Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (2h)  netbsd-8 (5d)  netbsd-10 (6d)  netbsd-9 (12d)  thorpej-ifq (175d)  thorpej-altq-separation (178d) 

2024-05-10 14:33:32 UTC Now

2020-04-14 08:22:00 UTC MAIN commitmail json YAML

if grant fails also revoke the grants for previous segments, fixes
grant leak on grant error

(jdolecek)

2020-04-14 08:06:54 UTC MAIN commitmail json YAML

Provide a "mach cpuinfo" which displays some struct cpuinfo fields for
a/all CPUs.

(skrll)

2020-04-14 08:00:47 UTC MAIN commitmail json YAML

Remove unused ARM32_DB_COMMANDS

(skrll)

2020-04-14 08:00:23 UTC MAIN commitmail json YAML

Fix typo, expand description slightly.

(wiz)

2020-04-14 07:59:43 UTC MAIN commitmail json YAML

2020-04-14 07:41:05 UTC MAIN commitmail json YAML

DRY - use pages for sizeof() for the frame allocations, so it get's allocated
the correct size without repeating the type

(jdolecek)

2020-04-14 07:38:12 UTC MAIN commitmail json YAML

actually fix also the allocated memory size for the getstatus frames on i386

(jdolecek)

2020-04-14 07:31:52 UTC MAIN commitmail json YAML

Fix a comment.  From ad@

(skrll)

2020-04-14 07:31:39 UTC MAIN commitmail json YAML

note MP-safe work for xennet(4) and xbd(4)

(jdolecek)

2020-04-14 05:43:57 UTC MAIN commitmail json YAML

2020-04-14 03:16:27 UTC MAIN commitmail json YAML

Since dhcpcd-hools/02-dump seems to have been removed from the
repository, don't attempt to install it, and don't expect it to
be installed.    If a better fix is to return 02-dump, then this
change can be reverted (by anyone, just go ahead and do it).

dhcpcd(8) should also have mention of 02-dump removed, if removing
it was intentional.

(kre)

2020-04-14 00:08:07 UTC MAIN commitmail json YAML

catch up with field move

(christos)

2020-04-13 22:54:12 UTC MAIN commitmail json YAML

By default, events are bound to CPU 0 (exept for IPIs and VTIMERs which
are bound to a different CPU at creation time).
Recent MI changes caused the scheduler to choose a different CPU when
probing and attaching xennet devices (I guess it's the xenbus thread which
runs on a different CPU). This cause the callback to be called on a different
CPU than the one expected by the kernel, and the event is ignored.
It is handled when the clock causes the callback to be called on the right
CPU, which is why xennet still run, but slowly.

Change event_set_handler() to do a EVTCHNOP_bind_vcpu if requested to,
and make sure we don't do it for IPIs and VIRQs (for theses, the op fails).

(bouyer)

2020-04-13 22:22:19 UTC MAIN commitmail json YAML

uvm_fault_check(): if MADV_SEQUENTIAL, change lower lock type to RW_WRITER
in case many threads are concurrently doing "sequential" access, to avoid
excessive mixing of read/write lock holds.

(ad)

2020-04-13 20:44:40 UTC MAIN commitmail json YAML

Remove trailing dot in SEE ALSO.

(wiz)

2020-04-13 20:09:13 UTC MAIN commitmail json YAML

KASSERT() that requested I/O size is <= XBD_MAX_XFER - this can happen
e.g. with custom DomU kernel which doesn't have the value for MAXPHYS
reduced to 32k like the XEN3_DOMU config

(jdolecek)

2020-04-13 20:02:27 UTC MAIN commitmail json YAML

when determining I/O block size for VBLK device, only use pi_bsize
returned by DIOCGPARTINFO if it's bigger than DEV_BSIZE and less
than MAXBSIZE (MAXPHYS)

fixes panic "buf mem pool index 8" in buf_mempoolidx() when the
disklabel contains bsize 128KB and something reads the block device -
buffer cache can't allocate bufs bigger than MAXPHYS

(jdolecek)

2020-04-13 19:23:20 UTC MAIN commitmail json YAML

2020-04-13 16:29:59 UTC MAIN commitmail json YAML

2020-04-13 16:09:22 UTC MAIN commitmail json YAML

Use relaxed atomics on spc_mcount.

(maxv)

2020-04-13 15:54:45 UTC MAIN commitmail json YAML

2020-04-13 15:48:55 UTC MAIN commitmail json YAML

Note import of dhcpcd-9.0.1

(roy)

2020-04-13 15:46:26 UTC MAIN commitmail json YAML

2020-04-13 15:26:58 UTC MAIN commitmail json YAML

Get genfb's address offset correctly when the vaule >= 4G. OK's by jmcneill.

Tested on Intel BXNUC10I3FNK (Comet Lake U).

(msaitoh)

2020-04-13 15:23:18 UTC MAIN commitmail json YAML

Use .Dl for one line literal display.  Add SEE ALSO.

(uwe)

2020-04-13 15:16:14 UTC MAIN commitmail json YAML

2020-04-13 14:04:27 UTC MAIN commitmail json YAML

Fix default route selection

The primary issue was that in revision 1.79 a check was added in the
nd6_defrouter_select() search loop to ignore the entry if RA processing
is enabled on its interface.  In practice this results in all entries
being ignored.

This fix reverses the condition, so that an entry is ignored when RA
processing is NOT enabled on its interface.  Further, the entry is
only ignored for being selected as the default router.  The currently
installed router must be identified regardless of the (current) status
of its interface, so that we can delete the route before installing a
new one.

I also added error logging when adding or deleting a route fails. This
should help the administrator (or kernel developer) in noticing possible
problems.

Finally, if deleting a route fails, the corresponding default route
entry no longer has its "installed" flag cleared, so that deletion will
be retried.  At a minimum, this will cause repeated messages about the
failed deletion as opposed to only getting repeated messages about the
installation of a new default route failing.

Fixes PR kern/55091 and also PR bin/54997 as far as the behaviour
observed with ndp(8).

(kim)

2020-04-13 12:14:56 UTC MAIN commitmail json YAML

Apply similar fix from gic.c that fixed "left shift of 255 by 24 places
cannot be represented in type 'int'" warnings from UBSan.

(jmcneill)

2020-04-13 12:14:04 UTC MAIN commitmail json YAML

Fix "left shift of 255 by 24 places cannot be represented in type 'int'"
warning from UBSan.

(jmcneill)

2020-04-13 12:08:06 UTC MAIN commitmail json YAML

Work around a compiler issue when building on aarch64 with KUBSAN.

