Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (55m)  netbsd-8 (5d)  netbsd-10 (6d)  netbsd-9 (11d)  thorpej-ifq (175d)  thorpej-altq-separation (178d) 

2024-05-10 13:20:01 UTC Now

2020-05-08 21:43:54 UTC MAIN commitmail json YAML

2020-05-08 17:28:33 UTC MAIN commitmail json YAML

strlcpy() the command line only if it's present.

(bouyer)

2020-05-08 16:43:18 UTC MAIN commitmail json YAML

if_skreg.h: remove duplicate or triplicate identical #defines

(jakllsch)

2020-05-08 16:05:36 UTC MAIN commitmail json YAML

Omit needless comment.

We've already committed part of the write, so ERESTART is definitely
not appropriate at this point.

(riastradh)

2020-05-08 15:57:24 UTC MAIN commitmail json YAML

Simplify loops by putting interrupt test at end.

(riastradh)

2020-05-08 15:55:05 UTC MAIN commitmail json YAML

No need for a private pool cache.  kmem serves just fine.

(riastradh)

2020-05-08 15:54:11 UTC MAIN commitmail json YAML

Make variable unused outside kern_entropy.c static.

(riastradh)

2020-05-08 15:53:26 UTC MAIN commitmail json YAML

Simplify /dev/random without reference to entropy_depletion.

(riastradh)

2020-05-08 14:56:49 UTC MAIN commitmail json YAML

Use sysctl_teardown() upon detach of mskc(4).

(jakllsch)

2020-05-08 14:44:24 UTC MAIN commitmail json YAML

Try to get the starting bus number from _CRS before falling back to _BBN.
There are apparently cases where the first bus in _CRS does not match the
value of _BBN, and the consensus is that _CRS should take precedence.

(jmcneill)

2020-05-08 14:42:38 UTC MAIN commitmail json YAML

2020-05-08 14:35:19 UTC MAIN commitmail json YAML

msk(4): Simplify setting the first List Element owner-bit last.

We don't actually need to do this, as the BMU won't proceed to the new
descriptor until we advance the ring-end pointer on the chip, but perhaps
it has value as paranoia.

(jakllsch)

2020-05-08 13:52:40 UTC MAIN commitmail json YAML

2020-05-08 10:35:51 UTC MAIN commitmail json YAML

Clear PSL_TRACEDCHILD on ptrace(PT_DETACH)

This avoids potential race of detaching and attaching to a prestarted
process and receiving SIGTRAP instead of SIGSTOP.

(kamil)

2020-05-08 06:24:29 UTC MAIN commitmail json YAML

Search the descriptors of the appropriate interface to ensure correct
match.

PR kern/55240 cdce(4) error "no data interface" when ECM USB IF are
preceded by ACM USB IF

(skrll)

2020-05-08 03:26:51 UTC MAIN commitmail json YAML

Add a new function, sleepq_transfer(), that moves an lwp from one
sleepq to another.

(thorpej)

2020-05-08 00:54:44 UTC MAIN commitmail json YAML

Eliminate curcpu_available() hack.

The entropy subsystem is no longer used before curcpu() and curlwp
are available on x86.

(riastradh)

2020-05-08 00:53:25 UTC MAIN commitmail json YAML

Make curcpu_available() always true.

This should work now that x86 runs cpu_init_rng just after curcpu()
and curlwp are initialized, and no other architecture needs it to
work that early.

(riastradh)

2020-05-08 00:52:29 UTC MAIN commitmail json YAML

Move cpu_rng_init a little later, just after cpu_init_msrs, on x86.

This way curcpu() and curlwp are available, so that we no longer need
any annoying conditionalization in kern_entropy.c.

(riastradh)

2020-05-08 00:49:43 UTC MAIN commitmail json YAML

Factor randomization out of slotspace_rand.

slotspace_rand becomes deterministic; the randomization moves into
the callers instead.  Why?

There are two callers of slotspace_rand:

- x86/pmap.c pmap_bootstrap
- amd64/amd64.c init_slotspace

When the randomization was introduced, it used an x86-only
`cpu_earlyrng' abstraction that would hash rdseed/rdrand and rdtsc
output together.  Except init_slotspace ran before cpu_probe, so
cpu_feature was not yet filled out, so during init_slotspace, the
only randomization was rdtsc.

In the course of the recent entropy overhaul, I replaced cpu_earlyrng
by entropy_extract, and moved cpu_init_rng much earlier -- but still
after cpu_probe -- in order to reduce the number of abstractions
lying around and the number of copies of rdrand/rdseed logic.  In so
doing I added some annoying complication (see curcpu_available) to
kern_entropy.c to make it work early enough for init_slotspace, and
dropped the rdtsc.

For pmap_bootstrap that didn't substantively change anything.  But
for init_slotspace, it removed the only randomization.  To mitigate
this, this commit pulls the randomization out of slotspace_rand into
pmap_bootstrap and init_slotspace, so that

(a) init_slotspace can use rdtsc and a little private entropy pool in
    order to restore the prior (weak) randomization it had, and

(b) pmap_bootstrap, which runs a little bit later, can continue to
    use entropy_extract normally and get rdrand/rdseed too.

A subsequent commit will move cpu_init_rng just a wee bit later,
after cpu_init_msrs, so the kern_entropy.c complications can go away.
Perhaps someone else more wizardly with x86 can find a way to make
init_slotspace run a little later too, after cpu_probe and after
cpu_init_msrs and after cpu_rng_init, but I am not that wizardly.

(riastradh)

2020-05-07 21:05:37 UTC MAIN commitmail json YAML

Forgot to commit this file as part of elf.c::rev1.21 mm.c::rev1.27.

(maxv)

2020-05-07 20:02:34 UTC MAIN commitmail json YAML

On debugger attach to a prestarted process don't report SIGTRAP

Introduce PSL_TRACEDCHILD that indicates tracking of birth of a process.
A freshly forked process checks whether it is traced and if so, reports
SIGTRAP + TRAP_CHLD event to a debugger as a result of tracking forks-like
events. There is a time window when a debugger can attach to a newly
created process and receive SIGTRAP + TRAP_CHLD instead of SIGSTOP.

Fixes races in t_ptrace_wait* tests when a test hangs or misbehaves,
especially the ones reported in tracer_sysctl_lookup_without_duplicates.

(kamil)

2020-05-07 20:01:05 UTC MAIN commitmail json YAML

If no random seed file exists on boot, create one.

rndctl -S triggers entropy consolidation, so whatever we gathered
during kernel startup -- interrupt timings, autoconf timings, &c. --
will be incorporated into the seed and into subsequent data read from
/dev/urandom, just like if rndctl -L had run at this boot, and the
seed will carry them into the next boot too.

