Link [ NetBSD | NetBSD OpenGrok source search | PR fulltext-search | Summary of daily snapshot builds | history of daily build result | pkgsrc commit viewer ]


   
        usage: [branch:branch] [user:user] [path@revision] keyword [... [-excludekeyword [...]]] (e.g. branch:MAIN sys/arch/arm, if_wm.c@1.234 )




switch to index mode

recent branches: MAIN (44m)  netbsd-10 (4d)  netbsd-9 (4d)  netbsd-8 (8d) 

2024-05-20 14:18:29 UTC Now

2024-03-24 20:27:33 UTC netbsd-10 commitmail json YAML

2024-03-24 20:27:04 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by martin in ticket #645):
usr.sbin/sysinst/gpt.c: revision 1.32
PR 58061: fix bug in the GPT backend: when inserting a partition
(i.e. not adding it at the end) a bogus ID was returned for the new
partition.

(bouyer)

2024-03-24 20:26:14 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by martin in ticket #644):
usr.sbin/sysinst/configmenu.c: revision 1.19
PR 58062: fix a bug I introduced with the https support: update
the pkgsrc/binary pkgs download URL not only when https transport
is selected.

(bouyer)

2024-03-24 20:24:29 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by martin in ticket #643):
distrib/notes/prep/contents: revision 1.8
distrib/notes/hpcsh/contents: revision 1.9
distrib/notes/ews4800mips/contents: revision 1.8
distrib/notes/evbarm/contents: revision 1.16
distrib/notes/newsmips/contents: revision 1.8
distrib/notes/landisk/contents: revision 1.9
distrib/notes/arc/contents: revision 1.8
distrib/notes/sun2/contents: revision 1.8
distrib/notes/vax/contents: revision 1.17
distrib/notes/mac68k/contents: revision 1.26
distrib/notes/cats/contents: revision 1.8
distrib/notes/mvme68k/contents: revision 1.19
distrib/notes/rs6000/contents: revision 1.8
distrib/notes/i386/contents: revision 1.36
distrib/notes/alpha/contents: revision 1.26
distrib/notes/hpcmips/contents: revision 1.16
distrib/notes/sparc64/contents: revision 1.13
distrib/notes/hpcarm/contents: revision 1.9
distrib/notes/emips/contents: revision 1.8
distrib/notes/sun3/contents: revision 1.22
distrib/notes/common/main: revision 1.573
distrib/notes/x68k/contents: revision 1.23
distrib/notes/sgimips/contents: revision 1.8
distrib/notes/sandpoint/contents: revision 1.8
distrib/notes/mmeye/contents: revision 1.9
distrib/notes/common/main: revision 1.574
distrib/notes/pmax/contents: revision 1.23
distrib/notes/shark/contents: revision 1.8
distrib/notes/sparc/contents: revision 1.30
distrib/notes/vax/xfer: revision 1.16
distrib/notes/news68k/contents: revision 1.12
distrib/notes/common/sysinst: revision 1.113
distrib/notes/hp300/contents: revision 1.23
distrib/notes/next68k/contents: revision 1.13
distrib/notes/amiga/contents: revision 1.26
distrib/notes/hppa/contents: revision 1.8
distrib/notes/acorn32/contents: revision 1.8
distrib/notes/ofppc/contents: revision 1.9
distrib/notes/common/contents: revision 1.187
distrib/notes/macppc/contents: revision 1.20
distrib/notes/evbppc/contents: revision 1.10
distrib/notes/atari/contents: revision 1.26
distrib/notes/amd64/contents: revision 1.14
distrib/notes/bebox/contents: revision 1.8
Various style fixes (and some of VAX related errors and copy&pastos),
from Mouse on tech-install.
Use single-arg "Lk" macro for a link so we can get reasonable results
both in .more and .html output (still a bit odd, but better than before IMHO).

(bouyer)

2024-03-09 18:27:00 UTC netbsd-10 commitmail json YAML

2024-03-09 18:25:30 UTC netbsd-10 commitmail json YAML

Apply patch, requested by martin in ticket #623:
external/bsd/tcpdump/dist/print-ppp.c patch

Apply upstream commit 32027e199368dad9508965aae8cd8de5b6ab5231
to fix CVE-2020-803:

  PPP: When un-escaping, don't allocate a too-large buffer.

  The buffer should be big enough to hold the captured data, but it
  doesn't need to be big enough to hold the entire on-the-network packet,
  if we haven't captured all of it.

fixes PR 57586

(bouyer)

2023-12-22 10:22:00 UTC MAIN commitmail json YAML

sanity check the fragments we get from the guest and reject the whole packet
if it fails. Make sure we don't KASSERT() on data we get from the frontend.

(bouyer)

2023-11-26 12:55:27 UTC netbsd-10 commitmail json YAML

2023-11-26 12:53:08 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by martin in ticket #474):
usr.sbin/sysinst/partman.c: revision 1.57
PR 57698: avoid a few potential sysinst crashes in environments where
not all binaries are available - e.g. w/o cgdconfig(8) the "cgds" pointer
would be NULL (as there can't be any) and we crashed when naively
dereferencing it.

(bouyer)

2023-11-26 12:51:24 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by kre in ticket #473):
crypto/external/bsd/libsaslc/lib/Makefile: revision 1.11
move line to avoid deprecated declaration errors outside of the kerberos b=
lock.

(bouyer)

2023-11-26 12:40:50 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by martin in ticket #471):
usr.sbin/sysinst/label.c: revision 1.50
usr.sbin/sysinst/util.c: revision 1.74
Force alignment of disk buffers to at least 8 byte.
Fixes PR 56434.

