summaryrefslogtreecommitdiffstats
path: root/gnu/llvm/unittests/ExecutionEngine/Orc/RPCUtilsTest.cpp (unfollow)
Commit message (Collapse)AuthorFilesLines
2019-06-22Swap (opcount >= opleft || opcount == -1) to (opcount == -1 || opcount >= opleft) likekrw1-4/+4
the rest of tree. Spotted by deraadt@
2019-06-22Add more option tests to ca in appstest.shinoguchi1-8/+21
2019-06-22Tidy up the comments:lum7-18/+18
1. two spelling mistakes. 2. change references to keystrokes, same as man page (UP-low). 3. update a filename reference to reality.
2019-06-22Offering to add a new line at the end of the buffer didn't consider iflum1-3/+4
the user pressed C-g. Now it does.
2019-06-22Log window pointer and other window data to a file.lum2-3/+54
2019-06-22This diff moves the check for a newline at the end of a buffer (whenlum3-18/+21
saving it) earlier. This means data doesn't 'disappear' from the file on disk while the user answers 'yes' or 'no'.
2019-06-22Revert accidentially committed hunk from previouskn1-2/+2
2019-06-22Remove duplicate initialisationkn1-3/+2
OK claudio semarie
2019-06-22Set if_link_state based on the PAOS port register, and update it whenjmatthew1-2/+30
we get a port change event. ok dlg@
2019-06-22Add a basic test to check that mrt table dumps work.claudio6-2/+221
Hint: they don't right now
2019-06-22push the KERNEL_LOCK deeper on read(2) and write(2)semarie4-16/+16
unlocks read(2) and write(2) syscalls families, and push the KERNEL_LOCK deeper in the code path. KERNEL_LOCK is managed per file type in fileops handlers (fo_read, fo_write, and fo_close). read(2) and write(2) on socket are KERNEL_LOCK-free. initial work from mpi@ and ians@ ok mpi@ kettenis@ visa@ ians@
2019-06-22push the KERNEL_LOCK deeper on read(2) and write(2)semarie1-9/+9
unlocks read(2) and write(2) syscalls families, and push the KERNEL_LOCK deeper in the code path. KERNEL_LOCK is managed per file type in fileops handlers (fo_read, fo_write, and fo_close). read(2) and write(2) on socket are KERNEL_LOCK-free. initial work from mpi@ and ians@ ok mpi@ kettenis@ visa@ ians@
2019-06-22push the KERNEL_LOCK deeper on read(2) and write(2)semarie4-12/+43
unlocks read(2) and write(2) syscalls families, and push the KERNEL_LOCK deeper in the code path. KERNEL_LOCK is managed per file type in fileops handlers (fo_read, fo_write, and fo_close). read(2) and write(2) on socket are KERNEL_LOCK-free. initial work from mpi@ and ians@ ok mpi@ kettenis@ visa@ ians@
2019-06-22Add a direct pointer from struct prefix to struct pt_entry.claudio6-58/+61
This changes makes it possible to not use the struct rib_entry pointer which will be used to optimize the Adj-RIB-Out. Also adjust pt_ref() and pt_unref() so that the code can be written a bit more compact. Also prefix_cmp() no longer needs to go via rib_compare() and calls pt_prefix_cmp() directly. OK phessler@
2019-06-22Adjust peer id allocation a bit. Use defines for the various specialclaudio4-8/+14
values and intervals. Mostly the same with the exception that peerself is now id 1 and the first peer has id 2 -- was 0 and 1 before. OK kn@, benno@
2019-06-21Prevent recursions by not deleting entries inside rtable_walk(9).mpi10-81/+141
rtable_walk(9) now passes a routing entry back to the caller when a non zero value is returned and if it asked for it. This allows us to call rtdeletemsg()/rtrequest_delete() from the caller without creating a recursion because of rtflushclone(). Multicast code hasn't been adapted and is still possibly creating recursions. However multicast route entries aren't cloned so if a recursion exists it isn't because of rtflushclone(). Fix stack exhaustion triggered by the use of "-msave-args". Issue reported by Dániel Lévai on bugs@ confirmed by and ok bluhm@.