But it still avoids frequently consolidating entropy on any regular
schedule, in order to continue to mitigate iterative-guessing
attacks.

(riastradh)

2020-05-07 20:00:38 UTC MAIN commitmail json YAML

Omit needless verbiage in error message.

(riastradh)

2020-05-07 19:52:50 UTC MAIN commitmail json YAML

Go back using cpu_info_primary, all events are bound to vCPU 0 by default.
Register the event handler on cpu_info_primary.
While there. update the event counter on interrupts.
Finally this should be MP-safe.

(bouyer)

2020-05-07 19:49:30 UTC MAIN commitmail json YAML

This should be mpsafe, register the event handler as such.

(bouyer)

2020-05-07 19:48:58 UTC MAIN commitmail json YAML

Change event_set_handler() to take the target CPU parameter. If ci is NULL,
  event_set_handler() will choose the CPU and bind the event.
  If ci is not NULL the caller is responsible for binding the event.
Use a IPI xcall to register the handlers if needed.
pull in a hack from x86 to force pirq handlers to be mpsafe if registered at
a level != IPL_VM. This is for the com at isa interrupt handler, which
registers at IPL_HIGH and has to way to tell it's mpsafe (taking
KERNEL_LOCK at IPL_HIGH causes deadlocks on MP systems).

(bouyer)

2020-05-07 19:25:57 UTC MAIN commitmail json YAML

2020-05-07 19:13:38 UTC MAIN commitmail json YAML

Trigger entropy consolidation before saving seed.

This way, whenever /etc/security runs infrequently (daily), or the
operator manually issues rndctl -S, we ensure that all samples taken
during the entire boot are hashed together in the seed for the next
boot.

This should be infrequent enough that it's unlikely to enable the
iterative-guessing attacks that we try to mitigate by not frequently
consolidating entropy.

(riastradh)

2020-05-07 19:12:45 UTC MAIN commitmail json YAML

Rework rndctl seed load sequence again.

Go back to the book's order, now that writing to /dev/random
guarantees to consolidate entropy -- this way the _next_ boot is no
less secure than the current boot, in the event that entropy sources
like interrupt timings provided any security that we just don't know
how to measure honestly.

Make sure to open the old seed to overwrite and the new seed to write
anew first so that we can determine whether the medium is read-only
before accepting the file's entropy estimate.

(riastradh)

2020-05-07 19:09:26 UTC MAIN commitmail json YAML

Touch up rndctl(8) a bit.

(riastradh)

2020-05-07 19:07:29 UTC MAIN commitmail json YAML

Print `entropy: ready' only when we first have full entropy.

Now that we consolidate entropy in rndctl -L and equivalent, not just
when the operator chooses, epoch != -1 no longer necessarily means
full entropy -- it just means `time to (re)seed, whether justified by
entropy accounting or by explicit consolidation'.

There is a bug on x86 systems with RDRAND/RDSEED that prevents this
message from appearing at all: it happens so early that consinit has
not run yet, so it just goes into oblivion.  Need to fix that some
other way!

(riastradh)

2020-05-07 19:05:51 UTC MAIN commitmail json YAML

Consolidate entropy on RNDADDDATA and writes to /dev/random.

The man page for some time has advertised:

  Writing to either /dev/random or /dev/urandom influences subsequent
  output of both devices, guaranteed to take effect at next open.

So let's make that true again.

It is a conscious choice _not_ to consolidate entropy frequently.
For example, if you have a _slow_ HWRNG, which provides 32 bits of
entropy every few seconds, and you reveal a hash that to the
adversary before any more comes in, the adversary can in principle
just keep guessing the intermediate state by a brute force search
over ~2^32 possibilities.

To mitigate this, the kernel generally tries to avoid consolidating
entropy from the per-CPU pools until doing so would bring us from
zero entropy to full entropy.

However, there are various _possible_ sources of entropy which are
just hard to give honest estimates for that are valid on ~all
machines -- like interrupt timings.  The time at which we read a seed
in, which usually happens via /etc/rc.d/random_seed early in
userland, is a reasonable time to gather this up.  An operator or
system engineer who knows another opportune moment can always issue
`sysctl -w kern.entropy.consolidate=1'.

Prompted by a suggestion from nia@ to consolidate entropy at the
first transition to userland.  I chose not to do that because it
would likely cause warning fatigue on systems that are perfectly fine
with a random seed -- doing it this way instead lets rndctl -L
trigger the consolidation automatically.  A subsequent commit will
reorder the operations in rndctl again to make it work out better.

(riastradh)

2020-05-07 18:27:19 UTC netbsd-9 commitmail json YAML

2020-05-07 18:25:14 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by jmcneill in ticket #895):

sys/arch/arm/cortex/gic_v2m.h: revision 1.3
sys/arch/arm/cortex/gic_v2m.c: revision 1.9

Do not store a pointer to the passed in struct pci_attach_args

(martin)

2020-05-07 18:22:58 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by kim in ticket #894):

usr.bin/finger/finger.1: revision 1.22
usr.bin/finger/util.c: revision 1.30

Add lastlogx support

(martin)

2020-05-07 18:19:28 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by kim in ticket #893):

usr.sbin/lastlogin/lastlogin.c: revision 1.16
usr.sbin/lastlogin/lastlogin.c: revision 1.17
usr.sbin/lastlogin/lastlogin.c: revision 1.18
usr.sbin/lastlogin/lastlogin.c: revision 1.19
usr.sbin/lastlogin/lastlogin.c: revision 1.20
usr.sbin/lastlogin/lastlogin.8: revision 1.13
usr.sbin/lastlogin/lastlogin.8: revision 1.14

Size output columns dynamically by default to fit contents.

If the passwd entry is not found for a lastlogx entry, cons up a fake
struct passwd where pw_name is the numeric uid in parentheses. This was
already implemented for lastlog entries in revision 1.13.

If -n is specified more than once, also print the user numerically
(ie, uid instead of username) for lastlog entries. This was already
implemented for lastlogx entries in revision 1.13.

Reorder the lastlogx host name numeric condition so it better matches
the user name numeric condition.

Use memcpy for copying out lastlog and lastlogx text
Lastlog and lastlogx text fields are not NUL-terminated when original data
is truncated.

Output records in original order

Append to the list of output records instead of pushing on it, so we
don't reverse the order of records (when not sorting).