(bouyer)

2023-11-26 12:38:56 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by thorpej in ticket #470):
sys/dev/pci/pciide_common.c: revision 1.70
pciide_dma_dmamap_setup(): If we end up with a DMA segment with an odd
length or odd starting address, unload the map and return EINVAL.  Some
controllers get really upset if a DMA segment has an odd address or length.
This can happen if a physio user performs a virtually-contiguous I/O that
starts at an odd address and spans a page boundary where the resulting
physical pages are discontiguous.  The EINVAL return will cause the upper
layers in the ATA code to re-try the I/O using PIO, which should (will
in all of my tests) succeed.
PR port-alpha/56434

(bouyer)

2023-11-26 12:35:26 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by tsutsui in ticket #469):
external/gpl3/binutils/dist/gas/config/tc-mips.c: revision 1.25
external/gpl3/binutils.old/dist/gas/config/tc-mips.c: revision 1.8
binutils: fix gas that doesn't handle MIPS1 FPR load hazard correctly.
Fixes PR/57680.
Should be pulled up to netbsd-10, netbsd-9, and netbsd-8.
binutils.old: apply the same fix for mips gas from binutils.
binutils: fix gas that doesn't handle MIPS1 FPR load hazard correctly.
Fixes PR/57680.

(bouyer)

2023-11-26 12:33:19 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by riastradh in ticket #468):
sys/kern/sys_eventfd.c: revision 1.10
eventfd(2): Omit needless micro-optimization causing PR kern/57703.
Unfortunately, owing to PR kern/57705 and PR misc/57706, it isn't
convenient to flip the xfail switch on a test for this bug.  So we'll
do that separately.  (But I did verify that a rumpified version of
the test postd to PR kern/57703 failed without this change, and
passed with this change.)
PR kern/57703
XXX pullup-10

(bouyer)

2023-11-26 12:29:49 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by thorpej in ticket #467):
common/lib/libprop/prop_string.c: revision 1.18
In _prop_string_instantiate(), when we de-dup a non-MUTABLE string, make
sure we free the provided string buffer if NOCOPY is not set.  Fixes
a memory leak reported by M. Boerschig.
While we're at it, also change _prop_string_instantiate() to free the
provided string buffer in the not-NOCOPY case when string object allocation
fails (this was previously handled by _prop_string_instantiate()'s
callers).
PR lib/57699

(bouyer)

2023-11-26 12:26:23 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by tsutsui in ticket #466):
xsrc/external/mit/xf86-input-keyboard/dist/src/ws_KbdMap.c: revision 1.1
xsrc/external/mit/xf86-input-keyboard/dist/src/bsd_kbd.h: revision 1.5
xsrc/external/mit/xf86-input-keyboard/dist/src/bsd_kbd.c: revision 1.22
xsrc/external/mit/xf86-input-keyboard/dist/src/kbd.c: revision 1.9
src/external/mit/xorg/server/drivers/xf86-input-keyboard/Makefile: revision 1.23
xf86-input-keyboard: add suppport to get keymap via WSKBDIO_GETMAP ioctl(2).
No particular comment on tech-x11@:
https://mail-index.netbsd.org/tech-x11/2023/10/31/msg002415.html
https://mail-index.netbsd.org/tech-x11/2023/11/04/msg002416.html
Tested on NWS-3260 and NWS-3470 with Xorg 1.10 server in netbsd-9.
Worth to pullup to netbsd-10 and netbsd-9.
xf86-input-keyboard: add build glue to enable USE_WSKBD_GETMAP.

(bouyer)

2023-11-26 12:19:22 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by jdc in ticket #465):
external/mit/xf86-video-pnozz/dist/src/pnozz_exa.c: revision 1.5
external/mit/xf86-video-pnozz/dist/src/pnozz_exa.c: revision 1.6
Revert r1.4.
The changes are minimal and they cause redraw problems (as reported by
Maxim Devaev on port-sparc).
Add NetBSD keyword.

(bouyer)

2023-11-26 12:16:31 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by brad in ticket #464):
sys/dev/gpio/gpioirq.c: revision 1.3
For /dev/ reads against gpioirq(4) implement the following:
o O_NONBLOCK on reads
o Add a d_poll function and associated sel[init|notify|record|destroy]
  calls to the driver so that select(2) and poll(2) work as expected.
With these in place async use cases work against /dev/gpioirqN

(bouyer)

2023-11-26 12:13:19 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by brad in ticket #463):
share/man/man4/gpiosim.4: revision 1.7
sys/dev/gpio/gpiosim.c: revision 1.25
Simple simulated interrupts for the simulated GPIO device gpiosim(4)

(bouyer)

2023-11-26 11:54:31 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by tsutsui in ticket #462):
sys/arch/newsmips/dev/dmac_0448.h: revision 1.7
sys/arch/newsmips/dev/scsi_1185.c: revision 1.25
Use DELAY(9), not empty for() loop that could be optimized out.
No visible regression on NWS-3260 and NWS-3470.

(bouyer)

2023-11-26 11:45:16 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by brad in ticket #461):
sys/dev/gpio/gpiovar.h: revision 1.19
share/man/man4/gpioirq.4: revision 1.4 via patch
sys/dev/gpio/gpio.c: revision 1.73
etc/MAKEDEV.tmpl: revision 1.234
sys/conf/majors: revision 1.103
sys/dev/gpio/gpioirq.c: revision 1.2
gpioirq(4) version 2
This update makes this driver more than just an example and allows for:
o More than one pin to be attached to a gpioirq instance.  That is,
  the mask parameter can be greater than 0x01 now.
o A /dev/gpioirqN device that allows GPIO pin interrupts to be
  transported into userland.  This is a device that can be opened for
  reading with a simple fixed output indicating the device unit, pin
  number and current pin state.
This update was used as part of a physical intrusion detection system
where multiple switches (i.e. window magnetic reed switches and etc.)
are tied to a bunch of GPIO inputs with userland software that reacts
to the pins changing state.

