Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (2h)  netbsd-8 (5d)  netbsd-10 (5d)  netbsd-9 (11d)  thorpej-ifq (175d)  thorpej-altq-separation (177d) 

2024-05-10 00:44:45 UTC Now

2018-02-05 16:00:53 UTC MAIN commitmail json YAML

src/crypto/external/bsd/heimdal/dist/include/crypto-headers.h@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/kdc/digest.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/kdc/kx509.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/kdc/pkinit.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/arcfour.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/get_mic.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/unwrap.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/verify_mic.c@1.4 / diff / nxr@1.4
src/crypto/external/bsd/heimdal/dist/lib/gssapi/krb5/wrap.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/crypto.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/hx509/crypto.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/hx509/hxtool.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/hx509/ks_file.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/hx509/ks_p11.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/kafs/rxkad_kdf.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/krb5/crypto-aes-sha1.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/krb5/crypto-arcfour.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/krb5/crypto-des-common.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/krb5/crypto-des.c@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/dist/lib/krb5/crypto-des3.c@1.5 / diff / nxr@1.5
      :
(more 5 files)
port to openssl-1.1

(christos)

2018-02-05 15:23:14 UTC MAIN commitmail json YAML

Exterminate IPSENDREDIRECTS and IPMTUDISCTIMEOUT, neither is documented.

(maxv)

2018-02-05 15:18:11 UTC MAIN commitmail json YAML

2018-02-05 15:17:16 UTC netbsd-8 commitmail json YAML

2018-02-05 15:14:01 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by bouyer in ticket #533):
sys/arch/i386/conf/XEN3_DOM0: revision 1.126
sys/arch/amd64/conf/XEN3_DOM0: revision 1.148
Follow GENERIC and enable xhci(4) by default. PR port-xen/52978

(martin)

2018-02-05 15:11:54 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by nakayama in ticket #532):
sys/arch/x86/x86/vmt.c: revision 1.20
Add line break.

(martin)

2018-02-05 15:07:30 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by knakahara in ticket #529):
sys/dev/pci/if_wm.c: revision 1.560
sys/dev/pci/if_wm.c: revision 1.561
sys/dev/pci/if_wm.c: revision 1.562
share/man/man4/wm.4: revision 1.37
share/man/man4/wm.4: revision 1.38
sys/dev/pci/if_wm.c: revision 1.551
sys/dev/pci/if_wm.c: revision 1.553
sys/dev/pci/if_wm.c: revision 1.554
sys/dev/pci/if_wm.c: revision 1.555
sys/dev/pci/if_wm.c: revision 1.556
sys/dev/pci/if_wm.c: revision 1.557
sys/dev/pci/if_wm.c: revision 1.558
sys/dev/pci/if_wm.c: revision 1.559
PR/52885 - Shinichi Doyashiki -- typo in comment
Fix legacy Tx descriptors printing when WM_DEBUG is enabled.
improve comments
Fix wm_watchdog_txq() lock region.
Not only wm_txeof() but also wm_watchdog_txq() itself requires txq_lock
as it reads Tx descriptor management variables such as "txq_free".
There is almost no influence on performance.
Fix duplicated "rxintr" evcnt counting. Pointed out by ozaki-r@n.o, thanks.
wm_txeof() can limit the loop count the same as wm_rxeof() now.
add WM_TX_PROCESS_LIMIT_DEFAULT and WM_TX_INTR_PROCESS_LIMIT_DEFAULT man.
More markup.
CID-1427779: Fix uninitialized variables
Fix 82574 MSI-X mode cannot receive packets after 82574 receives high rate traffic.
In short, 82574 MSI-X mode does not cause RXQ MSI-X vector when 82574's
phys FIFO overflows. I don't know why but 82574 causes not RXQ MSI-X vector
but OTHER MSI-X vector at the situation.
see:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v4.15-rc9&id=4aea7a5c5e940c1723add439f4088844cd26196d
advised by msaitoh@n.o, thanks.
Fix if_wm.c:r1.557 merge miss, sorry.
Fix unmatched return type. The return value of wm_txeof() is not useded yet.
Make wm(4) watchdog MP-safe. There is almost no influence on performance.
wm(4) does not use ifp->if_watchdog now, that is, it does not touch
ifp->if_timer.
It also uses own callout(wm_tick) as watchdog now. The watchdog uses
per-queue counter to check timeout. So, global lock is not required.

(martin)

2018-02-05 15:02:52 UTC MAIN commitmail json YAML

Remove references to IPFORWSRCRT (the only one that was actually
documented).

(maxv)

2018-02-05 14:55:16 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #528):
sys/net/agr/if_agr.c: revision 1.42
sys/netinet6/nd6_rtr.c: revision 1.137
sys/netinet6/nd6_rtr.c: revision 1.138
sys/net/agr/if_agr.c: revision 1.46
sys/net/route.c: revision 1.206
sys/net/if.c: revision 1.419
sys/net/agr/if_agrether.c: revision 1.10
sys/netinet6/nd6.c: revision 1.241
sys/netinet6/nd6.c: revision 1.242
sys/netinet6/nd6.c: revision 1.243
sys/netinet6/nd6.c: revision 1.244
sys/netinet6/nd6.c: revision 1.245
sys/netipsec/ipsec_input.c: revision 1.52
sys/netipsec/ipsec_input.c: revision 1.53
sys/net/agr/if_agrsubr.h: revision 1.5
sys/kern/subr_workqueue.c: revision 1.35
sys/netipsec/ipsec.c: revision 1.124
sys/net/agr/if_agrsubr.c: revision 1.11
sys/net/agr/if_agrsubr.c: revision 1.12
Simplify; share agr_vlan_add and agr_vlan_del (NFCI)
Fix late NULL-checking (CID 1427782: Null pointer dereferences (REVERSE_INULL))
KNF: replace soft tabs with hard tabs
Add missing NULL-checking for m_pullup (CID 1427770: Null pointer dereferences (NULL_RETURNS))
Add locking.
Revert "Get rid of unnecessary splsoftnet" (v1.133)
It's not always true that softnet_lock is held these places.
See PR kern/52947.
Get rid of unnecessary splsoftnet (redo)
Unless NET_MPSAFE, splsoftnet is still needed for rt_* functions.
Use existing fill_[pd]rlist() functions to calculate size of buffer to
allocate, rather than relying on an arbitrary length passed in from
userland.
Allow copyout() of partial results if the user buffer is too small, to
be consistent with the way sysctl(3) is documented.
Garbage-collect now-unused third parrameter in the fill_[pd]rlist()
functions.
As discussed on IRC.
OK kamil@ and christos@
XXX Needs pull-up to netbsd-8 branch.
Simplify, from christos@
More simplification, this time from ozaki-r@
No need to break after return.
One more from christos@
No need to initialize fill_func
more cleanup (don't allow oldlenp == NULL)
Destroy ifq_lock at the end of if_detach
It still can be used in if_detach.
Prevent rt_free_global.wk from being enqueued to workqueue doubly
Check if a queued work is tried to be enqueued again, which is not allowed

(martin)

2018-02-05 14:52:42 UTC MAIN commitmail json YAML

Clean up this mess. This is typically the kind of places where we need to
seriously cut the bullshit. These things are unreadable, undocumented, and
all they bought us was not figuring out we had IPv4 forwarding enabled by
default for 20+ years.

(maxv)

2018-02-05 14:23:38 UTC MAIN commitmail json YAML

Be tougher, and don't allow LSRR+SSRR (RFC7126).

(maxv)

2018-02-05 14:18:00 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #526):
sys/net/bpfdesc.h: revision 1.45
sys/net/bpf.c: revision 1.223
Abandon unnecessary softint
The softint was introduced to defer fownsignal that was called in bpf_wakeup to
softint at v1.139, but now bpf_wakeup always runs in softint so we don't need
the softint anymore.

(martin)

2018-02-05 14:00:37 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by pgoyette in ticket #525):
sys/kern/subr_interrupt.c: revision 1.4
- don't return ENOMEM for errors not related to memory
- don't overload return values (-error/+size)
- don't allocate kernel memory from user supplied length.

(martin)

2018-02-05 13:52:40 UTC MAIN commitmail json YAML

Kick duplicate options, they are not allowed (RFC791).

(maxv)

2018-02-05 13:34:20 UTC MAIN commitmail json YAML

Remove unused variable.

(maxv)

2018-02-05 13:23:11 UTC MAIN commitmail json YAML

Disable ip_allowsrcrt and ip_forwsrcrt. Enabling them by default was a
completely dumb idea, because they have security implications.