New sentence, new line.

Sync usage with man page.

(martin)

2020-05-07 18:15:29 UTC MAIN commitmail json YAML

Pass full pathname to df, and print warning message on failure.

No need to extract dirname; `df -P /var/db/entropy-file' and `df -l
/var/db/entropy-file' work just fine.

(riastradh)

2020-05-07 18:13:05 UTC MAIN commitmail json YAML

Fix LOCKDEBUG compilation on i386.

(maxv)

2020-05-07 18:02:48 UTC MAIN commitmail json YAML

2020-05-07 17:58:26 UTC MAIN commitmail json YAML

2020-05-07 17:10:02 UTC MAIN commitmail json YAML

2020-05-07 17:06:44 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by macallan in ticket #892):

sys/dev/sdmmc/if_bwfm_sdio.c: revision 1.15

add entry for BCM43362, found on Cubietruck
ok jmcneill@

(martin)

2020-05-07 17:05:07 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by jmcneill in ticket #891):

sys/arch/arm/sunxi/sun4i_a10_ccu.c: revision 1.12

Add A20 CLK_OUT_A and CLK_OUT_B clocks

(martin)

2020-05-07 17:03:51 UTC netbsd-8 commitmail json YAML

2020-05-07 17:02:33 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by aymeric in ticket #1546):

bin/rcp/rcp.c: revision 1.50

In sink(), upon error, avoid multiple replies to the source as this
would lead to a desynchronization of the protocol and further files or
directories to be ignored or corrupted.

Reported by Daniel Goujot, Georges-Axel Jaloyan, Ryan Lahfa, and David Naccache.

(martin)

2020-05-07 17:01:13 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by aymeric in ticket #890):

bin/rcp/rcp.c: revision 1.50

In sink(), upon error, avoid multiple replies to the source as this
would lead to a desynchronization of the protocol and further files or
directories to be ignored or corrupted.

Reported by Daniel Goujot, Georges-Axel Jaloyan, Ryan Lahfa, and David Naccache.

(martin)

2020-05-07 16:49:59 UTC MAIN commitmail json YAML

If we encounter relocations from a section that the bootloader dropped,
AND if the section is a note, then skip the relocations.

Considering a note that the bootloader dropped, there are two possible
sides for the relocations: (1) the relocations from the note towards the
rest of the binary, and (2) the relocations from the rest of the binary
towards the note.

We skip (1), which is correct, because the notes do not play any role at
run time. If we encounter (2) however then there is a bug in the kernel,
so add a sanity check against that.

This fixes KASLR since the latest Xen changes (which introduced .note.Xen).

(maxv)

2020-05-07 16:20:40 UTC MAIN commitmail json YAML

Do not store a pointer to the passed in struct pci_attach_args

(jmcneill)

2020-05-07 15:44:35 UTC MAIN commitmail json YAML

Cast physical address to uintptr_t, fix PAE build.
Pointed out by John D. Baker

(bouyer)

2020-05-07 13:40:20 UTC MAIN commitmail json YAML

2020-05-07 12:58:09 UTC MAIN commitmail json YAML

Add -i to SYNOPSIS.

(wiz)

2020-05-07 12:56:19 UTC MAIN commitmail json YAML

2020-05-07 12:55:06 UTC MAIN commitmail json YAML

Fix macro usage. Fix typo. New sentence, new line.

(wiz)

2020-05-07 12:52:40 UTC MAIN commitmail json YAML

Sync usage with man page.

(wiz)

2020-05-07 12:52:26 UTC MAIN commitmail json YAML

New sentence, new line.

(wiz)

2020-05-07 12:09:26 UTC netbsd-7 commitmail json YAML

2020-05-07 12:07:13 UTC netbsd-7-1 commitmail json YAML

2020-05-07 12:05:51 UTC netbsd-7-1 commitmail json YAML

Pull up the following revisions(s) (requested by aymeric in ticket #1731):
bin/rcp/rcp.c: revision 1.50

In sink(), upon error, avoid multiple replies to the source as this
would lead to a desynchronization of the protocol and further files or
directories to be ignored or corrupted.

(sborrill)

2020-05-07 12:03:47 UTC netbsd-7-0 commitmail json YAML

2020-05-07 12:02:24 UTC netbsd-7-0 commitmail json YAML

Pull up the following revisions(s) (requested by aymeric in ticket #1731):
bin/rcp/rcp.c: revision 1.50

In sink(), upon error, avoid multiple replies to the source as this
would lead to a desynchronization of the protocol and further files or
directories to be ignored or corrupted.

(sborrill)

2020-05-07 12:01:40 UTC netbsd-7 commitmail json YAML

2020-05-07 12:01:00 UTC netbsd-7 commitmail json YAML

Pull up the following revisions(s) (requested by aymeric in ticket #1731):
bin/rcp/rcp.c: revision 1.50

In sink(), upon error, avoid multiple replies to the source as this
would lead to a desynchronization of the protocol and further files or
directories to be ignored or corrupted.

(sborrill)

2020-05-07 11:46:27 UTC MAIN commitmail json YAML

add entry for BCM43362, found on Cubietruck
ok jmcneill@

(macallan)

2020-05-07 11:43:28 UTC MAIN commitmail json YAML

Add PRID definition for newer SiByte SB1 cores (rev 0x11).
Add a constant for SiByte/BCRM cacheable coherent TLB cache attribute.

(simonb)

2020-05-07 11:24:47 UTC MAIN commitmail json YAML

Add A20 CLK_OUT_A and CLK_OUT_B clocks

(jmcneill)

2020-05-07 09:13:06 UTC MAIN commitmail json YAML

Operation zfs_zget_cleaner() cannot fail, comment and add assertions.

(hannken)

2020-05-07 09:12:32 UTC MAIN commitmail json YAML

Revert Rev. 1.31 as it is no longer possible for the handle to be NULL.

(hannken)

2020-05-07 09:12:03 UTC MAIN commitmail json YAML

Revert Rev. 1.63 and add a comment why we have to zil_commit() here:

Operation zfs_znode.c::zfs_zget_cleaner() depends on this
zil_commit() as a barrier to guarantee the znode cannot
get freed before its log entries are resolved.

(hannken)

2020-05-07 00:55:13 UTC MAIN commitmail json YAML

Fix two mistakes in entropy accounting.

1. When consolidating entropy from per-CPU pools, drop the amount
  pending to zero; otherwise the entropy consolidation thread might
  keep consolidating every second.

