Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (12m)  netbsd-8 (6d)  netbsd-10 (6d)  netbsd-9 (12d)  thorpej-ifq (176d)  thorpej-altq-separation (178d) 

2024-05-10 20:20:30 UTC Now

2018-03-14 07:56:32 UTC MAIN commitmail json YAML

Fix error checking in in6_gif_ctlinput().

if_gif.c:r1.133 introduces gif_update_variant() which ensure ifp->if_flags
is set IFF_RUNNING when gif_softc->gif_var->gv_{psrc,pdst} are not null.
So, in6_gif_ctlinput() is not required IFF_RUNNING checking. In contrast,
it is required gv_{psrc,pdst} NULL checking.

(knakahara)

2018-03-14 07:53:14 UTC MAIN commitmail json YAML

Remove Ic macro without effect.

(wiz)

2018-03-14 07:35:56 UTC MAIN commitmail json YAML

add xorgproto srcdir.

(mrg)

2018-03-14 07:23:00 UTC MAIN commitmail json YAML

2018-03-14 07:19:26 UTC MAIN commitmail json YAML

2018-03-14 06:47:28 UTC MAIN commitmail json YAML

2018-03-14 06:43:46 UTC MAIN commitmail json YAML

2018-03-14 06:35:31 UTC MAIN commitmail json YAML

fix compile error on evbarm/EXYNOS. platform.h may be included from *.S

(ryo)

2018-03-14 06:06:40 UTC MAIN commitmail json YAML

build Tekparse.hin VTparse.hin normally.

(mrg)

2018-03-14 06:06:01 UTC MAIN commitmail json YAML

2018-03-14 06:04:47 UTC MAIN commitmail json YAML

2018-03-14 02:47:42 UTC pgoyette-compat commitmail json YAML

Update to describe module aliases.

(pgoyette)

2018-03-14 02:24:56 UTC pgoyette-compat commitmail json YAML

2018-03-14 02:13:47 UTC MAIN commitmail json YAML

Add new ATF tests: kernel/t_zombie

New tests attempting to kill, stop, drop or revive a zombie:
- signal1 (SIGKILL)
- signal2 (SIGSTOP)
- signal3 (SIGABRT)
- signal4 (SIGHUP)
- signal5 (SIGCONT)

New test race1 verifying whether there are any kernel races when processing
signals to zombies, executing in a loop for 5 seconds.

These tests were inspired by a kernel unexpected behavior when a lookup
of a dying process could result in two detected entities once as an alive
process and once as a zombie.

race1 is similar to t_ptrace_wait* race1, however without ptrace(2) involved.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-03-13 23:03:21 UTC MAIN commitmail json YAML

Try to improve markup in the Built-ins section.
Mostly sprinkle missing .Ic and .Ar

(uwe)

2018-03-13 21:59:51 UTC pgoyette-compat commitmail json YAML

Properly detect 'compat handler for SWAP_STATSxx not present' and return
EINVAL as we would for any other unsupported command.

(pgoyette)

2018-03-13 21:49:16 UTC MAIN commitmail json YAML

Try to improve markup in the Parameter Expansion section.

(uwe)

2018-03-13 21:04:57 UTC MAIN commitmail json YAML

Try to improve markup of the redirections definitions.

(uwe)

2018-03-13 20:48:00 UTC MAIN commitmail json YAML

Fix horrendous markup abuse in the here-document example.
Consistently spell "here-document" in full.

(uwe)

2018-03-13 20:40:52 UTC MAIN commitmail json YAML

Spell "here-document" with a hyphen, don't mark it up as a command.

(uwe)

2018-03-13 20:39:25 UTC MAIN commitmail json YAML

Mark up "in" (of the "for" command) appropriately.

(uwe)

2018-03-13 20:29:13 UTC MAIN commitmail json YAML

Use \(or not \*(Ba when discussing case patterns.

(uwe)

2018-03-13 20:18:16 UTC MAIN commitmail json YAML

Use \(em for em-dash

(uwe)

2018-03-13 20:08:11 UTC MAIN commitmail json YAML

Standalone | means \[ba] while we want \[or] so add \& protection to
the few places where it was missing.

(uwe)

2018-03-13 19:43:52 UTC MAIN commitmail json YAML

.Dl is a a single line .Bd -literal -offset indent so don't abuse
multiple consecutive .Dl and use proper .Bd instead.

(uwe)

2018-03-13 19:35:46 UTC MAIN commitmail json YAML

.Bd expects the display type to come first, so move -compact to the end.

(uwe)

2018-03-13 19:18:53 UTC MAIN commitmail json YAML

Add missing word.

(uwe)

2018-03-13 18:06:22 UTC netbsd-6 commitmail json YAML

1516, 1518-1520, 1522, 1532-1538

(snj)

2018-03-13 18:02:25 UTC netbsd-6-1 commitmail json YAML

1518-1520, 1532, 1535, 1536

(snj)

2018-03-13 17:59:51 UTC netbsd-6-0 commitmail json YAML

1518-1520, 1532, 1535, 1536

(snj)

2018-03-13 17:52:37 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by sevan in ticket #1538):
share/man/man4/altq.4: 1.3
Update URL for the cited paper

(snj)

2018-03-13 17:48:21 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by msaitoh in ticket #1537):
sys/dev/ppbus/if_plip.c: 1.28
spl leak, found by Mootja

(snj)

2018-03-13 17:47:14 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1536):
sys/netipsec/ipsec_input.c: 1.57-1.58
Extend these #ifdef notyet. The m_copydata's in these branches are wrong,
we are not guaranteed to have enough room for another struct ip, and we
may crash here. Triggerable remotely, but after authentication, by sending
an AH packet that has a one-byte-sized IPIP payload.
--
Argh, in my previous commit in this file I forgot to fix the IPv6
entry point; apply the same fix there.

(snj)

2018-03-13 17:47:13 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1536):
sys/netipsec/ipsec_input.c: 1.57-1.58
Extend these #ifdef notyet. The m_copydata's in these branches are wrong,
we are not guaranteed to have enough room for another struct ip, and we
may crash here. Triggerable remotely, but after authentication, by sending
an AH packet that has a one-byte-sized IPIP payload.
--
Argh, in my previous commit in this file I forgot to fix the IPv6
entry point; apply the same fix there.

(snj)

2018-03-13 17:47:11 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1536):
sys/netipsec/ipsec_input.c: 1.57-1.58
Extend these #ifdef notyet. The m_copydata's in these branches are wrong,
we are not guaranteed to have enough room for another struct ip, and we
may crash here. Triggerable remotely, but after authentication, by sending
an AH packet that has a one-byte-sized IPIP payload.
--
Argh, in my previous commit in this file I forgot to fix the IPv6
entry point; apply the same fix there.