By sending an IPv4 packet containing an LSRR option, an attacker will
cause the system to forward the packet to another IPv4 address - and
this way he white-washes the source of the packet.

It is also possible for an attacker to reach hidden networks: if a server
has a public address, and a private one on an internal network (network
which has several internal machines connected), the attacker can send a
packet with:

source = 0.0.0.0
destination = public address of the server
LSRR first address = address of a machine on the internal network

And the packet will be forwarded, by the server, to the internal machine,
in some cases even with the internal IP address of the server as a source.

(maxv)

2018-02-05 13:06:55 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by pgoyette in ticket #524):

distrib/sets/lists/man/mi                      1.1574
distrib/sets/lists/modules/md.amd64            1.73
distrib/sets/lists/modules/md.i386              1.76
share/man/man4/amdtemp.4                        1.11
share/man/man4/man4.x86/Makefile                1.17
share/man/man4/man4.x86/amdsmn.4                1.1-1.3
share/man/man4/man4.x86/amdzentemp.4            1.1-1.6
sys/arch/amd64/conf/ALL                        1.79,1.80
sys/arch/amd64/conf/GENERIC                    1.482,1.484
sys/arch/amd64/conf/XEN3_DOM0                  1.146,1.147
sys/arch/x86/pci/amdsmn.c                      1.1-1.2
sys/arch/x86/pci/amdsmn.h                      1.1
sys/arch/x86/pci/amdzentemp.c                  1.1-1.7
sys/arch/x86/pci/files.pci                      1.22,1.23
sys/modules/amdzentemp/amdzentemp.ioconf        1.2

Add amdzentemp from FreeBSD via Ian Clark.

man pages for amdsmn and amdzentemp.

Some clean-up on the HISTORY and AUTHORS sections, and addition of a BUGS
section to document the fact that we don't yet handle the required temp
offset, nor do we expose the available thermal-trip value.

Add missing article 'a'

KNF: Put back the blank line following the empty variable declarations
Put back the variable declaration, too, and mark it __diagused
Otherwise a DIAGNOSTIC kernel will complain about the variable being
undeclared.

Correct placement of __diagused attribute.

Modularize the amdsmn(4) driver, and update dependency for amdzentemp(4),
Create amdsmn(4) amd amdzentemp(4) modules for X86.

(martin)

2018-02-05 13:04:56 UTC MAIN commitmail json YAML

Style, no functional change.

(maxv)

2018-02-05 12:13:54 UTC MAIN commitmail json YAML

2018-02-05 11:58:13 UTC MAIN commitmail json YAML

pretend we have openssl-1.1

(christos)

2018-02-05 11:57:28 UTC MAIN commitmail json YAML

2018-02-05 11:55:47 UTC MAIN commitmail json YAML

2018-02-05 11:52:33 UTC MAIN commitmail json YAML

2018-02-05 11:19:55 UTC MAIN commitmail json YAML

2018-02-05 10:46:19 UTC MAIN commitmail json YAML

Adapt the version hack for openssl provided inline functions: openssl 1.0.2k
already provides the colliding definitions.

(martin)

2018-02-05 10:41:12 UTC MAIN commitmail json YAML

2018-02-05 10:26:06 UTC MAIN commitmail json YAML

Try to fix the build: OpenSSL 1.0.2k already has the EVP inline functions.

(martin)

2018-02-05 08:38:06 UTC MAIN commitmail json YAML

Declare icmperrppslim in ip_icmp.c, it shouldn't be used elsewhere.

(maxv)

2018-02-05 06:22:27 UTC MAIN commitmail json YAML

mark GCC 6.4 has nb1 20180203

(mrg)

2018-02-05 06:13:33 UTC MAIN commitmail json YAML

2018-02-05 05:43:53 UTC MAIN commitmail json YAML

it's called avx512bwintrin.h.

(mrg)

2018-02-05 05:00:48 UTC MAIN commitmail json YAML

Obtain proper initialized addresses of locks allocated by mutex_obj_alloc or rw_obj_alloc

Initialized addresses of locks allocated by mutex_obj_alloc or rw_obj_alloc
were not useful because the addresses were mutex_obj_alloc or rw_obj_alloc
itself. What we want to know are callers of them.

(forgot to commit)

(ozaki-r)

2018-02-05 04:25:04 UTC MAIN commitmail json YAML

Obtain proper initialized addresses of locks allocated by mutex_obj_alloc or rw_obj_alloc

Initialized addresses of locks allocated by mutex_obj_alloc or rw_obj_alloc
were not useful because the addresses were mutex_obj_alloc or rw_obj_alloc
itself. What we want to know are callers of them.

(ozaki-r)

2018-02-05 02:51:41 UTC MAIN commitmail json YAML

Sort XC_IPL_* in order of priority (NFC)

(ozaki-r)

2018-02-05 02:51:08 UTC MAIN commitmail json YAML

Avoid allocating unused softints that share a value of IPL between another

(ozaki-r)

2018-02-05 02:49:47 UTC MAIN commitmail json YAML

Fix build of kernels that some (or all) IPL_SOFT* share a value (e.g., mips)

(ozaki-r)

2018-02-05 00:43:07 UTC MAIN commitmail json YAML

Adjust to openssl 1.1

(christos)

2018-02-05 00:42:47 UTC MAIN commitmail json YAML

2018-02-05 00:13:50 UTC MAIN commitmail json YAML

2018-02-05 00:11:33 UTC MAIN commitmail json YAML

2018-02-04 21:52:17 UTC MAIN commitmail json YAML

2018-02-04 21:49:51 UTC MAIN commitmail json YAML

Various fixes / changes from Ryo Shimizu / Toru Nishimura to make this
work.

_rtld_call_ifunc copied from other rela platforms by me - not tested in
any way.

(skrll)

2018-02-04 20:38:41 UTC MAIN commitmail json YAML

2018-02-04 20:22:42 UTC MAIN commitmail json YAML

2018-02-04 20:22:18 UTC MAIN commitmail json YAML

2018-02-04 18:32:31 UTC MAIN commitmail json YAML

lower case 'ret' to avoid macro clash

(skrll)

2018-02-04 18:17:59 UTC MAIN commitmail json YAML

remove dup the from %eax

(christos)

2018-02-04 17:54:35 UTC MAIN commitmail json YAML

Explicitly disable the kernel-mode GPROF (even though it is never enabled),
and explain a bit.

(maxv)

2018-02-04 17:33:34 UTC MAIN commitmail json YAML

2018-02-04 17:31:51 UTC MAIN commitmail json YAML

2018-02-04 17:03:21 UTC MAIN commitmail json YAML

Add a TODO list for SVS.

(maxv)

2018-02-04 16:22:48 UTC MAIN commitmail json YAML

Fix typo (thanks Martin)

(christos)

2018-02-04 15:44:51 UTC MAIN commitmail json YAML

Add support for writing "AArch64 Linux kernel image" format images.

These images begin with a 64-byte header that includes a load offset,
image size, some flags, and a small (2 word) area at the start for
executable code.

These images are compatible with U-Boot's "booti" command, and can be
used to make U-Boot relocate our kernel to a 2MB aligned base address.
After relocation, U-Boot will jump to the code at the beginning of the
header, where we encode a relative branch forward instruction to branch
to the beginning of the kernel at offset +0x40.

(jmcneill)

2018-02-04 12:53:51 UTC netbsd-8 commitmail json YAML

2018-02-04 12:52:02 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by christos in ticket #523):
sys/ufs/ffs/ffs_vfsops.c: revision 1.356
sys/ufs/ufs/ufs_inode.c: revision 1.103
Make sure inode blocks and size are zero when VOP_INACTIVE()
finalises a now unlinked inode.
Counterpart of the check in ffs_newvnode().
Prevent use-after-free where genfs_node_destroy() would destroy
a lock residing in the just freed inode data.

(martin)

2018-02-04 12:49:25 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #522):
libexec/httpd/bozohttpd.c: revision 1.87
Use a protocol-agnostic URL (don't degrade HTTPS->HTTP)
Suggested by Travis Paul in PR bin/52958.

(martin)

2018-02-04 12:46:04 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by pgoyette in ticket #521):
sys/arch/i386/stand/lib/bootinfo.h: revision 1.12
Recent changes have increased the number of "things" the bootloader
needs to deal with.  Increase the table size so we don't overflow.

