifying the "privileged on privileged" scenario.
rwatson [Fri, 13 Apr 2001 16:38:34 +0000 (16:38 +0000)]
o Add a comment identifying the "privileged on privileged" scenario.

Obtained from: TrustedBSD Project

23 years agoo Add inter-process authorization uid regression testing for ktrace().
rwatson [Fri, 13 Apr 2001 16:25:25 +0000 (16:25 +0000)]
o Add inter-process authorization uid regression testing for ktrace().

Obtained from: TrustedBSD Project

23 years agoNew release notes: wx(4) supports new cards (submitted by mjacob),
bmah [Fri, 13 Apr 2001 16:11:20 +0000 (16:11 +0000)]
New release notes:  wx(4) supports new cards (submitted by mjacob),

Add missing CMedia and Crystal Semiconductor sound chips (submitted by
orion).

Fix estimate of 5.0-RELEASE release date (submitted by dd).

ntpd(8) security fix cross-reference to SA-01:31.

Fix typo: s/maestreo3/maestro3/.

23 years agoo s/debug/ptrace/ since shortly there will be tests involving other
rwatson [Fri, 13 Apr 2001 16:09:40 +0000 (16:09 +0000)]
o s/debug/ptrace/ since shortly there will be tests involving other
  forms of debugging.

Obtained from: TrustedBSD Project

23 years ago- Newer versions of bind log denied secondary zone tranfers with
nate [Fri, 13 Apr 2001 15:13:15 +0000 (15:13 +0000)]
- Newer versions of bind log denied secondary zone tranfers with
  'denied AXFR', not 'unapproved AXFR'.

This is an MFC candidate.

PR: misc/26529
Submitted by: duwde@duwde.com.br

23 years agoo Since uid checks in p_cansignal() are now identical between P_SUGID
rwatson [Fri, 13 Apr 2001 14:33:45 +0000 (14:33 +0000)]
o Since uid checks in p_cansignal() are now identical between P_SUGID
  and non-P_SUGID cases, simplify p_cansignal() logic so that the
  P_SUGID masking of possible signals is independent from uid checks,
  removing redundant code and generally improving readability.

Reviewed by: tmm
Obtained from: TrustedBSD Project

23 years agoAdd smbfs module. Currently it includes smbfs, netsmb and DES parts.
bp [Fri, 13 Apr 2001 12:11:19 +0000 (12:11 +0000)]
Add smbfs module. Currently it includes smbfs, netsmb and DES parts.
Kernel should be compiled with options LIBMCHAIN and LIBICONV.

23 years agoMove VT_SMBFS definition to the proper place. Undefine VI_LOCK/VI_UNLOCK.
bp [Fri, 13 Apr 2001 11:26:54 +0000 (11:26 +0000)]
Move VT_SMBFS definition to the proper place. Undefine VI_LOCK/VI_UNLOCK.

23 years agoif/panic -> KASSERT
alfred [Fri, 13 Apr 2001 11:15:40 +0000 (11:15 +0000)]
if/panic -> KASSERT

23 years agoAll NETSMB* options should use opt_netsmb.h file (the joy of multiple repos).
bp [Fri, 13 Apr 2001 10:53:56 +0000 (10:53 +0000)]
All NETSMB* options should use opt_netsmb.h file (the joy of multiple repos).

23 years agoThis file also depends on sys/types.h and sys/ioccom.h.
bp [Fri, 13 Apr 2001 10:50:48 +0000 (10:50 +0000)]
This file also depends on sys/types.h and sys/ioccom.h.
Remove some old junk.

Submitted by: bde

23 years agoprotect pbufs and associated counts with a mutex
alfred [Fri, 13 Apr 2001 10:23:32 +0000 (10:23 +0000)]
protect pbufs and associated counts with a mutex

23 years agouse %p for pointer printf, include sys/systm.h for printf proto
alfred [Fri, 13 Apr 2001 10:22:14 +0000 (10:22 +0000)]
use %p for pointer printf, include sys/systm.h for printf proto

23 years agoconvert if/panic -> KASSERT, explain what triggered the assertion
alfred [Fri, 13 Apr 2001 10:15:53 +0000 (10:15 +0000)]
convert if/panic -> KASSERT, explain what triggered the assertion

23 years agoMake this more lint-friendly. This file seems to be invoked in just
markm [Fri, 13 Apr 2001 09:46:54 +0000 (09:46 +0000)]
Make this more lint-friendly. This file seems to be invoked in just
about any .c file that includes a .h, and lint produces copious
whining because of the asm ...; stuff.

