Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (8m)  netbsd-8 (5d)  netbsd-10 (5d)  netbsd-9 (11d)  thorpej-ifq (175d)  thorpej-altq-separation (177d) 

2024-05-09 22:46:33 UTC Now

2018-05-04 08:33:43 UTC MAIN commitmail json YAML

oops forgot to commit this one (fixes for prototypes)

(christos)

2018-05-04 08:19:47 UTC pgoyette-compat commitmail json YAML

Add comment to note that compat_16_sigreturn14 is in MD code!

(pgoyette)

2018-05-04 08:13:18 UTC pgoyette-compat commitmail json YAML

Undo merge of changes from HEAD.  This will get re-done properly
at the next sync-with-HEAD (which will also pull in other changes
needed).

(pgoyette)

2018-05-04 02:38:46 UTC pgoyette-compat commitmail json YAML

2018-05-04 00:36:16 UTC MAIN commitmail json YAML

2018-05-04 00:33:48 UTC MAIN commitmail json YAML

2018-05-04 00:25:26 UTC MAIN commitmail json YAML

Add some comments/suggestions from John Nemeth.  Thanks!

(pgoyette)

2018-05-03 22:51:18 UTC MAIN commitmail json YAML

2018-05-03 22:27:59 UTC MAIN commitmail json YAML

2018-05-03 21:43:33 UTC MAIN commitmail json YAML

Fix COMPAT_NETBSD32 cmsg handling:

1. alignment was wrong for > 1 message
2. macros were doing incorrect pointer comparisons, fortunately ending
  the iteration early after the fists cmsg instead of crashing.
3. don't output 32 bit ktrace records for cmsg. 32 bit programs running
  under emulation on 64 bit systems should produce 64 bit ktrace records
  so that the native ktrace can handle the records; remove extra arguments
  that are now not needed (the 32 bit msghdr).
4. output the correct type for cmsg trace records.
5. output all the cmsg records in traces instead of just the first one.

Welcome to 8.99.15 because of the argument removal.

XXX: Really all the code should be changed to use the CMSG_{FIRST,NXT}HDR
macros...

(christos)

2018-05-03 21:37:29 UTC MAIN commitmail json YAML

make mbuftypes always visible

(christos)

2018-05-03 20:15:49 UTC MAIN commitmail json YAML

time marches on for lvm2tools

(jnemeth)

2018-05-03 17:14:37 UTC MAIN commitmail json YAML

2018-05-03 17:03:20 UTC MAIN commitmail json YAML

2018-05-03 17:01:09 UTC MAIN commitmail json YAML

Register new acronym in wtf(6)

VLC    variable length array

Noted by <martin>

(kamil)

2018-05-03 16:52:42 UTC MAIN commitmail json YAML

Drop early if there's no PPPoE interface. Otherwise it is easy for someone
to flood dmesg over the local subnet.

(maxv)

2018-05-03 15:47:36 UTC MAIN commitmail json YAML

add aarch64 support for cpuctl identify.

(ryo)

2018-05-03 15:47:22 UTC MAIN commitmail json YAML

add sysctl for machdep.{cpu_id,id_revidr,id_mvfr,id_mpidr,id_aa64isar,id_aa64mmfr,id_aa64pfr}
each corresponding to system registers MIDR_EL1, REVIDR_EL1, MVFR*_EL1, MPIDR_EL1, ID_AA64ISAR*_EL1, ID_AA64MMFR*_EL1, ID_AA64PFR*_EL1.

(ryo)

2018-05-03 15:38:13 UTC MAIN commitmail json YAML

2018-05-03 15:16:06 UTC netbsd-7-0 commitmail json YAML

2018-05-03 15:15:17 UTC netbsd-7-1 commitmail json YAML

2018-05-03 15:14:48 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1602):

sys/kern/uipc_mbuf.c: revision 1.211 (via patch)

Modify m_defrag, so that it never frees the first mbuf of the chain. While
here use the given 'flags' argument, and not M_DONTWAIT.

We have a problem with several drivers: they poll an mbuf chain from their
queues and call m_defrag on them, but m_defrag could update the mbuf
pointer, so the mbuf in the queue is no longer valid. It is not easy to
fix each driver, because doing pop+push will reorder the queue, and we
don't really want that to happen.

This problem was independently spotted by me, Kengo, Masanobu, and other
people too it seems (perhaps PR/53218).

Now m_defrag leaves the first mbuf in place, and compresses the chain
only starting from the second mbuf in the chain.

It is important not to compress the first mbuf with hacks, because the
storage of this first mbuf may be shared with other mbufs.

(martin)

2018-05-03 15:14:15 UTC netbsd-7 commitmail json YAML

2018-05-03 15:13:36 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1602):

sys/kern/uipc_mbuf.c: revision 1.211 (via patch)

Modify m_defrag, so that it never frees the first mbuf of the chain. While
here use the given 'flags' argument, and not M_DONTWAIT.

We have a problem with several drivers: they poll an mbuf chain from their
queues and call m_defrag on them, but m_defrag could update the mbuf
pointer, so the mbuf in the queue is no longer valid. It is not easy to
fix each driver, because doing pop+push will reorder the queue, and we
don't really want that to happen.

This problem was independently spotted by me, Kengo, Masanobu, and other
people too it seems (perhaps PR/53218).

Now m_defrag leaves the first mbuf in place, and compresses the chain
only starting from the second mbuf in the chain.

It is important not to compress the first mbuf with hacks, because the
storage of this first mbuf may be shared with other mbufs.