(jmcneill)

2020-04-13 11:44:20 UTC MAIN commitmail json YAML

2020-04-13 11:43:27 UTC MAIN commitmail json YAML

Handle "no count" properly in db_kernhist_print_cmd

(skrll)

2020-04-13 11:27:22 UTC MAIN commitmail json YAML

unhook umass_isdata.c from here too

(jdolecek)

2020-04-13 11:17:28 UTC MAIN commitmail json YAML

Add xref to umodem(4).  Mistake picked up by wizd(8), but somewhat
unexpectedly it didn't correct the reference to the one I meant but
got wrong.  Need to remember to file a bug report against wizd(8).

(simonb)

2020-04-13 10:49:35 UTC MAIN commitmail json YAML

fix use-after-free for ata xfer on bio submission found by KASAN

driver ata_bio hooks read parts of the xfer after ata_exec_xfer()
call in order to determine return value, change so that the hook
doesn't return any value - callers do not care already,
as all I/O requests are asynchronous

this problem was uncovered by recent change for wd(4) to not hold
wd mutex during ata_bio call, the interrupt for the xfer might
thus actually fire immediately

adjust also ata_exec_command driver hooks similarily - remove all
completion and waiting logic from drivers, upper layer ata code
using AT_WAIT/AT_POLL changed to call ata_wait_cmd() itself

PR kern/55169 by Nick Hudson

(jdolecek)

2020-04-13 09:34:03 UTC MAIN commitmail json YAML

Make KASAN compatible with LLVM. Same as GCC, except that LLVM aggressively
inlines the shadow checks, and this causes problems at boot time; so we
pass -asan-instrumentation-with-call-threshold=0 to force callbacks instead
of inlines.

(maxv)

2020-04-13 09:30:42 UTC MAIN commitmail json YAML

remove wd* at umass?, it was dropped

(jdolecek)

2020-04-13 09:28:14 UTC MAIN commitmail json YAML

note removal of ISD-ATA for umass(4)

(jdolecek)

2020-04-13 09:26:43 UTC MAIN commitmail json YAML

2020-04-13 09:18:10 UTC MAIN commitmail json YAML

drop note about wd not being supported for umass

(jdolecek)

2020-04-13 09:15:54 UTC MAIN commitmail json YAML

remove the In-System design note, related code is about to be dropped and
it doesn't make sense to have a note about things we don't support

(jdolecek)

2020-04-13 08:59:14 UTC MAIN commitmail json YAML

Remove superfluous whitespace & macros.

(wiz)

2020-04-13 08:46:39 UTC MAIN commitmail json YAML

Fix date. Remove Xr to non-existent modem(4). Serial comma. Use more macros.

(wiz)

2020-04-13 08:45:11 UTC MAIN commitmail json YAML

Bump date for previous

(wiz)

2020-04-13 08:06:08 UTC phil-wifi commitmail json YAML

2020-04-13 08:05:22 UTC MAIN commitmail json YAML

Trailing whitespace

(skrll)

2020-04-13 08:05:02 UTC MAIN commitmail json YAML

2020-04-13 07:32:36 UTC MAIN commitmail json YAML

Add KASAN instrumentation on on-stack VLAs, same as amd64.

(maxv)

2020-04-13 07:11:08 UTC MAIN commitmail json YAML

Oops, forgot the empty macro version of UVMHIST_CALLARGS

(skrll)

2020-04-13 07:09:51 UTC MAIN commitmail json YAML

2020-04-13 06:24:52 UTC MAIN commitmail json YAML

Note PAC and BTI.

(maxv)

2020-04-13 06:02:03 UTC MAIN commitmail json YAML

Meant to do a store here, not a load. Ie we want to replace the initial
weak key by the stronger one we just generated.

Rototilled this place too many times.

(maxv)

2020-04-13 05:40:26 UTC MAIN commitmail json YAML

Add support for Branch Target Identification (BTI).

On the executable pages that have the GP (Guarded Page) bit, the semantic
of the "br" and "blr" instructions is changed: the CPU expects the first
instruction of the jump/call target to be "bti", and faults if it isn't.

We add the GP bit on the kernel .text pages (and incidentally the .rodata
pages, but we don't care). The compiler adds a "bti c" instruction at the
beginning of each C function. We modify the ENTRY() macros to manually add
"bti c" in the asm functions.

cpuswitch.S needs a specific change: with "br x27" the CPU expects "bti j",
which is bad because the functions begin with "bti c"; switch to "br x16",
for the CPU to accept "bti c".

BTI helps defend against JOP/COP. Tested on Qemu.

(maxv)

2020-04-13 00:27:17 UTC MAIN commitmail json YAML

slightly change and fix the semantics of pool_set*wat(), pool_sethardlimit()
and pool_prime() (and their pool_cache_* counterparts):

- the pool_set*wat() APIs are supposed to specify thresholds for the count of
  free items in the pool before pool pages are automatically allocated or freed
  during pool_get() / pool_put(), whereas pool_sethardlimit() and pool_prime()
  are supposed to specify minimum and maximum numbers of total items
  in the pool (both free and allocated).  these were somewhat conflated
  in the existing code, so separate them as they were intended.

- change pool_prime() to take an absolute number of items to preallocate
  rather than an increment over whatever was done before, and wait for
  any memory allocations to succeed.  since pool_prime() can no longer fail
  after this, change its return value to void and adjust all callers.

- pool_setlowat() is documented as not immediately attempting to allocate
  any memory, but it was changed some time ago to immediately try to allocate
  up to the lowat level, so just fix the manpage to describe the current
  behaviour.

- add a pool_cache_prime() to complete the API set.

(chs)

2020-04-12 23:52:20 UTC MAIN commitmail json YAML

make sure that 0 length files get their extattrs cleaned up on deletion
(there was an optimization to not call truncate if size == 0).

(christos)

2020-04-12 22:06:18 UTC MAIN commitmail json YAML

put back the MODULAR attributes accidentally removed.

(christos)

2020-04-12 21:20:16 UTC bouyer-xenpvh commitmail json YAML

no MULTIPROCESSOR so NO_PREEMTION

(bouyer)

2020-04-12 21:19:49 UTC bouyer-xenpvh commitmail json YAML

2020-04-12 20:17:36 UTC MAIN commitmail json YAML

convert to bus_dma(9)

simplify and fix error handling in xbd_handler(), expect backend
to not use the grant once request is finished, and avoid leaking
bounce buffer when the request using it happens to end with error

in xbd_diskstart() only do the RING_PUSH_REQUESTS_AND_CHECK_NOTIFY()
when actually the request was pushed successfully

(jdolecek)

2020-04-12 19:56:14 UTC MAIN commitmail json YAML

Oops missed one more NULL -> NOCRED

(christos)

2020-04-12 19:53:37 UTC bouyer-xenpvh commitmail json YAML

We need to call x86_init_preempt() for all CPUs now.

(bouyer)

2020-04-12 18:14:09 UTC MAIN commitmail json YAML

add KASSERT() for unaligned case to make sure it indeed happens only
for requests via physio

(jdolecek)

2020-04-12 17:57:13 UTC netbsd-9 commitmail json YAML

Fix SMALL builds (requested by roy informally)

(martin)

2020-04-12 17:49:00 UTC MAIN commitmail json YAML

Hack removed in src/external/bsd/nvi/usr.bin/nvi/Makefile,-r1.21

It is no longer needed, per PR bin/54656.

