Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (8m)  netbsd-8 (5d)  netbsd-10 (5d)  netbsd-9 (11d)  thorpej-ifq (175d)  thorpej-altq-separation (178d) 

2024-05-10 09:23:49 UTC Now

2017-10-21 15:20:52 UTC MAIN commitmail json YAML

SMAP on amd64.

(maxv)

2017-10-21 15:14:57 UTC MAIN commitmail json YAML

USER_LDT on amd64.

(maxv)

2017-10-21 15:12:28 UTC MAIN commitmail json YAML

USER_LDT done.

(maxv)

2017-10-21 14:38:22 UTC MAIN commitmail json YAML

Remove comma after last Nm entry

(abhinav)

2017-10-21 11:47:17 UTC MAIN commitmail json YAML

Add support for sdio interrupts

(jmcneill)

2017-10-21 11:38:14 UTC MAIN commitmail json YAML

disable seeprom for now, it seems to trigger random boot failures on my A10 board

(jmcneill)

2017-10-21 09:58:56 UTC MAIN commitmail json YAML

Fix return value.  fo_kqfilter is expected to return errno on error.
This is the rest of 1.226 (10 years ago).

(isaki)

2017-10-21 09:12:41 UTC MAIN commitmail json YAML

Fix return value.  fo_poll is expected to return revents on error.

(isaki)

2017-10-21 09:02:23 UTC MAIN commitmail json YAML

Fix return value.  fo_mmap is expected to return errno on error.

(isaki)

2017-10-21 08:27:19 UTC MAIN commitmail json YAML

Forbid 64bit entries. That's it, now we support USER_LDT on amd64.

(maxv)

2017-10-21 08:08:26 UTC MAIN commitmail json YAML

Use labels instead of disassembling *(%rip). intrfastexit is now the
only place where the segregs can fault.

(maxv)

2017-10-21 07:24:26 UTC MAIN commitmail json YAML

2017-10-21 07:23:22 UTC MAIN commitmail json YAML

2017-10-21 06:55:54 UTC MAIN commitmail json YAML

Improve our segregs model. Pass 3/3.

Treat %gs the same way we treat %ds/%es/%fs: restore it in INTRFASTEXIT
on 32bit LWPs.

On Xen however, its behavior does not change, because we need to do an
hypercall before INTR_RESTORE_GPRS, and that's too complicated for now.

As a side effect, this change fixes a bug in the ACPI wakeup code; %fs/%gs
were not restored on 32bit LWPs, and chances are they would segfault
shortly afterwards.

Support for USER_LDT on amd64 is almost complete now.

(maxv)

2017-10-21 05:30:48 UTC MAIN commitmail json YAML

Create directory for new bwfm firmware to be installed into.

(kre)

2017-10-21 03:17:36 UTC MAIN commitmail json YAML

2017-10-21 03:17:09 UTC MAIN commitmail json YAML

2017-10-21 02:21:30 UTC MAIN commitmail json YAML

Fix sun4i platform delay to sleep the requested number of microseconds
instead of the requested number of clock ticks.

(jmcneill)

2017-10-21 02:06:34 UTC MAIN commitmail json YAML

Add bwfm firmware Makefile

(jmcneill)

2017-10-21 02:05:38 UTC MAIN commitmail json YAML

2017-10-20 23:38:57 UTC MAIN commitmail json YAML

Set maximum supported bwfm_bss_info length

(jmcneill)

2017-10-20 23:38:21 UTC MAIN commitmail json YAML

Fix an alignment problem with scan results within an escan event

(jmcneill)

2017-10-20 22:29:33 UTC MAIN commitmail json YAML

2017-10-20 22:29:15 UTC MAIN commitmail json YAML

Add driver for sun4i/sun7i 10/100 Fast Ethernet controller (EMAC).

(jmcneill)

2017-10-20 21:51:29 UTC MAIN commitmail json YAML

actually 0680 uses different chip map func, which doesn't call the function
handing non-independant channels, so don't set IDE_SHARED_CHANNELS for it

(jdolecek)

2017-10-20 19:06:46 UTC MAIN commitmail json YAML

Initialize the in/out parameter vmin.

vmin is only an optional hint since we're not passing UVM_FLAG_FIXED,
but that doesn't mean we should use uninitialized stack garbage as
the hint.

Noted by chs@.

(riastradh)

2017-10-20 14:48:43 UTC MAIN commitmail json YAML

Carve out KVA for execargs on boot from an exec_map like we used to.

Candidate fix for PR kern/45718: `processes sometimes get stuck and
spin in vm_map', a problem that has been plaguing all our 32-bit
ports for years.

Since we currently use large (256k) buffers for execargs, and since
nobody has stepped up to tackle breaking them into bite-sized (or at
least page-sized) chunks, after KVA gets sufficiently fragmented we
can't allocate new execargs buffers from kernel_map.

Until 2008, we always carved out KVA for execargs on boot with a uvm
submap exec_map of kernel_map.  Then ad@ found that the uvm_km_free
call, to discard them when done, cost about 100us, which a pool
avoided:

https://mail-index.NetBSD.org/tech-kern/2008/06/25/msg001854.html
https://mail-index.NetBSD.org/tech-kern/2008/06/26/msg001859.html

ad@ _simultaneously_ introduced a pool _and_ eliminated the reserved
KVA in the exec_map submap.  This change preserves the pool, but
restores exec_map (with less code, by putting it in MI code instead
of copying it in every MD initialization routine).

Patch proposed on tech-kern:
https://mail-index.NetBSD.org/tech-kern/2017/10/19/msg022461.html

Patch tested by bouyer@:
https://mail-index.NetBSD.org/tech-kern/2017/10/20/msg022465.html

I previously discussed the issue on tech-kern before I knew of the
history around exec_map:
https://mail-index.NetBSD.org/tech-kern/2012/12/09/msg014695.html

The candidate workaround I proposed of using pool_setlowat to force
preallocation of KVA would also force preallocation of physical RAM,
which is a waste not incurred by using exec_map, and which is part of
why I never committed it.

There may remain a general problem that if thread A calls pool_get
and tries to service that request by a uvm_km_alloc call that hangs
because KVA is scarce, and thread B does pool_put, the pool_put in
thread B will not notify the pool_get in thread A that it doesn't
need to wait for KVA, and so thread A may continue to hang in
uvm_km_alloc.  However,

(a) That won't apply here, because there is exactly as much KVA
available in exec_map as exec_pool will ever try to use.

(b) It is possible that may not even matter in other cases as long as
the page daemon eventually tries to shrink the pool, which will cause
a uvm_km_free that can unhang the hung uvm_km_alloc.

XXX pullup-8
XXX pullup-7
XXX pullup-6
XXX pullup-5, perhaps...

(riastradh)

2017-10-20 12:11:34 UTC MAIN commitmail json YAML

Make check_exec() errors print the name of the binary that fails to
execute.

(martin)

2017-10-20 12:03:16 UTC MAIN commitmail json YAML

2017-10-20 12:01:43 UTC MAIN commitmail json YAML

update entry for Marvel Yukon 8058, and fix URL for pci ids (Rocky Hotas)

(christos)

2017-10-20 09:26:13 UTC MAIN commitmail json YAML

On I219, drop TARC0 bit 28 for DMA hang workaround (from Linux).

(msaitoh)

2017-10-20 08:04:39 UTC MAIN commitmail json YAML

No functional change:
- Simplify ifmedia_removeall using with ifmedia_delete_instance(IFM_INST_ANY).
- KNF.

(msaitoh)

2017-10-20 07:06:08 UTC MAIN commitmail json YAML

2017-10-20 03:45:47 UTC MAIN commitmail json YAML

Add test cases for one SP with multiple SAs

These are for a bug reported recently which modifies SPs accidentally.

