Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (4h)  netbsd-8 (5d)  netbsd-10 (5d)  netbsd-9 (11d)  thorpej-ifq (175d)  thorpej-altq-separation (178d) 

2024-05-10 03:03:50 UTC Now

2023-07-25 16:56:35 UTC MAIN commitmail json YAML

lint: allow 'thread_local' to be combined with 'static'

(rillig)

2023-07-25 16:15:50 UTC MAIN commitmail json YAML

Propoerly handle 4k sector size backends:
- report the backend's sector size to upper layers, not DEV_BSIZE.
  Adjust the number of sectors accordingly.
- Use sc_secsize instead of XEN_BSIZE where appropriate. The sectors numbers
  in I/O requests are still in XEN_BSIZE units, but must be a multiple
  of sc_secsize/XEN_BSIZE.
- As a consequence of previous, the buffer has to be aligned to sc_secsize,
  aligned to XEN_BSIZE may not be enough. This means that we may have to
  xbd_map_align() more buffer, including some without B_PHYS set.
- Add some more DPRINTF lines, related to I/O requests

Tested with a linux dom0.
thanks to Christian Kujau for providing access to his hardware for testing
and debugging.

(bouyer)

2023-07-25 15:39:36 UTC netbsd-9 commitmail json YAML

2023-07-25 15:35:35 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #1666):

sys/dev/nvmm/x86/nvmm_x86_svm.c: revision 1.85

nvmm: Filter CR4 bits on x86 SVM (AMD).

In particular, prohibit PKE, Protection Key Enable, which requires
some additional management of CPU state by nvmm.

(martin)

2023-07-25 15:32:14 UTC netbsd-10 commitmail json YAML

2023-07-25 15:30:27 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #246):

sys/dev/nvmm/x86/nvmm_x86_svm.c: revision 1.85

nvmm: Filter CR4 bits on x86 SVM (AMD).

In particular, prohibit PKE, Protection Key Enable, which requires
some additional management of CPU state by nvmm.

(martin)

2023-07-25 11:42:57 UTC netbsd-10 commitmail json YAML

2023-07-25 11:41:42 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #244):

sys/arch/x86/x86/fpu.c: revision 1.80
sys/arch/x86/include/cpu_extended_state.h: revision 1.18

x86: Mitigate MXCSR Configuration Dependent Timing in kernel FPU use.

In fpu_kern_enter, make sure all the MXCSR exception status bits are
set when we start using the FPU, so that instructions which exhibit
MCDT are unaffected by it.

While here, zero all the other FPU registers in fpu_kern_enter.
In principle we could skip this step on future CPUs that fix the MCDT
bug, but there's probably not much benefit -- workloads that do a lot
of crypto in the kernel are probably better off using
kthread_fpu_enter or WQ_FPU to skip the fpu_kern_enter/leave cycles
in the first place.

For details, see:
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/best-practices/mxcsr-configuration-dependent-timing.html

(martin)

2023-07-25 11:35:26 UTC netbsd-9 commitmail json YAML

2023-07-25 11:34:37 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #1665):

sys/arch/x86/x86/fpu.c: revision 1.86

x86/fpu: Align savefpu to 64 bytes in fpuinit_mxcsr_mask.
16 bytes is not enough.

(Is this why it never worked on Xen some years back?  Got lucky and
accidentally had 64-byte alignment on native x86, but not in the call
stack in Xen?)

(martin)

2023-07-25 11:30:43 UTC netbsd-10 commitmail json YAML

2023-07-25 11:29:23 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #245):

sys/arch/x86/x86/fpu.c: revision 1.86

x86/fpu: Align savefpu to 64 bytes in fpuinit_mxcsr_mask.
16 bytes is not enough.

(Is this why it never worked on Xen some years back?  Got lucky and
accidentally had 64-byte alignment on native x86, but not in the call
stack in Xen?)

(martin)

2023-07-25 09:16:23 UTC netbsd-8 commitmail json YAML

2023-07-25 09:15:28 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #1851):

sys/arch/x86/include/specialreg.h: revision 1.207
sys/arch/x86/x86/errata.c: revision 1.31

x86: turn off zenbleed chicken bit on Zen2 cpus.

this is based upon Taylor's original work.  i just made the list
of CPUs to run on correct as i could determine.  (also, add some
Zen3 and Zen4 cpuids not yet used by any errata.)

(might be nice to have a better way to expression revision ranges
rather than specific cpuid matches, eg, 0x30-0x4f models in a cpu
family, etc.)

tested on ryzen 3600, and a ported zenbleed PoC that no longer
shows any obtained text.  (a similar module-version of it stopped
the PoC on a ryzen 3950x without having to reboot.)

https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html
https://lock.cmpxchg8b.com/zenbleed.html

(martin)

2023-07-25 09:14:06 UTC netbsd-9 commitmail json YAML

2023-07-25 09:12:36 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #1664):

sys/arch/x86/include/specialreg.h: revision 1.207
sys/arch/x86/x86/errata.c: revision 1.31

x86: turn off zenbleed chicken bit on Zen2 cpus.

this is based upon Taylor's original work.  i just made the list
of CPUs to run on correct as i could determine.  (also, add some
Zen3 and Zen4 cpuids not yet used by any errata.)

(might be nice to have a better way to expression revision ranges
rather than specific cpuid matches, eg, 0x30-0x4f models in a cpu
family, etc.)

tested on ryzen 3600, and a ported zenbleed PoC that no longer
shows any obtained text.  (a similar module-version of it stopped
the PoC on a ryzen 3950x without having to reboot.)

https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html
https://lock.cmpxchg8b.com/zenbleed.html

(martin)

2023-07-25 09:11:51 UTC netbsd-10 commitmail json YAML

2023-07-25 09:10:32 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #243):

sys/arch/x86/include/specialreg.h: revision 1.207
sys/arch/x86/x86/errata.c: revision 1.31

x86: turn off zenbleed chicken bit on Zen2 cpus.

this is based upon Taylor's original work.  i just made the list
of CPUs to run on correct as i could determine.  (also, add some
Zen3 and Zen4 cpuids not yet used by any errata.)

(might be nice to have a better way to expression revision ranges
rather than specific cpuid matches, eg, 0x30-0x4f models in a cpu
family, etc.)

tested on ryzen 3600, and a ported zenbleed PoC that no longer
shows any obtained text.  (a similar module-version of it stopped
the PoC on a ryzen 3950x without having to reboot.)

https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html
https://lock.cmpxchg8b.com/zenbleed.html

(martin)

2023-07-25 02:42:48 UTC MAIN commitmail json YAML

Add dkctl(8) and gpt(8) to the evbmips ramdisk

The installer provided by octeon.img creates GPT wedges, which may
later need to be recovered via the standard sysinst installer provided
by netbsd-INSTALL_OCTEON.

(gutteridge)

2023-07-25 02:38:31 UTC MAIN commitmail json YAML

Add dk[0-3] to the device nodes provided in the evbmips ramdisk

The installer provided by octeon.img creates wedges, which may later
need to be recovered via the standard sysinst installer provided by
netbsd-INSTALL_OCTEON.

(gutteridge)

2023-07-25 01:09:05 UTC MAIN commitmail json YAML

x86: turn off zenbleed chicken bit on Zen2 cpus.

this is based upon Taylor's original work.  i just made the list
of CPUs to run on correct as i could determine.  (also, add some
Zen3 and Zen4 cpuids not yet used by any errata.)