(snj)

2018-03-13 17:42:41 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by uwe in ticket #1534):
sys/net/if_mpls.c: 1.31-1.33 via patch
sys/netmpls/mpls_ttl.c: 1.9 via patch
Style, and fix several bugs:
- ip4_check(), mpls_unlabel_inet() and mpls_unlabel_inet6() perform
  pullups, so we need to pass the updated pointers back
- in mpls_lse() the route is not always freed
Looks a little better now.
--
Kick MPLS packets earlier.
--
Several changes:
* In mpls_unlabel_inet, copy the label locally. It's not incorrect to
  keep a pointer on the mbuf, but it's bug-friendly.
* In mpls_label_inetX, fix the length check. Meanwhile add an XXX: we
  just want to make sure that m_copydata won't fail, but if we were
  guaranteed that m has M_PKTHDR set, we could simply check the length
  against m->m_pkthdr.len.

(snj)

2018-03-13 17:42:39 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by uwe in ticket #1534):
sys/net/if_mpls.c: 1.31-1.33 via patch
sys/netmpls/mpls_ttl.c: 1.9 via patch
Style, and fix several bugs:
- ip4_check(), mpls_unlabel_inet() and mpls_unlabel_inet6() perform
  pullups, so we need to pass the updated pointers back
- in mpls_lse() the route is not always freed
Looks a little better now.
--
Kick MPLS packets earlier.
--
Several changes:
* In mpls_unlabel_inet, copy the label locally. It's not incorrect to
  keep a pointer on the mbuf, but it's bug-friendly.
* In mpls_label_inetX, fix the length check. Meanwhile add an XXX: we
  just want to make sure that m_copydata won't fail, but if we were
  guaranteed that m has M_PKTHDR set, we could simply check the length
  against m->m_pkthdr.len.

(snj)

2018-03-13 17:42:37 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by uwe in ticket #1534):
sys/net/if_mpls.c: 1.31-1.33 via patch
sys/netmpls/mpls_ttl.c: 1.9 via patch
Style, and fix several bugs:
- ip4_check(), mpls_unlabel_inet() and mpls_unlabel_inet6() perform
  pullups, so we need to pass the updated pointers back
- in mpls_lse() the route is not always freed
Looks a little better now.
--
Kick MPLS packets earlier.
--
Several changes:
* In mpls_unlabel_inet, copy the label locally. It's not incorrect to
  keep a pointer on the mbuf, but it's bug-friendly.
* In mpls_label_inetX, fix the length check. Meanwhile add an XXX: we
  just want to make sure that m_copydata won't fail, but if we were
  guaranteed that m has M_PKTHDR set, we could simply check the length
  against m->m_pkthdr.len.

(snj)

2018-03-13 17:27:39 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by uwe in ticket #1534):
lib/libc/arch/powerpc/genassym.cf: 1.5 via patch
lib/libc/arch/powerpc/gen/swapcontext.S: 1.8 via patch
PIC code clobbers %r30 so we need to update the saved oucp with
caller's %r30 manually.  Makes old context happy when it needs to do
more function calls after restore.

(snj)

2018-03-13 17:20:25 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by msaitoh in ticket #1533):
sys/dev/sbus/be.c: 1.86
spl leak, found by Mootja a long time ago

(snj)

2018-03-13 17:18:16 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1532):
sys/netipsec/xform_ah.c: 1.77 via patch
sys/netipsec/xform_esp.c: 1.73 via patch
sys/netipsec/xform_ipip.c: 1.56-1.57 via patch
Reinforce and clarify.
--
Add missing NULL check. Normally that's not triggerable remotely, since we
are guaranteed that 8 bytes are valid at mbuf+skip.
--
Fix use-after-free. There is a path where the mbuf gets pulled up without
a proper mtod afterwards:
218    ipo = mtod(m, struct ip *);
281    m = m_pullup(m, hlen);
232    ipo->ip_src.s_addr
Found by Mootja.
Meanwhile it seems to me that 'ipo' should be set to NULL if the inner
packet is IPv6, but I'll revisit that later.
--
As I said in my last commit in this file, ipo should be set to NULL;
otherwise the 'local address spoofing' check below is always wrong on
IPv6.

(snj)

2018-03-13 17:18:14 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1532):
sys/netipsec/xform_ah.c: 1.77 via patch
sys/netipsec/xform_esp.c: 1.73 via patch
sys/netipsec/xform_ipip.c: 1.56-1.57 via patch
Reinforce and clarify.
--
Add missing NULL check. Normally that's not triggerable remotely, since we
are guaranteed that 8 bytes are valid at mbuf+skip.
--
Fix use-after-free. There is a path where the mbuf gets pulled up without
a proper mtod afterwards:
218    ipo = mtod(m, struct ip *);
281    m = m_pullup(m, hlen);
232    ipo->ip_src.s_addr
Found by Mootja.
Meanwhile it seems to me that 'ipo' should be set to NULL if the inner
packet is IPv6, but I'll revisit that later.
--
As I said in my last commit in this file, ipo should be set to NULL;
otherwise the 'local address spoofing' check below is always wrong on
IPv6.

(snj)

2018-03-13 17:18:12 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1532):
sys/netipsec/xform_ah.c: 1.77 via patch
sys/netipsec/xform_esp.c: 1.73 via patch
sys/netipsec/xform_ipip.c: 1.56-1.57 via patch
Reinforce and clarify.
--
Add missing NULL check. Normally that's not triggerable remotely, since we
are guaranteed that 8 bytes are valid at mbuf+skip.
--
Fix use-after-free. There is a path where the mbuf gets pulled up without
a proper mtod afterwards:
218    ipo = mtod(m, struct ip *);
281    m = m_pullup(m, hlen);
232    ipo->ip_src.s_addr
Found by Mootja.
Meanwhile it seems to me that 'ipo' should be set to NULL if the inner
packet is IPv6, but I'll revisit that later.
--
As I said in my last commit in this file, ipo should be set to NULL;
otherwise the 'local address spoofing' check below is always wrong on
IPv6.

(snj)

2018-03-13 17:09:15 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by sevan in ticket #1522):
sys/arch/macppc/dev/snapper.c: 1.42
Fix issue with audio being downpitched, thanks to <nat>
"it seems that snapper_init should be called before audio_attach_mi, as
snapper
init is setting the rate to 44100 after the hardware format has been
configured
by audio_attach_mi.
audio_attach_mi should be the last thing called during an attach of an audio
device so the audio device is ready to be configured when audio_attach_mi is
called."
Resolves PR port-macppc/52949

(snj)

2018-03-13 17:01:57 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #1520):
bin/ksh/history.c: 1.18
Use 0600 as the mode for histfile here too.
pointed out by John D. Baker in PR bin/52480

(snj)

2018-03-13 17:01:56 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #1520):
bin/ksh/history.c: 1.18
Use 0600 as the mode for histfile here too.
pointed out by John D. Baker in PR bin/52480

(snj)

2018-03-13 17:01:54 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #1520):
bin/ksh/history.c: 1.18
Use 0600 as the mode for histfile here too.
pointed out by John D. Baker in PR bin/52480

(snj)

2018-03-13 16:52:42 UTC MAIN commitmail json YAML

Fix wrong order; first enable WP, then enable interrupts. Otherwise we
might get an interrupt before re-enabling WP, and be rescheduled as a
result. In practice it never happens, because the previous PSL always
has interrupts disabled too.

