Now
MAIN commitmail json YAML
src/sys/kern/kern_heartbeat.c@1.10
/
diff
/
nxr@1.10
src/sys/sys/cpu_data.h@1.55 / diff / nxr@1.55
src/sys/sys/sched.h@1.94 / diff / nxr@1.94
src/sys/sys/cpu_data.h@1.55 / diff / nxr@1.55
src/sys/sys/sched.h@1.94 / diff / nxr@1.94
heartbeat(9): Make heartbeat_suspend/resume nestable.
And make them bind to the CPU as a side effect, instead of requiring
the caller to have already done so.
This lets us eliminate the assertions so we can use them in ddb even
when things are going haywire and we just want to get diagnostics.
XXX kernel revbump -- struct cpu_info change
And make them bind to the CPU as a side effect, instead of requiring
the caller to have already done so.
This lets us eliminate the assertions so we can use them in ddb even
when things are going haywire and we just want to get diagnostics.
XXX kernel revbump -- struct cpu_info change
MAIN commitmail json YAML
drmkms: Fix module build.
MAIN commitmail json YAML
src/sys/external/bsd/drm2/drm/drm_module.c@1.32
/
diff
/
nxr@1.32
src/sys/external/bsd/drm2/pci/files.drmkms_pci@1.18 / diff / nxr@1.18
src/sys/external/bsd/drm2/pci/files.drmkms_pci@1.18 / diff / nxr@1.18
drm: Fix conditionals around drmkms_pci and agp.
Kernel should build now with all pci drm drivers stripped out but
DRM_LEGACY still enabled. (Might not be very useful, but it'll
build. Maybe we should also have DRM_LEGACY_PCI so those drivers can
be modloaded later.)
Kernel should build now with all pci drm drivers stripped out but
DRM_LEGACY still enabled. (Might not be very useful, but it'll
build. Maybe we should also have DRM_LEGACY_PCI so those drivers can
be modloaded later.)
MAIN commitmail json YAML
src/tests/usr.sbin/certctl/t_certctl.sh@1.10
/
diff
/
nxr@1.10
src/usr.sbin/certctl/certctl.sh@1.5 / diff / nxr@1.5
src/usr.sbin/certctl/certctl.sh@1.5 / diff / nxr@1.5
certctl(8): Fix permissions on ca-certificates.crt bundle: 0644.
While here, write it atomically: write to .tmp first, then rename
when done; this way applications never see a partially-written bundle
at /etc/openssl/certs/ca-certificates.crt.
While here, write it atomically: write to .tmp first, then rename
when done; this way applications never see a partially-written bundle
at /etc/openssl/certs/ca-certificates.crt.
MAIN commitmail json YAML
certctl(8): Test permissions of ca-certificates.crt.
Inadvertently created 0600 instead of 0644 due to copying file
created by mktemp(1) with cp(1).
Inadvertently created 0600 instead of 0644 due to copying file
created by mktemp(1) with cp(1).
MAIN commitmail json YAML
src/distrib/sets/lists/base/ad.aarch64@1.45
/
diff
/
nxr@1.45
src/distrib/sets/lists/base/ad.arm@1.87 / diff / nxr@1.87
src/distrib/sets/lists/base/ad.mips@1.93 / diff / nxr@1.93
src/distrib/sets/lists/base/md.i386@1.159 / diff / nxr@1.159
src/distrib/sets/lists/base/shl.mi@1.970 / diff / nxr@1.970
src/distrib/sets/lists/comp/shl.mi@1.354 / diff / nxr@1.354
src/distrib/sets/lists/debug/ad.aarch64@1.37 / diff / nxr@1.37
src/distrib/sets/lists/debug/ad.arm@1.81 / diff / nxr@1.81
src/distrib/sets/lists/debug/ad.mips@1.83 / diff / nxr@1.83
src/distrib/sets/lists/debug/md.i386@1.21 / diff / nxr@1.21
src/distrib/sets/lists/debug/shl.mi@1.330 / diff / nxr@1.330
src/distrib/sets/lists/xdebug/md.amd64@1.64 / diff / nxr@1.64
src/distrib/sets/lists/xdebug/md.i386@1.61 / diff / nxr@1.61
src/distrib/sets/lists/base/ad.arm@1.87 / diff / nxr@1.87
src/distrib/sets/lists/base/ad.mips@1.93 / diff / nxr@1.93
src/distrib/sets/lists/base/md.i386@1.159 / diff / nxr@1.159
src/distrib/sets/lists/base/shl.mi@1.970 / diff / nxr@1.970
src/distrib/sets/lists/comp/shl.mi@1.354 / diff / nxr@1.354
src/distrib/sets/lists/debug/ad.aarch64@1.37 / diff / nxr@1.37
src/distrib/sets/lists/debug/ad.arm@1.81 / diff / nxr@1.81
src/distrib/sets/lists/debug/ad.mips@1.83 / diff / nxr@1.83
src/distrib/sets/lists/debug/md.i386@1.21 / diff / nxr@1.21
src/distrib/sets/lists/debug/shl.mi@1.330 / diff / nxr@1.330
src/distrib/sets/lists/xdebug/md.amd64@1.64 / diff / nxr@1.64
src/distrib/sets/lists/xdebug/md.i386@1.61 / diff / nxr@1.61
lists: Remove more bogus shlib obsolete entries.
Too much trouble to have to remember about libuv.so, libgmp.so, &c.
Just apply the rule uniformly.
All that's left is test libraries and loadable modules.
Searched with:
git grep 'lib.*\.so\.[0-9][0-9]*.*obsolete' distrib/sets/lists \
| grep -v '/modules/' \
| grep -v '/locale/lib/' \
| grep -v '/lib/npf/' \
| grep -v '/lib/librump' \
| grep -v '/lib/netbsd/libclang_rt' \
| grep -v '/runemodule/'
Too much trouble to have to remember about libuv.so, libgmp.so, &c.
Just apply the rule uniformly.
All that's left is test libraries and loadable modules.
Searched with:
git grep 'lib.*\.so\.[0-9][0-9]*.*obsolete' distrib/sets/lists \
| grep -v '/modules/' \
| grep -v '/locale/lib/' \
| grep -v '/lib/npf/' \
| grep -v '/lib/librump' \
| grep -v '/lib/netbsd/libclang_rt' \
| grep -v '/runemodule/'
MAIN commitmail json YAML
src/distrib/sets/lists/base/shl.mi@1.969
/
diff
/
nxr@1.969
src/distrib/sets/lists/debug/shl.mi@1.329 / diff / nxr@1.329
src/distrib/sets/lists/xbase/shl.mi@1.103 / diff / nxr@1.103
src/distrib/sets/lists/xdebug/shl.mi@1.69 / diff / nxr@1.69
src/distrib/sets/lists/debug/shl.mi@1.329 / diff / nxr@1.329
src/distrib/sets/lists/xbase/shl.mi@1.103 / diff / nxr@1.103
src/distrib/sets/lists/xdebug/shl.mi@1.69 / diff / nxr@1.69
lists: Remove bogus libfoo.so.N and libfoo.so.N.M obsolete entries.
These must stay around so applications linked against them will still
work after upgrade, even if libfoo.so now points to libfoo.so.(N+1)
or libfoo.so.N.(M+1).
Exceptions:
- I'm willing to believe the rump modules have a different story so I
left those obsolete entries alone.
- libuv.so was never supposed to be exposed publicly anyway and never
went out in a release. (Maybe this information should be recorded
somewhere?)
- Same is probably true of lib{gmp,mpc,mpfr}.so, not sure of the
history. Maybe libg2c.so too, no idea what that is.
- libisns.so was moved from /usr/lib to /lib, so it's legitimate for
the debug data to live there too now. (XXX Maybe we should have a
separate marker for this.)
- Libraries under /usr/tests are not used by normal applications, so
they can safely be deleted when obsoleted.
Note: The libfoo.so symlink for a library that has been deleted
altogether, not just upgraded, can be obsoleted. Loadable modules
that applications aren't linked against can be obsoleted, even if
some of them like npf ext_*.so or pam_*.so are formally versioned
(for reasons unclear to me).
Note: This means that incremental builds may complain about these
.so.N and .so.N.M files in destdir (PR misc/57581), but it's much
worse for an upgrade to break working applications.
These must stay around so applications linked against them will still
work after upgrade, even if libfoo.so now points to libfoo.so.(N+1)
or libfoo.so.N.(M+1).
Exceptions:
- I'm willing to believe the rump modules have a different story so I
left those obsolete entries alone.
- libuv.so was never supposed to be exposed publicly anyway and never
went out in a release. (Maybe this information should be recorded
somewhere?)
- Same is probably true of lib{gmp,mpc,mpfr}.so, not sure of the
history. Maybe libg2c.so too, no idea what that is.
- libisns.so was moved from /usr/lib to /lib, so it's legitimate for
the debug data to live there too now. (XXX Maybe we should have a
separate marker for this.)
- Libraries under /usr/tests are not used by normal applications, so
they can safely be deleted when obsoleted.
Note: The libfoo.so symlink for a library that has been deleted
altogether, not just upgraded, can be obsoleted. Loadable modules
that applications aren't linked against can be obsoleted, even if
some of them like npf ext_*.so or pam_*.so are formally versioned
(for reasons unclear to me).
Note: This means that incremental builds may complain about these
.so.N and .so.N.M files in destdir (PR misc/57581), but it's much
worse for an upgrade to break working applications.
MAIN commitmail json YAML
src/distrib/sets/lists/base/shl.mi@1.968
/
diff
/
nxr@1.968
src/distrib/sets/lists/debug/shl.mi@1.328 / diff / nxr@1.328
src/distrib/sets/lists/debug/shl.mi@1.328 / diff / nxr@1.328
base, debug: Remove obsolete entries for older libfido2.
The shared libraries need to stay around for applications on upgrade
(and the debug data should be kept too if the shared libraries are
kept).
The shared libraries need to stay around for applications on upgrade
(and the debug data should be kept too if the shared libraries are
kept).
MAIN commitmail json YAML
libc_aligned, libc_fp: Add missing close-paren.
Did this ever work?
Did this ever work?
MAIN commitmail json YAML
src/lib/liblwres/Makefile deleted
src/lib/liblwres/shlib_version deleted
src/lib/libss/Makefile deleted
src/lib/libss/shlib_version deleted
src/lib/liblwres/shlib_version deleted
src/lib/libss/Makefile deleted
src/lib/libss/shlib_version deleted
libss, liblwres: Delete makefiles for long-dead external libraries.
No functional change intended -- these haven't been used in years.
No functional change intended -- these haven't been used in years.
MAIN commitmail json YAML
src/distrib/sets/lists/base/shl.mi@1.967
/
diff
/
nxr@1.967
src/distrib/sets/lists/debug/shl.mi@1.327 / diff / nxr@1.327
src/external/bsd/lutok/lib/liblutok/shlib_version@1.3 / diff / nxr@1.3
src/distrib/sets/lists/debug/shl.mi@1.327 / diff / nxr@1.327
src/external/bsd/lutok/lib/liblutok/shlib_version@1.3 / diff / nxr@1.3
liblutok.so: Bump major for recent Lua update.
XXX pullup-10
XXX pullup-10
MAIN commitmail json YAML
src/crypto/external/bsd/heimdal/lib/libsl/shlib_version@1.3
/
diff
/
nxr@1.3
src/distrib/sets/lists/base/shl.mi@1.966 / diff / nxr@1.966
src/distrib/sets/lists/debug/shl.mi@1.326 / diff / nxr@1.326
src/distrib/sets/lists/base/shl.mi@1.966 / diff / nxr@1.966
src/distrib/sets/lists/debug/shl.mi@1.326 / diff / nxr@1.326
heimdal/libsl: Belatedly bump major.
This is to address the major bump of libterminfo.so.9 in:
Author: roy <roy@NetBSD.org>
Date: Fri Mar 13 15:19:24 2020 +0000
terminfo: promote numeric parameters from short to int
That commit caught all the other dependent libraries except libsl.
XXX pullup-10
This is to address the major bump of libterminfo.so.9 in:
Author: roy <roy@NetBSD.org>
Date: Fri Mar 13 15:19:24 2020 +0000
terminfo: promote numeric parameters from short to int
That commit caught all the other dependent libraries except libsl.