(might be nice to have a better way to expression revision ranges
rather than specific cpuid matches, eg, 0x30-0x4f models in a cpu
family, etc.)

tested on ryzen 3600, and a ported zenbleed PoC that no longer
shows any obtained text.  (a similar module-version of it stopped
the PoC on a ryzen 3950x without having to reboot.)

https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html
https://lock.cmpxchg8b.com/zenbleed.html

(mrg)

2023-07-24 23:42:00 UTC MAIN commitmail json YAML

x86/errata.c: Only say the errata revision search for cpu0.

(riastradh)

2023-07-24 22:21:09 UTC MAIN commitmail json YAML

x86/errata.c: Say what revision we're searching for.

(riastradh)

2023-07-24 22:20:53 UTC MAIN commitmail json YAML

x86/errata.c: Link to original AMD errata guide.

This one is no longer updated; need to link to newer ones for
individual families too.  That's where all the cryptic nomenclature
comes from here.

(riastradh)

2023-07-24 17:17:00 UTC netbsd-10 commitmail json YAML

2023-07-24 17:16:00 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #242):

lib/libc/time/localtime.c: revision 1.137
lib/libc/time/zdump.c: revision 1.61
lib/libc/time/NEWS: revision 1.41
lib/libc/time/zic.c: revision 1.88
lib/libc/time/zic.c: revision 1.89
lib/libc/time/private.h: revision 1.65

Apply 9cfe9507fcc22cd4a0c4da486ea1c7f0de6b075f for C23 attribute compliance.
Requested by Jan-Benedict Glaw.

put attributes first for c23 compliance.

(martin)

2023-07-24 17:12:49 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by nat in ticket #240):

usr.sbin/bta2dpd/bta2dpd/sbc_encode.c: revision 1.12
usr.sbin/bta2dpd/bta2dpd/sbc_encode.c: revision 1.13

Add thottling when playing from file.
This avoids rapid playback when playing from file with affected devices.

Playback using pad(4) is still preferred ad gives a better result.

Playback from pad(4) is unaffected by this change.

Reorder for readability.
No functional change intended.

(martin)

2023-07-24 17:08:01 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by nat in ticket #241):

usr.sbin/bta2dpd/bta2dpd/bta2dpd.8: revision 1.7
usr.sbin/bta2dpd/bta2dpd/bta2dpd.8: revision 1.8
usr.sbin/bta2dpd/bta2dpd/bta2dpd.8: revision 1.9
usr.sbin/bta2dpd/bta2dpd/bta2dpd.8: revision 1.10

Manual page fixups.

Fix EXAMPLES section.

Use correct flags when used with pad(4).
Use correct encoding format (sinear_le).

Bump date for previous commit.

Add BUGS section to manual page.
This notes the problems with playback from file on certain devices.

Fix formatting.

(martin)

2023-07-24 08:30:42 UTC MAIN commitmail json YAML

MI and x86 efiboot: Fix device path type for PXE boot device.

It should be Messaging, not Media Device Path. Taken from OpenBSD, for
which this code was originally written:

https://cvsweb.openbsd.org/src/sys/arch/amd64/stand/efiboot/efipxe.c#rev1.6

> Network-based device paths use Messaging and not Media types.  Thus
> in reality the depth was always -1 which made the compare function
> a No-Op.  Properly check the device path depth value and look for
> the Messaging type instead to find the correct NIC.  This check
> never worked before and was uncovered by the last change.
>
> Regression noticed by bluhm@

(rin)

2023-07-24 08:21:09 UTC MAIN commitmail json YAML

macppc/floppies: Use x_ variants of disklabel, fsck_ffs, and newfs.
Fix ramdisk overflow with clang.

- For fsck_ffs(8) and newfs(8), Apple UFS is still supported.
- 2.88MB of ramdisk size can be bumped if really required.

(rin)

2023-07-24 01:56:59 UTC MAIN commitmail json YAML

efiboot/x86: Add serial console support via raw I/O port access

Unfortunately, some (most?) UEFI implementations do not support
com ports by ``Serial I/O Protocol''.

``PNP0501-0'' and friends are not recognized also.

In this case, if user explicitly requires to switch to serial
console by ``consdev'' command, try to use raw I/O port access.

Ugly, but what FreeBSD does, at least.

Proposed as PR port-amd64/57523

(rin)

2023-07-23 21:06:52 UTC MAIN commitmail json YAML

2023-07-23 16:52:38 UTC MAIN commitmail json YAML

bsd.own.mk: force MKSTRIPSYM=no if MKDEBUG=yes

Local symbols are desirable with MKDEBUG=yes, so don't strip them.
Per request from mrg@

(lukem)

2023-07-23 16:49:29 UTC MAIN commitmail json YAML

bsd.own.mk: style: block comments, move CC_flag vars

Add #{ .. #} block comments to a long conditional.

Move the CC_flag variables closer to other compiler-related
variables instead of being in the middle of some arch-specific
overrides.

(lukem)

2023-07-23 10:09:37 UTC MAIN commitmail json YAML

PR/57261: hppa should be converted to __HAVE_SYSCALL_INTERN

Provide syscall_intern and use the md_syscall in syscall trap handling.

(skrll)

2023-07-23 08:04:29 UTC MAIN commitmail json YAML

2023-07-23 07:54:37 UTC MAIN commitmail json YAML

port-arm/57388: Minor bug fix in bcopy.S

Use correct register to check alignment of destination in backwards copy.

Patch from Antoni Pokusinski. Thanks.

(skrll)

2023-07-23 07:25:36 UTC MAIN commitmail json YAML

KASSERT -> KASSERTMSG

(skrll)

2023-07-23 07:25:04 UTC MAIN commitmail json YAML

2023-07-23 07:24:20 UTC MAIN commitmail json YAML

Indentation consistency. NFCI.

(skrll)

2023-07-23 07:20:45 UTC MAIN commitmail json YAML

USE __BIT() for CPUF_* flags. NFCI.

(skrll)

2023-07-23 05:54:26 UTC MAIN commitmail json YAML

Add support Intel 700 series chipset and Alder Lake-N devices.

(msaitoh)

2023-07-23 05:52:19 UTC MAIN commitmail json YAML

2023-07-23 05:52:00 UTC MAIN commitmail json YAML

Add Intel 700 series chipset devices.

(msaitoh)

2023-07-22 23:35:23 UTC MAIN commitmail json YAML

mark gl_mangle.h and glx_mangle.h as mesa_ver=19.

(mrg)

2023-07-22 19:13:17 UTC MAIN commitmail json YAML

xen: declare 'default_consinfo' as extern in a header

this makes pvh_consinit.c actually compile with CONS_OVERRIDE set.
i didn't see any good header to add to (bootinfo.h and cpu.h both
seem to be poor choices but were considered), hence the new one
with just this definition.

(mrg)

2023-07-22 18:50:31 UTC MAIN commitmail json YAML

bsd.README: sync with mk.conf(5), deduping entries

Remove most duplication of variables already documented in mk.conf(5).
Add lists of supported and obsolete mk.conf(5) variables
so that searches in this document at least find them
(as per BUILDING).

Sync text from mk.conf(5) for entries that remain.
Explicitly document DESTDIR and RELEASEDIR.

Replace MKMAN=no antipattern with NOMAN=.

Consistently use "option" versus "flag"; option is more generic,
and may include a flag with an argument.

(lukem)

2023-07-22 18:50:04 UTC MAIN commitmail json YAML

BUILDING: list known mk.conf vars. tweak section headers

List known supported and obsolete mk.conf(5) variables,
so that searches in this document at least find them.
This partially reverts my revision 1.144 on 2023-06-12
which completely removed the duplication with mk.conf(5).