(maxv)

2018-03-13 16:48:05 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #1519):
sys/arch/sparc/sparc/timer_sun4m.c: 1.33 1.34 1.31
sys/arch/sparc/sparc/timer.c: 1.33
sys/arch/sparc/sparc/timer.c: 1.33 1.34
sys/arch/sparc/sparc/timerreg.h: 1.33 1.34 1.31 1.10
fix time goes backwards problems on sparc.
there are a few things here:
- there's a race between reading the limit register (which clears
  the interrupt and the limit bit) and increasing the latest offset.
  this can happen easily if an interrupt comes between the read and
  the call to tickle_tc() that increases the offset (i obverved this
  actually happening.)
- in early boot, sometimes the counter can cycle twice before the
  tickle happens.
to handle these issues, add two workarounds:
- if the limit bit isn't set, but the counter value is less than
  the previous value, and the offset hasn't changed, use the same
  fixup as if the limit bit was set.  this handles the first case
  above.
- add a hard-workaround for never allowing returning a smaller
  value (except during 32 bit overflow): if the result is less than
  the last result, add fixups until it does (or until it would
  overflow.)
the first workaround fixes general run-time issues, and the second
fixes issues only seen during boot.
also expand some comments in timer_sun4m.c and re-enable the sun4m
sub-microsecond tmr_ustolim4m() support (but it's always called with
at least 'tick' microseconds, so the end result is the same.)
fix hang at 4B microseconds (1h12 or so), and simplify part of the previous

(snj)

2018-03-13 16:48:03 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #1519):
sys/arch/sparc/sparc/timer_sun4m.c: 1.33 1.34 1.31
sys/arch/sparc/sparc/timer.c: 1.33
sys/arch/sparc/sparc/timer.c: 1.33 1.34
sys/arch/sparc/sparc/timerreg.h: 1.33 1.34 1.31 1.10
fix time goes backwards problems on sparc.
there are a few things here:
- there's a race between reading the limit register (which clears
  the interrupt and the limit bit) and increasing the latest offset.
  this can happen easily if an interrupt comes between the read and
  the call to tickle_tc() that increases the offset (i obverved this
  actually happening.)
- in early boot, sometimes the counter can cycle twice before the
  tickle happens.
to handle these issues, add two workarounds:
- if the limit bit isn't set, but the counter value is less than
  the previous value, and the offset hasn't changed, use the same
  fixup as if the limit bit was set.  this handles the first case
  above.
- add a hard-workaround for never allowing returning a smaller
  value (except during 32 bit overflow): if the result is less than
  the last result, add fixups until it does (or until it would
  overflow.)
the first workaround fixes general run-time issues, and the second
fixes issues only seen during boot.
also expand some comments in timer_sun4m.c and re-enable the sun4m
sub-microsecond tmr_ustolim4m() support (but it's always called with
at least 'tick' microseconds, so the end result is the same.)
fix hang at 4B microseconds (1h12 or so), and simplify part of the previous

(snj)

2018-03-13 16:48:01 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #1519):
sys/arch/sparc/sparc/timer_sun4m.c: 1.33 1.34 1.31
sys/arch/sparc/sparc/timer.c: 1.33
sys/arch/sparc/sparc/timer.c: 1.33 1.34
sys/arch/sparc/sparc/timerreg.h: 1.33 1.34 1.31 1.10
fix time goes backwards problems on sparc.
there are a few things here:
- there's a race between reading the limit register (which clears
  the interrupt and the limit bit) and increasing the latest offset.
  this can happen easily if an interrupt comes between the read and
  the call to tickle_tc() that increases the offset (i obverved this
  actually happening.)
- in early boot, sometimes the counter can cycle twice before the
  tickle happens.
to handle these issues, add two workarounds:
- if the limit bit isn't set, but the counter value is less than
  the previous value, and the offset hasn't changed, use the same
  fixup as if the limit bit was set.  this handles the first case
  above.
- add a hard-workaround for never allowing returning a smaller
  value (except during 32 bit overflow): if the result is less than
  the last result, add fixups until it does (or until it would
  overflow.)
the first workaround fixes general run-time issues, and the second
fixes issues only seen during boot.
also expand some comments in timer_sun4m.c and re-enable the sun4m
sub-microsecond tmr_ustolim4m() support (but it's always called with
at least 'tick' microseconds, so the end result is the same.)
fix hang at 4B microseconds (1h12 or so), and simplify part of the previous

(snj)

2018-03-13 16:45:52 UTC MAIN commitmail json YAML

Mmh, add a missing x86_disable_intr(). My intention there was to ensure
interrupts were disabled before the barriers.

(maxv)

2018-03-13 16:43:06 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #1518):
sys/netinet6/ip6_forward.c: 1.89-1.90 via patch
Fix use-after-free of mbuf by ip6flow_create
This fixes recent failures of some ATF tests such as t_ipsec_tunnel_odd.
--
Fix use-after-free of mbuf by ip6flow_create (one more)

(snj)

2018-03-13 16:43:05 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #1518):
sys/netinet6/ip6_forward.c: 1.89-1.90 via patch
Fix use-after-free of mbuf by ip6flow_create
This fixes recent failures of some ATF tests such as t_ipsec_tunnel_odd.
--
Fix use-after-free of mbuf by ip6flow_create (one more)

(snj)

2018-03-13 16:43:03 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #1518):
sys/netinet6/ip6_forward.c: 1.89-1.90 via patch
Fix use-after-free of mbuf by ip6flow_create
This fixes recent failures of some ATF tests such as t_ipsec_tunnel_odd.
--
Fix use-after-free of mbuf by ip6flow_create (one more)

(snj)

2018-03-13 16:38:28 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by hannken in ticket #1516):
sys/dev/fss.c: 1.101-1.103
Bounds check against media size for non-persistent snapshots.
--
Treat partial read from backing store as I/O error.
--
Pass residual back to b_resid for persistent snapshots.

(snj)

2018-03-13 16:23:40 UTC MAIN commitmail json YAML

Mmh, put back the RFC6946 check (about dummy fragments), otherwise NPF
is not happy in npf_reassembly, because NPC_IPFRAG is again returned after
the packet was reassembled.

I'm wondering whether it would not be better to just remove the fragment
header in frag6_input directly.