(bouyer)

2023-11-26 11:37:03 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by jdolecek in ticket #460):
sys/dev/pci/if_ena.c: revision 1.35
sys/dev/pci/if_ena.c: revision 1.36
sys/dev/pci/if_ena.c: revision 1.37
sys/dev/pci/if_ena.c: revision 1.38
sys/dev/pci/if_ena.c: revision 1.39
sys/external/bsd/ena-com/ena_plat.h: revision 1.10
sys/dev/pci/if_enavar.h: revision 1.9
sys/external/bsd/ena-com/ena_com.c: revision 1.2
sys/external/bsd/ena-com/ena_com.c: revision 1.3
sys/external/bsd/ena-com/ena_com.c: revision 1.4
sys/dev/pci/if_ena.c: revision 1.40
sys/external/bsd/ena-com/ena_com.h: revision 1.2
ena(4): replace malloc(9) to kmem(9)
Code contributed by KUSABA Takeshi <t-kusaba@iij.ad.jp>
ena(4): prevent AENQ handler from use-after-free
Code contributed by KUSABA Takeshi <t-kusaba@iij.ad.jp>
ena(4): destroy all wait_event
Code contributed by KUSABA Takeshi <t-kusaba@iij.ad.jp>
ena(4): support RSS and delete FreeBSD-specified code
Code contributed by KUSABA Takeshi <t-kusaba@iij.ad.jp>
ena(4) is MP-ready, always use MPSAFE
Code contributed by KUSABA Takeshi <t-kusaba@iij.ad.jp>
ena(4): establish interrupt after setting up resources
Code contributed by KUSABA Takeshi <t-kusaba@iij.ad.jp>
ena(4): stop management first when detaching
Code contributed by KUSABA Takeshi <t-kusaba@iij.ad.jp>

(bouyer)

2023-10-19 14:59:46 UTC MAIN commitmail json YAML

Move definition of acpi_md_vesa_modenum to acpi_wakeup.c; allows building
kernels without framebuffer devices.
Problem reported by John D. Baker on current-users@

(bouyer)

2023-10-17 16:09:12 UTC MAIN commitmail json YAML

for a dom0 PVH, the dom0_vga_console_info structure has to be retrieved
using a platform hypercall; do so in the XENPVHVM case.
Now genfb works in a PVH dom0 running on Xen 4.18 (Xen 4.15 doesn't support
this platoform op, so no way to make it work here).

(bouyer)

2023-10-17 16:06:37 UTC MAIN commitmail json YAML

XENPVH option is not used. Fix consinit.c to use XENPVHVM as intended
and XENPVH from defflag

(bouyer)

2023-10-17 16:02:55 UTC MAIN commitmail json YAML

Add XENPF_get_dom0_console, which gets a dom0_vga_console_info stucture
from the hypervisor. To be used by PVH dom0 kernels.

(bouyer)

2023-10-17 14:15:54 UTC MAIN commitmail json YAML

Add ext_lfb_base to dom0_vga_console_info, from recent Xen. We know if it's
present or not by checking dom0.info_size

(bouyer)

2023-10-17 13:30:57 UTC MAIN commitmail json YAML

2023-10-17 13:27:58 UTC MAIN commitmail json YAML

Make sure to always fall back to xen_early_console, even for dom0

(bouyer)

2023-10-17 12:07:42 UTC MAIN commitmail json YAML

Support non-VGA framebuffers for Xen dom0. This is mandatory for graphic
console on EFI-only hardware.
Add a xen_genfb_getbtinfo() function which will return a btinfo_framebuffer
    structure, filled in with parameters provided by Xen
when runing as a Xen dom0, call xen_genfb_getbtinfo() instead of
    lookup_bootinfo(BTINFO_FRAMEBUFFER) when adding properties to the
    PCI graphic device (when genfb is attached) and in x86_genfb_init()
    when genfb is used as console.
x86/x86/consinit.c: If running as a Xen dom0, use xen_genfb_getbtinfo()
    to check if we have a genfb console
xen/x86/consinit.c: support genfb as possible console
xen/x86/consinit.c: use the hypervior IO as console until a better one
    is found. If the hypervisor is using a serial port for boot messages,
    we'll get NetBSD's boot message on the serial port too until
    the real console takes over.
xen/x86/autoconf.c: rework device_register() to be closer to the x86 version.
    Especially make sure that device_pci_register() is called.

(bouyer)

2023-10-17 11:52:45 UTC MAIN commitmail json YAML

xenbus: if dom0 support is not compiled in, panic with a usefull message
instead of waiting for an event which will never happen

(bouyer)

2023-10-16 17:31:18 UTC MAIN commitmail json YAML

Move the pvh_xencons so xen_machdep.c as early_xencons, so it can be
used in the future as early ouput for plain PV guests too.

(bouyer)

2023-10-16 17:29:31 UTC MAIN commitmail json YAML

Xen's start_info_t is larger than 512 bytes these days, so bump the copy
size to a whole PAGE_SIZE, and CTASSERT() that start_info_t is smaller.
Luckily we didn't use yet the parts skipped

(bouyer)

2023-10-16 17:27:03 UTC MAIN commitmail json YAML

Declare
int acpi_md_vesa_modenum;
int acpi_md_vbios_reset;
struct vcons_screen x86_genfb_console_screen;

in genfb_machdep.h instead of locally as extern in various .c files.

(bouyer)

2023-09-13 15:58:13 UTC MAIN commitmail json YAML

handle EHOSTDOWN the same way as EHOSTUNREACH in sctp_med_chunk_output().
Compile-tested only (I don't have a sctp setup); proposed in
http://mail-index.netbsd.org/tech-net/2023/09/11/msg008611.html
LGTM from Greg Troxel and Robert Swindells

(bouyer)

2023-09-13 15:54:28 UTC MAIN commitmail json YAML

Handle EHOSTDOWN the same way as EHOSTUNREACH and ENETDOWN for established
connections. Avoid premature end of tcp connection with "Host is down" error
in case of transient link-layer failure.
Discussed and patch proposed in
http://mail-index.netbsd.org/tech-net/2023/09/11/msg008610.html
and followups.

(bouyer)

2023-09-12 12:56:21 UTC MAIN commitmail json YAML

Remove now-unneeded and brocken (probably since dts-5.15 import)
sun8i-h3-orangepi-one.dts, and let the build use the one from sys/external.
Problem reported and fix tested by Dave Tyson as reported on port-arm@
While there remove #include "sun8i-h3.dtsi" from sun8i-h3-orangepi-plus2e.dts,
this file has been removed with the dts-5.15 import.