(ozaki-r)

2017-10-20 03:45:02 UTC MAIN commitmail json YAML

Suppress name resolution

(ozaki-r)

2017-10-20 03:43:51 UTC MAIN commitmail json YAML

2017-10-20 03:42:53 UTC MAIN commitmail json YAML

Show packet counters

(ozaki-r)

2017-10-19 23:59:56 UTC MAIN commitmail json YAML

2017-10-19 23:59:30 UTC MAIN commitmail json YAML

2017-10-19 23:58:41 UTC MAIN commitmail json YAML

2017-10-19 23:55:02 UTC MAIN commitmail json YAML

2017-10-19 23:54:42 UTC MAIN commitmail json YAML

Add USB IDs for Broadcom BCM43236, BCM43143, BCM43242, and BCM43569 USB
wireless devices.

(jmcneill)

2017-10-19 20:45:07 UTC MAIN commitmail json YAML

more detailed debug info; also sync DEBUG_* values in wd.c with ata.c

(jdolecek)

2017-10-19 20:27:12 UTC MAIN commitmail json YAML

2017-10-19 20:11:38 UTC MAIN commitmail json YAML

replace the chek for the shared channel of cmdide(4) a flag of the
product array, rather than switch inside attach routine

XXX judging from product name, Silicon Image 0680 might be newer than 0649
XXX and hence have actually independant channels, but I don't have the hw
XXX so keeping as-is

no functional change, just to improve visibility in course of fixing
PR kern/52606

(jdolecek)

2017-10-19 19:05:53 UTC MAIN commitmail json YAML

Improve our segregs model. Pass 2/3.

Treat %fs the same way we treat %ds and %es. For a new 32bit LWP %fs is
set to GUDATA32_SEL, and always updated in INTRFASTEXIT.

This solves an important issue we had until now: we couldn't handle the
faults generated by the "movw $val,%fs" instructions, because they were
deep into the kernel context. Now %fs can fault only in INTRFASTEXIT,
which is safe.

Note that it also fixes a bug I believe affected the kernel: on AMD CPUs,
setting %fs to zero does not flush the internal register state, and
therefore we could leak the %fs base address when context-switching. This
being said, I couldn't trigger the issue on the AMD cpu I have. Whatever,
it's fixed now, since we first set %fs to GUDATA32 - which does flush the
register state.

(maxv)

2017-10-19 18:36:31 UTC MAIN commitmail json YAML

Improve our segregs model. Pass 1/3.

Right now, we are saving and restoring %ds/%es each time we enter/leave the
kernel. However, we let %fs/%gs live in the kernel space, and we rely on
the fact that when switching to an LWP, %fs/%gs are set right away (via
cpu_switchto or setregs).

It has two drawbacks: we are taking care of %ds/%es while they are
deprecated (useless) on 64bit LWPs, and we are restricting %fs/%gs while
they still have a meaning on 32bit LWPs.

Therefore, handle 32bit and 64bit LWPs differently:
* 64bit LWPs use fixed segregs, which are not taken care of.
* 32bit LWPs have dynamic segregs, always saved/restored.

For now, only %ds and %es are changed; %fs and %gs will be in the next
passes.

The trapframe is constructed as usual. In INTRFASTEXIT, we restore %ds/%es
depending on the %cs value. If %cs contains one of the two standard 64bit
selectors, don't do anything. Otherwise, restore everything.

When doing a context switch, just restore %ds/%es to their default values.
On a 32bit LWP they will be overwritten by INTRFASTEXIT; on a 64bit LWP
they won't be updated.

In the ACPI wakeup code, restore %ds/%es to the default 64bit user value.

(maxv)

2017-10-19 16:01:58 UTC MAIN commitmail json YAML

Don't call tegra_pcie_reset_port for now - it makes tk1 re @ pci not work

(skrll)

2017-10-19 11:28:30 UTC MAIN commitmail json YAML

fix l2tp panic when l2tp session id is changed (same as if_vlan.c:r1.104)

E.g. the following operation causes this panic.
    ====================
    # ifconfig l2tp0 create
    # ifconfig l2tp0 session 140 140
    # ifconfig l2tp1 create
    # ifconfig l2tp1 session 200 200
    # ifconfig l2tp1 session 300 300
    panic: kernel diagnostic assertion "new->ple_next == NULL" failed: file "/disk4/home/k-nakahara/repos/netbsd-src/sys/sys/pslist.h", line 118
    ====================

Pointed out by s-yamaguchi@IIJ, thanks.

XXX need pullup-8

(knakahara)

2017-10-19 10:01:10 UTC MAIN commitmail json YAML

Always mask the 16 bits of the segregs in the trapframe. We don't zero-
extend the uint64_t's when building it, so we're leaking 48 bits of kernel
stack to userland.

Having said that, it appears that I unintentionally fixed most of this
issue in locore.S::rev1.127 - by building the frame with interrupts
disabled, we are implicitly guaranteeing that the structure doesn't get
overwritten by the kernel. Which means, we are leaking to userland data
that comes from userland anyway.

(still other places with this issue, but I'll fix them differently)

(maxv)

2017-10-19 09:32:01 UTC MAIN commitmail json YAML

Make sure we don't go farther with 32bit LWPs. There appears to be some
confusion in the code - in part introduced by myself -, and clearly this
place is not supposed to handle 32bit LWPs.

Right now we're returning EINVAL, but verily we would need to redirect
these calls to their netbsd32 counterparts.

(maxv)

2017-10-19 07:02:00 UTC MAIN commitmail json YAML

fix vlan panic when vlan is re-configured without destroy.

E.g. the following operation causes this panic.
    ====================
    # ifconfig vlan0 create
    # ifconfig vlan0 vlan 1 vlanif ixg3
    # ifconfig vlan1 create
    # ifconfig vlan1 vlan 1 vlanif ixg2
    # ifconfig vlan1 -vlanif
    # ifconfig vlan1 vlan 1 vlanif ixg2

    panic: kernel diagnostic assertion "new->ple_next == NULL" failed: file "/git/netbsd-src/sys/sys/pslist.h", line 118
    ====================

Pointed out and tested by msaitoh@n.o, fixed by s-yamaguchi@IIJ, thanks.

XXX need pullup-8

(knakahara)

2017-10-19 06:29:16 UTC MAIN commitmail json YAML

Add the following bits in AMD Fn8000000a %edx features (SVM features):
PFThreshold (PAUSE filter threshold)
AVIC (AMD virtual interrupt controller)
V_VMSAVE_VMLOAD (virtualized VMSAVE and VMLOAD)
vGIF (virtualized GIF)

(msaitoh)

2017-10-19 05:52:57 UTC MAIN commitmail json YAML

Fix a bug that the TPH ST table is decoded even if it's not in the TPH
Requester extended capability structure.

(msaitoh)

2017-10-19 05:45:37 UTC MAIN commitmail json YAML

2017-10-19 05:39:22 UTC MAIN commitmail json YAML

KASSERT -> KASSERTMSG and while I'm here update a comment

(skrll)

2017-10-19 03:26:29 UTC MAIN commitmail json YAML

external/lgpl3/gmp build fail in configure phase with "ln -s J /etc/malloc.conf".

patch from pkgsrc/devel/gmp
  http://mail-index.netbsd.org/pkgsrc-changes/2017/06/15/msg158404.html

(nonaka)

2017-10-19 03:09:55 UTC MAIN commitmail json YAML

Update from Intel SDM:
0x55: Xeon Scalable (Skylake)
0x57: Xeon Phi [357]200 (Knights Landing)
0x66: Future Core (Cannon Lake)
0x85: Future Xeon Phi (Knights Mill)

(msaitoh)

2017-10-19 01:57:18 UTC MAIN commitmail json YAML

Re-factor the code that extracts status from exited jobs, avoiding
code duplication, and reducing the size of /bin/sh by a trivial amount.