(maxv)

2018-03-13 15:50:31 UTC netbsd-8 commitmail json YAML

2018-03-13 15:47:45 UTC netbsd-8 commitmail json YAML

Pullup the following revisions via patch, requested by maxv in ticket #629:

sys/arch/amd64/amd64/genassym.cf 1.63,1.64
sys/arch/amd64/amd64/locore.S 1.144
sys/arch/amd64/amd64/machdep.c 1.281-1.283
sys/arch/i386/i386/genassym.cf 1.105-1.106
sys/arch/i386/i386/locore.S 1.155
sys/arch/i386/i386/machdep.c 1.802 (adapted),1.803
sys/arch/x86/include/cpu.h 1.85
sys/arch/x86/x86/intr.c 1.115-1.116
sys/arch/x86/x86/pmap.c 1.275
sys/arch/x86/x86/sys_machdep.c 1.45
sys/arch/xen/x86/cpu.c 1.117

Stop sharing the double-fault stack.
Merge the TSS structures into one single cpu_tss structure, and
allocate it dynamically.

(martin)

2018-03-13 15:40:25 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #628):
sys/net/if_ethersubr.c: revision 1.250
sys/net/if_ethersubr.c: revision 1.251
sys/net/if_ethersubr.c: revision 1.252
sys/net/if_ethersubr.c: revision 1.248
Use kmem_alloc instead of kmem_intr_alloc in ether_addmulti

ether_addmulti is now not called in softint thanks to wqinput that
pulled input routines of ICMP out of softint.

style

Fix the net.ether.multicast sysctl. If there is no multicast address
don't kmem_alloc(0) (which panics the kernel), and if the number of
multicast addresses has decreased don't copyout uninitialized kernel
data.

Several fixes:
- Style and typos
- Use kmem_zalloc, in case there is a padding between the fields of
  the structures
- Use ETHER_ADDR_LEN instead of a hard-coded '6'
- kmem_alloc(KM_SLEEP) can't fail
- Simplify ether_aton_r
- Use mutex_obj_free, not to leak memory

(martin)

2018-03-13 15:34:34 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by knakahara in ticket #627):
sys/netipsec/ipsecif.c: revision 1.5
tests/net/if_ipsec/t_ipsec.sh: revision 1.4
sys/net/if_ipsec.c: revision 1.7
Fix IPv6 ipsecif(4) ATF regression, sorry.
There must *not* be padding between the src sockaddr and the dst sockaddr
after struct sadb_x_policy.

Comment out confusing (and incorrect) code and add comment. Pointed out by maxv@n.o, thanks.

Enhance assertion ipsecif(4) ATF to avoid confusing setkey(8) error message.

When setkey(8) says "syntax error at [-E]", it must mean get_if_ipsec_unique()
failed.

(martin)

2018-03-13 15:29:45 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by knakahara in ticket #620):
sys/netipsec/ipsecif.c: revision 1.4
sys/net/if_ipsec.c: revision 1.4
sys/net/if_ipsec.c: revision 1.5
sys/net/if_ipsec.c: revision 1.6
NAT-T src and dst port in ipsec_variant should be network byte order.
Fix missing sadb_x_ipsecrequest informations for PF_KEY message.
Functionalize duplicated code. No functional changes.
Fix ipsec(4) I/F esp_frag support.

(martin)

2018-03-13 14:59:06 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by msaitoh in ticket #626):
sys/dev/pci/ixgbe/ixgbe.c: revision 1.134
sys/dev/pci/ixgbe/ixgbe.h: revision 1.35
sys/dev/pci/ixgbe/ix_txrx.c: revision 1.35
sys/dev/pci/ixgbe/ixv.c: revision 1.87
  Make some event counters MP safe. Now all of the event counters are
MP safe.

(martin)

2018-03-13 14:54:52 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by nonaka in ticket #625):
sys/arch/i386/stand/efiboot/efidisk.c: revision 1.2
sys/arch/i386/stand/efiboot/devopen.c: revision 1.2
sys/arch/i386/stand/efiboot/efidisk.h: revision 1.2
sys/arch/i386/stand/efiboot/boot.c: revision 1.6
sys/arch/i386/stand/efiboot/efidisk_ll.c: revision 1.2
sys/arch/i386/stand/efiboot/efidev.c: revision 1.1
sys/arch/i386/stand/lib/biosdisk_ll.h: revision 1.16
sys/arch/i386/stand/lib/biosdisk.h: revision 1.9
sys/lib/libsa/cd9660.c: revision 1.31
sys/arch/i386/stand/efiboot/efiboot.c: revision 1.5
sys/arch/i386/stand/efiboot/efiboot.h: revision 1.6
sys/arch/i386/stand/lib/biosdisk.c: revision 1.47
sys/arch/i386/stand/efiboot/Makefile.efiboot: revision 1.10
sys/arch/i386/stand/efiboot/TODO.efiboot: revision 1.4
efiboot: system can boot from CD/DVD-ROM media.

Add missed file in previous commit.

(martin)

2018-03-13 14:54:13 UTC MAIN commitmail json YAML

ATF: Add new test race1 in t_ptrace_wait*

Reuse the attach1's test body for race1.

Add a new test race1:
  Assert that await_zombie() in attach1 always finds a single
  process and no other error is reported

race1 requires HAVE_PID in wait(2)-like function.

This test is executed in a loop for 5 seconds (16k iterations on Intel i7).
A buggy kernel was asserting an error within this timeframe almost always.

The bug in the kernel is now gone and this test is expected to pass
correctly.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-03-13 14:45:36 UTC MAIN commitmail json YAML

ATF t_ptrace_wait*: Disable debug messages in msg.h

msg.h is a dummy IPC interface.

Disable additional debugging logging here, especially wanted in race*
tests.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-03-13 13:42:54 UTC netbsd-8 commitmail json YAML

2018-03-13 13:41:14 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by tsutsui in ticket #624):
sys/arch/atari/stand/xxboot/sdboot/milan/Makefile: revision 1.4
sys/arch/atari/dev/nvram.c: revision 1.21
sys/arch/atari/conf/MILAN.in: revision 1.28
sys/arch/atari/atari/pmap_bootstrap.c: revision 1.9
sys/dev/isa/fd.c: revision 1.111
sys/arch/atari/atari/bus.c: revision 1.60
sys/arch/atari/stand/xxboot/ahdi-xxboot/milan/Makefile: revision 1.4
sys/arch/atari/atari/locore.s: revision 1.111
sys/arch/atari/isa/isa_machdep.c: revision 1.41
distrib/sets/lists/base/md.atari: revision 1.55
sys/arch/atari/pci/pci_machdep.c: revision 1.55
sys/arch/atari/pci/pci_machdep.c: revision 1.56
sys/arch/atari/include/vmparam.h: revision 1.32
sys/arch/atari/isa/isa_milan.c: revision 1.15
sys/arch/atari/isa/isa_milan.c: revision 1.16
sys/arch/atari/atari/bus.c: revision 1.59
sys/arch/atari/atari/atari_init.c: revision 1.101
sys/arch/atari/pci/pci_milan.c: revision 1.15
Fix I/O access failures for regions allocated by bus_space_map(9) on Milan.