Remove quote characters from some section headings;
it makes it harder to search for a section by known name
when rendering in markup variations that use smart quotes.

(lukem)

2023-07-22 18:49:40 UTC MAIN commitmail json YAML

mk.conf(5): tweak BUILDID and option. sort MKKDEBUG

Clarify BUILDID behaviour with OBJMACHINE, and remove unnecessary sentence.
Use option not flag; option may include a flag with an argument.
Sort MKKDEBUG before MKKERBEROS4.

(lukem)

2023-07-22 15:19:18 UTC MAIN commitmail json YAML

i386/XEN3PAE_DOMU: Pass -g to build debug data like GENERIC.

Needed for CTF data by dtrace when MKDEBUG=no MKDEBUGKERNEL=no.

XXX pullup-10

(riastradh)

2023-07-22 15:19:03 UTC MAIN commitmail json YAML

i386/XEN3PAE_DOM0: Pass -g to build debug data like GENERIC.

Needed for CTF data by dtrace when MKDEBUG=no MKDEBUGKERNEL=no.

XXX pullup-10

(riastradh)

2023-07-22 15:18:48 UTC MAIN commitmail json YAML

amd64/XEN3_DOMU: Pass -g to build debug data like GENERIC.

Needed for CTF data by dtrace when MKDEBUG=no MKDEBUGKERNEL=no.

XXX pullup-10

(riastradh)

2023-07-22 10:31:35 UTC MAIN commitmail json YAML

Don't specify a volume alias if none is given instead of using a default
name. Otherwise iscsictl fails for using non-unique names if more than
one volume is used.

(mlelstv)

2023-07-22 09:27:27 UTC MAIN commitmail json YAML

2023-07-22 09:25:31 UTC MAIN commitmail json YAML

2023-07-22 08:51:28 UTC MAIN commitmail json YAML

Remove backwards compat.

(kim)

2023-07-21 22:07:59 UTC MAIN commitmail json YAML

BUILDING: clarify environ vs mk.conf behaviour

Document that variables set in the environment or the
nbmake-MACHINE wrapper script don't override variable
assignments in mk.conf(5), and that using ?= in mk.conf
allows environment / nbmake-MACHINE variables to override
mk.conf.

Consistently refer to "nbmake-MACHINE wrapper script".

(lukem)

2023-07-21 22:05:04 UTC MAIN commitmail json YAML

tools/compat/compat_defs.h: improve NAME_MAX compat

Move the NAME_MAX workaround to the <limits.h> section,
and don't assume that _XOPEN_NAME_MAX is available.

(lukem)

2023-07-21 20:03:13 UTC MAIN commitmail json YAML

bsd.own.mk: Use MACHINE_ARCH for default MKCTF/MKDTRACE=yes x86.

The substantive impact of this is that it enables MKCTF=yes for Xen
kernels.  This is a change because, when building a Xen kernel
(XEN3_DOM0, XEN3_DOMU), MACHINE is set to `xen', not to `i386' or
`amd64', so the conditional never took effect.

(The side effect of setting MKDTRACE=yes when building Xen kernels is
unlikely to matter; that affects module and userland builds.)

PR port-xen/57535

XXX pullup-10

(riastradh)

2023-07-21 15:00:32 UTC MAIN commitmail json YAML

lint: use TOOL_SED instead of sed

Use ${TOOL_SED} instead of (the host) sed, as the
latter doesn't necessarily support the non-POSIX -E.

PR bin/57533

(lukem)

2023-07-21 11:28:50 UTC MAIN commitmail json YAML

Also use XEN_BSIZE when computing the number of bytes for format_bytes().
While there note in a comment that sc_sectors is in XEN_BSIZE units

(bouyer)

2023-07-21 11:26:23 UTC MAIN commitmail json YAML

rbtree(3): No (rb_tree_t) for constant initializer.

This is a compound literal, which is not formally valid as a constant
initializer.

XXX pullup-10

(riastradh)

2023-07-21 11:21:56 UTC MAIN commitmail json YAML

The disk size reported in the xenstore is always in XEN_BSIZE units,
not sector-size. Should fix the issue reported by Christian Kujau
on netbsd-users and port-xen.

(bouyer)

2023-07-21 10:26:36 UTC MAIN commitmail json YAML

Sort by number. No functional change.

(msaitoh)

2023-07-21 10:24:56 UTC MAIN commitmail json YAML

2023-07-21 06:02:07 UTC MAIN commitmail json YAML

2023-07-21 05:51:12 UTC MAIN commitmail json YAML

tests/lint: document an example of a non-constant initializer

(rillig)

2023-07-21 02:42:54 UTC MAIN commitmail json YAML

Add missing dot.

(nat)

2023-07-21 02:16:20 UTC MAIN commitmail json YAML

Mention changes to bta2dpd(8).

(nat)

2023-07-21 02:11:18 UTC MAIN commitmail json YAML

Reorder for readability.

No functional change intended.

XXX pullup-10.

(nat)

2023-07-21 02:10:37 UTC MAIN commitmail json YAML

i386/XEN3PAE_DOMU: Enable KDTRACE_HOOKS.

XXX pullup-10

(riastradh)

2023-07-21 02:08:45 UTC MAIN commitmail json YAML

i386/XEN3PAE_DOM0: Enable KDTRACE_HOOKS.

XXX pullup-10

(riastradh)

2023-07-21 02:04:52 UTC MAIN commitmail json YAML

amd64/XEN3_DOMU: Enable KDTRACE_HOOKS.

XXX pullup-10

(riastradh)

2023-07-21 00:44:38 UTC MAIN commitmail json YAML

Use kmem_free instead of kmem_intr_free, as key_freesaval() is not called in softint after key.c:r1.223.

E.g. key_freesaval() was called the following call path before SAD MP-ify.
  esp_input_cb()
    KEY_FREESAV()
      key_freesav()
        key_delsav()
          key_freesaval()

ok'ed by ozaki-r@n.o.

(knakahara)

2023-07-20 23:31:28 UTC MAIN commitmail json YAML

octeon_gmx.c: fix spelling in (default disabled) error messages

(gutteridge)

2023-07-20 23:28:44 UTC MAIN commitmail json YAML

socket.2: simplify and improve some phrasing

(gutteridge)

2023-07-20 21:48:49 UTC MAIN commitmail json YAML

amdgpu: Mark float-dependent variables volatile.

This way they are computed -- using FP instructions -- before
DC_FP_END, after which point FP instructions will trap or behave
unpredictably.

This is a workaround, not a proper solution -- really, the
DC_FP_START/END calls should happen in a separate compilation unit
built without -mhard-float or whatever, but that's a lot more work to
make happen for now.

PR kern/57059

XXX pullup-10

(riastradh)

2023-07-20 20:10:59 UTC MAIN commitmail json YAML

pax: fix -Wformat for host tool

(lukem)

2023-07-20 20:09:49 UTC MAIN commitmail json YAML

pax: need <strings.h> for ffs()

Fixes warning as host tool on NetBSD 9.99

(lukem)

2023-07-20 20:00:34 UTC MAIN commitmail json YAML

various debug updates for some usb drivers

- several new *_DEBUG_DEFAULT options that allow usb debug values to
  be set to a default that is non-zero:
  EHCI_DEBUG_DEFAULT, UGEN_DEBUG_DEFAULT, URTWN_DEBUG_DEFAULT,
  UMS_DEBUG_DEFAULT, and USB_DEBUG_DEFAULT
- ugen debug uses fewer usbhist lines for the same info
- ums.c converted from printf() to usbhist

(mrg)

2023-07-20 20:00:07 UTC MAIN commitmail json YAML

ctags: fix pointer-sign issues

Refactor init() to avoid -Wpointer-sign for host builds.
Uses same cast pattern used in ctags.h.