NFCI.

This is being done now as there are two other changes forthcoming, both
of which benefit - one would result in even more code duplication without
this, the other might need to alter how this is done, and doing it after this
means there's just one place to change (if required).

(kre)

2017-10-19 01:57:15 UTC MAIN commitmail json YAML

Turn on D_MPSAFE flag of bpf_cdevsw that is already MP-safe

Pointed out by k-goda@IIJ

(ozaki-r)

2017-10-18 18:11:54 UTC MAIN commitmail json YAML

Remove unnecessary Tn.

(wiz)

2017-10-18 17:12:42 UTC MAIN commitmail json YAML

If a branch is already there, use it and don't create a new one. This way
we can call mm_map_tree twice with neighboring regions.

(maxv)

2017-10-18 16:29:56 UTC MAIN commitmail json YAML

Group the sections into segments, and align to KERNALIGN only between
segments. Prerequisite for other changes. Unfortunately the code is not
very compact, but whatever.

(maxv)

2017-10-18 16:01:58 UTC MAIN commitmail json YAML

Match BUFFALO CEWL-1 (Sony UWA-BR100 WLAN)

(jmcneill)

2017-10-18 16:01:21 UTC MAIN commitmail json YAML

2017-10-18 16:00:53 UTC MAIN commitmail json YAML

Add Sony UWA-BR100 WLAN adapter

(jmcneill)

2017-10-18 12:55:14 UTC MAIN commitmail json YAML

do what freebsd does:
- when disabling an interrupt, disable it on the HT PIC as well
- when establishing an interrupt, don't enable it right away
- program IRQs 0-3 as level, like freebsd does
Now svwsata is almost usable. We still get an interrupt storm but it doesn't
eat up all CPU cycles anymore.

(macallan)

2017-10-18 10:43:32 UTC MAIN commitmail json YAML

Protect ec_multi* with mutex like other MP safe Ethernet drivers.
See if_ether.h rev. 1.66 and related stuff:
http://mail-index.netbsd.org/source-changes/2016/12/28/msg080289.html

(msaitoh)

2017-10-18 08:54:59 UTC MAIN commitmail json YAML

I have seen (way too often) uses of test(1) that are not defined to
actually work (but just happen to, today, and in some cases, even
that trusts to some luck.)

It has been recently pointed out to me that the man page (ie: this
file) doesn't give any real guidance to what is really acceptable,
and what is not.

The CAVEATS section does note that the grammar is ambiguous, but then
just says that test(1) implements what POSIX requires, and refers
readers to the relevant section of the POSIX standard for more details.
That is probably asking too much of the average reader...

So, add some extra information in the CAVEATS with what is defined to work,
and what should be avoided.  Not all of the POSIX rules are here, but this
might hopefully help script authors avoid some of the pitfalls.

(kre)

2017-10-18 08:38:35 UTC MAIN commitmail json YAML

add newlines to the debug messages

(jdolecek)

2017-10-18 03:38:32 UTC MAIN commitmail json YAML

Add Turbo Boost Max Technology 3.0 bit.

(msaitoh)

2017-10-17 21:11:36 UTC MAIN commitmail json YAML

Typo: s/processes/process's/ for possession

(pgoyette)

2017-10-17 19:23:42 UTC MAIN commitmail json YAML

2017-10-17 19:18:30 UTC MAIN commitmail json YAML

Move call to sofree() to end of sctp_inpcb_free() and re-aquire
softnet_lock.

Logic copied from in_pcb.c.

(rjs)

2017-10-17 18:52:51 UTC MAIN commitmail json YAML

reintroduce ATACH_IRQ_WAIT flag for attachments using wdcintr(), only
process the interrupt when the flag is set - this fixes spurious interrupt
during post-reset drive setup in wdc_ata_bio_start(), and wdc_atapi_start()

while those functions set WDCTL_IDS, this seems to be ignored by certain
(maybe all) PCI-IDE controllers; usually the implicit KERNEL_LOCK() would
prevent the interrupt anyway, but not when the start routine is started
from the atabus thread, which doesn't take it

fixes 'panic: wdc_ata_bio_intr: bad state' reported on current-users
by Chavdar Ivanov

(jdolecek)

2017-10-17 16:24:14 UTC MAIN commitmail json YAML

no need to clear DMA WAIT flag in mvsata_edma_handle(), it's not needed
by atabus layer

(jdolecek)

2017-10-17 16:23:50 UTC MAIN commitmail json YAML

Fix eva argument to pmap_remove and passed prot bits in flags for
pmap_enter, i.e. fix previous.

(skrll)

2017-10-17 16:07:18 UTC MAIN commitmail json YAML

Set SPL level to match usage for TCP.

(rjs)

2017-10-17 16:03:18 UTC netbsd-6-0 commitmail json YAML

2017-10-17 16:02:44 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1507):
external/bsd/wpa/dist/src/ap/ieee802_11.c: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa_ft.c: revision 1.2
external/bsd/wpa/dist/src/ap/wpa_auth_i.h: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa.c: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa_i.h: revision 1.2
external/bsd/wpa/dist/src/ap/wpa_auth.h: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/tdls.c: revision 1.2
external/bsd/wpa/dist/src/common/wpa_common.h: revision 1.3
external/bsd/wpa/dist/src/ap/wpa_auth_ft.c: revision 1.2
external/bsd/wpa/dist/wpa_supplicant/wnm_sta.c: revision 1.4
external/bsd/wpa/dist/src/ap/wpa_auth.c: revision 1.10
apply patches from upstream, namely from <a  rel="nofollow" href="https://w1.fi/security/2017-1/">https://w1.fi/security/2017-1/</a> :
rebased-v2.6-0001-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch        02-Oct-2017 16:19      6.1K
rebased-v2.6-0002-Prevent-reinstallation-of-an-already-in-use-group-ke.patch    02-Oct-2017 16:19      7.7K
rebased-v2.6-0003-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch    02-Oct-2017 16:19      6.7K
rebased-v2.6-0004-Prevent-installation-of-an-all-zero-TK.patch
02-Oct-2017 16:19      2.5K
rebased-v2.6-0005-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch
02-Oct-2017 16:19      1.9K
rebased-v2.6-0006-TDLS-Reject-TPK-TK-reconfiguration.patch
02-Oct-2017 16:19      4.2K
rebased-v2.6-0007-WNM-Ignore-WNM-Sleep-Mode-Response-without-pending-r.patch    02-Oct-2017 16:19      1.6K
rebased-v2.6-0008-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch    02-Oct-2017 16:19      2.7K
for CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088
(see
<a  rel="nofollow" href="https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt">https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt</a>
for details)

(martin)