(martin)

2018-02-04 12:43:57 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by sevan in ticket #520):
sys/arch/macppc/dev/snapper.c: revision 1.42
Fix issue with audio being downpitched, thanks to <nat>
"it seems that snapper_init should be called before audio_attach_mi, as
snapper
init is setting the rate to 44100 after the hardware format has been
configured
by audio_attach_mi.
audio_attach_mi should be the last thing called during an attach of an audio
device so the audio device is ready to be configured when audio_attach_mi is
called."
Resolves PR port-macppc/52949

(martin)

2018-02-04 12:40:31 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by maxv519):
sys/arch/i386/conf/largepages.inc: file removal
sys/arch/i386/conf/kern.ldscript.4MB: file removal
sys/arch/i386/i386/copy.S: revision 1.26
Sync with amd64, in particular, add END() markers, don't fall through
functions, narrow the copy windows, and remove suword.
Remove these files. No one cares about this on i386, and there is no
point in keeping undocumented options nobody understands anyway.

(martin)

2018-02-04 12:10:48 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by sevan in ticket #518):
sys/fs/msdosfs/msdosfs_fat.c: revision 1.32
usr.sbin/makefs/msdos/msdosfs_vfsops.c: revision 1.11
Need strings.h for ffs()
Need strings.h for ffs()
Resolves implict declaration warning of ffs() when building tools via
build.sh

(martin)

2018-02-04 11:08:17 UTC MAIN commitmail json YAML

more updates for GCC 6.  with other uncommited changes, i386 seems
to work well enough for hello.c, hello.cc and hello.m.

(mrg)

2018-02-04 10:16:07 UTC MAIN commitmail json YAML

make libbackend.a build and fix the libcommon.a sources list.
now all the gcc parts link.

(mrg)

2018-02-04 09:36:25 UTC MAIN commitmail json YAML

fix a signed vs unsigned issue GCC 6.4 picked up.

(mrg)

2018-02-04 09:22:03 UTC MAIN commitmail json YAML

partial work-in-progress to build GCC 6.4 natively:
- use -std=gnu++98 by default.
- add build support for new GCC generators, etc.
- regen i386 mknative files.

(mrg)

2018-02-04 09:18:44 UTC MAIN commitmail json YAML

a macro idiom used here triggers the GCC 6.4 ident checker.  work around it.

(mrg)

2018-02-04 09:17:54 UTC MAIN commitmail json YAML

avoid leftshift of an unsigned value

(mrg)

2018-02-04 09:15:45 UTC MAIN commitmail json YAML

fix GCC 6.4 issues (finally a couple that aren't actual bugs,
but only weird code?):

amd's amfs_program_exec() has a missing {} issue.

flex's check_options() has odd inconsistent identation that
trips the new ident checker.

ntpd's oncore_check_leap_sec() and oncore_set_traim() have
missing {} issues.

sntp's optionLoadNested() an identation weirdness that
trips the new ident checker.

vi's cl_attr() has a wrong {} issue, and its vs_paint() has
an identation weirdness that trips the new ident checker.

(mrg)

2018-02-04 09:03:23 UTC MAIN commitmail json YAML

updates for GCC 6.4:

identd has aliasing violations, use -fno-strict-aliasing.

newfs_msdos's getbpbinfo() has missing {} issues.

sysctl's kern_cp_id() has missing {} issues.

(mrg)

2018-02-04 09:01:13 UTC MAIN commitmail json YAML

fixes for GCC 6.4:

mail's execute() needs a volatile for setjmp().

telnet has a missing {} issue.

isdnd's print_config() has a missing/wrong {} issue, and
its p_q931bc() has inconsistent indentation (but not any
actual problem.)

map-mbone's accept_neighbors2() compares a vs. a instead
of a vs. b.

sysinst's pm_cgd_check() has missing {} issue.

timed's main() has missing {} issue.

(mrg)

2018-02-04 09:00:51 UTC MAIN commitmail json YAML

Merge pkg_install-20171030

Bump version to 20171030 for netpgpverify fixes.
Add zsh to default_acceptable_licenses.
Undef bootstrap hack.

Fix OpenSSL 1.1.0 build
OpenSSL 1.1.0 makes xkusage and ex_flags opaque.
Use X509_check_ca rather than a custom and nearly identical implementation.
This is available since OpenSSL 0.9.8 (even in RHEL5).
This is also done because we cannot implement it identically under
OpenSSL 1.1.0 due to missing getters.
Test EXFLAG_XKUSAGE rather than zero xkusage test no usage to avoid openssl
1.1.0 getter returning a different code on this case.
Use getter for xkusage in the non-zero test case.
Provide fallback definitions for getters.

PR pkg/52298, PR pkg/52648

(maya)

2018-02-04 08:48:05 UTC MAIN commitmail json YAML

fix issues found by GCC 6.4:

battlestar was missing some {} in its insane printf()+puts() usage.
this is a literal code sequence i found:

printf("The blast catches ");
printf("the goddess in the ");
printf("stomach, knocking ");
puts("her to the ground.");
printf("She writhes in the ");
printf("dirt as the agony of ");
puts("death taunts her.");
puts("She has stopped moving.");

no lines inserted or removed.

tetris' checkscores() had wrong and missing {} usage.

(mrg)

2018-02-04 08:44:36 UTC MAIN commitmail json YAML

fix two issues found by GCC 6.4:
- cbq_compute_idletime() had a fprintf() not in the intended missing {}.
- skip_cmp_dst_addr() compared a vs a instead of a vs b.

(mrg)

2018-02-04 08:19:42 UTC MAIN commitmail json YAML

2018-02-04 03:37:59 UTC MAIN commitmail json YAML

2018-02-04 03:19:53 UTC MAIN commitmail json YAML

2018-02-04 01:41:05 UTC MAIN commitmail json YAML

ATF needs C++98 for now, and GCC 6.4 defaults to C++11.

fix a problem -Werror=misleading-indentation found but has zero
effect on the running code.

(mrg)

2018-02-04 01:17:46 UTC MAIN commitmail json YAML

src/external/gpl3/gcc/lib/libbacktrace/arch/alpha/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/earm/backtrace-supported.h@1.5 / diff / nxr@1.5
src/external/gpl3/gcc/lib/libbacktrace/arch/i386/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/mips64eb/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/powerpc/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/sparc/backtrace-supported.h@1.5 / diff / nxr@1.5
src/external/gpl3/gcc/lib/libbacktrace/arch/sparc64/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libbacktrace/arch/x86_64/backtrace-supported.h@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libgcc/arch/alpha/auto-target.h@1.3 / diff / nxr@1.3
src/external/gpl3/gcc/lib/libgcc/arch/alpha/defs.mk@1.3 / diff / nxr@1.3
src/external/gpl3/gcc/lib/libgcc/arch/earm/auto-target.h@1.3 / diff / nxr@1.3
src/external/gpl3/gcc/lib/libgcc/arch/earm/defs.mk@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libgcc/arch/i386/auto-target.h@1.3 / diff / nxr@1.3
src/external/gpl3/gcc/lib/libgcc/arch/i386/defs.mk@1.6 / diff / nxr@1.6
src/external/gpl3/gcc/lib/libgcc/arch/mips64eb/auto-target.h@1.3 / diff / nxr@1.3
src/external/gpl3/gcc/lib/libgcc/arch/mips64eb/defs.mk@1.6 / diff / nxr@1.6
src/external/gpl3/gcc/lib/libgcc/arch/powerpc/auto-target.h@1.3 / diff / nxr@1.3
src/external/gpl3/gcc/lib/libgcc/arch/powerpc/defs.mk@1.4 / diff / nxr@1.4
src/external/gpl3/gcc/lib/libgcc/arch/sparc/auto-target.h@1.3 / diff / nxr@1.3
src/external/gpl3/gcc/lib/libgcc/arch/sparc/defs.mk@1.3 / diff / nxr@1.3
      :
(more 186 files)
mknative-gcc for alpha, earm, i386, mips64eb, powerpc, sparc,
sparc64, and x86-64.  tree does not fully build yet, however.

