Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (3h)  netbsd-8 (5d)  netbsd-10 (5d)  netbsd-9 (11d)  thorpej-ifq (175d)  thorpej-altq-separation (178d) 

2024-05-10 06:57:51 UTC Now

2017-10-25 17:44:50 UTC MAIN commitmail json YAML

Add pipe2 to the NAME section

(abhinav)

2017-10-25 17:42:05 UTC MAIN commitmail json YAML

Add sigqueueinfo to the NAME section

(abhinav)

2017-10-25 17:39:47 UTC MAIN commitmail json YAML

Add FD_SET, FD_CLR, FD_ISSET and FD_ZERO to the NAME section

(abhinav)

2017-10-25 17:30:03 UTC MAIN commitmail json YAML

Add fktrace to the NAME section

(abhinav)

2017-10-25 17:27:07 UTC MAIN commitmail json YAML

Add myself at the right place :-P

(utkarsh009)

2017-10-25 17:25:52 UTC MAIN commitmail json YAML

Add fhstatvfs1 to the NAME section

(abhinav)

2017-10-25 17:20:52 UTC MAIN commitmail json YAML

Add fchroot to the NAME section

(abhinav)

2017-10-25 17:09:47 UTC MAIN commitmail json YAML

Add malloc.conf to the NAME section
Remove Pp before Bd at few places

(abhinav)

2017-10-25 17:03:31 UTC MAIN commitmail json YAML

Remove comma after last Nm entry

(abhinav)

2017-10-25 16:59:12 UTC MAIN commitmail json YAML

Added my name to the NetBSD developers list.

(utkarsh009)

2017-10-25 16:49:25 UTC MAIN commitmail json YAML

Add __svc_getcallercreds to the NAME section
Remove Pp before It at various places

(abhinav)

2017-10-25 16:29:21 UTC MAIN commitmail json YAML

Add freeifaddrs to the NAME section

(abhinav)

2017-10-25 16:26:42 UTC MAIN commitmail json YAML

Remove comma after last Nm entry

(abhinav)

2017-10-25 16:13:04 UTC MAIN commitmail json YAML

Remove comma after last Nm entry.
New sentence, new line

(abhinav)

2017-10-25 16:09:46 UTC MAIN commitmail json YAML

Improve delay to be better than 1.3 innaccurate by default and handle the
unlikely wrap

(skrll)

2017-10-25 16:08:09 UTC MAIN commitmail json YAML

2017-10-25 16:07:34 UTC MAIN commitmail json YAML

Add towupper to the NAME section as well.

(abhinav)

2017-10-25 16:04:00 UTC MAIN commitmail json YAML

Add sha_224, sha_384 and sha_512 family of functions to the NAME section as well.
Also use .An for authors in the AUTHORS section

(abhinav)

2017-10-25 09:13:41 UTC MAIN commitmail json YAML

unbound reloads config on SIGHUP, so add the reload command

(roy)

2017-10-25 08:50:05 UTC MAIN commitmail json YAML

Use %zu for size_t

(martin)

2017-10-25 08:21:41 UTC MAIN commitmail json YAML

2017-10-25 08:12:40 UTC MAIN commitmail json YAML

2017-10-25 07:41:35 UTC MAIN commitmail json YAML

2017-10-25 07:35:40 UTC MAIN commitmail json YAML

Mention ec_multi*

(ozaki-r)

2017-10-25 07:19:29 UTC netbsd-8 commitmail json YAML

310, 311, 317, 322, 323, 325, 327-329

(snj)

2017-10-25 07:14:10 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #329):
sys/net/bpf.c: revision 1.217
Turn on D_MPSAFE flag of bpf_cdevsw that is already MP-safe
Pointed out by k-goda@IIJ

(snj)

2017-10-25 07:12:33 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #328):
sys/net/if_vlan.c: revision 1.103
Set IFEF_START_MPSAFE by default
Because vlan_start is already MP-safe, there is no reason to not do so.
Acked by s-yamaguchi@IIJ

(snj)

2017-10-25 07:08:46 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by flxd in ticket #327):
share/man/man4/slhci.4: 1.11-1.12
Add TC-USB.
--
remove Tn, bump date for previous

(snj)

2017-10-25 07:05:55 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by maya in ticket #325):
sys/arch/x86/x86/vmt.c: revision 1.18
Check that the host supports GET_SPEED as well as GET_VERSION
before deciding vmt_probe has succeeded.
qemu supports GET_VERSION but not the RPC protocol so the probe succeeds
but the attach fails, resulting in "vmt0: failed to open backdoor RPC
channel (TCLO protocol)".  All known versions of vmware support GET_SPEED
and no known qemu versions do, so this prevents it from attempting to
attach (and failing) on qemu while still working on vmware.
stop checking vmt_type to avoid having to adapt this code.
- Taken from openbsd

(snj)

2017-10-25 07:03:10 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by kre in ticket #323):
bin/sh/sh.1: revision 1.168
Fix typo: s/one or mode/one or more/

(snj)

2017-10-25 07:01:19 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by pgoyette in ticket #322):
sys/dist/pf/net/pf_ioctl.c: revision 1.52
Defer initialization of pf_status.host_id
The call to cprng_fast32() requires that per-cpu data has been initialized
by corng_fast_init(), which doesn't get called until after the first part
of auto-configuration is done, long after pfattach() calls cprng_fast32().
Fixed PR kern/52620

(snj)

2017-10-25 06:56:41 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by jdolecek in ticket #317):
lib/libc/net/getaddrinfo.c: revision 1.116
lib/libc/resolv/res_mkquery.c: revision 1.16
PR/52578: Benjamin M. Schwartz Set the AD bit when DNSSEC is enabled
(RFC 6840 Section 5.7).
--
PR/52578: Benjamin M. Schwartz: sync the internal copy of res_nquery for
getaddrinfo, with the real version so that we handle EDNS fallback.

(snj)

2017-10-25 06:54:27 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by sevan in ticket #311):
share/man/man4/u3g.4: revision 1.9
u3ginit was split out and became umodeswitch.
Update the kernel configuration declaration.

(snj)

2017-10-25 06:51:36 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by kre in ticket #310):
bin/sh/expand.c: revision 1.121
bin/sh/sh.1: revision 1.167 via patch
Three fixes and a change to ~ expansions
1. A serious bug introduced 3 1/2 months ago (approx) (rev 1.116) which
  broke all but the simple cases of ~ expansions is fixed (amazingly,
  given the magnitude of this problem, no-one noticed!)
2. An ancient bug (probably from when ~ expansion was first addedin 1994, and
  certainly is in NetBSD-6 vintage shells) where ${UnSeT:-~} (and similar)
  does not expand the ~ is fixed (note that ${UnSeT:-~/} does expand,
  this should give a clue to the cause of the problem.
3. A fix/change to make the effects of ~ expansions on ${UnSeT:=whatever}
  identical to those in UnSeT=whatever  In particular, with HOME=/foo
  ${UnSeT:=~:~} now assigns, and expands to, /foo:/foo rather than ~:~
  just as VAR=~:~ assigns /foo:/foo to VAR.  Note this is even after the
  previous fix (ie: appending a '/' would not change the results here.)
  It is hard to call this one a bug fix for certain (though I believe it is)
  as many other shells also produce different results for the ${V:=...}
  expansions than  they do for V=... (though not all the same as we did).
  POSIX is not clear about this, expanding ~ after : in VAR=whatever
  assignments is clear, whether ${U:=whatever} assignments should be
  treated the same way is not stated, one way or the other.
4. Change to make ':' terminate the user name in a ~ expansion in all cases,
  not only in assignments.  This makes sense, as ':' is one character that
  cannot occur in user names, no matter how otherwise weird they become.
  bash (incl in posix mode) ksh93 and bosh all act this way, whereas most
  other shells (and POSIX) do not.  Because this is clearly an extension
  to POSIX, do this one only when not in posix mode (not set -o posix).

(snj)

2017-10-25 06:32:59 UTC MAIN commitmail json YAML

Implement tcgetwinsize() and tcsetwinsize() in libc, with access
via <termios.h> (and document them.)  Bump libc minor number for them.

Arrange for "struct winsize" to become visible in <termios.h>

Fix stty(1) so that "cols" is reported as the arg to set number of columns,
and "columns" is the alias, rather than the other way around, as "cols" is
what has been added to POSIX.

This is to conform with updates to be included in 1003.1 issue 8
(whenever that gets published) currently available at:
  http://austingroupbugs.net/view.php?id=1053  (see note 3863)
  http://austingroupbugs.net/view.php?id=1151  (see note 3856)

(kre)

2017-10-25 06:02:40 UTC MAIN commitmail json YAML

Document lock order and locking rules.

(riastradh)

2017-10-25 05:42:56 UTC MAIN commitmail json YAML

Add options to the builtin jobid command to allow discovering the
process group (-g), the process leader pid (-p) ($! if the job was &'d)
and the job identifier (-j) (the %n that refers to the job) in addition to
(default) the list of all pids in the job (which it has always done).
No change to the (single) "job" arg, which is a specifier of the job:
the process leader pid, or one of the % forms, and defaults to %% (aka %+).
(This is all now documented in sh(1))

Also document the jobs command properly (no change to the command, just
document what it actually is.)

And while here, a whole new section in sh(1) "Job Control".  It probably
needs better wording, but this is (perhaps) better than the nothing that
was there before.