2017-10-17 16:01:23 UTC netbsd-6-1 commitmail json YAML

2017-10-17 16:00:47 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1507):
external/bsd/wpa/dist/src/ap/ieee802_11.c: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa_ft.c: revision 1.2
external/bsd/wpa/dist/src/ap/wpa_auth_i.h: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa.c: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa_i.h: revision 1.2
external/bsd/wpa/dist/src/ap/wpa_auth.h: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/tdls.c: revision 1.2
external/bsd/wpa/dist/src/common/wpa_common.h: revision 1.3
external/bsd/wpa/dist/src/ap/wpa_auth_ft.c: revision 1.2
external/bsd/wpa/dist/wpa_supplicant/wnm_sta.c: revision 1.4
external/bsd/wpa/dist/src/ap/wpa_auth.c: revision 1.10
apply patches from upstream, namely from <a  rel="nofollow" href="https://w1.fi/security/2017-1/">https://w1.fi/security/2017-1/</a> :
rebased-v2.6-0001-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch        02-Oct-2017 16:19      6.1K
rebased-v2.6-0002-Prevent-reinstallation-of-an-already-in-use-group-ke.patch    02-Oct-2017 16:19      7.7K
rebased-v2.6-0003-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch    02-Oct-2017 16:19      6.7K
rebased-v2.6-0004-Prevent-installation-of-an-all-zero-TK.patch
02-Oct-2017 16:19      2.5K
rebased-v2.6-0005-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch
02-Oct-2017 16:19      1.9K
rebased-v2.6-0006-TDLS-Reject-TPK-TK-reconfiguration.patch
02-Oct-2017 16:19      4.2K
rebased-v2.6-0007-WNM-Ignore-WNM-Sleep-Mode-Response-without-pending-r.patch    02-Oct-2017 16:19      1.6K
rebased-v2.6-0008-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch    02-Oct-2017 16:19      2.7K
for CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088
(see
<a  rel="nofollow" href="https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt">https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt</a>
for details)

(martin)

2017-10-17 15:59:22 UTC netbsd-6 commitmail json YAML

2017-10-17 15:58:49 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1507):
external/bsd/wpa/dist/src/ap/ieee802_11.c: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa_ft.c: revision 1.2
external/bsd/wpa/dist/src/ap/wpa_auth_i.h: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa.c: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa_i.h: revision 1.2
external/bsd/wpa/dist/src/ap/wpa_auth.h: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/tdls.c: revision 1.2
external/bsd/wpa/dist/src/common/wpa_common.h: revision 1.3
external/bsd/wpa/dist/src/ap/wpa_auth_ft.c: revision 1.2
external/bsd/wpa/dist/wpa_supplicant/wnm_sta.c: revision 1.4
external/bsd/wpa/dist/src/ap/wpa_auth.c: revision 1.10
apply patches from upstream, namely from <a  rel="nofollow" href="https://w1.fi/security/2017-1/">https://w1.fi/security/2017-1/</a> :
rebased-v2.6-0001-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch        02-Oct-2017 16:19      6.1K
rebased-v2.6-0002-Prevent-reinstallation-of-an-already-in-use-group-ke.patch    02-Oct-2017 16:19      7.7K
rebased-v2.6-0003-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch    02-Oct-2017 16:19      6.7K
rebased-v2.6-0004-Prevent-installation-of-an-all-zero-TK.patch
02-Oct-2017 16:19      2.5K
rebased-v2.6-0005-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch
02-Oct-2017 16:19      1.9K
rebased-v2.6-0006-TDLS-Reject-TPK-TK-reconfiguration.patch
02-Oct-2017 16:19      4.2K
rebased-v2.6-0007-WNM-Ignore-WNM-Sleep-Mode-Response-without-pending-r.patch    02-Oct-2017 16:19      1.6K
rebased-v2.6-0008-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch    02-Oct-2017 16:19      2.7K
for CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088
(see
<a  rel="nofollow" href="https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt">https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt</a>
for details)

(martin)

2017-10-17 15:53:19 UTC netbsd-7-0 commitmail json YAML

2017-10-17 15:53:01 UTC MAIN commitmail json YAML

Remove duplicate assignment, comment doesn't match it anyway.

(rjs)

2017-10-17 15:52:35 UTC netbsd-7-0 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1517):
external/bsd/wpa/dist/src/ap/ieee802_11.c: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa_ft.c: revision 1.2
external/bsd/wpa/dist/src/ap/wpa_auth_i.h: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa.c: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa_i.h: revision 1.2
external/bsd/wpa/dist/src/ap/wpa_auth.h: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/tdls.c: revision 1.2
external/bsd/wpa/dist/src/common/wpa_common.h: revision 1.3
external/bsd/wpa/dist/src/ap/wpa_auth_ft.c: revision 1.2
external/bsd/wpa/dist/wpa_supplicant/wnm_sta.c: revision 1.4
external/bsd/wpa/dist/src/ap/wpa_auth.c: revision 1.10
apply patches from upstream, namely from <a  rel="nofollow" href="https://w1.fi/security/2017-1/">https://w1.fi/security/2017-1/</a> :
rebased-v2.6-0001-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch        02-Oct-2017 16:19      6.1K
rebased-v2.6-0002-Prevent-reinstallation-of-an-already-in-use-group-ke.patch    02-Oct-2017 16:19      7.7K
rebased-v2.6-0003-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch    02-Oct-2017 16:19      6.7K
rebased-v2.6-0004-Prevent-installation-of-an-all-zero-TK.patch
02-Oct-2017 16:19      2.5K
rebased-v2.6-0005-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch
02-Oct-2017 16:19      1.9K
rebased-v2.6-0006-TDLS-Reject-TPK-TK-reconfiguration.patch
02-Oct-2017 16:19      4.2K
rebased-v2.6-0007-WNM-Ignore-WNM-Sleep-Mode-Response-without-pending-r.patch    02-Oct-2017 16:19      1.6K
rebased-v2.6-0008-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch    02-Oct-2017 16:19      2.7K
for CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088
(see
<a  rel="nofollow" href="https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt">https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt</a>
for details)

(martin)

2017-10-17 15:51:18 UTC netbsd-7-1 commitmail json YAML

2017-10-17 15:50:36 UTC netbsd-7-1 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1517):
external/bsd/wpa/dist/src/ap/ieee802_11.c: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa_ft.c: revision 1.2
external/bsd/wpa/dist/src/ap/wpa_auth_i.h: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa.c: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa_i.h: revision 1.2
external/bsd/wpa/dist/src/ap/wpa_auth.h: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/tdls.c: revision 1.2
external/bsd/wpa/dist/src/common/wpa_common.h: revision 1.3
external/bsd/wpa/dist/src/ap/wpa_auth_ft.c: revision 1.2
external/bsd/wpa/dist/wpa_supplicant/wnm_sta.c: revision 1.4
external/bsd/wpa/dist/src/ap/wpa_auth.c: revision 1.10
apply patches from upstream, namely from <a  rel="nofollow" href="https://w1.fi/security/2017-1/">https://w1.fi/security/2017-1/</a> :
rebased-v2.6-0001-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch        02-Oct-2017 16:19      6.1K
rebased-v2.6-0002-Prevent-reinstallation-of-an-already-in-use-group-ke.patch    02-Oct-2017 16:19      7.7K
rebased-v2.6-0003-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch    02-Oct-2017 16:19      6.7K
rebased-v2.6-0004-Prevent-installation-of-an-all-zero-TK.patch
02-Oct-2017 16:19      2.5K
rebased-v2.6-0005-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch
02-Oct-2017 16:19      1.9K
rebased-v2.6-0006-TDLS-Reject-TPK-TK-reconfiguration.patch
02-Oct-2017 16:19      4.2K
rebased-v2.6-0007-WNM-Ignore-WNM-Sleep-Mode-Response-without-pending-r.patch    02-Oct-2017 16:19      1.6K
rebased-v2.6-0008-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch    02-Oct-2017 16:19      2.7K
for CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088
(see
<a  rel="nofollow" href="https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt">https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt</a>
for details)

(martin)

2017-10-17 15:49:00 UTC MAIN commitmail json YAML

Remove some foreign conditional code. NFC intended.