(mrg)

2018-02-04 01:16:33 UTC MAIN commitmail json YAML

2018-02-04 01:14:42 UTC MAIN commitmail json YAML

2018-02-04 01:13:45 UTC MAIN commitmail json YAML

fixes for GCC 6:

- -Wstrict-prototypes is not available for C++, so don't try to
  ignore it for C++.
- remove many _DIAGASSERT() checks against not NULL for functions
  with arguments with nonnull attributes.  in two cases, leave
  code behind that should set defaults to "(null)".
- use -Wno-error=frame-address for i386 mcount, as it seems valid
  to assume the caller will have a frame.fair

(mrg)

2018-02-03 22:17:14 UTC netbsd-8 commitmail json YAML

2018-02-03 22:15:13 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by kamil in ticket #517):
lib/libkvm/kvm_getprocs.3: revision 1.17
Correct the signature of kvm_getproc2(3) in the man-page.
The elemsize argument is of type "size_t", not "int".
Sponsored by <The NetBSD Foundation>

(snj)

2018-02-03 22:13:26 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by kamil in ticket #516):
lib/libkvm/kvm_getlwps.3: revision 1.8
Correct the signature of kvm_getlwps(3) in the man-page.
The elemsize argument is of type "size_t", not "int *".
Sponsored by <The NetBSD Foundation>

(snj)

2018-02-03 22:11:36 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by kamil in ticket #515):
bin/ps/ps.c: revision 1.89
Fix an unitialized memory read bug in ps(1)
rawcpu of type int, is declared inside main(){} and it can be passed as
uninitialized to setpinfo().
The setpinfo() function has a switch checking the value of rawcpu:
  if (!rawcpu)
    pi[i].pcpu /= 1.0 - exp(ki[i].p_swtime * log_ccpu);
rawcpu is set to 1 with the command line argument "-C".
  -C          Change the way the CPU percentage is calculated by using a
                "raw" CPU calculation that ignores "resident" time (this
                normally has no effect).
Bug reproducible with an invocation: "ps u". It hides with "ps uC".
Initialize rawcpu by default to 0, before the getopt(3) machinery.
Detected with MSan running on NetBSD/amd64.
Sponsored by <The NetBSD Foundation>

(snj)

2018-02-03 22:07:26 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #514):
sys/net/route.c: 1.205
sys/net/rtsock.c: 1.237-1.238
sys/netinet/in.c: 1.215
sys/netinet/tcp_subr.c: 1.272
sys/netinet/tcp_timer.c: 1.93
sys/netinet/tcp_timer.h: 1.29
sys/netinet/tcp_var.h: 1.182
sys/netinet6/in6.c: 1.258
Remove extra pserialize_perform from in_purgeaddr
It's already performed in ifa_remove. Note so there (in in6_unlink_ifa too).
Release rt_so_mtx on updating a rtentry to avoid a deadlock with route_intr
The deadlock happened only if NET_MPSAFE on.
Run tcp_slowtimo in workqueue if NET_MPSAFE
If NET_MPSAFE is enabled, we have to avoid taking softnet_lock in softint as
much as possible to prevent any softint handlers including callout handlers
such as tcp_slowtimo from sticking on softnet_lock because it results in
undesired delays of executing subsequent softint handlers.
NFCI for !NET_MPSAFE
Fix a return value of rt_update_prepare
Callers expect it to be an errno.
Fix another deadlock
When waiting for a route update to finish, a waiter has to release its reference
to the route to avoid a deadlock. Because a updater tries to wait for references
to a target route (except for a reference by the updater itself) to be released.

(snj)

2018-02-03 22:02:02 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by sevan in ticket #435):
tools/compat/configure: revision 1.88 via patch
tools/compat/configure.ac: revision 1.89 via patch
tools/compat/nbtool_config.h.in: revision 1.42
Add asnprintf() to the AC_CHECK_DECLS list.
Resolves conflict when cross compiling on Cygwin the provided implementation
does not get picked up.
Closes PR toolchain/52797
--
regen

(snj)

2018-02-03 21:45:54 UTC MAIN commitmail json YAML

sun4v: Update TODO with a detailed description of why the kernel crashes when running on sun4v systems.

(palle)

2018-02-03 21:27:46 UTC MAIN commitmail json YAML

2018-02-03 19:34:01 UTC MAIN commitmail json YAML

Avoid using proplib in rgephy_reset to make LOCKDEBUG happy.

(jmcneill)

2018-02-03 19:27:15 UTC MAIN commitmail json YAML

updates for GCC 6.4.0:

- we install version specific headers into gcc-6.
- add missing include path for i386/cpuinfo.c.
- fix compile time warnings in libobjc/encoding.c
- adjust c++98/compatibility.cc to use a visible header
- Makefile.hacks gains a hack for x86 and insn-constants.h.  (should
  try to figure out how to build this earlier.)
- libgomp missing priority_queue.c (switch to mknative pulling it out?).
- build a libstdc++ version file and use it.
- fix the handling of -std= to default the same as normal builds.

(mrg)

2018-02-03 19:06:25 UTC MAIN commitmail json YAML

pullout port_specific_symbol_files from libstdc++.

(mrg)

2018-02-03 15:40:29 UTC MAIN commitmail json YAML

PR/52976: Eitan Adler: handle larger primes
Using results from
    J. Sorenson and J. Webster, Strong pseudoprimes to twelve prime
    bases, Math. Comp. 86(304):985-1003, 2017.
teach primes(6) to enumerate primes up to 2^64 - 1.  Until Sorenson
and Webster's paper, we did not know how many strong speudoprime tests
were required when testing alleged primes between 3825123056546413051
and 2^64 - 1.

Adapted from: FreeBSD

(christos)

2018-02-03 11:30:01 UTC MAIN commitmail json YAML

Try to fix the build: avoid duplicate case labels when IPL_SOFT* are
all the same.

(martin)

2018-02-03 08:52:52 UTC MAIN commitmail json YAML

Fix non-DIAGNOSTIC build

(skrll)

2018-02-03 02:57:15 UTC MAIN commitmail json YAML

* Use 'struct testmsg' rather than 'struct mymsg' (avoids a conflict
  with FreeBSD)
* Fix a broken call to open(2) with O_CREAT and no permission argument.
* ANSIfy function definitions.
* Improve failure messages.

From freebsd.org via Brooks Davis - Thanks!

(pgoyette)

2018-02-02 20:57:53 UTC MAIN commitmail json YAML

2018-02-02 20:45:20 UTC MAIN commitmail json YAML

2018-02-02 13:14:15 UTC netbsd-6-0 commitmail json YAML

2018-02-02 13:12:49 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1525):
sys/netinet6/nd6_nbr.c: revision 1.145 (patch)

Fix memory leak. Contrary to what the XXX indicates, this place is 100%
reachable remotely.

(martin)

2018-02-02 13:12:15 UTC netbsd-6-1 commitmail json YAML

2018-02-02 13:11:32 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1525):
sys/netinet6/nd6_nbr.c: revision 1.145 (patch)

Fix memory leak. Contrary to what the XXX indicates, this place is 100%
reachable remotely.

(martin)

2018-02-02 13:10:45 UTC netbsd-6 commitmail json YAML

2018-02-02 13:10:00 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1525):
sys/netinet6/nd6_nbr.c: revision 1.145 (patch)

Fix memory leak. Contrary to what the XXX indicates, this place is 100%
reachable remotely.

(martin)

2018-02-02 13:07:09 UTC netbsd-7-0 commitmail json YAML

2018-02-02 13:06:29 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1562):
sys/netinet6/nd6_nbr.c: revision 1.145 (patch)

Fix memory leak. Contrary to what the XXX indicates, this place is 100%
reachable remotely.

(martin)

2018-02-02 13:05:34 UTC netbsd-7-1 commitmail json YAML

2018-02-02 13:04:53 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1562):
sys/netinet6/nd6_nbr.c: revision 1.145 (patch)

Fix memory leak. Contrary to what the XXX indicates, this place is 100%
reachable remotely.

(martin)

2018-02-02 13:03:46 UTC netbsd-7 commitmail json YAML

2018-02-02 13:03:05 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1562):
sys/netinet6/nd6_nbr.c: revision 1.145
Fix memory leak. Contrary to what the XXX indicates, this place is 100%
reachable remotely.

(martin)

2018-02-02 12:56:22 UTC netbsd-8 commitmail json YAML

2018-02-02 12:55:08 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #531):
sys/netinet6/nd6_nbr.c: revision 1.145
Fix memory leak. Contrary to what the XXX indicates, this place is 100%
reachable remotely.

(martin)

2018-02-02 11:10:30 UTC netbsd-6-0 commitmail json YAML

2018-02-02 11:09:52 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1524):
sys/netinet6/ip6_mroute.c: revision 1.120
Fix a pretty simple, yet pretty tragic typo: we should return IPPROTO_DONE,
not IPPROTO_NONE. With IPPROTO_NONE we will keep parsing the header chain
on an mbuf that was already freed.

(martin)

2018-02-02 11:09:12 UTC netbsd-6-1 commitmail json YAML

2018-02-02 11:08:30 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1524):
sys/netinet6/ip6_mroute.c: revision 1.120
Fix a pretty simple, yet pretty tragic typo: we should return IPPROTO_DONE,
not IPPROTO_NONE. With IPPROTO_NONE we will keep parsing the header chain
on an mbuf that was already freed.

