46431 Commits

Author SHA1 Message Date
Niels Sascha Reedijk
f18ed048c2 Update translations from Pootle hrev45445 2013-04-06 06:27:13 +02:00
John Scipione
3302521556 Remove dependence on color constants in ServerReadOnlyMemory.
This fixes a maintainance problem where you have to update this otherwise
unrelated file to keep it in sync whenever you add a color constant.

I've added a B_COLOR_WHICH_COUNT constant to the color_which enum which should
be updated to point to the newest color constants as new ones are added. I
reworked ServerReadOnlyMemory to use this constant instead of using to the
current largest color constant directly. If you use B_COLOR_WHICH_COUNT to
refer to a color in your code expect to get unpredictable and nonsensical
results. Most likely you'll get an undefined result which will return black
but don't depend on it.

The net effect of this is that ServerReadOnlyMemory doesn't need to be updated
anymore when new color constants are introduced but will continue to produce
correct results.

Eliminate kNumColors constant, replace it with B_COLOR_WHICH_COUNT
hrev45444
2013-04-05 22:46:22 -04:00
Ingo Weinhold
26296b0aa4 Add the humble beginnings of the package daemon
It doesn't really do anything yet save for tracking what packagefs
volumes are mounted and unmounted.
2013-04-06 04:29:34 +02:00
Ingo Weinhold
0c6927b5d7 packagefs: Add ioctl to get basic volume information
Also rename the MountType enum and members, since they are no longer
packagefs private.
2013-04-06 04:26:40 +02:00
John Scipione
9f24981a56 Add B_SCROLL_BAR_THUMB_COLOR constant.
This allows you to change the scrollbar thumb color in Appearance preferences.
The default color is 216, 216, 216 so the scroll bar thumb looks the same by
default. Perhaps someday this can be updated to something a bit more colorful.
hrev45443
2013-04-05 19:26:41 -04:00
Ingo Weinhold
91586bd3b6 packagefs: Fix handling of package domain paths
* The package directory path specified when mounting must be interpreted
  in the caller's I/O context. We did always interpret it in the
  kernel's I/O context, so that a relative path or a path in a chroot
  environment wouldn't work correctly. Now opening the directory is done
  in PackageDomain::Init() where we can at least guess the path's
  origin.
* We also normalize the path, though merely to get more conclusive debug
  output, since after opening the directory the path isn't used for
  anything else anymore.
* Make the "packages" mount parameter optional. If not specified, use
  the "packages" folder at our mount point.
2013-04-05 19:19:20 +02:00
Ingo Weinhold
5b6fb78c40 VFS: _kern_open_dir(): Fix NULL path case
It would create an empty path buffer and pass that on to dir_open(),
which accepts NULL, but not empty paths.
2013-04-05 19:19:20 +02:00
Oliver Tappe
daf7cb41c4 Bring back libroot_build.a for now.
* the corresponding TODO has to be dealt with at a later stage
2013-04-05 18:34:28 +02:00
Oliver Tappe
259046a388 Fix build without xattrs being used
* need to invoke fs_fopen_attr() instead of fs_open_attr()
2013-04-05 18:31:58 +02:00
Ingo Weinhold
d482342399 VM: Fix vm_block_address_range() area protection
B_ALREADY_WIRED, which was erroneously passed for the area protection
parameter to map_backing_store(), has the value 7 which implies user
readable and writable. Hence the address ranges around 0xdeadbeef and
0xcccccccc could actually be read and written from anywhere.
2013-04-05 16:58:50 +02:00
Ingo Weinhold
ce577d8db0 packagefs: AttributeIndex: Support duplicates correctly
The tree comparisons didn't allow for different Nodes having the same
attribute value. Therefore only the first node would be added and later
we would try to remove a node not actually in the tree, leading to a
crash.