This uncovered a feedback loop with kern.entropy.depletion=1 and
on-demand entropy sources, which is that depleting the pool and then
requesting more from it causes the on-demand entropy sources to
trigger reseed, which causes cprng_fast/strong to request more which
depletes the pool again which causes on-demand entropy sources to
trigger reseed, and so on.

To work around this:

2. Set a rate limit on reseeding (advancing the entropy epoch) when
  kern.entropy.depletion=1; otherwise reseeding gets into a feedback
  loop when there are on-demand entropy sources like RDRAND/RDSEED.

(By default, kern.entropy.depletion=0, so this mainly only affects
systems where you're simulating what happens when /dev/random blocks
for testing.)

(riastradh)

2020-05-06 20:40:33 UTC MAIN commitmail json YAML

The event channel is not necesserely bound to the primary CPU.
Use the CPU returned in the interrupt handler instead.

(bouyer)

2020-05-06 20:15:15 UTC MAIN commitmail json YAML

Document the HDAUDIO_ENABLE_HDMI and HDAUDIO_ENABLE_DISPLAYPORT options.

(rkujawa)

2020-05-06 20:09:26 UTC MAIN commitmail json YAML

Drop xbdi_lock() before calling intr_disestablish(), it needs to take
cpu_lock.

(bouyer)

2020-05-06 19:52:19 UTC MAIN commitmail json YAML

Attempts to make MP-safe:
xpmap_ptom_unmap() doens't need to be called at splvm; we own the pa.
Use atomic ops to change pmap_pa_end
Make sure the ptom/mtop are up to date before giving the pages back to the
pool.

(bouyer)

2020-05-06 19:50:26 UTC MAIN commitmail json YAML

Make MP-safe: make sure the xpq_queue* are flushed before making the
pages visible to UVM.

(bouyer)

2020-05-06 19:49:00 UTC MAIN commitmail json YAML

We can't take v_interlock with a spin lock held. Release xbdi_lock
before scheduling the I/O, and take again once queued.
It looks safe to drop the lock here.

(bouyer)

2020-05-06 19:47:05 UTC MAIN commitmail json YAML

xpq_queue_* use per-cpu queue; splvm() is enough to protect them.
remove the XXX SMP comments.

(bouyer)

2020-05-06 19:45:39 UTC MAIN commitmail json YAML

Output records in original order

Append to the list of output records instead of pushing on it, so we
don't reverse the order of records (when not sorting).

(kim)

2020-05-06 19:45:12 UTC MAIN commitmail json YAML

x86/x86/ipi.c should not be built for XENPV, even if dom0ops is defined.

(bouyer)

2020-05-06 19:31:32 UTC MAIN commitmail json YAML

Use memcpy for copying out lastlog and lastlogx text

Lastlog and lastlogx text fields are not NUL-terminated when original data
is truncated.

(kim)

2020-05-06 18:49:26 UTC MAIN commitmail json YAML

Tweak logic to decide whether a medium is safe for an rndseed.

- Teach rndctl to load the seed, but treat it as zero entropy, if the
  medium is read-only or if the update fails.

- Teach rndctl to accept `-i' flag instructing it to ignore the
  entropy estimate in the seed.

- Teach /etc/rc.d/random_seed to:
  (a) assume nonlocal file systems are unsafe, and use -i, but
  (b) assume / is safe, even if it is nonlocal.
  If the medium is nonwritable, leave it to rndctl to detect that.
  (Could use statvfs and check for ST_LOCAL in rndctl, I guess, but I
  already implemented it this way.)

Treating nonlocal / as safe is a compromise: it's up to the operator
to secure the network for (e.g.) nfs mounts, but that's true whether
we're talking entropy or not -- if the adversary has access to the
network that you've mounted / from, they can do a lot more damage
anyway; this reduces warning fatigue for diskless systems, e.g. test
racks.

(riastradh)

2020-05-06 18:38:21 UTC MAIN commitmail json YAML

Update to reflect change to message.

(riastradh)

2020-05-06 18:31:05 UTC MAIN commitmail json YAML

Don't reject seed file entropy estimates, until one is nonzero.

We try to avoid counting the seed file's entropy twice, e.g. once
from the boot loader and once from rndctl via /etc/rc.d/random_seed.

But previously, if you had a /var/db/entropy-file that was deemed to
have zero entropy, that would prevent rndctl -L from _ever_ setting a
nonzero entropy estimate, even if you (say) copy a seed file over
from another machine (over a non-eavesdroppable medium) and try to
load it in with rndctl -L, e.g. via `/etc/rc.d/random_seed start'.

Now we accept the first _nonzero_ entropy estimate from a seed file.

The operator can still always trick the kernel into believing there's
entropy in the system by writing data to /dev/random, if the operator
knows something the kernel doesn't; this only affects the _automated_
seed file loading.

(riastradh)

2020-05-06 18:15:40 UTC MAIN commitmail json YAML

In sink(), upon error, avoid multiple replies to the source as this
would lead to a desynchronization of the protocol and further files or
directories to be ignored or corrupted.

Reported by Daniel Goujot, Georges-Axel Jaloyan, Ryan Lahfa, and David Naccache.

(aymeric)

2020-05-06 17:28:26 UTC MAIN commitmail json YAML

KASSERT() that the per-cpu queues are run at IPL_VM after boot.

(bouyer)

2020-05-06 17:27:39 UTC MAIN commitmail json YAML

No need to run hypercalls at IPL_VM.
XXX still not MP-safe

(bouyer)

2020-05-06 16:50:13 UTC MAIN commitmail json YAML

Convert remaining splfoo/splx and tsleep/wakeup to mutex and condvar.
Mark kernel threads and interrupt handlers MPSAFE.

(bouyer)

2020-05-06 16:17:37 UTC MAIN commitmail json YAML

Add getentropy() to libc - a simple wrapper to access the kernel CSPRNG.

Posted to tech-userlevel@ a week ago and reviewed by riastradh@.

GETENTROPY(3)   Library Functions Manual GETENTROPY(3)

NAME
    getentropy - fill a buffer with high quality random data

LIBRARY
    Standard C Library (libc, -lc)

SYNOPSIS
    #include <unistd.h>

    int
    getentropy(void *buf, size_t buflen);

DESCRIPTION
    The getentropy() function fills a buffer with high quality random data,
    suitable for seeding cryptographically secure psuedorandom number
    generators.

    getentropy() is only intended for seeding random number generators and is
    not intended for use by regular code which simply needs secure random
    data.  For this purpose, please use arc4random(3).

    The maximum value for buflen is 256 bytes.

