summaryrefslogtreecommitdiffstats
path: root/lib/libc/stdlib/recallocarray.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2019-05-21document brk_string slightly betterespie1-4/+6
remove the comment about .MAKE, since that's only true when called from main, and explain about the other parameters
2019-05-21fix very stupid bug.espie1-1/+4
2019-05-21while writing new code, I just figured out I fucked upespie1-2/+5
2019-05-21whitespacerob1-2/+2
2019-05-21Cleanup some residual markup from the ber.3 days.rob5-29/+17
ok jmc@, schwarze@
2019-05-21init sc_rxhprio properly instead of sc_txhprio twice; CID 1480289dlg1-2/+2
the cid thing was via jmatthew@
2019-05-21don't fall through SIOCSVNETID into SIOCGVNETID; CID 1480290dlg1-1/+2
the cid was via jmatthew@
2019-05-21Also apply stricter pledge when secure mode is set via rc file or command.martijn4-7/+22
Pointed out by jesper <at> ifconfig <dot> se OK brynet@
2019-05-21Fix out-of-bounds array access in ieee80211_setbasicrates(); CID 1479607stsp1-1/+2
ok kettenis@
2019-05-21Fix NULL check with wrong pointer in xhci_event_xfer_isoc(); CID 1480287stsp1-2/+2
ok ratchov@
2019-05-21Fix free(9) with wrong pointer in sili(4) attach error path; CID 1480295stsp1-2/+2
ok jmatthew@
2019-05-21Fix uninitialized return code in adjfreq(2); CID 1480285stsp1-2/+2
ok mlarkin, otto (who both had the same diff)
2019-05-21Do not print the style message "missing date" when the date is givenschwarze1-3/+3
as "$Mdocdate$" without an actual date. That is the canonical way to write a new manual page and not bad style at all. Misleading message reported by kn@ on tech@.
2019-05-21Fix a couple of Ta from Alphonse Mariya.nicm1-4/+4
2019-05-21Use malloc_ and calloc_conceal() to allocate memory for sensitive,otto1-4/+9
private key data. We leave the corresponding freezero() calls since the code might be ported to a system not having the conceal functions. This also makes sure the stdio bufer is concealed. And zap a redundant free(buf); ok gilles@
2019-05-20kern.timecounter.choices: Don't offer the dummy counter as an option.cheloha1-2/+5
The dummy counter is a stopgap during boot. It is not useful after a real timecounter is attached and started and there is no reason to return to using it. So don't even offer it to the admin. This is easy: never add it to the timecounter list. It will effectively cease to exist after the first real timecounter is actived in tc_init(). In principle this means that we can have an empty timecounter list so we need to check for that case in sysctl_tc_choice(). "I don't mind" mpi@, ok visa@
2019-05-20drop fatalx calls when claiming a new vm id; otherwise it's possiblejasper1-15/+31
to crash vmd and take all other vms with it. this required a little shuffling to get the error value reported back to the caller to handle the error properly. ok mlarkin@
2019-05-20Fix ordering of source-file with multiple files and add flags to load_cfg.nicm3-19/+30
2019-05-20Replace the various identical error callbacks with a single one in cmd-queue.c.nicm8-97/+55
2019-05-20Add a helper to allocate a cmd_list.nicm1-4/+13
2019-05-20rev 1.219 of the file was a fix to an LMTP issue that was misunderstood. wegilles1-3/+3
fixed the root cause in mda_variables.c months ago independantely but we're still carrying this diff which is not only unnecessary now, but is also the cause of a bug with mailer-daemons going through an LMTP mda. issue reported by otto@
2019-05-20*an* RSA;jmc3-9/+9
2019-05-20tweak previous;jmc1-3/+4
2019-05-20Fix the color space parameter in RGB SGR, from Brad Town.nicm1-12/+14
2019-05-20Remove unused variables; no binary change.lteo1-3/+3
From Jake Champlin
2019-05-20embiggen format buffer size for certificate serial number sodjm1-2/+2
that it will fit a full 64 bit integer. bz#3012 from Manoel Domingues Junior
2019-05-20When signing certificates with an RSA key, default to using thedjm2-3/+19
rsa-sha2-512 signature algorithm. Certificates signed by RSA keys will therefore be incompatible with OpenSSH < 7.2 unless the default is overridden. Document the ability of the ssh-keygen -t flag to override the signature algorithm when signing certificates, and the new default. ok deraadt@
2019-05-19It uses hw.ncpuonline since r1.170danj1-3/+3
ok espie@
2019-05-19clarify that later flags modify earlier flags;schwarze1-2/+4
triggered by a question from Jan Stary <hans at stare dot cz> on misc@; OK otto@
2019-05-19Fix integer overflow in block size calculation.ratchov1-12/+22
Fixes truncation of contents of files with rate above 64kHz generate in off-line mode (i.e. -n option).