(leot)

2020-04-12 17:34:34 UTC netbsd-9 commitmail json YAML

2020-04-12 17:33:24 UTC netbsd-9 commitmail json YAML

Apply patch, requested by roy in ticket #830:

external/bsd/dhcpcd/dist/src/dhcp6.c (apply patch)
external/bsd/dhcpcd/dist/src/defs.h (apply patch)
doc/3RDPARTY (apply patch)

Update to dhcpcd-8.1.8 which fixes a compile issue.

(martin)

2020-04-12 17:28:57 UTC MAIN commitmail json YAML

Remove no longer needed workaround for PR/54656.

(martin)

2020-04-12 17:25:53 UTC bouyer-xenpvh commitmail json YAML

Get rid of xen-specific ci_x* interrupt handling:
- use the general SIR mechanism, reserving 3 more slots for IPL_VM, IPL_SCHED
  and IPL_HIGH
- remove specific handling from C sources, or change to ipending
- convert IPL number to SIR number in various places
- Remove XUNMASK/XPENDING in assembly or change to IUNMASK/IPENDING
- remove Xen-specific ci_xsources, ci_xmask, ci_xunmask, ci_xpending from
  struct cpu_info
- for now remove a KASSERT that there are no pending interrupts in
  idle_block(). We can get there with some software interrupts pending
  in autoconf XXX needs to be looked at.

(bouyer)

2020-04-12 17:17:38 UTC bouyer-xenpvh commitmail json YAML

Add XEN_IPI_KPREEMPT to list of valid IPIs

(bouyer)

2020-04-12 17:16:58 UTC bouyer-xenpvh commitmail json YAML

kpreempt_disable() only for x86_64 (which calls pmap_changeprot_local)).
On i386 curcpu() is not valid yet and we don't need preemption disabled.

(bouyer)

2020-04-12 17:13:30 UTC MAIN commitmail json YAML

2020-04-12 17:02:52 UTC MAIN commitmail json YAML

fix wapbl_discard() to actually discard the queued bufs properly - need
to set BC_INVAL for them, and also need to explicitly remove them
from the BQ_LOCKED queue

fixes DIAGNOSTIC panic when force unmounting unresponsive disk device
PR kern/51178 by Michael van Elst

(jdolecek)

2020-04-12 16:35:49 UTC bouyer-xenpvh commitmail json YAML

The critical section handling is gone, remove comment about it

(bouyer)

2020-04-12 15:55:53 UTC MAIN commitmail json YAML

delete debugging printf.

(christos)

2020-04-12 15:36:18 UTC MAIN commitmail json YAML

2020-04-12 13:57:07 UTC MAIN commitmail json YAML

move IFNET_UNLOCK() immediatelly after xennet_stop() call in detach,
doesn't need to be held for the disestablish

(jdolecek)

2020-04-12 13:55:06 UTC MAIN commitmail json YAML

fix locking against myself panic in xennet_stop() on 'ifconfig xennet0 down'

xennet_stop() is called with IFNET already held

(jdolecek)

2020-04-12 13:37:12 UTC MAIN commitmail json YAML

2020-04-12 13:30:16 UTC MAIN commitmail json YAML

Change STD[:random-whitespace:]RUMP to STD\tRUMP

(christos)

2020-04-12 13:12:42 UTC MAIN commitmail json YAML

Pass NOCRED instead of NULL for credentials. These routines are supposed
to be accessing system ACL's on behalf of the kernel. This code appears
to be copied from FreeBSD, but there it works because in FreeBSD NOCRED
is 0, ours is -1. I guess nobody has used system extended attributes on
NetBSD yet :-)

(christos)

2020-04-12 12:13:52 UTC MAIN commitmail json YAML

nd6: RTM_MISS reports RTA_AUTHOR once more

Just moves the logic to send RTM_MISS after the ICMP6 report as we
rely on that function to extract the requesting address.

Fixes PR kern/55164.

(roy)

2020-04-12 11:16:59 UTC bouyer-xenpvh commitmail json YAML

Now that we return from hypervisor_callback via Xdoreti, no need to emulate it
in evtchn_do_event() any more.

(bouyer)

2020-04-12 08:51:41 UTC MAIN commitmail json YAML

fix race between wapbl_discard() and wapbl_biodone() on forced
unmount on shutdown with slow I/O device

wapbl_discard() needs to hold both wl_mtx and bufcache_lock while
manipulating wl_entries - the rw lock is not enough, because
wapbl_biodone() only takes wl_mtx while removing the finished entry
from list

wapbl_biodone() must take bufcache_lock before reading we->we_wapbl,
so it's blocked until wapbl_discard() finishes, and takes !wl path
appropriately

this is supposed to fix panic on shutdown:
[ 67549.6304123] forcefully unmounting / (/dev/wd0a)...
...
[ 67549.7272030] panic: mutex_vector_enter,510: uninitialized lock (lock=0xffffa722a4f4f5b0, from=ffffffff80a884fa)
...
[ 67549.7272030] wapbl_biodone() at netbsd:wapbl_biodone+0x4d
[ 67549.7272030] biointr() at netbsd:biointr+0x7d
[ 67549.7272030] softint_dispatch() at netbsd:softint_dispatch+0x12c
[ 67549.7272030] Xsoftintr() at netbsd:Xsoftintr+0x4f

(jdolecek)

2020-04-12 08:50:25 UTC netbsd-9 commitmail json YAML

2020-04-12 08:48:57 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #829):

sys/dev/acpi/acpi_ec.c: revision 1.78
sys/dev/acpi/acpi_ec.c: revision 1.79
sys/dev/acpi/acpi_ec.c: revision 1.80
sys/dev/acpi/acpi_ec.c: revision 1.81

Revert acpi_ec.c 1.77.
We will do this another way.
ok msaitoh

Revert acpi_ec.c 1.76.
We will do this another way, and separate KNF fixes from the critical
functional change.
ok msaitoh

KNF

Reject overly large widths, from mlelstv.
We are returning an ACPI_INTEGER (= uint64_t), so it doesn't make
sense to handle more than 64 bits.

Apparently there are some ACPIs out there that ask for unreasonably
large widths here.  Just reject those requests, rather than writing
past the caller's stack buffer.