23 years agoGenerate useful error messages.
murray [Fri, 13 Apr 2001 09:37:25 +0000 (09:37 +0000)]
Generate useful error messages.

23 years agomdoc(7) police: Fixed markup.
ru [Fri, 13 Apr 2001 09:33:03 +0000 (09:33 +0000)]
mdoc(7) police: Fixed markup.

23 years agoHandle a rare but fatal race invoked sometimes when SIGSTOP is
markm [Fri, 13 Apr 2001 09:29:34 +0000 (09:29 +0000)]
Handle a rare but fatal race invoked sometimes when SIGSTOP is
invoked.

23 years agomdoc(7) police: Fixed markup in rev.1.5.
ru [Fri, 13 Apr 2001 09:17:56 +0000 (09:17 +0000)]
mdoc(7) police: Fixed markup in rev.1.5.

23 years agomdoc(7) police: Fixed typo and markup in rev.1.11.
ru [Fri, 13 Apr 2001 09:15:16 +0000 (09:15 +0000)]
mdoc(7) police: Fixed typo and markup in rev.1.11.

23 years agomdoc(7) police: removed hard sentence breaks introduced in rev.1.10.
ru [Fri, 13 Apr 2001 08:49:52 +0000 (08:49 +0000)]
mdoc(7) police: removed hard sentence breaks introduced in rev.1.10.

23 years ago- Add a comment at the start of the spin locks list.
jhb [Fri, 13 Apr 2001 08:31:38 +0000 (08:31 +0000)]
- Add a comment at the start of the spin locks list.
- The alpha SMP code uses an "ap boot" spinlock as well.

23 years agoDocument /usr/include/fs/smbfs and /usr/include/netsmb.
ru [Fri, 13 Apr 2001 08:14:58 +0000 (08:14 +0000)]
Document /usr/include/fs/smbfs and /usr/include/netsmb.

Submitted by: bp

23 years agoUse a macro wrapper over printf along with KASSERT to reduce the amount
alfred [Fri, 13 Apr 2001 08:07:37 +0000 (08:07 +0000)]
Use a macro wrapper over printf along with KASSERT to reduce the amount
of code here.

23 years agoPeople, please read the README file!!!
ru [Fri, 13 Apr 2001 06:56:16 +0000 (06:56 +0000)]
People, please read the README file!!!

: These files use 4 space indentation, and other than in the header
: comments, should not contain any tabs.

23 years agoBack out most of revision 1.28: lists of diagnostics must use -diag,
dd [Fri, 13 Apr 2001 06:54:05 +0000 (06:54 +0000)]
Back out most of revision 1.28: lists of diagnostics must use -diag,
not -tag.  Instead, put a period after the error messages to aide
those using dumb terminals not capable of properly displaying markup.

Requested by: ru

23 years agoUpdate comment to match ipfw/ipfw.c,v 1.95.
ru [Fri, 13 Apr 2001 06:49:47 +0000 (06:49 +0000)]
Update comment to match ipfw/ipfw.c,v 1.95.

23 years agoMake SOMAXCONN a kernel option.
alfred [Fri, 13 Apr 2001 03:50:37 +0000 (03:50 +0000)]
Make SOMAXCONN a kernel option.