2019-05-19pass a context struct to each test function in order to reduce future churnanton1-62/+71
2019-05-19During fuzzing, one or many fuzzing processes are often stuck waiting onanton1-7/+12
memory from the subproc malloc subsystem which is exhausted. Attempt to circumvent such scenarios by allocation the kcov coverage buffer using km_alloc() instead. With help from kettenis@ and ok visa@
2019-05-19include uvm.h -> uvm_extern.h; ok visa@anton1-2/+2
2019-05-18unneeded escape, as noticed by jmc@ who can't commit right nowespie1-2/+2
2019-05-18Move the single command flag (CMD_CONTROL) into the shared flags.nicm3-10/+7
2019-05-18Unveil tetris.rob3-14/+27
ok brynet@, tedu@
2019-05-18document -c and -I. Use compact literal for the examples, so that theespie1-2/+69
description is not too lax.
2019-05-18Fix LDAP RFC reference in comment. Also noticed by martijn.rob1-3/+3
ok guenther@, claudio@
2019-05-18Both FreeBSD and I appear to have been confused by intel's deep-dive doc:guenther1-3/+2
the RDCL_NO bit of the ARCH_CAPA msr only indicates one of the MDS subissues is mitigated; only the MDS_NO bit indicates they're all mitigated. ok jsg@ mlarkin@
2019-05-18freezero() is of no use here, the computed digest is not a secret.otto1-2/+2
ok millert@
2019-05-18Add parsing for standard boot options.visa1-2/+28
2019-05-18Correct free size. Fixes a panic when detaching crypto volumes.tim1-2/+3
OK jan@, "yes please" tedu@
2019-05-18BPF: remove redundant reference counting of filedescriptorssashan2-46/+10
OK visa@, OK mpi@
2019-05-17Don't put dhclient into a loop when interface-mtu is presentkrw1-4/+10
in a lease. dhclient.c r1.634 made every RTM_IFINFO restart the DHCP protocol and obtain a new/renewed lease. If the lease contained interface-mtu the interface MTU was set. An RTM_IFINFO is generated every time an interface MTU is set. So only set the interface MTU if it is different from the existing MTU. Fix using %d to print an unsigned value in passing. Noticed and fix inmproved & tested by Bj??rn Ketelaars while usihg the wifi on Dutch Railways.
2019-05-17Add realpath to regressbeck1-1/+2
2019-05-17Oops, forgot to include a copyright year when originally addedguenther1-2/+2
2019-05-17Mitigate Intel's Microarchitectural Data Sampling vulnerability.guenther14-19/+397
If the CPU has the new VERW behavior than that is used, otherwise use the proper sequence from Intel's "Deep Dive" doc is used in the return-to-userspace and enter-VMM-guest paths. The enter-C3-idle path is not mitigated because it's only a problem when SMT/HT is enabled: mitigating everything when that's enabled would be a _huge_ set of changes that we see no point in doing. Update vmm(4) to pass through the MSR bits so that guests can apply the optimal mitigation. VMM help and specific feedback from mlarkin@ vendor-portability help from jsg@ and kettenis@ ok kettenis@ mlarkin@ deraadt@ jsg@
2019-05-17stop using the moribund MLINKS bsd.man.mk feature;schwarze1-2/+4
no functional change intended; OK patrick@
2019-05-17stop using the moribund MLINKS bsd.man.mk feature;schwarze1-2/+3
no functional change intended; OK millert@
2019-05-17add various missing informationschwarze1-29/+75
and remove the lie that these functions would set errno; tweaks and OK jmc@; OK rob@ on the previous version