(kre)

2017-10-25 04:45:41 UTC MAIN commitmail json YAML

- For X550 and newer, print NVM Image Version with %u.%02x (e.g. "0.05").
- Fix value check of OEM_NVM_IMAGE_VER.

(msaitoh)

2017-10-25 04:33:15 UTC MAIN commitmail json YAML

Remove unnecessary splsoftnet

(ozaki-r)

2017-10-25 04:17:34 UTC MAIN commitmail json YAML

Don't free sc_rthash twice

(ozaki-r)

2017-10-24 22:38:32 UTC MAIN commitmail json YAML

Switch BEAGLEBOARD config over to using GENERIC.common.
Remove duplicates already defined in GENERIC.common.

(sevan)

2017-10-24 22:27:43 UTC tls-maxphys commitmail json YAML

remove rebase merge artifacts

(jdolecek)

2017-10-24 22:25:51 UTC MAIN commitmail json YAML

Switch BEAGLEBOARDXM config over to using GENERIC.common.
Remove duplicates already defined in GENERIC.common.

(sevan)

2017-10-24 20:24:12 UTC MAIN commitmail json YAML

2017-10-24 19:14:55 UTC MAIN commitmail json YAML

Add missing functions from the SYNOPSIS to the NAME section

(abhinav)

2017-10-24 19:07:13 UTC MAIN commitmail json YAML

Use commas at the right places in the NAME section

(abhinav)

2017-10-24 19:04:58 UTC MAIN commitmail json YAML

Add missing functions from the SYNOPSIS to the NAME section

(abhinav)

2017-10-24 18:54:03 UTC MAIN commitmail json YAML

Remove trailing comma after last Nm entry in the NAME section

(abhinav)

2017-10-24 18:50:46 UTC MAIN commitmail json YAML

Add getpass_r and getpassfd to the NAME section as well.

(abhinav)

2017-10-24 18:42:06 UTC MAIN commitmail json YAML

Fix typo: s/cexpandtc/csetexpandtc

The synopsis and description mention only csetexpandtc function.
nxr also only shows csetexpandtc while no matches for cexpandtc.

(abhinav)

2017-10-24 18:19:17 UTC MAIN commitmail json YAML

Add membar_datadep_consumer to the NAME section
Remove Pp before Bl

(abhinav)

2017-10-24 17:39:30 UTC MAIN commitmail json YAML

2017-10-24 17:38:17 UTC MAIN commitmail json YAML

Welcome to 2017c:

    zic and the reference runtime now reject multiple leap seconds
    within 28 days of each other, or leap seconds before the Epoch.
    As a result, support for double leap seconds, which was
    obsolescent and undocumented, has been removed.  Double leap
    seconds were an error in the C89 standard; they have never existed
    in civil timekeeping.  (Thanks to Robert Elz and Bradley White for
    noticing glitches in the code that uncovered this problem.)

    zic now warns about use of the obsolescent and undocumented -y
    option, and about use of the obsolescent TYPE field of Rule lines.

    zic now allows unambiguous abbreviations like "Sa" and "Su" for
    weekdays; formerly it rejected them due to a bug.  Conversely, zic
    no longer considers non-prefixes to be abbreviations; for example,
    it no longer accepts "lF" as an abbreviation for "lastFriday".
    Also, zic warns about the undocumented usage with a "last-"
    prefix, e.g., "last-Fri".

    Similarly, zic now accepts the unambiguous abbreviation "L" for
    "Link" in ordinary context and for "Leap" in leap-second context.
    Conversely, zic no longer accepts non-prefixes such as "La" as
    abbreviations for words like "Leap".

    zic no longer accepts leap second lines in ordinary input, or
    ordinary lines in leap second input.  Formerly, zic sometimes
    warned about this undocumented usage and handled it incorrectly.

    The new macro HAVE_TZNAME governs whether the tzname external
    variable is exported, instead of USG_COMPAT.  USG_COMPAT now
    governs only the external variables "timezone" and "daylight".
    This change is needed because the three variables are not in the
    same category: although POSIX requires tzname, it specifies the
    other two variables as optional.  Also, USG_COMPAT is now 1 or 0:
    if not defined, the code attempts to guess it from other macros.

    localtime.c and difftime.c no longer require stdio.h, and .c files
    other than zic.c no longer require sys/wait.h.

    zdump.c no longer assumes snprintf.  (Reported by Jonathan Leffler.)

    Calculation of time_t extrema works around a bug in GCC 4.8.4
    (Reported by Stan Shebs and Joseph Myers.)

    zic.c no longer mistranslates formats of line numbers in non-English
    locales.  (Problem reported by Benno Schulenberg.)

    Several minor changes have been made to the code to make it a
    bit easier to port to MS-Windows and Solaris.  (Thanks to Kees
    Dekker for reporting the problems.)

  Changes to documentation and commentary

    The two new files 'theory.html' and 'calendars' contain the
    contents of the removed file 'Theory'.  The goal is to document
    tzdb theory more accessibly.

    The zic man page now documents abbreviation rules.

    tz-link.htm now covers how to apply tzdata changes to clients.
    (Thanks to Jorge F叩bregas for the AIX link.)  It also mentions MySQL.

    The leap-seconds.list URL has been updated to something that is
    more reliable for tzdb.  (Thanks to Tim Parenti and Brian Inglis.)

(christos)

2017-10-24 17:01:15 UTC MAIN commitmail json YAML

Remove cdbr_write from NAME section, it's a left over
Also add comma after the first Nm entry

ok joerg@

(abhinav)

2017-10-24 15:43:45 UTC MAIN commitmail json YAML

deal with firmware that does not set the 'vram' property on the tcx's node

(macallan)

2017-10-24 15:07:09 UTC MAIN commitmail json YAML

Adjust irq mask/unmask along with enable/disable to make qemu happy

(jmcneill)

2017-10-24 15:06:23 UTC MAIN commitmail json YAML

sun4i: use Timer 1 instead of Timer 0 for delay, and explicitly enable it

(jmcneill)

2017-10-24 09:25:26 UTC netbsd-7 commitmail json YAML

Fix fallout from ticket #1511:
It's rnd_detach_source, not rnd_detach_sources.

(snj)

2017-10-24 09:24:53 UTC netbsd-7-1 commitmail json YAML

Fix fallout from ticket #1511:
It's rnd_detach_source, not rnd_detach_sources.

(snj)

2017-10-24 09:24:32 UTC netbsd-7-0 commitmail json YAML

Fix fallout from ticket #1511:
It's rnd_detach_source, not rnd_detach_sources.

(snj)

2017-10-24 09:21:36 UTC netbsd-8 commitmail json YAML

302-305, 307, 308, 315, 326

(snj)

2017-10-24 09:14:59 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by bouyer in ticket #326):
sys/arch/arm/vfp/vfp_init.c: revision 1.54-1.55
sys/kern/subr_pcu.c: revision 1.21
PR port-arm/52603:
There is a race here, as seen on arm with FPU:
LWP L is running but not on CPU, has its FPU state on CPU2 which
has not been released yet, so fpexc still has VFP_FPEXC_EN set in the PCB copy.
LWP L is scheduled on CPU1, CPU1 calls cpu_switchto() for L in mi_switch().
cpu_switchto() will set VFP_FPEXC_EN in the FPU's fpexc register per the
PCB fpexc copy.
Before CPU1 calls pcu_switchpoint() for L, CPU2 calls
pcu_do_op(PCU_CMD_SAVE | PCU_CMD_RELEASE) for L because it still holds its
FPU state and wants to load another lwp. This cause VFP_FPEXC_EN to
be cleared in the PCB copy, but not in CPU1's register. L's l_pcu_cpu is
set to NULL.
When CPU1 calls pcu_switchpoint() for L it see l_pcu_cpu is NULL, and doesn't
call the release callback.
Now CPU1 has its FPU enabled but with the wrong FPU state.
Fix by releasing the PCU even if l_pcu_cpu is NULL.
--
In the REENABLE case, make sur the fpexc copy in the pcb also has
VFP_FPEXC_EN set. Otherwise we could trap on every context switch even if
the CPU already has the VFP state.
--
We KASSERT((fregs->vfp_fpexc & VFP_FPEXC_EN) == 0) just before, so
enabled is always false. remove.

(snj)

2017-10-24 09:12:07 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by skrll in ticket #315):
sys/arch/arm/arm32/vm_machdep.c: 1.71-1.72
In vmapbuf use pmap_enter(pmap_kernel(), ...) and not pmap_kenter_pa as the
former handles multiple mappings for VIPT AND VIVT correctly whereas the latter
doesn't work for VIVT. PR port-shark/52102
From skrll@. Tested by martin@ and me.
--
Fix eva argument to pmap_remove and passed prot bits in flags for
pmap_enter, i.e. fix previous.

(snj)

2017-10-24 09:11:51 UTC MAIN commitmail json YAML

Added link up status check for valid pci device confirm.