(martin)

2018-05-03 15:09:43 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1601):

crypto/external/bsd/heimdal/dist/kdc/connect.c: revision 1.3

avoid busy-waiting on a dead child

(martin)

2018-05-03 15:08:54 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1601):

crypto/external/bsd/heimdal/dist/kdc/connect.c: revision 1.3

avoid busy-waiting on a dead child

(martin)

2018-05-03 15:08:09 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1601):

crypto/external/bsd/heimdal/dist/kdc/connect.c: revision 1.3

avoid busy-waiting on a dead child

(martin)

2018-05-03 15:05:46 UTC netbsd-6 commitmail json YAML

2018-05-03 15:05:21 UTC netbsd-6-1 commitmail json YAML

2018-05-03 15:04:51 UTC netbsd-6-0 commitmail json YAML

2018-05-03 15:02:57 UTC netbsd-6-0 commitmail json YAML

2018-05-03 15:02:30 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1547):

sys/kern/uipc_mbuf.c: revision 1.211 (via patch)

Modify m_defrag, so that it never frees the first mbuf of the chain. While
here use the given 'flags' argument, and not M_DONTWAIT.

We have a problem with several drivers: they poll an mbuf chain from their
queues and call m_defrag on them, but m_defrag could update the mbuf
pointer, so the mbuf in the queue is no longer valid. It is not easy to
fix each driver, because doing pop+push will reorder the queue, and we
don't really want that to happen.

This problem was independently spotted by me, Kengo, Masanobu, and other
people too it seems (perhaps PR/53218).

Now m_defrag leaves the first mbuf in place, and compresses the chain
only starting from the second mbuf in the chain.

It is important not to compress the first mbuf with hacks, because the
storage of this first mbuf may be shared with other mbufs.

(martin)

2018-05-03 15:01:58 UTC netbsd-6-1 commitmail json YAML

2018-05-03 15:01:20 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1547):

sys/kern/uipc_mbuf.c: revision 1.211 (via patch)

Modify m_defrag, so that it never frees the first mbuf of the chain. While
here use the given 'flags' argument, and not M_DONTWAIT.

We have a problem with several drivers: they poll an mbuf chain from their
queues and call m_defrag on them, but m_defrag could update the mbuf
pointer, so the mbuf in the queue is no longer valid. It is not easy to
fix each driver, because doing pop+push will reorder the queue, and we
don't really want that to happen.

This problem was independently spotted by me, Kengo, Masanobu, and other
people too it seems (perhaps PR/53218).

Now m_defrag leaves the first mbuf in place, and compresses the chain
only starting from the second mbuf in the chain.

It is important not to compress the first mbuf with hacks, because the
storage of this first mbuf may be shared with other mbufs.

(martin)

2018-05-03 15:00:38 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1547):

sys/kern/uipc_mbuf.c: revision 1.211 (via patch)

Modify m_defrag, so that it never frees the first mbuf of the chain. While
here use the given 'flags' argument, and not M_DONTWAIT.

We have a problem with several drivers: they poll an mbuf chain from their
queues and call m_defrag on them, but m_defrag could update the mbuf
pointer, so the mbuf in the queue is no longer valid. It is not easy to
fix each driver, because doing pop+push will reorder the queue, and we
don't really want that to happen.

This problem was independently spotted by me, Kengo, Masanobu, and other
people too it seems (perhaps PR/53218).

Now m_defrag leaves the first mbuf in place, and compresses the chain
only starting from the second mbuf in the chain.

It is important not to compress the first mbuf with hacks, because the
storage of this first mbuf may be shared with other mbufs.

(martin)

2018-05-03 14:58:46 UTC netbsd-6 commitmail json YAML

2018-05-03 14:49:50 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1600):

sys/netipsec/ipsec_output.c: revision 1.67,1.75 (via patch)

Strengthen this check, to make sure there is room for an ip6_ext structure.
Seems possible to crash m_copydata here (but I didn't test more than that).

Fix the checks in compute_ipsec_pos, otherwise m_copydata could crash. I
already fixed half of the problem two months ago in rev1.67, back then I
thought it was not triggerable because each packet we emit is guaranteed
to have correctly formed IPv6 options; but it is actually triggerable via
IPv6 forwarding, we emit a packet we just received, and we don't sanitize
its options before invoking IPsec.

Since it would be wrong to just stop the iteration and continue the IPsec
processing, allow compute_ipsec_pos to fail, and when it does, drop the
packet entirely.

(martin)

2018-05-03 14:48:26 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1600):

sys/netipsec/ipsec_output.c: revision 1.67,1.75 (via patch)

Strengthen this check, to make sure there is room for an ip6_ext structure.
Seems possible to crash m_copydata here (but I didn't test more than that).

Fix the checks in compute_ipsec_pos, otherwise m_copydata could crash. I
already fixed half of the problem two months ago in rev1.67, back then I
thought it was not triggerable because each packet we emit is guaranteed
to have correctly formed IPv6 options; but it is actually triggerable via
IPv6 forwarding, we emit a packet we just received, and we don't sanitize
its options before invoking IPsec.

Since it would be wrong to just stop the iteration and continue the IPsec
processing, allow compute_ipsec_pos to fail, and when it does, drop the
packet entirely.

(martin)

2018-05-03 14:47:22 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1600):

sys/netipsec/ipsec_output.c: revision 1.67,1.75 (via patch)

Strengthen this check, to make sure there is room for an ip6_ext structure.
Seems possible to crash m_copydata here (but I didn't test more than that).

Fix the checks in compute_ipsec_pos, otherwise m_copydata could crash. I
already fixed half of the problem two months ago in rev1.67, back then I
thought it was not triggerable because each packet we emit is guaranteed
to have correctly formed IPv6 options; but it is actually triggerable via
IPv6 forwarding, we emit a packet we just received, and we don't sanitize
its options before invoking IPsec.

Since it would be wrong to just stop the iteration and continue the IPsec
processing, allow compute_ipsec_pos to fail, and when it does, drop the
packet entirely.

(martin)

2018-05-03 14:37:25 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1546):

sys/netipsec/ipsec_output.c: revision 1.67,1.75 (via patch)

Strengthen this check, to make sure there is room for an ip6_ext structure.
Seems possible to crash m_copydata here (but I didn't test more than that).