(lukem)

2023-07-20 18:02:45 UTC MAIN commitmail json YAML

avoid calling drm_sched_fini() for AMDGPU_RING_TYPE_KIQ rings.

drm_sched_init() is not called for these rings, and we'd panic trying
to mutex_destroy() a mutex that wasn't initialised.

this seems like a general bug, not a bug in netbsd port.

(mrg)

2023-07-20 16:22:30 UTC MAIN commitmail json YAML

2023-07-20 16:21:24 UTC MAIN commitmail json YAML

2023-07-20 15:20:00 UTC MAIN commitmail json YAML

2023-07-20 15:18:34 UTC MAIN commitmail json YAML

2023-07-20 15:16:44 UTC MAIN commitmail json YAML

tools/make: build with -Wno-deprecated-declarations

Use NB_CHECK_CC_FLAG() from ../tools/compat to determine
if the compiler supports -Wno-deprecated-declarations.
Avoids sooking about vfork() on macOS.

(lukem)

2023-07-20 15:15:23 UTC MAIN commitmail json YAML

tools/compat: provide nb_check_cc_flag.m4

Implement m4 macro NB_CHECK_CC_FLAG(FLAG, [VAR=FLAG_DERIVED])
Determine if the C compiler supports FLAG,
and sets output variable VAR to FLAG if FLAG is supported.

If VAR is not provided, default to FLAG_DERIVED, which is
FLAG converted to upper-case and all special characters
replaced with "_", and the result prepended with "CC_".
FLAG_DERIVED is appended to the m4 macro NB_CHECK_CC_FLAG_VARS.
E.g., if FLAG is "-Wexample=yes", FLAG_DERIVED is "CC_WEXAMPLE_YES".

This is implemented in separate buildaux/nb_check_cc_flag.m4,
based on configure's NB_CC_FLAG(), but supports VAR override.

Adapt configure from internal NB_CC_FLAG() to NB_CHECK_CC_FLAG().

(Note: AX_CHECK_COMPILE_FLAG() from autoconf-archive could be enhanced
to support the clang and gcc workarounds I've implemented here.)

(lukem)

2023-07-20 15:13:27 UTC MAIN commitmail json YAML

tools/make/buildmake.sh: fix quoting

autoconf 2.69 generates @DEFS@ with definitions with
quoted embedded spaces, so rework how docmd() is invoked
to avoid weird quoting issues.

As part of this, remove all the shell variables containing @var@
and just use @var@ directly.

(lukem)

2023-07-20 15:12:37 UTC MAIN commitmail json YAML

tools/make/configure.ac: style tweaks

Consistently use () in zero argument macro calls.
Display results at end.

(lukem)

2023-07-20 13:31:31 UTC MAIN commitmail json YAML

Fix formatting.

XXX pullup-10.

(nat)

2023-07-20 13:28:48 UTC MAIN commitmail json YAML

Add BUGS section to manual page.

This notes the problems with playback from file on certain devices.

XXX pullup-10

(nat)

2023-07-20 12:33:28 UTC MAIN commitmail json YAML

Add thottling when playing from file.

This avoids rapid playback when playing from file with affected devices.

Playback using pad(4) is still preferred ad gives a better result.
Playback from pad(4) is unaffected by this change.

XXX pullup-10.

(nat)

2023-07-20 11:59:04 UTC MAIN commitmail json YAML

xhci(4): Don't panic on suspend if previous suspend/resume failed.

Trying to resume again probably won't make the situation much worse,
but panicking can definitely make it worse.

XXX pullup-10

(riastradh)

2023-07-20 10:13:10 UTC netbsd-10 commitmail json YAML

2023-07-20 09:30:48 UTC netbsd-10 commitmail json YAML

Apply patch, requested by mrg in ticket #239:

lib/libgcc/libgcov/arch/earmv4/gcov-iov.h
lib/libgcc/libgcov/arch/earmv4eb/gcov-iov.h
lib/libstdc++-v3/arch/earmv4/c++config.h
lib/libstdc++-v3/arch/earmv4/gstdint.h
lib/libstdc++-v3/arch/earmv4/symver-config.h
lib/libstdc++-v3/arch/earmv4eb/c++config.h
lib/libstdc++-v3/arch/earmv4eb/gstdint.h
lib/libstdc++-v3/arch/earmv4eb/symver-config.h
usr.bin/gcc/arch/earmv4/bversion.h
usr.bin/gcc/arch/earmv4/configargs.h
usr.bin/gcc/arch/earmv4/defs.mk
usr.bin/gcc/arch/earmv4/plugin-version.h
usr.bin/gcc/arch/earmv4eb/bversion.h
usr.bin/gcc/arch/earmv4eb/configargs.h
usr.bin/gcc/arch/earmv4eb/defs.mk
usr.bin/gcc/arch/earmv4eb/plugin-version.h

regen, missed in previous mknative run.
Cleanup old (no longer used) configs and remove:

lib/libbacktrace/arch/coldfire/backtrace-supported.h
lib/libbacktrace/arch/coldfire/config.h
lib/libbacktrace/arch/or1k/backtrace-supported.h
lib/libbacktrace/arch/or1k/config.h
lib/libgcc/arch/coldfire/auto-target.h
lib/libgcc/arch/coldfire/defs.mk
lib/libgcc/arch/or1k/auto-target.h
lib/libgcc/arch/or1k/defs.mk
lib/libgcc/libgcov/arch/coldfire/defs.mk
lib/libgcc/libgcov/arch/coldfire/gcov-iov.h
lib/libgcc/libgcov/arch/or1k/defs.mk
lib/libgcc/libgcov/arch/or1k/gcov-iov.h
lib/libgomp/arch/coldfire/config.h
lib/libgomp/arch/coldfire/libgomp.spec
lib/libgomp/arch/coldfire/libgomp_f.h
lib/libgomp/arch/coldfire/omp.h lib/libgomp/arch/or1k/config.h
lib/libgomp/arch/or1k/libgomp.spec
lib/libgomp/arch/or1k/libgomp_f.h lib/libgomp/arch/or1k/omp.h
lib/libiberty/arch/coldfire/config.h
lib/libiberty/arch/or1k/config.h
lib/libobjc/arch/coldfire/config.h
lib/libobjc/arch/coldfire/defs.mk
lib/libobjc/arch/or1k/config.h lib/libobjc/arch/or1k/defs.mk
lib/libstdc++-v3/arch/coldfire/c++config.h
lib/libstdc++-v3/arch/coldfire/cxxabi_tweaks.h
lib/libstdc++-v3/arch/coldfire/defs.mk
lib/libstdc++-v3/arch/coldfire/gstdint.h
lib/libstdc++-v3/arch/or1k/c++config.h
lib/libstdc++-v3/arch/or1k/cxxabi_tweaks.h
lib/libstdc++-v3/arch/or1k/defs.mk
lib/libstdc++-v3/arch/or1k/gstdint.h
usr.bin/gcc/arch/coldfire/all-tree.def
usr.bin/gcc/arch/coldfire/auto-host.h
usr.bin/gcc/arch/coldfire/bconfig.h
usr.bin/gcc/arch/coldfire/bversion.h
usr.bin/gcc/arch/coldfire/config.h
usr.bin/gcc/arch/coldfire/configargs.h
usr.bin/gcc/arch/coldfire/defs.mk
usr.bin/gcc/arch/coldfire/gthr-default.h
usr.bin/gcc/arch/coldfire/gtyp-input.list
usr.bin/gcc/arch/coldfire/insn-modes.h
usr.bin/gcc/arch/coldfire/multilib.h
usr.bin/gcc/arch/coldfire/plugin-version.h
usr.bin/gcc/arch/coldfire/tm.h
usr.bin/gcc/arch/or1k/all-tree.def
usr.bin/gcc/arch/or1k/auto-host.h
usr.bin/gcc/arch/or1k/bconfig.h
usr.bin/gcc/arch/or1k/bversion.h
usr.bin/gcc/arch/or1k/config.h
usr.bin/gcc/arch/or1k/configargs.h
usr.bin/gcc/arch/or1k/defs.mk
usr.bin/gcc/arch/or1k/gthr-default.h
usr.bin/gcc/arch/or1k/gtyp-input.list
usr.bin/gcc/arch/or1k/multilib.h
usr.bin/gcc/arch/or1k/plugin-version.h
usr.bin/gcc/arch/or1k/tm.h
usr.bin/libcpp/arch/coldfire/config.h
usr.bin/libcpp/arch/or1k/config.h
usr.bin/libdecnumber/arch/coldfire/config.h
usr.bin/libdecnumber/arch/or1k/config.h