(hkenken)

2017-10-24 09:08:40 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by sborrill in ticket #308):
sbin/resize_ffs/resize_ffs.8: revision 1.18
sbin/resize_ffs/resize_ffs.c: revision 1.48-1.53
Fix the most obvious integer overflow errors which can lead to superblock
corruption. Thanks to riastradh@
--
Use int64_t for loop index so we don't iterate forever/until trap.
--
Fix the syntax (pointed out by David H. Gutteridge on source-changes-d).
Fix the build...
--
- More fixes to use 64bit offsets.
- Compute left-over fragments also for FFS2.
--
PR/52590: David H. Gutteridge: Minor documentation improvements
--
Fix computation of left-over fragments also for ufs2.
Fixes PR 52600.

(snj)

2017-10-24 09:00:23 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #307):
sys/netinet6/nd6.c: revision 1.236
Add missing NULL check
PR kern/52554

(snj)

2017-10-24 08:55:56 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #305):
distrib/sets/lists/tests/mi: revision 1.762
sys/net/route.c: revision 1.198-1.201
sys/net/route.h: revision 1.114
sys/netatalk/at_proto.c: revision 1.22
sys/netinet/in_proto.c: revision 1.124
sys/netinet6/in6_proto.c: revision 1.118
sys/netmpls/mpls_proto.c: revision 1.31
sys/netnatm/natm_proto.c: revision 1.18
sys/rump/net/lib/libsockin/sockin.c: revision 1.65
sys/sys/domain.h: revision 1.33
tests/net/route/Makefile: revision 1.6
tests/net/route/t_rtcache.sh: revision 1.1
Add tests of rtcache invalidation
Remove unnecessary NULL check of rt_ifp
It's always non-NULL.
Invalidate rtcache based on a global generation counter
The change introduces a global generation counter that is incremented when any
routes have been added or deleted. When a rtcache caches a rtentry into itself,
it also stores a snapshot of the generation counter. If the snapshot equals to
the global counter, the cache is still valid, otherwise invalidated.
One drawback of the change is that all rtcaches of all protocol families are
invalidated when any routes of any protocol families are added or deleted.
If that matters, we should have separate generation counters based on
protocol families.
This change removes LIST_ENTRY from struct route, which fixes a part of
PR kern/52515.
Remove the global lock for rtcache
Thanks to removal of LIST_ENTRY of struct route, rtcaches are accessed only by
their users. And in existing usages a rtcache is guranteed to be not accessed
simultaneously. So the rtcache framework doesn't need any exclusion controls
in itself.
Synchronize on rtcache_generation with rtlock
It's racy if NET_MPSAFE is enabled.
Pointed out by joerg@

(snj)

2017-10-24 08:50:44 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by knakahara in ticket #304):
sys/net/if_loop.c: revision 1.95
loop_clone_create() must be called after ncpu is counted up for all CPUs.
loop_clone_create() uses ncpu in the following call-path.
    - loop_clone_create()
      - if_attach()
        - if_percpuq_create()
          - softint_establish() // use ncpu
          - percpu_foreach() // use ncpu
However, loopinit() of built-in module is called from
module_init_class(MODULE_CLASS_DRIVER) which is called before ncpu is counted
up in some architectures. So, It is too fast.
On the other hand, it is too late for rump netinet component to call
loop_clone_create() in config_finalize().
As the result, loop_clone_create() shuld be called in loopattach() for built-in
module, and in loopinit() for dynamic module.

(snj)

2017-10-24 08:47:24 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by knahakara in ticket #303):
sys/net/if_gif.c: 1.129-1.130
sys/net/if_gif.h: 1.26-1.27
sys/netinet/in_gif.c: 1.88
sys/netinet6/in6_gif.c: 1.86
add lock for percpu route like l2tp(4).
--
add lock for sclist to exclude ifconfig gifX add/delete and ifconfig gifX tunnel
--
update locking notes.

(snj)

2017-10-24 08:39:00 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by knakahara in ticket #302):
sys/arch/powerpc/booke/dev/pq3etsec.c: 1.30-1.31
sys/arch/x86/pci/if_vmx.c: 1.20
sys/dev/ic/i82557.c: 1.148
sys/dev/ic/rtl8169.c: 1.152
sys/dev/pci/cxgb/cxgb_sge.c: 1.5
sys/dev/pci/if_age.c: 1.51
sys/dev/pci/if_alc.c: 1.25
sys/dev/pci/if_ale.c: 1.23
sys/dev/pci/if_bge.c: 1.311
sys/dev/pci/if_bge.c: 1.312
sys/dev/pci/if_bnx.c: 1.62
sys/dev/pci/if_jme.c: 1.32
sys/dev/pci/if_nfe.c: 1.64
sys/dev/pci/if_sip.c: 1.167
sys/dev/pci/if_stge.c: 1.63-1.64
sys/dev/pci/if_ti.c: 1.102
sys/dev/pci/if_txp.c: 1.48
sys/dev/pci/if_vge.c: 1.61
sys/dev/pci/if_wm.c: 1.538
sys/dev/pci/ixgbe/ix_txrx.c: 1.29 via patch
sys/net/agr/if_agrether_hash.c: 1.4
sys/net/if_ether.h: 1.67-1.68
sys/net/if_ethersubr.c: 1.244
sys/net/if_vlan.c: 1.100
sys/net80211/ieee80211_input.c: 1.89
sys/net80211/ieee80211_output.c: 1.59
sys/sys/mbuf.h: 1.171
VLAN ID uses pkthdr instead of mtag now. Contributed by s-yamaguchi@IIJ.
I just commit by proxy. Reviewed by joerg@n.o and christos@n.o, thanks.
See http://mail-index.netbsd.org/tech-net/2017/09/26/msg006459.html
--
only get vtag when we have vtag like the other drivers.
--
- only get the vtag if we have it like the other drivers
- mask the hardware vlan tag
--
- add a constant for the vlan mask.
- enforce that we have a tag before we get it.
only get vtag when we have vtag like the other drivers.
like if_bge.c:1.312 and if_stge.c:1.64.
fixed by s-yamaguchi@IIJ, thanks.

(snj)

2017-10-24 08:32:42 UTC MAIN commitmail json YAML

Print Error Source Identification register correctly.

(msaitoh)

2017-10-24 08:02:07 UTC MAIN commitmail json YAML

Print "ECC" or "no ECC" for DDR4.

(msaitoh)

2017-10-24 02:22:09 UTC MAIN commitmail json YAML

Marked zoneinfo/Canada/East-Saskatchewan as obsolete (zone removed from
tzdata 201c) - name does not meet guidelines, and was never needed.

(kre)

2017-10-24 01:30:22 UTC MAIN commitmail json YAML

2017-10-24 01:28:18 UTC MAIN commitmail json YAML

2017-10-23 23:29:38 UTC MAIN commitmail json YAML

fix wm(4) vlan panic. Reported and tested by Tom Ivar Helbekkmo, thanks.

wm(4) used PRI bits and CFI bit as vlantag by mistake. It is found out
by if_ether.h:r1.67.

XXX need pullup-8

(knakahara)

2017-10-23 21:03:25 UTC MAIN commitmail json YAML

Enable clocks and de-assert resets

(jmcneill)

2017-10-23 20:00:18 UTC netbsd-7 commitmail json YAML

1506, 1508, 1510, 1511, 1513-1516, 1518

(snj)

2017-10-23 19:46:03 UTC netbsd-7-1 commitmail json YAML

1506, 1508, 1511, 1516, 1518

(snj)

2017-10-23 19:37:18 UTC netbsd-7-0 commitmail json YAML

1506, 1508, 1511, 1516, 1518

(snj)

2017-10-23 19:36:01 UTC MAIN commitmail json YAML

A couple small adjustments to make big endian (BE8) SUNXI work.

(jakllsch)

2017-10-23 19:27:45 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by kamil in ticket #1518):
sys/dev/cgd.c: revision 1.113
PR kern/52630: The cgd(4) module requires des and blowfish symbols
This has been exposed with the MODULAR kernel.
kobj_checksyms, 979: [cgd]: linker error: symbol `BF_set_key' not found
kobj_checksyms, 979: [cgd]: linker error: symbol `des_key_sched' not found
kobj_checksyms, 979: [cgd]: linker error: symbol `des_ede3_cbc_encrypt' not found
WARNING: module error: unable to affix module `cgd', error 8
Reviewed by <riastradh>

(snj)

2017-10-23 19:27:43 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by kamil in ticket #1518):
sys/dev/cgd.c: revision 1.113
PR kern/52630: The cgd(4) module requires des and blowfish symbols
This has been exposed with the MODULAR kernel.
kobj_checksyms, 979: [cgd]: linker error: symbol `BF_set_key' not found
kobj_checksyms, 979: [cgd]: linker error: symbol `des_key_sched' not found
kobj_checksyms, 979: [cgd]: linker error: symbol `des_ede3_cbc_encrypt' not found
WARNING: module error: unable to affix module `cgd', error 8
Reviewed by <riastradh>

(snj)

2017-10-23 19:27:41 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by kamil in ticket #1518):
sys/dev/cgd.c: revision 1.113
PR kern/52630: The cgd(4) module requires des and blowfish symbols
This has been exposed with the MODULAR kernel.
kobj_checksyms, 979: [cgd]: linker error: symbol `BF_set_key' not found
kobj_checksyms, 979: [cgd]: linker error: symbol `des_key_sched' not found
kobj_checksyms, 979: [cgd]: linker error: symbol `des_ede3_cbc_encrypt' not found
WARNING: module error: unable to affix module `cgd', error 8
Reviewed by <riastradh>

(snj)

2017-10-23 19:24:37 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by sborrill in ticket #1516):
sbin/resize_ffs/resize_ffs.8: revision 1.18
sbin/resize_ffs/resize_ffs.c: revision 1.48-1.53
Fix the most obvious integer overflow errors which can lead to superblock
corruption. Thanks to riastradh@
--
Use int64_t for loop index so we don't iterate forever/until trap.
--
Fix the syntax (pointed out by David H. Gutteridge on source-changes-d).
Fix the build...
--
- More fixes to use 64bit offsets.
- Compute left-over fragments also for FFS2.
--
PR/52590: David H. Gutteridge: Minor documentation improvements
--
Fix computation of left-over fragments also for ufs2.
Fixes PR 52600.