XXX pullup-10
MAIN commitmail json YAML
src/crypto/external/bsd/heimdal/lib/libgssapi/shlib_version@1.3
/
diff
/
nxr@1.3
src/crypto/external/bsd/heimdal/lib/libhdb/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/lib/libheimntlm/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/lib/libhx509/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/lib/libkadm5clnt/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/lib/libkadm5srv/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/lib/libkafs/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/lib/libkdc/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/lib/libkrb5/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/libsaslc/lib/shlib_version@1.2 / diff / nxr@1.2
src/crypto/external/bsd/netpgp/lib/netpgp/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/netpgp/libpaa/shlib_version@1.2 / diff / nxr@1.2
src/crypto/external/cpl/tpm-tools/lib/libtpm_unseal/Makefile@1.4 / diff / nxr@1.4
src/crypto/external/cpl/trousers/lib/libtspi/Makefile@1.5 / diff / nxr@1.5
src/distrib/sets/lists/base/shl.mi@1.965 / diff / nxr@1.965
src/distrib/sets/lists/debug/shl.mi@1.325 / diff / nxr@1.325
src/external/bsd/fetch/lib/shlib_version@1.4 / diff / nxr@1.4
src/external/bsd/libarchive/lib/libarchive/shlib_version@1.3 / diff / nxr@1.3
src/external/bsd/libevent/Makefile.inc@1.5 / diff / nxr@1.5
src/external/bsd/openldap/lib/libldap/shlib_version@1.8 / diff / nxr@1.8
:
(more 10 files)
src/crypto/external/bsd/heimdal/lib/libhdb/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/lib/libheimntlm/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/lib/libhx509/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/lib/libkadm5clnt/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/lib/libkadm5srv/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/lib/libkafs/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/lib/libkdc/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/heimdal/lib/libkrb5/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/libsaslc/lib/shlib_version@1.2 / diff / nxr@1.2
src/crypto/external/bsd/netpgp/lib/netpgp/shlib_version@1.3 / diff / nxr@1.3
src/crypto/external/bsd/netpgp/libpaa/shlib_version@1.2 / diff / nxr@1.2
src/crypto/external/cpl/tpm-tools/lib/libtpm_unseal/Makefile@1.4 / diff / nxr@1.4
src/crypto/external/cpl/trousers/lib/libtspi/Makefile@1.5 / diff / nxr@1.5
src/distrib/sets/lists/base/shl.mi@1.965 / diff / nxr@1.965
src/distrib/sets/lists/debug/shl.mi@1.325 / diff / nxr@1.325
src/external/bsd/fetch/lib/shlib_version@1.4 / diff / nxr@1.4
src/external/bsd/libarchive/lib/libarchive/shlib_version@1.3 / diff / nxr@1.3
src/external/bsd/libevent/Makefile.inc@1.5 / diff / nxr@1.5
src/external/bsd/openldap/lib/libldap/shlib_version@1.8 / diff / nxr@1.8
:
(more 10 files)
Recursively revbump all dependents of libcrypto.
Otherwise any existing software linked against the openssl11
libcrypto.so.14 and any of these libraries will suddenly start
pulling in libcrypto.so.15 at the same time, leading to mayhem in the
address space.
PR lib/57603
XXX pullup-10
Otherwise any existing software linked against the openssl11
libcrypto.so.14 and any of these libraries will suddenly start
pulling in libcrypto.so.15 at the same time, leading to mayhem in the
address space.
PR lib/57603
XXX pullup-10
MAIN commitmail json YAML
postinstall(8): Handle various certs.conf scenarios gracefully.
Tested the following scenarios:
1. fresh install
empty /etc/openssl/certs
default /etc/openssl/certs.conf
- opensslcertsconf
[x] check: pass
[x] fix: pass -- nothing
- opensslcertsrehash
[x] check: fail -- needs rehash
[x] fix: pass -- quietly rehash successfully (go to 4)
2. fresh upgrade
empty /etc/openssl/certs
no /etc/openssl/certs.conf
- opensslcertsconf
[x] check: fail -- complain missing /etc/openssl/certs.conf
[x] fix: pass -- install default /etc/openssl/certs.conf (go to 1)
- opensslcertsrehash
[x] check: fail -- complain missing /etc/openssl/certs.conf
- [x] fix: fail -- complain missing /etc/openssl/certs.conf
3. upgrade from certctl, changes to certs
certctl-managed /etc/openssl/certs
default /etc/openssl/certs.conf
- opensslcertsconf
[x] check: pass
[x] fix: pass -- nothing
- opensslcertsrehash
[x] check: fail -- needs rehash
[x] fix: pass -- quietly rehash successfully (go to 4)
4. upgrade from certctl, no changes to certs
certctl-managed /etc/openssl/certs
default /etc/openssl/certs.conf
- opensslcertsconf
[x] check: pass
[x] fix: pass -- nothing
- opensslcertsrehash
[x] check: pass
[x] fix: pass -- quietly rehash successfully (go to 4)
5. upgrade from mozilla-rootcerts
populated /etc/openssl/certs
no /etc/openssl/certs.conf
- opensslcertsconf:
[x] check: fail -- complain missing /etc/openssl/certs.conf
[x] fix: pass -- install manual /etc/openssl/certs.conf (go to 7)
- opensslcertsrehash:
[x] check: fail -- complain missing /etc/openssl/certs.conf
[x] fix: fail -- complain missing /etc/openssl/certs.conf
6. upgrade from mozilla-rootcerts with etcupdate naively
populated /etc/openssl/certs
default /etc/openssl/certs.conf
- opensslcertsconf:
[x] check: pass
[x] fix: pass -- nothing
- opensslcertsrehash:
[x] check: fail -- complain mismatched certs/ and certs.conf
[x] fix: fail -- complain mismatched certs/ and certs.conf
7. upgrade from mozilla-rootcerts with etcupdate manually
populated /etc/openssl/certs
manual /etc/openssl/certs.conf
- opensslcertsconf:
[x] check: pass
[x] fix: pass -- nothing
- opensslcertsrehash:
[x] check: pass
[x] fix: pass -- skip rehash because manual (go to 7)
XXX Someone should draft automatic tests for postinstall. It has a
very good track record, but it sure would be nice to automate this
testing rather than redo it each time I make a tiny change.
Tested the following scenarios:
1. fresh install
empty /etc/openssl/certs
default /etc/openssl/certs.conf
- opensslcertsconf
[x] check: pass
[x] fix: pass -- nothing
- opensslcertsrehash
[x] check: fail -- needs rehash
[x] fix: pass -- quietly rehash successfully (go to 4)
2. fresh upgrade
empty /etc/openssl/certs
no /etc/openssl/certs.conf
- opensslcertsconf
[x] check: fail -- complain missing /etc/openssl/certs.conf
[x] fix: pass -- install default /etc/openssl/certs.conf (go to 1)
- opensslcertsrehash
[x] check: fail -- complain missing /etc/openssl/certs.conf
- [x] fix: fail -- complain missing /etc/openssl/certs.conf
3. upgrade from certctl, changes to certs
certctl-managed /etc/openssl/certs
default /etc/openssl/certs.conf
- opensslcertsconf
[x] check: pass
[x] fix: pass -- nothing
- opensslcertsrehash
[x] check: fail -- needs rehash
[x] fix: pass -- quietly rehash successfully (go to 4)
4. upgrade from certctl, no changes to certs
certctl-managed /etc/openssl/certs
default /etc/openssl/certs.conf
- opensslcertsconf
[x] check: pass
[x] fix: pass -- nothing
- opensslcertsrehash
[x] check: pass
[x] fix: pass -- quietly rehash successfully (go to 4)
5. upgrade from mozilla-rootcerts
populated /etc/openssl/certs
no /etc/openssl/certs.conf
- opensslcertsconf:
[x] check: fail -- complain missing /etc/openssl/certs.conf
[x] fix: pass -- install manual /etc/openssl/certs.conf (go to 7)
- opensslcertsrehash:
[x] check: fail -- complain missing /etc/openssl/certs.conf
[x] fix: fail -- complain missing /etc/openssl/certs.conf
6. upgrade from mozilla-rootcerts with etcupdate naively
populated /etc/openssl/certs
default /etc/openssl/certs.conf
- opensslcertsconf:
[x] check: pass
[x] fix: pass -- nothing
- opensslcertsrehash:
[x] check: fail -- complain mismatched certs/ and certs.conf
[x] fix: fail -- complain mismatched certs/ and certs.conf
7. upgrade from mozilla-rootcerts with etcupdate manually
populated /etc/openssl/certs
manual /etc/openssl/certs.conf
- opensslcertsconf:
[x] check: pass
[x] fix: pass -- nothing
- opensslcertsrehash:
[x] check: pass
[x] fix: pass -- skip rehash because manual (go to 7)
XXX Someone should draft automatic tests for postinstall. It has a
very good track record, but it sure would be nice to automate this
testing rather than redo it each time I make a tiny change.
MAIN commitmail json YAML
src/distrib/sets/lists/base/mi@1.1329
/
diff
/
nxr@1.1329
src/etc/mtree/NetBSD.dist.base@1.253 / diff / nxr@1.253
src/usr.sbin/certctl/Makefile@1.3 / diff / nxr@1.3
src/etc/mtree/NetBSD.dist.base@1.253 / diff / nxr@1.253
src/usr.sbin/certctl/Makefile@1.3 / diff / nxr@1.3
certctl(8): Install certs.conf in /usr/share/examples too.
This way postinstall(8) can refer to the default one when you've done
an upgrade without etcupdate or similar to pull in new config files
from etc.tgz.
Not great -- we should do this systematically for all config files in
/etc, but this one-off hack is less risky for 10.
This way postinstall(8) can refer to the default one when you've done
an upgrade without etcupdate or similar to pull in new config files
from etc.tgz.
Not great -- we should do this systematically for all config files in
/etc, but this one-off hack is less risky for 10.
MAIN commitmail json YAML
src/sys/dev/cons.c@1.95
/
diff
/
nxr@1.95
src/sys/kern/init_main.c@1.543 / diff / nxr@1.543
src/sys/kern/kern_clock.c@1.151 / diff / nxr@1.151
src/sys/kern/kern_cpu.c@1.97 / diff / nxr@1.97
src/sys/sys/heartbeat.h@1.2 / diff / nxr@1.2
src/sys/kern/init_main.c@1.543 / diff / nxr@1.543
src/sys/kern/kern_clock.c@1.151 / diff / nxr@1.151
src/sys/kern/kern_cpu.c@1.97 / diff / nxr@1.97
src/sys/sys/heartbeat.h@1.2 / diff / nxr@1.2
heartbeat(9): Move #ifdef HEARTBEAT to sys/heartbeat.h.
Less error-prone this way, and the callers are less cluttered.
Less error-prone this way, and the callers are less cluttered.
MAIN commitmail json YAML
heartbeat(9): Move panicstr check into the IPI itself.
We can't return early from defibrillate because the IPI may have yet
to run -- we can't return until the other CPU is definitely done
using the ipi_msg_t we created on the stack.
We should avoid calling panic again on the patient CPU in case it was
already in the middle of a panic, so that we don't re-enter panic
while, e.g., trying to print a stack trace.
Sprinkle some comments.
We can't return early from defibrillate because the IPI may have yet
to run -- we can't return until the other CPU is definitely done
using the ipi_msg_t we created on the stack.
We should avoid calling panic again on the patient CPU in case it was
already in the middle of a panic, so that we don't re-enter panic
while, e.g., trying to print a stack trace.
Sprinkle some comments.
MAIN commitmail json YAML
heartbeat(9): More detail about manual test success criteria.
Changes comments only, no functional change.
Changes comments only, no functional change.
MAIN commitmail json YAML
heartbeat(9): Ignore stale tc if primary CPU heartbeat is suspended.
The timecounter ticks only on the primary CPU, so of course it will
go stale if it's suspended.
(It is, perhaps, a mistake that it only ticks on the primary CPU,
even if the primary CPU is offlined or in a polled-input console
loop, but that's a separate issue.)
The timecounter ticks only on the primary CPU, so of course it will
go stale if it's suspended.
(It is, perhaps, a mistake that it only ticks on the primary CPU,
even if the primary CPU is offlined or in a polled-input console
loop, but that's a separate issue.)
MAIN commitmail json YAML
cons(9): Suspend heartbeat checks while in polled-input mode.
This goes into a tight loop at high IPL, so it is to be expected that
the heartbeats will stop happening.
Should fix heartbeat panics at root device prompt on boot.
This goes into a tight loop at high IPL, so it is to be expected that
the heartbeats will stop happening.
Should fix heartbeat panics at root device prompt on boot.
MAIN commitmail json YAML
cons(9): Sort includes.
No functional change intended.
No functional change intended.
MAIN commitmail json YAML
heartbeat(9): New flag SPCF_HEARTBEATSUSPENDED.
This way we can suspend heartbeats on a single CPU while the console
is in polling mode, not just when the CPU is offlined. This should
be rare, so it's not _convenient_, but it should enable us to fix
polling-mode console input when the hardclock timer is still running
on other CPUs.