Previously we attempted to fix this by copying byte by byte as large
as the caller asked, in order to avoid the undefined behaviour of
shifting past the size of ACPI_INTEGER, but that just turned a shift
(which might have been harmless on real machines) into a stack buffer
overflow (!).

ok msaitoh

(martin)

2020-04-12 08:45:31 UTC netbsd-9 commitmail json YAML

2020-04-12 08:44:43 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by simonb in ticket #828):

share/man/man4/uxrcom.4: revision 1.1
distrib/sets/lists/man/mi: revision 1.1687
share/man/man4/uxrcom.4: revision 1.2
share/man/man4/ucom.4: revision 1.28
sys/dev/usb/uxrcom.c: revision 1.1
sys/dev/usb/umodem.c: revision 1.74
sys/dev/usb/umodem_common.c: revision 1.33
sys/dev/usb/ukyopon.c: revision 1.26
sys/dev/usb/files.usb: revision 1.173
share/man/man4/Makefile: revision 1.704
sys/dev/usb/usbdevs: revision 1.781
sys/dev/usb/usbdevices.config: revision 1.38

Add uxrcom driver for Exar XR21V141x USB serial adapters.  Based in part
on the OpenBSD single-port XR21V1410 uxrcom driver, but adds support
for multi-port chipsets and uses the common umodem framework instead of
being a standalone driver.

Thanks to skrll@ for much USB clue and mrg@ for financing the
development of this driver.

Add NetBSD CVS tag.

(martin)

2020-04-12 08:39:42 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by christos in ticket #827):

sys/external/bsd/ipf/netinet/fil.c: revision 1.32
sys/external/bsd/ipf/netinet/fil.c: revision 1.33
sys/external/bsd/ipf/netinet/ip_frag.c: revision 1.8

PR/55137: Kouichi Hashikawa: ipfstat -f incorrect output
Fix incorrect byte order.

PR/55137: Kouichi Hashikawa: ipfstat -f incorrect output
- make sure frag is initialized to 0
- initialize ipfr_p field

PR/55149: Kouichi Hashikawa: Get morefrag before we strip it out from off

(martin)

2020-04-12 08:35:40 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by rin in ticket #826):

lib/libpthread/arch/powerpc/pthread_md.h: revision 1.9
sys/arch/powerpc/powerpc/sig_machdep.c: revision 1.48

Revert previous:
http://mail-index.netbsd.org/source-changes/2020/02/20/msg114173.html
Comment turned out to be wrong, and KASSERT fires for oea.

XXX
Need to revisit shortly...

(martin)

2020-04-12 08:29:41 UTC netbsd-9 commitmail json YAML

src/doc/3RDPARTY@1.1640.2.13 / diff / nxr@1.1640.2.13
src/external/bsd/dhcpcd/dist/src/arp.c@1.1.1.11.2.3 / diff / nxr@1.1.1.11.2.3
src/external/bsd/dhcpcd/dist/src/arp.h@1.1.1.8.2.2 / diff / nxr@1.1.1.8.2.2
src/external/bsd/dhcpcd/dist/src/bpf.c@1.11.2.3 / diff / nxr@1.11.2.3
src/external/bsd/dhcpcd/dist/src/bpf.h@1.1.1.6.2.2 / diff / nxr@1.1.1.6.2.2
src/external/bsd/dhcpcd/dist/src/common.h@1.1.1.8.2.2 / diff / nxr@1.1.1.8.2.2
src/external/bsd/dhcpcd/dist/src/defs.h@1.1.1.25.2.7 / diff / nxr@1.1.1.25.2.7
src/external/bsd/dhcpcd/dist/src/dhcp.c@1.23.2.7 / diff / nxr@1.23.2.7
src/external/bsd/dhcpcd/dist/src/dhcp6.c@1.11.2.5 / diff / nxr@1.11.2.5
src/external/bsd/dhcpcd/dist/src/dhcp6.h@1.1.1.12.2.1 / diff / nxr@1.1.1.12.2.1
src/external/bsd/dhcpcd/dist/src/dhcpcd.c@1.23.2.6 / diff / nxr@1.23.2.6
src/external/bsd/dhcpcd/dist/src/eloop.h@1.1.1.5.2.2 / diff / nxr@1.1.1.5.2.2
src/external/bsd/dhcpcd/dist/src/if-bsd.c@1.10.2.5 / diff / nxr@1.10.2.5
src/external/bsd/dhcpcd/dist/src/if-options.c@1.16.2.4 / diff / nxr@1.16.2.4
src/external/bsd/dhcpcd/dist/src/if.c@1.1.1.14.2.4 / diff / nxr@1.1.1.14.2.4
src/external/bsd/dhcpcd/dist/src/if.h@1.1.1.10.2.4 / diff / nxr@1.1.1.10.2.4
src/external/bsd/dhcpcd/dist/src/ipv4ll.c@1.1.1.9.2.2 / diff / nxr@1.1.1.9.2.2
src/external/bsd/dhcpcd/dist/src/ipv6.c@1.3.2.6 / diff / nxr@1.3.2.6
src/external/bsd/dhcpcd/dist/src/ipv6nd.c@1.10.2.6 / diff / nxr@1.10.2.6
src/external/bsd/dhcpcd/dist/src/ipv6nd.h@1.1.1.10.2.3 / diff / nxr@1.1.1.10.2.3
      :
(more 2 files)
Apply patch, requested by roy in ticket #825:

external/bsd/dhcpcd/dist/src/arp.c (apply patch)
external/bsd/dhcpcd/dist/src/arp.h (apply patch)
external/bsd/dhcpcd/dist/src/bpf.c (apply patch)
external/bsd/dhcpcd/dist/src/bpf.h (apply patch)
external/bsd/dhcpcd/dist/src/common.h (apply patch)
external/bsd/dhcpcd/dist/src/defs.h (apply patch)
external/bsd/dhcpcd/dist/src/dhcp.c (apply patch)
external/bsd/dhcpcd/dist/src/dhcp6.c (apply patch)
external/bsd/dhcpcd/dist/src/dhcp6.h (apply patch)
external/bsd/dhcpcd/dist/src/dhcpcd.c (apply patch)
external/bsd/dhcpcd/dist/src/eloop.h (apply patch)
external/bsd/dhcpcd/dist/src/if-bsd.c (apply patch)
external/bsd/dhcpcd/dist/src/if-options.c (apply patch)
external/bsd/dhcpcd/dist/src/if.c (apply patch)
external/bsd/dhcpcd/dist/src/if.h (apply patch)
external/bsd/dhcpcd/dist/src/ipv4ll.c (apply patch)
external/bsd/dhcpcd/dist/src/ipv6.c (apply patch)
external/bsd/dhcpcd/dist/src/ipv6nd.c (apply patch)
external/bsd/dhcpcd/dist/src/ipv6nd.h (apply patch)
external/bsd/dhcpcd/dist/src/logerr.c (apply patch)
external/bsd/dhcpcd/dist/src/logerr.h (apply patch)
doc/3RDPARTY (apply patch)

Update to dhcpcd-8.1.7 which fixes the following issues:
* Decode interface complex interface names eth0.100:2 eth0i100:2.
  This allows us to ignore some virtual interfaces by default
* ARP: Report L2 header address on conflict for more clarity
* DHCP: Support jumbo frames (untested)
* DHCP6: Clean up old lease on failure to confirm/rebind, etc
* RA: Prefer older routers - fixes PR bin/54997
* INET6: Obscure prefixes are now calculated correctly
* macro logerr commands to allow an alternative logger

(martin)

2020-04-12 07:49:58 UTC MAIN commitmail json YAML

Add support for Pointer Authentication (PAC).