(snj)

2017-10-23 19:24:35 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by sborrill in ticket #1516):
sbin/resize_ffs/resize_ffs.8: revision 1.18
sbin/resize_ffs/resize_ffs.c: revision 1.48-1.53
Fix the most obvious integer overflow errors which can lead to superblock
corruption. Thanks to riastradh@
--
Use int64_t for loop index so we don't iterate forever/until trap.
--
Fix the syntax (pointed out by David H. Gutteridge on source-changes-d).
Fix the build...
--
- More fixes to use 64bit offsets.
- Compute left-over fragments also for FFS2.
--
PR/52590: David H. Gutteridge: Minor documentation improvements
--
Fix computation of left-over fragments also for ufs2.
Fixes PR 52600.

(snj)

2017-10-23 19:24:33 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by sborrill in ticket #1516):
sbin/resize_ffs/resize_ffs.8: revision 1.18
sbin/resize_ffs/resize_ffs.c: revision 1.48-1.53
Fix the most obvious integer overflow errors which can lead to superblock
corruption. Thanks to riastradh@
--
Use int64_t for loop index so we don't iterate forever/until trap.
--
Fix the syntax (pointed out by David H. Gutteridge on source-changes-d).
Fix the build...
--
- More fixes to use 64bit offsets.
- Compute left-over fragments also for FFS2.
--
PR/52590: David H. Gutteridge: Minor documentation improvements
--
Fix computation of left-over fragments also for ufs2.
Fixes PR 52600.

(snj)

2017-10-23 19:15:09 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by skrll in ticket #1515):
sys/dev/usb/if_athn_usb.c: revision 1.23
PR/52553 Panic on "ifconfig athn0 up"
Don't race for a transfer in athn_usb_init on the free list for beacons.
Instead pre-assign a transfer to beacons in athn_usb_alloc_tx_list

(snj)

2017-10-23 19:10:46 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by mlelstv in ticket #1514):
sys/fs/msdosfs/msdosfs_vfsops.c: revision 1.128
Add more sanity checks for BPB parameters. Handle FAT12 format for media
with sectors >= 32kByte.
Does fix PR 52485.

(snj)

2017-10-23 19:03:40 UTC MAIN commitmail json YAML

remove counter for 'journal I/O bufs biowait' - it's (total - async), so
superfluous; adjust the description of the the other counters a bit to make
them more clear

(jdolecek)

2017-10-23 19:03:34 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by sevan in ticket #1513):
share/man/man8/veriexec.8: 1.5-1.6
The bogus number police
--
Add missing VERIFIED_EXEC_FP_SHA384 option.

(snj)

2017-10-23 18:57:12 UTC netbsd-7 commitmail json YAML

Apply patch (requested by pgoyette in ticket #1511):
Detach the rndsrc before re-attaching it.

(snj)

2017-10-23 18:57:10 UTC netbsd-7-1 commitmail json YAML

Apply patch (requested by pgoyette in ticket #1511):
Detach the rndsrc before re-attaching it.

(snj)

2017-10-23 18:57:08 UTC netbsd-7-0 commitmail json YAML

Apply patch (requested by pgoyette in ticket #1511):
Detach the rndsrc before re-attaching it.

(snj)

2017-10-23 18:52:08 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by ginsbach in ticket #1510):
usr.sbin/syslogd/syslogd.c: revision 1.124
Use looked up remote host for remote message without a hostname
An incoming remote message may not necessarily have a hostname
between the timestamp and the message. The the source of the remote
sender is already looked up so use that hostname/IP address rather
than the local hostname.

(snj)

2017-10-23 18:50:41 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by mlelstv in ticket #1508):
external/bsd/nvi/dist/cl/cl_main.c: revision 1.6
external/bsd/nvi/dist/cl/cl_screen.c: revision 1.6
When resizing nvi in xterm, a scroll region is set with the old size
which garbles the display.
The scroll region is set for a terminfo scroll operation and then
reset to the current window size. While xterm lets you clear a
scroll region, there is no way to do this in terminfo except by
resetting the terminal which has a visual side effect.
Xterm actually clears the scroll region as part of the resize but
that happens before a program gets the SIGWINCH signal. When nvi sees
the SIGWINCH signal, it exits the vi mode using a scroll operation to
tidy up the display before it reenters vi mode with the new window size.
This patch does two things:
- make nvi also invoke a previous SIGWINCH handler (not sufficient,
  but that's how curses wants it).
- skip the tidy up in case of a restart (avoids the scroll region)

(snj)

2017-10-23 18:50:39 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by mlelstv in ticket #1508):
external/bsd/nvi/dist/cl/cl_main.c: revision 1.6
external/bsd/nvi/dist/cl/cl_screen.c: revision 1.6
When resizing nvi in xterm, a scroll region is set with the old size
which garbles the display.
The scroll region is set for a terminfo scroll operation and then
reset to the current window size. While xterm lets you clear a
scroll region, there is no way to do this in terminfo except by
resetting the terminal which has a visual side effect.
Xterm actually clears the scroll region as part of the resize but
that happens before a program gets the SIGWINCH signal. When nvi sees
the SIGWINCH signal, it exits the vi mode using a scroll operation to
tidy up the display before it reenters vi mode with the new window size.
This patch does two things:
- make nvi also invoke a previous SIGWINCH handler (not sufficient,
  but that's how curses wants it).
- skip the tidy up in case of a restart (avoids the scroll region)

(snj)

2017-10-23 18:50:37 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by mlelstv in ticket #1508):
external/bsd/nvi/dist/cl/cl_main.c: revision 1.6
external/bsd/nvi/dist/cl/cl_screen.c: revision 1.6
When resizing nvi in xterm, a scroll region is set with the old size
which garbles the display.
The scroll region is set for a terminfo scroll operation and then
reset to the current window size. While xterm lets you clear a
scroll region, there is no way to do this in terminfo except by
resetting the terminal which has a visual side effect.
Xterm actually clears the scroll region as part of the resize but
that happens before a program gets the SIGWINCH signal. When nvi sees
the SIGWINCH signal, it exits the vi mode using a scroll operation to
tidy up the display before it reenters vi mode with the new window size.
This patch does two things:
- make nvi also invoke a previous SIGWINCH handler (not sufficient,
  but that's how curses wants it).
- skip the tidy up in case of a restart (avoids the scroll region)

(snj)

2017-10-23 18:34:53 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by nakayama in ticket #1506):
usr.sbin/mtree/only.c: revision 1.3
Don't modify strings stored in hash, otherwise filling up of
directory hierarchy stops if the same hash value occurs in
directory and leaf.
Fix the issue that
"./usr/share/locale/pl/LC_MESSAGES/gettext-tools.mo" isn't included
in sets file in the case of MKUNPRIVED=no.

(snj)

2017-10-23 18:34:52 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by nakayama in ticket #1506):
usr.sbin/mtree/only.c: revision 1.3
Don't modify strings stored in hash, otherwise filling up of
directory hierarchy stops if the same hash value occurs in
directory and leaf.
Fix the issue that
"./usr/share/locale/pl/LC_MESSAGES/gettext-tools.mo" isn't included
in sets file in the case of MKUNPRIVED=no.

(snj)

2017-10-23 18:34:51 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by nakayama in ticket #1506):
usr.sbin/mtree/only.c: revision 1.3
Don't modify strings stored in hash, otherwise filling up of
directory hierarchy stops if the same hash value occurs in
directory and leaf.
Fix the issue that
"./usr/share/locale/pl/LC_MESSAGES/gettext-tools.mo" isn't included
in sets file in the case of MKUNPRIVED=no.

(snj)

2017-10-23 15:34:45 UTC MAIN commitmail json YAML

Remove duplicate MLINK entry for dup_field.3
(it's already defined 3 lines above)

(abhinav)

2017-10-23 15:23:56 UTC MAIN commitmail json YAML

Add the function names to the NAME section

(abhinav)

2017-10-23 15:21:11 UTC MAIN commitmail json YAML

Initialize txrate to 0 for new associations; firmware handles rate adaptation for us

(jmcneill)

2017-10-23 15:08:05 UTC MAIN commitmail json YAML

We don't need '&mii', but just 'mii' for mii_detach().

(jakllsch)

2017-10-23 13:47:17 UTC MAIN commitmail json YAML

- Get SDIO reset working (from OpenBSD).
- After switching bus width, notify the host controller of the change.

(jmcneill)

2017-10-23 13:28:19 UTC MAIN commitmail json YAML

Fix swapped BUS_DMASYNC_POST{READ,WRITE} on bounced commands

(jmcneill)

2017-10-23 13:12:23 UTC MAIN commitmail json YAML

2017-10-23 13:11:17 UTC MAIN commitmail json YAML

SDIO IO_RW_EXTENDED (CMD53) commands have datalen set but no dmamap. Setup
and use a bounce buffer to service these requests.

