Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (3h)  netbsd-8 (5d)  netbsd-10 (5d)  netbsd-9 (11d)  thorpej-ifq (175d)  thorpej-altq-separation (177d) 

2024-05-10 02:05:04 UTC Now

2018-01-30 10:40:02 UTC MAIN commitmail json YAML

Destroy ifq_lock at the end of if_detach

It still can be used in if_detach.

(ozaki-r)

2018-01-30 08:53:39 UTC MAIN commitmail json YAML

Avoid panic while detaching xhci. The xhci driver has both sc_child and
sc_child2 but xhci_childdet() only supported sc_child. OK'd by Nick.

(msaitoh)

2018-01-30 08:15:47 UTC MAIN commitmail json YAML

Make wm(4) watchdog MP-safe. There is almost no influence on performance.

wm(4) does not use ifp->if_watchdog now, that is, it does not touch
ifp->if_timer.
It also uses own callout(wm_tick) as watchdog now. The watchdog uses
per-queue counter to check timeout. So, global lock is not required.

(knakahara)

2018-01-30 07:52:23 UTC MAIN commitmail json YAML

2018-01-29 22:08:59 UTC perseant-stdc-iso10646 commitmail json YAML

2018-01-29 19:51:15 UTC MAIN commitmail json YAML

more cleanup (don't allow oldlenp == NULL)

(christos)

2018-01-29 19:44:06 UTC netbsd-7-0 commitmail json YAML

2018-01-29 19:43:32 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1557):
sys/netipsec/xform_ah.c: revision 1.76
Fix a vulnerability in IPsec-IPv6-AH, that allows an attacker to remotely
crash the kernel with a single packet.
In this loop we need to increment 'ad' by two, because the length field
of the option header does not count the size of the option header itself.
If the length is zero, then 'count' is incremented by zero, and there's
an infinite loop. Beyond that, this code was written with the assumption
that since the IPv6 packet already went through the generic IPv6 option
parser, several fields are guaranteed to be valid; but this assumption
does not hold because of the missing '+2', and there's as a result a
triggerable buffer overflow (write zeros after the end of the mbuf,
potentially to the next mbuf in memory since it's a pool).
Add the missing '+2', this place will be reinforced in separate commits.

(martin)

2018-01-29 19:42:47 UTC netbsd-7-1 commitmail json YAML

2018-01-29 19:42:02 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1557):
sys/netipsec/xform_ah.c: revision 1.76
Fix a vulnerability in IPsec-IPv6-AH, that allows an attacker to remotely
crash the kernel with a single packet.
In this loop we need to increment 'ad' by two, because the length field
of the option header does not count the size of the option header itself.
If the length is zero, then 'count' is incremented by zero, and there's
an infinite loop. Beyond that, this code was written with the assumption
that since the IPv6 packet already went through the generic IPv6 option
parser, several fields are guaranteed to be valid; but this assumption
does not hold because of the missing '+2', and there's as a result a
triggerable buffer overflow (write zeros after the end of the mbuf,
potentially to the next mbuf in memory since it's a pool).
Add the missing '+2', this place will be reinforced in separate commits.

(martin)

2018-01-29 19:40:17 UTC netbsd-7 commitmail json YAML

2018-01-29 19:39:40 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1557):
sys/netipsec/xform_ah.c: revision 1.76
Fix a vulnerability in IPsec-IPv6-AH, that allows an attacker to remotely
crash the kernel with a single packet.
In this loop we need to increment 'ad' by two, because the length field
of the option header does not count the size of the option header itself.
If the length is zero, then 'count' is incremented by zero, and there's
an infinite loop. Beyond that, this code was written with the assumption
that since the IPv6 packet already went through the generic IPv6 option
parser, several fields are guaranteed to be valid; but this assumption
does not hold because of the missing '+2', and there's as a result a
triggerable buffer overflow (write zeros after the end of the mbuf,
potentially to the next mbuf in memory since it's a pool).
Add the missing '+2', this place will be reinforced in separate commits.

(martin)

2018-01-29 19:33:39 UTC MAIN commitmail json YAML

remove some leftover references to ki2c in comments
no functional change

(macallan)

2018-01-29 19:31:26 UTC netbsd-6-0 commitmail json YAML

2018-01-29 19:30:53 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1521):
sys/netipsec/xform_ah.c: revision 1.76
Fix a vulnerability in IPsec-IPv6-AH, that allows an attacker to remotely
crash the kernel with a single packet.
In this loop we need to increment 'ad' by two, because the length field
of the option header does not count the size of the option header itself.
If the length is zero, then 'count' is incremented by zero, and there's
an infinite loop. Beyond that, this code was written with the assumption
that since the IPv6 packet already went through the generic IPv6 option
parser, several fields are guaranteed to be valid; but this assumption
does not hold because of the missing '+2', and there's as a result a
triggerable buffer overflow (write zeros after the end of the mbuf,
potentially to the next mbuf in memory since it's a pool).
Add the missing '+2', this place will be reinforced in separate commits.

(martin)

2018-01-29 19:29:48 UTC netbsd-6-1 commitmail json YAML

2018-01-29 19:29:00 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1521):
sys/netipsec/xform_ah.c: revision 1.76
Fix a vulnerability in IPsec-IPv6-AH, that allows an attacker to remotely
crash the kernel with a single packet.
In this loop we need to increment 'ad' by two, because the length field
of the option header does not count the size of the option header itself.
If the length is zero, then 'count' is incremented by zero, and there's
an infinite loop. Beyond that, this code was written with the assumption
that since the IPv6 packet already went through the generic IPv6 option
parser, several fields are guaranteed to be valid; but this assumption
does not hold because of the missing '+2', and there's as a result a
triggerable buffer overflow (write zeros after the end of the mbuf,
potentially to the next mbuf in memory since it's a pool).
Add the missing '+2', this place will be reinforced in separate commits.