Fix the checks in compute_ipsec_pos, otherwise m_copydata could crash. I
already fixed half of the problem two months ago in rev1.67, back then I
thought it was not triggerable because each packet we emit is guaranteed
to have correctly formed IPv6 options; but it is actually triggerable via
IPv6 forwarding, we emit a packet we just received, and we don't sanitize
its options before invoking IPsec.

Since it would be wrong to just stop the iteration and continue the IPsec
processing, allow compute_ipsec_pos to fail, and when it does, drop the
packet entirely.

(martin)

2018-05-03 14:36:30 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1546):

sys/netipsec/ipsec_output.c: revision 1.67,1.75 (via patch)

Strengthen this check, to make sure there is room for an ip6_ext structure.
Seems possible to crash m_copydata here (but I didn't test more than that).

Fix the checks in compute_ipsec_pos, otherwise m_copydata could crash. I
already fixed half of the problem two months ago in rev1.67, back then I
thought it was not triggerable because each packet we emit is guaranteed
to have correctly formed IPv6 options; but it is actually triggerable via
IPv6 forwarding, we emit a packet we just received, and we don't sanitize
its options before invoking IPsec.

Since it would be wrong to just stop the iteration and continue the IPsec
processing, allow compute_ipsec_pos to fail, and when it does, drop the
packet entirely.

(martin)

2018-05-03 14:33:30 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1546):

sys/netipsec/ipsec_output.c: revision 1.67,1.75 (via patch)

Strengthen this check, to make sure there is room for an ip6_ext structure.
Seems possible to crash m_copydata here (but I didn't test more than that).

Fix the checks in compute_ipsec_pos, otherwise m_copydata could crash. I
already fixed half of the problem two months ago in rev1.67, back then I
thought it was not triggerable because each packet we emit is guaranteed
to have correctly formed IPv6 options; but it is actually triggerable via
IPv6 forwarding, we emit a packet we just received, and we don't sanitize
its options before invoking IPsec.

Since it would be wrong to just stop the iteration and continue the IPsec
processing, allow compute_ipsec_pos to fail, and when it does, drop the
packet entirely.

(martin)

2018-05-03 08:39:28 UTC MAIN commitmail json YAML

Remove unused M_MAXCOMPRESS macro.

(maxv)

2018-05-03 08:14:29 UTC MAIN commitmail json YAML

Fix comment, M_LOOP is not used for statistics, it's mostly used to avoid
recomputing the checksum when the packet is received on loopback.

(maxv)

2018-05-03 07:46:17 UTC MAIN commitmail json YAML

Revert my rev1.190, remove the M_READONLY check. The initial code was
correct: what is read-only is the mbuf storage, not the mbuf itself. The
storage contains the packet payload, and never has anything related to
mbufs. So it is fine to remove M_PKTHDR on mbufs that have a read-only
storage.

In fact it was kind of obvious, since several places already manually
remove M_PKTHDR without taking care of the external storage.

(maxv)

2018-05-03 07:28:44 UTC MAIN commitmail json YAML

nfsrv_readlink: stop attaching a zero-length mbuf for zero length symlinks.

(hannken)

2018-05-03 07:25:50 UTC MAIN commitmail json YAML

Rename m_pkthdr_remove -> m_remove_pkthdr, to match the existing naming
convention, eg m_copy_pkthdr and m_move_pkthdr.

(maxv)

2018-05-03 07:13:49 UTC MAIN commitmail json YAML

2018-05-03 07:01:08 UTC MAIN commitmail json YAML

2018-05-03 06:41:30 UTC MAIN commitmail json YAML

Remove net_osdep.h completely.

(maxv)

2018-05-03 05:14:55 UTC MAIN commitmail json YAML

Sync usage with manpage.

(wiz)

2018-05-03 05:13:20 UTC MAIN commitmail json YAML

Merge options without arguments in synopsis.

(wiz)

2018-05-03 05:11:43 UTC MAIN commitmail json YAML

Remove Pps without effect.

(wiz)

2018-05-03 05:09:48 UTC MAIN commitmail json YAML

Sort sections. Sort ERRORS. Remove trailing whitespace.

(wiz)

2018-05-03 04:22:18 UTC MAIN commitmail json YAML

2018-05-03 04:21:10 UTC MAIN commitmail json YAML

Add some broadcom 802.11ac wifi devices

(maya)

2018-05-03 02:10:17 UTC MAIN commitmail json YAML

Add support for poweroff and the power on-off key (POK).

(jmcneill)

2018-05-03 02:08:52 UTC MAIN commitmail json YAML

Use IPL_VM for bus lock so we can do i2c xfers from interrupt context

(jmcneill)

2018-05-03 01:32:17 UTC MAIN commitmail json YAML

2018-05-03 01:17:04 UTC MAIN commitmail json YAML

2018-05-03 01:15:49 UTC MAIN commitmail json YAML

2018-05-03 01:14:54 UTC MAIN commitmail json YAML

2018-05-03 01:12:57 UTC MAIN commitmail json YAML

if just parsing don't try to read the uninitialised device name,
or display the unit number.

add a "-s" option that sends an ALL_SOUNDS_OFF midi event.  very
useful after an interrupted midiplay leaves notes on.

(mrg)

2018-05-03 01:12:26 UTC MAIN commitmail json YAML

Restore MAKEDOC. Fix a build failure on non NetBSD host.

(nonaka)

2018-05-03 01:09:05 UTC MAIN commitmail json YAML

need bsd.hostinit.mk before bsd.endian.mk

(christos)

2018-05-03 00:32:11 UTC MAIN commitmail json YAML

Simplify convoluted language, and remove incorrect statement
(that I added a while ago) about what is required by POSIX.

(kre)

2018-05-02 22:11:49 UTC MAIN commitmail json YAML

Note import of dhcpcd-7.0.4

(roy)

2018-05-02 22:08:45 UTC MAIN commitmail json YAML

2018-05-02 22:07:37 UTC MAIN commitmail json YAML

don't pull in pic_u3_ht with uninorth - it's part of ibmcpc

(macallan)

2018-05-02 21:43:38 UTC MAIN commitmail json YAML

Minor grammatical correction (don't end a sentence/phrase with a
preposition).