(jmcneill)

2017-10-23 12:55:26 UTC MAIN commitmail json YAML

2017-10-23 11:21:56 UTC MAIN commitmail json YAML

Do the second half of the previous half-bump: now welcome to 8.99.5
for real!

(martin)

2017-10-23 11:06:31 UTC MAIN commitmail json YAML

Change SUNXI_MMC_DEBUG to a bitmask, allowing for isolation of specific
device units. Useful for debugging sdio without seeing debug spam from the
SD card.

(jmcneill)

2017-10-23 10:52:07 UTC MAIN commitmail json YAML

PR bin/52640  PR bin/52641

Don't delete jobs from the jobs table merely because they finished,
if they are not the job we are waiting upon.  (bin/52640 part 1)

In a sub-shell environment, don't allow wait to find jobs from the
parent shell that had already exited (before the sub-shell was
created) and return status for them as if they are our children.
(bin/52640 part 2)

Don't have the "jobs" command also be an implicit "wait" command
in non-interactive shells.  (bin/52641)

Use WCONTINUED (when it exists) so we can report on stopped jobs that
"mysteriously" move back to running state without the user issuing
a "bg" command (eg: kill -CONT <pid>)  Previously they would keep
being reported as stopped until they exited.

When a job is detected as having changed status just as we're
issuing a "jobs" command (i.e.: the change occurred between the last
prompt and the jobs command being entered) don't report it twice,
once from the status change, and then again in the jobs command
output.  Once is enough (keep the jobs output, suppress the other).

Apply some sanity to the way jobs_invalid is processed - ignore it
in getjob() instead of just ignoring it most of the time there, and
instead always check it before calling getjob() in situations where
we can handle only children of the current shell.  This allows the
(totally broken) save/clear/restore of jobs_invalid in jobscmd() to
be done away with (previously an error while in the clear state would
have left jobs_invalid incorrectly cleared - shouldn't have mattered
since jobs_invalid => subshell => error causes exit, but better to be safe).

Add/improve the DEBUG more tracing.

XXX pullup -8

(kre)

2017-10-23 09:35:35 UTC MAIN commitmail json YAML

Change return value of if_initialize() and if_attach() from void to int.

Welcome to 8.99.4

(msaitoh)

2017-10-23 09:32:55 UTC MAIN commitmail json YAML

- If if_attach() failed in the attach function, free resources and return.
- KNF

(msaitoh)

2017-10-23 09:32:33 UTC MAIN commitmail json YAML

- If if_initialize() failed in the attach function, free resources and return.
- KNF

(msaitoh)

2017-10-23 09:32:00 UTC MAIN commitmail json YAML

If if_attach() failed in the attach function, free resources and return.

(msaitoh)

2017-10-23 09:31:18 UTC MAIN commitmail json YAML

2017-10-23 09:28:38 UTC MAIN commitmail json YAML

- If if_initialize() failed in the attach function, free resources and return.
- Fix error path in the attach function correctly.

(msaitoh)

2017-10-23 09:28:13 UTC MAIN commitmail json YAML

- If if_initialize() failed in the attach function, free resources and return.
- ifp is always not NULL in iwi_detach(). Check correctly with ifp->if_softc.

(msaitoh)

2017-10-23 09:27:46 UTC MAIN commitmail json YAML

- If if_initialize() failed in the attach function, free resources and return.
- Add missing dwc_gmac_free_dma_rings() and mutex_destroy() when attach
  failed.

(msaitoh)

2017-10-23 09:27:21 UTC MAIN commitmail json YAML

If if_initialize() failed in the attach function, return.

(msaitoh)

2017-10-23 09:25:31 UTC MAIN commitmail json YAML

- Free resources correctly on some errors in atw_attach().
- Use apint*() insread of printf() in the attach function.

(msaitoh)

2017-10-23 09:25:11 UTC MAIN commitmail json YAML

- If if_initialize() failed in athn_attach(), free resources and return.
- Add missing pmf_event_deregister() in athn_detach().

(msaitoh)

2017-10-23 09:24:34 UTC MAIN commitmail json YAML

If error occured in the attach function, free resources and return.

(msaitoh)

2017-10-23 09:23:48 UTC MAIN commitmail json YAML

If error occured in pq3etsec_attach(), free resources and return.

(msaitoh)

2017-10-23 09:23:25 UTC MAIN commitmail json YAML

If error occured in bcmeth_ccb_attach(), free resources and return.

(msaitoh)

2017-10-23 09:22:51 UTC MAIN commitmail json YAML

- If if_initialize() failed in the attach function, free resources and return.
- Add some missing frees in bridge_clone_destroy().
- KNF

(msaitoh)

2017-10-23 09:22:24 UTC MAIN commitmail json YAML

2017-10-23 09:21:40 UTC MAIN commitmail json YAML

Return if bah_attach_subr() failed.

(msaitoh)

2017-10-23 09:21:20 UTC MAIN commitmail json YAML

if_initalize() and if_attach() failed when resource allocation failed
(e.g. allocating softint). Without this change, it panics. It's bad because
resource shortage really occured when a lot of pseudo interface is created.
To avoid this problem, don't panic and change return value of if_initialize()
and if_attach() to int. Caller fanction will be recover from error cleanly by
checking the return value.

(msaitoh)

2017-10-23 08:08:53 UTC MAIN commitmail json YAML

Add bwfm (and sort other 802.11 usb wifi drivers)

(skrll)

2017-10-23 07:05:23 UTC MAIN commitmail json YAML

splserial is an alias for splhigh now. No need to splhigh twice.

(skrll)

2017-10-23 06:52:17 UTC MAIN commitmail json YAML

Provide better debug messages for ioctl

(ozaki-r)

2017-10-23 06:43:00 UTC MAIN commitmail json YAML

Fix compile error. Use const correctly.

(msaitoh)

2017-10-23 06:00:59 UTC MAIN commitmail json YAML

Add two XXXs, so that people don't get confused, a fifth region is needed
anyway.

(maxv)

2017-10-23 03:54:40 UTC MAIN commitmail json YAML

Clear ifm_cur and ifm_media after removing all ifmedia entries(IFM_INST_ANY)
in ifmedia_delete_instance() like if_media.c rev. 1.32.
Now if_media_delete_instance(IFM_INST_ANY) is the same as ifmedia_removeall().

(msaitoh)

2017-10-23 02:38:46 UTC MAIN commitmail json YAML

remove the braces I accidentally added.

(christos)

2017-10-23 01:07:27 UTC MAIN commitmail json YAML

New sentence, new line.

(wiz)

2017-10-23 01:06:52 UTC MAIN commitmail json YAML

Remove superfluous Tn.

(wiz)

2017-10-23 01:06:05 UTC MAIN commitmail json YAML

Remove superfluous Tn.

(wiz)

2017-10-23 01:05:10 UTC MAIN commitmail json YAML

2017-10-23 01:03:23 UTC MAIN commitmail json YAML

2017-10-23 00:59:44 UTC MAIN commitmail json YAML

2017-10-22 23:15:54 UTC MAIN commitmail json YAML

Bump image size to 24MB, won't fit for plain evbarm otherwise.

(joerg)

2017-10-22 23:01:34 UTC MAIN commitmail json YAML

PR/52638: matthew green: missing argument check causes m4 to core in ifelse()

(christos)

2017-10-22 20:35:32 UTC MAIN commitmail json YAML

2017-10-22 18:37:01 UTC MAIN commitmail json YAML

All the four functions described in the man page conform to POSIX.1

(abhinav)

2017-10-22 18:26:46 UTC MAIN commitmail json YAML

Add missing word in the sentence

(abhinav)

2017-10-22 18:09:33 UTC MAIN commitmail json YAML

Add rtsol to the NAME section as well

(abhinav)

2017-10-22 18:00:45 UTC MAIN commitmail json YAML

Add quotadump to the NAME section

(abhinav)

2017-10-22 17:58:10 UTC MAIN commitmail json YAML

Add irda to the NAME section as well

(abhinav)

2017-10-22 17:53:49 UTC MAIN commitmail json YAML

Add newsyslog.conf to the NAME section
Also fix couple of lint warnings from mandoc

(abhinav)

2017-10-22 17:45:46 UTC MAIN commitmail json YAML

Add pgrep and prenice to the NAME section

(abhinav)

2017-10-22 17:40:53 UTC MAIN commitmail json YAML

Add getcap to the NAME section as well

(abhinav)

2017-10-22 17:36:49 UTC MAIN commitmail json YAML

Add gunzip and zcat to the NAME section as well

(abhinav)

2017-10-22 16:59:18 UTC MAIN commitmail json YAML

Add snprintb_m to the NAME section.