(martin)

2023-07-20 04:30:40 UTC MAIN commitmail json YAML

src/external/gpl3/gcc.old/lib/libgcc/libgcov/arch/earmv4/gcov-iov.h@1.14 / diff / nxr@1.14
src/external/gpl3/gcc.old/lib/libgcc/libgcov/arch/earmv4eb/gcov-iov.h@1.14 / diff / nxr@1.14
src/external/gpl3/gcc.old/lib/libstdc++-v3/arch/earmv4/c++config.h@1.18 / diff / nxr@1.18
src/external/gpl3/gcc.old/lib/libstdc++-v3/arch/earmv4/defs.mk@1.14 / diff / nxr@1.14
src/external/gpl3/gcc.old/lib/libstdc++-v3/arch/earmv4/gstdint.h@1.15 / diff / nxr@1.15
src/external/gpl3/gcc.old/lib/libstdc++-v3/arch/earmv4/symver-config.h@1.6 / diff / nxr@1.6
src/external/gpl3/gcc.old/lib/libstdc++-v3/arch/earmv4eb/c++config.h@1.18 / diff / nxr@1.18
src/external/gpl3/gcc.old/lib/libstdc++-v3/arch/earmv4eb/defs.mk@1.14 / diff / nxr@1.14
src/external/gpl3/gcc.old/lib/libstdc++-v3/arch/earmv4eb/gstdint.h@1.15 / diff / nxr@1.15
src/external/gpl3/gcc.old/lib/libstdc++-v3/arch/earmv4eb/symver-config.h@1.6 / diff / nxr@1.6
src/external/gpl3/gcc.old/usr.bin/gcc/arch/earmv4/bversion.h@1.14 / diff / nxr@1.14
src/external/gpl3/gcc.old/usr.bin/gcc/arch/earmv4/configargs.h@1.16 / diff / nxr@1.16
src/external/gpl3/gcc.old/usr.bin/gcc/arch/earmv4/defs.mk@1.15 / diff / nxr@1.15
src/external/gpl3/gcc.old/usr.bin/gcc/arch/earmv4/plugin-version.h@1.14 / diff / nxr@1.14
src/external/gpl3/gcc.old/usr.bin/gcc/arch/earmv4eb/bversion.h@1.14 / diff / nxr@1.14
src/external/gpl3/gcc.old/usr.bin/gcc/arch/earmv4eb/configargs.h@1.16 / diff / nxr@1.16
src/external/gpl3/gcc.old/usr.bin/gcc/arch/earmv4eb/defs.mk@1.15 / diff / nxr@1.15
src/external/gpl3/gcc.old/usr.bin/gcc/arch/earmv4eb/plugin-version.h@1.14 / diff / nxr@1.14

regen for earmv4/earmv4eb.

(mrg)

2023-07-20 04:16:15 UTC MAIN commitmail json YAML

entropy.7: add a missing word to a sentence

While here, bump the date to reflect when substantive changes were last
made.

(gutteridge)

2023-07-19 22:24:28 UTC MAIN commitmail json YAML

lint: work around a possible compiler error on arm and powerpc

(rillig)

2023-07-19 19:23:29 UTC MAIN commitmail json YAML

mknative-gcc for earmv4*.

delete obsolete or1k and coldfire configurations.

(mrg)

2023-07-19 17:49:40 UTC MAIN commitmail json YAML

Warn to clean gcc objectdirs for updated compiler.

(martin)

2023-07-19 15:40:38 UTC MAIN commitmail json YAML

BUILDING: consistency fix

(lukem)

2023-07-19 14:44:14 UTC MAIN commitmail json YAML

openssh-9.3p2 out

(wiz)

2023-07-19 14:34:14 UTC netbsd-10 commitmail json YAML

2023-07-19 14:31:40 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by bouyer in ticket #238):

sys/arch/xen/xen/xen_clock.c: revision 1.10
sys/arch/xen/xen/xen_clock.c: revision 1.12

Unmask event after VCPUOP_stop_periodic_timer and
initializing ci->ci_xen_hardclock_systime_ns, to avoid a possible race with
xen_timer_handler()

Unmask event after arming the one-shot timer in clock initialisation,
to avoid a possible race with xen_timer_handler() updating
ci_xen_hardclock_systime_ns while we're reading it.

Pointed out by Taylor R Campbell

(martin)

2023-07-19 14:15:29 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by rin in ticket #237):

usr.bin/xlint/lint1/decl.c: revision 1.361
doc/HACKS: revision 1.239

lint1:initdecl(): Remove hack for now-fixed PR port-sh3/56311
doc/HACKS: PR port-sh3/56311 has been fixed.

(martin)

2023-07-19 14:11:14 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by rin in ticket #236):

external/gpl3/gcc/dist/gcc/config/sh/sh.md: revision 1.3

gcc: Fix peephole optimization bug for sh3 (PR port-sh3/56311)

Cherry-picked from upstream:
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=4dbb3af1efe55174a714d15c2994cf2842ef8c28
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=101469

Now, the PR confirmed fixed. No regression observed for full ATF run on
landisk (compared with GCC built with this peephole optimization being
removed by hand).

We thank Oleg Endo, the author of the upstream commit.
Also thanks hgutch@ and uwe@ for analysis.

(martin)

2023-07-19 13:59:02 UTC MAIN commitmail json YAML

Note import of dhcpcd-10.0.2

(roy)

2023-07-19 13:53:03 UTC MAIN commitmail json YAML

2023-07-19 10:22:15 UTC MAIN commitmail json YAML

- make colour depth in fb mode configurable, default to 8bit
- support ioctl(FBIO*CMAP)

(macallan)

2023-07-18 16:59:57 UTC MAIN commitmail json YAML

build.sh: use mk.conf (if present) as MAKECONF

Set MAKECONF to mk.conf in the same directory as build.sh
(i.e., the top of the source tree) if mk.conf is present.
This means unprivileged users can benefit from mk.conf(5)
semantics without write privileges to /etc/mk.conf, and
also simplifies per-source-directory configuration.

Fail early if $MAKECONF is empty, since build.sh will fail
anyway after rebuilding nbmake.

Ensure that the computed MAKECONF isn't empty, and then
always set MAKECONF in the makewrapper (nbmake-$MACHINE).

Improve some formatting consistency in BUILDING.mdoc,
(even if BUILDING is generated without markup).