(martin)

2018-01-29 19:27:06 UTC netbsd-6 commitmail json YAML

2018-01-29 19:25:51 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1521):
sys/netipsec/xform_ah.c: revision 1.76
Fix a vulnerability in IPsec-IPv6-AH, that allows an attacker to remotely
crash the kernel with a single packet.
In this loop we need to increment 'ad' by two, because the length field
of the option header does not count the size of the option header itself.
If the length is zero, then 'count' is incremented by zero, and there's
an infinite loop. Beyond that, this code was written with the assumption
that since the IPv6 packet already went through the generic IPv6 option
parser, several fields are guaranteed to be valid; but this assumption
does not hold because of the missing '+2', and there's as a result a
triggerable buffer overflow (write zeros after the end of the mbuf,
potentially to the next mbuf in memory since it's a pool).
Add the missing '+2', this place will be reinforced in separate commits.

(martin)

2018-01-29 16:24:23 UTC MAIN commitmail json YAML

Cosmetics: fix the order of calloc() arguments.

(martin)

2018-01-29 15:48:50 UTC MAIN commitmail json YAML

Drop commended out include to a hardcoded path in root's home directory.

(sevan)

2018-01-29 11:14:12 UTC MAIN commitmail json YAML

Note import of dhcpcd-7.0.1

(roy)

2018-01-29 11:13:06 UTC MAIN commitmail json YAML

2018-01-29 10:57:13 UTC MAIN commitmail json YAML

Start cleaning up ip6_input.c. Several pieces of code have evolved but
their neighboring comments were not updated. So update them, and remove
code that has been disabled for years (it has no use anyway).

(maxv)

2018-01-29 08:27:10 UTC MAIN commitmail json YAML

Style, and use __cacheline_aligned.

By the way, it would be nice to revisit the use of 'ip6flow_lock' in
ip6flow_fastforward(): it is taken right away because of 'ip6flow_inuse',
but then we perform several checks that do not require it.

(maxv)

2018-01-29 08:17:18 UTC MAIN commitmail json YAML

2018-01-29 08:14:54 UTC MAIN commitmail json YAML

Fix two pretty bad mistakes. If ipsec6_check_policy fails m is not freed,
and a 'goto out' is missing after ipsec6_process_packet.

(maxv)

2018-01-29 04:17:32 UTC MAIN commitmail json YAML

Fix unmatched return type. The return value of wm_txeof() is not useded yet.

(knakahara)

2018-01-29 03:42:53 UTC MAIN commitmail json YAML

One more from christos@

No need to initialize fill_func

(pgoyette)

2018-01-29 03:42:30 UTC MAIN commitmail json YAML

Fix if_wm.c:r1.557 merge miss, sorry.

(knakahara)

2018-01-29 03:35:23 UTC MAIN commitmail json YAML

More simplification, this time from ozaki-r@

No need to break after return.

(pgoyette)

2018-01-29 03:29:26 UTC MAIN commitmail json YAML

Simplify, from christos@

(pgoyette)

2018-01-29 02:02:14 UTC MAIN commitmail json YAML

Use existing fill_[pd]rlist() functions to calculate size of buffer to
allocate, rather than relying on an arbitrary length passed in from
userland.

Allow copyout() of partial results if the user buffer is too small, to
be consistent with the way sysctl(3) is documented.

Garbage-collect now-unused third parrameter in the fill_[pd]rlist()
functions.

As discussed on IRC.
OK kamil@ and christos@

XXX Needs pull-up to netbsd-8 branch.

(pgoyette)

2018-01-28 22:24:58 UTC MAIN commitmail json YAML

- don't return ENOMEM for errors not related to memory
- don't overload return values (-error/+size)
- don't allocate kernel memory from user supplied length.

(christos)

2018-01-28 18:31:41 UTC MAIN commitmail json YAML

Enable CPU frequency scaling and thermal sensors.

(jmcneill)

2018-01-28 18:31:15 UTC MAIN commitmail json YAML

Add support for H5 simple framebuffer, CPUX clocks, R_I2C controller, SID
controller, and thermal sensors.

(jmcneill)

2018-01-28 18:24:51 UTC MAIN commitmail json YAML

Add support for H5 CPU and GPU thermal sensors.

(jmcneill)

2018-01-28 18:21:52 UTC MAIN commitmail json YAML

Allow set_voltage/get_voltage to succeed on a fixed regulator so long as
the requested range overlaps with the fixed rate defined in the devicetree.

(jmcneill)

2018-01-28 16:44:15 UTC MAIN commitmail json YAML

CID-1428671: Unchecked malloc/strdup

(christos)

2018-01-28 16:43:32 UTC MAIN commitmail json YAML

2018-01-28 16:32:43 UTC MAIN commitmail json YAML

Compute Core/SMT-IDs for AMD family 17h (Ryzen).

(mlelstv)

2018-01-28 16:15:41 UTC MAIN commitmail json YAML

CPUID tells the ApicIdCoreIdSize in bits.

(mlelstv)

2018-01-28 16:12:41 UTC MAIN commitmail json YAML

add an annotation.

(christos)

2018-01-28 15:48:44 UTC MAIN commitmail json YAML

CID-1428639: make sure we always initialiaze hash, because if ultimately
the file is not found and we end up looping we need them.

(christos)

2018-01-28 15:00:42 UTC MAIN commitmail json YAML

Check for undefined behaviour when doing right-shift.

(mlelstv)

2018-01-28 14:34:26 UTC MAIN commitmail json YAML

Fix copy paste error. from coverity.

(maya)

2018-01-28 14:34:06 UTC MAIN commitmail json YAML

Don't print an error when we find a CIS tuple code in the vendor-unique
range (80h-8Fh).

(jmcneill)

2018-01-28 14:22:23 UTC MAIN commitmail json YAML

Replace CRTC register values with ones taken from sys/dev/ic/vga_subr.c.

This fixes noise around column 3 and 4 and makes screen output clearer
on Milan with S3 Trio64V.

(tsutsui)

2018-01-28 13:37:39 UTC MAIN commitmail json YAML

Use a protocol-agnostic URL (don't degrade HTTPS->HTTP)

Suggested by Travis Paul in PR bin/52958.

(maya)

2018-01-28 10:02:01 UTC MAIN commitmail json YAML

Prevent use-after-free where genfs_node_destroy() would destroy
a lock residing in the just freed inode data.