(pgoyette)

2018-05-02 21:20:58 UTC MAIN commitmail json YAML

2018-05-02 21:20:20 UTC MAIN commitmail json YAML

Add driver for Allwinner NMI / R_INTC interrupt controller.

(jmcneill)

2018-05-02 18:46:05 UTC MAIN commitmail json YAML

Add new ATF Undefined Behavior Sanitizer tests

Add new cc and c++ tests to check whether UBSan works.
These tests are prepared for GCC (in base) and Clang (with external patches).

Enable these tests for all ports by default, just verify whether we are
using GCC/Clang or a compatible compiler.

Add five equivalent C and C++ tests:
- Integer addition overflow
- Integer divide by zero
- Integer negation overflow
- Integer subtraction overflow
- VLA out of bounds

All tests pass on NetBSD/amd64.

Patch submitted by <Harry Pantazis>
Minor cleanup by <myself>

(kamil)

2018-05-02 16:00:20 UTC MAIN commitmail json YAML

Explain PROT_MPROTECT better, add references to mremap(2), document the
unimplemented flags, documented the alignment pre-defined constants.

(christos)

2018-05-02 15:25:13 UTC MAIN commitmail json YAML

Add EXAMPLE and ERRORS section.

(christos)

2018-05-02 14:43:59 UTC MAIN commitmail json YAML

Use crypto code from openssl. Fixes PR bin/53250, suggested by Christos.

(martin)

2018-05-02 12:12:13 UTC MAIN commitmail json YAML

2018-05-02 11:02:42 UTC MAIN commitmail json YAML

2018-05-02 11:02:21 UTC MAIN commitmail json YAML

2018-05-02 10:09:16 UTC MAIN commitmail json YAML

2018-05-02 10:06:56 UTC MAIN commitmail json YAML

2018-05-02 09:55:22 UTC MAIN commitmail json YAML

"Root Hub" -> "root hub" for consistency with other HC drivers

(jmcneill)

2018-05-02 08:45:03 UTC MAIN commitmail json YAML

Add '*' and '[' to the list of characters which need escaping during autocompletion

(abhinav)

2018-05-02 08:24:40 UTC MAIN commitmail json YAML

Fixed non-critical typo in tlbdsmiss: %r8 -> 8.

(phx)

2018-05-02 07:34:44 UTC MAIN commitmail json YAML

Re-add files that were accidentally deleted in my previous commit.

(pgoyette)

2018-05-02 07:20:28 UTC pgoyette-compat commitmail json YAML

2018-05-02 00:14:57 UTC MAIN commitmail json YAML

arm: Add support for Allwinner H6 SoC.

(jmcneill)

2018-05-02 00:03:27 UTC MAIN commitmail json YAML

Unbreak script for Lua 5.3.
This change breaks support for older releases of Lua.

(sevan)

2018-05-02 00:02:15 UTC MAIN commitmail json YAML

2018-05-02 00:02:06 UTC MAIN commitmail json YAML

Add sunxiusb3phy and xhci

(jmcneill)

2018-05-02 00:00:30 UTC MAIN commitmail json YAML

Pass the expected httpd instance when calling set_pref()
process_request() only takes a single argument.

(sevan)

2018-05-01 23:59:42 UTC MAIN commitmail json YAML

2018-05-01 23:59:15 UTC MAIN commitmail json YAML

2018-05-01 23:51:53 UTC MAIN commitmail json YAML

Enable checking arguments for validity.
Remove disabled code.
Fix function parameters.
Add support for Lua 5.3

(sevan)

2018-05-01 23:41:51 UTC MAIN commitmail json YAML

Register a missing file in the distribution sets

Add ./usr/share/man/cat3lua/netpgp.0 for cat-pages.

(kamil)

2018-05-01 21:28:39 UTC MAIN commitmail json YAML

Change return type of pm_lvm_find() from int to void.
It always returns (returned) 0 which was ignored by the one call.

(kre)

2018-05-01 21:26:41 UTC MAIN commitmail json YAML

PR install/53220

Don't call pm_lvm_find() unless have_lvm

pm_lvm_find() assumes that data structs (lvms) has been allocated
for it to use, which doesn't happen if !have_lvm

This avoids a sysinst core dump when the lvm command is not installed
(such as when installing from the embedded RAM root filesys in an
INSTALL kernel.)

(kre)

2018-05-01 21:18:23 UTC MAIN commitmail json YAML

Explicitly select external PHY on H6

(jmcneill)

2018-05-01 21:16:02 UTC MAIN commitmail json YAML

Spello.  (it is "existence").

ispell also says that we should s/parseable/parsable/ but I'm
not sure about that one, so I left it.

I also left a correct spelling that no-one has bothered to mangle!

(kre)

2018-05-01 21:04:01 UTC MAIN commitmail json YAML

Bump date for new EXIT STATUS section.

(wiz)

2018-05-01 21:03:37 UTC MAIN commitmail json YAML

Sort sections.

(wiz)

2018-05-01 20:15:12 UTC MAIN commitmail json YAML

2018-05-01 20:06:13 UTC MAIN commitmail json YAML

2018-05-01 19:59:48 UTC MAIN commitmail json YAML

Create a new bsd.hostinit.mk file and put the build definitions for all host
programs there; make all Makefiles that use bsd.hostprog.mk include it.
Namely turn off MKREPRO and don't make lint, man pages, info files etc.
Remove the Makefile.inc files that contained these same settings, and
remove the settings from Makefile.host

(christos)

2018-05-01 19:53:14 UTC MAIN commitmail json YAML

2018-05-01 19:50:34 UTC MAIN commitmail json YAML

Add the netpgp lua bindings so that the compat build can build them.