packagefs seems to finally unmount cleanly, now.
2013-04-05 16:50:20 +02:00
Rene Gollent
631624fb01 Dump semaphore information in reports.
Implements final part of #9510.
hrev45442
2013-04-05 09:43:22 -04:00
Rene Gollent
81ccf71fa2 Fix x86-64 build. 2013-04-05 09:42:56 -04:00
Rene Gollent
dbf6921a9f Extend DebuggerInterface for semaphore information retrieval. 2013-04-05 09:34:01 -04:00
Rene Gollent
dcbc00c3cf Add model classes for representing semaphore information. 2013-04-05 09:29:40 -04:00
Rene Gollent
adf25fc437 Dump area information in reports.
Implements part of #9510.
hrev45441
2013-04-05 09:12:51 -04:00
Rene Gollent
6d1e057cac Extend DebuggerInterface for area information retrieval. 2013-04-05 09:11:57 -04:00
Rene Gollent
a5e54e1bcf Add model classes for representing area information. 2013-04-05 09:11:56 -04:00
Alexander von Gluck IV
57419ce54f usb_asix: style cleanup
* While I was in the neighbourhood
* No functional change
hrev45440
2013-04-04 23:36:16 -05:00
Alexander von Gluck IV
b208c3fa3b usb_asix: clean up some registers
* No functional change
2013-04-04 23:36:16 -05:00
John Scipione
2cfeb3ca9c Update StyledEdit to use document background color. Style fixes.
See ticket #5293 Colors_picture2.png
hrev45439
2013-04-04 21:00:28 -04:00
Ingo Weinhold
05940bc514 packagefs: Fix handling of package-links directory on unmount
* Volume::_RemovePackageLinksDirectory(): We don't want to call
  _RemovePackageLinksNode(). Besides that the ID hash table has already
  been emptied before and we would thus release a reference to the node
  erroneously, the method doesn't do anything we want anyway. We don't
  want any children to be removed, since we have unregistered the
  volume's packages already (which removes the respective package link
  directories); the remaining ones are from other volumes and not ours
  to remove.
* PackageFSRoot: Release a reference to the package links directory in
  the destructor. We create the directory in Init() after all and no one
  else takes over ownership.
2013-04-05 00:31:51 +02:00
Ingo Weinhold
c7382d4c9d packagefs: Acquire missing reference for shine-through dirs
Since we publish shine-through directories directly to the VFS, we need
to acquire an additional reference, because we release a reference when
a node is put.
2013-04-05 00:20:32 +02:00
Ingo Weinhold
dedc1369e1 packagefs: Acquire missing reference for the root dir
We need one for the ID table and one for the volume itself.
2013-04-05 00:17:22 +02:00
Ingo Weinhold
ce1d048183 packagefs: Fix adding package links twice to volume
PackageLinkDirectory::NotifyDirectoryAdded() first notified the listener
(Volume) about the directory itself, then about the links it contained.
Since Volume adds the nodes recursively, the latter were added twice,
resulting in a corrupted ID hash table.
2013-04-04 22:25:23 +02:00
Pawel Dziepak
a8f8d2c057 x86_64: put user stack and team data at top of user address space 2013-04-04 20:54:56 +02:00
Pawel Dziepak
4cafc0acab runtime_loader: use long type for region delta 2013-04-04 20:54:13 +02:00
Pawel Dziepak
65ed4fa908 vm: implement B_RANDOMIZED_IMAGE_ADDRESS address specification
On some 64 bit architectures program and library images have to be mapped in
the lower 2 GB of the address space (due to instruction pointer relative
addressing). Address specification B_RANDOMIZED_IMAGE_ADDRESS ensures that
created area satisfies that requirement.
2013-04-04 20:54:02 +02:00
Pawel Dziepak
f697412ff8 vm: place commpage and team data near the top of user address space
Placing commpage and team user data somewhere at the top of the user accessible
virtual address space prevents these areas from conflicting with elf images
that require to be mapped at exact address (in most cases: runtime_loader).
2013-04-04 15:27:24 +02:00
Pawel Dziepak
ffbf0328d2 debug: update debug kit to correctly recognize commpage 2013-04-04 15:27:23 +02:00
Pawel Dziepak
e85e399fd7 commpage: randomize position of commpage
This patch introduces randomization of commpage position. From now on commpage
table contains offsets from begining to of the commpage to the particular
commpage entry. Similary addresses of symbols in ELF memory image "commpage"
are just offsets from the begining of the commpage.

This patch also updates KDL so that commpage entries are recognized and shown
correctly in stack trace. An update of Debugger is yet to be done.
2013-04-04 15:27:22 +02:00
Pawel Dziepak
966f207668 x86: enable data execution prevention
Set execute disable bit for any page that belongs to area with neither
B_EXECUTE_AREA nor B_KERNEL_EXECUTE_AREA set.

In order to take advanage of NX bit in 32 bit protected mode PAE must be
enabled. Thus, from now on it is also enabled when the CPU supports NX bit.

vm_page_fault() takes additional argument which indicates whether page fault
was caused by an illegal instruction fetch.
2013-04-04 15:22:23 +02:00
Pawel Dziepak
211f71325a x86: move x86_userspace_thread_exit() from user stack to commpage
x86_userspace_thread_exit() is a stub originally placed at the bottom of
each thread user stack that ensures any thread invokes exit_thread() upon
returning from its main higher level function.