Submitted by: Terry Lambert <terry@lambert.org>

23 years agoo Disallow two "allow this" exceptions in p_cansignal() restricting
rwatson [Fri, 13 Apr 2001 03:06:22 +0000 (03:06 +0000)]
o Disallow two "allow this" exceptions in p_cansignal() restricting
  the ability of unprivileged processes to deliver arbitrary signals
  to daemons temporarily taking on unprivileged effective credentials
  when P_SUGID is not set on the target process:
  Removed:
     (p1->p_cred->cr_ruid != ps->p_cred->cr_uid)
     (p1->p_ucred->cr_uid != ps->p_cred->cr_uid)
o Replace two "allow this" exceptions in p_cansignal() restricting
  the ability of unprivileged processes to deliver arbitrary signals
  to daemons temporarily taking on unprivileged effective credentials
  when P_SUGID is set on the target process:
  Replaced:
     (p1->p_cred->p_ruid != p2->p_ucred->cr_uid)
     (p1->p_cred->cr_uid != p2->p_ucred->cr_uid)
  With:
     (p1->p_cred->p_ruid != p2->p_ucred->p_svuid)
     (p1->p_ucred->cr_uid != p2->p_ucred->p_svuid)
o These changes have the effect of making the uid-based handling of
  both P_SUGID and non-P_SUGID signal delivery consistent, following
  these four general cases:
     p1's ruid equals p2's ruid
     p1's euid equals p2's ruid
     p1's ruid equals p2's svuid
     p1's euid equals p2's svuid
  The P_SUGID and non-P_SUGID cases can now be largely collapsed,
  and I'll commit this in a few days if no immediate problems are
  encountered with this set of changes.
o These changes remove a number of warning cases identified by the
  proc_to_proc inter-process authorization regression test.
o As these are new restrictions, we'll have to watch out carefully for
  possible side effects on running code: they seem reasonable to me,
  but it's possible this change might have to be backed out if problems
  are experienced.

Submitted by: src/tools/regression/security/proc_to_proc/testuid
Reviewed by: tmm
Obtained from: TrustedBSD Project

23 years agoRemove the 'DO NOT EDIT THIS FILE' crud that we spit out with 'crontab -l'.
peter [Fri, 13 Apr 2001 01:45:22 +0000 (01:45 +0000)]
Remove the 'DO NOT EDIT THIS FILE' crud that we spit out with 'crontab -l'.
Otherwise, "crontab -l > file; vi file; crontab file" adds an extra set
of "DO NOT EDIT" markers each and every time which is a bit silly.

23 years agoWith the recent change to ip6fw, it is safe to return to using ${fw6cmd}
gshapiro [Fri, 13 Apr 2001 01:40:27 +0000 (01:40 +0000)]
With the recent change to ip6fw, it is safe to return to using ${fw6cmd}
which may include the -q flag.

23 years agoMatch ip6fw's command line options to those of ipfw (specifically, added
gshapiro [Fri, 13 Apr 2001 01:31:17 +0000 (01:31 +0000)]
Match ip6fw's command line options to those of ipfw (specifically, added
the ability to use a preprocessor, use the -q (quiet) flag when reading
from a file).  The source used is from ipfw.

Clean up exit codes while I am here.

KAME has been informed and plans on integrating these patches into their
own source as well.

23 years agoo Disable two "allow this" exceptions in p_cansched()m retricting the
rwatson [Thu, 12 Apr 2001 22:46:07 +0000 (22:46 +0000)]
o Disable two "allow this" exceptions in p_cansched()m retricting the
  ability of unprivileged processes to modify the scheduling properties
  of daemons temporarily taking on unprivileged effective credentials.
  These cases (p1->p_cred->p_ruid == p2->p_ucred->cr_uid) and
  (p1->p_ucred->cr_uid == p2->p_ucred->cr_uid), respectively permitting
  a subject process to influence the scheduling of a daemon if the subject
  process has the same real uid or effective uid as the daemon's effective
  uid.  This removes a number of the warning cases identified by the
  proc_to_proc iner-process authorization regression test.
o As these are new restrictions, we'll have to watch out carefully for
  possible side effects on running code: they seem reasonable to me,
  but it's possible this change might have to be backed out if problems
  are experienced.

Reported by: src/tools/regression/security/proc_to_proc/testuid
Obtained from: TrustedBSD Project

23 years agoremove truncated part from commment
alfred [Thu, 12 Apr 2001 21:50:03 +0000 (21:50 +0000)]
remove truncated part from commment

23 years agoo Make kqueue's filt_procattach() function use the error value returned
rwatson [Thu, 12 Apr 2001 21:32:02 +0000 (21:32 +0000)]
o Make kqueue's filt_procattach() function use the error value returned
  by p_can(...P_CAN_SEE), rather than returning EACCES directly.  This
  brings the error code used here into line with similar arrangements
  elsewhere, and prevents the leakage of pid usage information.