(lukem)

2023-07-18 13:35:57 UTC MAIN commitmail json YAML

hdafg(4): Do hotplug detection in kthread, not callout.

This can sometimes take a while (~1ms), and the logic to suspend the
callout on device suspend/resume was racy (PR kern/57322).

XXX pullup-8
XXX pullup-9
XXX pullup-10

(riastradh)

2023-07-18 12:34:25 UTC MAIN commitmail json YAML

x86/fpu: In kernel mode fpu traps, print the instruction pointer.

(riastradh)

2023-07-18 11:57:37 UTC MAIN commitmail json YAML

autoconf(9): Print `waiting for devices' normally once a minute.

(riastradh)

2023-07-18 11:46:48 UTC MAIN commitmail json YAML

rbtree(3): Fix RBDEBUG build with RB_TREE_INITIALIZER.

XXX pullup-10

(riastradh)

2023-07-18 11:44:32 UTC MAIN commitmail json YAML

libc: Use RB_TREE_INITIALIZER to nix initfini.c/_env.c coupling.

Doesn't actually help to remove _env.c from programs that don't use
it, though, because various internal things like __diagassert13 still
call getenv.

(riastradh)

2023-07-18 11:43:21 UTC MAIN commitmail json YAML

rbtree(3): New RB_TREE_INITIALIZER macro.

Allows static initialization of an rbtree.

XXX pullup-10

(riastradh)

2023-07-18 10:17:12 UTC MAIN commitmail json YAML

acpiec(4): One more debug message about read/write polling timeout.

(riastradh)

2023-07-18 10:17:02 UTC MAIN commitmail json YAML

acpiec(4): Take a lock around acpiec_cold updates.

Otherwise we race with readers -- probably harmlessly, but let's
avoid the appearance of problems.

XXX Maybe acpiec_suspend and acpiec_shutdown should interrupt
transactions and force them to fail promptly?

XXX This looks bad because acpiec_cold is global and sc->sc_mtx
doesn't look like it's global, but we expect to have only one
acpiec(4) device anyway from what I understand.  Maybe we should move
acpiec_cold into the softc?

(riastradh)

2023-07-18 10:10:49 UTC MAIN commitmail json YAML

acpiec(4): Factor out if (state == FREE) cv_signal(sc_cv).

In principle this could have a functional change, but at worst, it is
to signal more wakeups than needed, which should always be safe.

(riastradh)

2023-07-18 10:06:55 UTC MAIN commitmail json YAML

acpiec(4): Pass softc, not device_t, to acpiec_space_handler.

Better to keep the device_t isolated to public interfaces.  Simpler
internally this way.

No functional change intended.

(riastradh)

2023-07-18 10:06:44 UTC MAIN commitmail json YAML

acpiec(4): Pass softc, not device_t, to acpiec_gpe_query thread.

Simpler.

No functional change intended.

(riastradh)

2023-07-18 10:06:33 UTC MAIN commitmail json YAML

acpiec(4): Pass softc, not device_t, to acpiec_read/write.

Simpler, type-safer.

No functional change intended.

(riastradh)

2023-07-18 10:06:22 UTC MAIN commitmail json YAML

acpiec(4): Pass softc, not device_t, to acpiec_lock/unlock.

Simpler, type-safer.

No functional change intended.

(riastradh)

2023-07-18 10:06:12 UTC MAIN commitmail json YAML

acpiec(4): Pass softc, not device_t, to acpiec_gpe_handler.

Simpler.

No functional change intended.

(riastradh)

2023-07-18 10:06:00 UTC MAIN commitmail json YAML

acpiec(4): Pass softc, not device_t, to acpiec_callout.

Simpler.

No functional change intended.

(riastradh)

2023-07-18 10:05:49 UTC MAIN commitmail json YAML

acpiec(4): Pass softc, not device_t, to acpiec_gpe_state_machine.

Simpler, type-safer.

No functional change intended.

(riastradh)

2023-07-18 10:05:25 UTC MAIN commitmail json YAML

acpiec(4): Factor wait logic out.

No functional change intended.

(riastradh)

2023-07-18 10:05:13 UTC MAIN commitmail json YAML

acpiec(4): Merge returns in acpiec_read/write.

No functional change intended.

(riastradh)

2023-07-18 10:05:01 UTC MAIN commitmail json YAML

acpiec(4): Don't touch sc->sc_state outside sc->sc_mtx.

(riastradh)

2023-07-18 10:04:50 UTC MAIN commitmail json YAML

acpiec(4): Fix cv_timedwait abuse in acpiec_read/write.

(riastradh)

2023-07-18 10:04:40 UTC MAIN commitmail json YAML

acpiec(4): Fix interrupt wait loop in acpiec_gpe_query thread.

(riastradh)

2023-07-18 10:04:28 UTC MAIN commitmail json YAML

acpiec(4): Fix cv_wait loop around sc->sc_got_sci.

That is, make it actually loop as required, so it gracefully handles
spurious wakeups instead of barging into invalid states.

(riastradh)

2023-07-18 10:04:14 UTC MAIN commitmail json YAML

acpiec(4): Set sc_got_sci only when a transaction is over.

Before, when the acpiec thread noticed an SCI had been requested and
entered acpiec_gpe_state_machine to send the query command, it would
see the SCI is still requested -- because it had yet to acknowledge
it by setting the query command! -- and think the EC was asking for a
_second_ SCI.

So once the first SCI transaction was over, it would start a second
one, even though the EC hadn't asked for another -- and this would
wedge on some ECs.

Now, acpiec_gpe_state_machine waits to see what state we transition
to before taking the SCI bit to mean we need to notify the acpiec
thread to handle another query.

That way, when the acpiec thread enters acpiec_gpe_state_machine with
EC_STATE_QUERY, it can send the query command first, with the side
effect of clearing the SCI bit in subsequent reads of the status
register, and it won't think another SCI has been requested until it
returns to EC_STATE_FREE and sees the SCI bit set again in the status
register.

Possibly relevant PRs:

PR kern/53135
PR kern/52763
PR kern/57162

(riastradh)

2023-07-18 10:03:59 UTC MAIN commitmail json YAML

acpiec(4): Assert state is free when we start a transaction.

No functional change intended.

(riastradh)

2023-07-18 10:03:47 UTC MAIN commitmail json YAML

acpiec(4): Sprinkle comments.

Note where this code is abusing cv_wait and needs a loop to handle
spurious wakeups.

No functional change intended.

(riastradh)

2023-07-18 10:03:35 UTC MAIN commitmail json YAML

acpiec(4): Clarify lock order and sprinkle lock assertions.

No functional change intended.

(riastradh)

2023-07-18 10:02:25 UTC MAIN commitmail json YAML

acpiec(4): New ACPIEC_DEBUG option.

Value is bit mask of debug messages to enable.

Enable in x86/ALL kernels.

No functional change intended when the option is off.

(riastradh)

2023-07-18 10:02:09 UTC MAIN commitmail json YAML

acpiec(4): Record device_t self.

Not used yet, to be used soon for device_printf and to allow making
some of the internal functions a little more type-safe later.

(riastradh)

2023-07-18 06:37:55 UTC MAIN commitmail json YAML

provide more things needed by new subr_prf.c.

(mrg)

2023-07-18 03:01:35 UTC MAIN commitmail json YAML

doc/HACKS: PR port-sh3/56311 has been fixed.