(martin)

2018-02-02 11:07:50 UTC netbsd-6 commitmail json YAML

2018-02-02 11:07:12 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1524):
sys/netinet6/ip6_mroute.c: revision 1.120
Fix a pretty simple, yet pretty tragic typo: we should return IPPROTO_DONE,
not IPPROTO_NONE. With IPPROTO_NONE we will keep parsing the header chain
on an mbuf that was already freed.

(martin)

2018-02-02 11:04:33 UTC netbsd-7-0 commitmail json YAML

2018-02-02 11:03:53 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1561):
sys/netinet6/ip6_mroute.c: revision 1.120
Fix a pretty simple, yet pretty tragic typo: we should return IPPROTO_DONE,
not IPPROTO_NONE. With IPPROTO_NONE we will keep parsing the header chain
on an mbuf that was already freed.

(martin)

2018-02-02 11:02:29 UTC netbsd-7-1 commitmail json YAML

2018-02-02 11:01:46 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1561):
sys/netinet6/ip6_mroute.c: revision 1.120
Fix a pretty simple, yet pretty tragic typo: we should return IPPROTO_DONE,
not IPPROTO_NONE. With IPPROTO_NONE we will keep parsing the header chain
on an mbuf that was already freed.

(martin)

2018-02-02 10:59:31 UTC netbsd-7 commitmail json YAML

2018-02-02 10:58:44 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1561):
sys/netinet6/ip6_mroute.c: revision 1.120
Fix a pretty simple, yet pretty tragic typo: we should return IPPROTO_DONE,
not IPPROTO_NONE. With IPPROTO_NONE we will keep parsing the header chain
on an mbuf that was already freed.

(martin)

2018-02-02 10:55:10 UTC netbsd-8 commitmail json YAML

2018-02-02 10:54:02 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #530):
sys/netinet6/ip6_mroute.c: revision 1.120
Fix a pretty simple, yet pretty tragic typo: we should return IPPROTO_DONE,
not IPPROTO_NONE. With IPPROTO_NONE we will keep parsing the header chain
on an mbuf that was already freed.

(martin)

2018-02-02 10:49:01 UTC MAIN commitmail json YAML

Fix memory leak. Contrary to what the XXX indicates, this place is 100%
reachable remotely.

(maxv)

2018-02-02 09:01:17 UTC MAIN commitmail json YAML

Style, no functional change.

(maxv)

2018-02-02 06:23:45 UTC MAIN commitmail json YAML

Fix a pretty simple, yet pretty tragic typo: we should return IPPROTO_DONE,
not IPPROTO_NONE. With IPPROTO_NONE we will keep parsing the header chain
on an mbuf that was already freed.

(maxv)

2018-02-02 03:41:13 UTC MAIN commitmail json YAML

2018-02-02 01:02:42 UTC MAIN commitmail json YAML

convert HAVE_GCC handling to modern GCC release numbering:
- HAVE_GCC=5 is now the default (vs. HAVE_GCC=53 we've been using for
  GCC 5.4 and GCC 5.5.)
- remove some more GCC 4.8 code.  we don't support GCC 4 here.
- adjust set lists to gcc=5 from gcc=53.

add some basic HAVE_GCC=6 handling (totally unused so far.)

(mrg)

2018-02-01 22:58:44 UTC MAIN commitmail json YAML

"save fp ipi" is an interrupt type counter, mark it so.

(mrg)

2018-02-01 21:47:07 UTC MAIN commitmail json YAML

2018-02-01 21:44:18 UTC MAIN commitmail json YAML

add driver for Maxim DS1631 High-Precision Digital Thermometer and Thermostat
temperature reading only for now

(macallan)

2018-02-01 21:10:46 UTC MAIN commitmail json YAML

Install GCC (gcc) headers for Sanitizers

Sync this code with gcc.old.

PR 52265 by Kamil Rytarowski

Proposed and accepted on tech-toolchain@.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-02-01 20:50:23 UTC MAIN commitmail json YAML

Install GCC (gcc.old/) headers for Sanitizers

Install:
- allocator_interface.h
- asan_interface.h
- common_interface_defs.h
- tsan_interface_atomic.h

Into:
- /usr/include/gcc-5/sanitizer

Note headers in a comment headers for introduction in future:
- dfsan_interface.h
- lsan_interface.h
- msan_interface.h

Skip a file that will never be relevant on NetBSD:
- linux_syscall_hooks.h

PR 52265 by Kamil Rytarowski

Proposed and accepted on tech-toolchain@.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-02-01 17:22:45 UTC MAIN commitmail json YAML

Remove unused (and a reference to ovbcopy along the way).

(maxv)

2018-02-01 17:16:11 UTC MAIN commitmail json YAML

Replace ovbcopy -> memmove, same.

(maxv)

2018-02-01 16:49:35 UTC MAIN commitmail json YAML

2018-02-01 16:36:01 UTC MAIN commitmail json YAML

Style, no real functional change.

(maxv)

2018-02-01 16:23:28 UTC MAIN commitmail json YAML

Remove this code, RH0 must be dropped, according to RFC5095. FreeBSD and
OpenBSD already do the same. Also, style, and remove useless includes.

(maxv)

2018-02-01 16:17:00 UTC MAIN commitmail json YAML

Fix the ICMP error code. rh was obtained via IP6_EXTHDR_GET, and it is not
guaranteed to be in the same mbuf as ip6, so computing the difference
between the pointers may result in a wrong offset.

ip6 is now unused, so remove it.

(maxv)

2018-02-01 15:53:16 UTC MAIN commitmail json YAML

Fix use-after-free, the first m_copyback_cow may have freed the mbuf, so
it is wrong to read ip6->ip6_nxt.

(maxv)

2018-02-01 14:50:36 UTC MAIN commitmail json YAML

wait at most one second for controller to complete reset

(jakllsch)

2018-02-01 12:09:19 UTC MAIN commitmail json YAML

gdb-8.1 out.

(wiz)

2018-02-01 09:55:37 UTC MAIN commitmail json YAML

Fix KASSERT panic. When detaching USB host controoler, the following panic
occured:
kernel diagnostic assertion "sc->sc_intrxfer == xfer" failed: file "../../../../dev/usb/ohci.c", line 1720
Clear sc_intrxfer correctly. Adviced by Nick and tested by me.

(msaitoh)

2018-02-01 09:50:48 UTC MAIN commitmail json YAML

Mark DVF_DETACH_SHUTDOWN to USB root HUB. This change makes USB host
controller drivers detachable. OK'd by Nick.

(msaitoh)

2018-02-01 09:47:47 UTC MAIN commitmail json YAML

- Fix panic on shutdown reported by ozaki-r in PR kern/52961. Use callot_halt()
  correctly. Tested by me and OK'd by Nick.
- Disable interrupt in och_shutdown() to prevent hangup. OK'd by Nick.

(msaitoh)

2018-02-01 09:09:14 UTC MAIN commitmail json YAML

- Add PCie Link Activation ECN.
- Use macro.
- KNF.

(msaitoh)

2018-02-01 08:18:47 UTC MAIN commitmail json YAML

Cleanup:
- Don't pass a capability pointer as a argument of pci_conf_find_cap() and
  determine the first pointer in the pci_conf_find_cap() function.
- Don't pass a capability pointer as a argument of pci_conf_find_extcap()
  because it's not used.
- Remove unsed code.

(msaitoh)

2018-02-01 07:49:20 UTC MAIN commitmail json YAML

Style, and remove the 'len' argument from mld_allocbuf(), it is misleading,
we only want a static struct. Beyond that no functional change.

(maxv)

2018-02-01 05:22:02 UTC MAIN commitmail json YAML

2018-02-01 03:32:31 UTC MAIN commitmail json YAML

2018-02-01 03:32:00 UTC MAIN commitmail json YAML

give one more reply to the client before we potentially block it.

(christos)

2018-02-01 03:29:41 UTC MAIN commitmail json YAML

2018-02-01 03:17:00 UTC MAIN commitmail json YAML

Use high priority xcall with a softint of an IPL the same as psref class's one

This mitigates undesired delay of psref_target_destroy under load such as heavy
netowrk traffic that loads softint.

(ozaki-r)

2018-02-01 03:15:29 UTC MAIN commitmail json YAML

Support arbitrary softint IPLs in high priority xcall

The high priority xcall supported only a softint of IPL_SOFTSERIAL. It meant
that it didn't work for xcall callbacks depending on lower IPLs than
IPL_SOFTSERIAL.