(bouyer)

2023-09-10 15:23:01 UTC MAIN commitmail json YAML

If Xen system time went backward, instead of ignoring the event assume
one tick passed and reinitialise the local state.
If we need to call the hardclock timer several time to catch up missed events,
don't do more than one second in a single event; and schedule the next
event faster.

Hopefully fixes occasionnal
panic: cpu1: time has not advanced in 1501 heartbeats
or
panic: cpu0: softints stuck for 16 seconds
seen in daily Xen atf runs.

(bouyer)

2023-07-25 16:15:50 UTC MAIN commitmail json YAML

Propoerly handle 4k sector size backends:
- report the backend's sector size to upper layers, not DEV_BSIZE.
  Adjust the number of sectors accordingly.
- Use sc_secsize instead of XEN_BSIZE where appropriate. The sectors numbers
  in I/O requests are still in XEN_BSIZE units, but must be a multiple
  of sc_secsize/XEN_BSIZE.
- As a consequence of previous, the buffer has to be aligned to sc_secsize,
  aligned to XEN_BSIZE may not be enough. This means that we may have to
  xbd_map_align() more buffer, including some without B_PHYS set.
- Add some more DPRINTF lines, related to I/O requests

Tested with a linux dom0.
thanks to Christian Kujau for providing access to his hardware for testing
and debugging.

(bouyer)

2023-07-21 11:28:50 UTC MAIN commitmail json YAML

Also use XEN_BSIZE when computing the number of bytes for format_bytes().
While there note in a comment that sc_sectors is in XEN_BSIZE units

(bouyer)

2023-07-21 11:21:56 UTC MAIN commitmail json YAML

The disk size reported in the xenstore is always in XEN_BSIZE units,
not sector-size. Should fix the issue reported by Christian Kujau
on netbsd-users and port-xen.

(bouyer)

2023-07-17 10:12:54 UTC MAIN commitmail json YAML

Unmask event after arming the one-shot timer in clock initialisation,
to avoid a possible race with xen_timer_handler() updating
ci_xen_hardclock_systime_ns while we're reading it.
Pointed out by Taylor R Campbell

(bouyer)

2023-07-07 15:13:41 UTC MAIN commitmail json YAML

Unmask event after VCPUOP_stop_periodic_timer and
initializing ci->ci_xen_hardclock_systime_ns, to avoid a possible race with
xen_timer_handler()

(bouyer)

2023-06-30 18:10:44 UTC netbsd-10 commitmail json YAML

2023-06-30 18:10:12 UTC netbsd-10 commitmail json YAML

Pull up following revision(s) (requested by martin in ticket #220):
usr.bin/dc/bcode.c: revision 1.4
Make this compile when BIGNUM limbs (BN_ULONG) are not the same
size as "unsigned long" (e.g. in bn(64/32) configurations of openssl).

(bouyer)

2023-05-24 16:43:40 UTC MAIN commitmail json YAML

introduce imx6sx_platform_bootstrap(), which calls imx_platform_bootstrap()
and then checks for an "arm,cortex-a9-twd-timer" compatible entry in the
fdt. If not present, create one so that a9ptmr will attach.
We need this entry as this is the only timer we support for this platform,
but the upstream imx6sx.dtsi is missing the entry for it (and all A9 CPUs
have it anyway).

Thanks to Jared McNeill for advices and review.

(bouyer)

2023-05-05 09:34:10 UTC MAIN commitmail json YAML

remove commented out entries, leftover from the imx6q ccm code.

(bouyer)

2023-05-05 09:29:35 UTC MAIN commitmail json YAML

Fix typo, preventing i2c4 from attaching

(bouyer)

2023-05-04 17:09:45 UTC MAIN commitmail json YAML

The i.mx6sx has 2 OTG and one host-only USB controller, while the 6q has
only one OTG.
Add a "uintptr_t data" argument to all sc_*_md_hook callbacks, which
gets the sc_md_hook_data value when called.
In imx6_usb.c use this to pass the number of OTG controllers to the callbacks.
imx6_usb_init() can then properly call init_otg() or init_h1() for unit 1.

In imx6_usb_attach(), test if there is a vbus-supply property in the fdt,
and enable the regulator if present.

Now the USB port of the UDOO Neo works.

(bouyer)

2023-05-04 13:41:46 UTC MAIN commitmail json YAML

2023-05-04 13:39:51 UTC MAIN commitmail json YAML

experimental IMX6SX support:
- add options SOC_IMX6SX
- add imx6sxccm device

tested on a UDOO Neo Full board.
known to work:
- uart (console)
- sdmmc0
- ethernet (enet0)

known to not work:
- USB (device not detected).

needs a modified device tree at this time (add arm,cortex-a9-twd-timer entry
copied from the imx6qdl dtsi); for unkown reason the imx6sx.dtsi file lacks
an entry for the a9ptmr although it is present in the soc (and, from what I
understood, in all cortex A9 SoCs).

(bouyer)

2023-05-04 13:31:37 UTC MAIN commitmail json YAML

Also build dtb files for CONFIG_SOC_IMX6SX

(bouyer)

2023-05-04 13:29:33 UTC MAIN commitmail json YAML

2023-05-04 13:28:05 UTC MAIN commitmail json YAML

i.mx6sx platform support:
- the i.mx6sx has a third AIPS, so KERNEL_IO_IOREG map has to be larger
- the uart clock is at 24Mhz instead of 80.

(bouyer)

2023-05-04 13:25:07 UTC MAIN commitmail json YAML

i.mx6sx CPU support in the CCM module: the clock tree si different from
the i.mx6q
- move i.mx6q-specific functions and data to imx6_clk.c
- add i.mx6sx specific imx6sx_clk.c
- add a imx6sxccm device

(bouyer)

2023-04-14 17:46:00 UTC MAIN commitmail json YAML

In preparation of imx6sx support, move imx6q-specific definitions from
imx6_ccm.c to imx6_clk.c, and prefix with IMX6Q/imx6q:
- Clock IDs and related struct imx_clock_id
- Clock Parents and Divider Tables
- struct imx6_clk
and related static functions

Add a pointer to struct imx6_clk, and it's size to imx6ccm_softc
Pass a pointer to imx6ccm_softc to all functions from imx6_ccm.c

NFCI

(bouyer)

2023-03-24 12:28:42 UTC MAIN commitmail json YAML

Allow a PVH dom0 to use VGA as console: make xen_pvh_consinit() return 1 if
it handles the console and 0 otherwise (especially when console=tty0 or
console=pc is present on the command line).
In consinit() fallback to native console selection if xen_pvh_consinit()
returns 0.