(rjs)

2017-10-17 15:48:59 UTC netbsd-7 commitmail json YAML

2017-10-17 15:48:07 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #1517):
external/bsd/wpa/dist/src/ap/ieee802_11.c: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa_ft.c: revision 1.2
external/bsd/wpa/dist/src/ap/wpa_auth_i.h: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa.c: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa_i.h: revision 1.2
external/bsd/wpa/dist/src/ap/wpa_auth.h: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/tdls.c: revision 1.2
external/bsd/wpa/dist/src/common/wpa_common.h: revision 1.3
external/bsd/wpa/dist/src/ap/wpa_auth_ft.c: revision 1.2
external/bsd/wpa/dist/wpa_supplicant/wnm_sta.c: revision 1.4
external/bsd/wpa/dist/src/ap/wpa_auth.c: revision 1.10
apply patches from upstream, namely from <a  rel="nofollow" href="https://w1.fi/security/2017-1/">https://w1.fi/security/2017-1/</a> :
rebased-v2.6-0001-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch        02-Oct-2017 16:19      6.1K
rebased-v2.6-0002-Prevent-reinstallation-of-an-already-in-use-group-ke.patch    02-Oct-2017 16:19      7.7K
rebased-v2.6-0003-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch    02-Oct-2017 16:19      6.7K
rebased-v2.6-0004-Prevent-installation-of-an-all-zero-TK.patch
02-Oct-2017 16:19      2.5K
rebased-v2.6-0005-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch
02-Oct-2017 16:19      1.9K
rebased-v2.6-0006-TDLS-Reject-TPK-TK-reconfiguration.patch
02-Oct-2017 16:19      4.2K
rebased-v2.6-0007-WNM-Ignore-WNM-Sleep-Mode-Response-without-pending-r.patch    02-Oct-2017 16:19      1.6K
rebased-v2.6-0008-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch    02-Oct-2017 16:19      2.7K
for CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088
(see
<a  rel="nofollow" href="https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt">https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt</a>
for details)

(martin)

2017-10-17 15:44:00 UTC netbsd-6 commitmail json YAML

2017-10-17 15:43:09 UTC netbsd-6 commitmail json YAML

Apply patch form mlelstv to fix the build after pullup #1506

(martin)

2017-10-17 15:02:31 UTC MAIN commitmail json YAML

Wrap pcb list check with #ifdef DEBUG.

(rjs)

2017-10-17 14:53:23 UTC MAIN commitmail json YAML

Remove function prototype that is no longer required. NFC

(rjs)

2017-10-17 14:48:43 UTC MAIN commitmail json YAML

Update from the latest Intel SDM:
0x5c: Atom (Goldmont)
0x5f: Atom (Goldmont, Denverton)
0x7a: Atom (Goldmont Plus)

(msaitoh)

2017-10-17 12:44:41 UTC netbsd-8 commitmail json YAML

2017-10-17 12:42:06 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by spz in ticket #324):
external/bsd/wpa/dist/src/ap/ieee802_11.c: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa_ft.c: revision 1.2
external/bsd/wpa/dist/src/ap/wpa_auth_i.h: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa.c: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/wpa_i.h: revision 1.2
external/bsd/wpa/dist/src/ap/wpa_auth.h: revision 1.2
external/bsd/wpa/dist/src/rsn_supp/tdls.c: revision 1.2
external/bsd/wpa/dist/src/common/wpa_common.h: revision 1.3
external/bsd/wpa/dist/src/ap/wpa_auth_ft.c: revision 1.2
external/bsd/wpa/dist/wpa_supplicant/wnm_sta.c: revision 1.4
external/bsd/wpa/dist/src/ap/wpa_auth.c: revision 1.10
apply patches from upstream, namely from <a  rel="nofollow" href="https://w1.fi/security/2017-1/">https://w1.fi/security/2017-1/</a> :
rebased-v2.6-0001-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch        02-Oct-2017 16:19      6.1K
rebased-v2.6-0002-Prevent-reinstallation-of-an-already-in-use-group-ke.patch    02-Oct-2017 16:19      7.7K
rebased-v2.6-0003-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch    02-Oct-2017 16:19      6.7K
rebased-v2.6-0004-Prevent-installation-of-an-all-zero-TK.patch
02-Oct-2017 16:19      2.5K
rebased-v2.6-0005-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch
02-Oct-2017 16:19      1.9K
rebased-v2.6-0006-TDLS-Reject-TPK-TK-reconfiguration.patch
02-Oct-2017 16:19      4.2K
rebased-v2.6-0007-WNM-Ignore-WNM-Sleep-Mode-Response-without-pending-r.patch    02-Oct-2017 16:19      1.6K
rebased-v2.6-0008-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch    02-Oct-2017 16:19      2.7K
for CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088
(see
<a  rel="nofollow" href="https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt">https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt</a>
for details)

(martin)

2017-10-17 07:48:10 UTC MAIN commitmail json YAML

2017-10-17 07:33:44 UTC MAIN commitmail json YAML

Have the cpu clear PSL_D automatically when entering the kernel via a
syscall. Then, don't clear PSL_D and PSL_AC in the syscall entry point,
they are now both cleared by the cpu (faster). However they still need to
be manually cleared in the interrupt/trap entry points.

(maxv)

2017-10-17 07:23:08 UTC MAIN commitmail json YAML

Fix buffer length for ipsec_logsastr

(ozaki-r)

2017-10-17 07:13:19 UTC MAIN commitmail json YAML

Don't setup SPs if no policy sepecifier is specified

We expect that SPs are set up iff some policy sepecifier(s) are specified.

Found on investigating an issue reported by Robert Swindells

(ozaki-r)

2017-10-17 07:02:50 UTC MAIN commitmail json YAML

fix comment, rdx, not edx

(maxv)

2017-10-17 06:58:15 UTC MAIN commitmail json YAML

Add support for SMAP on amd64.

PSL_AC is cleared from %rflags in each kernel entry point. In the copy
sections, a copy window is opened and the kernel can touch userland
pages. This window is closed when the kernel is done, either at the end
of the copy sections or in the fault-recover functions.

This implementation is not optimized yet, due to the fact that INTRENTRY
is a macro, and we can't hotpatch macros.

Sent on tech-kern@ a month or two ago, tested on a Kabylake.

(maxv)

2017-10-17 06:50:00 UTC MAIN commitmail json YAML

Update protocol reverse engineering URL to a working one
only mention it once.

From openbsd by Seth Jackson

(maya)

2017-10-17 05:47:09 UTC MAIN commitmail json YAML

Check that the host supports GET_SPEED as well as GET_VERSION
before deciding vmt_probe has succeeded.

qemu supports GET_VERSION but not the RPC protocol so the probe succeeds
but the attach fails, resulting in "vmt0: failed to open backdoor RPC
channel (TCLO protocol)".  All known versions of vmware support GET_SPEED
and no known qemu versions do, so this prevents it from attempting to
attach (and failing) on qemu while still working on vmware.

stop checking vmt_type to avoid having to adapt this code.

- Taken from openbsd

(maya)

2017-10-17 00:26:35 UTC MAIN commitmail json YAML

Explain our implementation choice for implementation-defined values

(maya)

2017-10-16 17:52:10 UTC MAIN commitmail json YAML

simplify previous.