We use the "pac-ret" option, to sign the return instruction pointer on
function entry, and authenticate it on function exit. This acts as a
mitigation against ROP.

The authentication uses a per-lwp (secret) I-A key stored in the 128bit
APIAKey register and part of the lwp context. During lwp creation, the
kernel generates a random key, and during context switches, it installs
the key of the target lwp on the CPU.

Userland cannot read the APIAKey register directly. However, it can sign
its pointers with it, because the register is architecturally shared
between userland and the kernel. Although part of the CPU design, it is
a bit of an undesired behavior, because it allows to forge valid kernel
pointers from userland. To avoid that, we don't share the key with
userland, and rather switch it in EL0<->EL1 transitions. This means that
when userland executes, a different key is loaded in APIAKey than the one
the kernel uses. For now the userland key is a fixed 128bit zero value.

The DDB stack unwinder is changed to strip the authentication code from
the pointers in lr.

Two problems are known:

* Currently the idlelwps' keys are not really secret. This is because
  the RNG is not yet available when we spawn these lwps. Not overly
  important, but would be nice to fix with UEFI RNG.
* The key switching in EL0<->EL1 transitions is not the most optimized
  code on the planet. Instead of checking aarch64_pac_enabled, it would
  be better to hot-patch the code at boot time, but there currently is
  no hot-patch support on aarch64.

Tested on Qemu.

(maxv)

2020-04-12 07:41:11 UTC MAIN commitmail json YAML

further tweaks for USB_PRODUCT_MICROSOFT_24GHZ_XCVR80 from PR kern/55161

remove case for USB_PRODUCT_MICROSOFT_24GHZ_XCVR70, likely needs similar
tweaks and can't really be added untested

(jdolecek)

2020-04-12 07:16:09 UTC MAIN commitmail json YAML

Don't inline cprng_strong{32,64}(), so they can be called from asm.

(maxv)

2020-04-12 06:05:34 UTC MAIN commitmail json YAML

base INSTALL kernel upon GENERIC with many "no ...".

(mrg)

2020-04-12 02:04:13 UTC MAIN commitmail json YAML

Add NetBSD CVS tag.

(simonb)

2020-04-12 01:39:57 UTC MAIN commitmail json YAML

Remove ufs_wapbl.c from Makefile.

(htodd)

2020-04-12 01:12:03 UTC MAIN commitmail json YAML

Reject overly large widths, from mlelstv.

We are returning an ACPI_INTEGER (= uint64_t), so it doesn't make
sense to handle more than 64 bits.

Apparently there are some ACPIs out there that ask for unreasonably
large widths here.  Just reject those requests, rather than writing
past the caller's stack buffer.

Previously we attempted to fix this by copying byte by byte as large
as the caller asked, in order to avoid the undefined behaviour of
shifting past the size of ACPI_INTEGER, but that just turned a shift
(which might have been harmless on real machines) into a stack buffer
overflow (!).

ok msaitoh

(riastradh)

2020-04-12 01:11:56 UTC MAIN commitmail json YAML

2020-04-12 01:11:52 UTC MAIN commitmail json YAML

2020-04-12 01:11:43 UTC MAIN commitmail json YAML

Revert acpi_ec.c 1.76.

We will do this another way, and separate KNF fixes from the critical
functional change.

ok msaitoh

(riastradh)

2020-04-12 01:11:23 UTC MAIN commitmail json YAML

Revert acpi_ec.c 1.77.

We will do this another way.

ok msaitoh

(riastradh)

2020-04-12 01:10:54 UTC MAIN commitmail json YAML

Add uxrcom driver for Exar XR21V141x USB serial adapters.  Based in part
on the OpenBSD single-port XR21V1410 uxrcom driver, but adds support
for multi-port chipsets and uses the common umodem framework instead of
being a standalone driver.

Thanks to skrll@ for much USB clue and mrg@ for financing the
development of this driver.

(simonb)

2020-04-12 00:04:45 UTC MAIN commitmail json YAML

2020-04-11 22:41:06 UTC MAIN commitmail json YAML

2020-04-11 21:21:49 UTC bouyer-xenpvh commitmail json YAML

Attach hypervisor earlier, so that ISA/PCI emulated device are disabled
before we probe them.

(bouyer)

2020-04-11 21:21:16 UTC bouyer-xenpvh commitmail json YAML

Use some PIO magic to disable qemu emulated disks and network device
when PVHVM is configured. From FreeBSD.

(bouyer)

2020-04-11 20:48:53 UTC MAIN commitmail json YAML

2020-04-11 20:28:28 UTC MAIN commitmail json YAML

Via enh at google dot com in tech-userlevel. Fix handling of
EXT_FRAC{H,L}BITS (although we don't need to since we don't have them).

(christos)

2020-04-11 18:26:08 UTC bouyer-xenpvh commitmail json YAML

Move softint and preemtion-related functions out of x86/x86/intr.c to
  its own file, x86/x86/x86_softintr.c
Add x86/x86/x86_softintr.c for native and XenPV
Make sure XenPV also check ci_ioending, which is used for softints.
Switch XenPV to fast softints and allow kernel preemption.
kpreempt_disable() before calling pmap_changeprot_local()
run  xen_wallclock_time() and xen_global_systime_ns() at splshed() to
  avoid being interrupted.

XXX amd64 lock stubs are racy for XPENDING

(bouyer)

2020-04-11 17:52:01 UTC MAIN commitmail json YAML

revert previous - physio arranges for tranfer directly to user-provided
buffers, which are generally not DEV_BSIZE-aligned

(jdolecek)

2020-04-11 17:43:54 UTC MAIN commitmail json YAML

2020-04-11 17:21:16 UTC MAIN commitmail json YAML

adjust to work with updated dkwedge_bsdlabel.c - provide geteblk() and
brelse() which just allocate/free the memory

(jdolecek)

2020-04-11 16:55:33 UTC MAIN commitmail json YAML

Double the timeout for the bn test case; 360 seconds is no longer
sufficient under qemu since the latest openssl update.