(hannken)

2018-01-28 10:01:18 UTC MAIN commitmail json YAML

Make sure inode blocks and size are zero when VOP_INACTIVE()
finalises a now unlinked inode.
Counterpart of the check in ffs_newvnode().

(hannken)

2018-01-28 10:00:31 UTC MAIN commitmail json YAML

Make the console framebuffer visible when polling mode console input is used.

(jandberg)

2018-01-28 01:09:58 UTC MAIN commitmail json YAML

Shrink ramdisk to fit INSTALL kernel within 5MB:
- drop shutdown
- replace disklabel, fsck_ffs, and newfs with stripped-down versions

(rin)

2018-01-27 23:59:18 UTC MAIN commitmail json YAML

explain how to allow coverity to use sysroot

(christos)

2018-01-27 23:07:36 UTC MAIN commitmail json YAML

apply the change from arch/x86/x86/pmap.c rev. 1.266 commitid vZRjvmxG7YTHLOfA:

In pmap_enter_ma(), only try to allocate pves if we might need them,
and even if that fails, only fail the operation if we later discover
that we really do need them.  If we are replacing an existing mapping,
reuse the pv structure where possible.

This implements the requirement that pmap_enter(PMAP_CANFAIL) must not fail
when replacing an existing mapping with the first mapping of a new page,
which is an unintended consequence of the changes from the rmind-uvmplock
branch in 2011.

The problem arises when pmap_enter(PMAP_CANFAIL) is used to replace an existing
pmap mapping with a mapping of a different page (eg. to resolve a copy-on-write).
If that fails and leaves the old pmap entry in place, then UVM won't hold
the right locks when it eventually retries.  This entanglement of the UVM and
pmap locking was done in rmind-uvmplock in order to improve performance,
but it also means that the UVM state and pmap state need to be kept in sync
more than they did before.  It would be possible to handle this in the UVM code
instead of in the pmap code, but these pmap changes improve the handling of
low memory situations in general, and handling this in UVM would be clunky,
so this seemed like the better way to go.

This somewhat indirectly fixes PR 52706 on the remaining platforms where
this problem existed.

(chs)

2018-01-27 22:25:23 UTC MAIN commitmail json YAML

Recent changes have increased the number of "things" the bootloader
needs to deal with.  Increase the table size so we don't overflow.

(pgoyette)

2018-01-27 21:46:54 UTC MAIN commitmail json YAML

Update amdzentemp(4) attachment info.  Also for ALL, remove duplicate
entry for amdtemp(4).

(pgoyette)

2018-01-27 21:41:50 UTC MAIN commitmail json YAML

Update attachment info - amdtemp(4) attaches to amdnb_miscbus attribute

(pgoyette)

2018-01-27 21:39:06 UTC MAIN commitmail json YAML

Update attachment details for amdzentemp - it attaches to amdsmnbus? now.

(pgoyette)

2018-01-27 21:24:30 UTC MAIN commitmail json YAML

rescan amdsmnbus instead of amdsmn (fixes panic)

(kardel)

2018-01-27 18:59:38 UTC MAIN commitmail json YAML

Remove trailing whitespace and Tn macro.

(wiz)

2018-01-27 18:48:59 UTC MAIN commitmail json YAML

2018-01-27 18:44:19 UTC MAIN commitmail json YAML

2018-01-27 18:27:08 UTC MAIN commitmail json YAML

Put the default %cs value in INTR_RECURSE_HWFRAME. Pushing an immediate
costs less than reading the %cs register and pushing its value. This
value is not allowed to be != GSEL(GCODE_SEL,SEL_KPL) in all cases.

(maxv)

2018-01-27 18:17:57 UTC MAIN commitmail json YAML

Declare and use INTR_RECURSE_ENTRY, an optimized version of INTRENTRY.
When processing deferred interrupts, we are always entering the new
handler in kernel mode, so there is no point performing the userland
checks.

Saves several instructions.

(maxv)

2018-01-27 17:54:13 UTC MAIN commitmail json YAML

2018-01-27 16:21:47 UTC MAIN commitmail json YAML

Fix issue with audio being downpitched, thanks to <nat>

"it seems that snapper_init should be called before audio_attach_mi, as snapper
init is setting the rate to 44100 after the hardware format has been configured
by audio_attach_mi.

audio_attach_mi should be the last thing called during an attach of an audio
device so the audio device is ready to be configured when audio_attach_mi is
called."

Resolves PR port-macppc/52949

(sevan)

2018-01-27 15:31:10 UTC MAIN commitmail json YAML

SMAP on i386.

(maxv)

2018-01-27 14:17:46 UTC MAIN commitmail json YAML

Apply RTL8211E "no-tx-delay" workaround to NanoPi NEO Plus2 boards as well.

(jmcneill)

2018-01-27 10:07:41 UTC MAIN commitmail json YAML

Fix more printf format strings for mfspr() (hi mrg).

(flxd)

2018-01-27 09:33:25 UTC MAIN commitmail json YAML

2018-01-27 08:12:27 UTC MAIN commitmail json YAML

Remove DO_DEFERRED_SWITCH and DO_DEFERRED_SWITCH_RETRY, unused.

(maxv)

2018-01-27 08:05:14 UTC MAIN commitmail json YAML

Use .pushsection (like amd64), and align INTRENTRY.

(maxv)

2018-01-27 07:51:04 UTC MAIN commitmail json YAML

Remove these files. No one cares about this on i386, and there is no
point in keeping undocumented options nobody understands anyway.

(maxv)

2018-01-27 07:45:58 UTC MAIN commitmail json YAML

Sync with amd64, in particular, add END() markers, don't fall through
functions, narrow the copy windows, and remove suword.

(maxv)

2018-01-27 03:54:01 UTC MAIN commitmail json YAML

Need strings.h for ffs()
Resolves implict declaration warning of ffs() when building tools via build.sh

(sevan)

2018-01-27 02:07:33 UTC MAIN commitmail json YAML

2018-01-27 00:23:19 UTC MAIN commitmail json YAML

2018-01-27 00:21:42 UTC MAIN commitmail json YAML

provide an intermediate "bus" for the module and to be the same structure
like amdtemp

(christos)

2018-01-27 00:00:26 UTC MAIN commitmail json YAML

remove useless KASSERT.