Reviewed by: jlemon
Obtained from: TrustedBSD Project

23 years agoo Limit process information leakage by introducing a p_can(...P_CAN_SEE...)
rwatson [Thu, 12 Apr 2001 20:46:26 +0000 (20:46 +0000)]
o Limit process information leakage by introducing a p_can(...P_CAN_SEE...)
  in rtprio()'s RTP_LOOKIP implementation.

Obtained from: TrustedBSD Project

23 years agoCorrect some markup
brian [Thu, 12 Apr 2001 20:04:54 +0000 (20:04 +0000)]
Correct some markup

Submitted by: bde

23 years agoo Reduce information leakage into jails by adding invocations of
rwatson [Thu, 12 Apr 2001 19:39:00 +0000 (19:39 +0000)]
o Reduce information leakage into jails by adding invocations of
  p_can(...P_CAN_SEE...) to getpgid(), getsid(), and setpgid(),
  blocking these operations on processes that should not be visible
  by the requesting process.  Required to reduce information leakage
  in MAC environments.

Obtained from: TrustedBSD Project

23 years agoo Expand inter-process authorization regression test to include
rwatson [Thu, 12 Apr 2001 17:46:20 +0000 (17:46 +0000)]
o Expand inter-process authorization regression test to include
  signalling with sigsegv as one of the tests.
o Teach errno_to_string() about ENOTSUPP.

Obtained from:  TrustedBSD Project

23 years agoActivate backward-compatible prototypes
ache [Thu, 12 Apr 2001 17:18:46 +0000 (17:18 +0000)]
Activate backward-compatible prototypes

23 years agoMerged from options.i386 revision 1.147.
kato [Thu, 12 Apr 2001 12:28:42 +0000 (12:28 +0000)]
Merged from options.i386 revision 1.147.

23 years agoMerged from files.i386 revisions 1.359 and 1.360.
kato [Thu, 12 Apr 2001 12:26:40 +0000 (12:26 +0000)]
Merged from files.i386 revisions 1.359 and 1.360.

23 years agoRegen.
n_hibma [Thu, 12 Apr 2001 11:08:59 +0000 (11:08 +0000)]
Regen.

23 years agoTDK ids
n_hibma [Thu, 12 Apr 2001 11:04:08 +0000 (11:04 +0000)]
TDK ids

Submitted by: Hidetoshi Shimokawa <simokawa@sat.t.u-tokyo.ac.jp>

23 years agoFrom NetBSD
n_hibma [Thu, 12 Apr 2001 10:59:30 +0000 (10:59 +0000)]
From NetBSD

23 years agoBack out history.3 link removing - conflict fixed in libreadline instead
ache [Thu, 12 Apr 2001 09:57:12 +0000 (09:57 +0000)]
Back out history.3 link removing - conflict fixed in libreadline instead

23 years agoInstall history.3 as rlhistory.3 to not conflict with existing libedit function
ache [Thu, 12 Apr 2001 09:54:44 +0000 (09:54 +0000)]
Install history.3 as rlhistory.3 to not conflict with existing libedit function

23 years agoComment out one of many editline.3 MLINKS conflicting with libreadline
ache [Thu, 12 Apr 2001 03:33:13 +0000 (03:33 +0000)]
Comment out one of many editline.3 MLINKS conflicting with libreadline
(history.3)

23 years agoo Replace p_cankill() with p_cansignal(), remove wrappage of p_can()
rwatson [Thu, 12 Apr 2001 02:38:08 +0000 (02:38 +0000)]
o Replace p_cankill() with p_cansignal(), remove wrappage of p_can()
  from signal authorization checking.
o p_cansignal() takes three arguments: subject process, object process,
  and signal number, unlike p_cankill(), which only took into account
  the processes and not the signal number, improving the abstraction
  such that CANSIGNAL() from kern_sig.c can now also be eliminated;
  previously CANSIGNAL() special-cased the handling of SIGCONT based
  on process session.  privused is now deprecated.
o The new p_cansignal() further limits the set of signals that may
  be delivered to processes with P_SUGID set, and restructures the
  access control check to allow it to be extended more easily.
o These changes take into account work done by the OpenBSD Project,
  as well as by Robert Watson and Thomas Moestl on the TrustedBSD
  Project.