IMPLEMENTATION NOTES
    getentropy() reads from the sysctl(7) variable kern.arandom.

RETURN VALUES
    The getentropy() function returns 0 on success, and -1 if an error
    occurred.

ERRORS
    getentropy() will succeed unless:

    [EFAULT] The buf argument points to an invalid memory address.

    [EIO] Too many bytes were requested.

SEE ALSO
    arc4random(3), rnd(4)

STANDARDS
    The getentropy() function is non-standard.

HISTORY
    The getentropy() function first appeared in OpenBSD 5.6, then in
    FreeBSD 12.0, and NetBSD 10.

(nia)

2020-05-06 14:59:51 UTC MAIN commitmail json YAML

The name of the action used with blacklistd's control script is rem,
not remove.  From Jose Luis Duran in PR bin/55195.

(snj)

2020-05-06 14:33:52 UTC MAIN commitmail json YAML

2020-05-06 13:47:40 UTC MAIN commitmail json YAML

If the passwd entry is not found for a lastlogx entry, cons up a fake
struct passwd where pw_name is the numeric uid in parentheses. This was
already implemented for lastlog entries in revision 1.13.

If -n is specified more than once, also print the user numerically
(ie, uid instead of username) for lastlog entries. This was already
implemented for lastlogx entries in revision 1.13.

Reorder the lastlogx host name numeric condition so it better matches
the user name numeric condition.

(kim)

2020-05-06 13:43:48 UTC MAIN commitmail json YAML

remove the per-channel spin lock and instead make sure that events
add/remove will only be done on the CPU the handler is bound to, with
interrupts disabled.
Should be similar to the native x86 interrupts add/remove.

(bouyer)

2020-05-06 13:13:50 UTC MAIN commitmail json YAML

Bump date for previous change...  I frequently forget that bit.

(kre)

2020-05-06 12:44:37 UTC MAIN commitmail json YAML

Allocate one more byte so that we are always NUL-terminated, and remove
the extra commented out NUL-terminations. As suggested in:

    http://mail-index.netbsd.org/source-changes-d/2020/04/01/msg012470.html

(christos)

2020-05-06 11:58:33 UTC MAIN commitmail json YAML

Size output columns dynamically by default to fit contents.

(kim)

2020-05-06 09:18:10 UTC MAIN commitmail json YAML

Bump INSTIMAGEMB, hopefully fix releng autobuilds

(bouyer)

2020-05-06 09:07:15 UTC MAIN commitmail json YAML

kill is built-in to more than just csh(1).
While here, add missing Xr sh 1 (which was previously needed, moreso now)
and also include STOP and CONT in the list of common signals.

(kre)

2020-05-06 07:42:14 UTC netbsd-7 commitmail json YAML

2020-05-06 07:40:17 UTC netbsd-7 commitmail json YAML

Fix bug in sha384 checksum computation introduced when converting the code
to avoid alignment issues.

(sborrill)

2020-05-06 07:25:26 UTC MAIN commitmail json YAML

Avoid buffer overflow

Disable the offending code.

OK by kre@

(kamil)

2020-05-06 05:14:27 UTC MAIN commitmail json YAML

Fix a bug in the futex_wake_highest_pri test case.  Still fails as
expected.

(thorpej)

2020-05-06 02:30:10 UTC MAIN commitmail json YAML

2020-05-05 22:12:07 UTC MAIN commitmail json YAML

lwp_unpark(): no need to acquire LWP refs or drop the proc lock.

On the hacky benchmarks I have, held over from the transition to 1:1
threading, this restores pthread_cond_signal() perf to radixtree/sleepq
levels, and semes much better than either with pthread_cond_broadcast() and
10 threads.  It would be interesting to see what might be achieved with a
lockless lookup, which is within grasp now thanks to pid_table being used
for lookup.

(ad)

2020-05-05 21:22:48 UTC MAIN commitmail json YAML

PR port-amiga/55233 Process hangs indefinitely if not calling syscalls for a while

cpu_intr_p() is broken on amiga, fix it.

From code inspection it looks like amiga and other m68k ports check for ASTs
with interrupts enabled in some cases, which is racy.  Not fixed.

(ad)

2020-05-05 20:47:39 UTC MAIN commitmail json YAML

switch hppa to new binutils (2.34)

(skrll)

2020-05-05 20:47:14 UTC MAIN commitmail json YAML

Disable attempt to use ifunc on hppa.  It doesn't work and new binutils
throws a build error.

(skrll)

2020-05-05 20:43:47 UTC MAIN commitmail json YAML

2020-05-05 20:39:18 UTC MAIN commitmail json YAML

Add a space before any non-nullified instruction.  NFCI.

(skrll)

2020-05-05 20:36:48 UTC MAIN commitmail json YAML

fix KASSERT() for MHLEN case in m_defrag() - network stack usually does
m_adj(ETHER_ALIGN) so check that the mbuf chain data fits
M_LEADINGSPACE() + M_TRAILINGSPACE()

(jdolecek)

2020-05-05 20:12:37 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #888):

sys/kern/uipc_sem.c: revision 1.59

Release the collision if we find one.

Candidate fix for:
panic: lock error: Mutex: mutex_vector_enter,542: locking against myself: lock 0xffff8f611abd37e0 cpu 8 lwp 0xffff8f60a3c6a040
cpu8: Begin traceback...
vpanic() at netbsd:vpanic+0x178
snprintf() at netbsd:snprintf
lockdebug_abort() at netbsd:lockdebug_abort+0xe6
mutex_vector_enter() at netbsd:mutex_vector_enter+0x3c1
ksem_close_fop() at netbsd:ksem_close_fop+0x17
closef() at netbsd:closef+0x69
fd_free() at netbsd:fd_free+0x101
exit1() at netbsd:exit1+0x118
sys_exit() at netbsd:sys_exit+0x3d
syscall() at netbsd:syscall+0x299

Would be nice to have an automatic test for this.  Since semids are
only 24 bits, we only need to create a few thousand of them to have a
high probability of collision.  Maybe we should bump default semmax
while here...

(martin)

2020-05-05 19:26:47 UTC MAIN commitmail json YAML

Gather the section filtering in a single function, and add a sanity check
when relocating, to make sure the section we're accessing is mappable.

Currently this check fails, because of the Xen section, which has RELAs but
is an unmappable unallocated note.

Also improve the prekern ASSERTs while here.

(maxv)

2020-05-05 18:52:57 UTC netbsd-8 commitmail json YAML

2020-05-05 18:51:08 UTC netbsd-8 commitmail json YAML

Apply patch, requested by he in ticket #1545:

Fix bug revealing itself in sha384 checksum computation: one
important statement was overlooked when converting the code to
avoid alignment issues.