Passing to PMAP_WIRED against I/O spaces seems problematic,
probably after yamt-km branch merge, which was committed
between NetBSD 3.0 and NetBSD 4.0.
(i.e. ISA and PCI devices on Milan didn't work after 4.0 release)

XXX:
According to pmap(9) man page, the "flags" arg for pmap_enter(9)
doesn't take VM_PROT_READ and VM_PROT_WRITE, but pmap_enter()
implementation in sys/arch/m68k/m68k/pmap_motolora.c historically
checks them.

Fix silent hang during config_console() (before consinit()) on Milan.
config_console() was a dirty hack used by ancient m68k ports
to probe and initialize console devices before "real" configure(9),
using subset of configure(9) functions.

In that case, most device specific data (except I/O access method)
are not initialized so we must not access device specific device_t and
softc structures in config_console() cases.

Fix silent hang after isa_intr_establish() on Milan.
The problems (wrong macro replacements) were slipped in rev 1.107:
http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/arch/atari/atari/locore.s#rev1.107
Handle yet another atari specific quirk in the MI ISA fdc(4)/fd(4) driver.
This makes fd(4) drive(s) (which is necessary for installation)
properly attached on Milan.
atari uses "fdcisa" and "fdisa" for ISA fdc to co-exist other fd(4)
drivers, on-board (atari/dev/fd.c) one and Hades (atari/dev/hdfd.c) one.

Use a proper PSL value to be passed to splx(9) functions.
This should have been changed on yamt-splraiseipl branch merge
back in 2006, which made MI IPL_xxx values independent from
m68k MD PSL values for the %sr register.

Restore piixide(4) for Milan and disable other pciide devices.
piixide was removed in rev 1.18 and the log message said
"because Intel IDE disk controllers only exist as part of
Intel chipsets for x86 systems" but the Milan actually has
the Intel 82371FB southbridge on its board.
Other pciide devices are unlikely necessary for the default
kernel for such a rare machine.
Also fix pasto in comment.

Skip NVRAM checksum check and re-initialization on Milan.
Milan's firmware seems to use different check method.

Ack EOI for IRQ_SLAVE of the master PIC after ack for IRQ of the slave PIC.
I'm not sure if there are possible races in the original code, but
this is what i8259_asm_ack2() in sys/arch/x86/include/i8259.h does
and it looks this change makes a Milan kernel a bit stable.
Replace CRTC register values with ones taken from sys/dev/ic/vga_subr.c.
This fixes noise around column 3 and 4 and makes screen output clearer
on Milan with S3 Trio64V.

Explicitly setup the secondary IDE interrupt of PIIX on Milan.
The secondary IDE interrupt is connected to MBIRQ0 on PIIX, but
the Milan's ROM bootloader (at least version 0.99.7) doesn't seem
to setup the MBIRQ0 register to route it to IRQ15.

On Milan, also explicitly disable MBIRQ1 on PIIX.
Milan's ROM bootloader v1.2 and v1.4 incorrectly set MBIRQ0 connected
to the secondary IDE to IRQ14 (not 15) and unused MBIRQ1 to IRQ15,
so both IDE channels don't work properly.

Add dumb memory probe routines for Milan to use all available memory.
Tested on Milan with 32Mx1, 32Mx4, 128MBx1, and 128MBx3.
(bootloader ROM fails to load TOS with 128MBx4)
No particular comment on port-atari@:
http://mail-index.netbsd.org/port-atari/2018/02/09/msg000580.html

Provide wdboot as a copy of sdboot for Milan.
It looks Milan's bootloader ROM emulates IDE disks as SCSI disks
so sdboot works for them, but atari's installboot checks a specified
device name and requires wdboot for wd(4) devices.

Fix another possible out of bounds.

Replace bus_dmamap_sync(9) op with a newer one taken from m68k/bus_dma.c.
This could fix memory corruption issue caused by PREREAD ops with regions
whose boundaries are not aligned at cacheline size.

(martin)

2018-03-13 13:34:40 UTC MAIN commitmail json YAML

Add a new function in ATF t_ptrace_wait*: await_zombie_raw()

Add await_zombie_raw() that is the same as await_zombie(), whith an
addition of additional "useconds_t ms" parameter indicating delays between
new polling for a zombie process.

This new function will be used for testing a race condition that has been
observed occassionally crashing a test case -- returning duplicate entries
for KERN_PROC_PID.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-03-13 13:29:57 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by hans in ticket #623):
external/bsd/mdocml/dist/configure: revision 1.10
tools/mandoc/Makefile: revision 1.10
Honor HOST_CC.

(martin)

2018-03-13 13:27:10 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #622):
sys/netinet/if_arp.c: revision 1.270
sys/net/if_llatbl.c: revision 1.24 (patch)
sys/net/if_llatbl.c: revision 1.25
sys/net/if_llatbl.c: revision 1.26
sys/net/route.c: revision 1.204
sys/netinet6/in6.c: revision 1.261
sys/netinet6/in6.c: revision 1.262 (patch)
sys/netinet6/in6.c: revision 1.263
sys/netinet/in.c: revision 1.216
sys/netinet6/in6.c: revision 1.264
sys/netinet6/nd6.c: revision 1.246 (patch)
sys/netinet/if_arp.c: revision 1.269
sys/net/if_llatbl.h: revision 1.14
sys/netinet6/in6.c: revision 1.259
sys/netinet/in.c: revision 1.220
sys/netinet/in.c: revision 1.221 (patch)
sys/netinet/in.c: revision 1.222
sys/netinet/in.c: revision 1.223

Suppress noisy debugging outputs
Even if DEBUG they are too noisy under load.

Tweak sanity checks

Scheduling a timer of static entries is wrong.

Add assertions

We must not destroy llentries holding mbufs.

Fix reference leaks of llentry
callout_reset and callout_halt can cancel a pending callout without telling us.
Detect a cancel and remove a reference by using callout_pending and
callout_stop (it's a bit tricy though, we can detect it).
While here, we can remove remaining abuses of mutex_owned for softnet_lock.

Fix memory leaks on arp -d and ndp -d for static entries
We have to delete entries on in_lltable_delete and in6_lltable_delete
unconditionally.  Note that we don't need to worry about LLE_IFADDR because
there is no such entries now.

Use pool(9) for llentry allocations
llentry is easy to be leaked and pool suits for it because pool is usable to
detect leaks.

Also sweep unnecessary wrappers for llentry, in_llentry and in6_llentry.

(martin)

2018-03-13 11:42:59 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by mrg in ticket #621):
sys/sys/bitops.h: revision 1.13
sys/sys/bitops.h: revision 1.14
use 1ul for a left shift that may be greater than int sized.
noticed by martin.
fixes PR#53081.

PR/53081: Fix size of the shift to depend on the type of the bitmap so that
we get the correct width.