(christos)

2018-05-01 17:42:01 UTC MAIN commitmail json YAML

Apply the same fixes from the regular tools dir:

PR/53238: Robert Elz: Disable MKREPRO in tools; the host compiler might
not support the necessary options. This is done thusly:

1. Create Makefile.inc and set MKREPRO=no in it. Change the Makefiles that
  include bsd.own.mk, to include bsd.init.mk which includes Makefile.inc
  first. This will also allow us to control other tools options from a
  single location if we need to.
2. Centralize NOMAN handling.

XXX: pullup-8

(christos)

2018-05-01 16:37:23 UTC MAIN commitmail json YAML

Implement PTRACE_VFORK

Add support for tracing vfork(2) events in the context of ptrace(2).

This API covers other frontends to fork1(9) like posix_spawn(2) or clone(2),
if they cause parent to wait for exec(2) or exit(2) of the child.

Changes:
- Add new argument to sigswitch() determining whether we need to acquire
  the proc_lock or whether it's already held.
- Refactor fork1(9) for fork(2) and vfork(2)-like events.
  Call sigswitch() from fork(1) for forking or vforking parent, instead of
  emitting kpsignal(9). We need to emit the signal and suspend the parent,
  returning to user and relock proc_lock.
- Add missing prototype for proc_stop_done() in kern_sig.c.
- Make sigswitch a public function accessible from other kernel code
  including <sys/signalvar.h>.
- Remove an entry about unimplemented PTRACE_VFORK in the ptrace(2) man page.
- Permin PTRACE_VFORK in the ptrace(2) frontend for userland.
- Remove expected failure for unimplemented PTRACE_VFORK tests in the ATF
  ptrace(2) test-suite.
- Relax signal routing constraints under a debugger for a vfork(2)ed child.
  This intended to protect from signaling a parent of a vfork(2)ed child that
  called PT_TRACE_ME, but wrongly misrouted other signals in vfork(2)
  use-cases.

Add XXX comments about still existing problems and future enhancements:
- correct vfork(2) + PT_TRACE_ME handling.
- fork1(2) handling of scenarios when a process is collected in valid but
  rare cases.

All ATF ptrace(2) fork[1-8] and vfork[1-8] tests pass.

Fix PR kern/51630 by Kamil Rytarowski (myself).

Sponsored by <The NetBSD Foundation>

(kamil)

2018-05-01 16:18:13 UTC MAIN commitmail json YAML

2018-05-01 16:16:05 UTC MAIN commitmail json YAML

Fix ALL configs following MPVERBOSE becoming a defparam

XXX i386 ALL kernel build is failing

(maya)

2018-05-01 14:09:53 UTC MAIN commitmail json YAML

Add additional hardening in PT_TRACE_ME and PT_ATTACH

Prohibit:
- calling PT_TRACE_ME by initproc (PID1),
- calling PT_ATTACH by initproc (PID1).

PID1 and its parent cannot become a tracer.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-05-01 13:48:38 UTC MAIN commitmail json YAML

Improve the proc_stoptrace() function

proc_stoptrace() is dedicated for emitting a syscall trap for a debugger,
either on entry or exit of the system function routine.

Changes:
- Change an if() branch of an invalid condition of being traced by
  initproc (PID1) to KASSERT(9).
- Assert that the current process has set appropriate flags (PSL_TRACED
  and PSL_SYSCALL).
- Use ktrpoint(KTR_PSIG) and ktrpsig()/e_ktrpsig() in order to register
  the emitted signal for the ktrace(1) event debugging.

Example of the new output from kdump(1) for the syscall debugger traps,
containing SIGTRAP notification with TRAP_SCE and TRAP_SCX (around
the getpid(2) call).

$ kdump /tmp/1.dat.qemu |grep 663
  588      1 t_ptrace_waitpid RET  fork 663/0x297
  663      1 t_ptrace_waitpid EMUL  "netbsd"
  663      1 t_ptrace_waitpid RET  fork 0
  663      1 t_ptrace_waitpid CALL  ptrace(PT_TRACE_ME,0,0,0)
  663      1 t_ptrace_waitpid RET  ptrace 0
  663      1 t_ptrace_waitpid CALL  _lwp_self
  663      1 t_ptrace_waitpid RET  _lwp_self 1
  663      1 t_ptrace_waitpid CALL  _lwp_kill(1,0x11)
  663      1 t_ptrace_waitpid RET  _lwp_kill 0
  588      1 t_ptrace_waitpid RET  __wait450 663/0x297
  663      1 t_ptrace_waitpid CALL  getpid
  588      1 t_ptrace_waitpid RET  __wait450 663/0x297
  663      1 t_ptrace_waitpid PSIG  SIGTRAP SIG_DFL: code=TRAP_SCE, addr=0x0, trap=0)
  663      1 t_ptrace_waitpid RET  getpid 663/0x297, 588/0x24c
  588      1 t_ptrace_waitpid RET  __wait450 663/0x297
  663      1 t_ptrace_waitpid PSIG  SIGTRAP SIG_DFL: code=TRAP_SCX, addr=0x0, trap=0)
  663      1 t_ptrace_waitpid CALL  exit(5)
  588      1 t_ptrace_waitpid RET  __wait450 663/0x297

Sponsored by <The NetBSD Foundation>

(kamil)

2018-05-01 12:38:40 UTC MAIN commitmail json YAML

2018-05-01 10:15:27 UTC MAIN commitmail json YAML

Make MPVERBOSE a defparam rather than defflag.  It has multiple
non-zero usages within mpacpi.c

(pgoyette)

2018-05-01 10:10:31 UTC MAIN commitmail json YAML

fix define of CPU IDs
* fix incorrect CPU_ID of APM/APPLE
* add CPU_ID of SAMSUNG
* fix typo about BROADCOM

(ryo)

2018-05-01 09:03:49 UTC MAIN commitmail json YAML

Fix missed s/vnconfig/vndconfig/ in an example.

(uwe)

2018-05-01 09:01:46 UTC MAIN commitmail json YAML

Simplify and get rid of external "grep" dependency which is not available
on all install meadia.
Sugested by kre.