(martin)

2020-05-05 18:34:48 UTC netbsd-9 commitmail json YAML

2020-05-05 18:32:16 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by jmcneill in ticket #889):

sys/external/bsd/compiler_rt/dist/lib/builtins/clear_cache.c: revision 1.4

Align addresses to cache lines in __clear_cache for aarch64.

This corrects an issue where if the start and end address fall in different
lines, and the end address is not cache line size aligned, the last line
will not be invalidated properly.

Patch from compiler-rt upstream: https://reviews.llvm.org/rCRT323315

(martin)

2020-05-05 18:12:20 UTC MAIN commitmail json YAML

Skip traceme_raise* tests rather than failing upfront

This avoid reporting the tests as unexpected failure.

(kamil)

2020-05-05 17:02:01 UTC MAIN commitmail json YAML

2020-05-05 16:58:11 UTC MAIN commitmail json YAML

disable I/O or mem decode before probing BAR size.
Bar size is probed writing 0xffffffff to the BAR and reading back; but while
doing this the decoding address is not guaranteed to be valid and could have
side effect.

Xen PVH enforces disabling decoding before writing to a BAR.

Proposed on tech-kern@, got positive comments

(bouyer)

2020-05-05 16:04:07 UTC MAIN commitmail json YAML

2020-05-05 15:31:42 UTC MAIN commitmail json YAML

New sysctl kern.entropy.gather=1 to trigger entropy gathering.

Invokes all on-demand RNG sources.  This enables HWRNG driver
developers to use a dtrace probe on rnd_add_data to examine the data
coming out of the HWRNG:

dtrace -n 'fbt::rnd_add_data:entry /args[0]->name == "amdccp0"/ {
  ...examine buffer args[1] length args[2]...
}'

(riastradh)

2020-05-05 15:25:18 UTC MAIN commitmail json YAML

Revert "Use cv_timedwaitclock_sig in futex."

Turned out to break things; we'll do this another way.

(riastradh)

2020-05-05 15:23:32 UTC MAIN commitmail json YAML

Revert "Make sure futex waits never return ERESTART."

Part of redoing the timedwaitclock changes, which were buggy and
committed a little too fast.

(riastradh)

2020-05-05 12:47:16 UTC MAIN commitmail json YAML

Align addresses to cache lines in __clear_cache for aarch64.

This corrects an issue where if the start and end address fall in different
lines, and the end address is not cache line size aligned, the last line
will not be invalidated properly.

Patch from compiler-rt upstream: https://reviews.llvm.org/rCRT323315

(jmcneill)

2020-05-05 09:52:13 UTC MAIN commitmail json YAML

due to the locking wild west for if_ioctl can't assert IFNET_LOCKED()
in xennet_ioctl(), so just do splnet() like other drivers do, and hope for best

fixes failed KASSERT() e.g. when starting rpcbind(), which ends
up calling this via sys_setsockopt()->sosetopt()->...->in6_addmulti()->
if_mcast_op(), this path doesn't currently take IFNET_LOCK()

(jdolecek)

2020-05-05 09:33:39 UTC MAIN commitmail json YAML

write down some observations about the locking wild west around if_mcast_op()

(jdolecek)

2020-05-05 09:26:29 UTC MAIN commitmail json YAML

adjust comment - sosetopt() path doesn't take IFNET_LOCK()

(jdolecek)

2020-05-05 09:22:24 UTC MAIN commitmail json YAML

add a NOMPSAFE comment for if_mcast_op(), it is called from context
which doesn't hold IFNET_LOCK() in some cases, and calls if_ioctl

this needs to be sorted out for NET_MPSAFE

(jdolecek)

2020-05-05 09:07:35 UTC MAIN commitmail json YAML

build start_xenpvh only if XEN. Fixes NET4501 build issue reported by
John D. Baker

(bouyer)

2020-05-05 08:05:44 UTC MAIN commitmail json YAML

bump version - struct ifnet change

(jdolecek)

2020-05-05 08:05:03 UTC MAIN commitmail json YAML

remove struct ifnet if_mcastop, it's not used by anything

(jdolecek)

2020-05-05 06:32:43 UTC MAIN commitmail json YAML

Fix KASAN, init_xen_early must be called after kasan_early_init.

(maxv)

2020-05-05 06:20:55 UTC MAIN commitmail json YAML

2020-05-05 06:11:06 UTC MAIN commitmail json YAML

2020-05-05 06:06:17 UTC MAIN commitmail json YAML

Remove unnecesary #define/#undef _LOCORE

(skrll)

2020-05-05 02:06:08 UTC MAIN commitmail json YAML

Move misc tests out of t_ptrace_wait.c to t_ptrace_misc_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-05 01:28:17 UTC MAIN commitmail json YAML

2020-05-05 01:24:29 UTC MAIN commitmail json YAML

Move core tests out of t_ptrace_wait.c to t_ptrace_core_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-05 00:57:34 UTC MAIN commitmail json YAML

Move siginfo tests out of t_ptrace_wait.c to t_ptrace_siginfo_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-05 00:50:39 UTC MAIN commitmail json YAML

Move threads tests out of t_ptrace_wait.c to t_ptrace_threads_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-05 00:33:37 UTC MAIN commitmail json YAML

Move topology tests out of t_ptrace_wait.c to t_ptrace_topology_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-05 00:23:13 UTC MAIN commitmail json YAML

Move exec() tests out of t_ptrace_wait.c to t_ptrace_exec_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-05 00:15:45 UTC MAIN commitmail json YAML

Move LWP tests out of t_ptrace_wait.c to t_ptrace_lwp_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-05 00:03:49 UTC MAIN commitmail json YAML

Remove the duplicate ATF_TP_ADD_TC() entries

Event mask tests are already defined in
ATF_TP_ADD_TCS_PTRACE_WAIT_EVENTMASK().

(kamil)

2020-05-05 00:01:15 UTC MAIN commitmail json YAML

Move eventmask tests out of t_ptrace_wait.c to t_ptrace_eventmask_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-04 23:53:20 UTC MAIN commitmail json YAML

Remove the duplicate ATF_TP_ADD_TC() entries

Byte transfer tests are already defined in
ATF_TP_ADD_TCS_PTRACE_WAIT_BYTETRANSFER().