(gson)

2020-04-11 16:15:34 UTC MAIN commitmail json YAML

now that getebuf() et.al. always returns DEV_BSIZE-aligned buffers
and rest of kernel code doing disk I/O was also converted over to it,
it's finally safe to remove the code to handle misaligned buffers

leave just KASSERT() in place

(jdolecek)

2020-04-11 16:02:41 UTC MAIN commitmail json YAML

print 'backend features' instead of just 'features' for the detected backend
features, so that it's clear it's just capability rather than something
actually used by the frontend driver

(jdolecek)

2020-04-11 16:00:34 UTC MAIN commitmail json YAML

allocate buffer for disk I/O via geteblk() instead of malloc(), so they
are properly aligned; e.g. readdisklabel() does the same

also removed the DKW_MALLOC()/DKW_FREE()/DKW_REALLOC() macros as apparently
unnecessary, these files don't seem to be compiled into any userland tools

dkwedge_gpt.c confirmed working, others compile-tested only

(jdolecek)

2020-04-11 14:48:19 UTC MAIN commitmail json YAML

for bmempools set align, not ioff

(jdolecek)

2020-04-11 14:38:26 UTC MAIN commitmail json YAML

explicitly use DEV_BSIZE align for all bmempools

this is required for Xen xbd(4) in order to not have to use bounce buffers

the alignment is implicitly provided when POOL_REDZONE is not active,
this change makes it also aligned when POOL_REDZONE _is_ active - that is
when (!KMSAN && (DIAGNOSTIC || KASAN))

(jdolecek)

2020-04-11 12:01:42 UTC bouyer-xenpvh commitmail json YAML

calling stipending() is only needed in the PV case; in PVHVM
hypervisor_callback() will be called again as soon as we enable interrupts.

Use the PVHVM XENINTRSTUB for PV too; asjust Xdoreti as needed.
merge hypervisor_callback with hypervisor_pvhvm_callback. The reetrancy should
not be an issue, as we're already re-enabling events in
do_hupervisor_callback (that it, outside of the critical section).
We now can call Xdoreti in both cases.

(bouyer)

2020-04-11 11:56:51 UTC bouyer-xenpvh commitmail json YAML

Merge back hypervisor_callback and hypervisor_pvhvm_callback, there's no
issues calling Xdoreti in the PV case.

(bouyer)

2020-04-11 11:48:21 UTC MAIN commitmail json YAML

convert to bus_dma(9), no explicit xpmap_*() calls any more

as part of this move some global arrays into struct xnetback_instance,
and fix race for xnetif_lookup()

(jdolecek)

2020-04-11 11:01:12 UTC MAIN commitmail json YAML

put xenbus dmat into xenbus_device so it's available also for backend
devices which don't use autoconfig, remove from attach args

(jdolecek)

2020-04-11 10:47:06 UTC is-mlppp commitmail json YAML

trying to ind the right place for MLPPP renegotiation.

(is)

2020-04-11 10:11:31 UTC bouyer-xenpvh commitmail json YAML

2020-04-11 10:06:22 UTC is-mlppp commitmail json YAML

2020-04-11 09:40:02 UTC is-mlppp commitmail json YAML

MLPPP mrru negotiation.

(is)

2020-04-11 09:15:23 UTC MAIN commitmail json YAML

Revert previous:
http://mail-index.netbsd.org/source-changes/2020/02/20/msg114173.html

Comment turned out to be wrong, and KASSERT fires for oea.

XXX
Need to revisit shortly...

(rin)

2020-04-11 09:02:04 UTC MAIN commitmail json YAML

The vectors allow for up to 0x80 bytes of instructions, but we've reached
this limit already, so implement the handler functions outside, and jump
to them. This allows to add instructions in the future.

Sent to ryo@ and skrll@.

(maxv)

2020-04-11 08:11:58 UTC is-mlppp commitmail json YAML

2020-04-11 08:06:16 UTC bouyer-xenpvh commitmail json YAML

Remove spaces in machdep.hypervisor, suggested by mlelstv@

(bouyer)

2020-04-11 07:38:00 UTC is-mlppp commitmail json YAML

2020-04-11 07:28:06 UTC is-mlppp commitmail json YAML

compat code to make transplanting this to netbsd-8 easier

(is)

2020-04-11 06:57:32 UTC MAIN commitmail json YAML

enable the workaround for Microsoft transceiver v8.0 too - PR kern/55161

while here enable also for v7.0, it's likely to have same problem

(jdolecek)

2020-04-11 06:55:48 UTC MAIN commitmail json YAML

2020-04-11 06:54:59 UTC MAIN commitmail json YAML

add Microsoft 2.4GHz Transceiver V8.0 - PR kern/55161

add also V7.0, found the ID

(jdolecek)

2020-04-11 05:12:52 UTC MAIN commitmail json YAML

Fixed to not use the "br" instruction. Branch Target Identification (BTI) doesn't like "br".

requested by maxv@

(ryo)

2020-04-11 01:51:14 UTC MAIN commitmail json YAML

2020-04-11 01:46:47 UTC MAIN commitmail json YAML

Match the naming convention in the file.

(ad)

2020-04-11 01:42:56 UTC MAIN commitmail json YAML

don't try to read a 32bit property into a uint8_t.
Now headphone detection works properly on machines which have the gpio's
polarity reversed, like Quicksilver and TiBook.

(macallan)

2020-04-10 23:58:48 UTC MAIN commitmail json YAML

NetBSD 9.99.56 - struct buf changed

(ad)

2020-04-10 23:43:05 UTC MAIN commitmail json YAML

PR kern/54979 (radixtree might misbehave if ENOMEM)

- radix_tree_insert_node(): if the insert failed due to ENOMEM, roll back
  any updates made to the tree.

- radix_tree_grow(): either succeed or fail, never make partial adjustments
  to the tree.

- radix_tree_await_memory(): allocate & free the maximum possible number of
  nodes required by any insertion.

(ad)

2020-04-10 22:58:47 UTC MAIN commitmail json YAML

New extended attributes test (does not work until we commit kernel changes)

(christos)

2020-04-10 22:34:36 UTC MAIN commitmail json YAML

vfs_mountroot(): don't needlessly grab a second reference to the root vnode
(the kernel never chdirs) nor a lock on it.

(ad)

2020-04-10 21:56:41 UTC MAIN commitmail json YAML

Rename radix_tree_node_clean_p() to radix_tree_node_sum() and have it return
the computed sum.  Use to replace any_children_tagmask().  Simpler & faster.

(ad)

2020-04-10 21:33:27 UTC MAIN commitmail json YAML

audioplay.1: generalize a reference to web browsers

(gutteridge)

2020-04-10 21:03:21 UTC MAIN commitmail json YAML

gnttab_get_status_frames frame_list is array if uint64_t values, not u_long
like gnttab_setup_table, fix to use uint64_t

fixes compilation on i386 with XEN3PAE_DOM[0U], pointed out by kre@

(jdolecek)

2020-04-10 20:56:56 UTC MAIN commitmail json YAML

remove commented out __XEN_INTERFACE_VERSION__ option, it comes via std.xen

(jdolecek)

2020-04-10 19:45:24 UTC is-mlppp commitmail json YAML

2020-04-10 19:08:10 UTC MAIN commitmail json YAML

use ETHER_ADDR_LEN on one more place

(jdolecek)

2020-04-10 18:32:12 UTC MAIN commitmail json YAML

2020-04-10 18:32:00 UTC MAIN commitmail json YAML

Fix all the random __SHIFTOUT casts by introducing an intermediate macho,
and then deleting and fixing the rest.