(bouyer)

2023-03-24 12:25:28 UTC MAIN commitmail json YAML

mpacpi_config_cpu(): Xen with a PVH dom0 reports x2apic->LocalApicId
below 0xff, which causes a panic later because no CPUs are attached.
Accept the bogus LocalApicId value for VM_GUEST_XENPVH.

(bouyer)

2023-03-24 12:22:52 UTC MAIN commitmail json YAML

extattr_set_vp(): properly handle XATTR_REPLACE flags, FFSv2ea will return
ENOATTR, not ENODATA if the attribute is missing.

Makes glusterfs 10 run on a FFSv2ea file system.

(bouyer)

2022-12-23 16:05:44 UTC MAIN commitmail json YAML

x86_add_cluster() takes the end of the segment, not the size.
Should fix PR port-xen/57121

(bouyer)

2022-10-16 17:23:40 UTC bouyer-sunxi-drm commitmail json YAML

sunxi_tcon1_set_videomode: use DRM_MODE_FLAGS_*

(bouyer)

2022-10-16 17:21:46 UTC bouyer-sunxi-drm commitmail json YAML

2022-10-16 17:11:05 UTC bouyer-sunxi-drm commitmail json YAML

Propagate videomode back to tcon

(bouyer)

2022-10-16 17:08:47 UTC bouyer-sunxi-drm commitmail json YAML

Abandon sunxi_lcdc for the A20, there's too much pieces missing.
Convert sunxi_tcon to drm. Actually it's connected to DRM only when
in LVDS mode; for HDMI sunxi_hdmi does the interface.

(bouyer)

2022-10-16 14:56:04 UTC bouyer-sunxi-drm commitmail json YAML

2022-10-02 10:40:41 UTC bouyer-sunxi-drm commitmail json YAML

Update config for new DRM world.

(bouyer)

2022-10-02 10:37:13 UTC bouyer-sunxi-drm commitmail json YAML

2022-09-29 10:27:02 UTC MAIN commitmail json YAML

Convert from pci_intr_map() to pci_intr_alloc(); makes the driver use
MSI/MSI-x when available. Tested by Edgar Fu�.

(bouyer)

2022-09-22 16:21:34 UTC MAIN commitmail json YAML

Fix fallout from previous: ci_ipending is in the low bytes of ci_istate,
so we should not left-shift by 8 the ci_ipending value we want to add there.
Should fix KASSERT in Xen's idle_block() reported by Frank Kardel in private
mail.

(bouyer)

2022-09-21 20:21:16 UTC MAIN commitmail json YAML

Just skipping sunxi_can_rx_intr() if the DATA_OR flag is set isn't enough
to properly recover from overrrun in all case. So go the linux way and reset
the hardware.

Don't write SUNXI_CAN_INT_RX_FLAG to SUNXI_CAN_INT_REG, this could race
with hardware and clear the interrupt while there are new packets received.
SUNXI_CAN_INT_RX_FLAG clears automatically when all pending packets have been
read, so when no more packets are pending just read SUNXI_CAN_INT_REG again
and process other interrupts, if any (or RX if there are new packets pending).
With this change it seems I get overruns less often in my use case.

(bouyer)

2022-09-19 11:21:36 UTC MAIN commitmail json YAML

Don't process RX if SUNXI_CAN_INT_DATA_OR is pending. Seems to fix occasional
RX stalls

(bouyer)

2022-09-04 11:20:33 UTC MAIN commitmail json YAML

Release mutexes earlier in xenevt_free(), to call *destroy and kmem_free
without holding spin locks. Fixes an occasional deadlock seen when the qemu
backing a HVM domU exits.

(bouyer)

2022-09-01 16:28:08 UTC MAIN commitmail json YAML

Call extent_alloc_subregion() with EX_MALLOCOK; under heavy I/O load we need
lots of them and the preallocatted extent descriptors are not enough.

(bouyer)

2022-09-01 16:25:18 UTC MAIN commitmail json YAML

process_msg() is called from thread context, so malloc() can wait for
memory. Should avoids occasional ENOMEM reading messages

(bouyer)

2022-09-01 15:33:23 UTC MAIN commitmail json YAML

in backend drivers, use xen_shm_(un)map for the rings instead of inline,
mostly duplicate code.

(bouyer)

2022-09-01 15:32:16 UTC MAIN commitmail json YAML

Redo previous; kill the right printf()

(bouyer)

2022-09-01 12:36:14 UTC MAIN commitmail json YAML

xen: Add experimental support for PVH dom0.

(bouyer)

2022-09-01 12:35:02 UTC MAIN commitmail json YAML

Add commented out experimental PVH dom0 options and pseudo-device

(bouyer)

2022-09-01 12:31:26 UTC MAIN commitmail json YAML

Remove a noisy printf; HVM guests triggers it (a lot) and it seems to be
expected.

(bouyer)

2022-09-01 12:29:00 UTC MAIN commitmail json YAML

2022-09-01 12:26:00 UTC MAIN commitmail json YAML

Adjust privcmd_notify() so it has a chance to work in a PVH environnement too.

(bouyer)

2022-08-31 14:00:44 UTC MAIN commitmail json YAML

If we check XENPV, make sure to #include "opt_xen.h"

(bouyer)

2022-08-31 12:53:27 UTC MAIN commitmail json YAML

Remove XENPV support from xenmem; it's only used for !XENPV at this time.

(bouyer)

2022-08-31 12:51:56 UTC MAIN commitmail json YAML

Work in progress on dom0 PVH support: ioctl support for tools.
Basically, in PVH mode (where XENFEAT_auto_translated_physmap is enabled),
the hypervisor will not map foreing ressources in our virtual address
space for us. Instead, we have to pass it an address in our physical
address space (but not mapped to some RAM) where the ressource will show up
and then enter this PA in pour page table.