Putting anything that is expected to be executed on a stack causes problems
when implementing data execution prevention. Code of x86_userspace_thread_exit()
is now moved to commpage which seems to be much more appropriate place for it.
2013-04-04 15:16:27 +02:00
Pawel Dziepak
537d84a07c libroot: randomize position of areas created by mmap()
When mmap() is invoked without specifying address hint B_RANDOMIZED_ANY_ADDRESS
is used.
Otherwise, unless MAP_FIXED flag is set (which requires mmap() to return an area
positioned exactly at given address), B_RANDOMIZED_BASE_ADDRESS is used.
2013-04-04 15:16:26 +02:00
Pawel Dziepak
02cceebe40 team: randomize position of team user data
When forking a process team user data area is not cloned but a new one is
created instead. However, the new one has to be at exactly the same address
parent's team user data area is. When process is exec then team user data
area may be recreated at random position.

This patch also make sure that instances of struct user_thread in team user
data are each in separate cache line in order to prevent false sharing since
these data are very likely to be accessed simultaneously from threads executing
on different CPUs. This change however reduces the number of threads process
can create. It is fixed by reserving 512kB of address space in case team user
data area needs to grow.
2013-04-04 15:16:25 +02:00
Pawel Dziepak
0cf91fc14f runtime_loader: randomize position of relocatable images
Use B_RANDOMIZED_BASE for creating areas for relocatable segments.
2013-04-04 15:16:24 +02:00
Pawel Dziepak
31eb9b8261 malloc: randomize heap position
Use B_RANDOMIZE_BASE_ADDRESS for initial heap creation as well as for resizing
it when keeping it contignuous is no longer possible.
2013-04-04 15:16:23 +02:00
Pawel Dziepak
17c189899a thread: randomize user stack position
Use B_RANDOMIZE_BASE_ADDRESS for creating both main and other threads user
stack.
2013-04-04 15:16:22 +02:00
Pawel Dziepak
b3e4c67739 vm: implement B_RANDOMIZED_ANY_ADDRESS address specification
Randomized equivalent of B_ANY_ADDRESS. When a free space is found (as in
B_ANY_ADDRESS) the base adress is then randomized using _RandomizeAddress
pretty much like it is done in B_RANDOMIZED_BASE_ADDRESS.
2013-04-04 15:16:21 +02:00
Pawel Dziepak
f9bab525f6 vm: implement B_RANDOMIZED_BASE_ADDRESS address specification
B_RAND_BASE_ADDRESS is basically B_BASE_ADDRESS with non-deterministic created
area's base address.

Initial start address is randomized and then the algorithm looks for a large
enough free space in the interval [randomized start, end]. If it fails then
the search is repeated in the interval [original start, randomized start]. In
case it also fails the algorithm falls back to B_ANY_ADDRESS
(B_RANDOMIZED_ANY_ADDRESS when it is implemented) just like B_BASE_ADDRESS does.

Randomization range is limited by kMaxRandomize and kMaxInitialRandomize.
2013-04-04 15:16:21 +02:00
Pawel Dziepak
3b4269ecf5 arch: randomize initial user stack pointer
Inside the page randomization of initial user stack pointer is not only a part
of ASLR implementation but also a performance improvement that helps
eliminating aligned 64 kB data access.

Minimal user stack size is increased to 8 kB in order to ensure that regardless
of initial stack pointer value there is still enough space on stack.
2013-04-04 15:16:20 +02:00
Pawel Dziepak
46bffd5839 nfs4: minor improvements in VnodeToInode code * removal of now unnecessary NULL check * Clear() is Replace(NULL) 2013-04-04 15:11:16 +02:00
Pawel Dziepak
5f0e4e4a81 nfs4: make sure we have inode names required to get file handle 2013-04-04 15:11:08 +02:00
Ingo Weinhold
a37c845e52 FS interface API doc: More details for unmount() hrev45438 2013-04-04 12:00:08 +02:00
Ingo Weinhold
6d04dfb7a9 bindfs: Fix double deletion of root node on unmount
The VFS calls the FS's put_vnode() for all nodes, including the root
node, prior to calling unmount().
2013-04-04 11:24:39 +02:00
Ingo Weinhold
1add554a83 Make LibSolv a mandatory package
... so it is actually installed on the image.
2013-04-03 21:04:55 +02:00
Ingo Weinhold
7216c8944d pkgman resolve-dependencies: Improve usage text formatting 2013-04-03 20:14:54 +02:00
Ingo Weinhold
046f1c4378 pkgman resolve-dependencies: Avoid code duplication 2013-04-03 20:11:11 +02:00
Ingo Weinhold
4b8aabfac9 pkgman resolve-dependencies: Print package paths
... instead of package name and version. The command should now
work as required by haikuporter.
2013-04-03 19:09:38 +02:00
Ingo Weinhold
a8b832bf46 BSolverRepository::AddPackage(): Add optional return parameter
... returning the added BSolverPackage object.
2013-04-03 19:06:47 +02:00