(kamil)

2020-05-04 23:49:31 UTC MAIN commitmail json YAML

2020-05-04 22:34:22 UTC MAIN commitmail json YAML

Move fork/vfork/posix_spawn tests out of t_ptrace_wait.c to t_ptrace_fork_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-04 22:24:31 UTC MAIN commitmail json YAML

2020-05-04 22:15:23 UTC MAIN commitmail json YAML

Move clone() tests out of t_ptrace_wait.c to t_ptrace_clone_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-04 22:05:29 UTC MAIN commitmail json YAML

Move byte transfer tests out of t_ptrace_wait.c to t_ptrace_bytetransfer_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-04 21:55:12 UTC MAIN commitmail json YAML

Move kill()-like tests out of t_ptrace_wait.c to t_ptrace_kill_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-04 21:33:20 UTC MAIN commitmail json YAML

Move PT_STEP tests out of t_ptrace_wait.c to t_ptrace_step_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-04 21:21:30 UTC MAIN commitmail json YAML

Move syscall tests out of t_ptrace_wait.c to t_ptrace_syscall_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-04 20:55:48 UTC MAIN commitmail json YAML

Move register tests out of t_ptrace_wait.c to t_ptrace_register_wait.h

The same tests are now included with the preprocessor in t_ptrace_wait.c.

No functional change intended.

(kamil)

2020-05-04 20:06:38 UTC MAIN commitmail json YAML

2020-05-04 18:36:24 UTC MAIN commitmail json YAML

Prevent double definition of pt_entry_t from machine/param.h

(joerg)

2020-05-04 18:23:37 UTC MAIN commitmail json YAML

New timedwaitclock_setup.

C99 initializers would have been nice, but part of the struct is
explicit parameters and part of the struct is implicit state, and
-Wmissing-field-initializers can't discriminate between them
(although for some reason it doesn't always fire!).

Instead, just do:

        struct timedwaitclock T;

        timedwaitclock_setup(&T, timeout, clockid, flags, epsilon);
        while (...) {
                error = timedwaitclock_begin(&T, &timo);
                if (error)
                        ...
                error = waitwhatever(timo);
                timedwaitclock_end(&T);
                ...
        }

(riastradh)

2020-05-04 18:19:34 UTC MAIN commitmail json YAML

boardype should not be common.

(joerg)

2020-05-04 16:21:23 UTC MAIN commitmail json YAML

note feature-sg and jumbo frames for xennet(4)/xvif(4), MSI for XenPV

(jdolecek)

2020-05-04 15:55:57 UTC MAIN commitmail json YAML

add support for using MSI for XenPV Dom0

use PHYSDEVOP_map_pirq to get the pirq/gsi for MSI/MSI-X, switch also INTx
to use it instead of PHYSDEVOP_alloc_irq_vector

MSI confirmed working with single-vector MSI for wm(4), ahcisata(4), bge(4)

XXX added some provision for MSI-X, but it doesn't actually work (no interrupts
delivered), needs some further investigation; disable MSI-X for XENPV
via flag in x86/pci/pci_machdep.c

(jdolecek)

2020-05-04 15:13:46 UTC MAIN commitmail json YAML

Improve markup.

(wiz)

2020-05-04 15:10:41 UTC MAIN commitmail json YAML

Break line after macro arguments end. Use \- for minus.

(wiz)

2020-05-04 15:09:34 UTC MAIN commitmail json YAML

Add a test case for PR kern/55230.  It is currently marked as expect-fail.

(thorpej)

2020-05-04 14:04:11 UTC netbsd-9 commitmail json YAML

2020-05-04 14:03:12 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by christos in ticket #887):

crypto/external/bsd/netpgp/lib/verify/Makefile: revision 1.13
crypto/external/bsd/netpgp/lib/verify/verify.map: revision 1.1

Add a linker map to hide all the symbols the this library accidentally
exported. In particular the following symbols:

DSA_SIG_free
DSA_SIG_new
DSA_do_sign
DSA_do_verify
DSA_free
DSA_new
DSA_size
RSA_check_key
RSA_free
RSA_generate_key
RSA_new
RSA_private_decrypt
RSA_private_encrypt
RSA_public_decrypt
RSA_public_encrypt

conflict with libcrypto and break pkg_add which links against both
libraries.

(martin)

2020-05-04 13:58:48 UTC MAIN commitmail json YAML

Release the collision if we find one.

Candidate fix for:

panic: lock error: Mutex: mutex_vector_enter,542: locking against myself: lock 0xffff8f611abd37e0 cpu 8 lwp 0xffff8f60a3c6a040
cpu8: Begin traceback...
vpanic() at netbsd:vpanic+0x178
snprintf() at netbsd:snprintf
lockdebug_abort() at netbsd:lockdebug_abort+0xe6
mutex_vector_enter() at netbsd:mutex_vector_enter+0x3c1
ksem_close_fop() at netbsd:ksem_close_fop+0x17
closef() at netbsd:closef+0x69
fd_free() at netbsd:fd_free+0x101
exit1() at netbsd:exit1+0x118
sys_exit() at netbsd:sys_exit+0x3d
syscall() at netbsd:syscall+0x299

Would be nice to have an automatic test for this.  Since semids are
only 24 bits, we only need to create a few thousand of them to have a
high probability of collision.  Maybe we should bump default semmax
while here...

(riastradh)

2020-05-04 13:58:17 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by jdc in ticket #886):

sys/dev/sun/disksubr.c: revision 1.17

If the sector size is 0, return early in readdisklabel().
Prevents a panic trying to use a 0-sized buffer, which can happen if we run
(e.g.) `scsictl /dev/cd0c identify` with no medium in the CD drive.

(martin)

2020-05-04 13:50:07 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by jdc in ticket #885):

sys/dev/scsipi/scsiconf.c: revision 1.287

Don't attempt to read opcodes and their timeouts at attach time for
old devices.  The MAINTENANCE IN command was introduced with SCSI-3
and sending it to older peripherals can cause timeouts or them not
to respond to further requests.

(martin)

2020-05-04 12:15:43 UTC MAIN commitmail json YAML

2020-05-04 10:03:45 UTC MAIN commitmail json YAML

2020-05-04 09:34:37 UTC MAIN commitmail json YAML

constify the pic templates

(jdolecek)

2020-05-04 08:22:45 UTC MAIN commitmail json YAML

remove IPv4 csum offloading for xennet(4) - it's not complete, and even
if it was, it doesn't work with Linux Dom0 as it expects the IPv4 csum present

(jdolecek)

2020-05-04 06:55:12 UTC MAIN commitmail json YAML

Note hp425e EVRX framebuffer bitmap ops support.