(abhinav)

2017-10-22 16:55:32 UTC MAIN commitmail json YAML

Add missing functions to the NAME section

(abhinav)

2017-10-22 16:49:13 UTC MAIN commitmail json YAML

Add hid_parse_usage_page and hid_parse_usage_in_page to the NAME section

(abhinav)

2017-10-22 16:44:51 UTC MAIN commitmail json YAML

Remove tputs from NAME section since it is described in terminfo(3)

(abhinav)

2017-10-22 16:42:34 UTC MAIN commitmail json YAML

Add missing functions to the NAME section

(abhinav)

2017-10-22 16:37:24 UTC MAIN commitmail json YAML

2017-10-22 16:15:02 UTC MAIN commitmail json YAML

Remove description of pthread_barrierattr_getpshared and pthread_barrierattr_setpshared

These functions are described in pthread_barrierattr(3) man page

(abhinav)

2017-10-22 16:09:22 UTC MAIN commitmail json YAML

Add rest of the pthread_barrier functions in the NAME section

(abhinav)

2017-10-22 15:48:11 UTC MAIN commitmail json YAML

Add pthread_attr_setdetachstate to NAME section

(abhinav)

2017-10-22 15:44:21 UTC MAIN commitmail json YAML

Add pthread_getattr_np to the NAME section

(abhinav)

2017-10-22 15:34:13 UTC MAIN commitmail json YAML

Remove comma after last Nm entry in the NAME section

(abhinav)

2017-10-22 15:28:48 UTC MAIN commitmail json YAML

Add function names to the NAME section

(abhinav)

2017-10-22 14:25:33 UTC MAIN commitmail json YAML

Add rest of the functions from the SYNOPSIS to the NAME section

(abhinav)

2017-10-22 14:13:41 UTC MAIN commitmail json YAML

2017-10-22 14:07:03 UTC MAIN commitmail json YAML

Add rest of the functions from the SYNOPSIS section to the NAME section

(abhinav)

2017-10-22 13:57:47 UTC MAIN commitmail json YAML

2017-10-22 13:57:25 UTC MAIN commitmail json YAML

If an mmc-pwrseq provider is available, use it

(jmcneill)

2017-10-22 13:56:49 UTC MAIN commitmail json YAML

2017-10-22 13:13:55 UTC MAIN commitmail json YAML

do not share queue between the non-indepedant channels; instead make
sure only one of the channels is ever active on the same controller

fixes PR kern/52606 by Martin Husemann, thanks for report and testing

(jdolecek)

2017-10-22 11:17:39 UTC MAIN commitmail json YAML

Add magic_open to the NAME section

(abhinav)

2017-10-22 11:00:28 UTC MAIN commitmail json YAML

AXP209 isn't an SMBus device, so don't use iic_smbus_* APIs.

(jmcneill)

2017-10-22 10:31:57 UTC MAIN commitmail json YAML

2017-10-22 07:52:40 UTC MAIN commitmail json YAML

2017-10-22 06:26:01 UTC MAIN commitmail json YAML

Remove superfluous space character.

From rjc via https://github.com/NetBSD/src/pull/1

(pgoyette)

2017-10-22 03:29:23 UTC MAIN commitmail json YAML

tlb_exception - set ksi_addr to va also when a userland page is not found.
Helps SIGSEGV handlers for PROT_NONE red zones.

(uwe)

2017-10-22 01:57:33 UTC MAIN commitmail json YAML

2017-10-22 01:29:26 UTC MAIN commitmail json YAML

Add sysctl machdep.bootmethod

either "UEFI" or "BIOS" to mimic freebsd

(maya)

2017-10-22 00:59:28 UTC MAIN commitmail json YAML

Move initialization code out of efi_probe into efi_init

and call it from cpu_configure

(maya)

2017-10-22 00:45:32 UTC MAIN commitmail json YAML

2017-10-22 00:20:50 UTC MAIN commitmail json YAML

Add an explanation of how namespace.h works.

(christos)

2017-10-21 23:49:28 UTC MAIN commitmail json YAML

2017-10-21 22:03:01 UTC MAIN commitmail json YAML

Direct reader to use build.sh for building NetBSD in favour of using make directly.
Give an example of why build.sh is better to use.

(sevan)

2017-10-21 21:18:33 UTC MAIN commitmail json YAML

Fix non-macro. Properly end list.

(wiz)

2017-10-21 21:16:07 UTC MAIN commitmail json YAML

SH3 is no longer an exception for MKPIC, in src/share/mk/bsd.own.mk we set MKPIC
to yes by default.
Kill trailing whitespace.

(sevan)

2017-10-21 20:36:12 UTC MAIN commitmail json YAML

Pass WME access classification to bcdc header

(jmcneill)

2017-10-21 19:56:55 UTC netbsd-8 commitmail json YAML

2017-10-21 19:56:06 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #331):
usr.sbin/inetd/inetd.c: revision 1.124
Don't setup SPs if no policy sepecifier is specified
We expect that SPs are set up iff some policy sepecifier(s) are specified.
Found on investigating an issue reported by Robert Swindells

(snj)

2017-10-21 19:43:56 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by ozaki-r in ticket #300):
crypto/dist/ipsec-tools/src/setkey/parse.y: 1.19
crypto/dist/ipsec-tools/src/setkey/token.l: 1.20
distrib/sets/lists/tests/mi: 1.754, 1.757, 1.759
doc/TODO.smpnet: 1.12-1.13
sys/net/pfkeyv2.h: 1.32
sys/net/raw_cb.c: 1.23-1.24, 1.28
sys/net/raw_cb.h: 1.28
sys/net/raw_usrreq.c: 1.57-1.58
sys/net/rtsock.c: 1.228-1.229
sys/netinet/in_proto.c: 1.125
sys/netinet/ip_input.c: 1.359-1.361
sys/netinet/tcp_input.c: 1.359-1.360
sys/netinet/tcp_output.c: 1.197
sys/netinet/tcp_var.h: 1.178
sys/netinet6/icmp6.c: 1.213
sys/netinet6/in6_proto.c: 1.119
sys/netinet6/ip6_forward.c: 1.88
sys/netinet6/ip6_input.c: 1.181-1.182
sys/netinet6/ip6_output.c: 1.193
sys/netinet6/ip6protosw.h: 1.26
sys/netipsec/ipsec.c: 1.100-1.122
sys/netipsec/ipsec.h: 1.51-1.61
sys/netipsec/ipsec6.h: 1.18-1.20
sys/netipsec/ipsec_input.c: 1.44-1.51
sys/netipsec/ipsec_netbsd.c: 1.41-1.45
sys/netipsec/ipsec_output.c: 1.49-1.64
sys/netipsec/ipsec_private.h: 1.5
sys/netipsec/key.c: 1.164-1.234
sys/netipsec/key.h: 1.20-1.32
sys/netipsec/key_debug.c: 1.18-1.21
sys/netipsec/key_debug.h: 1.9
sys/netipsec/keydb.h: 1.16-1.20
sys/netipsec/keysock.c: 1.59-1.62
sys/netipsec/keysock.h: 1.10
sys/netipsec/xform.h: 1.9-1.12
sys/netipsec/xform_ah.c: 1.55-1.74
sys/netipsec/xform_esp.c: 1.56-1.72
sys/netipsec/xform_ipcomp.c: 1.39-1.53
sys/netipsec/xform_ipip.c: 1.50-1.54
sys/netipsec/xform_tcp.c: 1.12-1.16
sys/rump/librump/rumpkern/Makefile.rumpkern: 1.170
sys/rump/librump/rumpnet/net_stub.c: 1.27
sys/sys/protosw.h: 1.67-1.68
tests/net/carp/t_basic.sh: 1.7
tests/net/if_gif/t_gif.sh: 1.11
tests/net/if_l2tp/t_l2tp.sh: 1.3
tests/net/ipsec/Makefile: 1.7-1.9
tests/net/ipsec/algorithms.sh: 1.5
tests/net/ipsec/common.sh: 1.4-1.6
tests/net/ipsec/t_ipsec_ah_keys.sh: 1.2
tests/net/ipsec/t_ipsec_esp_keys.sh: 1.2
tests/net/ipsec/t_ipsec_gif.sh: 1.6-1.7
tests/net/ipsec/t_ipsec_l2tp.sh: 1.6-1.7
tests/net/ipsec/t_ipsec_misc.sh: 1.8-1.18
tests/net/ipsec/t_ipsec_sockopt.sh: 1.1-1.2
tests/net/ipsec/t_ipsec_tcp.sh: 1.1-1.2
tests/net/ipsec/t_ipsec_transport.sh: 1.5-1.6
tests/net/ipsec/t_ipsec_tunnel.sh: 1.9
tests/net/ipsec/t_ipsec_tunnel_ipcomp.sh: 1.1-1.2
tests/net/ipsec/t_ipsec_tunnel_odd.sh: 1.3
tests/net/mcast/t_mcast.sh: 1.6
tests/net/net/t_ipaddress.sh: 1.11
tests/net/net_common.sh: 1.20
tests/net/npf/t_npf.sh: 1.3
tests/net/route/t_flags.sh: 1.20
tests/net/route/t_flags6.sh: 1.16
usr.bin/netstat/fast_ipsec.c: 1.22
Do m_pullup before mtod

It may fix panicks of some tests on anita/sparc and anita/GuruPlug.
---
KNF
---
Enable DEBUG for babylon5
---
Apply C99-style struct initialization to xformsw
---
Tweak outputs of netstat -s for IPsec

- Get rid of "Fast"
- Use ipsec and ipsec6 for titles to clarify protocol
- Indent outputs of sub protocols

Original outputs were organized like this:

(Fast) IPsec:
IPsec ah:
IPsec esp:
IPsec ipip:
IPsec ipcomp:
(Fast) IPsec:
IPsec ah:
IPsec esp:
IPsec ipip:
IPsec ipcomp:

New outputs are organized like this:

ipsec:
ah:
esp:
ipip:
ipcomp:
ipsec6:
ah:
esp:
ipip:
ipcomp:
---
Add test cases for IPComp
---
Simplify IPSEC_OSTAT macro (NFC)
---
KNF; replace leading whitespaces with hard tabs
---
Introduce and use SADB_SASTATE_USABLE_P
---
KNF
---
Add update command for testing

Updating an SA (SADB_UPDATE) requires that a process issuing
SADB_UPDATE is the same as a process issued SADB_ADD (or SADB_GETSPI).
This means that update command must be used with add command in a
configuration of setkey. This usage is normally meaningless but
useful for testing (and debugging) purposes.
---
Add test cases for updating SA/SP

The tests require newly-added udpate command of setkey.
---
PR/52346: Frank Kardel: Fix checksumming for NAT-T
See XXX for improvements.
---
Remove codes for PACKET_TAG_IPSEC_IN_CRYPTO_DONE

It seems that PACKET_TAG_IPSEC_IN_CRYPTO_DONE is for network adapters
that have IPsec accelerators; a driver sets the mtag to a packet
when its device has already encrypted the packet.