(rin)

2023-07-18 03:00:42 UTC MAIN commitmail json YAML

lint1:initdecl(): Remove hack for now-fixed PR port-sh3/56311

(rin)

2023-07-18 02:58:38 UTC MAIN commitmail json YAML

Sync with external/gpl3/gcc:
https://mail-index.netbsd.org/source-changes/2023/07/18/msg146078.html
----
gcc: Fix peephole optimization bug for sh3 (PR port-sh3/56311)

Cherry-picked from upstream:
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=4dbb3af1efe55174a714d15c2994cf2842ef8c28
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=101469

Now, the PR confirmed fixed. No regression observed for full ATF run on
landisk (compared with GCC built with this peephole optimization being
removed by hand).

We thank Oleg Endo, the author of the upstream commit.

Also thanks hgutch@ and uwe@ for analysis.

(rin)

2023-07-18 02:50:18 UTC MAIN commitmail json YAML

gcc: Fix peephole optimization bug for sh3 (PR port-sh3/56311)

Cherry-picked from upstream:
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=4dbb3af1efe55174a714d15c2994cf2842ef8c28
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=101469

Now, the PR confirmed fixed. No regression observed for full ATF run on
landisk (compared with GCC built with this peephole optimization being
removed by hand).

We thank Oleg Endo, the author of the upstream commit.

Also thanks hgutch@ and uwe@ for analysis.

(rin)

2023-07-17 22:57:35 UTC MAIN commitmail json YAML

device_printf(9): Lock to avoid interleaving output.

XXX pullup-9
XXX pullup-10

(riastradh)

2023-07-17 21:51:45 UTC MAIN commitmail json YAML

timecounter(9): Sprinkle membar_consumer around th->th_generation.

This code was apparently written under the misapprehension that
membar_producer on one side is good enough, but that doesn't
accomplish anything other than making the code unnecessarily obscure.

For semantics, you always always always need memory barriers to come
in pairs, with membar_consumer on the reading side if you want the
membar_producer to have on the writing side to have any useful
effect.

It is unfortunate that this might hurt performance, but that's an
unfortunate consequence of the design made without understanding
memory barriers, not an unfortunate consequence of the memory
barriers.

If it is really critical for the read side to avoid memory barriers,
then the write side needs to issue an IPI or xcall to effect memory
barriers -- at higher cost to the write side, of course.

(riastradh)

2023-07-17 21:51:31 UTC MAIN commitmail json YAML

timecounter(9): Use atomic_store_release/load_consume for timehands.

This probably fixes real bugs on Alpha and makes the synchronization
pattern clearer everywhere.

(riastradh)

2023-07-17 21:51:20 UTC MAIN commitmail json YAML

timecounter(9): Use seqlock for atomic snapshots of timebase.

(riastradh)

2023-07-17 21:12:29 UTC MAIN commitmail json YAML

i386/LEGACY: Enable ATA_DOWNGRADE_MODE.

PR kern/57362

(riastradh)

2023-07-17 21:12:19 UTC MAIN commitmail json YAML

ata(4): Add ATA_DOWNGRADE_MODE to opt_ata.h.

This way adding it to kernel config will trigger recompilation.

(riastradh)

2023-07-17 15:41:06 UTC MAIN commitmail json YAML

Revert "timecounter(9): Use an ipi barrier on time_second/uptime rollover."

Evidently rump doesn't have ipi, so this won't work unless we have an
alternate approach for rump.

(riastradh)

2023-07-17 14:20:19 UTC MAIN commitmail json YAML

signal(7): Clarify semantics of SIGCHLD with SIG_IGN or SA_NOCLDWAIT.

The semantics is not just a nonportable hack for SysV compatibility;
it is enshrined in POSIX.

Related: PR 57527

(riastradh)

2023-07-17 13:48:14 UTC MAIN commitmail json YAML

timecounter(9): No static; committed wrong version of patch.

(riastradh)

2023-07-17 13:44:24 UTC MAIN commitmail json YAML

timecounter(9): Limit scope of time__second/uptime.

Relevant only if __HAVE_ATOMIC64_LOADSTORE -- not updated otherwise.

(riastradh)

2023-07-17 13:42:23 UTC MAIN commitmail json YAML

timecounter(9): Use an ipi barrier on time_second/uptime rollover.

This way we only need __insn_barrier, not membar_consumer, on the
read side.

(riastradh)

2023-07-17 13:42:02 UTC MAIN commitmail json YAML

timecounter(9): Revert last -- timecounter_lock is already IPL_HIGH.

(riastradh)

2023-07-17 13:35:07 UTC MAIN commitmail json YAML

timecounter(9): Ward off interrupts during time_second/uptime update.

Only relevant during 32-bit wraparound, so the potential performance
impact of using splhigh here is negligible; indeed, we would have to
go out of our way to exercise this in tests before it will ever
happen in the next century.

(riastradh)

2023-07-17 13:29:12 UTC MAIN commitmail json YAML

timecounter(9): Fix thinko in previous.

Swapped the wrong variable in this mental macro expansion!

(riastradh)

2023-07-17 12:57:05 UTC MAIN commitmail json YAML

sys/param.h: Welcome to NetBSD 10.99.6!

Courtesy of:

- one uvmfault rndsource, not one per CPU
- removal of non-atomic time_second and time_uptime symbols
- struct syncobj::sobj_name

(riastradh)

2023-07-17 12:55:38 UTC MAIN commitmail json YAML

uvm(9): One rndsource for faults -- not one per CPU.

All relevant state is per-CPU anyway; the only substantive difference
this makes is how many entries appear in `rndctl -l' output and what
they are called -- formerly the somewhat confusing `cpuN', meaning
`page faults on cpuN', and now just `uvmfault'.  I don't think
there's any real value in being able to enable or disable measurement
or counting of page faults on one CPU vs others, so although this
could be a minor compatibility change, it's hard to imagine it
matters much.

XXX kernel ABI change in struct cpu_info

(riastradh)

2023-07-17 12:55:21 UTC MAIN commitmail json YAML

kern: Make time_second and time_uptime macros that work atomically.

These use atomic load on platforms with atomic 64-bit load, and
seqlocks on platforms without.

This has the unfortunate side effect of slightly reducing the real
times available on 32-bit platforms, from ending some time in the
year 584942417218 AD, available on 64-bit platforms, to ending some
time in the year 584942417355 AD.  But during that slightly shorter
time, 32-bit platforms can avoid bugs arising from non-atomic access
to time_uptime and time_second.

Note: All platforms still have non-atomic access problems for
bintime, binuptime, nanotime, nanouptime, &c.  This can be addressed
by putting a seqlock around timebasebin and possibly some other
variable -- to be done in a later change.

XXX kernel ABI change -- deleting symbols

(riastradh)

2023-07-17 12:55:04 UTC MAIN commitmail json YAML

ddb: Teach `show all tstiles' to show the type of each lock.

(riastradh)

2023-07-17 12:54:54 UTC MAIN commitmail json YAML

sys/syncobj.h: Expose this to _KMEMUSER for future use by crash(8).

This will allow crash(8) to get at the syncobj name.

(riastradh)

2023-07-17 12:54:29 UTC MAIN commitmail json YAML

kern: New struct syncobj::sobj_name member for diagnostics.

XXX potential kernel ABI change -- not sure any modules actually use
struct syncobj but it's hard to rule that out because sys/syncobj.h
leaks into sys/lwp.h

(riastradh)

2023-07-17 10:55:27 UTC MAIN commitmail json YAML

kthread(9): Fix nested kthread_join.

No reason for one kthread_join to interfere with another, or to cause
non-cyclic dependencies to get stuck.

Uses struct lwp::l_private for this purpose, which for user threads
stores the tls pointer.  I don't think anything in kthread(9) uses
l_private -- generally kernel threads will use lwp specificdata.  But
maybe this should use a new member instead, or a union member with an
existing pointer for the purpose.