(christos)

2018-01-26 23:36:01 UTC MAIN commitmail json YAML

Fix typo in previous.  mea culpa, mea culpa, mea maxima culpa

(pgoyette)

2018-01-26 23:01:44 UTC MAIN commitmail json YAML

sc->sc_sensor cannot be NULL since it was just allocated with KM_SLEEP
(which cannot fail).  So remove the NULL-check.  CID/1428644

(pgoyette)

2018-01-26 22:58:09 UTC MAIN commitmail json YAML

Ensure that dev is not NULL - CID/1428649

(pgoyette)

2018-01-26 22:54:33 UTC MAIN commitmail json YAML

Bounds checking - CID/1428650

(pgoyette)

2018-01-26 22:48:22 UTC MAIN commitmail json YAML

Unitialized variable - CID/1428657

(pgoyette)

2018-01-26 19:53:10 UTC netbsd-8 commitmail json YAML

2018-01-26 19:51:19 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #512):
sys/netipsec/xform_ah.c: revision 1.75
sys/netipsec/xform_ah.c: revision 1.76
Revert a part of rev1.49 (six months ago). The pointer given to memcpy
was correct.
Discussed with Christos and Ryota.
Fix a vulnerability in IPsec-IPv6-AH, that allows an attacker to remotely
crash the kernel with a single packet.
In this loop we need to increment 'ad' by two, because the length field
of the option header does not count the size of the option header itself.
If the length is zero, then 'count' is incremented by zero, and there's
an infinite loop. Beyond that, this code was written with the assumption
that since the IPv6 packet already went through the generic IPv6 option
parser, several fields are guaranteed to be valid; but this assumption
does not hold because of the missing '+2', and there's as a result a
triggerable buffer overflow (write zeros after the end of the mbuf,
potentially to the next mbuf in memory since it's a pool).
Add the missing '+2', this place will be reinforced in separate commits.

(martin)

2018-01-26 17:49:55 UTC MAIN commitmail json YAML

Another try fixing printf format using the ultimate uintmax_t idiom.

(flxd)

2018-01-26 16:25:28 UTC MAIN commitmail json YAML

Fix 82574 MSI-X mode cannot receive packets after 82574 receives high rate traffic.

In short, 82574 MSI-X mode does not cause RXQ MSI-X vector when 82574's
phys FIFO overflows. I don't know why but 82574 causes not RXQ MSI-X vector
but OTHER MSI-X vector at the situation.
see:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v4.15-rc9&id=4aea7a5c5e940c1723add439f4088844cd26196d

advised by msaitoh@n.o, thanks.

(knakahara)

2018-01-26 15:41:13 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #511):
sys/kern/kern_timeout.c: revision 1.54
sys/netinet6/nd6_nbr.c: revision 1.141
sys/netinet6/nd6_nbr.c: revision 1.144
sys/netinet/if_arp.c: revision 1.256
Fix a deadlock on callout_halt of nd6_dad_timer
We must not call callout_halt of nd6_dad_timer with holding nd6_dad_lock because
the lock is taken in nd6_dad_timer. Once softnet_lock goes away, we can pass the
lock to callout_halt, but for now we cannot.
Make DAD destructions (MP-)safe with callout_stop
arp_dad_stoptimer and nd6_dad_stoptimer can be called with or without
softnet_lock held and unfortunately we have no easy way to statically know which.
So it is hard to use callout_halt there.
To address the situation, we use callout_stop to make the code safe. The new
approach copes with the issue by delegating the destruction of a callout to
callout itself, which allows us to not wait the callout to finish. This can be
done thanks to that DAD objects are separated from other data such as ifa.
The approach is suggested by riastradh@
Proposed on tech-kern@ and tech-net@
Sanity-check if interlock is held when it's passed

(martin)

2018-01-26 15:12:37 UTC MAIN commitmail json YAML

Remove Tn. Mention first NetBSD release.

(wiz)

2018-01-26 14:47:41 UTC MAIN commitmail json YAML

A few fixes:

* Style.

* Don't add M_PKTHDR manually, that's absolutely forbidden. Add a
  KASSERT to make sure it's already there.

* Add a missing NULL check after m_pullup.

(maxv)

2018-01-26 14:41:22 UTC MAIN commitmail json YAML

Add etherip, so that we at least know it exists on amd64.

(maxv)

2018-01-26 14:38:46 UTC MAIN commitmail json YAML

Zero out the scratch value in the UTLS page during context switches. We
temporarily put %rax there when processing syscalls, and we wouldn't
want the new lwp to see the %rax value of the previous lwp.

(maxv)