This way we can suspend heartbeats on a single CPU while the console
is in polling mode, not just when the CPU is offlined. This should
be rare, so it's not _convenient_, but it should enable us to fix
polling-mode console input when the hardclock timer is still running
on other CPUs.
MAIN commitmail json YAML
cpu_setstate: Fix call to heartbeat_suspend.
Do this on successful offlining, not on failed offlining.
No functional change right now because heartbeat_suspend is
implemented as a noop -- heartbeat(9) will just check the
SPCF_OFFLINE flag. But if we change it to not be a noop, well, then
we need to call it in the right place.
Do this on successful offlining, not on failed offlining.
No functional change right now because heartbeat_suspend is
implemented as a noop -- heartbeat(9) will just check the
SPCF_OFFLINE flag. But if we change it to not be a noop, well, then
we need to call it in the right place.
MAIN commitmail json YAML
ukbd(4): Sort includes.
No functional change intended.
No functional change intended.
MAIN commitmail json YAML
ukbd(4): Fix ordering in ukbd_cnpollc exit.
This is probably an MP-safety issue waiting to happen, but let's at
least make the wind and unwind sequences mirror images.
This is probably an MP-safety issue waiting to happen, but let's at
least make the wind and unwind sequences mirror images.
MAIN commitmail json YAML
certctl(8): Fix quoting and whitespace style in evilpath test.
No functional change intended.
No functional change intended.
MAIN commitmail json YAML
src/tests/usr.sbin/certctl/t_certctl.sh@1.7
/
diff
/
nxr@1.7
src/usr.sbin/certctl/certctl.sh@1.4 / diff / nxr@1.4
src/usr.sbin/certctl/certctl.sh@1.4 / diff / nxr@1.4
certctl(8): Fix some bugs with evil pathnames.
MAIN commitmail json YAML
certctl(8): Test more evil pathnames.
MAIN commitmail json YAML
certctl(8): Minor man page clarifications.
- Specify exactly what /etc/openssl/certs gets populated with.
- Change HTTPS to TLS.
- Specify the permitted character class in certs.conf.
(Maybe more conservative than strictly needed; but let's stay on
the safe side.)
- Specify exactly what /etc/openssl/certs gets populated with.
- Change HTTPS to TLS.
- Specify the permitted character class in certs.conf.
(Maybe more conservative than strictly needed; but let's stay on
the safe side.)
MAIN commitmail json YAML
hier(7): Document /etc/openssl.
MAIN commitmail json YAML
mozilla-certdata: Install relative symlinks.
Slightly more compact this way, and you can examine them in a destdir
without chrooting. Not terribly important, but a minor convenience.
Slightly more compact this way, and you can examine them in a destdir
without chrooting. Not terribly important, but a minor convenience.
MAIN commitmail json YAML
etc/mtree/special: Fix spaces/tabs.
No functional change intended.
No functional change intended.
MAIN commitmail json YAML
certctl(8): Set certs.conf 644 and add it to etc/mtree/special.
MAIN commitmail json YAML
src/distrib/sets/lists/base/mi@1.1328
/
diff
/
nxr@1.1328
src/distrib/sets/lists/etc/mi@1.272 / diff / nxr@1.272
src/distrib/sets/lists/etc/mi@1.272 / diff / nxr@1.272
distrib/sets/lists: certs.conf belongs in etc, not in base.
Oops.
Oops.
MAIN commitmail json YAML
postinstall(8): Fail if `certctl rehash' fails.
Not using `set -e' here, evidently (maybe we should), so the separate
return 0 suppressed the error.
Not using `set -e' here, evidently (maybe we should), so the separate
return 0 suppressed the error.
MAIN commitmail json YAML
src/UPDATING@1.343
/
diff
/
nxr@1.343
src/tests/usr.sbin/certctl/t_certctl.sh@1.5 / diff / nxr@1.5
src/usr.sbin/certctl/certctl.sh@1.3 / diff / nxr@1.3
src/tests/usr.sbin/certctl/t_certctl.sh@1.5 / diff / nxr@1.5
src/usr.sbin/certctl/certctl.sh@1.3 / diff / nxr@1.3
certctl(8): Avoid clobbering prepopulated /etc/openssl/certs.
Also avoid clobbering some other edge cases like symlinks or
non-directories there.
This way, we have the following transitions on system updates:
- If /etc/openssl/certs is empty (as in default NetBSD<10 installs):
quietly populated on rehash.
- If /etc/openssl/certs is nonempty (you've added things to it,
e.g. by hand or with mozilla-rootcerts) and has never been managed
by certctl(8): left alone on rehash, with an error message to
explain what you need to do.
- If /etc/openssl/certs has been managed by certctl(8): quietly
updated on rehash.
Note: This means current installations made since certctl(8) was
added will be treated like /etc/openssl/certs is nonempty and has
never been managed by certctl(8). To work around this, you can just
delete /etc/openssl/certs and rerun `certctl rehash'.
Also avoid clobbering some other edge cases like symlinks or
non-directories there.
This way, we have the following transitions on system updates:
- If /etc/openssl/certs is empty (as in default NetBSD<10 installs):
quietly populated on rehash.
- If /etc/openssl/certs is nonempty (you've added things to it,
e.g. by hand or with mozilla-rootcerts) and has never been managed
by certctl(8): left alone on rehash, with an error message to
explain what you need to do.
- If /etc/openssl/certs has been managed by certctl(8): quietly
updated on rehash.
Note: This means current installations made since certctl(8) was
added will be treated like /etc/openssl/certs is nonempty and has
never been managed by certctl(8). To work around this, you can just
delete /etc/openssl/certs and rerun `certctl rehash'.
MAIN commitmail json YAML
certctl(8): Test prepopulated /etc/openssl/certs.
This is the scenario when you have previously populated
/etc/openssl/certs manually, or with a package like mozilla-rootcerts
or mozilla-rootcerts-openssl, and you update to a version of NetBSD
with certctl(8). In this case, certctl(8) should avoid destroying
your work.
While here, also test some related but less likely edge cases:
- nonexistent
- symlink
- regular file
This is the scenario when you have previously populated
/etc/openssl/certs manually, or with a package like mozilla-rootcerts
or mozilla-rootcerts-openssl, and you update to a version of NetBSD
with certctl(8). In this case, certctl(8) should avoid destroying
your work.
While here, also test some related but less likely edge cases:
- nonexistent
- symlink
- regular file
MAIN commitmail json YAML
src/tests/usr.sbin/certctl/t_certctl.sh@1.3
/
diff
/
nxr@1.3
src/usr.sbin/certctl/certctl.sh@1.2 / diff / nxr@1.2
src/usr.sbin/certctl/certctl.sh@1.2 / diff / nxr@1.2
certctl(8): Exit nonzero on missing certs.conf.
MAIN commitmail json YAML
certctl(8): Add xfail test for missing certs.conf.
Command should fail, i.e., exit with nonzero status, but it exits
with zero instead.
Command should fail, i.e., exit with nonzero status, but it exits
with zero instead.
MAIN commitmail json YAML
postinstall(8): Add opensslcerts item to regen /etc/openssl/certs.
Works only with destdir /, since it relies on running openssl(1),
which is not available as a tool or required in the cross-build
environment.
Works only with destdir /, since it relies on running openssl(1),
which is not available as a tool or required in the cross-build
environment.
MAIN commitmail json YAML
src/distrib/sets/lists/base/mi@1.1327
/
diff
/
nxr@1.1327
src/etc/mtree/NetBSD.dist.base@1.252 / diff / nxr@1.252
src/external/mpl/Makefile@1.5 / diff / nxr@1.5
src/etc/mtree/NetBSD.dist.base@1.252 / diff / nxr@1.252
src/external/mpl/Makefile@1.5 / diff / nxr@1.5
mozilla-certdata: Connect it up to the build.
MAIN commitmail json YAML
src/external/mpl/mozilla-certdata/share/certs/ACCVRAIZ1.pem@1.1
/
diff
/
nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/AC_RAIZ_FNMT-RCM.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/AC_RAIZ_FNMT-RCM_SERVIDORES_SEGUROS.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/ANF_Secure_Server_Root_CA.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Actalis_Authentication_Root_CA.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/AffirmTrust_Commercial.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/AffirmTrust_Networking.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/AffirmTrust_Premium.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/AffirmTrust_Premium_ECC.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Amazon_Root_CA_1.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Amazon_Root_CA_2.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Amazon_Root_CA_3.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Amazon_Root_CA_4.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Atos_TrustedRoot_2011.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Atos_TrustedRoot_Root_CA_ECC_G2_2020.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Atos_TrustedRoot_Root_CA_ECC_TLS_2021.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Atos_TrustedRoot_Root_CA_RSA_G2_2020.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Atos_TrustedRoot_Root_CA_RSA_TLS_2021.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.1.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem@1.1 / diff / nxr@1.1
:
(more 153 files)
src/external/mpl/mozilla-certdata/share/certs/AC_RAIZ_FNMT-RCM.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/AC_RAIZ_FNMT-RCM_SERVIDORES_SEGUROS.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/ANF_Secure_Server_Root_CA.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Actalis_Authentication_Root_CA.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/AffirmTrust_Commercial.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/AffirmTrust_Networking.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/AffirmTrust_Premium.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/AffirmTrust_Premium_ECC.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Amazon_Root_CA_1.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Amazon_Root_CA_2.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Amazon_Root_CA_3.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Amazon_Root_CA_4.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Atos_TrustedRoot_2011.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Atos_TrustedRoot_Root_CA_ECC_G2_2020.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Atos_TrustedRoot_Root_CA_ECC_TLS_2021.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Atos_TrustedRoot_Root_CA_RSA_G2_2020.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Atos_TrustedRoot_Root_CA_RSA_TLS_2021.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.1.pem@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certs/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem@1.1 / diff / nxr@1.1
:
(more 153 files)
mozilla-certdata: regen
(actually, just `gen', this first time)
(actually, just `gen', this first time)
MAIN commitmail json YAML
src/external/mpl/mozilla-certdata/Makefile@1.1
/
diff
/
nxr@1.1
src/external/mpl/mozilla-certdata/share/Makefile@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certdata.awk@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/Makefile@1.1 / diff / nxr@1.1
src/external/mpl/mozilla-certdata/share/certdata.awk@1.1 / diff / nxr@1.1
mozilla-certdata: Makefile infrastructure.
MAIN commitmail json YAML
mozilla-certdata: Record in doc/3RDPARTY.
MAIN commitmail json YAML
src/distrib/sets/lists/base/mi@1.1326
/
diff
/
nxr@1.1326
src/distrib/sets/lists/man/mi@1.1764 / diff / nxr@1.1764
src/distrib/sets/lists/tests/mi@1.1292 / diff / nxr@1.1292
src/etc/Makefile@1.467 / diff / nxr@1.467
src/etc/mtree/NetBSD.dist.tests@1.200 / diff / nxr@1.200
src/tests/usr.sbin/Makefile@1.8 / diff / nxr@1.8
src/tests/usr.sbin/certctl/Makefile@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/Makefile.inc@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs1/DigiCert_Global_Root_CA.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs1/Explicitly_Distrust_DigiNotar_Root_CA.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs1/Makefile@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs2/GTS_Root_R1.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs2/GlobalSign_Root_CA_-_R3.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs2/Makefile@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs3/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.1.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs3/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs3/Makefile@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs4/AC_RAIZ_FNMT-RCM.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs4/DigiCert_Global_Root_CA.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs4/Makefile@1.1 / diff / nxr@1.1
:
(more 6 files)
src/distrib/sets/lists/man/mi@1.1764 / diff / nxr@1.1764
src/distrib/sets/lists/tests/mi@1.1292 / diff / nxr@1.1292
src/etc/Makefile@1.467 / diff / nxr@1.467
src/etc/mtree/NetBSD.dist.tests@1.200 / diff / nxr@1.200
src/tests/usr.sbin/Makefile@1.8 / diff / nxr@1.8
src/tests/usr.sbin/certctl/Makefile@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/Makefile.inc@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs1/DigiCert_Global_Root_CA.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs1/Explicitly_Distrust_DigiNotar_Root_CA.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs1/Makefile@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs2/GTS_Root_R1.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs2/GlobalSign_Root_CA_-_R3.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs2/Makefile@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs3/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.1.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs3/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs3/Makefile@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs4/AC_RAIZ_FNMT-RCM.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs4/DigiCert_Global_Root_CA.pem@1.1 / diff / nxr@1.1
src/tests/usr.sbin/certctl/certs4/Makefile@1.1 / diff / nxr@1.1
:
(more 6 files)
certctl(8): New tool for managing OpenSSL CA certificates.
Same command-line syntax as FreeBSD, clearer semantics about which
parts are config and which parts are cache.