The change makes xcall have multiple softints of IPLs and allow users to specify
arbitrary IPLs. Users can specify an IPL by XC_HIGHPRI_IPL passed to the 1st
argument of xc_broadcast or xc_unicast.

Note that xcall still serves requests one by one (i.e., doesn't run them
concurrently) even if requests have different IPLs.

Proposed on tech-kern@

(ozaki-r)

2018-02-01 02:50:51 UTC MAIN commitmail json YAML

"s/above 300W/greater than 300W/" in pci_conf_print_pcie_power(). From
PCIe Base Spec 3.1a Errata 2017-12-13.

(msaitoh)

2018-01-31 22:12:21 UTC MAIN commitmail json YAML

Add information about tigon firmware.

(mlelstv)

2018-01-31 21:09:53 UTC MAIN commitmail json YAML

- do some magic number reduction
- MPIC doesn't have the OPENPIC_POLARITY_* bit, so don't pretend to

(macallan)

2018-01-31 19:40:52 UTC netbsd-8 commitmail json YAML

2018-01-31 19:39:51 UTC netbsd-8 commitmail json YAML

src/doc/3RDPARTY@1.1444.2.8 / diff / nxr@1.1444.2.8
src/external/public-domain/tz/dist/Makefile@1.1.1.17.4.2 / diff / nxr@1.1.1.17.4.2
src/external/public-domain/tz/dist/NEWS@1.1.1.18.4.2 / diff / nxr@1.1.1.18.4.2
src/external/public-domain/tz/dist/README@1.1.1.5.6.1 / diff / nxr@1.1.1.5.6.1
src/external/public-domain/tz/dist/TZDATA_VERSION@1.8.4.2 / diff / nxr@1.8.4.2
src/external/public-domain/tz/dist/africa@1.1.1.11.4.2 / diff / nxr@1.1.1.11.4.2
src/external/public-domain/tz/dist/asia@1.1.1.16.4.2 / diff / nxr@1.1.1.16.4.2
src/external/public-domain/tz/dist/australasia@1.1.1.11.4.2 / diff / nxr@1.1.1.11.4.2
src/external/public-domain/tz/dist/backzone@1.1.1.11.4.2 / diff / nxr@1.1.1.11.4.2
src/external/public-domain/tz/dist/europe@1.1.1.17.4.2 / diff / nxr@1.1.1.17.4.2
src/external/public-domain/tz/dist/leap-seconds.list@1.1.1.7.4.2 / diff / nxr@1.1.1.7.4.2
src/external/public-domain/tz/dist/leapseconds@1.1.1.8.4.2 / diff / nxr@1.1.1.8.4.2
src/external/public-domain/tz/dist/northamerica@1.1.1.16.4.2 / diff / nxr@1.1.1.16.4.2
src/external/public-domain/tz/dist/southamerica@1.1.1.11.4.2 / diff / nxr@1.1.1.11.4.2
src/external/public-domain/tz/dist/theory.html@1.1.1.1.2.3 / diff / nxr@1.1.1.1.2.3
src/external/public-domain/tz/dist/version@1.1.1.5.4.2 / diff / nxr@1.1.1.5.4.2
src/external/public-domain/tz/dist/zishrink.awk@1.1.1.1.2.3 / diff / nxr@1.1.1.1.2.3
src/external/public-domain/tz/dist/zone.tab@1.1.1.11.4.2 / diff / nxr@1.1.1.11.4.2
src/external/public-domain/tz/dist/zone1970.tab@1.1.1.13.4.2 / diff / nxr@1.1.1.13.4.2

Catch up to current for the following files, requeted by kre in ticket 513:

external/public-domain/tz/dist/Makefile        up to 1.1.1.19
external/public-domain/tz/dist/NEWS            up to 1.1.1.20
external/public-domain/tz/dist/README          up to 1.1.1.6
external/public-domain/tz/dist/TZDATA_VERSION  up to 1.10
external/public-domain/tz/dist/africa          up to 1.1.1.13
external/public-domain/tz/dist/asia            up to 1.1.1.18
external/public-domain/tz/dist/australasia      up to 1.1.1.13
external/public-domain/tz/dist/backzone        up to 1.1.1.13
external/public-domain/tz/dist/europe          up to 1.1.1.19
external/public-domain/tz/dist/leap-seconds.list up to 1.1.1.9
external/public-domain/tz/dist/leapseconds      up to 1.1.1.10
external/public-domain/tz/dist/northamerica    up to 1.1.1.18
external/public-domain/tz/dist/southamerica    up to 1.1.1.13
external/public-domain/tz/dist/theory.html      up to 1.1.1.2
external/public-domain/tz/dist/version          up to 1.1.1.7
external/public-domain/tz/dist/zishrink.awk    up to 1.1.1.2
external/public-domain/tz/dist/zone.tab        up to 1.1.1.13
external/public-domain/tz/dist/zone1970.tab    up to 1.1.1.15
doc/3RDPARTY 1.1496 (via patch)

Import tzdata2018c.

(martin)

2018-01-31 18:03:48 UTC netbsd-8 commitmail json YAML

2018-01-31 18:01:55 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by skrll in ticket #509):
sys/dev/usb/if_ural.c: revision 1.53
sys/dev/usb/if_run.c: revision 1.25
sys/dev/usb/ustir.c: revision 1.39
sys/dev/usb/irmce.c: revision 1.4
sys/dev/usb/if_urtwn.c: revision 1.56
sys/dev/usb/pseye.c: revision 1.24
sys/dev/usb/if_rum.c: revision 1.59
sys/dev/usb/if_upl.c: revision 1.61
sys/dev/usb/ucom.c: revision 1.120
sys/dev/usb/if_zyd.c: revision 1.45
sys/dev/usb/if_axen.c: revision 1.12
sys/dev/usb/umidi.c: revision 1.74
sys/dev/usb/if_udav.c: revision 1.52
sys/dev/usb/if_athn_usb.c: revision 1.25
sys/dev/usb/usscanner.c: revision 1.43
sys/dev/usb/ualea.c: revision 1.6 - 1.9
sys/dev/usb/if_upgt.c: revision 1.18
sys/dev/usb/if_atu.c: revision 1.56
sys/dev/usb/utoppy.c: revision 1.30
sys/dev/usb/ubt.c: revision 1.60
sys/dev/usb/if_urtw.c: revision 1.14
sys/dev/usb/uirda.c: revision 1.43
sys/dev/usb/umass.c: revision 1.163
sys/dev/usb/if_cdce.c: revision 1.45
sys/dev/usb/if_cue.c: revision 1.77
sys/dev/usb/if_kue.c: revision 1.91
sys/dev/usb/uvideo.c: revision 1.46
sys/dev/usb/uhso.c: revision 1.27
sys/dev/usb/if_smsc.c: revision 1.33
sys/dev/usb/ugen.c: revision 1.137
sys/dev/usb/if_axe.c: revision 1.84
sys/dev/usb/if_aue.c: revision 1.142
sys/dev/usb/uscanner.c: revision 1.82
sys/dev/usb/if_urndis.c: revision 1.17
sys/dev/usb/udsir.c: revision 1.6
sys/dev/usb/if_url.c: revision 1.57
sys/dev/usb/if_otus.c: revision 1.32
sys/dev/usb/ulpt.c: revision 1.99

PR kern/52931 Kernel panics with Atheros usb wireless interface
Audit the flags to usbd_create_xfer so that USBD_FORCE_SHORT_XFER is
supplied wherever such a transfer is setup.  We can drop
USBD_SHORT_XFER_OK as it has not bearing on number of TDs

ualea: Tidy up a bit.  Fulfil requests completely.
Don't subtract uninitialized pktsize in error path.

(martin)

2018-01-31 16:24:11 UTC MAIN commitmail json YAML

2018-01-31 16:00:03 UTC MAIN commitmail json YAML

Add four Winbond devices.

(jakllsch)

2018-01-31 15:36:29 UTC MAIN commitmail json YAML

Explicitly setup the secondary IDE interrupt of PIIX on Milan.

The secondary IDE interrupt is connected to MBIRQ0 on PIIX, but
the Milan's ROM bootloader (at least version 0.99.7) doesn't seem
to setup the MBIRQ0 register to route it to IRQ15.

(tsutsui)

2018-01-31 15:23:08 UTC MAIN commitmail json YAML

Correct the check; we want to find IPPROTO_HOPOPTS, not IPV6_HOPOPTS. This
just couldn't work.

By the way, I'm wondering what is the point of this block. Calling
ip6_hopopts_input() won't achieve anything useful, and it could actually
be a problem, because there are several paths in it that call icmp6_error,
which calls ip6_output, and then we're back in the same function. Besides
it is possible to reach icmp6_error with a packet we emitted (as opposed
to a packet we are forwarding), and in that case we are sending an ICMP
error back to ourselves.