(christos)

2017-10-16 17:36:16 UTC MAIN commitmail json YAML

apply patches from upstream, namely from https://w1.fi/security/2017-1/ :
rebased-v2.6-0001-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch 02-Oct-2017 16:19 6.1K
rebased-v2.6-0002-Prevent-reinstallation-of-an-already-in-use-group-ke.patch 02-Oct-2017 16:19 7.7K
rebased-v2.6-0003-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch 02-Oct-2017 16:19 6.7K
rebased-v2.6-0004-Prevent-installation-of-an-all-zero-TK.patch
02-Oct-2017 16:19 2.5K
rebased-v2.6-0005-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch
02-Oct-2017 16:19 1.9K
rebased-v2.6-0006-TDLS-Reject-TPK-TK-reconfiguration.patch
02-Oct-2017 16:19 4.2K
rebased-v2.6-0007-WNM-Ignore-WNM-Sleep-Mode-Response-without-pending-r.patch 02-Oct-2017 16:19 1.6K
rebased-v2.6-0008-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch 02-Oct-2017 16:19 2.7K

for CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13082 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088

(see
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
for details)

(spz)

2017-10-16 17:08:35 UTC MAIN commitmail json YAML

typo: unvalid -> invalid

(jnemeth)

2017-10-16 15:48:14 UTC MAIN commitmail json YAML

revert; this is section 9 and userland headers are not available in kernel
context.

(christos)

2017-10-16 15:13:01 UTC MAIN commitmail json YAML

We KASSERT((fregs->vfp_fpexc & VFP_FPEXC_EN) == 0) just before, so
enabled is always false. remove.

(bouyer)

2017-10-16 15:08:24 UTC MAIN commitmail json YAML

In the REENABLE case, make sur the fpexc copy in the pcb also has
VFP_FPEXC_EN set. Otherwise we could trap on every context switch even if
the CPU already has the VFP state.

(bouyer)

2017-10-16 15:03:57 UTC MAIN commitmail json YAML

PR port-arm/52603:
There is a race here, as seen on arm with FPU:
LWP L is running but not on CPU, has its FPU state on CPU2 which
has not been released yet, so fpexc still has VFP_FPEXC_EN set in the PCB copy.

LWP L is scheduled on CPU1, CPU1 calls cpu_switchto() for L in mi_switch().
cpu_switchto() will set VFP_FPEXC_EN in the FPU's fpexc register per the
PCB fpexc copy.

Before CPU1 calls pcu_switchpoint() for L, CPU2 calls
pcu_do_op(PCU_CMD_SAVE | PCU_CMD_RELEASE) for L because it still holds its
FPU state and wants to load another lwp. This cause VFP_FPEXC_EN to
be cleared in the PCB copy, but not in CPU1's register. L's l_pcu_cpu is
set to NULL.

When CPU1 calls pcu_switchpoint() for L it see l_pcu_cpu is NULL, and doesn't
call the release callback.

Now CPU1 has its FPU enabled but with the wrong FPU state.

Fix by releasing the PCU even if l_pcu_cpu is NULL.

(bouyer)

2017-10-16 12:50:43 UTC MAIN commitmail json YAML

2017-10-16 12:48:24 UTC MAIN commitmail json YAML

remove Tn, bump date for previous

(wiz)

2017-10-16 11:53:00 UTC MAIN commitmail json YAML

Suggest to include the POSIX <endian.h> rather than BSD <sys/endian.h>

(maya)

2017-10-16 11:38:25 UTC MAIN commitmail json YAML

Add endian.h header.  Simply includes sys/endian.h

<endian.h> has been accepted by the austin group.

(maya)

2017-10-16 11:37:20 UTC MAIN commitmail json YAML

2017-10-16 11:18:43 UTC MAIN commitmail json YAML

Treat EOF as a condition to re-open the pcap socket. Since we've been woken
up by poll(2), there must be data to read. If there is not, our socket might
not be ok anymore.

(christos)

2017-10-16 11:17:45 UTC MAIN commitmail json YAML

Add a message when we are re-opening the pcap socket.

(christos)

2017-10-16 10:10:48 UTC MAIN commitmail json YAML

- Print ci_feat_val[5] (Structured Extended Feature leaf Fn0000_0007 %ebx) on
  AMD, too.
- Print ci_feat_val[6] (Fn0000_0007 %ecx) on Intel.

(msaitoh)

2017-10-16 08:33:48 UTC MAIN commitmail json YAML

A part number field of DDR3 and DDR4 is not NUL terminated. All unused chars
are filled by 0x20. Print it correctly.

Before:
spdmem0 at iic0 addr 0x50: 8KTF51264AZ-1G6E1 E1M^@,DPAFEQZ021
spdmem1 at iic0 addr 0x51: ACR256X64D3U1333C9BA^AM^X
spdmem2 at iic0 addr 0x52: KP223C-ELD        BA^BM-~

After:
spdmem0 at iic0 addr 0x50: 8KTF51264AZ-1G6E1
spdmem1 at iic0 addr 0x51: ACR256X64D3U1333C9
spdmem2 at iic0 addr 0x52: KP223C-ELD

(msaitoh)

2017-10-16 05:52:43 UTC MAIN commitmail json YAML

fix comment - it's WDCTL_IDS which is supposed to disable interrupts

(jdolecek)

2017-10-16 01:50:55 UTC MAIN commitmail json YAML

Setting AT_BASE on static binaries breaks TLS because they assume that
it is 0, will fix it differently.

(christos)

2017-10-15 20:19:09 UTC netbsd-8 commitmail json YAML

2017-10-15 20:18:17 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by msaitoh in ticket #306):
sys/dev/pci/if_wm.c: revision 1.539
- Correct NVM word size check in wm_nvm_version() to prevent
  "EERD polling failed" error on attach. if_wm.c rev. 1.534 was not perfect.
  Reported by ozaki-r@.
- Print NVM offset and word count when EERD polling failed.

(snj)

2017-10-15 19:17:30 UTC MAIN commitmail json YAML

Add copyright and rcs header to the test program.
Also, remove a test case which was not supposed to be there.
(While that test case works with the changes I committed, testing that
test case with the test program is not possible in its current form. I'm
working on that.)

(abhinav)

2017-10-15 18:59:00 UTC MAIN commitmail json YAML

Add support for escaping special characters when doing filename completion.

For instance if the file name is "foo bar":
$ ls foo<TAB>
should get autocompleted to:
$ ls foo\ bar

Works for similar other characters too, which need escaping.

Also, add an accompanying test program to ensure the escaping is correct
in various scenarios (within quotes, without quotes, with other special characeters)

Thanks to Christos for reviews, help and feedback.

(abhinav)

2017-10-15 18:02:33 UTC MAIN commitmail json YAML

explicitely ignore polled xfers in wdcintr(), so it won't be processed
twice - seems setting WDSD_IBM actually has no effect at least
on some PCI-IDE, and the interrupt ends up being triggered when we release
the channel lock to call c_poll hook

fixes PR kern/52605, and should also fix the 'New panic in wdc_ata_bio_intr'
reported on current-users@

(jdolecek)

2017-10-15 15:26:10 UTC MAIN commitmail json YAML

2017-10-15 14:41:07 UTC MAIN commitmail json YAML

move the extra thaw for scheduled ata_reset_channel() to the function itself,
so it's done regardless if the actual reset is run from thread context
or e.g. call with AT_POLL; fixes a hang after xfer failure and dma downgrade

add some debugging printfs, so freeze/thaw issues are easier to track

(jdolecek)

2017-10-15 13:34:24 UTC MAIN commitmail json YAML

Mmh, don't forget to clear the TLS gdt slots on Xen. Otherwise, when doing
a lwp32->lwp64 context switch, the new lwp can use the slots to reconstruct
the address of the previous lwp's TLS space (and defeat ASLR?).

(maxv)

2017-10-15 12:49:53 UTC MAIN commitmail json YAML

Use two separate functions: cpu_segregs32_zero and cpu_segregs64_zero. The
way segment registers work on amd64 will diverge between 32bit and 64bit
LWPs.