Same command-line syntax as FreeBSD, clearer semantics about which
parts are config and which parts are cache.
MAIN commitmail json YAML
src/sys/ufs/ext2fs/ext2fs.h@1.51
/
diff
/
nxr@1.51
src/sys/ufs/ext2fs/ext2fs_alloc.c@1.54 / diff / nxr@1.54
src/sys/ufs/ext2fs/ext2fs_bmap.c@1.31 / diff / nxr@1.31
src/sys/ufs/ext2fs/ext2fs_bswap.c@1.25 / diff / nxr@1.25
src/sys/ufs/ext2fs/ext2fs_extents.h@1.5 / diff / nxr@1.5
src/sys/ufs/ext2fs/ext2fs_extern.h@1.57 / diff / nxr@1.57
src/sys/ufs/ext2fs/ext2fs_htree.c@1.11 / diff / nxr@1.11
src/sys/ufs/ext2fs/ext2fs_inode.c@1.91 / diff / nxr@1.91
src/sys/ufs/ext2fs/ext2fs_lookup.c@1.94 / diff / nxr@1.94
src/sys/ufs/ext2fs/ext2fs_rename.c@1.13 / diff / nxr@1.13
src/sys/ufs/ext2fs/ext2fs_vfsops.c@1.223 / diff / nxr@1.223
src/sys/ufs/ext2fs/ext2fs_vnops.c@1.138 / diff / nxr@1.138
src/sys/ufs/ext2fs/ext2fs_alloc.c@1.54 / diff / nxr@1.54
src/sys/ufs/ext2fs/ext2fs_bmap.c@1.31 / diff / nxr@1.31
src/sys/ufs/ext2fs/ext2fs_bswap.c@1.25 / diff / nxr@1.25
src/sys/ufs/ext2fs/ext2fs_extents.h@1.5 / diff / nxr@1.5
src/sys/ufs/ext2fs/ext2fs_extern.h@1.57 / diff / nxr@1.57
src/sys/ufs/ext2fs/ext2fs_htree.c@1.11 / diff / nxr@1.11
src/sys/ufs/ext2fs/ext2fs_inode.c@1.91 / diff / nxr@1.91
src/sys/ufs/ext2fs/ext2fs_lookup.c@1.94 / diff / nxr@1.94
src/sys/ufs/ext2fs/ext2fs_rename.c@1.13 / diff / nxr@1.13
src/sys/ufs/ext2fs/ext2fs_vfsops.c@1.223 / diff / nxr@1.223
src/sys/ufs/ext2fs/ext2fs_vnops.c@1.138 / diff / nxr@1.138
ext2fs: Nix trailing whitespace.
MAIN commitmail json YAML
ext2fs.h: Restore e2fs_cgload/cgsave for libsa and userland use.
Stop-gap until they can be taught to handle the new version that was
moved to ext2fs_vfsops.c, presumably.
Stop-gap until they can be taught to handle the new version that was
moved to ext2fs_vfsops.c, presumably.
MAIN commitmail json YAML
src/sys/arch/x86/acpi/acpi_wakeup.c@1.55
/
diff
/
nxr@1.55
src/sys/arch/x86/pci/pci_machdep.c@1.95 / diff / nxr@1.95
src/sys/arch/x86/x86/genfb_machdep.c@1.20 / diff / nxr@1.20
src/sys/arch/xen/include/amd64/vmparam.h@1.4 / diff / nxr@1.4
src/sys/arch/xen/x86/xen_pmap.c@1.41 / diff / nxr@1.41
src/sys/arch/x86/pci/pci_machdep.c@1.95 / diff / nxr@1.95
src/sys/arch/x86/x86/genfb_machdep.c@1.20 / diff / nxr@1.20
src/sys/arch/xen/include/amd64/vmparam.h@1.4 / diff / nxr@1.4
src/sys/arch/xen/x86/xen_pmap.c@1.41 / diff / nxr@1.41
xen: Provide definitions or ifdefs to make drm build in XEN3_DOM0.
No idea if it works, but it builds now.
PR port-xen/49330
No idea if it works, but it builds now.
PR port-xen/49330
MAIN commitmail json YAML
gdb/psim: Suppress typedef-redefinition errors in the clang build.
Seems clang disagrees with gcc about whether this is allowed under
-std=gnu99.
Seems clang disagrees with gcc about whether this is allowed under
-std=gnu99.
MAIN commitmail json YAML
src/distrib/sets/lists/tests/md.amd64@1.17
/
diff
/
nxr@1.17
src/distrib/sets/lists/tests/mi@1.1291 / diff / nxr@1.1291
src/distrib/sets/lists/tests/mi@1.1291 / diff / nxr@1.1291
distrib/sets/lists/tests: Correction: h_inotify_* are MI.
Debug lists are probably still wrong, though -- looks like there's no
rule to change h_inotify_*.out.debug to h_inotify_*.debug. Out of
energy to look into this further, though; please fix me!
Debug lists are probably still wrong, though -- looks like there's no
rule to change h_inotify_*.out.debug to h_inotify_*.debug. Out of
energy to look into this further, though; please fix me!
MAIN commitmail json YAML
src/distrib/sets/lists/tests/md.amd64@1.16
/
diff
/
nxr@1.16
src/distrib/sets/lists/tests/mi@1.1290 / diff / nxr@1.1290
src/distrib/sets/lists/tests/mi@1.1290 / diff / nxr@1.1290
distrib/sets/lists: /usr/tests/compat/linux/h_* is amd64-only for now.
MAIN commitmail json YAML
src/distrib/sets/lists/debug/md.amd64@1.120
/
diff
/
nxr@1.120
src/distrib/sets/lists/debug/mi@1.418 / diff / nxr@1.418
src/distrib/sets/lists/debug/mi@1.418 / diff / nxr@1.418
distrib/sets/lists: compat/linux/h_*.debug is amd64-only for now.
MAIN commitmail json YAML
src/distrib/sets/lists/debug/mi@1.417
/
diff
/
nxr@1.417
src/distrib/sets/lists/tests/mi@1.1289 / diff / nxr@1.1289
src/distrib/sets/lists/tests/mi@1.1289 / diff / nxr@1.1289
distrib/sets/lists: Add .debug files for new compat/linux tests.
MAIN commitmail json YAML
etc/mtree/NetBSD.dist.tests: Update for new compat linux tests.
MAIN commitmail json YAML
src/share/man/man4/options.4@1.526
/
diff
/
nxr@1.526
src/share/man/man7/sysctl.7@1.166 / diff / nxr@1.166
src/share/man/man7/sysctl.7@1.166 / diff / nxr@1.166
options(4), sysctl(7): Document options HEARTBEAT.
MAIN commitmail json YAML
gdb/doc/GDBvn.texi: Omit spurious trailing blank line.
Reduces diff from upstream.
Reduces diff from upstream.
MAIN commitmail json YAML
vis(3): Per KNF, sys/param.h comes before sys/types.h.
Which is nice because that's also lexicographic.
Which is nice because that's also lexicographic.
MAIN commitmail json YAML
vis(3): Need <stdint.h> for SIZE_MAX, per C standard.
>From Kyle Evans <kevans@FreeBSD.org>.
Followup to PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
>From Kyle Evans <kevans@FreeBSD.org>.
Followup to PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
vis(3): Sort includes. No functional change intended.
Prompted by PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
Prompted by PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
strncpy(3): More on how strlcpy is not a safe strncpy replacement.
MAIN commitmail json YAML
base/shl.mi: Tag libasan.so and libubsan.so with gcc like before.
Not in clang builds. This tag got dropped in the gcc12 update.
Not in clang builds. This tag got dropped in the gcc12 update.
MAIN commitmail json YAML
vis(3): Fix one more buffer overrun in an edge case.
PR lib/57573
XXX pullup-10
XXX pullup-9
XXX pullup-8
PR lib/57573
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
vis(3): Fix main part of PR lib/57573.
>From Kyle Evans <kevans@FreeBSD.org>.
XXX pullup-10
XXX pullup-9
XXX pullup-8
>From Kyle Evans <kevans@FreeBSD.org>.
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
vis(3): Avoid potential arithmetic overflow in maxolen.
Can't easily prove that this overflow is impossible, so let's add a
check.
Prompted by PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
Can't easily prove that this overflow is impossible, so let's add a
check.
Prompted by PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
vis(3): Call wcslen(start) only once.
It had better not change between these two times!
Prompted by PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
It had better not change between these two times!
Prompted by PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
vis(3): Avoid arithmetic overflow before calloc(3).
Prompted by PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
Prompted by PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
vis(3): Make mbslength unsigned.
Sprinkle assertions and comments justifying the proposition that it
would never go negative if signed.
Obviates need to worry about mblength > SSIZE_MAX.
Prompted by PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
Sprinkle assertions and comments justifying the proposition that it
would never go negative if signed.
Obviates need to worry about mblength > SSIZE_MAX.
Prompted by PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
vis(3): Make maxolen unsigned size_t, not ssize_t.
It is initialized once either to *dlen, which is unsigned size_t, or
to wcslen(start) * MB_MAX_LEN + 1, and wcslen returns unsigned size_t
too. So there appears to have never been any reason for this to be
signed.
Part of PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
It is initialized once either to *dlen, which is unsigned size_t, or
to wcslen(start) * MB_MAX_LEN + 1, and wcslen returns unsigned size_t
too. So there appears to have never been any reason for this to be
signed.
Part of PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
vis(3) tests: Test another overflow edge case.
Related to PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
Related to PR lib/57573.
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
vis(3) tests: Expand tests and diagnostic outputs on failure.
PR lib/57573
XXX pullup-10
XXX pullup-9
XXX pullup-8
PR lib/57573
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
vis(3) tests: Add xfail test for encoding overflow.
>From Kyle Evans <kevans@FreeBSD.org>.
PR lib/57573
XXX pullup-10
XXX pullup-9
XXX pullup-8
>From Kyle Evans <kevans@FreeBSD.org>.
PR lib/57573
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
strncpy(3): Fix column sizing.
MAIN commitmail json YAML
strlcpy(3): Tweak markup.
MAIN commitmail json YAML
src/lib/libc/string/strlcpy.3@1.20
/
diff
/
nxr@1.20
src/lib/libc/string/strncpy.3@1.14 / diff / nxr@1.14
src/lib/libc/string/strncpy.3@1.14 / diff / nxr@1.14
strlcpy(3), strncpy(3): Omit needless (void) casts in examples.
The return values are not critical.
The return values are not critical.
MAIN commitmail json YAML
src/lib/libc/string/strcpy.3@1.27
/
diff
/
nxr@1.27
src/lib/libc/string/strlcpy.3@1.19 / diff / nxr@1.19
src/lib/libc/string/strncpy.3@1.13 / diff / nxr@1.13
src/lib/libc/string/strlcpy.3@1.19 / diff / nxr@1.19
src/lib/libc/string/strncpy.3@1.13 / diff / nxr@1.13
strcpy(3), strlcpy(3), strncpy(3): Just say `byte', not `character'.
MAIN commitmail json YAML
strncpy(3): Tiny wording tweak.
MAIN commitmail json YAML
strncpy(3): Reword to make sentence structure parallel.
MAIN commitmail json YAML
strncpy(3): Fix typo -- stpncpy, not stpcpy which is different.
MAIN commitmail json YAML
strncpy(3): Take another whack at clarifying this.
Emphasize the fixed-buffer nature of it, and that NUL-termination is
neither required on input nor guaranteed on output.
Emphasize the fixed-buffer nature of it, and that NUL-termination is
neither required on input nor guaranteed on output.
MAIN commitmail json YAML
strlcpy(3): Nix stray space between `NUL' and `-terminating'.
MAIN commitmail json YAML
strcpy(3): Note that strlcpy(3) is a safer replacement for strcpy(3).
Suggest snprintf("%s") as a more portable alternative too.
Note that both strlcpy and snprintf still require the input to be
NUL-terminated.
Suggest snprintf("%s") as a more portable alternative too.
Note that both strlcpy and snprintf still require the input to be
NUL-terminated.
MAIN commitmail json YAML
strncpy(3): Rework the example in an attempt to improve exposition.
MAIN commitmail json YAML
strncpy(3): Note strcpy(3) man page revision this forked from.
MAIN commitmail json YAML
src/lib/libc/string/strcpy.3@1.25
/
diff
/
nxr@1.25
src/lib/libc/string/strlcpy.3@1.16 / diff / nxr@1.16
src/lib/libc/string/strncpy.3@1.6 / diff / nxr@1.6
src/lib/libc/string/strlcpy.3@1.16 / diff / nxr@1.16
src/lib/libc/string/strncpy.3@1.6 / diff / nxr@1.6
strcpy(3), strlcpy(3), strncpy(3): Use `.Tn NUL' for the zero byte.