(maxv)

2018-01-31 14:16:28 UTC MAIN commitmail json YAML

Remove a misleading instruction. We don't care about increasing
m_pkthdr.len in ip6_insertfraghdr(), it gets recomputed after calling
this function.

If we cared there would be a bug, since we don't increase it in the
other branches.

(maxv)

2018-01-31 14:10:11 UTC MAIN commitmail json YAML

Try to sound a little less pessimistic, there is nothing wrong here.

(maxv)

2018-01-31 13:57:08 UTC MAIN commitmail json YAML

Style, localify, constify, and reorder a bit. No real functional change.

(maxv)

2018-01-31 07:33:18 UTC MAIN commitmail json YAML

apply a little more #ifdef INET/INET6.  fixes !INET6 builds.

(mrg)

2018-01-30 22:45:12 UTC MAIN commitmail json YAML

Add more "* as a service" and "software defined *" acronyms

(ginsbach)

2018-01-30 22:11:24 UTC netbsd-6-0 commitmail json YAML

2018-01-30 22:10:56 UTC netbsd-6-1 commitmail json YAML

2018-01-30 22:10:20 UTC netbsd-6 commitmail json YAML

2018-01-30 20:20:38 UTC MAIN commitmail json YAML

Move mpt_disc_enable setting into is_scsi block.

The field is only 16 bits, and is only refered to in the is_scsi case.

(jakllsch)

2018-01-30 20:15:41 UTC MAIN commitmail json YAML

more-fully initialize mpt_disc_enable

(jakllsch)

2018-01-30 19:22:28 UTC MAIN commitmail json YAML

2018-01-30 19:13:09 UTC MAIN commitmail json YAML

remove unused softc variables

(jakllsch)

2018-01-30 18:48:17 UTC netbsd-6-0 commitmail json YAML

2018-01-30 18:47:35 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1523):
sys/netinet6/frag6.c: revision 1.65
sys/netinet6/ip6_input.c: revision 1.187
sys/netinet6/ip6_var.h: revision 1.78
sys/netinet6/raw_ip6.c: revision 1.160 (patch)
sys/netinet6/ah_input.c: adjust other callers (patch)
sys/netinet6/esp_input.c: adjust other callers (patch)
sys/netinet6/ipcomp_input.c: adjust other callers (patch)
Fix a buffer overflow in ip6_get_prevhdr. Doing
        mtod(m, char *) + len
is wrong, an option is allowed to be located in another mbuf of the chain.
If the offset of an option within the chain is bigger than the length of
the first mbuf in that chain, we are reading/writing one byte of packet-
controlled data beyond the end of the first mbuf.
The length of this first mbuf depends on the layout the network driver
chose. In the most difficult case, it will allocate a 2KB cluster, which
is bigger than the Ethernet MTU.
But there is at least one way of exploiting this case: by sending a
special combination of nested IPv6 fragments, the packet can control a
good bunch of 'len'. By luck, the memory pool containing clusters does not
embed the pool header in front of the items, so it is not straightforward
to predict what is located at 'mtod(m, char *) + len'.
However, by sending offending fragments in a loop, it is possible to
crash the kernel - at some point we will hit important data structures.
As far as I can tell, PF protects against this difficult case, because
it kicks nested fragments. NPF does not protect against this. IPF I don't
know.
Then there are the more easy cases, if the MTU is bigger than a cluster,
or if the network driver did not allocate a cluster, or perhaps if the
fragments are received via a tunnel; I haven't investigated these cases.
Change ip6_get_prevhdr so that it returns an offset in the chain, and
always use IP6_EXTHDR_GET to get a writable pointer. IP6_EXTHDR_GET
leaves M_PKTHDR untouched.
This place is still fragile.

(martin)

2018-01-30 18:46:45 UTC netbsd-6-1 commitmail json YAML

2018-01-30 18:45:59 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1523):
sys/netinet6/frag6.c: revision 1.65
sys/netinet6/ip6_input.c: revision 1.187
sys/netinet6/ip6_var.h: revision 1.78
sys/netinet6/raw_ip6.c: revision 1.160 (patch)
sys/netinet6/ah_input.c: adjust other callers (patch)
sys/netinet6/esp_input.c: adjust other callers (patch)
sys/netinet6/ipcomp_input.c: adjust other callers (patch)
Fix a buffer overflow in ip6_get_prevhdr. Doing
        mtod(m, char *) + len
is wrong, an option is allowed to be located in another mbuf of the chain.
If the offset of an option within the chain is bigger than the length of
the first mbuf in that chain, we are reading/writing one byte of packet-
controlled data beyond the end of the first mbuf.
The length of this first mbuf depends on the layout the network driver
chose. In the most difficult case, it will allocate a 2KB cluster, which
is bigger than the Ethernet MTU.
But there is at least one way of exploiting this case: by sending a
special combination of nested IPv6 fragments, the packet can control a
good bunch of 'len'. By luck, the memory pool containing clusters does not
embed the pool header in front of the items, so it is not straightforward
to predict what is located at 'mtod(m, char *) + len'.
However, by sending offending fragments in a loop, it is possible to
crash the kernel - at some point we will hit important data structures.
As far as I can tell, PF protects against this difficult case, because
it kicks nested fragments. NPF does not protect against this. IPF I don't
know.
Then there are the more easy cases, if the MTU is bigger than a cluster,
or if the network driver did not allocate a cluster, or perhaps if the
fragments are received via a tunnel; I haven't investigated these cases.
Change ip6_get_prevhdr so that it returns an offset in the chain, and
always use IP6_EXTHDR_GET to get a writable pointer. IP6_EXTHDR_GET
leaves M_PKTHDR untouched.
This place is still fragile.

(martin)

2018-01-30 18:45:16 UTC netbsd-6 commitmail json YAML

2018-01-30 18:44:22 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1523):
sys/netinet6/frag6.c: revision 1.65
sys/netinet6/ip6_input.c: revision 1.187
sys/netinet6/ip6_var.h: revision 1.78
sys/netinet6/raw_ip6.c: revision 1.160 (patch)
sys/netinet6/ah_input.c: adjust other callers (patch)
sys/netinet6/esp_input.c: adjust other callers (patch)
sys/netinet6/ipcomp_input.c: adjust other callers (patch)
Fix a buffer overflow in ip6_get_prevhdr. Doing
        mtod(m, char *) + len
is wrong, an option is allowed to be located in another mbuf of the chain.
If the offset of an option within the chain is bigger than the length of
the first mbuf in that chain, we are reading/writing one byte of packet-
controlled data beyond the end of the first mbuf.
The length of this first mbuf depends on the layout the network driver
chose. In the most difficult case, it will allocate a 2KB cluster, which
is bigger than the Ethernet MTU.
But there is at least one way of exploiting this case: by sending a
special combination of nested IPv6 fragments, the packet can control a
good bunch of 'len'. By luck, the memory pool containing clusters does not
embed the pool header in front of the items, so it is not straightforward
to predict what is located at 'mtod(m, char *) + len'.
However, by sending offending fragments in a loop, it is possible to
crash the kernel - at some point we will hit important data structures.
As far as I can tell, PF protects against this difficult case, because
it kicks nested fragments. NPF does not protect against this. IPF I don't
know.
Then there are the more easy cases, if the MTU is bigger than a cluster,
or if the network driver did not allocate a cluster, or perhaps if the
fragments are received via a tunnel; I haven't investigated these cases.
Change ip6_get_prevhdr so that it returns an offset in the chain, and
always use IP6_EXTHDR_GET to get a writable pointer. IP6_EXTHDR_GET
leaves M_PKTHDR untouched.
This place is still fragile.