For this, introduce xenmem_* which manage the PA space. In PVH mode this
is just allocated from the iomem_ex extent.

With this, I can start a PV domU, and the guest's kernel boots (and
the console works). It hangs because the backend driver can't map the
frontend ressources (yet).

Note that, per https://xenbits.xen.org/docs/unstable/support-matrix.html,
dom0 PVH support is still considered experimental by Xen.

(bouyer)

2022-06-23 14:32:16 UTC MAIN commitmail json YAML

Don't override isadma defflag for Xen, now that isadma is built for Xen PV too.
While there, match amd64 mainbus and call isa_dmainit() before attaching acpi.

Fixes a panic at boot on some hardware with a floppy disk controller.

(bouyer)

2022-06-12 11:36:43 UTC MAIN commitmail json YAML

XenPV: in cpu_switchto(), reset ci_xen_clockf_usermode/ci_xen_clockf_pc,
in case a clock interrupt is deffered while we're switching lwp.
Fix a (rare) panic:
panic: kernel diagnostic assertion "p != NULL" failed: file "/usr/src/sys/kern/kern_clock.c", line 438
seen when xen_timer_handler() is called from the splx() at the end of
mi_switch()

(bouyer)

2022-06-03 10:42:17 UTC MAIN commitmail json YAML

Restore (again) support for grant tables v1: pvshim doesn't support
v2 (it doesn't even support GNTTABOP_set_version) some setups will
likely require pvshim in the future.

(bouyer)

2022-05-31 18:04:11 UTC MAIN commitmail json YAML

For some reason on my system, the guest starts with a pending event in
the shared structure. On i386, this cause hypervisor_callback to be
entered before cpu_info_primary is fully initialised, especially on i386
ci_intrstack is still NULL, which cause a crash when we try to use it.
Work around by recycling the boot's tmp stack for this until cpu_attach()
is called.

(bouyer)

2022-05-31 18:01:22 UTC MAIN commitmail json YAML

When we have pending events in stipending(), evt_set_pending() has to set
the ih_pending flag for each handler too. Xen/i386 should be stable again.

(bouyer)

2022-05-31 14:21:44 UTC MAIN commitmail json YAML

Revert previous; evt_set_pending() will set ret to 1 if needed to this was
not our bug.

(bouyer)

2022-05-31 12:52:59 UTC MAIN commitmail json YAML

stipending(): if we're going to process some interrupts don't return 0.
Hopefully fixes random hang seen in i386 Xen PV.

The bug has been there ~forever but was masked by the fact that spllower()
did call event handlers much more often.

(bouyer)

2022-05-27 18:35:38 UTC MAIN commitmail json YAML

xenevt_setipending(): also increase xenevt_ih->ih_pending, so that
the handler will be called when the IPL is lowered.

(bouyer)

2022-05-26 11:06:14 UTC MAIN commitmail json YAML

aprint_debug(): if a hypercall fail, print the return code.

(bouyer)

2022-05-25 15:52:25 UTC MAIN commitmail json YAML

Move <xen/include/public/vcpu.h> so it's always inclued. Fixes Xen PV builds.

(bouyer)

2022-05-25 14:35:16 UTC MAIN commitmail json YAML

PVH and HVM guests can easily have more than XEN_LEGACY_MAX_VCPUS (32) cpus.
Support up to HVM_MAX_VCPUS (256). This requires resizing a few arrays in
evtchn.c, and using
VCPUOP_register_vcpu_info for vcpuid >= XEN_LEGACY_MAX_VCPUS
Tested with 96 vCPUs.

(bouyer)

2022-05-24 17:06:08 UTC MAIN commitmail json YAML

PR kern/56853: add a dummy acpi_md_vbios_reset variable so that we
can again enable vga at pci for Xen.
Note that this only works in BIOS mode, not UEFI mode.

(bouyer)

2022-05-24 16:01:25 UTC MAIN commitmail json YAML

Looks like we finally can enable MSI/MSI-X on Xen
Should fix PR kern/56793 and PR kern/55667

(bouyer)

2022-05-24 15:55:19 UTC MAIN commitmail json YAML

Some devices (e.g. ixg in MSI-X mode) don't to have their handlers called
when no interrupt are pending. So add an extra ih_pending field
to struct intrhand, which is incremeted when the handler is not called because
of IPL level and reset to 0 when called. Check this in Xen's resume
assembly to call only handlers that are really pending.

(bouyer)

2022-05-24 15:51:10 UTC MAIN commitmail json YAML

Remove useless info from debug printf, fix format warning on i386

(bouyer)

2022-05-24 14:00:24 UTC MAIN commitmail json YAML

- msipic_construct_msix_pic(): set mp_table_base to memaddr (without
  table_offset), this is what Xen wants
while there use pci_conf_write16() in msi_set_msictl_enablebit() too,
for consistency (it seems that Xen accepts the 32bit write at this point,
but this may change).

- xen_map_msix_pirq(): don't forget to set map_irq.table_base in the
  MSI-X case, otherwise Xen maps it as MSI
- call pic_hwunmask() after pirq_establish() in msi/msix case, to make sure
  the msi-x vector is unmasked.

Now MSI-X works with Xen so stop disabling it in pci_attach_hook().

(bouyer)

2022-05-23 15:03:05 UTC MAIN commitmail json YAML

Work in progress on MSI/MSI-X on Xen (MSI works on my hardware, more work
needed for MSI-X):
- Xen silently rejects 32 bits writes to MSI configuration registers
  (especially when setting PCI_MSI_CTL_MSI_ENABLE/PCI_MSIX_CTL_ENABLE),
  it expects 16 bits writes. So introduce a pci_conf_write16(),
  only available on XENPV (and working only for mode 1 without
  PCI_OVERRIDE_CONF_WRITE) and use it to enable MSI or MSI-X on XENPV.
- for multi-MSI vectors, Xen allocates all of them in a single hypercall,
  so it's not convenient to do it at intr_establish() time.
  So do it at alloc() time and register the pirqs in the msipic structure.
  xen_pic_to_gsi() now just returns the values cached in the msipic.
  As a bonus, if the PHYSDEVOP_map_pirq hypercall fails we can fail
  the alloc() and we don't need the xen_pci_msi*_probe() hacks.

options NO_PCI_MSI_MSIX still on by default for XEN3_DOM0.