(tsutsui)

2020-05-04 06:52:53 UTC MAIN commitmail json YAML

Add bitmap access ops support for EVRX framebuffer on HP9000/425e.

8bpp Xorg wsfb server and mlterm-wscons (formerly mlterm-fb) work.
No particular comment on port-hp300@ and port-hppa@:
https://mail-index.netbsd.org/port-hp300/2020/05/02/msg000170.html

Special thanks to Miod Vallat, for his advice about HP-UX implementation
and binutils patches to disassemble old HP-UX a.out-hp300hpux binaries
(and also contributing his 425e back in 2014).

(tsutsui)

2020-05-04 06:42:11 UTC MAIN commitmail json YAML

2020-05-04 00:18:34 UTC MAIN commitmail json YAML

Bring over changes from source of truth in pkgsrc - bump version to 20200503

Update netpgpverify and libnetpgpverify to version 20200503

ensure all exported functions use a unique prfix, so that they don't
conflict with symbols (both data and text) in libcrypto. this works for
statically linked binaries and libraries, rather then the version map which
only works for dynalically-linked.

(agc)

2020-05-03 21:46:37 UTC MAIN commitmail json YAML

Add a linker map to hide all the symbols the this library accidentally
exported. In particular the following symbols:

DSA_SIG_free
DSA_SIG_new
DSA_do_sign
DSA_do_verify
DSA_free
DSA_new
DSA_size
RSA_check_key
RSA_free
RSA_generate_key
RSA_new
RSA_private_decrypt
RSA_private_encrypt
RSA_public_decrypt
RSA_public_encrypt

conflict with libcrypto and break pkg_add which links against both
libraries.

(christos)

2020-05-03 21:02:24 UTC MAIN commitmail json YAML

Avoid common symbol declarations.

(joerg)

2020-05-03 17:56:19 UTC MAIN commitmail json YAML

add support for scatter-gather also for frontend Rx path (backend -> frontend)

enable ETHERCAP_JUMBO_MTU and feature-sg

(jdolecek)

2020-05-03 17:54:28 UTC MAIN commitmail json YAML

reduce buffer size for format_number() so that xbd(4) would show the size
in KB/GB/TB instead of bytes again; the '9' matches what xbd(4) used before,
and also e.g. wd(4)

(jdolecek)

2020-05-03 17:36:33 UTC MAIN commitmail json YAML

Move timedwaitclock_begin() and timedwaitclock_end() to subr_time.c
so they can be used by other things.

(thorpej)

2020-05-03 17:24:11 UTC MAIN commitmail json YAML

For PVH and HVM, copy hvm_start_info.flags to xen_start_info.flags

(bouyer)

2020-05-03 17:23:14 UTC MAIN commitmail json YAML

Hanble dom0 console. This one doesn't need a ring to be mapped, and
can be used earlier.

(bouyer)

2020-05-03 17:22:03 UTC MAIN commitmail json YAML

If hvm_start_info has no memmap_entries, fall back to XENMEM_memory_map
hypercall.

(bouyer)

2020-05-03 16:32:16 UTC MAIN commitmail json YAML

PR/54435: Adjust for new kernel behavior of soreceive(9) clearing MSG_OOB
when receiving the oob message. This made SIOCATMARK return always 0 since
the oob message was cleared. Instead, use recvmsg(2) to determine if
the message was oob or not. This works with both the old and new kernel
and it is not racy.

(christos)

2020-05-03 16:11:06 UTC MAIN commitmail json YAML

(foo *) 0 -> NULL
int -> ssize_t/size_t

(christos)

2020-05-03 16:10:26 UTC MAIN commitmail json YAML

return EOPNOTSUPP for unknown IP protocol (same as unknown ethernet type),
so that EINVAL is returned only when the packet is too short

(jdolecek)

2020-05-03 15:29:22 UTC MAIN commitmail json YAML

2020-05-03 15:27:06 UTC MAIN commitmail json YAML

2020-05-03 13:34:38 UTC MAIN commitmail json YAML

drm/i915: There's no real reason the user should care that we're about to
fall back to bitbanging, so let's change the message from DRM_INFO to
DRM_DEBUG_KMS.

https://lists.freedesktop.org/archives/intel-gfx/2016-March/089133.html

(nia)

2020-05-03 13:29:04 UTC MAIN commitmail json YAML

bump caused by the module debug sets

(christos)

2020-05-03 12:10:28 UTC MAIN commitmail json YAML

usr.bin/make: refactor brk_string

The variables are renamed to reflect to which memory region each pointer
belongs.

The variable "curlen" was always zero.

The type of "ch" has changed to char, and its scope is now limited to
its actual use.

Comparisons of pointers are now consistently written as p != NULL
instead of !p, like character comparisons are written as ch != '\0'.

The "store_words_buf" is updated when the function returns, not before.

(rillig)

2020-05-03 10:06:29 UTC MAIN commitmail json YAML

Regen to disable amiga/efa(4) in GENERIC, accidentally enabled in the
previous revision.

efa_probe() seems broken and misdetected even if absent on A1200.

(rin)

2020-05-03 08:36:09 UTC MAIN commitmail json YAML

2020-05-03 07:32:54 UTC MAIN commitmail json YAML

turn off TLS for mips on old jemalloc.  it doesn't work.

(mrg)

2020-05-03 07:10:27 UTC MAIN commitmail json YAML

Remove hack for amiga introduced for 68060:
http://cvsweb.netbsd.org/bsdweb.cgi/src/gnu/usr.bin/gdb6/libgdb/Attic/Makefile#rev1.9

Now, gdb works fine even if compiled with -march=68060 and -mtune=68060.

(rin)

2020-05-03 06:33:59 UTC MAIN commitmail json YAML

Initialize struct krndsource::total to zero.

Avoids bogus counts reported by `rndctl -l' in the event that the
caller neglected to zero the rndsource ahead of time.

(riastradh)

2020-05-03 06:31:02 UTC MAIN commitmail json YAML

If the sector size is 0, return early in readdisklabel().
Prevents a panic trying to use a 0-sized buffer, which can happen if we run
(e.g.) `scsictl /dev/cd0c identify` with no medium in the CD drive.

(jdc)

2020-05-03 06:30:45 UTC MAIN commitmail json YAML

Fix fallout of migration from malloc to geteblk.

- Use bp->b_data instead of bp itself.
- When buffer is not large enough, start all over; brelse + geteblk does not
  apparently behave like realloc.

(rin)

2020-05-03 04:06:15 UTC MAIN commitmail json YAML