Obtained from:  TrustedBSD Project

23 years agoFix minor typo in comment. 112x -> 12xx
imp [Wed, 11 Apr 2001 22:49:00 +0000 (22:49 +0000)]
Fix minor typo in comment.  112x -> 12xx

23 years agoIntroduce -osid and -otsid
brian [Wed, 11 Apr 2001 22:42:54 +0000 (22:42 +0000)]
Introduce -osid and -otsid

Submitted by: dd

23 years agoRevamp acl_create_entry() so it actually works.
jedgar [Wed, 11 Apr 2001 22:09:51 +0000 (22:09 +0000)]
Revamp acl_create_entry() so it actually works.

Obtained from: TrustedBSD Project

23 years agoDon't reference a node after we dropped a reference to it
archie [Wed, 11 Apr 2001 22:04:47 +0000 (22:04 +0000)]
Don't reference a node after we dropped a reference to it
(same as in previous checkin, but in a different function).

23 years agoPull constants from netsmb/smb.h.
bp [Wed, 11 Apr 2001 21:35:51 +0000 (21:35 +0000)]
Pull constants from netsmb/smb.h.

23 years agoo Enable -DSETSUGID_SUPPORTED in inter-process authorization regression
rwatson [Wed, 11 Apr 2001 20:23:23 +0000 (20:23 +0000)]
o Enable -DSETSUGID_SUPPORTED in inter-process authorization regression
  test by default, as setugid() is now part of the base kernel (assuming
  (options REGRESSION) has been enabled for the running kernel).

Obtained from: TrustedBSD Project

23 years agoAdd IBM3765 to newcard's pcic pnp device list
imp [Wed, 11 Apr 2001 20:22:16 +0000 (20:22 +0000)]
Add IBM3765 to newcard's pcic pnp device list

23 years agoo Regenerated following introduction of __setugid() system call for
rwatson [Wed, 11 Apr 2001 20:21:37 +0000 (20:21 +0000)]
o Regenerated following introduction of __setugid() system call for
  "options REGRESSION".

Obtained from: TrustedBSD Project

23 years agoo Introduce a new system call, __setsugid(), which allows a process to
rwatson [Wed, 11 Apr 2001 20:20:40 +0000 (20:20 +0000)]
o Introduce a new system call, __setsugid(), which allows a process to
  toggle the P_SUGID bit explicitly, rather than relying on it being
  set implicitly by other protection and credential logic.  This feature
  is introduced to support inter-process authorization regression testing
  by simplifying userland credential management allowing the easy
  isolation and reproduction of authorization events with specific
  security contexts.  This feature is enabled only by "options REGRESSION"
  and is not intended to be used by applications.  While the feature is
  not known to introduce security vulnerabilities, it does allow
  processes to enter previously inaccessible parts of the credential
  state machine, and is therefore disabled by default.  It may not
  constitute a risk, and therefore in the future pending further analysis
  (and appropriate need) may become a published interface.

Obtained from: TrustedBSD Project

23 years agoAdd #define for IBM3765.
imp [Wed, 11 Apr 2001 20:18:29 +0000 (20:18 +0000)]
Add #define for IBM3765.
Fix SWAMPBOX.  It had actiontec's ID.
Reorder pnpids so they are in alphabetical order.

23 years agoo Introduce "options REGRESSION", a kernel option which enables
rwatson [Wed, 11 Apr 2001 19:29:24 +0000 (19:29 +0000)]
o Introduce "options REGRESSION", a kernel option which enables
  interfaces and functionality intended for use during correctness and
  regression testing.  Features enabled by "options REGRESSION" may
  in and of themselves introduce security or correctness problems if
  used improperly, and so are not intended for use in production
  systems, only in testing environments.