(christos)

2020-04-10 18:23:22 UTC MAIN commitmail json YAML

2020-04-10 18:17:57 UTC MAIN commitmail json YAML

Update a link to "CLOCK-Pro" paper.

(tsutsui)

2020-04-10 18:03:06 UTC MAIN commitmail json YAML

convert to bus_dma(9), remove now not necessary XENPVHVM redefines

(jdolecek)

2020-04-10 17:28:37 UTC is-mlppp commitmail json YAML

first part of defragmentation code. No dropping/sequence error statistics
yet, and no MRRU negotiation so not active.

(is)

2020-04-10 17:26:47 UTC MAIN commitmail json YAML

uvmspace_exec(): set VM_MAP_DYING for the duration, so pmap_update() is not
called until the pmap has been totally cleared out after pmap_remove_all(),
or it can confuse some pmap implementations.

(ad)

2020-04-10 17:18:04 UTC MAIN commitmail json YAML

Remove buffer reference counting, now that it's safe to destroy b_busy after
waking any waiters.

(ad)

2020-04-10 17:16:22 UTC MAIN commitmail json YAML

- Make this needed sequence always work for condvars, by not touching the CV
  again after wakeup.  Previously it could panic because cv_signal() could
  be called by cv_wait_sig() + others:

cv_broadcast(cv);
cv_destroy(cv);

- In support of the above, if an LWP doing a timed wait is awoken by
  cv_broadcast() or cv_signal(), don't return an error if the timer
  fires after the fact, i.e. either succeed or fail, not both.

- Remove LOCKDEBUG code for CVs which never worked properly and is of
  questionable use.

(ad)

2020-04-10 17:02:33 UTC MAIN commitmail json YAML

Drop the entry for Yasushi Yamasaki, per recent ad clause removal.

(tsutsui)

2020-04-10 16:55:40 UTC MAIN commitmail json YAML

Cosmetic changes

(ad)

2020-04-10 16:49:37 UTC MAIN commitmail json YAML

xsrc/external/mit/xorg-server.old/dist/hw/netbsd/x68k/x68k.h@1.2 / diff / nxr@1.2
xsrc/external/mit/xorg-server.old/dist/hw/netbsd/x68k/x68kConfig.c@1.2 / diff / nxr@1.2
xsrc/external/mit/xorg-server.old/dist/hw/netbsd/x68k/x68kFb.c@1.2 / diff / nxr@1.2
xsrc/external/mit/xorg-server.old/dist/hw/netbsd/x68k/x68kGraph.c@1.2 / diff / nxr@1.2
xsrc/external/mit/xorg-server.old/dist/hw/netbsd/x68k/x68kInit.c@1.2 / diff / nxr@1.2
xsrc/external/mit/xorg-server.old/dist/hw/netbsd/x68k/x68kIo.c@1.2 / diff / nxr@1.2
xsrc/external/mit/xorg-server.old/dist/hw/netbsd/x68k/x68kKbd.c@1.2 / diff / nxr@1.2
xsrc/external/mit/xorg-server.old/dist/hw/netbsd/x68k/x68kKeyMap.c@1.2 / diff / nxr@1.2
xsrc/external/mit/xorg-server.old/dist/hw/netbsd/x68k/x68kMouse.c@1.2 / diff / nxr@1.2
xsrc/external/mit/xorg-server.old/dist/hw/netbsd/x68k/x68kReg.h@1.2 / diff / nxr@1.2
xsrc/external/mit/xorg-server.old/dist/hw/netbsd/x68k/x68kText.c@1.2 / diff / nxr@1.2
xsrc/external/mit/xorg-server/dist/hw/netbsd/x68k/x68k.h@1.4 / diff / nxr@1.4
xsrc/external/mit/xorg-server/dist/hw/netbsd/x68k/x68kConfig.c@1.4 / diff / nxr@1.4
xsrc/external/mit/xorg-server/dist/hw/netbsd/x68k/x68kFb.c@1.3 / diff / nxr@1.3
xsrc/external/mit/xorg-server/dist/hw/netbsd/x68k/x68kGraph.c@1.5 / diff / nxr@1.5
xsrc/external/mit/xorg-server/dist/hw/netbsd/x68k/x68kInit.c@1.4 / diff / nxr@1.4
xsrc/external/mit/xorg-server/dist/hw/netbsd/x68k/x68kIo.c@1.2 / diff / nxr@1.2
xsrc/external/mit/xorg-server/dist/hw/netbsd/x68k/x68kKbd.c@1.4 / diff / nxr@1.4
xsrc/external/mit/xorg-server/dist/hw/netbsd/x68k/x68kKeyMap.c@1.2 / diff / nxr@1.2
xsrc/external/mit/xorg-server/dist/hw/netbsd/x68k/x68kMouse.c@1.4 / diff / nxr@1.4
      :
(more 2 files)
Remove clause 3 and 4 from X68k server files written by Yasushi Yamasaki.

I've finally contacted with Yamasaki-san and he kindly answered
"no objection to change them to 2 clause license" in private mail.
Diffs to be committed have also been confirmed by him.
We appreciate all his contribution to early NetBSD/x68k.

(tsutsui)

2020-04-10 14:54:34 UTC MAIN commitmail json YAML

add and pass dma tag to PV drivers attached to xenbus, so thay can
use bus_dmamap_load_mbuf() et.al.

due to XENPV override, _BUS_BUS_TO_PHYS() dmamap segment ds_addr
gets filled with ma, so value can be directly used for e.g. grant calls

(jdolecek)

2020-04-10 14:42:00 UTC bouyer-xenpvh commitmail json YAML

spllower(): Also check Xen pending events
hypervisor_pvhvm_callback(): exit via Xdoreti, so that pending interrupts
are checked.
disable __HAVE_FAST_SOFTINTS only for XENPV, it now works for PVHVM.
We still have to disable PREEMPTION, until we support MULTIPROCESSOR

(bouyer)

2020-04-10 14:38:19 UTC bouyer-xenpvh commitmail json YAML

2020-04-10 14:37:54 UTC bouyer-xenpvh commitmail json YAML

Skip cx8_spllower patch if we're running on any form of Xen PV,
we can't handle PV interrupts with a single atomic op here.
Enable x86_patch() for Xen too.

(bouyer)

2020-04-10 14:35:26 UTC MAIN commitmail json YAML

2020-04-10 14:34:28 UTC MAIN commitmail json YAML

Skip cx8_spllower patch if we're running on any form of Xen PV,
we can't handle PV interrupts with a single atomic op here.
Enable x86_patch() for Xen too.