2018-01-26 14:28:17 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by sevan in ticket #510):
sys/arch/sun3/conf/GENERIC3X: revision 1.130
sys/arch/sparc64/conf/GENERIC: revision 1.203
sys/arch/news68k/conf/LIBERO: revision 1.66
sys/arch/amiga/conf/DRACO: revision 1.185
sys/arch/evbarm/conf/MV2120: revision 1.35
sys/arch/x68k/conf/GENERIC: revision 1.187
sys/arch/rs6000/conf/GENERIC: revision 1.39
sys/arch/news68k/conf/GENERIC_TINY: revision 1.86
sys/arch/i386/conf/XEN3_DOMU: revision 1.88
sys/arch/iyonix/conf/GENERIC: revision 1.97
sys/arch/evbarm64/conf/A64EMUL: revision 1.11
sys/arch/mvme68k/conf/GENERIC: revision 1.98
sys/arch/acorn32/conf/GENERIC: revision 1.124
sys/arch/i386/conf/XEN3_DOM0: revision 1.125
sys/arch/cobalt/conf/INSTALL: revision 1.65
sys/arch/macppc/conf/GENERIC_601: revision 1.16
sys/arch/hppa/conf/GENERIC: revision 1.17
sys/arch/amiga/conf/GENERIC.in: revision 1.137
sys/arch/sgimips/conf/GENERIC32_IP12: revision 1.33
sys/arch/netwinder/conf/GENERIC: revision 1.134
sys/arch/amd64/conf/XEN3_DOMU: revision 1.83
sys/arch/mac68k/conf/GENERIC: revision 1.225
sys/arch/arc/conf/RPC44: revision 1.54
sys/arch/mipsco/conf/GENERIC: revision 1.92
sys/arch/cats/conf/GENERIC: revision 1.166
sys/arch/amd64/conf/XEN3_DOM0: revision 1.145
sys/arch/amigappc/conf/GENERIC: revision 1.33
sys/arch/sun3/conf/GENERIC: revision 1.176
sys/arch/news68k/conf/GENERIC: revision 1.130
sys/arch/hpcsh/conf/GENERIC: revision 1.110
sys/arch/hp300/conf/GENERIC: revision 1.198
sys/arch/atari/conf/GENERIC.in: revision 1.115
sys/arch/sparc/conf/MRCOFFEE: revision 1.54
sys/arch/evbppc/conf/EXPLORA451: revision 1.62
sys/arch/cesfic/conf/GENERIC: revision 1.69
sys/arch/vax/conf/GENERIC: revision 1.204
sys/arch/sgimips/conf/GENERIC32_IP3x: revision 1.115
sys/arch/sgimips/conf/GENERIC32_IP2x: revision 1.112
sys/arch/sparc/conf/GENERIC: revision 1.258
sys/arch/next68k/conf/GENERIC: revision 1.145
sys/arch/evbarm/conf/MMNET_GENERIC: revision 1.34
sys/arch/prep/conf/GENERIC: revision 1.185
sys/arch/amiga/conf/INSTALL: revision 1.129
sys/arch/newsmips/conf/GENERIC: revision 1.133
sys/arch/cobalt/conf/GENERIC: revision 1.156
sys/arch/sun2/conf/GENERIC: revision 1.99
sys/arch/luna68k/conf/INSTALL: revision 1.25
sys/arch/amigappc/conf/NULL: revision 1.53
sys/arch/acorn26/conf/GENERIC: revision 1.85
sys/arch/vax/conf/VAX780: revision 1.25
sys/arch/luna68k/conf/GENERIC: revision 1.125
sys/arch/ews4800mips/conf/GENERIC: revision 1.56
sys/arch/macppc/conf/POWERMAC_G5: revision 1.29
sys/arch/arc/conf/GENERIC: revision 1.189
sys/arch/macppc/conf/MAMBO: revision 1.27
sys/arch/acorn32/conf/EB7500ATX: revision 1.64
sys/arch/pmax/conf/GENERIC: revision 1.196
sys/arch/pmax/conf/GENERIC64: revision 1.28
sys/arch/amiga/conf/GENERIC: revision 1.319
sys/arch/evbarm/conf/MPCSA_GENERIC: revision 1.55
sys/arch/macppc/conf/GENERIC: revision 1.339
sys/arch/emips/conf/GENERIC: revision 1.21
sys/arch/sandpoint/conf/GENERIC: revision 1.97
sys/arch/landisk/conf/GENERIC: revision 1.58
sys/arch/bebox/conf/GENERIC: revision 1.157
sys/arch/alpha/conf/GENERIC: revision 1.379
Alternate buffer queue strategies no longer considered experimental, update
description.
Discussed on tech-kern
http://mail-index.netbsd.org/tech-kern/2018/01/21/msg023002.html

(martin)

2018-01-26 14:10:15 UTC MAIN commitmail json YAML

Use MH_ALIGN instead, ok knakahara@.

(maxv)

2018-01-26 11:06:32 UTC MAIN commitmail json YAML

Don't call if_attach, do if_initialize+if_register, otherwise when an
EtherIP packet is received the first KASSERT in if_input() fires.

(maxv)

2018-01-26 09:38:26 UTC MAIN commitmail json YAML

2018-01-26 09:29:15 UTC MAIN commitmail json YAML

2018-01-26 09:26:43 UTC MAIN commitmail json YAML

2018-01-26 09:07:46 UTC MAIN commitmail json YAML

CID-1427719: Integer handling issues  (BAD_SHIFT). Print bus/slot info
correctly on 82599_SFP_SF_QP(DID 0x154a) and 82599_QSFP_SF_QP(DID 0x1558).

(msaitoh)

2018-01-26 08:09:53 UTC MAIN commitmail json YAML

2018-01-26 07:49:15 UTC MAIN commitmail json YAML

Several fixes in L2TP:

* l2tp_input(): use m_copydata, and ensure there is enough space in the
  chain. Otherwise overflow.

* l2tp_tcpmss_clamp(): ensure there is enough space in the chain.

* in_l2tp_output(): don't check 'sc' against NULL, it can't be NULL.

* in_l2tp_input(): no need to call m_pullup since we use m_copydata.
  Just check the space in the chain.

* in_l2tp_input(): if there is a cookie, make sure the chain has enough
  space.

* in6_l2tp_input(): same changes as in_l2tp_input().

Ok knakahara@

(maxv)

2018-01-26 06:49:02 UTC MAIN commitmail json YAML

Get rid of unnecessary splsoftnet (redo)

Unless NET_MPSAFE, splsoftnet is still needed for rt_* functions.

(ozaki-r)

2018-01-26 06:37:21 UTC MAIN commitmail json YAML

Revert "Get rid of unnecessary splsoftnet" (v1.133)

It's not always true that softnet_lock is held these places.
See PR kern/52947.

(ozaki-r)

2018-01-26 05:29:43 UTC MAIN commitmail json YAML

Don't warn about MIPS1 MULTIPROCESSOR in a mips3 file.

(maya)

2018-01-25 23:42:06 UTC MAIN commitmail json YAML

Update sets lists for new amdsmn(4) and amdzentemp(4) modules

(pgoyette)

2018-01-25 23:40:06 UTC MAIN commitmail json YAML

2018-01-25 23:37:34 UTC MAIN commitmail json YAML

Modularize the amdsmn(4) driver, and update dependency for amdzentemp(4)

(pgoyette)

2018-01-25 22:49:32 UTC MAIN commitmail json YAML

2018-01-25 22:48:42 UTC MAIN commitmail json YAML

Merge tzcode2018c [ changelog with changes to tzdata sections removed ]

Release 2018c - 2018-01-22 23:00:44 -0800

  Changes to build procedure

    The build procedure now works around mawk 1.3.3's lack of support
    for character class expressions.  (Problem reported by Ohyama.)