Let's be consistent within these man pages. (If someone else really
likes the unpronounceable `.Ql \e0' better, that's fine, you can go
through and systematically change all the man pages to use that after
we're done clarifying strcpy(3), strncpy(3), and strlcpy(3).)
Let's be consistent within these man pages. (If someone else really
likes the unpronounceable `.Ql \e0' better, that's fine, you can go
through and systematically change all the man pages to use that after
we're done clarifying strcpy(3), strncpy(3), and strlcpy(3).)
MAIN commitmail json YAML
strncpy(3): Slightly more consistency about NUL vs '\0' in the text.
MAIN commitmail json YAML
strncpy(3): Qualify example of strlcpy(3) with a major caveat.
MAIN commitmail json YAML
src/lib/libc/string/Makefile.inc@1.88
/
diff
/
nxr@1.88
src/lib/libc/string/strcpy.3@1.24 / diff / nxr@1.24
src/lib/libc/string/strncpy.3@1.1 / diff / nxr@1.1
src/lib/libc/string/strcpy.3@1.24 / diff / nxr@1.24
src/lib/libc/string/strncpy.3@1.1 / diff / nxr@1.1
strncpy(3), stpncpy(3): Split man page out of strcpy(3), stpcpy(3).
These are for substantively different purposes (fixed-width fields
with optional NUL padding vs NUL-terminated strings), so they don't
belong together.
Be more specific about the security issues.
These are for substantively different purposes (fixed-width fields
with optional NUL padding vs NUL-terminated strings), so they don't
belong together.
Be more specific about the security issues.
MAIN commitmail json YAML
acpiwmi(4): Fix abuse of char buffer for struct guid_t content.
Nothing guarantees alignment, so this is all undefined behaviour,
even if we don't touch the uninitialized members.
XXX pullup-10
XXX pullup-9
XXX pullup-8
Nothing guarantees alignment, so this is all undefined behaviour,
even if we don't touch the uninitialized members.
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
strlcpy(3): Rework man page to clarify relation to strncpy(3).
Add caveats explaining when strlcpy(3) and strlcat(3) are dangerously
inadequate or inappropriate.
XXX pullup-10
XXX pullup-9
XXX pullup-8
Add caveats explaining when strlcpy(3) and strlcat(3) are dangerously
inadequate or inappropriate.
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
workqueue(9) tests: Fix mistake in rev. 1.9.
Somehow, despite manually verifying a build/install/test of every
revision in my patch series, I managed to commit the wrong version of
the file for what became rev. 1.9, so the test was just broken when
it went in and remained broken in the commit where I fixed the real
bug and removed the xfail marker on the test.
PR kern/5757
XXX pullup-10
XXX pullup-9
XXX pullup-8
Somehow, despite manually verifying a build/install/test of every
revision in my patch series, I managed to commit the wrong version of
the file for what became rev. 1.9, so the test was just broken when
it went in and remained broken in the commit where I fixed the real
bug and removed the xfail marker on the test.
PR kern/5757
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
vmxnet(4): Fix various MP bugs.
- Defer reset to workqueue.
=> vmxnet3_stop_locked is forbidden in softint.
=> XXX Problem: We still take the core lock in softint, and we
still take the core lock around vmxnet3_stop_locked. TBD.
- Touch if_flags only under IFNET_LOCK.
=> Cache ifp->if_flags & IFF_PROMISC in vmxnet3_ifflags_cb.
=> Don't call vmxnet3_set_rxfilter unless up and running; cache
this as vmx_mcastactive. Use ENETRESET in vmxnet3_ifflags_cb
instead of calling vmxnet3_set_rxfilter directly.
. (The cache is currently serialized by the core lock, but it
might reasonably be serialized by an independent lock like in
usbnet(9).)
- Fix vmxnet3_stop_rendezvous so it actually does something.
=> New vxtxq_stopping, vxrxq_stopping variables synchronize with
Rx/Tx interrupt handlers.
- Sprinkle IFNET_LOCK and core lock assertions.
- Defer reset to workqueue.
=> vmxnet3_stop_locked is forbidden in softint.
=> XXX Problem: We still take the core lock in softint, and we
still take the core lock around vmxnet3_stop_locked. TBD.
- Touch if_flags only under IFNET_LOCK.
=> Cache ifp->if_flags & IFF_PROMISC in vmxnet3_ifflags_cb.
=> Don't call vmxnet3_set_rxfilter unless up and running; cache
this as vmx_mcastactive. Use ENETRESET in vmxnet3_ifflags_cb
instead of calling vmxnet3_set_rxfilter directly.
. (The cache is currently serialized by the core lock, but it
might reasonably be serialized by an independent lock like in
usbnet(9).)
- Fix vmxnet3_stop_rendezvous so it actually does something.
=> New vxtxq_stopping, vxrxq_stopping variables synchronize with
Rx/Tx interrupt handlers.
- Sprinkle IFNET_LOCK and core lock assertions.
MAIN commitmail json YAML
src/crypto/external/cpl/trousers/bin/tcsd/Makefile@1.3
/
diff
/
nxr@1.3
src/crypto/external/cpl/trousers/dist/src/include/tcsd.h@1.4 / diff / nxr@1.4
src/crypto/external/cpl/trousers/dist/src/include/trousers_types.h@1.4 / diff / nxr@1.4
src/crypto/external/cpl/trousers/lib/libtcs/Makefile@1.2 / diff / nxr@1.2
src/crypto/external/cpl/trousers/lib/libtspi/Makefile@1.4 / diff / nxr@1.4
src/crypto/external/cpl/trousers/dist/src/include/tcsd.h@1.4 / diff / nxr@1.4
src/crypto/external/cpl/trousers/dist/src/include/trousers_types.h@1.4 / diff / nxr@1.4
src/crypto/external/cpl/trousers/lib/libtcs/Makefile@1.2 / diff / nxr@1.2
src/crypto/external/cpl/trousers/lib/libtspi/Makefile@1.4 / diff / nxr@1.4
trousers: Make this build again.
- Downgrade address-of-packed-member errors to warnings. Not sure if
this is safe, but there's too many to audit.
- Silence deprecation warnings for openssl3.
- Address removal of const qualifier in iconv.
- Nix unused definitions in a .h file, which cause trouble now that
-fno-common is the default.
- Downgrade address-of-packed-member errors to warnings. Not sure if
this is safe, but there's too many to audit.
- Silence deprecation warnings for openssl3.
- Address removal of const qualifier in iconv.
- Nix unused definitions in a .h file, which cause trouble now that
-fno-common is the default.
MAIN commitmail json YAML
xvif(4): Omit needless membars in xennetback_connect.
xneti is a private data structure to which we have exclusive access
here; ordering the stores doesn't make sense.
xneti is a private data structure to which we have exclusive access
here; ordering the stores doesn't make sense.
MAIN commitmail json YAML
xvif(4): Omit needless membars in xennetback_rx_copy_process.
- No need for barrier around touching req_cons and rsp_prod_pvt,
which are private.
- RING_PUSH_RESPONSES_AND_CHECK_NOTIFY updates the shared req_prod and
then issues xen_mb, which is all that we need between the update of
shared req_prod and hypervisor_notify_via_evtchn.
(Between updating the shared req_prod and issuing
hypervisor_notify_via_evtchn, only xen_wmb is needed. But after
writing to the shared req_prod, RING_PUSH_REQUESTS_AND_CHECK_NOTIFY
must also read from the shared rsp_event, which requires the
store-before-load ordering that only xen_mb provides.)
- No need for barrier around touching req_cons and rsp_prod_pvt,
which are private.
- RING_PUSH_RESPONSES_AND_CHECK_NOTIFY updates the shared req_prod and
then issues xen_mb, which is all that we need between the update of
shared req_prod and hypervisor_notify_via_evtchn.
(Between updating the shared req_prod and issuing
hypervisor_notify_via_evtchn, only xen_wmb is needed. But after
writing to the shared req_prod, RING_PUSH_REQUESTS_AND_CHECK_NOTIFY
must also read from the shared rsp_event, which requires the
store-before-load ordering that only xen_mb provides.)
MAIN commitmail json YAML
xvif(4): Simplify while loop in xennetback_evthandler.
No functional change intended.
No functional change intended.
MAIN commitmail json YAML
xvif(4): Omit needless membars in xennetback_evthandler.
This should improve throughput without any impact on correctness.
This should improve throughput without any impact on correctness.
MAIN commitmail json YAML
xvif(4): Move expensive xen_mb out of xennetback_evthandler loop.
Use the cheaper RING_HAS_UNCONFIRMED_REQUESTS for most of the loop.
This should improve throughput without any impact on correctness.
Use the cheaper RING_HAS_UNCONFIRMED_REQUESTS for most of the loop.
This should improve throughput without any impact on correctness.
MAIN commitmail json YAML
xvif(4): Omit local variable aliasing xneti->xni_txring.req_cons.
No functional change intended.
No functional change intended.
MAIN commitmail json YAML
xvif(4): Add missing xen_rmb in xennetback_evthandler.
MAIN commitmail json YAML
xvif(4): Comment on memory barriers in xennetback_evthandler.
Note which ones appear unnecessary and which ones appear too strong,
but don't change them.
No functional change intended.
Note which ones appear unnecessary and which ones appear too strong,
but don't change them.
No functional change intended.
MAIN commitmail json YAML
workqueue(9): Factor out wq->wq_flags & WQ_FPU in workqueue_worker.
No functional change intended. Makes it clearer that s is
initialized when used.
No functional change intended. Makes it clearer that s is
initialized when used.
MAIN commitmail json YAML
workqueue(9): Sort includes.
No functional change intended.
No functional change intended.
MAIN commitmail json YAML
workqueue(9): Avoid unnecessary mutex_exit/enter cycle each loop.
MAIN commitmail json YAML
workqueue(9): Stop violating queue(3) internals.
MAIN commitmail json YAML
workqueue(9): Sprinkle dtrace probes for workqueue_wait edge cases.
Let's make it easy to find out whether these are hit.
Let's make it easy to find out whether these are hit.
MAIN commitmail json YAML
src/sys/kern/subr_workqueue.c@1.42
/
diff
/
nxr@1.42
src/tests/rump/rumpkern/t_workqueue.c@1.4 / diff / nxr@1.4
src/tests/rump/rumpkern/t_workqueue.c@1.4 / diff / nxr@1.4
workqueue(9): Avoid touching running work items in workqueue_wait.
As soon as the workqueue function has called, it is forbidden to
touch the struct work passed to it -- the function might free or
reuse the data structure it is embedded in.
So workqueue_wait is forbidden to search the queue for the batch of
running work items. Instead, use a generation number which is odd
while the thread is processing a batch of work and even when not.
There's still a small optimization available with the struct work
pointer to wait for: if we find the work item in one of the per-CPU
_pending_ queues, then after we wait for a batch of work to complete
on that CPU, we don't need to wait for work on any other CPUs.
PR kern/57574
XXX pullup-10
XXX pullup-9
XXX pullup-8
As soon as the workqueue function has called, it is forbidden to
touch the struct work passed to it -- the function might free or
reuse the data structure it is embedded in.
So workqueue_wait is forbidden to search the queue for the batch of
running work items. Instead, use a generation number which is odd
while the thread is processing a batch of work and even when not.
There's still a small optimization available with the struct work
pointer to wait for: if we find the work item in one of the per-CPU
_pending_ queues, then after we wait for a batch of work to complete
on that CPU, we don't need to wait for work on any other CPUs.
PR kern/57574
XXX pullup-10
XXX pullup-9
XXX pullup-8
MAIN commitmail json YAML
MAIN commitmail json YAML
workqueue(9) tests: Destroy struct work immediately on entry.
MAIN commitmail json YAML
workqueue(9) tests: Nix trailing whitespace.
MAIN commitmail json YAML
tests/rump/rumpkern: Use PROGDPLIBS, not explicit -L/-l.
This way we relink the t_* test programs whenever changes under
tests/rump/kernspace change libkernspace.a.
This way we relink the t_* test programs whenever changes under
tests/rump/kernspace change libkernspace.a.
MAIN commitmail json YAML
sqlite3/lib/Makefile: -Wno-error=restrict is a gccism.
Let's try to get at least one working clang autobuild this summer,
shall we?
Let's try to get at least one working clang autobuild this summer,
shall we?
MAIN commitmail json YAML
libc/resolv/res_debug.c: Minor whitespace fixes.
MAIN commitmail json YAML
traceroute/Makefile: Nix trailing whitespace.
MAIN commitmail json YAML
gcc/README.warnings: Nix trailing whitespace.