(maxv)

2017-10-15 12:01:43 UTC MAIN commitmail json YAML

Fix typo: s/one or mode/one or more/

(pgoyette)

2017-10-15 11:39:42 UTC MAIN commitmail json YAML

Remove this #undef on native amd64, but keep it on Xen.

(maxv)

2017-10-15 11:36:15 UTC MAIN commitmail json YAML

Make sure the 32bit LWPs don't have MDL_IRET set. That's not a problem
right now, but will be in the future.

(maxv)

2017-10-15 11:31:00 UTC MAIN commitmail json YAML

Add setds and setes, will be useful in the future.

(maxv)

2017-10-15 11:27:14 UTC MAIN commitmail json YAML

revert the logic for wdc_wait_for_unbusy() in wdc_ata_bio_intr() to pre-NCQ,
wdcintr() and wdctimeout() need that; follows same change
in atapi_wdc.c rev. 1.128

(jdolecek)

2017-10-15 10:58:32 UTC MAIN commitmail json YAML

2017-10-15 09:33:25 UTC MAIN commitmail json YAML

Simplify array initialisation

(skrll)

2017-10-15 06:37:32 UTC MAIN commitmail json YAML

Descend the page tree from L4 to L1, instead of allocating a separate
branch and linking it at the end. This way we don't need to allocate VA
from the (tiny) prekern map.

(maxv)

2017-10-15 06:15:37 UTC MAIN commitmail json YAML

Update current version of mandoc to 1.14.3

(abhinav)

2017-10-15 04:30:05 UTC MAIN commitmail json YAML

Defer initialization of pf_status.host_id

The call to cprng_fast32() requires that per-cpu data has been initialized
by corng_fast_init(), which doesn't get called until after the first part
of auto-configuration is done, long after pfattach() calls cprng_fast32().

Fixed PR kern/52620

XXX This needs pull-up to the -8 branch.

(pgoyette)

2017-10-15 03:57:47 UTC MAIN commitmail json YAML

Nit-picking: avoid split infinitive

(pgoyette)

2017-10-15 01:28:32 UTC MAIN commitmail json YAML

reorder to avoid null deref before null test

(maya)

2017-10-14 21:21:51 UTC MAIN commitmail json YAML

rc(8): more foo.sh clarification

- Use "inline.sh" instead of "foo.sh".
- Clarify that "inline.sh" scripts will terminate the boot if
  the script causes trhe current shell process to terminate.
- Use "service" instead of "bar.
- Use "sub-shell" instead of "subshell".

Inspired by feedback from kre@

(lukem)

2017-10-14 19:16:26 UTC MAIN commitmail json YAML

PR/52618: Shinichi Doyashiki: Don't exit if adding interface to multicast
group fails. This happens with empty vlan interfaces

- make syscalls checks against -1
- fix errors to print %s: instead of <%s>

XXX: if_vlan is the only pseudo interface in net/ that returns such an
error..

(christos)

2017-10-14 18:41:44 UTC MAIN commitmail json YAML

add test case for new format 'f' and 'F'

(ryo)

2017-10-14 18:41:41 UTC MAIN commitmail json YAML

doesn't work new format 'F' with a strings of length 1, or a string beginning with 'F'

(ryo)

2017-10-14 15:35:02 UTC MAIN commitmail json YAML

2017-10-14 13:20:32 UTC MAIN commitmail json YAML

do not use the NCQ priority by default; seems it negatively affects
performance at least with some drives, so this needs better understood first

(jdolecek)

2017-10-14 13:15:14 UTC MAIN commitmail json YAML

only call drive reset with AT_POLL when the command itself was
polled, so that the logic for AT_POLL matches how e.g. ata_dmaerr() is
called; this was the original intent of the change in 1.428.2.25,
to make the error handling safe wrt. polled xfers

this is stopgap fix for ATA channel wedge after DMA error, as reported
by Martin Husemann in PR kern/52606, and PR kern/52605

problem happened due to ata_reset_channel() being called once in ata_dmaerr()
with flags == 0, which freezed channel and set flag to reset via thread,
then ata_reset_channel() was called via wdc_drive_reset() with AT_POLL, which
just executed the reset and cleared the flag, without clearing the extra
freeze; that logic will be refactored in separate commit

(jdolecek)

2017-10-14 08:22:38 UTC MAIN commitmail json YAML

2017-10-13 13:53:54 UTC MAIN commitmail json YAML

Add the following instruction bits in Structured Extended Flags Enumeration
Leaf from "Intel Architecture Instruction Set Extensions and Future Features
Programming Reference" (319433-030):
AVX512_IFMA
AVX512_VBMI
AVX512_VBMI2
GFNI
VAES
VPCLMULQDQ
AVX512_VNNI
AVX512_BITALG
AVX512_VPOPCNTDQ
AVX512_4VNNIW
AVX512_4FMAPS

(msaitoh)

2017-10-13 10:39:27 UTC MAIN commitmail json YAML

Introduce two functions, and dedup code.

(maxv)

2017-10-13 10:04:27 UTC MAIN commitmail json YAML

Constify offset, it must not change.

(maxv)

2017-10-13 09:43:50 UTC MAIN commitmail json YAML

cast pointers to uintptr_t, not uint64_t - then allow integer promotions
take care of any size differences.

Should fix builds of systems with 32 bit pointers (i386 et al).

(kre)

2017-10-13 08:17:44 UTC MAIN commitmail json YAML

Show 2.5GBASE-T and 5GBASE-T correctly on ixv(4). Tested on a virtual function
on X550 T1.

(msaitoh)

2017-10-13 08:17:26 UTC netbsd-8 commitmail json YAML

2017-10-13 08:14:51 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by pgoyette in ticket #301):
sys/sys/kernhist.h: revision 1.19-1.20
Call sysctl_kernhist_new for KERNHIST_LINK_STATIC.  I can get usbhist
from vmstat(1) again.
--
Use do {...} while 0; construct for KERNHIST_LINK_STATIC()
NFCI

(snj)

2017-10-13 08:12:44 UTC netbsd-7 commitmail json YAML

2017-10-13 08:11:20 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by jakllsch in ticket #1503):
sys/dev/usb/uhidev.c: revision 1.71
sys/dev/usb/ukbd.c: revision 1.137-1.138
Fix memory leak in report parsing error paths.
--
Support more varieties of USB keyboard reports.
The previous code asssumed reports would closely match the Bootstrap
Keyboard Protocol.  This is no longer always the case, particularly
with higher-end keyboards.
--
Always try to set USB HID devices into Report Protocol.  (Unless the
device is known to be quirky.)
Some of the most-widely-compatible methods of implementing USB Keyboard
NKRO depend on this Request to function as designed.
Issuing this Request is recommended by the HID 1.11 spec (7.2.6):
... "the host should not make any assumptions about the device's state
and should set the desired protocol whenever initializing a device."

(snj)

2017-10-13 08:06:09 UTC netbsd-6 commitmail json YAML

2017-10-13 08:05:30 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by mlelstv in ticket #1506):
sys/fs/msdosfs/msdosfs_vfsops.c: revision 1.128
Add more sanity checks for BPB parameters. Handle FAT12 format for media
with sectors >= 32kByte.
Does fix PR 52485.

(snj)

2017-10-13 08:04:37 UTC netbsd-6-1 commitmail json YAML

2017-10-13 08:04:27 UTC netbsd-6-0 commitmail json YAML

2017-10-13 08:03:04 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1505):
sys/arch/i386/i386/i386_trap.S: revision 1.12 via patch
Pfff, use %ss and not %ds. The latter is controlled by userland, the former
contains the kernel value (flat); FreeBSD fixed this too a few weeks ago.
As I said earlier, this dtrace code is complete bullshit.