(martin)

2018-03-13 11:15:15 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by sevan in ticket #619):
share/man/man4/altq.4: revision 1.3
Update URL for the cited paper

(martin)

2018-03-13 09:10:31 UTC pgoyette-compat commitmail json YAML

2018-03-13 09:07:20 UTC pgoyette-compat commitmail json YAML

More clean-up of compat code interdependencies

(pgoyette)

2018-03-13 09:04:03 UTC MAIN commitmail json YAML

Fix two consecutive mistakes.

The first mistake was npf_inet.c rev1.37:

"Don't reassemble ipv6 fragments, instead treat the first fragment
as a regular packet (subject to filtering rules), and pass
subsequent fragments in the same group unconditionally."

Doing this was entirely wrong, because then a packet just had to push
the L4 payload in a secondary fragment, and NPF wouldn't apply rules on
it - meaning any IPv6 packet could bypass >=L4 filtering. This mistake
was supposed to be a fix for the second mistake.

The second mistake was that ip6_reass_packet (in npf_reassembly) was
getting called with npc->npc_hlen. But npc_hlen pointed to the last
encountered header in the IPv6 chain, which was not necessarily the
fragment header. So ip6_reass_packet was given garbage, and would fail,
resulting in the packet getting kicked. So basically IPv6 was broken by
NPF.

The first mistake is reverted, and the second one is fixed by doing:

- hlen = sizeof(struct ip6_frag);
+ hlen = 0;

Now the iteration stops on the fragment header, and the call to
ip6_reass_packet is valid.

My npf_inet.c rev1.38 is partially reverted: we don't need to worry
about failing properly to advance; once the packet is reassembled
npf_cache_ip gets called again, and this time the whole chain should be
there.

Tested with a simple UDPv6 server - send a 3000-byte-sized buffer, the
packet gets correctly reassembled by NPF now.

(maxv)

2018-03-13 08:53:06 UTC pgoyette-compat commitmail json YAML

Revert the COMPAT_AS sestting back to library, the documented default.

It doesn't really matter, since we no longer build the library in any
format, but best to make the code match the comments.

(pgoyette)

2018-03-13 07:21:23 UTC pgoyette-compat commitmail json YAML

Add some more config dependencies between compat modules

(pgoyette)

2018-03-13 06:41:54 UTC MAIN commitmail json YAML

fix compile error (variable set but not used)

(ryo)

2018-03-13 06:22:00 UTC MAIN commitmail json YAML

fix build error. add options __HAVE_CPU_UAREA_ALLOC_IDLELWP for MULTIPROCESSOR

(ryo)

2018-03-13 06:21:22 UTC MAIN commitmail json YAML

fix build error. need midi* for umidi

(ryo)

2018-03-13 06:20:41 UTC MAIN commitmail json YAML

fix build error. if no usb, don't define USB_DEBUG

(ryo)

2018-03-13 06:19:30 UTC MAIN commitmail json YAML

fix compile error (unused variables)

(ryo)

2018-03-13 06:18:47 UTC MAIN commitmail json YAML

2018-03-13 06:18:36 UTC MAIN commitmail json YAML

fix compile error (printf format)

(ryo)

2018-03-13 06:18:17 UTC MAIN commitmail json YAML

fix compile error (printf format)

(ryo)

2018-03-13 04:12:09 UTC pgoyette-compat commitmail json YAML

Use correct module name for dependency

(pgoyette)

2018-03-13 03:50:26 UTC MAIN commitmail json YAML

Enhance assertion ipsecif(4) ATF to avoid confusing setkey(8) error message.

When setkey(8) says "syntax error at [-E]", it must mean get_if_ipsec_unique()
failed.

(knakahara)

2018-03-13 03:17:02 UTC MAIN commitmail json YAML

2018-03-13 03:07:51 UTC MAIN commitmail json YAML

add the generated prog.conf.5 to CLEANFILES.

(mrg)

2018-03-13 03:06:51 UTC MAIN commitmail json YAML

add *template.x to CLEANFILES.

(mrg)

2018-03-13 03:06:28 UTC MAIN commitmail json YAML

include bsd.clean.mk so that we actually clean up the attempted "params"

(mrg)

2018-03-13 03:05:13 UTC MAIN commitmail json YAML

comment out confusing (and incorrect) code and add comment. Pointed out by maxv@n.o, thanks.

(knakahara)

2018-03-13 03:03:33 UTC MAIN commitmail json YAML

use CLEANFILES+= not CLEANFILES= to avoid overriding what was already
setup before now.

(mrg)

2018-03-13 02:24:26 UTC MAIN commitmail json YAML

Make sysctl_doeproc() more predictable

Swap the order of looking into zombie and all process lists, start now
with the zombie one. This prevents a race observed previously that the
same process could be detected on both lists during a single polling call.

While there:
- Short-circuit break for KERN_PROC_PID, once a pid has been detected.
- Removal of redundant "if (kbuf)" and "if (marker)" checks.
- Update of comments regarding potential optimization, explaining why we
  don't want to it as of now. Performance gain from lookup call vs
  iteration over a list is neglible on a regular system.
- Return ESRCH when no results have been found. This allows more easily
  to implement a retry or abandon algorithm.

This corrects races observed in the existing ATF ptrace(2) tests, related
to await_zombie(). This function was expecting to check whether a process
has been transformed into a zombie, however it was causing occasional
crashes as it was overflowing the return buffer, returning the same pid
twice: once from allproc list and the second time from zombieproc one.

Fix suggested by <christos>
Short-circuit break suggested by <kre>

Discussed on tech-kern.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-03-13 02:23:29 UTC MAIN commitmail json YAML

2018-03-13 02:22:43 UTC MAIN commitmail json YAML

2018-03-13 02:12:05 UTC MAIN commitmail json YAML

Fix IPv6 ipsecif(4) ATF regression, sorry.

There must *not* be padding between the src sockaddr and the dst sockaddr
after struct sadb_x_policy.

(knakahara)

2018-03-12 18:48:49 UTC MAIN commitmail json YAML

2018-03-12 12:45:26 UTC MAIN commitmail json YAML

Remove dead branches, 'npc' can't be NULL (and it is dereferenced
earlier).

(maxv)

2018-03-12 11:56:34 UTC MAIN commitmail json YAML

Remove exgtraneous comma

(pgoyette)

2018-03-12 09:29:43 UTC MAIN commitmail json YAML

2018-03-12 07:35:45 UTC MAIN commitmail json YAML

AMD L3 cache association bitfield is not 8bit but 4bit like others association
bitfields.

(msaitoh)

2018-03-12 07:12:54 UTC MAIN commitmail json YAML

2018-03-12 06:20:33 UTC MAIN commitmail json YAML

Add 3way and 6way of L2 cache or TLB on AMD CPU.

(msaitoh)

2018-03-12 02:03:20 UTC pgoyette-compat commitmail json YAML

Remove "alias" entry from the To-Do list - it's already in the Done pile.