(bouyer)

2020-04-10 14:32:50 UTC MAIN commitmail json YAML

trim extraneous return statement

(plunky)

2020-04-10 12:38:40 UTC MAIN commitmail json YAML

g/c unused xenwatch_mutex extern, and streq()

(jdolecek)

2020-04-10 11:41:04 UTC MAIN commitmail json YAML

update comment for DIOCGCACHE (no DKCACHE_READ)

(jdolecek)

2020-04-10 10:53:02 UTC MAIN commitmail json YAML

add support for DIOCGSTRATEGY and DIOCGCACHE

only allow DIOCCACHESYNC if open for writing, same as everything supporting
DIOCCACHESYNC

(jdolecek)

2020-04-10 10:32:19 UTC MAIN commitmail json YAML

allow DIOCSSTRATEGY, there is no particular reason why it should be
restricted for xbd(4)

(jdolecek)

2020-04-10 10:30:10 UTC MAIN commitmail json YAML

implement DIOCGCACHE - assume if CACHE_FLUSH is supported, write cache
is enabled

convert the sc_cache_flush flag to a feature bit field, and recognize
also barrier and persistent features; print the recognized features
on boot, and remove the warning on DIOCCACHESYNC

(jdolecek)

2020-04-10 08:35:52 UTC MAIN commitmail json YAML

add KASSERT() for owned grant_lock in xengnt_get_entry()

(jdolecek)

2020-04-09 21:01:33 UTC bouyer-xenpvh commitmail json YAML

Fix a second place where %eax is used with the wrong value.

(bouyer)

2020-04-09 19:26:38 UTC MAIN commitmail json YAML

update to __XEN_INTERFACE_VERSION__ 0x0003020a aka Xen 3.2.10

this brings grant memory v2 support:
- status separated from flags - revoking access needs just memory barrier,
  no need for expensive cmpxchg16 any more
- sub-page hypervisor copy-only grants, to be used by xennet(4)
- 64-bit frame, i.e. support for DomU RAM >16TB

the grant table is now always allocated on boot to maximum size, it's now
never grown in runtime; switch back to regular kmem_alloc()/kmem_free()

code now requires v2 support, no compatibility for grant version 1 retained -
Xen v2 support predates all currently supported Xen versions

also interface for baloon changed slightly, code updated

(jdolecek)

2020-04-09 18:20:40 UTC MAIN commitmail json YAML

PR/55149: Kouichi Hashikawa: Get morefrag before we strip it out from off

(christos)

2020-04-09 16:51:00 UTC bouyer-xenpvh commitmail json YAML

restore %eax before using it. This bug caused event handlers to be called
spuriously at high spl or in a reentrant manner.
Now a amd64 PVHVM domU can checkout pkgsrc and build packages without panic.

(bouyer)

2020-04-09 16:12:50 UTC bouyer-xenpvh commitmail json YAML

For RB_POWERDONW, call HYPERVISOR_shutdown() in all cases where the
hypercall page is available. A PVHHVM domU now properly exits on
halt -p

(bouyer)

2020-04-09 16:12:28 UTC MAIN commitmail json YAML

Fix aarch64 binutils tools build

(skrll)

2020-04-09 15:54:41 UTC MAIN commitmail json YAML

xengnt_more_entries() can be called from interrupt context so use
kmem_intr_alloc()/free() here

(bouyer)

2020-04-09 15:24:31 UTC MAIN commitmail json YAML

Fix dhcpcd $DEST_DIR support

(roy)

2020-04-09 14:44:38 UTC MAIN commitmail json YAML

Refresh the superblock in memory if changing a mounted partition.

(christos)

2020-04-09 14:39:10 UTC MAIN commitmail json YAML

move xen/conf/std.xen to i386/conf/std.xen, it's i386-specific

split off __XEN_INTERFACE_VERSION__ to new xen/conf/std.xenversion
and use from both i386/conf/std.xen and amd64/conf/stf.xen, so that
there is single place for the definition

(jdolecek)

2020-04-09 11:29:33 UTC netbsd-9 commitmail json YAML

2020-04-09 11:28:32 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #824):

usr.bin/man/man.c: revision 1.68

Exit successfully after printing the search path, stop further processing.

Continuing to process had the unintended effect that `man` failed to find
a matching manual page for {EMPTY LIST OF REQUESTED MANUAL PAGES}, and
exited with 1.

Prompted by a fish shell snippet that tried and failed to distinguish between
FreeBSD man (-p takes argument) and NetBSD man (-p no argument) by comparing
`man -p` exit code.

ok riastradh, logix (which also pointed out the manual page SYNOPSIS is
saying man -p should be used this way).

(martin)

2020-04-09 11:10:07 UTC MAIN commitmail json YAML

2020-04-09 10:57:02 UTC MAIN commitmail json YAML

remove check for matching ethernet address on Tx - the higher levels do this
check anyway, and the check did not handle VLANs

(jdolecek)

2020-04-09 10:46:19 UTC MAIN commitmail json YAML

Stop walking MADT / GTDT subtables if we hit a header with length 0

(jmcneill)

2020-04-09 08:55:45 UTC MAIN commitmail json YAML

Make a comment less MIPS specific

(skrll)

2020-04-09 06:55:51 UTC MAIN commitmail json YAML

adjust the condition for reusing checksum context, wm_tx_offload() can
be used even for multiqueue case

enable only when the chip supports exactly one queue (same as FreeBSD) -
anything multiqueue-capable later than 82574 should work, but I don't
have the hw to test

(jdolecek)

2020-04-09 06:49:37 UTC MAIN commitmail json YAML

Wrap a REALLY long line

(skrll)

2020-04-09 06:47:50 UTC MAIN commitmail json YAML

2020-04-09 02:07:01 UTC MAIN commitmail json YAML

flip the comparison again

(christos)

2020-04-09 01:55:58 UTC MAIN commitmail json YAML

use __arraycount, and fix comparison

(christos)

2020-04-09 01:49:26 UTC MAIN commitmail json YAML

Add EX2 for Vortex86 SoCs (Andrius V)

(christos)

2020-04-08 23:01:52 UTC MAIN commitmail json YAML

add a warning in checksum offload that hardware TCP segmentation might be
slow

on I219 I observe about 35% transmit performance drop when tso4 enabled

(jdolecek)

2020-04-08 21:57:24 UTC MAIN commitmail json YAML

wm_tx_offload() and wm_nq_tx_offload() actually always return 0, make them
return void and remove the check for their return value

(jdolecek)

2020-04-08 21:56:02 UTC MAIN commitmail json YAML

fixup field names in previous

(jdolecek)

2020-04-08 21:51:43 UTC MAIN commitmail json YAML

actually writing always the checksum offload context descriptor
makes the hw do extra processing, avoid doing that if possible -
on my computer with I219 this results in about 2% speedup in Tx performance

change adoped from FreeBSD

XXX should be also done for multiqueue case, but I don't have hw to test it

(jdolecek)