History log of /netbsd/sys/compat/linux/common/linux_socket.c (Results 1 – 25 of 155)
Revision Date Author Comments
# deeec4a8 24-Dec-2022 andvar <andvar@NetBSD.org>

s/reqest/request/, s/requst/request/ and s/reuqest/request/ in comments.


# f036aca9 23-Sep-2021 ryo <ryo@NetBSD.org>

add support COMPAT_LINUX for aarch64


# d50c96bb 07-Sep-2021 riastradh <riastradh@NetBSD.org>

sys/compat: Memset zero before copyout.

Just in case of uninitialized padding which would lead to kernel
stack disclosure. If the compiler can prove the memset redundant
then it can optimize it awa

sys/compat: Memset zero before copyout.

Just in case of uninitialized padding which would lead to kernel
stack disclosure. If the compiler can prove the memset redundant
then it can optimize it away; otherwise better safe than sorry.

show more ...


# 38c0edcd 03-Nov-2020 christos <christos@NetBSD.org>

PR/55780: Bernd Sieker: setsockopt in Linux emulation misses some options


# beafef57 24-Oct-2020 mgorny <mgorny@NetBSD.org>

Fix compat with Linux programs that use longer namelen for sockets

Linux is less strict than NetBSD and permits namelen to be larger
than valid struct sockaddr_in*. If this is the case, truncate th

Fix compat with Linux programs that use longer namelen for sockets

Linux is less strict than NetBSD and permits namelen to be larger
than valid struct sockaddr_in*. If this is the case, truncate the value
to the correct size, so that NetBSD networking does not return an error.

Reviewed by kamil

show more ...


# fc897702 16-Jul-2020 msaitoh <msaitoh@NetBSD.org>

Don't accept negative value.

Reported-by: syzbot+e71a77402d6668f1868d@syzkaller.appspotmail.com


# 28cac201 08-Sep-2019 maxv <maxv@NetBSD.org>

Hum, remove incorrect assignment. Userland could have passed a smaller
namelen, and the uninitialized bytes from sb_data were being used later in
the network stack.


# 699151fe 24-Aug-2019 maxv <maxv@NetBSD.org>

Fix memory leak.


# 1bbae242 24-Aug-2019 maxv <maxv@NetBSD.org>

Hum, don't pass an mbuf to realloc(). Inspired from copyin32_msg_control().


# b7fa3afd 24-Aug-2019 maxv <maxv@NetBSD.org>

Don't read data from userland directly. This simply does not work on any
recent x86 CPU (thanks to SMAP) and all architectures that forbid direct
access to userland from the kernel. But I guess no on

Don't read data from userland directly. This simply does not work on any
recent x86 CPU (thanks to SMAP) and all architectures that forbid direct
access to userland from the kernel. But I guess no one noticed because no
one ever uses compat_linux, right?

show more ...


# c4115e3d 18-Apr-2019 christos <christos@NetBSD.org>

Zero out the ifreq struct for SIOCGIFCONF to avoid up to 127 bytes of stack
disclosure. From Andy Nguyen, many thanks! This is the compat code part
pointed out by ozaki-r@


# 867b92c2 04-Feb-2019 mrg <mrg@NetBSD.org>

- avoid uninitialised memory usage


# d3e070b3 14-Nov-2018 hannken <hannken@NetBSD.org>

Apply the recent fixes to {send,recv}mmsg() to their compat variants.


# 7aacc32c 10-May-2018 ozaki-r <ozaki-r@NetBSD.org>

Fix pserialize enter/exit pairs in linux_getifconf and linux32_getifconf

Tested by using a small linux program that uses ioctl(SIOCGIFCONF).
Probably fix PR kern/53259 as well.


# 05ad0199 03-May-2018 christos <christos@NetBSD.org>

Fix COMPAT_NETBSD32 cmsg handling:

1. alignment was wrong for > 1 message
2. macros were doing incorrect pointer comparisons, fortunately ending
the iteration early after the fists cmsg instead o

Fix COMPAT_NETBSD32 cmsg handling:

1. alignment was wrong for > 1 message
2. macros were doing incorrect pointer comparisons, fortunately ending
the iteration early after the fists cmsg instead of crashing.
3. don't output 32 bit ktrace records for cmsg. 32 bit programs running
under emulation on 64 bit systems should produce 64 bit ktrace records
so that the native ktrace can handle the records; remove extra arguments
that are now not needed (the 32 bit msghdr).
4. output the correct type for cmsg trace records.
5. output all the cmsg records in traces instead of just the first one.

Welcome to 8.99.15 because of the argument removal.

XXX: Really all the code should be changed to use the CMSG_{FIRST,NXT}HDR
macros...

show more ...


# cd81eded 16-Mar-2018 christos <christos@NetBSD.org>

PR/53103: Timo Buhrmester: linux emulation of sendto(2) broken

The sockargs refactoring broke it, because sockargs only works with a user
address. Added an argument to sockargs to indicate where the

PR/53103: Timo Buhrmester: linux emulation of sendto(2) broken

The sockargs refactoring broke it, because sockargs only works with a user
address. Added an argument to sockargs to indicate where the address is
coming from. Welcome to 8.99.14.

show more ...


# 54d4ee11 22-Nov-2017 ozaki-r <ozaki-r@NetBSD.org>

Fix and make consistent of usages of psz/psref in ifconf variants


# 49c4be2f 14-Mar-2017 ozaki-r <ozaki-r@NetBSD.org>

Use if_acquire and if_release instead of using psref API directly

- Provide if_release for consistency to if_acquire
- Use if_acquire and if_release for ifp iterations
- Make ifnet_psref_class static


# eab9789e 03-Feb-2017 christos <christos@NetBSD.org>

add sendmmsg and recvmmsg


# 674e379c 03-Feb-2017 christos <christos@NetBSD.org>

handle accept4 for i386


# b3c24387 03-Feb-2017 martin <martin@NetBSD.org>

Do not compile accept4 on i386, there is no such syscall in Linux.


# d9e37ce3 02-Feb-2017 christos <christos@NetBSD.org>

implement accept4


# 19422264 13-Sep-2016 martin <martin@NetBSD.org>

Make the ktrace record written by do_sys_sendmsg/do_sys_recvmsg overridable
by the caller. Use this in compat_netbsd32 to log the 32bit version, so
the 32bit userland kdump is happy.


# 3ad55fb6 01-Aug-2016 ozaki-r <ozaki-r@NetBSD.org>

Apply pserialize and psref to struct ifaddr and its variants

This change makes struct ifaddr and its variants (in_ifaddr and in6_ifaddr)
MP-safe by using pserialize and psref. At this moment, pseria

Apply pserialize and psref to struct ifaddr and its variants

This change makes struct ifaddr and its variants (in_ifaddr and in6_ifaddr)
MP-safe by using pserialize and psref. At this moment, pserialize_perform
and psref_target_destroy are disabled because (1) we don't need them
because of softnet_lock (2) they cause a deadlock because of softnet_lock.
So we'll enable them when we remove softnet_lock in the future.

show more ...


# 3d4d635b 07-Jul-2016 ozaki-r <ozaki-r@NetBSD.org>

Switch the address list of intefaces to pslist(9)

As usual, we leave the old list to avoid breaking kvm(3) users.


1234567