Unfortunately no driver implements such offload features for long
years and seems unlikely to implement them soon. (Note that neither
FreeBSD nor Linux doesn't have such drivers.) Let's remove related
(unused) codes and simplify the IPsec code.
---
Fix usages of sadb_msg_errno
---
Avoid updating sav directly

On SADB_UPDATE a target sav was updated directly, which was unsafe.
Instead allocate another sav, copy variables of the old sav to
the new one and replace the old one with the new one.
---
Simplify; we can assume sav->tdb_xform cannot be NULL while it's valid
---
Rename key_alloc* functions (NFC)

We shouldn't use the term "alloc" for functions that just look up
data and actually don't allocate memory.
---
Use explicit_memset to surely zero-clear key_auth and key_enc
---
Make sure to clear keys on error paths of key_setsaval
---
Add missing KEY_FREESAV
---
Make sure a sav is inserted to a sah list after its initialization completes
---
Remove unnecessary zero-clearing codes from key_setsaval

key_setsaval is now used only for a newly-allocated sav. (It was
used to reset variables of an existing sav.)
---
Correct wrong assumption of sav->refcnt in key_delsah

A sav in a list is basically not to be sav->refcnt == 0. And also
KEY_FREESAV assumes sav->refcnt > 0.
---
Let key_getsavbyspi take a reference of a returning sav
---
Use time_mono_to_wall (NFC)
---
Separate sending message routine (NFC)
---
Simplify; remove unnecessary zero-clears

key_freesaval is used only when a target sav is being destroyed.
---
Omit NULL checks for sav->lft_c

sav->lft_c can be NULL only when initializing or destroying sav.
---
Omit unnecessary NULL checks for sav->sah
---
Omit unnecessary check of sav->state

key_allocsa_policy picks a sav of either MATURE or DYING so we
don't need to check its state again.
---
Simplify; omit unnecessary saidx passing

- ipsec_nextisr returns a saidx but no caller uses it
- key_checkrequest is passed a saidx but it can be gotton by
  another argument (isr)
---
Fix splx isn't called on some error paths
---
Fix header size calculation of esp where sav is NULL
---
Fix header size calculation of ah in the case sav is NULL

This fix was also needed for esp.
---
Pass sav directly to opencrypto callback

In a callback, use a passed sav as-is by default and look up a sav
only if the passed sav is dead.
---
Avoid examining freshness of sav on packet processing

If a sav list is sorted (by lft_c->sadb_lifetime_addtime) in advance,
we don't need to examine each sav and also don't need to delete one
on the fly and send up a message. Fortunately every sav lists are sorted
as we need.

Added key_validate_savlist validates that each sav list is surely sorted
(run only if DEBUG because it's not cheap).
---
Add test cases for SAs with different SPIs
---
Prepare to stop using isr->sav

isr is a shared resource and using isr->sav as a temporal storage
for each packet processing is racy. And also having a reference from
isr to sav makes the lifetime of sav non-deterministic; such a reference
is removed when a packet is processed and isr->sav is overwritten by
new one. Let's have a sav locally for each packet processing instead of
using shared isr->sav.

However this change doesn't stop using isr->sav yet because there are
some users of isr->sav. isr->sav will be removed after the users find
a way to not use isr->sav.
---
Fix wrong argument handling
---
fix printf format.
---
Don't validate sav lists of LARVAL or DEAD states

We don't sort the lists so the validation will always fail.

Fix PR kern/52405
---
Make sure to sort the list when changing the state by key_sa_chgstate
---
Rename key_allocsa_policy to key_lookup_sa_bysaidx
---
Separate test files
---
Calculate ah_max_authsize on initialization as well as esp_max_ivlen
---
Remove m_tag_find(PACKET_TAG_IPSEC_PENDING_TDB) because nobody sets the tag
---
Restore a comment removed in previous

The comment is valid for the below code.
---
Make tests more stable

sleep command seems to wait longer than expected on anita so
use polling to wait for a state change.
---
Add tests that explicitly delete SAs instead of waiting for expirations
---
Remove invalid M_AUTHIPDGM check on ESP isr->sav

M_AUTHIPDGM flag is set to a mbuf in ah_input_cb. An sav of ESP can
have AH authentication as sav->tdb_authalgxform. However, in that
case esp_input and esp_input_cb are used to do ESP decryption and
AH authentication and M_AUTHIPDGM never be set to a mbuf. So
checking M_AUTHIPDGM of a mbuf on isr->sav of ESP is meaningless.
---
Look up sav instead of relying on unstable sp->req->sav

This code is executed only in an error path so an additional lookup
doesn't matter.
---
Correct a comment
---
Don't release sav if calling crypto_dispatch again
---
Remove extra KEY_FREESAV from ipsec_process_done

It should be done by the caller.
---
Don't bother the case of crp->crp_buf == NULL in callbacks
---
Hold a reference to an SP during opencrypto processing

An SP has a list of isr (ipsecrequest) that represents a sequence
of IPsec encryption/authentication processing. One isr corresponds
to one opencrypto processing. The lifetime of an isr follows its SP.

We pass an isr to a callback function of opencrypto to continue
to a next encryption/authentication processing. However nobody
guaranteed that the isr wasn't freed, i.e., its SP wasn't destroyed.

In order to avoid such unexpected destruction of isr, hold a reference
to its SP during opencrypto processing.
---
Don't make SAs expired on tests that delete SAs explicitly
---
Fix a debug message
---
Dedup error paths (NFC)
---
Use pool to allocate tdb_crypto

For ESP and AH, we need to allocate an extra variable space in addition
to struct tdb_crypto. The fixed size of pool items may be larger than
an actual requisite size of a buffer, but still the performance
improvement by replacing malloc with pool wins.
---
Don't use unstable isr->sav for header size calculations

We may need to optimize to not look up sav here for users that
don't need to know an exact size of headers (e.g., TCP segmemt size
caclulation).
---
Don't use sp->req->sav when handling NAT-T ESP fragmentation

In order to do this we need to look up a sav however an additional
look-up degrades performance. A sav is later looked up in
ipsec4_process_packet so delay the fragmentation check until then
to avoid an extra look-up.
---
Don't use key_lookup_sp that depends on unstable sp->req->sav

It provided a fast look-up of SP. We will provide an alternative
method in the future (after basic MP-ification finishes).
---
Stop setting isr->sav on looking up sav in key_checkrequest
---
Remove ipsecrequest#sav
---
Stop setting mtag of PACKET_TAG_IPSEC_IN_DONE because there is no users anymore
---
Skip ipsec_spi_*_*_preferred_new_timeout when running on qemu

Probably due to PR 43997
---
Add localcount to rump kernels
---
Remove unused macro
---
Fix key_getcomb_setlifetime

The fix adjusts a soft limit to be 80% of a corresponding hard limit.

I'm not sure the fix is really correct though, at least the original
code is wrong. A passed comb is zero-cleared before calling
key_getcomb_setlifetime, so
  comb->sadb_comb_soft_addtime = comb->sadb_comb_soft_addtime * 80 / 100;
is meaningless.
---
Provide and apply key_sp_refcnt (NFC)

It simplifies further changes.
---
Fix indentation

Pointed out by knakahara@
---
Use pslist(9) for sptree
---
Don't acquire global locks for IPsec if NET_MPSAFE

Note that the change is just to make testing easy and IPsec isn't MP-safe yet.
---
Let PF_KEY socks hold their own lock instead of softnet_lock

Operations on SAD and SPD are executed via PF_KEY socks. The operations
include deletions of SAs and SPs that will use synchronization mechanisms
such as pserialize_perform to wait for references to SAs and SPs to be
released. It is known that using such mechanisms with holding softnet_lock
causes a dead lock. We should avoid the situation.
---
Make IPsec SPD MP-safe

We use localcount(9), not psref(9), to make the sptree and secpolicy (SP)
entries MP-safe because SPs need to be referenced over opencrypto
processing that executes a callback in a different context.