(pgoyette)

2018-03-12 01:59:32 UTC pgoyette-compat commitmail json YAML

2018-03-12 01:15:00 UTC MAIN commitmail json YAML

improve previous, use getprogname() to get the invocation name.

(christos)

2018-03-12 01:10:25 UTC MAIN commitmail json YAML

Reflect the new name of vndconfig(8) in the usage screen

vnconfig(8) was renamed to vndconfig(8) in NetBSD 7. While the manual page
now defaults to vndconfig, the usage screen still referred to the old name.

(khorben)

2018-03-12 00:42:06 UTC MAIN commitmail json YAML

Explicitly mention use of -- for format strings beginning with -,
per PR 21970.

(dholland)

2018-03-11 23:50:19 UTC pgoyette-compat commitmail json YAML

2018-03-11 23:49:39 UTC MAIN commitmail json YAML

sort, add missing lint file

(christos)

2018-03-11 23:49:33 UTC pgoyette-compat commitmail json YAML

Remove another COMPAT option

(pgoyette)

2018-03-11 22:04:35 UTC pgoyette-compat commitmail json YAML

If compat_ibcs2 is being built for i386, make sure we include support
for 32-bit executables

(pgoyette)

2018-03-11 21:20:22 UTC MAIN commitmail json YAML

Stub out on platforms without ifunc support in the linker.

(joerg)

2018-03-11 20:17:19 UTC MAIN commitmail json YAML

2018-03-11 20:16:26 UTC MAIN commitmail json YAML

2018-03-11 19:44:00 UTC MAIN commitmail json YAML

2018-03-11 19:20:56 UTC MAIN commitmail json YAML

2018-03-11 19:08:37 UTC MAIN commitmail json YAML

2018-03-11 18:32:44 UTC MAIN commitmail json YAML

undo previous; breaks the build. handle inside flex.

(christos)

2018-03-11 18:32:10 UTC MAIN commitmail json YAML

2018-03-11 15:13:05 UTC MAIN commitmail json YAML

Make a comment meaningful.  ie: s/Ditto/what it was copying/  (more or less)

That is, there was a comment "Ditto" - which once upon a time, was used
to indicate the the previous comment applied here as well.  Time passed,
and software mutated, and the previous comment was unfortunately sacrificed.

Poor little Ditto was left all alone.

Noticed while doing some software archaeology.

(kre)

2018-03-11 14:59:41 UTC MAIN commitmail json YAML

deal with cvs meta-data directories not called CVS.

(christos)

2018-03-11 13:38:02 UTC MAIN commitmail json YAML

Explain the TSC drift thing.

(maxv)

2018-03-11 11:48:39 UTC MAIN commitmail json YAML

2018-03-11 11:47:45 UTC pgoyette-compat commitmail json YAML

Clean up the EXIST paths (module and/or alias already exists) and make
sure we always return a pointer to the duplicate.

(pgoyette)

2018-03-11 11:34:34 UTC MAIN commitmail json YAML

mark fontcache files as obsolete.

(mrg)

2018-03-11 11:18:06 UTC MAIN commitmail json YAML

20180311:
bdftopcf was updated and may need cleaning in the
src/external/mit/xorg/tools/bdftopcf subdirectory if there are
link errors.

(mrg)

2018-03-11 11:01:08 UTC MAIN commitmail json YAML

move the src list from libXfont stuff to local stuff.

(mrg)

2018-03-11 10:48:39 UTC MAIN commitmail json YAML

update for bdftopcf 1.4.0.

(mrg)

2018-03-11 10:46:02 UTC MAIN commitmail json YAML

2018-03-11 10:37:32 UTC MAIN commitmail json YAML

2018-03-11 10:17:10 UTC MAIN commitmail json YAML

2018-03-11 10:14:04 UTC MAIN commitmail json YAML

Fix build of tools/lex on platforms lacking sys/cdefs.h by including
nbtool_config.h in tools/compat/regex.h. Tested on illumos.

(hans)

2018-03-11 10:08:03 UTC MAIN commitmail json YAML

2018-03-11 09:59:14 UTC MAIN commitmail json YAML

2018-03-11 09:56:44 UTC MAIN commitmail json YAML

2018-03-11 09:54:07 UTC MAIN commitmail json YAML

2018-03-11 09:43:39 UTC MAIN commitmail json YAML

2018-03-11 09:34:59 UTC pgoyette-compat commitmail json YAML

Don't forget about validating/correcting compat module dependencies

(pgoyette)

2018-03-11 09:29:01 UTC MAIN commitmail json YAML

config.h is needed for libXfont2.

(mrg)

2018-03-11 09:03:04 UTC MAIN commitmail json YAML

2018-03-11 08:59:52 UTC MAIN commitmail json YAML

2018-03-11 08:55:27 UTC MAIN commitmail json YAML

2018-03-11 08:46:31 UTC MAIN commitmail json YAML

2018-03-11 08:35:14 UTC MAIN commitmail json YAML

2018-03-11 08:32:21 UTC pgoyette-compat commitmail json YAML

Since we use pointer semantics when walking the alias lists, declare
the pointer variable accordingly.

(pgoyette)

2018-03-11 08:21:24 UTC MAIN commitmail json YAML

look in man/ subdir for the manual

(mrg)

2018-03-11 08:15:23 UTC MAIN commitmail json YAML

2018-03-11 08:03:20 UTC MAIN commitmail json YAML

2018-03-11 08:02:47 UTC MAIN commitmail json YAML

2018-03-11 07:26:00 UTC pgoyette-compat commitmail json YAML

(Re)implement the alias list as a "const char * const (*list)[]" and
store a pointer to this list in the mod_info structure (which lives
in the modules' linkset data).  Don't allow any duplication of module
names _or_ aliases when loading; for dependencies, they will be met
if the required module name matches any loaded module name or alias.

(pgoyette)

2018-03-11 07:23:59 UTC MAIN commitmail json YAML

2018-03-11 07:18:49 UTC MAIN commitmail json YAML

2018-03-11 00:58:12 UTC pgoyette-compat commitmail json YAML

Don't use () around __CONCAT as the expression is no longer constant

(pgoyette)

2018-03-11 00:53:13 UTC pgoyette-compat commitmail json YAML

Actually allocate the list of aliases.

(pgoyette)

2018-03-11 00:44:32 UTC pgoyette-compat commitmail json YAML

Store the aliases list in the mod_info struct, since it is totally
static data.  This saves us having to make a special xxx_modcmd()
call to retrieve the data.  Update module(9) man page accordingly.

(pgoyette)

2018-03-11 00:17:29 UTC MAIN commitmail json YAML

Outsource setting the backplane window into a specific function so it
can be called and reused in different places.

From OpenBSD.