(riastradh)

2023-07-17 10:12:54 UTC MAIN commitmail json YAML

Unmask event after arming the one-shot timer in clock initialisation,
to avoid a possible race with xen_timer_handler() updating
ci_xen_hardclock_systime_ns while we're reading it.
Pointed out by Taylor R Campbell

(bouyer)

2023-07-17 04:24:34 UTC MAIN commitmail json YAML

copy the old libEGL/Makefile here and subst .old in a couple of places.

should fix build.

(mrg)

2023-07-17 04:08:16 UTC MAIN commitmail json YAML

2023-07-16 23:12:17 UTC MAIN commitmail json YAML

rump: Fix comment to reflect l_private -> l_sched.info.

Comment was misspelled `l->private', hence didn't come up in grep.

(riastradh)

2023-07-16 23:05:53 UTC MAIN commitmail json YAML

rump: Use l_sched.info, not l_private, for cv waits.

- l_sched is scheduler-private, used only by sched_m2.c, should be safe
- l_private is lwp-private, used by tls in user threads, would like to
  reuse for kthreads too

(riastradh)

2023-07-16 22:20:54 UTC MAIN commitmail json YAML

2023-07-16 22:01:36 UTC MAIN commitmail json YAML

2023-07-16 21:58:14 UTC MAIN commitmail json YAML

2023-07-16 21:55:45 UTC MAIN commitmail json YAML

include cstdarg for va_list

Copied from graphics/MesaLib pkg.

(rjs)

2023-07-16 21:54:34 UTC MAIN commitmail json YAML

setOverrideStackAlignment() isn't in our llvm runtime library.

(rjs)

2023-07-16 21:41:57 UTC MAIN commitmail json YAML

xsrc/external/mit/MesaLib/src/amd/common/amdgfxregs.h@1.1 / diff / nxr@1.1
xsrc/external/mit/MesaLib/src/amd/common/gfx10_format_table.c@1.1 / diff / nxr@1.1
xsrc/external/mit/MesaLib/src/amd/common/sid_tables.h@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/glsl/float64_glsl.h@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/glsl/glcpp/glcpp-lex.c@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/glsl/glcpp/glcpp-parse.c@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/glsl/glcpp/glcpp-parse.h@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/glsl/glsl_lexer.cpp@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/glsl/glsl_parser.cpp@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/glsl/glsl_parser.h@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/glsl/ir_expression_operation_constant.h@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/glsl/ir_expression_operation_strings.h@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/ir_expression_operation.h@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/nir/nir_builder_opcodes.h@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/nir/nir_constant_expressions.c@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/nir/nir_intrinsics.c@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/nir/nir_intrinsics.h@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/nir/nir_intrinsics_indices.h@1.1 / diff / nxr@1.1
xsrc/external/mit/MesaLib/src/compiler/nir/nir_opcodes.c@1.2 / diff / nxr@1.2
xsrc/external/mit/MesaLib/src/compiler/nir/nir_opcodes.h@1.2 / diff / nxr@1.2
      :
(more 99 files)
Update generated files to match 21.3.7.

Created using a dummy pkg.

(rjs)

2023-07-16 21:36:40 UTC MAIN commitmail json YAML

aarch64: Omit needless xcfunc_t casts by using xcfunc_t correctly.

No functional change intended, except for avoiding possible undefined
behaviour that could have made demons come flying out your nose.

(riastradh)

2023-07-16 19:55:44 UTC MAIN commitmail json YAML

x86: Sprinkle extensive commentary about %fs/%gs initialization.

Plus some other side quests like the three-stage GDT metamorphosis
lifecycle.

No functional change intended.

(riastradh)

2023-07-16 19:09:07 UTC MAIN commitmail json YAML

>From Vladimir 'phcoder' Serbinenko in tech-kern:

On at least some Chromebooks PS/2 reset command generates no
response and we end up reading garbage and disabling keyboard
support altogether even though that controller otherwise works
fine. Linux issues reset but ignores the reply and relies on
getid instead. So does Haiku. FreeB= SD assumes that all coreboot
systems have PS/2 which is wrong as it supports some MacBooks as
well. No idea what windows does but keyboard works there.

Also do some KNF while here.

(christos)

2023-07-16 18:09:54 UTC MAIN commitmail json YAML

Update build instructions for Solaris 11.4 hosts: specify HOST_SH and note standards

(palle)

2023-07-16 17:43:50 UTC MAIN commitmail json YAML

Avoid overflow with too many ';' (David Leadbeater)
Prefix all messages with the method name

(christos)

2023-07-16 10:36:21 UTC MAIN commitmail json YAML

sys/rndio.h: Fix whitespace.

No functional change intended.

(riastradh)

2023-07-16 10:36:11 UTC MAIN commitmail json YAML

sys/rndsource.h: Fix whitespace.

No functional change intended.

XXX pullup-10

(riastradh)

2023-07-16 10:36:02 UTC MAIN commitmail json YAML

sys/rndsource.h: Update comment to reflect new use of delta members.

No functional change intended.

XXX pullup-10

(riastradh)

2023-07-16 10:20:08 UTC MAIN commitmail json YAML

2023-07-16 10:18:19 UTC MAIN commitmail json YAML

heartbeat(9): For now, use time_uptime without atomic_load_relaxed.

A later commit will change time_uptime to a macro so it is atomic,
using atomc_load_relaxed if possible or seqlock if not.

(riastradh)

2023-07-16 10:18:07 UTC MAIN commitmail json YAML

heartbeat(9): Avoid xcall(9) while cold.

(riastradh)

2023-07-16 07:30:54 UTC MAIN commitmail json YAML

riscv: Enable HEARTBEAT option in GENERIC.common

(skrll)

2023-07-16 05:24:08 UTC MAIN commitmail json YAML

revert previous change to enable HEARTBEAT.

the new code has a "needs 64-bit atomic ops" trigger:

ci->ci_heartbeat_uptime_cache = atomic_load_relaxed(&time_uptime);

but time_uptime is a 64-bit value, and this trips CTASSERT().

(mrg)

2023-07-15 22:30:19 UTC MAIN commitmail json YAML

evbarm: Enable HEARTBEAT option in GENERIC and GENERIC64 kernels.

(riastradh)

2023-07-15 22:16:00 UTC MAIN commitmail json YAML

amd64: Enable HEARTBEAT option, not just a HEARTBEAT option comment.

(riastradh)

2023-07-15 22:14:39 UTC MAIN commitmail json YAML

2023-07-15 22:13:27 UTC MAIN commitmail json YAML

i386/ALL: Enable HEARTBEAT.

(riastradh)

2023-07-15 21:47:35 UTC MAIN commitmail json YAML

lint: each member declarator may have attributes, not only the last one

(rillig)

2023-07-15 21:41:26 UTC MAIN commitmail json YAML

2023-07-15 21:40:03 UTC MAIN commitmail json YAML

tests/lint: test GCC attributes in member declarations

(rillig)

2023-07-15 21:24:47 UTC MAIN commitmail json YAML

2023-07-15 21:18:07 UTC MAIN commitmail json YAML

gpt.8: fix some grammar

(The BUGS section seems perhaps a little outdated in its warnings of
potential incompatible changes.)

(gutteridge)

2023-07-15 21:14:01 UTC MAIN commitmail json YAML

2023-07-15 21:11:58 UTC MAIN commitmail json YAML

gpt.8: drop cross-reference to cvs(1)

It's no more useful to reference cvs(1) than, say, openssl(1), and
should be self-evident, anyway.

(gutteridge)