Release 2018b - 2018-01-17 23:24:48 -0800

  Changes to build procedure

    The distribution now contains the file 'pacificnew' again.
    This file was inadvertantly omitted in the 2018a distribution.
    (Problem reported by Matias Fonzo.)

Release 2018a - 2018-01-12 22:29:21 -0800

  Changes to build procedure

    The default installation locations have been changed to mostly
    match Debian circa 2017, instead of being designed as an add-on to
    4.3BSD circa 1986.  This affects the Makefile macros TOPDIR,
    TZDIR, MANDIR, and LIBDIR.  New Makefile macros TZDEFAULT, USRDIR,
    USRSHAREDIR, BINDIR, ZDUMPDIR, and ZICDIR let installers tailor
    locations more precisely.  (This responds to suggestions from
    Brian Inglis and from Steve Summit.)

    The default installation procedure no longer creates the
    backward-compatibility link US/Pacific-New, which causes
    confusion during user setup (e.g., see Debian bug 815200).
    Use 'make BACKWARD="backward pacificnew"' to create the link
    anyway, for now.  Eventually we plan to remove the link entirely.

    tzdata.zi now contains a version-number comment.
    (Suggested by Tom Lane.)

    The Makefile now quotes values like BACKWARD more carefully when
    passing them to the shell.  (Problem reported by Zefram.)

    Builders no longer need to specify -DHAVE_SNPRINTF on platforms
    that have snprintf and use pre-C99 compilers.  (Problem reported
    by Jon Skeet.)

  Changes to code

    zic has a new option -t FILE that specifies the location of the
    file that determines local time when TZ is unset.  The default for
    this location can be configured via the new TZDEFAULT makefile
    macro, which defaults to /etc/localtime.

    Diagnostics and commentary now distinguish UT from UTC more
    carefully; see theory.html for more information about UT vs UTC.

    zic has been ported to GCC 8's -Wstringop-truncation option.
    (Problem reported by Martin Sebor.)

  Changes to documentation and commentary

    The zic man page now documents the longstanding behavior that
    times and years can be out of the usual range, with negative times
    counting backwards from midnight and with year 0 preceding year 1.
    (Problem reported by Michael Deckers.)

    The theory.html file now mentions the POSIX limit of six chars
    per abbreviation, and lists alphabetic abbreviations used.

    The files tz-art.htm and tz-link.htm have been renamed to
    tz-art.html and tz-link.html, respectively, for consistency with
    other file names and to simplify web server configuration.

(christos)

2018-01-25 22:37:42 UTC MAIN commitmail json YAML

Correct placement of __diagused attribute

(pgoyette)

2018-01-25 22:14:01 UTC MAIN commitmail json YAML

Put back the variable declaration, too, and mark it __diagused

Otherwise a DIAGNOSTIC kernel will complain about the variable being
undeclared.

(pgoyette)

2018-01-25 22:09:56 UTC MAIN commitmail json YAML

Correct the plist entry for ./usr/share/man/cat8/acorn32/MAKEDEV.0

This file is obsolete, replace '.cat' with 'obsolete'.

(kamil)

2018-01-25 21:23:36 UTC MAIN commitmail json YAML

KNF: Put back the blank line following the empty variable declarations

(pgoyette)

2018-01-25 20:55:15 UTC MAIN commitmail json YAML

Kick zero-sized fragments. We can't allow them to enter; two fragments
could be put at the same offset.

(maxv)

2018-01-25 19:15:10 UTC MAIN commitmail json YAML

.Li is superfluous inside .Bd -literal

(uwe)

2018-01-25 18:56:18 UTC MAIN commitmail json YAML

Formatting fixes.

(uwe)

2018-01-25 18:07:17 UTC MAIN commitmail json YAML

sync with tzcode-2018c

(christos)

2018-01-25 17:41:49 UTC MAIN commitmail json YAML

Don't call xennet_softstart from hard interrupt; schedule softint.

Fixes panic in bpf_mtap which expects to be called only in softint.

(riastradh)

2018-01-25 17:14:36 UTC MAIN commitmail json YAML

Use a random opaque cookie, not kva pointer, for nfssvc(2).

(What were they smoking?!)

I suspect most of this is actually dead code that wasn't properly
amputated along with the rest of the gangrene of NFSKERB a decade
ago, but I'm out of time to investigate further.  If someone else
wants to kill NFSSVC_AUTHIN/NFSSVC_AUTHINFAIL and the rest of the
tentacular kerberosity, be my guest.

Noted by Silvio Cesare of InfoSect.

(riastradh)

2018-01-25 16:05:12 UTC MAIN commitmail json YAML

2018-01-25 16:02:12 UTC MAIN commitmail json YAML

Add Marvell Yukon 88E8040T

(sborrill)

2018-01-25 15:55:57 UTC MAIN commitmail json YAML

Remove outdated comment and fix typo.

(maxv)

2018-01-25 15:33:06 UTC MAIN commitmail json YAML

Several changes:

* Move the structure definitions into frag6.c, they should not be used
  elsewhere.

* Rename ip6af_mff -> ip6af_more, and switch it to bool, easier to
  understand.

* Remove IP6_REASS_MBUF, no point in keeping this.

* Remove ip6q_arrive and ip6q_nxtp, unused.

* Style.

(maxv)

2018-01-25 15:01:05 UTC MAIN commitmail json YAML

Unused variable build fix. (now void *aux is unused)

(prlw1)

2018-01-25 14:45:58 UTC MAIN commitmail json YAML

do boundary checks when writing cursor sprite colour registers

(macallan)

2018-01-25 10:52:49 UTC MAIN commitmail json YAML

Xref the right driver.  .An -nosplit  Delint.

(uwe)

2018-01-25 10:48:28 UTC MAIN commitmail json YAML

New sentence - new line.  Sort sections.  Use .Xr to refer to amdtemp(4).

(uwe)

2018-01-25 10:45:58 UTC MAIN commitmail json YAML

Style, reduce the indentation level when possible, and add a missing NULL
check after M_PREPEND.