Obtained from: TrustedBSD Project

23 years agoStick proc0 in the PID hash table.
jhb [Wed, 11 Apr 2001 18:50:50 +0000 (18:50 +0000)]
Stick proc0 in the PID hash table.

23 years agoo First pass at an inter-process authorization regression testing suite.
rwatson [Wed, 11 Apr 2001 17:21:14 +0000 (17:21 +0000)]
o First pass at an inter-process authorization regression testing suite.
  This test utility attempts to evaluate the current kernel policy
  for authorization inter-process activities, currently ptrace(),
  kill(, SIGHUP), getpriority(), and setpriority().  The utility creates
  pairs of processes, initializes their credential sets to useful
  cases, and reports on whether the results are in keeping with hard-coded
  safety expectations.

o Currently, this utility relies on the availability of __setugid(),
  an uncomitted system call used for managing the P_SUGID bit.  Due to
  continuing discussion of optional regression testing kernel components
  ("options REGRESSION") I'll hold off on committing that until the
  discussion has reached its natural termination.

o A number of additional testing factors should be taken into account
  in the testing, including tests for different classes of signals,
  interactions with process session characteristics, I/O signalling,
  broadcast activities such as broadcast signalling, mass priority
  setting, and to take into group-related aspects of credentials.
  Additional operations should also be taken into account, such as ktrace,
  debugging attach using procfs, and so on.

o This testing suite is intended to prevent the introduction of bugs
  in the upcoming sets of authorization changes associated with the
  introduction of process capabilities and mandatory access control.

Obtained from: TrustedBSD Project

23 years agoRename the IPI API from smp_ipi_* to ipi_* since the smp_ prefix is just
jhb [Wed, 11 Apr 2001 17:06:02 +0000 (17:06 +0000)]
Rename the IPI API from smp_ipi_* to ipi_* since the smp_ prefix is just
"redundant noise" and to match the IPI constant namespace (IPI_*).

Requested by: bde

23 years agoNew release notes: vidcontrol(1) update (submitted by sobomax).
bmah [Wed, 11 Apr 2001 16:23:58 +0000 (16:23 +0000)]
New release notes:  vidcontrol(1) update (submitted by sobomax).

Modified release notes:  Note MFC of gcc-2.95.3, libreadline 4.2.

Clarify Maestro-3/Allegro driver loading issues (submitted by scottl).

23 years agoParse the various argument registers in the printtrap() function so that
jhb [Wed, 11 Apr 2001 16:20:11 +0000 (16:20 +0000)]
Parse the various argument registers in the printtrap() function so that
one doesn't have to go grab a reference manual to decode them by hand every
time the alpha kernel falls over.

Reviewed by: drew, -alpha

23 years agoThe internal declaration for tilde_expand() now conflicts with the one
obrien [Wed, 11 Apr 2001 16:15:19 +0000 (16:15 +0000)]
The internal declaration for tilde_expand() now conflicts with the one
that was finally added to the readline headers in readline 4.2.

Submitted by: ache

23 years agoAdd forgotten files for NETSMBCRYPTO option (may be DES based encryption
bp [Wed, 11 Apr 2001 09:20:33 +0000 (09:20 +0000)]
Add forgotten files for NETSMBCRYPTO option (may be DES based encryption
should be enabled by default, not sure).

23 years agoActually install include/fs/smbfs and include/netsmb directories.
bp [Wed, 11 Apr 2001 09:00:09 +0000 (09:00 +0000)]
Actually install include/fs/smbfs and include/netsmb directories.

23 years agoAdd O2Micro's OZ6872 Cardbus bridge.
imp [Wed, 11 Apr 2001 06:40:35 +0000 (06:40 +0000)]
Add O2Micro's OZ6872 Cardbus bridge.

Submitted by: Robert Sexton <robert@kudra.com>

23 years agoMissed one in rev 1.608.
obrien [Wed, 11 Apr 2001 06:16:52 +0000 (06:16 +0000)]
Missed one in rev 1.608.