(martin)

2018-05-01 08:42:41 UTC MAIN commitmail json YAML

Remove unused argument from udp4_espinudp, and remove unused includes.

(maxv)

2018-05-01 08:34:08 UTC MAIN commitmail json YAML

Remove some more dead code.

(maxv)

2018-05-01 08:27:39 UTC MAIN commitmail json YAML

vnconfig has been renamed to vndconfig. Pointed out by kre.

(martin)

2018-05-01 08:27:13 UTC MAIN commitmail json YAML

When IP6_EXTHDR_GET fails, return ENOBUFS, and don't log an error (HDROPS
is not supposed to be used here).

(maxv)

2018-05-01 08:17:13 UTC MAIN commitmail json YAML

Make the "gpt header" command return EXIT_FAILURE when no GPT is present.
This helps sysinst to tell a GPT labeled disk from others.
Very lazy version of a change proposed by kre.

(martin)

2018-05-01 08:16:34 UTC MAIN commitmail json YAML

When the replay check fails, return EACCES instead of ENOBUFS.

(maxv)

2018-05-01 08:13:37 UTC MAIN commitmail json YAML

Remove double include, opencrypto/xform.h is already included in
netipsec/xform.h.

(maxv)

2018-05-01 08:08:46 UTC MAIN commitmail json YAML

2018-05-01 07:21:39 UTC MAIN commitmail json YAML

2018-05-01 07:07:00 UTC MAIN commitmail json YAML

Remove unused alias to tcpiphdr.

(maxv)

2018-05-01 07:03:48 UTC MAIN commitmail json YAML

2018-05-01 07:03:33 UTC MAIN commitmail json YAML

Redefine the structure, not to rely on tcpiphdr.

(maxv)

2018-05-01 06:50:06 UTC MAIN commitmail json YAML

Move if_name() from net_osdep.h to if.h. net_osdep.h is now unused and can
be removed - the other BSDs did the same.

Discussed with Kengo (if.h suggested by him).

(maxv)

2018-05-01 05:42:26 UTC MAIN commitmail json YAML

Fix the checks in compute_ipsec_pos, otherwise m_copydata could crash. I
already fixed half of the problem two months ago in rev1.67, back then I
thought it was not triggerable because each packet we emit is guaranteed
to have correctly formed IPv6 options; but it is actually triggerable via
IPv6 forwarding, we emit a packet we just received, and we don't sanitize
its options before invoking IPsec.

Since it would be wrong to just stop the iteration and continue the IPsec
processing, allow compute_ipsec_pos to fail, and when it does, drop the
packet entirely.

(maxv)

2018-05-01 00:39:58 UTC MAIN commitmail json YAML

gmake: Revert configure r1.2 and configure.in r1.2.

> gmake: Apply patch to support GLIBC glob interface v2
>
> http://git.savannah.gnu.org/cgit/make.git/commit/?id=48c8a116
>
> Fix a build failure on Ubuntu 18.04.

Don't apply an imcompatible license patch.

(nonaka)

2018-05-01 00:36:58 UTC MAIN commitmail json YAML

gmake: Revert dir.c r.1.2.

> gmake: Make this work with glibc glob interface v2
>
> http://git.savannah.gnu.org/cgit/make.git/commit/?id=193f1e81

Don't apply an imcompatible license patch.

Reported by kamil@n.o.

(nonaka)

2018-05-01 00:04:36 UTC MAIN commitmail json YAML

PR/53238: Robert Elz: Disable MKREPRO in tools; the host compiler might
not support the necessary options. This is done thusly:

1. Set MKREPRO=no in Makefile.host. This handles all the Makefiles that
  use it and don't include bsd.own.mk.
2. Create Makefile.inc and set MKREPRO=no in it. Change the Makefiles that
  include bsd.own.mk, to include bsd.init.mk which includes Makefile.inc
  first. This will also allow us to control other tools options from a
  single location if we need to.

XXX: pullup-8

(christos)

2018-04-30 22:17:47 UTC MAIN commitmail json YAML

The secret key is required for decryption and signing. Indicate it by setting
the "need seckey" variable before calling init.

(sevan)

2018-04-30 21:40:59 UTC MAIN commitmail json YAML

Unbreak script for Lua 5.3.
This change breaks support for older releases of Lua but it is deemed ok.

(sevan)

2018-04-30 21:02:39 UTC MAIN commitmail json YAML

netpgp(3lua)

(sevan)

2018-04-30 20:37:01 UTC MAIN commitmail json YAML

titemp_match: filter on ia_addr for indirect config (device is expected at 0x4c)

(jmcneill)

2018-04-30 20:33:09 UTC MAIN commitmail json YAML

tcakp_match: filter on ia_addr for indirect config (device is expected at 0x34)

(jmcneill)

2018-04-30 20:26:09 UTC MAIN commitmail json YAML

act8846_match: filter on ia_addr (device is expected at 0x5a)

(jmcneill)

2018-04-30 09:59:10 UTC MAIN commitmail json YAML

Add missing netpgp.html (for new lua binding)

(martin)

2018-04-30 07:10:05 UTC MAIN commitmail json YAML

Fix copyright year. Fix whitespace, slightly improve wording.

(wiz)

2018-04-30 06:46:12 UTC MAIN commitmail json YAML

Kernel linker support for vax.  Now modules can be loaded again.
XXX - should keep modules on physical segment instead of in KVM.

(ragge)

2018-04-30 05:23:08 UTC MAIN commitmail json YAML

Fix typo in Makefile to fix build.

(htodd)

2018-04-30 05:04:34 UTC MAIN commitmail json YAML

add missing KERNEL_LOCK protection around autoconf calls.

Also replace NULL argument with curlwp for style.

(mlelstv)

2018-04-30 04:17:27 UTC MAIN commitmail json YAML

2018-04-30 01:14:07 UTC MAIN commitmail json YAML

Remove set but not used sc_flags.

Built tested only.