(maxv)

2018-01-25 10:33:37 UTC MAIN commitmail json YAML

2018-01-25 10:28:57 UTC MAIN commitmail json YAML

2018-01-25 10:15:24 UTC MAIN commitmail json YAML

Fix .Dt name.  Formatting fixes.

(uwe)

2018-01-25 09:33:21 UTC MAIN commitmail json YAML

Improve wording.

(maxv)

2018-01-25 09:29:18 UTC MAIN commitmail json YAML

Improve wording, and put a new drawing, from me and Kengo Nakahara.

(maxv)

2018-01-25 08:57:59 UTC MAIN commitmail json YAML

Revert previous.

obsolete + other tags is not easy to clean up.

(wiz)

2018-01-25 08:41:17 UTC MAIN commitmail json YAML

Some clean-up on the HISTORY and AUTHORS sections, and addition of a BUGS
section to document the fact that we don't yet handle the required temp
offset, nor do we expose the available thermal-trip value.

(pgoyette)

2018-01-25 04:48:45 UTC MAIN commitmail json YAML

2018-01-25 03:54:57 UTC MAIN commitmail json YAML

2018-01-25 03:54:21 UTC MAIN commitmail json YAML

use named initializers

(christos)

2018-01-25 03:09:05 UTC MAIN commitmail json YAML

Fix another deadlock

When waiting for a route update to finish, a waiter has to release its reference
to the route to avoid a deadlock. Because a updater tries to wait for references
to a target route (except for a reference by the updater itself) to be released.

(ozaki-r)

2018-01-25 02:45:02 UTC MAIN commitmail json YAML

Abandon unnecessary softint

The softint was introduced to defer fownsignal that was called in bpf_wakeup to
softint at v1.139, but now bpf_wakeup always runs in softint so we don't need
the softint anymore.

(ozaki-r)

2018-01-25 01:27:14 UTC MAIN commitmail json YAML

man pages for amdsmn and amdzentemp

(christos)

2018-01-25 01:25:39 UTC MAIN commitmail json YAML

2018-01-25 01:22:21 UTC MAIN commitmail json YAML

2018-01-25 01:21:40 UTC MAIN commitmail json YAML

2018-01-24 22:25:49 UTC MAIN commitmail json YAML

2018-01-24 22:23:51 UTC MAIN commitmail json YAML

Add Nvidia GeForce FX Go5200, as found in the PowerBook6,4

(sevan)

2018-01-24 19:42:30 UTC MAIN commitmail json YAML

Remove references to arm26

(skrll)

2018-01-24 19:29:36 UTC MAIN commitmail json YAML

2018-01-24 17:21:03 UTC MAIN commitmail json YAML

note to self: OF_getprop() returns -1 on error
now this works properly on sevan's iMac G4

(macallan)

2018-01-24 14:45:44 UTC MAIN commitmail json YAML

typo, remove extra bracket

(sevan)

2018-01-24 14:39:14 UTC MAIN commitmail json YAML

2018-01-24 14:37:34 UTC MAIN commitmail json YAML

As I said in my last commit in this file, ipo should be set to NULL;
otherwise the 'local address spoofing' check below is always wrong on
IPv6.

(maxv)

2018-01-24 14:28:13 UTC MAIN commitmail json YAML

Fix the iteration: IPPROTO_FRAGMENT options are special, in the sense
that they don't have a 'length' field. It is therefore incorrect to
read ip6e.ip6e_len, it contains garbage.

I'm not sure whether this an exploitable vulnerability. Because of this
bug you could theoretically craft 'protoff', which means that you can
have the kernel patch the nxt value at the wrong place once the packet
is decrypted. Perhaps it can be used in some unusual MITM - a router that
happens to be between two IPsec hosts adds a frag6 option in the outer
IPv6 header to trigger the bug in the receiver -, but I couldn't come up
with anything worrying.

(maxv)

2018-01-24 14:01:40 UTC MAIN commitmail json YAML

ipsec4_fixup_checksum calls m_pullup, so don't forget to do mtod() again,
to prevent use-after-free.

In fact, the m_pullup call is never reached: it is impossible for 'skip'
to be zero in this function, so add an XXX for now.

(maxv)

2018-01-24 13:57:37 UTC MAIN commitmail json YAML

Note update to tzdata2018c

(kre)

2018-01-24 13:54:16 UTC MAIN commitmail json YAML

Add missing NULL check. Normally that's not triggerable remotely, since we
are guaranteed that 8 bytes are valid at mbuf+skip.

(maxv)

2018-01-24 13:52:47 UTC MAIN commitmail json YAML

2018-01-24 13:49:23 UTC MAIN commitmail json YAML

Reinforce and clarify.

(maxv)

2018-01-24 13:30:47 UTC MAIN commitmail json YAML

Fix a vulnerability in IPsec-IPv6-AH, that allows an attacker to remotely
crash the kernel with a single packet.

In this loop we need to increment 'ad' by two, because the length field
of the option header does not count the size of the option header itself.

If the length is zero, then 'count' is incremented by zero, and there's
an infinite loop. Beyond that, this code was written with the assumption
that since the IPv6 packet already went through the generic IPv6 option
parser, several fields are guaranteed to be valid; but this assumption
does not hold because of the missing '+2', and there's as a result a
triggerable buffer overflow (write zeros after the end of the mbuf,
potentially to the next mbuf in memory since it's a pool).

Add the missing '+2', this place will be reinforced in separate commits.

(maxv)

2018-01-24 13:13:11 UTC MAIN commitmail json YAML

Revert a part of rev1.49 (six months ago). The pointer given to memcpy
was correct.

Discussed with Christos and Ryota.

(maxv)

2018-01-24 12:05:50 UTC MAIN commitmail json YAML

Try to use proper semantic markup.  Fix a few formatting nits.

(uwe)

2018-01-24 12:04:47 UTC MAIN commitmail json YAML

It's not literal "-options" so use .Ar

(uwe)

2018-01-24 10:46:14 UTC MAIN commitmail json YAML

sqlite-3.22 out.

(wiz)

2018-01-24 10:04:28 UTC MAIN commitmail json YAML

Remove macros without effect.