(bouyer)

2022-05-19 09:54:27 UTC MAIN commitmail json YAML

Restore de EOI mechanism for pirq, using the newer hypervisor interface.
It is needed.
Hopefully fixes kern/56291, kern/56793, kern/55667

(bouyer)

2022-05-17 12:12:38 UTC netbsd-8 commitmail json YAML

2022-05-17 12:12:15 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by kre in ticket #1743):
libexec/mail.local/mail.local.c: revision 1.29
fix local privilege escalation due to a race condition
NetBSD-SA2016-006 included an incomplete fix for CVE-2016-6253,
a local privilege escalation vulnerability in mail.local(8).
mail.local(8) attempts to open(2) a user's existing mailbox file
to append to it.  If that call fails, mail.local(8) will then issue
a second open(2) call to create the file (O_CREAT).
An attacker had the opportunity to create the file in question (as
a symlink, or link to some other file) in between these two open(2) calls.
Fix this by using O_EXCL in the 2nd open call, if the file exists when
that one happens, something is going wrong, so just abort.  Also, only
attempt that 2nd open if the reason the first failed was that the file
did not exist (this doesn't fix the issue, but it potentially saves
some cycles).
Thanks to Jan Schaumann for bringing this to our attention.

(bouyer)

2022-05-17 12:11:08 UTC netbsd-9 commitmail json YAML

2022-05-17 12:10:25 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by kre in ticket #1455):
libexec/mail.local/mail.local.c: revision 1.29
fix local privilege escalation due to a race condition
NetBSD-SA2016-006 included an incomplete fix for CVE-2016-6253,
a local privilege escalation vulnerability in mail.local(8).
mail.local(8) attempts to open(2) a user's existing mailbox file
to append to it.  If that call fails, mail.local(8) will then issue
a second open(2) call to create the file (O_CREAT).
An attacker had the opportunity to create the file in question (as
a symlink, or link to some other file) in between these two open(2) calls.
Fix this by using O_EXCL in the 2nd open call, if the file exists when
that one happens, something is going wrong, so just abort.  Also, only
attempt that 2nd open if the reason the first failed was that the file
did not exist (this doesn't fix the issue, but it potentially saves
some cycles).
Thanks to Jan Schaumann for bringing this to our attention.

(bouyer)

2022-05-17 10:35:22 UTC netbsd-8 commitmail json YAML

2022-05-17 10:33:46 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) via patch (requested by msaitoh in ticket #1454):
sys/dev/ic/mfi.c: revisions 1.63, 1.66-77
sys/dev/ic/mfireg.h: revisions 1.11-1.20 via patch
sys/dev/pci/mfi_pci.c: revision 1.21
sys/dev/pci/mfii.c: revisions 1.6-1.7, 1.10-1.15
share/man/man4/mfi.4: revision 1.13

Improve mfi(4) and mfii(4):
- Set 'ld_sync' to NULL as part of 'again', to prevent use-after-free.
- Add some code for the SKINNY variant to make Dell PERC H310 work.
- Print the percentage correctly when the background initialization is
  running.
- Clear mailbox to not to pass garbage data.
- Use union mbox instead of unit8_t xxx[] to avoid unaligned access.
- Set stripe size for BIOCVOL to show the size correctly in bioctl.
- Add support for iBBU-09 to show BBU voltage, current and temperature
  correctly.
- Fix typos in comments.
- Sprinkle static.
- Improve debug printf()s.
- KNF. Remove extra semicolon. Whitespace fixes.

(bouyer)

2022-05-17 10:30:22 UTC netbsd-9 commitmail json YAML

2022-05-17 10:29:47 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) via patch (requested by msaitoh in ticket #1454):
sys/dev/ic/mfi.c: revisions 1.63, 1.66-77
sys/dev/ic/mfireg.h: revisions 1.11-1.20 via patch
sys/dev/pci/mfi_pci.c: revision 1.21
sys/dev/pci/mfii.c: revisions 1.6-1.7, 1.10-1.15
share/man/man4/mfi.4: revision 1.13

Improve mfi(4) and mfii(4):
- Set 'ld_sync' to NULL as part of 'again', to prevent use-after-free.
- Add some code for the SKINNY variant to make Dell PERC H310 work.
- Print the percentage correctly when the background initialization is
  running.
- Clear mailbox to not to pass garbage data.
- Use union mbox instead of unit8_t xxx[] to avoid unaligned access.
- Set stripe size for BIOCVOL to show the size correctly in bioctl.
- Add support for iBBU-09 to show BBU voltage, current and temperature
  correctly.
- Fix typos in comments.
- Sprinkle static.
- Improve debug printf()s.
- KNF. Remove extra semicolon. Whitespace fixes.

(bouyer)

2022-05-17 10:23:18 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by tnn in ticket #1452):
external/gpl2/dtc/dist/dtc-lexer.l: revision 1.5
Satisfy -fno-common

(bouyer)

2022-05-11 17:22:20 UTC MAIN commitmail json YAML

bus_dmamem_unmap() before bus_dmamem_free(), otherwise we may give back meomry
which is still (and will stay) mapped.

Fixes one instance of "panic: HYPERVISOR_mmu_update failed" on Xen.
There may be others.

(bouyer)

2022-05-11 16:22:46 UTC MAIN commitmail json YAML

In bootstrap, after switching to a new page table make sure that
now-unused memory is unmapped.

(bouyer)

2022-05-07 14:59:25 UTC MAIN commitmail json YAML

return after calling xen_pagezero(), don't fall back to the legacy
pmap_zero_page() method.
This should only affect performances.