MAIN commitmail json YAML
t_cdb: No need for weird padding any more.
cdbw_output never needed it at runtime, and the declaration no longer
makes gcc angry about not having it.
cdbw_output never needed it at runtime, and the declaration no longer
makes gcc angry about not having it.
MAIN commitmail json YAML
libnpf(3): No need for weird padding any more.
cdbw_output never needed it at runtime, and the declaration no longer
makes gcc angry about not having it.
cdbw_output never needed it at runtime, and the declaration no longer
makes gcc angry about not having it.
MAIN commitmail json YAML
npftest(8): No need for weird padding any more.
cdbw_output never needed it at runtime, and the declaration no longer
makes gcc angry about not having it.
cdbw_output never needed it at runtime, and the declaration no longer
makes gcc angry about not having it.
MAIN commitmail json YAML
dev_mkdb(8): No need for weird padding any more.
cdbw_output never needed it at runtime, and the declaration no longer
makes gcc angry about not having it.
cdbw_output never needed it at runtime, and the declaration no longer
makes gcc angry about not having it.
MAIN commitmail json YAML
services_mkdb(8): No need for weird padding any more.
cdbw_output never needed it at runtime, and the declaration no longer
makes gcc angry about not having it.
cdbw_output never needed it at runtime, and the declaration no longer
makes gcc angry about not having it.
MAIN commitmail json YAML
src/include/cdbw.h@1.3
/
diff
/
nxr@1.3
src/lib/libc/cdb/cdbw.3@1.9 / diff / nxr@1.9
src/lib/libc/cdb/cdbw.c@1.9 / diff / nxr@1.9
src/lib/libc/cdb/cdbw.3@1.9 / diff / nxr@1.9
src/lib/libc/cdb/cdbw.c@1.9 / diff / nxr@1.9
cdbw(3): Make cdbw_output descr parameter type less confusing.
This is a string of _up to_ 16 bytes, used with strncpy(..., 16).
Specifying `const char descr[16]', while formally equivalent to
`const char *descr' in standard C, now provokes the ire of gcc when
the caller does not provide a buffer of at least 16 bytes.
This is a string of _up to_ 16 bytes, used with strncpy(..., 16).
Specifying `const char descr[16]', while formally equivalent to
`const char *descr' in standard C, now provokes the ire of gcc when
the caller does not provide a buffer of at least 16 bytes.
MAIN commitmail json YAML
style(5): Advise against new struct typedefs and explain why.
Proposed on tech-kern:
https://mail-index.netbsd.org/tech-kern/2023/07/11/msg028950.html
Positive feedback to general concept, negative feedback to specifics
and phrasing of the first iteration but no objections to latest
iteration after several weeks at:
https://mail-index.netbsd.org/tech-kern/2023/07/16/msg028994.html
Proposed on tech-kern:
https://mail-index.netbsd.org/tech-kern/2023/07/11/msg028950.html
Positive feedback to general concept, negative feedback to specifics
and phrasing of the first iteration but no objections to latest
iteration after several weeks at:
https://mail-index.netbsd.org/tech-kern/2023/07/16/msg028994.html
MAIN commitmail json YAML
radeon: Suspend ioctls while device is suspended.
XXX pullup-10
XXX pullup-10
MAIN commitmail json YAML
nouveau: Suspend ioctls while device is suspended.
XXX pullup-10
XXX pullup-10
MAIN commitmail json YAML
amdgpu: Suspend ioctls while device is suspended.
XXX pullup-10
XXX pullup-10
MAIN commitmail json YAML
src/distrib/sets/lists/base/md.amd64@1.296
/
diff
/
nxr@1.296
src/distrib/sets/lists/debug/ad.aarch64@1.36 / diff / nxr@1.36
src/distrib/sets/lists/debug/md.amd64@1.119 / diff / nxr@1.119
src/distrib/sets/lists/debug/ad.aarch64@1.36 / diff / nxr@1.36
src/distrib/sets/lists/debug/md.amd64@1.119 / diff / nxr@1.119
distrib/sets/lists: Fix libtsan entries.
- No obsolete .so.N or .so.N.M entries.
- libtsan.so for gcc.
- libtsan.so.1* for gcc=10.
- libtsan.so.2* for gcc=12.
- No libtsan.so.1* on aarch64, libtsan on aarch64 is new in gcc12.
- No obsolete .so.N or .so.N.M entries.
- libtsan.so for gcc.
- libtsan.so.1* for gcc=10.
- libtsan.so.2* for gcc=12.
- No libtsan.so.1* on aarch64, libtsan on aarch64 is new in gcc12.
MAIN commitmail json YAML
netbt(4): Initialize bt_lock earlier.
Use a driver-class module modcmd init function, instead of a socket
domain init function; the socket-domain ones don't run until after
configure, but we need this to be initialized before configure so
that Bluetooth HCI drivers like ubt(4) can use it.
This is suboptimal but it's the least intrusive way I've thought of
to get this working, even if it's a little grody to make netbt a
`driver-class' (builtin) module. Note that this doesn't mean netbt
becomes dynamically loadable or unloadable; we're just using a module
for initialization ordering.
PR kern/56988
XXX pullup-10
Use a driver-class module modcmd init function, instead of a socket
domain init function; the socket-domain ones don't run until after
configure, but we need this to be initialized before configure so
that Bluetooth HCI drivers like ubt(4) can use it.
This is suboptimal but it's the least intrusive way I've thought of
to get this working, even if it's a little grody to make netbt a
`driver-class' (builtin) module. Note that this doesn't mean netbt
becomes dynamically loadable or unloadable; we're just using a module
for initialization ordering.
PR kern/56988
XXX pullup-10
MAIN commitmail json YAML
libm: Add dummy remainderl and remquol.
These are pretty bad -- these aren't transcendental functions; not
rocket science to make them correctly rounded -- but let's just make
sure they're available in libm for netbsd-10.
XXX pullup-10
These are pretty bad -- these aren't transcendental functions; not
rocket science to make them correctly rounded -- but let's just make
sure they're available in libm for netbsd-10.
XXX pullup-10
MAIN commitmail json YAML
rnd(4): Document `entropy: best effort' in random(4).
MAIN commitmail json YAML
xcall(9): Rename condvars to be less confusing.
The `cv' suffix is not helpful and `xclocv' looks like some kind of
clock at first glance. Just say `xclow' and `xchigh'.
The `cv' suffix is not helpful and `xclocv' looks like some kind of
clock at first glance. Just say `xclow' and `xchigh'.
MAIN commitmail json YAML
xen/x86: Get the right intrframe pointer in ddb ipi.
This was broken with the transition from evtchn_set_handler to
intr_establish_xname in 2017, remained broken with the transition
from intr_establish_xname to xen_intr_establish_xname in 2018, and
still remained broken when xen_intr_establish_xname was changed back
to evtchn_set_handler in 2020.
The mechanism is grody -- instead of a secret second argument to the
interrupt handler, the intrframe pointer should be replaced by a
struct cpu_info member that is saved and restored by the interrupt
handler calling logic. But we should make sure the replacement
actually works first -- which is not trivial in part because the
users are hidden behind sketchy function pointer casts.
With any luck, this will make `mach cpu N' work in ddb on Xen.
XXX pullup-10
XXX pullup-9 (by patch)
This was broken with the transition from evtchn_set_handler to
intr_establish_xname in 2017, remained broken with the transition
from intr_establish_xname to xen_intr_establish_xname in 2018, and
still remained broken when xen_intr_establish_xname was changed back
to evtchn_set_handler in 2020.
The mechanism is grody -- instead of a secret second argument to the
interrupt handler, the intrframe pointer should be replaced by a
struct cpu_info member that is saved and restored by the interrupt
handler calling logic. But we should make sure the replacement
actually works first -- which is not trivial in part because the
users are hidden behind sketchy function pointer casts.
With any luck, this will make `mach cpu N' work in ddb on Xen.
XXX pullup-10
XXX pullup-9 (by patch)
MAIN commitmail json YAML
src/sys/arch/amd64/conf/XEN3_DOM0@1.199
/
diff
/
nxr@1.199
src/sys/arch/amd64/conf/XEN3_DOMU@1.103 / diff / nxr@1.103
src/sys/arch/i386/conf/XEN3PAE_DOM0@1.40 / diff / nxr@1.40
src/sys/arch/i386/conf/XEN3PAE_DOMU@1.22 / diff / nxr@1.22
src/sys/arch/amd64/conf/XEN3_DOMU@1.103 / diff / nxr@1.103
src/sys/arch/i386/conf/XEN3PAE_DOM0@1.40 / diff / nxr@1.40
src/sys/arch/i386/conf/XEN3PAE_DOMU@1.22 / diff / nxr@1.22
xen/x86: Enable heartbeat checks.
MAIN commitmail json YAML
tests/crypto/opencrypto: test_asymfeat requires privileges.
MAIN commitmail json YAML
tests/net/inpcb: Tests require root.
MAIN commitmail json YAML
tests/net/net/t_bind: IP_BINDANY and IPV6_BINDANY require root.
MAIN commitmail json YAML
tests/lib/librumphijack: Avoid trying to run rpcbind as non-root.
Can probably make this work through rumphijack, but there's no sense
in even trying the test if we can't, so let's reduce the unprivileged
false alarms.
Can probably make this work through rumphijack, but there's no sense
in even trying the test if we can't, so let's reduce the unprivileged
false alarms.
MAIN commitmail json YAML
src/tests/lib/libnvmm/t_io_assist.sh@1.3
/
diff
/
nxr@1.3
src/tests/lib/libnvmm/t_mem_assist.sh@1.3 / diff / nxr@1.3
src/tests/lib/libnvmm/t_mem_assist.sh@1.3 / diff / nxr@1.3
tests/lib/libnvmm: Tests require privileges.
MAIN commitmail json YAML
t_nullmnt: Need privileges for mount.
(unless vfs.generic.usermount=1 but let's keep it simple)
(unless vfs.generic.usermount=1 but let's keep it simple)
MAIN commitmail json YAML
tests/include/t_paths: Test all paths, nonfatally.
This way a single failure doesn't suppress failure reports for all
the other paths to test.
Omit some needless blank lines while here.
This way a single failure doesn't suppress failure reports for all
the other paths to test.
Omit some needless blank lines while here.
MAIN commitmail json YAML
tests/include/t_paths: /dev/ksyms requires root.
MAIN commitmail json YAML
Revert "rump: Set mp_online = true and start threads _after_ cold = 0."
This breaks some tests, e.g. dev/scsipi/t_cd:noisyeject, which relies
on config_finalize to wait for driver threads. Trouble is, the
actual setting of cold=0 happens near the call to config_finalize in
RUMP__FACTION_DEV. Need to think harder about this.
This breaks some tests, e.g. dev/scsipi/t_cd:noisyeject, which relies
on config_finalize to wait for driver threads. Trouble is, the
actual setting of cold=0 happens near the call to config_finalize in
RUMP__FACTION_DEV. Need to think harder about this.
MAIN commitmail json YAML
cprng_fast(9): Drop and retake percpu reference across cprng_strong.
cprng_strong may sleep on an adaptive lock (via entropy_extract),
which invalidates percpu(9) references.
Discovered by stumbling upon this panic in a test run:
panic: kernel diagnostic assertion "(cprng == percpu_getref(cprng_fast_percpu)) && (percpu_putref(cprng_fast_percpu), true)" failed: file "/home/riastradh/netbsd/current/src/sys/rump/librump/rumpkern/../../../crypto/cprng_fast/cprng_fast.c", line 117
XXX pullup-10
cprng_strong may sleep on an adaptive lock (via entropy_extract),
which invalidates percpu(9) references.
Discovered by stumbling upon this panic in a test run:
panic: kernel diagnostic assertion "(cprng == percpu_getref(cprng_fast_percpu)) && (percpu_putref(cprng_fast_percpu), true)" failed: file "/home/riastradh/netbsd/current/src/sys/rump/librump/rumpkern/../../../crypto/cprng_fast/cprng_fast.c", line 117
XXX pullup-10
MAIN commitmail json YAML
cprng(9): Drop and retake percpu reference across entropy_extract.
entropy_extract may sleep on an adaptive lock, which invalidates
percpu(9) references.
Add a note in the comment over entropy_extract about this.
Discovered by stumbling upon this panic during a test run:
[ 1.0200050] panic: kernel diagnostic assertion "(cprng == percpu_getref(cprng_fast_percpu)) && (percpu_putref(cprng_fast_percpu), true)" failed: file "/home/riastradh/netbsd/current/src/sys/rump/librump/rumpkern/../../../crypto/cprng_fast/cprng_fast.c", line 117
XXX pullup-10
entropy_extract may sleep on an adaptive lock, which invalidates
percpu(9) references.