(snj)

2017-10-13 08:03:02 UTC netbsd-6-1 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1505):
sys/arch/i386/i386/i386_trap.S: revision 1.12 via patch
Pfff, use %ss and not %ds. The latter is controlled by userland, the former
contains the kernel value (flat); FreeBSD fixed this too a few weeks ago.
As I said earlier, this dtrace code is complete bullshit.

(snj)

2017-10-13 08:03:00 UTC netbsd-6-0 commitmail json YAML

Pull up following revision(s) (requested by maxv in ticket #1505):
sys/arch/i386/i386/i386_trap.S: revision 1.12 via patch
Pfff, use %ss and not %ds. The latter is controlled by userland, the former
contains the kernel value (flat); FreeBSD fixed this too a few weeks ago.
As I said earlier, this dtrace code is complete bullshit.

(snj)

2017-10-13 07:57:51 UTC netbsd-6 commitmail json YAML

Pull up following revision(s) (requested by ginsbach in ticket #1504):
usr.sbin/syslogd/syslogd.c: revision 1.124
Use looked up remote host for remote message without a hostname
An incoming remote message may not necessarily have a hostname
between the timestamp and the message. The the source of the remote
sender is already looked up so use that hostname/IP address rather
than the local hostname.

(snj)

2017-10-13 07:04:58 UTC MAIN commitmail json YAML

Note possible need to clean objdir (or depends at least) for
external/bsd/acpica/bin/iasl after build structure change a few days ago.

(kre)

2017-10-13 04:52:40 UTC MAIN commitmail json YAML

Set baudrate correctly. A device which use mii(4) interface can set
if_baudrate atomatically by mii_phy_statusmsg(). ixg(4) and ixv(4) don't
use mii(4), so calling ifmedia_baudrate() directly is required.

XXX need the same same work for wm(4)'s TBI and SERDEV devices.

(msaitoh)

2017-10-13 03:11:50 UTC MAIN commitmail json YAML

2017-10-13 00:11:56 UTC MAIN commitmail json YAML

Wse wide functions to avoid file corruption. Q+D because it does not
use wcwidth().

(christos)

2017-10-12 22:18:27 UTC MAIN commitmail json YAML

2017-10-12 22:17:35 UTC MAIN commitmail json YAML

2017-10-12 20:54:36 UTC MAIN commitmail json YAML

2017-10-12 20:17:27 UTC MAIN commitmail json YAML

Fix PA16 and PA17 function 2; was reserved (NULL), should be "emac".

(jmcneill)

2017-10-12 20:05:42 UTC MAIN commitmail json YAML

2017-10-12 20:03:38 UTC MAIN commitmail json YAML

2017-10-12 19:59:22 UTC MAIN commitmail json YAML

Trailing whitespace

(skrll)

2017-10-12 18:27:38 UTC MAIN commitmail json YAML

When growing the state, remember to grow the seed array, otherwise we'll end
up accessing memory we did not allocate.

(christos)

2017-10-12 09:53:55 UTC MAIN commitmail json YAML

Add a locking notes for if_spppsubr

(knakahara)

2017-10-12 09:50:55 UTC MAIN commitmail json YAML

Add a locking notes for if_pppoe

(knakahara)

2017-10-12 09:49:43 UTC MAIN commitmail json YAML

sppp_lock is changed from mutex to rwlock now. Contributed by s-yamaguchi@IIJ.

Add locking notes later.

(knakahara)

2017-10-12 09:48:53 UTC MAIN commitmail json YAML

Exclude Enhanced Apple Sound Chip (EASC) without support for wavetable mode
used by asc(4).

(flxd)

2017-10-12 09:47:22 UTC MAIN commitmail json YAML

Integrate two locks used to protect PPPoE softc. Contributed by s-yamaguchi@IIJ.

PPPOE_SESSION_LOCK protects variables used in PPP packet
processing, on the other hand PPPOE_PARAM_LOCK protects
the other variables used to establish a PPPoE session id.

Those locks isn't acquired in the same time because the
PPP packet processing doesn't work without PPPoE session id.
By the reason, the locks can be integrated into PPPOE_LOCK.

Add locking notes later.

(knakahara)

2017-10-12 05:51:51 UTC MAIN commitmail json YAML

return 0xffffffffffffffff (= -1). not 0x00000000ffffffff.

(ryo)

2017-10-12 05:00:23 UTC MAIN commitmail json YAML

fix compile error without USE_PAM (-Werror,-Wmissing-noreturn)

(ryo)

2017-10-12 03:31:39 UTC MAIN commitmail json YAML

Mention NOMPSAFE

(ozaki-r)

2017-10-12 03:27:00 UTC MAIN commitmail json YAML

add opencrypto(9)'s scalability comment

(knakahara)

2017-10-12 03:07:39 UTC MAIN commitmail json YAML

Mention MP-ifications of bpf, vlan, opencrypto and ipsec

(ozaki-r)

2017-10-12 02:40:59 UTC MAIN commitmail json YAML

Set IFEF_START_MPSAFE by default

Because vlan_start is already MP-safe, there is no reason to not do so.

Acked by s-yamaguchi@IIJ

(ozaki-r)

2017-10-12 02:40:34 UTC MAIN commitmail json YAML

IOMMU cap dump fixes:
- Print Capability Register's value.
- Indent output correctly.
- s/cahced/cached/
- Print MSI Message number with 0x%02x

(msaitoh)

2017-10-11 23:42:33 UTC MAIN commitmail json YAML

Clarify foo.sh behaviour

Improve wording of the warning for "foo.sh" behaviour,
to reduce ambiguity.
Per feedback from Sascha Wildner.

(lukem)

2017-10-11 22:55:18 UTC netbsd-8 commitmail json YAML

2017-10-11 22:54:10 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by christos in ticket #319):
distrib/sets/lists/comp/mi: revision 1.2150
distrib/sets/lists/comp/mi: revision 1.2149
Don't install stdatomic.h if we don't have gcccmds. This is prolly the wrong
fix but only sun2 is affected. Perhaps it is better to descend into
usr.bin/include and install there because that also installs tgmath.h and
unfortunately math-68881.h...
Missed a "C"

(snj)

2017-10-11 22:49:49 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by christos in ticket #318):
distrib/sets/lists/base/md.amd64: revision 1.271 via patch
distrib/sets/lists/base/shl.mi: revision 1.820, 1.821
distrib/sets/lists/comp/shl.mi: revision 1.307
distrib/sets/lists/debug/ad.arm: revision 1.75
distrib/sets/lists/debug/md.amd64: revision 1.99
distrib/sets/lists/debug/shl.mi: revision 1.182, 1.183
distrib/sets/lists/xbase/shl.mi: revision 1.78
distrib/sets/lists/xdebug/shl.mi: revision 1.41
external/bsd/atf/lib/libatf-c++/shlib_version: revision 1.3
external/bsd/libproc/lib/Makefile: revision 1.4
external/gpl3/gcc/lib/libasan/shlib_version: revision 1.3
external/gpl3/gcc/lib/libstdc++-v3/Makefile: patch
external/gpl3/gcc/lib/libubsan/shlib_version: revision 1.2
external/mit/xorg/lib/libGL/shlib_version: revision 1.3
external/mit/xorg/lib/libGLU/shlib_version: revision 1.4
external/mit/xorg/lib/libglapi/Makefile: revision 1.2
bump libstdc++ to account for disabling the "dual abi".
bump because of libstdc++
bump because of libstdc++
bump because libstdc++
bump libraries that depend on libstdc++.
bump c++ libraries because of the libstdc++ dual abi bump
bump libglapi, libGL libGLU because of the libstdc++ dual abi bump

(snj)