23 years agoUpgrade for readline 4.2
ache [Wed, 11 Apr 2001 04:27:10 +0000 (04:27 +0000)]
Upgrade for readline 4.2

23 years agoRemove conflicting readline prototype
ache [Wed, 11 Apr 2001 04:07:38 +0000 (04:07 +0000)]
Remove conflicting readline prototype

23 years agoUpgrade to 4.2
ache [Wed, 11 Apr 2001 03:49:54 +0000 (03:49 +0000)]
Upgrade to 4.2

23 years agoMerge local changes
ache [Wed, 11 Apr 2001 03:15:56 +0000 (03:15 +0000)]
Merge local changes

23 years agoThis commit was generated by cvs2svn to compensate for changes in r75406,
ache [Wed, 11 Apr 2001 02:33:07 +0000 (02:33 +0000)]
This commit was generated by cvs2svn to compensate for changes in r75406,
which included commits to RCS files with non-trunk default branches.

23 years agov4.2 initial import
ache [Wed, 11 Apr 2001 02:33:07 +0000 (02:33 +0000)]
v4.2 initial import

23 years agoProperly set `KERNEL' w/in the "doSTDKERNEL:" target.
obrien [Wed, 11 Apr 2001 02:21:13 +0000 (02:21 +0000)]
Properly set `KERNEL' w/in the "doSTDKERNEL:" target.

Reviewed by: jhb

23 years agoCorrect the following defines to match the POSIX.1e spec:
jedgar [Wed, 11 Apr 2001 02:19:01 +0000 (02:19 +0000)]
Correct the following defines to match the POSIX.1e spec:

  ACL_PERM_EXEC  -> ACL_EXECUTE
  ACL_PERM_READ  -> ACL_READ
  ACL_PERM_WRITE -> ACL_WRITE

Obtained from: TrustedBSD

23 years agoSource rc.conf so that named.restart can restart named with the correct
murray [Wed, 11 Apr 2001 02:12:14 +0000 (02:12 +0000)]
Source rc.conf so that named.restart can restart named with the correct
flags.

PR: misc/25049
Submitted by: Richard Roderick <richard@gohome.net>

23 years agoCreate debug.hashstat.[raw]nchash and debug.hashstat.[raw]nfsnode to
peter [Wed, 11 Apr 2001 00:39:20 +0000 (00:39 +0000)]
Create debug.hashstat.[raw]nchash and debug.hashstat.[raw]nfsnode to
enable easy access to the hash chain stats.  The raw prefixed versions
dump an integer array to userland with the chain lengths.  This cheats
and calls it an array of 'struct int' rather than 'int' or sysctl -a
faithfully dumps out the 128K array on an average machine.  The non-raw
versions return 4 integers: count, number of chains used, maximum chain
length, and percentage utilization (fixed point, multiplied by 100).
The raw forms are more useful for analyzing the hash distribution, while
the other form can be read easily by humans and stats loggers.

23 years agoFix a typo relating to the "-U" (force UDP for mount protocol)
iedowse [Wed, 11 Apr 2001 00:21:16 +0000 (00:21 +0000)]
Fix a typo relating to the "-U" (force UDP for mount protocol)
option. When specified, make sure to use the correct netid for the
getnetconfigent() call, and also in error messages.

23 years agoRemove MIPS support.
obrien [Wed, 11 Apr 2001 00:12:48 +0000 (00:12 +0000)]
Remove MIPS support.
It has rotted quite badly and no one has provided updates for it.

23 years agoRemoved these old 2.9.x files.
obrien [Tue, 10 Apr 2001 23:53:32 +0000 (23:53 +0000)]
Removed these old 2.9.x files.

23 years agoo The -s limit is ARG_MAX - 4K, not ARG_MAX - 2K.
brian [Tue, 10 Apr 2001 23:16:55 +0000 (23:16 +0000)]
o The -s limit is ARG_MAX - 4K, not ARG_MAX - 2K.
o Mention that the current environment is part of the -s calculation.
o Add a BUGS section that warns against executing a program that increases
  the size of the argument list or the size of the environment.

  I have wondered for a while what the difference is between

    get a big list | xargs sudo command

  which fails and

    get a big list | sudo xargs command

  which succeeds.  The answer is that in the first case, sudo expands
  the environment and pushes the amount of data passed into execve over
  the E2BIG threshold.