Add a note in the comment over entropy_extract about this.
Discovered by stumbling upon this panic during a test run:
[ 1.0200050] panic: kernel diagnostic assertion "(cprng == percpu_getref(cprng_fast_percpu)) && (percpu_putref(cprng_fast_percpu), true)" failed: file "/home/riastradh/netbsd/current/src/sys/rump/librump/rumpkern/../../../crypto/cprng_fast/cprng_fast.c", line 117
XXX pullup-10
MAIN commitmail json YAML
src/distrib/sets/lists/base/md.amd64@1.295
/
diff
/
nxr@1.295
src/distrib/sets/lists/base/md.sparc64@1.262 / diff / nxr@1.262
src/distrib/sets/lists/base/md.sparc64@1.262 / diff / nxr@1.262
base/md.amd64, base/md.sparc64: Mark openssl compat directories.
Should fix MKCOMPAT=no build.
PR port-amd64/57567
Should fix MKCOMPAT=no build.
PR port-amd64/57567
MAIN commitmail json YAML
comp/mi: /usr/include/g++/bit is gcc-only, not for clang (or pcc)
MAIN commitmail json YAML
rump: Set mp_online = true and start threads _after_ cold = 0.
Otherwise we may have threads running while cold, which is a
contradiction in terms.
Deferring mp_online = true is necessary because things like xcall(9)
use rely on it to decide whether to wait for threads on other CPUs.
Otherwise we may have threads running while cold, which is a
contradiction in terms.
Deferring mp_online = true is necessary because things like xcall(9)
use rely on it to decide whether to wait for threads on other CPUs.
MAIN commitmail json YAML
memfd(2): Run all tests; don't stop after the first failure.
MAIN commitmail json YAML
src/distrib/sets/lists/debug/mi@1.415
/
diff
/
nxr@1.415
src/distrib/sets/lists/tests/mi@1.1285 / diff / nxr@1.1285
src/distrib/sets/lists/tests/mi@1.1285 / diff / nxr@1.1285
t_ubsan, t_ubsanxx: Remove gcc=10, gcc=12 conditionals.
These are built unconditionally. Should help fix the clang build.
These are built unconditionally. Should help fix the clang build.
MAIN commitmail json YAML
entropy(9): Disable !cold assertion in rump for now.
Evidently rump starts threads before it sets cold = 0, and deferring
the call to rump_thread_allow(NULL) in rump.c rump_init_callback
until after setting cold = 0 doesn't work either -- rump kernels just
hang. To be investigated -- for now, let's just stop breaking
thousands of tests.
Evidently rump starts threads before it sets cold = 0, and deferring
the call to rump_thread_allow(NULL) in rump.c rump_init_callback
until after setting cold = 0 doesn't work either -- rump kernels just
hang. To be investigated -- for now, let's just stop breaking
thousands of tests.
MAIN commitmail json YAML
Revert "softint(9): Sprinkle KASSERT(!cold)."
Temporary workaround for PR kern/57563 -- to be fixed properly after
analysis.
Temporary workaround for PR kern/57563 -- to be fixed properly after
analysis.
MAIN commitmail json YAML
softint(9): Sprinkle KASSERT(!cold).
Softints are forbidden to run while cold. So let's make sure nobody
even tries it -- if they do, they might be delayed indefinitely,
which is going to be much harder to diagnose.
Softints are forbidden to run while cold. So let's make sure nobody
even tries it -- if they do, they might be delayed indefinitely,
which is going to be much harder to diagnose.
MAIN commitmail json YAML
src/share/man/man9/rnd.9@1.32
/
diff
/
nxr@1.32
src/sys/dev/pci/hifn7751.c@1.82 / diff / nxr@1.82
src/sys/dev/pci/ubsec.c@1.64 / diff / nxr@1.64
src/sys/dev/pci/viornd.c@1.22 / diff / nxr@1.22
src/sys/kern/kern_entropy.c@1.63 / diff / nxr@1.63
src/sys/kern/subr_prf.c@1.202 / diff / nxr@1.202
src/sys/sys/rndsource.h@1.10 / diff / nxr@1.10
src/sys/dev/pci/hifn7751.c@1.82 / diff / nxr@1.82
src/sys/dev/pci/ubsec.c@1.64 / diff / nxr@1.64
src/sys/dev/pci/viornd.c@1.22 / diff / nxr@1.22
src/sys/kern/kern_entropy.c@1.63 / diff / nxr@1.63
src/sys/kern/subr_prf.c@1.202 / diff / nxr@1.202
src/sys/sys/rndsource.h@1.10 / diff / nxr@1.10
entropy(9): Simplify stages. Split interrupt vs non-interrupt paths.
- Nix the entropy stage (cold, warm, hot). Just use the usual kernel
`cold' (cold: single-core, single-thread; interrupts may happen),
and don't make any three-way distinction about whether interrupts
or threads or other CPUs can be running.
Instead, while cold, use splhigh/splx or forbid paths to come from
interrupt context, and while warm, use mutex or the per-CPU hard
and soft interrupt paths for low latency. This comes at a small
cost to some interrupt latency, since we may stir the pool in
interrupt context -- but only for a very short window early at boot
between configure and configure2, so it's hard to imagine it
matters much.
- Allow rnd_add_uint32 to run in hard interrupt context or with spin
locks held, but defer processing to softint and drop samples on the
floor if buffer is full. This is mainly used for cheaply tossing
samples from drivers for non-HWRNG devices into the entropy pool,
so it is often used from interrupt context and/or under spin locks.
- New rnd_add_data_intr provides the interrupt-like data entry path
for arbitrary buffers and driver-specified entropy estimates: defer
processing to softint and drop samples on the floor if buffer is
full.
- Document that rnd_add_data is forbidden under spin locks outside
interrupt context (will crash in LOCKDEBUG), and inadvisable in
interrupt context (but technically permitted just in case there are
compatibility issues for now); later we can forbid it altogether in
interrupt context or under spin locks.
- Audit all uses of rnd_add_data to use rnd_add_data_intr where it
might be used in interrupt context or under a spin lock.
This fixes a regression from last year when the global entropy lock
was changed from IPL_VM (spin) to IPL_SOFTSERIAL (adaptive). Thought
I'd caught all the problems from that, but another one bit three
different people this week, presumably because of recent changes that
led to more non-HWRNG drivers entering the entropy consolidation
path from rnd_add_uint32.
In my attempt to preserve the rnd(9) API for the (now long-since
abandoned) prospect of pullup to netbsd-9 in my rewrite of the
entropy subsystem in 2020, I didn't introduce a separate entry point
for entering entropy from interrupt context or equivalent, i.e., spin
locks held, and instead made rnd_add_data rely on cpu_intr_p() to
decide whether to process the whole sample under a lock or only take
as much as there's buffer space for before scheduling a softint. In
retrospect, that was a mistake (though perhaps not as much of a
mistake as other entropy API decisions...), a mistake which is
finally getting rectified now by rnd_add_data_intr.
XXX pullup-10
- Nix the entropy stage (cold, warm, hot). Just use the usual kernel
`cold' (cold: single-core, single-thread; interrupts may happen),
and don't make any three-way distinction about whether interrupts
or threads or other CPUs can be running.
Instead, while cold, use splhigh/splx or forbid paths to come from
interrupt context, and while warm, use mutex or the per-CPU hard
and soft interrupt paths for low latency. This comes at a small
cost to some interrupt latency, since we may stir the pool in
interrupt context -- but only for a very short window early at boot
between configure and configure2, so it's hard to imagine it
matters much.
- Allow rnd_add_uint32 to run in hard interrupt context or with spin
locks held, but defer processing to softint and drop samples on the
floor if buffer is full. This is mainly used for cheaply tossing
samples from drivers for non-HWRNG devices into the entropy pool,
so it is often used from interrupt context and/or under spin locks.
- New rnd_add_data_intr provides the interrupt-like data entry path
for arbitrary buffers and driver-specified entropy estimates: defer
processing to softint and drop samples on the floor if buffer is
full.
- Document that rnd_add_data is forbidden under spin locks outside
interrupt context (will crash in LOCKDEBUG), and inadvisable in
interrupt context (but technically permitted just in case there are
compatibility issues for now); later we can forbid it altogether in
interrupt context or under spin locks.
- Audit all uses of rnd_add_data to use rnd_add_data_intr where it
might be used in interrupt context or under a spin lock.
This fixes a regression from last year when the global entropy lock
was changed from IPL_VM (spin) to IPL_SOFTSERIAL (adaptive). Thought
I'd caught all the problems from that, but another one bit three
different people this week, presumably because of recent changes that
led to more non-HWRNG drivers entering the entropy consolidation
path from rnd_add_uint32.
In my attempt to preserve the rnd(9) API for the (now long-since
abandoned) prospect of pullup to netbsd-9 in my rewrite of the
entropy subsystem in 2020, I didn't introduce a separate entry point
for entering entropy from interrupt context or equivalent, i.e., spin
locks held, and instead made rnd_add_data rely on cpu_intr_p() to
decide whether to process the whole sample under a lock or only take
as much as there's buffer space for before scheduling a softint. In
retrospect, that was a mistake (though perhaps not as much of a
mistake as other entropy API decisions...), a mistake which is
finally getting rectified now by rnd_add_data_intr.
XXX pullup-10
MAIN commitmail json YAML
percpu(9): percpu_create ctor may be called later, not synchronously.
MAIN commitmail json YAML
xen: Fix previous commit, forgot to amend it before committing.
MAIN commitmail json YAML
src/sys/arch/x86/include/cpu.h@1.136
/
diff
/
nxr@1.136
src/sys/arch/xen/xen/xen_clock.c@1.16 / diff / nxr@1.16
src/sys/arch/xen/xen/xen_clock.c@1.16 / diff / nxr@1.16
xen: Report when hardclock jump exceeds timecounter(9) limit.
MAIN commitmail json YAML
ihidev(4): Use iic_use_direct_match as intended.
This appears to have been a mistake; there's no obvious explanation
in the commit history for why this is different from all other
iic_use_direct_match users.
Patch from Vladimir 'phcoder' Serbinenko <phcoder@gmail.com>, thanks!
(If it really is intended to ues I2C_MATCH_DIRECT_COMPATIBLE here, we
need a clear explanation of why, written down in a nearby comment.)
This appears to have been a mistake; there's no obvious explanation
in the commit history for why this is different from all other
iic_use_direct_match users.
Patch from Vladimir 'phcoder' Serbinenko <phcoder@gmail.com>, thanks!
(If it really is intended to ues I2C_MATCH_DIRECT_COMPATIBLE here, we
need a clear explanation of why, written down in a nearby comment.)
MAIN commitmail json YAML
timecounter(9): Nix trailing whitespace.
No functional change intended.
No functional change intended.
MAIN commitmail json YAML
wsmouse(4): Make wsmouse_input safe to call from MP-safe interrupts.
XXX pullup-10
XXX pullup-10
MAIN commitmail json YAML
src/distrib/sets/lists/debug/mi@1.409
/
diff
/
nxr@1.409
src/distrib/sets/lists/tests/mi@1.1280 / diff / nxr@1.1280
src/tests/libexec/ld.elf_so/Makefile@1.21 / diff / nxr@1.21
src/tests/libexec/ld.elf_so/t_hash.c@1.1 / diff / nxr@1.1
src/distrib/sets/lists/tests/mi@1.1280 / diff / nxr@1.1280
src/tests/libexec/ld.elf_so/Makefile@1.21 / diff / nxr@1.21
src/tests/libexec/ld.elf_so/t_hash.c@1.1 / diff / nxr@1.1
ld.elf_so: Add some known-answer tests for hash functions.
Make sure the testing mechanism detects the traditional overflow bug.
Make sure the testing mechanism detects the traditional overflow bug.
MAIN commitmail json YAML
src/libexec/ld.elf_so/Makefile@1.147
/
diff
/
nxr@1.147
src/libexec/ld.elf_so/hash.c@1.1 / diff / nxr@1.1
src/libexec/ld.elf_so/hash.h@1.1 / diff / nxr@1.1
src/libexec/ld.elf_so/reloc.c@1.118 / diff / nxr@1.118
src/libexec/ld.elf_so/rtld.c@1.215 / diff / nxr@1.215
src/libexec/ld.elf_so/rtld.h@1.147 / diff / nxr@1.147
src/libexec/ld.elf_so/symbol.c@1.76 / diff / nxr@1.76
src/libexec/ld.elf_so/hash.c@1.1 / diff / nxr@1.1
src/libexec/ld.elf_so/hash.h@1.1 / diff / nxr@1.1
src/libexec/ld.elf_so/reloc.c@1.118 / diff / nxr@1.118
src/libexec/ld.elf_so/rtld.c@1.215 / diff / nxr@1.215
src/libexec/ld.elf_so/rtld.h@1.147 / diff / nxr@1.147
src/libexec/ld.elf_so/symbol.c@1.76 / diff / nxr@1.76
ld.elf_so: Split hash functions into a separate file.