SPs on sockets aren't managed by the sptree and can be destroyed in softint.
localcount_drain cannot be used in softint so we delay the destruction of
such SPs to a thread context. To do so, a list to manage such SPs is added
(key_socksplist) and key_timehandler_spd deletes dead SPs in the list.

For more details please read the locking notes in key.c.

Proposed on tech-kern@ and tech-net@
---
Fix updating ipsec_used

- key_update_used wasn't called in key_api_spddelete2 and key_api_spdflush
- key_update_used wasn't called if an SP had been added/deleted but
  a reply to userland failed
---
Fix updating ipsec_used; turn on when SPs on sockets are added
---
Add missing IPsec policy checks to icmp6_rip6_input

icmp6_rip6_input is quite similar to rip6_input and the same checks exist
in rip6_input.
---
Add test cases for setsockopt(IP_IPSEC_POLICY)
---
Don't use KEY_NEWSP for dummy SP entries

By the change KEY_NEWSP is now not called from softint anymore
and we can use kmem_zalloc with KM_SLEEP for KEY_NEWSP.
---
Comment out unused functions
---
Add test cases that there are SPs but no relevant SAs
---
Don't allow sav->lft_c to be NULL

lft_c of an sav that was created by SADB_GETSPI could be NULL.
---
Clean up clunky eval strings

- Remove unnecessary \ at EOL
  - This allows to omit ; too
- Remove unnecessary quotes for arguments of atf_set
- Don't expand $DEBUG in eval
  - We expect it's expanded on execution

Suggested by kre@
---
Remove unnecessary KEY_FREESAV in an error path

sav should be freed (unreferenced) by the caller.
---
Use pslist(9) for sahtree
---
Use pslist(9) for sah->savtree
---
Rename local variable newsah to sah

It may not be new.
---
MP-ify SAD slightly

- Introduce key_sa_mtx and use it for some list operations
- Use pserialize for some list iterations
---
Introduce KEY_SA_UNREF and replace KEY_FREESAV with it where sav will never be actually freed in the future

KEY_SA_UNREF is still key_freesav so no functional change for now.

This change reduces diff of further changes.
---
Remove out-of-date log output

Pointed out by riastradh@
---
Use KDASSERT instead of KASSERT for mutex_ownable

Because mutex_ownable is too heavy to run in a fast path
even for DIAGNOSTIC + LOCKDEBUG.

Suggested by riastradh@
---
Assemble global lists and related locks into cache lines (NFCI)

Also rename variable names from *tree to *list because they are
just lists, not trees.

Suggested by riastradh@
---
Move locking notes
---
Update the locking notes

- Add locking order
- Add locking notes for misc lists such as reglist
- Mention pserialize, key_sp_ref and key_sp_unref on SP operations

Requested by riastradh@
---
Describe constraints of key_sp_ref and key_sp_unref

Requested by riastradh@
---
Hold key_sad.lock on SAVLIST_WRITER_INSERT_TAIL
---
Add __read_mostly to key_psz

Suggested by riastradh@
---
Tweak wording (pserialize critical section => pserialize read section)

Suggested by riastradh@
---
Add missing mutex_exit
---
Fix setkey -D -P outputs

The outputs were tweaked (by me), but I forgot updating libipsec
in my local ATF environment...
---
MP-ify SAD (key_sad.sahlist and sah entries)

localcount(9) is used to protect key_sad.sahlist and sah entries
as well as SPD (and will be used for SAD sav).

Please read the locking notes of SAD for more details.
---
Introduce key_sa_refcnt and replace sav->refcnt with it (NFC)
---
Destroy sav only in the loop for DEAD sav
---
Fix KASSERT(solocked(sb->sb_so)) failure in sbappendaddr that is called eventually from key_sendup_mbuf

If key_sendup_mbuf isn't passed a socket, the assertion fails.
Originally in this case sb->sb_so was softnet_lock and callers
held softnet_lock so the assertion was magically satisfied.
Now sb->sb_so is key_so_mtx and also softnet_lock isn't always
held by callers so the assertion can fail.

Fix it by holding key_so_mtx if key_sendup_mbuf isn't passed a socket.

Reported by knakahara@
Tested by knakahara@ and ozaki-r@
---
Fix locking notes of SAD
---
Fix deadlock between key_sendup_mbuf called from key_acquire and localcount_drain

If we call key_sendup_mbuf from key_acquire that is called on packet
processing, a deadlock can happen like this:
- At key_acquire, a reference to an SP (and an SA) is held
- key_sendup_mbuf will try to take key_so_mtx
- Some other thread may try to localcount_drain to the SP with
  holding key_so_mtx in say key_api_spdflush
- In this case localcount_drain never return because key_sendup_mbuf
  that has stuck on key_so_mtx never release a reference to the SP

Fix the deadlock by deferring key_sendup_mbuf to the timer
(key_timehandler).
---
Fix that prev isn't cleared on retry
---
Limit the number of mbufs queued for deferred key_sendup_mbuf

It's easy to be queued hundreds of mbufs on the list under heavy
network load.
---
MP-ify SAD (savlist)

localcount(9) is used to protect savlist of sah. The basic design is
similar to MP-ifications of SPD and SAD sahlist. Please read the
locking notes of SAD for more details.
---
Simplify ipsec_reinject_ipstack (NFC)
---
Add per-CPU rtcache to ipsec_reinject_ipstack

It reduces route lookups and also reduces rtcache lock contentions
when NET_MPSAFE is enabled.
---
Use pool_cache(9) instead of pool(9) for tdb_crypto objects

The change improves network throughput especially on multi-core systems.
---
Update

ipsec(4), opencrypto(9) and vlan(4) are now MP-safe.
---
Write known issues on scalability
---
Share a global dummy SP between PCBs

It's never be changed so it can be pre-allocated and shared safely between PCBs.
---
Fix race condition on the rawcb list shared by rtsock and keysock

keysock now protects itself by its own mutex, which means that
the rawcb list is protected by two different mutexes (keysock's one
and softnet_lock for rtsock), of course it's useless.

Fix the situation by having a discrete rawcb list for each.
---
Use a dedicated mutex for rt_rawcb instead of softnet_lock if NET_MPSAFE
---
fix localcount leak in sav. fixed by ozaki-r@n.o.

I commit on behalf of him.
---
remove unnecessary comment.
---
Fix deadlock between pserialize_perform and localcount_drain

A typical ussage of localcount_drain looks like this:

  mutex_enter(&mtx);
  item = remove_from_list();
  pserialize_perform(psz);
  localcount_drain(&item->localcount, &cv, &mtx);
  mutex_exit(&mtx);

This sequence can cause a deadlock which happens for example on the following
situation:

- Thread A calls localcount_drain which calls xc_broadcast after releasing
  a specified mutex
- Thread B enters the sequence and calls pserialize_perform with holding
  the mutex while pserialize_perform also calls xc_broadcast
- Thread C (xc_thread) that calls an xcall callback of localcount_drain tries
  to hold the mutex

xc_broadcast of thread B doesn't start until xc_broadcast of thread A
finishes, which is a feature of xcall(9). This means that pserialize_perform
never complete until xc_broadcast of thread A finishes. On the other hand,
thread C that is a callee of xc_broadcast of thread A sticks on the mutex.
Finally the threads block each other (A blocks B, B blocks C and C blocks A).

A possible fix is to serialize executions of the above sequence by another
mutex, but adding another mutex makes the code complex, so fix the deadlock
by another way; the fix is to release the mutex before pserialize_perform
and instead use a condvar to prevent pserialize_perform from being called
simultaneously.

Note that the deadlock has happened only if NET_MPSAFE is enabled.
---
Add missing ifdef NET_MPSAFE
---
Take softnet_lock on pr_input properly if NET_MPSAFE

Currently softnet_lock is taken unnecessarily in some cases, e.g.,
icmp_input and encap4_input from ip_input, or not taken even if needed,
e.g., udp_input and tcp_input from ipsec4_common_input_cb. Fix them.

NFC if NET_MPSAFE is disabled (default).
---
- sanitize key debugging so that we don't print extra newlines or unassociated
  debugging messages.
- remove unused functions and make internal ones static
- print information in one line per message
---
humanize printing of ip addresses
---
cast reduction, NFC.
---
Fix typo in comment
---
Pull out ipsec_fill_saidx_bymbuf (NFC)
---
Don't abuse key_checkrequest just for looking up sav

It does more than expected for example key_acquire.
---
Fix SP is broken on transport mode

isr->saidx was modified accidentally in ipsec_nextisr.

Reported by christos@
Helped investigations by christos@ and knakahara@
---
Constify isr at many places (NFC)
---
Include socketvar.h for softnet_lock
---
Fix buffer length for ipsec_logsastr

(snj)

2017-10-21 19:43:53 UTC MAIN commitmail json YAML

Update contact info for changes to this file.

(jmcneill)

2017-10-21 18:18:44 UTC MAIN commitmail json YAML

Initialize all fields in bcdc header.

(jmcneill)

2017-10-21 15:20:52 UTC MAIN commitmail json YAML

SMAP on amd64.

(maxv)

2017-10-21 15:14:57 UTC MAIN commitmail json YAML

USER_LDT on amd64.

(maxv)

2017-10-21 15:12:28 UTC MAIN commitmail json YAML

USER_LDT done.

(maxv)

2017-10-21 14:38:22 UTC MAIN commitmail json YAML

Remove comma after last Nm entry

(abhinav)