(maya)

2018-04-30 01:10:14 UTC MAIN commitmail json YAML

2018-04-29 23:31:00 UTC MAIN commitmail json YAML

sign_file function expects 5 parameters, include the output filename.

(sevan)

2018-04-29 19:47:35 UTC MAIN commitmail json YAML

2018-04-29 19:34:57 UTC MAIN commitmail json YAML

2018-04-29 19:31:38 UTC MAIN commitmail json YAML

Enable checking arguments for validity.

(sevan)

2018-04-29 19:28:11 UTC MAIN commitmail json YAML

Utilise the passed output filename rather that using a hardcoded name

(sevan)

2018-04-29 19:01:16 UTC MAIN commitmail json YAML

Fix bug causing small constants not to be printed out.

(ragge)

2018-04-29 18:29:29 UTC MAIN commitmail json YAML

Install ARM ACLE and NEON intrinsics headers on aarch64.

(jmcneill)

2018-04-29 18:00:31 UTC MAIN commitmail json YAML

print the mprotect perm argument symbolically.

(christos)

2018-04-29 17:47:06 UTC MAIN commitmail json YAML

2018-04-29 15:59:07 UTC MAIN commitmail json YAML

fix the build: tcpiphdr is now defined in tcp_var.h and tcp_var.h needs
tcp_timer.h. This struct move is more trouble than its worth. It breaks
header compatibility with other BSD's and can't be really removed because
it is an installed header that will break other 3rd party software. I
suggest that it gets reverted!

(christos)

2018-04-29 15:47:01 UTC MAIN commitmail json YAML

keep going if there is a CVS directory already, but warn

(christos)

2018-04-29 14:54:09 UTC MAIN commitmail json YAML

Remove useless icmp6.h include, remove manual externs and include in6.h
to get proper definitions, and remove duplicate logic in
ipsec6_common_input_cb.

(maxv)

2018-04-29 14:35:36 UTC MAIN commitmail json YAML

Remove obsolete/dead code, the IP-in-IP encapsulation doesn't work this
way anymore (XF_IP4 partly dropped by FAST_IPSEC).

(maxv)

2018-04-29 14:21:16 UTC MAIN commitmail json YAML

Add the following functions to the list (TODO - add descriptions)
netpgp_unsetvar
netpgp_list_keys_json
netpgp_match_keys
netpgp_match_keys_json
netpgp_match_pubkeys
netpgp_validate_sigs
netpgp_format_json

Remove netpgp_match_list_keys() as function does not exist

Add missing output file to netpgp_verify_file() argument list

Sprinkle const to arguments

(sevan)

2018-04-29 13:56:01 UTC MAIN commitmail json YAML

Add two new ptrace(2) ATF tests

Added:

- traceme_pid1_parent
  Assert that a process cannot mark its parent a debugger twice

- traceme_twice
  Verify that PT_TRACE_ME is not allowed when our parent is PID1

All tests pass.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-04-29 12:12:42 UTC MAIN commitmail json YAML

Move struct tcpiphdr from tcpip.h to tcp_var.h, to match UDP (udpiphdr in
udp_var.h).

tcpip.h is now empty, and can be removed.

(maxv)

2018-04-29 12:07:05 UTC MAIN commitmail json YAML

fix KASSERT panic. pv_entry may not be exists in pvlist when pmap_remove().

(ryo)

2018-04-29 12:05:39 UTC MAIN commitmail json YAML

2018-04-29 11:51:09 UTC MAIN commitmail json YAML

2018-04-29 11:42:09 UTC MAIN commitmail json YAML

Remove unused function.

(maxv)

2018-04-29 07:24:39 UTC MAIN commitmail json YAML

Remove duplicate prototype.

(maxv)

2018-04-29 07:16:29 UTC MAIN commitmail json YAML

Add missing pserialize_read_exit in error branch, spotted during my
previous commit.

(maxv)

2018-04-29 07:13:10 UTC MAIN commitmail json YAML

2018-04-29 07:05:13 UTC MAIN commitmail json YAML

Replace
m_copym(m, 0, M_COPYALL, M_DONTWAIT)
by
m_copypacket(m, M_DONTWAIT)
when it is obvious that 'm' has M_PKTHDR set.

(maxv)

2018-04-29 06:52:55 UTC MAIN commitmail json YAML

Add KASSERTs in the rcvif functions.

(maxv)

2018-04-29 05:36:04 UTC MAIN commitmail json YAML

avoid busy-waiting on a dead child

(spz)

2018-04-29 04:28:10 UTC MAIN commitmail json YAML

Harden the NetBSD PT_TRACE_ME operation

You can't say to the parent of a process to start tracing if:
(1) the parent is initproc,
(2) the child is already traced.

Rationale:
(1) - It has a side effect of being an anti-debugger functionality,
      as we cannot kill initproc (PID1) and reset the traced flag.
    - initproc is not a debugger, raising debugging events from a child
      to initproc can result in at least a stopped/hanging process
      in the system.
(2) - It does not make sense to be simultanously traced by two debuggers.
    - It does not make sense to be traced twice by the same debugger.

Permit enable tracing for a parent that has been chroot(8)ed, as this is
harmless and the parent is already monitoring for child signals.

The same semantics exist in FreeBSD.

If you are looking for an antidebugging trick for old NetBSD (pre 8.0)
or other popular kernels, here is an example:

$ cat antidebug.c
#include <sys/types.h>
#include <sys/ptrace.h>

#include <stdlib.h>
#include <unistd.h>
#include <stdio.h>
#include <errno.h>

int
main(int argc, char **argv)
{
pid_t child;
int rv;
int n = 0;

child = fork();
if (child == 0) {
while (getppid() != 1)
continue;
rv = ptrace(PT_TRACE_ME, 0, 0, 0);
if (rv != 0)
abort();
printf("Try to detach to me with a debugger!! ");
printf("haha My PID is %d\n", getpid());
while (1) {
printf("%d\n", n++);
sleep(1);
}
}
exit(0);
}

A developer is no longer able to attach GDB, strace or LLDB to this program
without killing the initproc (your favourite system daemon).. this action
would be fatal for the operation of the whole Operating System stability.