This way we can test them in isolation.
No functional change intended.
This way we can test them in isolation.
No functional change intended.
MAIN commitmail json YAML
ld.elf_so: Sort SRCS.
No functional change intended.
No functional change intended.
MAIN commitmail json YAML
ld.elf_so: Split SRCS onto multiple lines.
Makes updates easier.
No functional change intended.
Makes updates easier.
No functional change intended.
MAIN commitmail json YAML
drm/linux_ww_mutex: Fix ww acquire context ordering.
XXX pullup-8
XXX pullup-9
XXX pullup-10
XXX pullup-8
XXX pullup-9
XXX pullup-10
MAIN commitmail json YAML
drm/linux_ww_mutex: Fix wait loops.
If cv_wait_sig returns because a signal is delivered, we may
nonetheless have been granted the lock. It is harmless for us to
ignore this fact in three of the four paths, but in
ww_mutex_state_wait_sig, we may now have ownership of the lock and
MUST NOT return failure because the caller MUST release the lock
before destroying the ww_acquire_ctx.
While here, restructure the other three loops for clarity, so they
match the structure of the fourth and so they have a little less
impenetrable negation.
PR kern/57537
XXX pullup-8
XXX pullup-9
XXX pullup-10
If cv_wait_sig returns because a signal is delivered, we may
nonetheless have been granted the lock. It is harmless for us to
ignore this fact in three of the four paths, but in
ww_mutex_state_wait_sig, we may now have ownership of the lock and
MUST NOT return failure because the caller MUST release the lock
before destroying the ww_acquire_ctx.
While here, restructure the other three loops for clarity, so they
match the structure of the fourth and so they have a little less
impenetrable negation.
PR kern/57537
XXX pullup-8
XXX pullup-9
XXX pullup-10
MAIN commitmail json YAML
sys/memfd.h: Fix include guards after rename.
MAIN commitmail json YAML
sys/memfd.h: Tidy.
- Sort includes.
- #include <sys/types.h> for size_t.
- Sort includes.
- #include <sys/types.h> for size_t.
MAIN commitmail json YAML
src/sys/kern/sys_memfd.c@1.4
/
diff
/
nxr@1.4
src/sys/sys/memfd.h@1.1 / diff / nxr@1.1
src/sys/sys/miscfd.h deleted
src/usr.bin/fstat/misc.c@1.27 / diff / nxr@1.27
src/sys/sys/memfd.h@1.1 / diff / nxr@1.1
src/sys/sys/miscfd.h deleted
src/usr.bin/fstat/misc.c@1.27 / diff / nxr@1.27
sys: Rename sys/miscfd.h -> sys/memfd.h.
Let's not create new dumping grounds for miscellaneous stuff; one
header file for one purpose.
Let's not create new dumping grounds for miscellaneous stuff; one
header file for one purpose.
MAIN commitmail json YAML
memfd(2): Convert KASSERT to CTASSERT.
Move it closer to where it's relevant too.
Move it closer to where it's relevant too.
MAIN commitmail json YAML
xen_clock(4): New hardclock dtrace probes.
sdt:xen:hardclock:tick(last, now)
fires on every hardclock tick
sdt:xen:hardclock:jump(last, now, nticks)
fires on every hardclock tick when (now - last) >= 2*NS_PER_TICK,
i.e., this call to the timer interrupt handler requires multiple
hardclock ticks
sdt:xen:hardclock:tick(last, now)
fires on every hardclock tick
sdt:xen:hardclock:jump(last, now, nticks)
fires on every hardclock tick when (now - last) >= 2*NS_PER_TICK,
i.e., this call to the timer interrupt handler requires multiple
hardclock ticks
MAIN commitmail json YAML
xen_clock(4): Compute NS_PER_TICK only once per call.
This involves a division by an unknown number, so let's cache it.
XXX Could do better by precomputing it in xen_resumeclocks, with some
effort to ensure concurrent calls don't stomp on each other.
This involves a division by an unknown number, so let's cache it.
XXX Could do better by precomputing it in xen_resumeclocks, with some
effort to ensure concurrent calls don't stomp on each other.
MAIN commitmail json YAML
xen_clock(4): Fix whitespace and sprinkle comments.
No functional change intended.
No functional change intended.
MAIN commitmail json YAML
timecounter(9): Link to phk's timecounter paper for reference.
No functional change intended.
No functional change intended.
MAIN commitmail json YAML
kern: Restore non-atomic time_second symbol.
This is used by savecore(8), vmstat(8), and possibly other things.
XXX Should really teach dump and savecore(8) to use an intentionally
designed header, rather than relying on kvm(3) -- and make it work
for saving cores from other kernels so you don't have to boot the
same buggy kernel to get a core dump.
This is used by savecore(8), vmstat(8), and possibly other things.
XXX Should really teach dump and savecore(8) to use an intentionally
designed header, rather than relying on kvm(3) -- and make it work
for saving cores from other kernels so you don't have to boot the
same buggy kernel to get a core dump.
MAIN commitmail json YAML
x86/pmap: Print quantities in failed assertions in pmap_load.
MAIN commitmail json YAML
x86/errata.c: Only say the errata revision search for cpu0.
MAIN commitmail json YAML
x86/errata.c: Say what revision we're searching for.
MAIN commitmail json YAML
x86/errata.c: Link to original AMD errata guide.
This one is no longer updated; need to link to newer ones for
individual families too. That's where all the cryptic nomenclature
comes from here.
This one is no longer updated; need to link to newer ones for
individual families too. That's where all the cryptic nomenclature
comes from here.
MAIN commitmail json YAML
i386/XEN3PAE_DOMU: Pass -g to build debug data like GENERIC.
Needed for CTF data by dtrace when MKDEBUG=no MKDEBUGKERNEL=no.
XXX pullup-10
Needed for CTF data by dtrace when MKDEBUG=no MKDEBUGKERNEL=no.
XXX pullup-10
MAIN commitmail json YAML
i386/XEN3PAE_DOM0: Pass -g to build debug data like GENERIC.
Needed for CTF data by dtrace when MKDEBUG=no MKDEBUGKERNEL=no.
XXX pullup-10
Needed for CTF data by dtrace when MKDEBUG=no MKDEBUGKERNEL=no.
XXX pullup-10
MAIN commitmail json YAML
amd64/XEN3_DOMU: Pass -g to build debug data like GENERIC.
Needed for CTF data by dtrace when MKDEBUG=no MKDEBUGKERNEL=no.
XXX pullup-10
Needed for CTF data by dtrace when MKDEBUG=no MKDEBUGKERNEL=no.
XXX pullup-10
MAIN commitmail json YAML
bsd.own.mk: Use MACHINE_ARCH for default MKCTF/MKDTRACE=yes x86.
The substantive impact of this is that it enables MKCTF=yes for Xen
kernels. This is a change because, when building a Xen kernel
(XEN3_DOM0, XEN3_DOMU), MACHINE is set to `xen', not to `i386' or
`amd64', so the conditional never took effect.
(The side effect of setting MKDTRACE=yes when building Xen kernels is
unlikely to matter; that affects module and userland builds.)
PR port-xen/57535
XXX pullup-10
The substantive impact of this is that it enables MKCTF=yes for Xen
kernels. This is a change because, when building a Xen kernel
(XEN3_DOM0, XEN3_DOMU), MACHINE is set to `xen', not to `i386' or
`amd64', so the conditional never took effect.
(The side effect of setting MKDTRACE=yes when building Xen kernels is
unlikely to matter; that affects module and userland builds.)
PR port-xen/57535
XXX pullup-10
MAIN commitmail json YAML
rbtree(3): No (rb_tree_t) for constant initializer.
This is a compound literal, which is not formally valid as a constant
initializer.
XXX pullup-10
This is a compound literal, which is not formally valid as a constant
initializer.
XXX pullup-10
MAIN commitmail json YAML
i386/XEN3PAE_DOMU: Enable KDTRACE_HOOKS.
XXX pullup-10
XXX pullup-10
MAIN commitmail json YAML
i386/XEN3PAE_DOM0: Enable KDTRACE_HOOKS.
XXX pullup-10
XXX pullup-10
MAIN commitmail json YAML
amd64/XEN3_DOMU: Enable KDTRACE_HOOKS.
XXX pullup-10
XXX pullup-10
MAIN commitmail json YAML
src/sys/external/bsd/drm2/dist/drm/amd/display/dc/calcs/amdgpu_dcn_calcs.c@1.4
/
diff
/
nxr@1.4
src/sys/external/bsd/drm2/dist/drm/amd/display/dc/dcn20/amdgpu_dcn20_resource.c@1.5 / diff / nxr@1.5
src/sys/external/bsd/drm2/dist/drm/amd/display/dc/dcn20/amdgpu_dcn20_resource.c@1.5 / diff / nxr@1.5
amdgpu: Mark float-dependent variables volatile.
This way they are computed -- using FP instructions -- before
DC_FP_END, after which point FP instructions will trap or behave
unpredictably.
This is a workaround, not a proper solution -- really, the
DC_FP_START/END calls should happen in a separate compilation unit
built without -mhard-float or whatever, but that's a lot more work to
make happen for now.
PR kern/57059
XXX pullup-10
This way they are computed -- using FP instructions -- before
DC_FP_END, after which point FP instructions will trap or behave
unpredictably.
This is a workaround, not a proper solution -- really, the
DC_FP_START/END calls should happen in a separate compilation unit
built without -mhard-float or whatever, but that's a lot more work to
make happen for now.
PR kern/57059
XXX pullup-10
MAIN commitmail json YAML
xhci(4): Don't panic on suspend if previous suspend/resume failed.
Trying to resume again probably won't make the situation much worse,
but panicking can definitely make it worse.
XXX pullup-10
Trying to resume again probably won't make the situation much worse,
but panicking can definitely make it worse.
XXX pullup-10
MAIN commitmail json YAML
hdafg(4): Do hotplug detection in kthread, not callout.
This can sometimes take a while (~1ms), and the logic to suspend the
callout on device suspend/resume was racy (PR kern/57322).
XXX pullup-8
XXX pullup-9
XXX pullup-10
This can sometimes take a while (~1ms), and the logic to suspend the
callout on device suspend/resume was racy (PR kern/57322).
XXX pullup-8
XXX pullup-9
XXX pullup-10
MAIN commitmail json YAML
x86/fpu: In kernel mode fpu traps, print the instruction pointer.
MAIN commitmail json YAML
autoconf(9): Print `waiting for devices' normally once a minute.
MAIN commitmail json YAML
rbtree(3): Fix RBDEBUG build with RB_TREE_INITIALIZER.
XXX pullup-10
XXX pullup-10
MAIN commitmail json YAML
src/lib/libc/misc/initfini.c@1.16
/
diff
/
nxr@1.16
src/lib/libc/stdlib/_env.c@1.14 / diff / nxr@1.14
src/lib/libc/stdlib/_env.c@1.14 / diff / nxr@1.14
libc: Use RB_TREE_INITIALIZER to nix initfini.c/_env.c coupling.
Doesn't actually help to remove _env.c from programs that don't use
it, though, because various internal things like __diagassert13 still
call getenv.
Doesn't actually help to remove _env.c from programs that don't use
it, though, because various internal things like __diagassert13 still
call getenv.
MAIN commitmail json YAML
rbtree(3): New RB_TREE_INITIALIZER macro.
Allows static initialization of an rbtree.
XXX pullup-10
Allows static initialization of an rbtree.
XXX pullup-10
MAIN commitmail json YAML
acpiec(4): One more debug message about read/write polling timeout.
MAIN commitmail json YAML
acpiec(4): Take a lock around acpiec_cold updates.
Otherwise we race with readers -- probably harmlessly, but let's
avoid the appearance of problems.
XXX Maybe acpiec_suspend and acpiec_shutdown should interrupt
transactions and force them to fail promptly?
XXX This looks bad because acpiec_cold is global and sc->sc_mtx
doesn't look like it's global, but we expect to have only one
acpiec(4) device anyway from what I understand. Maybe we should move
acpiec_cold into the softc?
Otherwise we race with readers -- probably harmlessly, but let's
avoid the appearance of problems.
XXX Maybe acpiec_suspend and acpiec_shutdown should interrupt
transactions and force them to fail promptly?
XXX This looks bad because acpiec_cold is global and sc->sc_mtx
doesn't look like it's global, but we expect to have only one
acpiec(4) device anyway from what I understand. Maybe we should move
acpiec_cold into the softc?