--- - branch: netbsd-8 date: Tue May 15 13:48:37 UTC 2018 files: - new: 1.216.6.6 old: 1.216.6.5 path: src/sys/net/bpf.c pathrev: src/sys/net/bpf.c@1.216.6.6 type: modified - new: 1.394.2.10 old: 1.394.2.9 path: src/sys/net/if.c pathrev: src/sys/net/if.c@1.394.2.10 type: modified - new: 1.134.6.10 old: 1.134.6.9 path: src/sys/net/if_bridge.c pathrev: src/sys/net/if_bridge.c@1.134.6.10 type: modified id: 20180515T134837Z.2ff984386509fc174a8898c790274f91e74cd475 log: "Pull up following revision(s) (requested by ozaki-r in ticket #826):\n\n\tsys/net/if_bridge.c: revision 1.155\n\tsys/net/if.c: revision 1.421\n\tsys/net/bpf.c: revision 1.224\n\tsys/net/if.c: revision 1.422\n\tsys/net/if.c: revision 1.423\n\nUse if_is_mpsafe (NFC)\n\nProtect packet input routines with KERNEL_LOCK and splsoftnet\nif_input, i.e, ether_input and friends, now runs in softint without any\nprotections. It's ok for ether_input itself because it's already MP-safe,\nhowever, subsequent routines called from it such as carp_input and agr_input\naren't safe because they're not MP-safe. \ Protect if_input with KERNEL_LOCK.\nif_input can be called from a normal LWP context. In that case we need to\nprevent interrupts (softint) from running by splsoftnet to protect\nnon-MP-safe\ncodes (e.g., carp_input and agr_input).\n\nPointed out by mlelstv@\n\nProtect if_deferred_start_softint with KERNEL_LOCK if the interface isn't\nMP-safe\n" module: src subject: 'CVS commit: [netbsd-8] src/sys/net' unixtime: '1526392117' user: martin