(wiz)

2018-01-24 10:00:43 UTC MAIN commitmail json YAML

2018-01-24 10:00:03 UTC MAIN commitmail json YAML

Remove Tn. Remove more references to acorn26. Bump date.

(wiz)

2018-01-24 09:53:21 UTC MAIN commitmail json YAML

ksh: Rename a local function tsearch to mytsearch

This removes a clash with well-known libc function tsearch(3) from POSIX.

This allows to build ksh against MSan.

The new name might not be perfect, but long term ksh should be switched to
the libc version.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-01-24 09:51:26 UTC MAIN commitmail json YAML

2018-01-24 09:21:20 UTC MAIN commitmail json YAML

ksh: Rename a local function tdelete to mytdelete

This removes a clash with well-known libc function tdelete(3) from POSIX.

This allows to build ksh against MSan.

The new name might not be perfect, but long term ksh should be switched to
the libc version.

Sponsored by <The NetBSD Foundation>

(kamil)

2018-01-24 09:04:46 UTC MAIN commitmail json YAML

2018-01-24 05:35:59 UTC MAIN commitmail json YAML

2018-01-24 03:44:10 UTC MAIN commitmail json YAML

Fix constraint violation of pserialize in in6_ifattach

in6_ifattach_loopback can sleep so we cannot use pserialize for it. Fortunately
in6_ifattach is alwasy called with IFNET_LOCK so pserialize isn't needed there
actually.

(ozaki-r)

2018-01-24 03:13:36 UTC MAIN commitmail json YAML

Clarify this is a load delay nop.

(maya)

2018-01-24 03:11:30 UTC MAIN commitmail json YAML

Add whitespace for clarity.

(maya)

2018-01-23 23:02:40 UTC MAIN commitmail json YAML

Missed another main() prototype.

(sevan)

2018-01-23 22:42:29 UTC MAIN commitmail json YAML

Add "bufq_fcfs" requirement to all those driver modules that explicitly
request it in their calls to bufq_alloc().

(pgoyette)

2018-01-23 22:40:06 UTC MAIN commitmail json YAML

2018-01-23 22:12:53 UTC MAIN commitmail json YAML

2018-01-23 22:08:55 UTC MAIN commitmail json YAML

Fix a comment.  NFC

(pgoyette)

2018-01-23 21:27:20 UTC MAIN commitmail json YAML

More K&R style prototypes missed in the previous run

(sevan)

2018-01-23 21:06:26 UTC MAIN commitmail json YAML

2018-01-23 19:14:09 UTC MAIN commitmail json YAML

2018-01-23 19:01:33 UTC MAIN commitmail json YAML

2018-01-23 17:24:31 UTC MAIN commitmail json YAML

The EON option was removed along with the other OSI options long ago

(sevan)

2018-01-23 17:19:34 UTC MAIN commitmail json YAML

BUFQ_READPRIO is no longer marked as experimental.

(sevan)

2018-01-23 15:13:56 UTC MAIN commitmail json YAML

Fix the calculation of the ICMP6 error pointer. It is not correct to use

pointer = opt - mtod(m, u_int8_t *)

because m may have gone through m_pulldown, and it is possible that
m->m_data is no longer the beginning of the packet.

(maxv)

2018-01-23 15:08:12 UTC MAIN commitmail json YAML

2018-01-23 15:02:03 UTC MAIN commitmail json YAML

Fix typos.

XXX: does not compile for me because of constness issues

(wiz)

2018-01-23 14:58:46 UTC MAIN commitmail json YAML

Improve description of options. Based on comments by Tomohiro Kusumi.

CVS: ----------------------------------------------------------------------
CVS: CVSROOT  cvs.NetBSD.org:/cvsroot
CVS: please use "PR category/123" to have the commitmsg appended to PR 123
CVS:
CVS: Please evaluate your changes and consider the following.
CVS: Abort checkin if you answer no.
CVS: => For all changes:
CVS: Do the changed files compile?
CVS: Has the change been tested?
CVS: => If you are not completely familiar with the changed components:
CVS: Has the change been posted for review?
CVS: Have you allowed enough time for feedback?
CVS: => If the change is major:
CVS: => If the change adds files to, or removes files from $DESTDIR:
CVS: => If you are changing a library or kernel interface:
CVS: Have you successfully run "./build.sh release"?

(wiz)

2018-01-23 14:47:56 UTC MAIN commitmail json YAML

2018-01-23 13:57:57 UTC MAIN commitmail json YAML

Rework prior two patches to fix clang release builds.
Original patch by darcy@

(roy)

2018-01-23 10:55:39 UTC MAIN commitmail json YAML

Style, localify, remove XXX when there's no issue, and switch 'extra'
to int.

(maxv)

2018-01-23 10:46:59 UTC MAIN commitmail json YAML

Fix the check on 'maxlen', we are not creating struct icmp6_hdr but
struct nd_redirect (which is bigger). Also, make sure we can add a
struct nd_opt_rd_hdr.

Normally this doesn't change anything, since the mbuf has IPV6_MMTU
bytes, and it's always way bigger than what we need.

(maxv)

2018-01-23 10:32:50 UTC MAIN commitmail json YAML

Fix info leak. We are allocating a slot of size:

roundup(sizeof(*nd_opt) + ifp->if_addrlen, 8)

But we are not filling in the padding caused by the roundup, and therefore
several bytes are leaked, in the mbuf we're about to send to the network.

(maxv)

2018-01-23 09:21:59 UTC MAIN commitmail json YAML

Fix twice the same mistake: 'last' can't be null, so there's no point in
having this misleading branch.

(maxv)

2018-01-23 07:33:49 UTC MAIN commitmail json YAML

Don't use global variables, that's obviously incorrect on MP systems.
One remains, because it is imported in tcp_timer.c, and I'm not totally
sure of how it interacts with icmp_mtudisc().

(maxv)

2018-01-23 07:20:10 UTC MAIN commitmail json YAML

Fix a return value of rt_update_prepare

Callers expect it to be an errno.

(ozaki-r)

2018-01-23 07:15:04 UTC MAIN commitmail json YAML

Style, localify icmp_send, and add a clear KASSERT (that replaces a vague
comment).

(maxv)