(martin)

2018-01-30 18:32:34 UTC netbsd-7-0 commitmail json YAML

2018-01-30 18:31:53 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1560):
sys/netinet6/frag6.c: revision 1.65
sys/netinet6/ip6_input.c: revision 1.187
sys/netinet6/ip6_var.h: revision 1.78
sys/netinet6/raw_ip6.c: revision 1.160 (patch)
Fix a buffer overflow in ip6_get_prevhdr. Doing
        mtod(m, char *) + len
is wrong, an option is allowed to be located in another mbuf of the chain.
If the offset of an option within the chain is bigger than the length of
the first mbuf in that chain, we are reading/writing one byte of packet-
controlled data beyond the end of the first mbuf.
The length of this first mbuf depends on the layout the network driver
chose. In the most difficult case, it will allocate a 2KB cluster, which
is bigger than the Ethernet MTU.
But there is at least one way of exploiting this case: by sending a
special combination of nested IPv6 fragments, the packet can control a
good bunch of 'len'. By luck, the memory pool containing clusters does not
embed the pool header in front of the items, so it is not straightforward
to predict what is located at 'mtod(m, char *) + len'.
However, by sending offending fragments in a loop, it is possible to
crash the kernel - at some point we will hit important data structures.
As far as I can tell, PF protects against this difficult case, because
it kicks nested fragments. NPF does not protect against this. IPF I don't
know.
Then there are the more easy cases, if the MTU is bigger than a cluster,
or if the network driver did not allocate a cluster, or perhaps if the
fragments are received via a tunnel; I haven't investigated these cases.
Change ip6_get_prevhdr so that it returns an offset in the chain, and
always use IP6_EXTHDR_GET to get a writable pointer. IP6_EXTHDR_GET
leaves M_PKTHDR untouched.
This place is still fragile.

(martin)

2018-01-30 18:31:12 UTC netbsd-7-1 commitmail json YAML

2018-01-30 18:30:31 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1560):
sys/netinet6/frag6.c: revision 1.65
sys/netinet6/ip6_input.c: revision 1.187
sys/netinet6/ip6_var.h: revision 1.78
sys/netinet6/raw_ip6.c: revision 1.160 (patch)
Fix a buffer overflow in ip6_get_prevhdr. Doing
        mtod(m, char *) + len
is wrong, an option is allowed to be located in another mbuf of the chain.
If the offset of an option within the chain is bigger than the length of
the first mbuf in that chain, we are reading/writing one byte of packet-
controlled data beyond the end of the first mbuf.
The length of this first mbuf depends on the layout the network driver
chose. In the most difficult case, it will allocate a 2KB cluster, which
is bigger than the Ethernet MTU.
But there is at least one way of exploiting this case: by sending a
special combination of nested IPv6 fragments, the packet can control a
good bunch of 'len'. By luck, the memory pool containing clusters does not
embed the pool header in front of the items, so it is not straightforward
to predict what is located at 'mtod(m, char *) + len'.
However, by sending offending fragments in a loop, it is possible to
crash the kernel - at some point we will hit important data structures.
As far as I can tell, PF protects against this difficult case, because
it kicks nested fragments. NPF does not protect against this. IPF I don't
know.
Then there are the more easy cases, if the MTU is bigger than a cluster,
or if the network driver did not allocate a cluster, or perhaps if the
fragments are received via a tunnel; I haven't investigated these cases.
Change ip6_get_prevhdr so that it returns an offset in the chain, and
always use IP6_EXTHDR_GET to get a writable pointer. IP6_EXTHDR_GET
leaves M_PKTHDR untouched.
This place is still fragile.

(martin)

2018-01-30 18:29:25 UTC netbsd-7 commitmail json YAML

2018-01-30 18:28:46 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1560):
sys/netinet6/frag6.c: revision 1.65
sys/netinet6/ip6_input.c: revision 1.187
sys/netinet6/ip6_var.h: revision 1.78
sys/netinet6/raw_ip6.c: revision 1.160 (patch)
Fix a buffer overflow in ip6_get_prevhdr. Doing
        mtod(m, char *) + len
is wrong, an option is allowed to be located in another mbuf of the chain.
If the offset of an option within the chain is bigger than the length of
the first mbuf in that chain, we are reading/writing one byte of packet-
controlled data beyond the end of the first mbuf.
The length of this first mbuf depends on the layout the network driver
chose. In the most difficult case, it will allocate a 2KB cluster, which
is bigger than the Ethernet MTU.
But there is at least one way of exploiting this case: by sending a
special combination of nested IPv6 fragments, the packet can control a
good bunch of 'len'. By luck, the memory pool containing clusters does not
embed the pool header in front of the items, so it is not straightforward
to predict what is located at 'mtod(m, char *) + len'.
However, by sending offending fragments in a loop, it is possible to
crash the kernel - at some point we will hit important data structures.
As far as I can tell, PF protects against this difficult case, because
it kicks nested fragments. NPF does not protect against this. IPF I don't
know.
Then there are the more easy cases, if the MTU is bigger than a cluster,
or if the network driver did not allocate a cluster, or perhaps if the
fragments are received via a tunnel; I haven't investigated these cases.
Change ip6_get_prevhdr so that it returns an offset in the chain, and
always use IP6_EXTHDR_GET to get a writable pointer. IP6_EXTHDR_GET
leaves M_PKTHDR untouched.
This place is still fragile.

(martin)

2018-01-30 18:22:29 UTC netbsd-8 commitmail json YAML

2018-01-30 18:21:10 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #527):
sys/netinet6/frag6.c: revision 1.65
sys/netinet6/ip6_input.c: revision 1.187
sys/netinet6/ip6_var.h: revision 1.78
sys/netinet6/raw_ip6.c: revision 1.160
Fix a buffer overflow in ip6_get_prevhdr. Doing
        mtod(m, char *) + len
is wrong, an option is allowed to be located in another mbuf of the chain.
If the offset of an option within the chain is bigger than the length of
the first mbuf in that chain, we are reading/writing one byte of packet-
controlled data beyond the end of the first mbuf.
The length of this first mbuf depends on the layout the network driver
chose. In the most difficult case, it will allocate a 2KB cluster, which
is bigger than the Ethernet MTU.
But there is at least one way of exploiting this case: by sending a
special combination of nested IPv6 fragments, the packet can control a
good bunch of 'len'. By luck, the memory pool containing clusters does not
embed the pool header in front of the items, so it is not straightforward
to predict what is located at 'mtod(m, char *) + len'.
However, by sending offending fragments in a loop, it is possible to
crash the kernel - at some point we will hit important data structures.
As far as I can tell, PF protects against this difficult case, because
it kicks nested fragments. NPF does not protect against this. IPF I don't
know.
Then there are the more easy cases, if the MTU is bigger than a cluster,
or if the network driver did not allocate a cluster, or perhaps if the
fragments are received via a tunnel; I haven't investigated these cases.
Change ip6_get_prevhdr so that it returns an offset in the chain, and
always use IP6_EXTHDR_GET to get a writable pointer. IP6_EXTHDR_GET
leaves M_PKTHDR untouched.
This place is still fragile.

(martin)

2018-01-30 15:54:03 UTC MAIN commitmail json YAML

Style, localify, remove dead code, and fix typos. No functional change.

(maxv)

2018-01-30 15:35:31 UTC MAIN commitmail json YAML

Kick nested fragments.

(maxv)

2018-01-30 15:28:39 UTC MAIN commitmail json YAML

2018-01-30 14:49:25 UTC MAIN commitmail json YAML

Fix a buffer overflow in ip6_get_prevhdr. Doing

mtod(m, char *) + len

is wrong, an option is allowed to be located in another mbuf of the chain.
If the offset of an option within the chain is bigger than the length of
the first mbuf in that chain, we are reading/writing one byte of packet-
controlled data beyond the end of the first mbuf.

The length of this first mbuf depends on the layout the network driver
chose. In the most difficult case, it will allocate a 2KB cluster, which
is bigger than the Ethernet MTU.

But there is at least one way of exploiting this case: by sending a
special combination of nested IPv6 fragments, the packet can control a
good bunch of 'len'. By luck, the memory pool containing clusters does not
embed the pool header in front of the items, so it is not straightforward
to predict what is located at 'mtod(m, char *) + len'.

However, by sending offending fragments in a loop, it is possible to
crash the kernel - at some point we will hit important data structures.

As far as I can tell, PF protects against this difficult case, because
it kicks nested fragments. NPF does not protect against this. IPF I don't
know.

Then there are the more easy cases, if the MTU is bigger than a cluster,
or if the network driver did not allocate a cluster, or perhaps if the
fragments are received via a tunnel; I haven't investigated these cases.

Change ip6_get_prevhdr so that it returns an offset in the chain, and
always use IP6_EXTHDR_GET to get a writable pointer. IP6_EXTHDR_GET
leaves M_PKTHDR untouched.

This place is still fragile.

(maxv)

2018-01-30 13:11:28 UTC MAIN commitmail json YAML

Fixed potential NULL pointer dereference (CID: 978477)

(shm)

2018-01-30 11:03:06 UTC MAIN commitmail json YAML

Check if a queued work is tried to be enqueued again, which is not allowed

(ozaki-r)

2018-01-30 11:01:04 UTC MAIN commitmail json YAML

Prevent rt_free_global.wk from being enqueued to workqueue doubly

(ozaki-r)