Examples from a current non-NetBSD popular kernel:

$ ps -o ppid= -p 17904
    1

$ strace -p 17904
strace: attach: ptrace(PTRACE_SEIZE, 17904): Operation not permitted

$ gdb -p 17904
[...]
Attaching to process 17904
warning: process 17904 is already traced by process 1
ptrace: Operation not permitted.
(gdb)

$ lldb-3.9 -p 17904
(lldb) process attach --pid 17904
error: attach failed: unable to attach

On NetBSD 8.0 and newer it is now guaranteed to have an option to kill
a malevolent (fake?) debugger and attach with a new tracer to the process.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-04-28 20:35:05 UTC MAIN commitmail json YAML

2018-04-28 20:30:50 UTC MAIN commitmail json YAML

Enable Allwinner SID and thermal sensor controller

(jmcneill)

2018-04-28 19:00:26 UTC MAIN commitmail json YAML

Enable traceme_raise1 in the ATF ptrace(2) tests

This test checks raise(SIGKILL). If we enter the kernel with this signal
we report a signaled child in a debugger, not stopped with an option to
make an action.

FreeBSD behaves differently and allows intercepting this event in a tracer.
Follow the Linux behavior.

If we really want to prevent raise(SIGKILL) from signaling the tracee, we
still can breakpoint raise(3) and alter the syscall arguments (or use
the PT_SYSCALL mode). If we are already in the kernel, SIGKILL always means
killing the process, whether or not traced and the source of SIGKILL.

This tests passes on NetBSD without kernel changes.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-04-28 18:47:53 UTC MAIN commitmail json YAML

Add sun7i-a20-olimex-som204-evb-emmc.dts, sun7i-a20-olimex-som204-evb.dts, sun8i-h2-plus-bananapi-m2-zero.dts, sun8i-h2-plus-orangepi-r1.dts, sun8i-h3-libretech-all-h3-cc.dts, sun50i-a64-teres-i.dts, sun50i-h5-orangepi-zero-plus.dts

(jmcneill)

2018-04-28 18:42:20 UTC MAIN commitmail json YAML

Add sun50i-a64-teres-i.dts, sun50i-h5-orangepi-zero-plus.dts

(jmcneill)

2018-04-28 18:29:21 UTC MAIN commitmail json YAML

Update to Linux dts 4.17-rc2

(jmcneill)

2018-04-28 18:28:26 UTC MAIN commitmail json YAML

2018-04-28 18:26:53 UTC MAIN commitmail json YAML

Cover all pic_maxsources lines for armgic_cpu_init_priorities() and
armgic_cpu_update_priorities().

Previously only the first 32 lines were covered, which is significantly
less than the 1000-some interrupt lines possible.

Only relevant to MULTIPROCESSOR configurations.

(jakllsch)

2018-04-28 18:07:15 UTC MAIN commitmail json YAML

Refactor the traceme3 ATF ptrace(2) test

Replace traceme3 with new ATF tests using diverse signals:

- traceme_signal_nohandler1 SIGKILL
- traceme_signal_nohandler2 SIGSTOP (temporarily disabled)
- traceme_signal_nohandler3 SIGABRT (emits core dump)
- traceme_signal_nohandler4 SIGHUP
- traceme_signal_nohandler5 SIGCONT

These SIGSTOP test does not work properly right now as it unstops the
traccee.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-04-28 17:56:55 UTC MAIN commitmail json YAML

Handle core dumps in ATF ptrace(2) tests easier

Cast WCOREDUMP() to either 1 or 0.

It could be changed to a boolean type, but it's already good enough.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-04-28 17:42:07 UTC MAIN commitmail json YAML

Oops, my previous commit is totally wrong. recast mask/pattern list.
pointed out by David Binderman in PR/53224, thanks.

(ryo)

2018-04-28 15:45:16 UTC MAIN commitmail json YAML

2018-04-28 15:21:24 UTC MAIN commitmail json YAML

Initialize clk domain name and call clk_attach to register sysctl nodes

(jmcneill)

2018-04-28 15:21:05 UTC MAIN commitmail json YAML

Initialize clk domain name and call clk_attach to register sysctl nodes

(jmcneill)

2018-04-28 15:20:33 UTC MAIN commitmail json YAML

Create private sysctl nodes for inspecting clock trees.

(jmcneill)

2018-04-28 14:39:34 UTC MAIN commitmail json YAML

Inline M_EXT_WRITABLE directly, and remove the XXX, there's nothing wrong
in the use of !M_READONLY.

(maxv)

2018-04-28 14:25:56 UTC MAIN commitmail json YAML

Move the ipsec6_input prototype into ipsec6.h, and style.

(maxv)

2018-04-28 14:21:04 UTC MAIN commitmail json YAML

Stop using a macro, rename the function to ipsec_init_pcbpolicy directly.

(maxv)

2018-04-28 14:01:51 UTC MAIN commitmail json YAML

2018-04-28 13:44:19 UTC MAIN commitmail json YAML

Fix the net.inet6.ipsec6.def_policy node, the variable should be
&ip6_def_policy.policy, otherwise we're overwriting other fields of the
structure.

(maxv)

2018-04-28 13:38:00 UTC MAIN commitmail json YAML

Add -f option to ftpd to stay in foreground with -D.

From nia in PR bin/53221.

(riastradh)

2018-04-28 13:26:57 UTC MAIN commitmail json YAML

2018-04-28 13:23:18 UTC MAIN commitmail json YAML

2018-04-28 12:45:03 UTC MAIN commitmail json YAML

Create bpf and openfirm devices

(jmcneill)

2018-04-28 12:33:17 UTC MAIN commitmail json YAML

Define __HAVE_OLD_DISKLABEL for compatibility with the arm32 port.

(jmcneill)