(khorben)

2018-03-10 23:28:13 UTC MAIN commitmail json YAML

Fix spello in a comment

(khorben)

2018-03-10 23:25:59 UTC MAIN commitmail json YAML

Fix spello in a comment

(khorben)

2018-03-10 17:52:50 UTC MAIN commitmail json YAML

2018-03-10 17:48:32 UTC MAIN commitmail json YAML

Fix the computation. Normally that's harmless since ip6_output recomputes
ip6_plen.

(maxv)

2018-03-10 16:12:24 UTC netbsd-7 commitmail json YAML

2018-03-10 16:12:16 UTC netbsd-7-1 commitmail json YAML

2018-03-10 16:12:07 UTC netbsd-7-0 commitmail json YAML

2018-03-10 16:11:48 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #1583):
etc/namedb/bind.keys: 1.2
Update the keys file to the latest version from:
    https://ftp.isc.org/isc/bind9/keys/9.11/bind.keys.v9_11
This includes the new KSK2017 key which is planned to replace the KSK2010
in October 11th, 2018. It is important to have software that ships with
both before September 11th 2018. Anything that bootstraps after that could
have trouble switching.

(snj)

2018-03-10 16:11:47 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #1583):
etc/namedb/bind.keys: 1.2
Update the keys file to the latest version from:
    https://ftp.isc.org/isc/bind9/keys/9.11/bind.keys.v9_11
This includes the new KSK2017 key which is planned to replace the KSK2010
in October 11th, 2018. It is important to have software that ships with
both before September 11th 2018. Anything that bootstraps after that could
have trouble switching.

(snj)

2018-03-10 16:11:46 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #1583):
etc/namedb/bind.keys: 1.2
Update the keys file to the latest version from:
    https://ftp.isc.org/isc/bind9/keys/9.11/bind.keys.v9_11
This includes the new KSK2017 key which is planned to replace the KSK2010
in October 11th, 2018. It is important to have software that ships with
both before September 11th 2018. Anything that bootstraps after that could
have trouble switching.

(snj)

2018-03-10 11:35:44 UTC pgoyette-compat commitmail json YAML

Use an array of alias names, rather than a comma-separated list.

(pgoyette)

2018-03-10 11:34:19 UTC pgoyette-compat commitmail json YAML

We'll use an array of individual aliases, rather than a single, comma-
separated list.  This saves us parsing the list each time through.

(pgoyette)

2018-03-10 10:51:27 UTC pgoyette-compat commitmail json YAML

Document the MODULE_CMD_GETALIASES command

(pgoyette)

2018-03-10 10:36:26 UTC pgoyette-compat commitmail json YAML

Document the new A-is-for-Alias flag value

(pgoyette)

2018-03-10 10:33:40 UTC pgoyette-compat commitmail json YAML

Update for new A-is-for-Alias flag value(s)

(pgoyette)

2018-03-10 10:33:02 UTC pgoyette-compat commitmail json YAML

Add new fields and flags needed to support module aliases

(pgoyette)

2018-03-10 09:44:47 UTC MAIN commitmail json YAML

Fix signed overflow in atan2

As a component of atan2(y, x), the case of x == 1.0 is farmed out to
atan(y). The current implementation of this comparison is vulnerable
to signed integer underflow (that is, undefined behavior), and it's
performed in a somewhat more complicated way than it need be. Change
it to not be quite so cute, rather directly comparing the high/low
bits of x to the specific IEEE-754 bit pattern that encodes 1.0.

ok martin@ pgoyette@ maya@
obtained from FreeBSD

(eadler)

2018-03-10 09:37:59 UTC MAIN commitmail json YAML

Add "Eitan" to propernames

ok pgoyette@

(eadler)

2018-03-10 05:14:26 UTC pgoyette-compat commitmail json YAML

Add some notes on what has been done, and what remains

(pgoyette)

2018-03-10 05:12:18 UTC pgoyette-compat commitmail json YAML

2018-03-10 05:09:24 UTC pgoyette-compat commitmail json YAML

Update module name for sysv_ipc compat syscalls.

(pgoyette)

2018-03-10 04:35:15 UTC pgoyette-compat commitmail json YAML

Update module dependency - it now requires compat_sysvipc

(pgoyette)

2018-03-10 03:44:43 UTC MAIN commitmail json YAML

Replace bus_dmamap_sync(9) op with a newer one taken from m68k/bus_dma.c.

This could fix memory corruption issue caused by PREREAD ops with regions
whose boundaries are not aligned at cacheline size.

(tsutsui)

2018-03-10 03:33:27 UTC pgoyette-compat commitmail json YAML

Revert changes from rev 1.44

Now that the kernel compat library is no longer being built and
included as a .o file, the original build-break has gone.

Note that reverting 1.44 will also un-break the autoloading of
the sysv_ipc module.

(pgoyette)

2018-03-10 02:48:51 UTC MAIN commitmail json YAML

Fix another possible out of bounds.

(tsutsui)

2018-03-10 02:20:13 UTC pgoyette-compat commitmail json YAML

2018-03-10 02:18:56 UTC pgoyette-compat commitmail json YAML

Include the 5.0 sysctl in the compat_sysv module

(pgoyette)

2018-03-09 22:27:15 UTC MAIN commitmail json YAML

remove some unused code, add comments for credits & explanations

(macallan)

2018-03-09 21:49:55 UTC MAIN commitmail json YAML

2018-03-09 20:20:48 UTC MAIN commitmail json YAML

2018-03-09 20:19:25 UTC MAIN commitmail json YAML

2018-03-09 20:19:11 UTC MAIN commitmail json YAML

2018-03-09 20:16:54 UTC MAIN commitmail json YAML

yet another temperature sensor / ADC
this one supports Analog Devices AD7417, found in some G5 macs
depends on OpenFirmware for calibration data

(macallan)

2018-03-09 20:15:03 UTC MAIN commitmail json YAML

Avoid casting fun by switching ifunc helper functions to return
long long. Dead beef is too useful to switch to a different constant.

(joerg)

2018-03-09 19:51:02 UTC netbsd-7 commitmail json YAML

2018-03-09 19:50:30 UTC netbsd-7-1 commitmail json YAML

2018-03-09 19:50:24 UTC netbsd-7-0 commitmail json YAML

2018-03-09 19:50:16 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #1581):
sys/conf/copyright: 1.16
Update for 2018 new year

(snj)

2018-03-09 19:50:15 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #1581):
sys/conf/copyright: 1.16
Update for 2018 new year

(snj)

2018-03-09 19:50:14 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #1581):
sys/conf/copyright: 1.16
Update for 2018 new year

(snj)

2018-03-09 18:56:02 UTC MAIN commitmail json YAML

Update the keys file to the latest version from:

    https://ftp.isc.org/isc/bind9/keys/9.11/bind.keys.v9_11

This includes the new KSK2017 key which is planned to replace the KSK2010
in October 11th, 2018. It is important to have software that ships with
both before September 11th 2018. Anything that bootstraps after that could
have trouble switching.

XXX: pullup-8, pullup-7, pullup-6

(christos)