#
deeec4a8 |
| 24-Dec-2022 |
andvar <andvar@NetBSD.org> |
s/reqest/request/, s/requst/request/ and s/reuqest/request/ in comments.
|
#
f036aca9 |
| 23-Sep-2021 |
ryo <ryo@NetBSD.org> |
add support COMPAT_LINUX for aarch64
|
#
d50c96bb |
| 07-Sep-2021 |
riastradh <riastradh@NetBSD.org> |
sys/compat: Memset zero before copyout.
Just in case of uninitialized padding which would lead to kernel stack disclosure. If the compiler can prove the memset redundant then it can optimize it awa
sys/compat: Memset zero before copyout.
Just in case of uninitialized padding which would lead to kernel stack disclosure. If the compiler can prove the memset redundant then it can optimize it away; otherwise better safe than sorry.
show more ...
|
#
38c0edcd |
| 03-Nov-2020 |
christos <christos@NetBSD.org> |
PR/55780: Bernd Sieker: setsockopt in Linux emulation misses some options
|
#
beafef57 |
| 24-Oct-2020 |
mgorny <mgorny@NetBSD.org> |
Fix compat with Linux programs that use longer namelen for sockets
Linux is less strict than NetBSD and permits namelen to be larger than valid struct sockaddr_in*. If this is the case, truncate th
Fix compat with Linux programs that use longer namelen for sockets
Linux is less strict than NetBSD and permits namelen to be larger than valid struct sockaddr_in*. If this is the case, truncate the value to the correct size, so that NetBSD networking does not return an error.
Reviewed by kamil
show more ...
|
#
fc897702 |
| 16-Jul-2020 |
msaitoh <msaitoh@NetBSD.org> |
Don't accept negative value.
Reported-by: syzbot+e71a77402d6668f1868d@syzkaller.appspotmail.com
|
#
28cac201 |
| 08-Sep-2019 |
maxv <maxv@NetBSD.org> |
Hum, remove incorrect assignment. Userland could have passed a smaller namelen, and the uninitialized bytes from sb_data were being used later in the network stack.
|
#
699151fe |
| 24-Aug-2019 |
maxv <maxv@NetBSD.org> |
Fix memory leak.
|
#
1bbae242 |
| 24-Aug-2019 |
maxv <maxv@NetBSD.org> |
Hum, don't pass an mbuf to realloc(). Inspired from copyin32_msg_control().
|
#
b7fa3afd |
| 24-Aug-2019 |
maxv <maxv@NetBSD.org> |
Don't read data from userland directly. This simply does not work on any recent x86 CPU (thanks to SMAP) and all architectures that forbid direct access to userland from the kernel. But I guess no on
Don't read data from userland directly. This simply does not work on any recent x86 CPU (thanks to SMAP) and all architectures that forbid direct access to userland from the kernel. But I guess no one noticed because no one ever uses compat_linux, right?
show more ...
|
#
c4115e3d |
| 18-Apr-2019 |
christos <christos@NetBSD.org> |
Zero out the ifreq struct for SIOCGIFCONF to avoid up to 127 bytes of stack disclosure. From Andy Nguyen, many thanks! This is the compat code part pointed out by ozaki-r@
|
#
867b92c2 |
| 04-Feb-2019 |
mrg <mrg@NetBSD.org> |
- avoid uninitialised memory usage
|
#
d3e070b3 |
| 14-Nov-2018 |
hannken <hannken@NetBSD.org> |
Apply the recent fixes to {send,recv}mmsg() to their compat variants.
|
#
7aacc32c |
| 10-May-2018 |
ozaki-r <ozaki-r@NetBSD.org> |
Fix pserialize enter/exit pairs in linux_getifconf and linux32_getifconf
Tested by using a small linux program that uses ioctl(SIOCGIFCONF). Probably fix PR kern/53259 as well.
|
#
05ad0199 |
| 03-May-2018 |
christos <christos@NetBSD.org> |
Fix COMPAT_NETBSD32 cmsg handling:
1. alignment was wrong for > 1 message 2. macros were doing incorrect pointer comparisons, fortunately ending the iteration early after the fists cmsg instead o
Fix COMPAT_NETBSD32 cmsg handling:
1. alignment was wrong for > 1 message 2. macros were doing incorrect pointer comparisons, fortunately ending the iteration early after the fists cmsg instead of crashing. 3. don't output 32 bit ktrace records for cmsg. 32 bit programs running under emulation on 64 bit systems should produce 64 bit ktrace records so that the native ktrace can handle the records; remove extra arguments that are now not needed (the 32 bit msghdr). 4. output the correct type for cmsg trace records. 5. output all the cmsg records in traces instead of just the first one.
Welcome to 8.99.15 because of the argument removal.
XXX: Really all the code should be changed to use the CMSG_{FIRST,NXT}HDR macros...
show more ...
|
#
cd81eded |
| 16-Mar-2018 |
christos <christos@NetBSD.org> |
PR/53103: Timo Buhrmester: linux emulation of sendto(2) broken
The sockargs refactoring broke it, because sockargs only works with a user address. Added an argument to sockargs to indicate where the
PR/53103: Timo Buhrmester: linux emulation of sendto(2) broken
The sockargs refactoring broke it, because sockargs only works with a user address. Added an argument to sockargs to indicate where the address is coming from. Welcome to 8.99.14.
show more ...
|
#
54d4ee11 |
| 22-Nov-2017 |
ozaki-r <ozaki-r@NetBSD.org> |
Fix and make consistent of usages of psz/psref in ifconf variants
|
#
49c4be2f |
| 14-Mar-2017 |
ozaki-r <ozaki-r@NetBSD.org> |
Use if_acquire and if_release instead of using psref API directly
- Provide if_release for consistency to if_acquire - Use if_acquire and if_release for ifp iterations - Make ifnet_psref_class static
|
#
eab9789e |
| 03-Feb-2017 |
christos <christos@NetBSD.org> |
add sendmmsg and recvmmsg
|
#
674e379c |
| 03-Feb-2017 |
christos <christos@NetBSD.org> |
handle accept4 for i386
|
#
b3c24387 |
| 03-Feb-2017 |
martin <martin@NetBSD.org> |
Do not compile accept4 on i386, there is no such syscall in Linux.
|
#
d9e37ce3 |
| 02-Feb-2017 |
christos <christos@NetBSD.org> |
implement accept4
|
#
19422264 |
| 13-Sep-2016 |
martin <martin@NetBSD.org> |
Make the ktrace record written by do_sys_sendmsg/do_sys_recvmsg overridable by the caller. Use this in compat_netbsd32 to log the 32bit version, so the 32bit userland kdump is happy.
|
#
3ad55fb6 |
| 01-Aug-2016 |
ozaki-r <ozaki-r@NetBSD.org> |
Apply pserialize and psref to struct ifaddr and its variants
This change makes struct ifaddr and its variants (in_ifaddr and in6_ifaddr) MP-safe by using pserialize and psref. At this moment, pseria
Apply pserialize and psref to struct ifaddr and its variants
This change makes struct ifaddr and its variants (in_ifaddr and in6_ifaddr) MP-safe by using pserialize and psref. At this moment, pserialize_perform and psref_target_destroy are disabled because (1) we don't need them because of softnet_lock (2) they cause a deadlock because of softnet_lock. So we'll enable them when we remove softnet_lock in the future.
show more ...
|
#
3d4d635b |
| 07-Jul-2016 |
ozaki-r <ozaki-r@NetBSD.org> |
Switch the address list of intefaces to pslist(9)
As usual, we leave the old list to avoid breaking kvm(3) users.
|