2019-06-21tweak wording a bit. always talk about creating a new environment.tedu2-20/+13
also document DOAS_USER. ok deraadt jmc
2019-06-21Fix conversions to long double on sparc64jca2-12/+12
Bug exposed by erratic sqlite3 behavior used in ports/devel/proj, as pointed out by landry@. Richard Hipps (SQLite) pointed at the culprit (_Qp_div), many thanks. Adapted from FreeBSD revision 146673 by Stephen Paskaluk and stefanf@FreeBSD. FreeBSD commit message: """ Fix long (and long long) to long double, unsigned to long double and unsigned long (and unsigned long long) to long double conversions. - Add a parameter that specifies the position of the sign bit to the _QP_TTOQ macro, previously it always looked at bit 31. Pass a negative number to disable sign inspection for unsigned types. This fixes _Qp_xtoq(), _Qp_uitoq() and _Qp_uxtoq(). - In the functions __fpu_itof() and __fpu_xtof(), look at the sign bit to decide whether we're doing a conversion from an unsigned type. If so, don't negate the mantissa if the integer exceeds the biggest signed number. """ ok deraadt@
2019-06-21Try harder to have a complete /bsd.upgrade on disk.florian1-4/+3
Adapted from recent changes to the KARL infrastructure. OK deraadt, sthen
2019-06-21Further improve the filesystem stability of kernel installation by KARL.deraadt13-39/+26
Use install -F to instead of cp, for fsync(2). Coupled with the new sync(8) in the reorder_kernel script, the window for a incomplete /bsd file on-disk due to a crash has now shrunk substantially. Discussion with kettenis, millert and tedu
2019-06-21Improve wordingvisa1-3/+3
Suggested by jmc@
2019-06-21zap trailing whitespace;jmc1-3/+3
2019-06-21syncvisa1-0/+1
2019-06-21Make resource limit access MP-safe. So far, the copy-on-write sharingvisa20-86/+409
of resource limit structs has been done between processes. By applying copy-on-write also between threads, threads can read rlimits in a nearly lock-free manner. Inspired by code in DragonFly BSD and FreeBSD. OK mpi@, agreement from jmatthew@ and anton@
2019-06-21Use timeout_add_msec(9)kn1-2/+2
The current code wants to wait 1/100 [s] = 10 [ms] but at least one tick, that's exactly what the millisecond version provides. OK cheloha mpi claudio
2019-06-21Man page fixes from lacygoill at lacygoill dot me.nicm1-9/+15
2019-06-21adapt for key shielding API changes (const removal)djm1-3/+3
2019-06-21Add protection for private keys at rest in RAM against speculationdjm11-41/+324
and memory sidechannel attacks like Spectre, Meltdown, Rowhammer and Rambleed. This change encrypts private keys when they are not in use with a symmetic key that is derived from a relatively large "prekey" consisting of random data (currently 16KB). Attackers must recover the entire prekey with high accuracy before they can attempt to decrypt the shielded private key, but the current generation of attacks have bit error rates that, when applied cumulatively to the entire prekey, make this unlikely. Implementation-wise, keys are encrypted "shielded" when loaded and then automatically and transparently unshielded when used for signatures or when being saved/serialised. Hopefully we can remove this in a few years time when computer architecture has become less unsafe. been in snaps for a bit already; thanks deraadt@ ok dtucker@ deraadt@
2019-06-21print the correct AuthorizedPrincipalsCommand rather than andjm1-3/+3
uninitialised variable; spotted by dtucker@
2019-06-21Don't try to fake a horizontal rule with a bunch of hyphens.bentley1-3/+2
ok jmc@ schwarze@
2019-06-20after installing new kernel, do a sync(8) to encourage lazy buffers toderaadt1-1/+2
make it to disk (discussion with tedu)
2019-06-20Add -r to find-window for regex instead of fnmatch.nicm2-31/+62
2019-06-20prefix_add() is only called by path_update() and path_update alreadyclaudio1-19/+4
knows if the prefix exists or not (by calling prefix_get()). So doing the same check again in prefix_add() is silly and actually rather expensive with lots of peers. OK phessler@
2019-06-20Need to always check focus even if not current window.nicm1-3/+4
2019-06-20FIx return of options_scope_from_name on error.nicm1-12/+19
2019-06-20open() and fstat() return precisely -1 on error, not a vague value < 0.deraadt2-5/+5
Follow the contract.
2019-06-20If x509_get_ski_aki() fails because one of the ski or aki objects areclaudio1-4/+7
missing, free the other object but also set the pointer back to NULL so that the caller does not do a double free(). Found with afl by jsg@
2019-06-20tls_read() & tls_write() return 4 possible values: TLS_WANT_POLLOUT,deraadt1-4/+4
TLS_WANT_POLLIN, -1, or 0. After handling the first two, check for -1 rather than vaguely "< 0". ok jsing
2019-06-20Fix how regex substitution works with empty matches.nicm1-10/+27
2019-06-20Those changes should not have been in last commit. Revert them for now.claudio2-5/+5
2019-06-20Don't use assert to validate user input. assert() is not for that, insteadclaudio3-8/+16
check and error out like it is done one other parsing issues. Agreed by deraadt@ Fixes another afl "crash" found by jsg@
2019-06-20Undefined behavior (UB) can potentially be present anywhere in theanton2-219/+396
kernel. kubsan reports findings using printf() and assuming that calling printf() is safe in all contexts can be problematic. Instead, defer reporting of findings to the systq task queue. Storage for findings is allocated early in the boot process in order to catch potential UB during boot. The same findings are reported once the task queue subsystem has been initialized. Feedback from kettenis@ and ok mpi@
2019-06-20sockatmark(3), recv(2), getsockopt(2), and connect(2) return specificallyderaadt2-8/+8
-1 to mark failure, not arbitrary values < 0. I believe manual pages should follow the described contract precisely and accurately.
2019-06-20Fix misleading code. The kernel keeps using the original bootvisa1-9/+9
descriptors even after bootstrap.
2019-06-20Rewrite some if () { } else if () {} chains into multiple independentclaudio1-25/+44
if () blocks. Improves readability in my opinion since I skip some branches to fast when reading. OK deraadt@
2019-06-20If the ASN1_BIT_STRING has a length of 0 the unused bit count must be 0.claudio1-2/+6
Check this and also adjust the upper limit check to >= 8 since only the values 0 - 7 are valid. Found by jsg@ with afl. OK deraadt@
2019-06-20allow-rename and alternate-screen can be pane options.nicm4-32/+29
2019-06-20Still need to walk the options tree for user options.nicm1-1/+7
2019-06-20prefix_updateall() is only used internally, make it a static function.claudio2-5/+3
2019-06-20Change nexthop_update to run the list walk over all prefixes to runclaudio3-57/+123
asynchronously and therefor other tasks can make progress at the same time. Additionally prefixes belonging to a RIB which does not run the the decision process are no longer linked into the nexthop list. This replaces the early return in prefix_updateall() and reduces the time spent in nexthop_update(). OK benno@