(bouyer)

2022-01-17 11:20:00 UTC MAIN commitmail json YAML

If the calling process is running under linux emulation, make /proc/xxx/fd/
return only symlinks pointing to the original file in the filesystem,
instead of a hard link. This matches the linux behavior, and some
linux programs relies on it (they unconditionally call readlink() on
/proc/xxx/fd/yy and don't deal with it returning EINVAL).
Proposed on tech-kern@ in
http://mail-index.netbsd.org/tech-kern/2022/01/11/msg027877.html

(bouyer)

2022-01-17 11:12:28 UTC MAIN commitmail json YAML

Add UQ_HID_IGNORE for the Microchip PICkit2 and 3 programmers.

(bouyer)

2022-01-17 11:11:42 UTC MAIN commitmail json YAML

Regen: Add the Microchip PICkit3 programmer

(bouyer)

2022-01-17 11:09:57 UTC MAIN commitmail json YAML

Add the Microchip PICkit3 programmer

(bouyer)

2021-06-16 10:49:50 UTC MAIN commitmail json YAML

Grab KERNEL_LOCK before calling config_found()

(bouyer)

2021-05-03 09:16:00 UTC netbsd-8 commitmail json YAML

2021-05-03 09:15:31 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by martin in ticket #1677):
sys/kern/kern_exec.c: revision 1.505 via patch
Fix copy&pasto in handling of POSIX_SPAWN_RESETIDS in posix_spawn(3)

(bouyer)

2021-05-03 09:13:22 UTC netbsd-9 commitmail json YAML

2021-05-03 09:12:50 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by martin in ticket #1265):
sys/kern/kern_exec.c: revision 1.505 via patch
Fix copy&pasto in handling of POSIX_SPAWN_RESETIDS in posix_spawn(3)

(bouyer)

2021-04-17 18:03:21 UTC MAIN commitmail json YAML

Make pat_init() a NOOP on XENPV; it causes a trap with Xen 4.15

(bouyer)

2021-03-06 19:16:45 UTC MAIN commitmail json YAML

return early from identify_hypervisor() if we already know we're running
Xen PV or PVH, as this was before 1.119.
Trying to read the BIOS faults (as expected, as there's no BIOS in this case).
Problem pointed out and fix tested by Brian Marcotte

(bouyer)

2021-02-02 16:11:43 UTC MAIN commitmail json YAML

Also match Oxford Semiconductor Exsys EX-41098 PCI UARTs

(bouyer)

2020-12-01 10:10:57 UTC MAIN commitmail json YAML

Enable ldap support in racoon(8). Proposed on tech-userlevel,
"Go for it" from christos@

(bouyer)

2020-11-30 17:06:02 UTC MAIN commitmail json YAML

Work in progress on dom0 PVH support. kernel boots and xl info works,
but we can't start a domU yet.

(bouyer)

2020-11-30 17:05:02 UTC MAIN commitmail json YAML

Switch some debug/informational printf to device_printf(). Usefull
for multiprocessor environnement.

(bouyer)

2020-11-30 17:02:27 UTC MAIN commitmail json YAML

Introduce smap_enable()/smap_disable() functions, to be used from
C code.

(bouyer)

2020-11-25 18:11:00 UTC MAIN commitmail json YAML

2020-11-25 16:42:53 UTC MAIN commitmail json YAML

2020-11-25 16:41:39 UTC MAIN commitmail json YAML

Fix ldap: ldap_sasl_bind_s() doens't like a NULL struct berval *, pass
a pointer to a zero'd struct instead.
While there use LDAP_SASL_SIMPLE instead of NULL for mechanism,
and check return of ldap_set_option().

(bouyer)

2020-11-18 16:36:43 UTC MAIN commitmail json YAML

Preserve Xen SIR slots for VM_GUEST_XENPVH.

(bouyer)

2020-11-15 14:01:06 UTC MAIN commitmail json YAML

Don't restrict debug event to XENPV, it's also usefull for PVH/PVHVM

(bouyer)

2020-11-15 13:59:42 UTC MAIN commitmail json YAML

remove unused x86_cpu_initclock_func()

(bouyer)

2020-10-15 19:39:03 UTC netbsd-9 commitmail json YAML

2020-10-15 19:36:55 UTC netbsd-9 commitmail json YAML

Pull up following revision(s) (requested by martin in ticket #1113):
usr.sbin/sysinst/bsddisklabel.c: revision 1.46
usr.sbin/sysinst/bsddisklabel.c: revision 1.47
usr.sbin/sysinst/disklabel.c: revision 1.40
usr.sbin/sysinst/arch/cobalt/md.c: revision 1.13
usr.sbin/sysinst/bsddisklabel.c: revision 1.48
usr.sbin/sysinst/disklabel.c: revision 1.41
usr.sbin/sysinst/arch/cobalt/md.c: revision 1.14
usr.sbin/sysinst/bsddisklabel.c: revision 1.49
usr.sbin/sysinst/disklabel.c: revision 1.42
usr.sbin/sysinst/Makefile.inc: revision 1.34
usr.sbin/sysinst/disks.c: revision 1.70
usr.sbin/sysinst/arch/hp300/md.c: revision 1.11
usr.sbin/sysinst/disks.c: revision 1.71
usr.sbin/sysinst/arch/i386/md.h: revision 1.8
usr.sbin/sysinst/arch/arc/md.c: revision 1.13
usr.sbin/sysinst/mbr.h: revision 1.5
usr.sbin/sysinst/mbr.h: revision 1.6
usr.sbin/sysinst/arch/mac68k/md.c: revision 1.10
usr.sbin/sysinst/bsddisklabel.c: revision 1.50
usr.sbin/sysinst/arch/acorn32/md.c: revision 1.7
usr.sbin/sysinst/bsddisklabel.c: revision 1.51
usr.sbin/sysinst/bsddisklabel.c: revision 1.52
usr.sbin/sysinst/bsddisklabel.c: revision 1.53
usr.sbin/sysinst/bsddisklabel.c: revision 1.54
usr.sbin/sysinst/bsddisklabel.c: revision 1.55
usr.sbin/sysinst/bsddisklabel.c: revision 1.56
usr.sbin/sysinst/arch/dummy/md.c: revision 1.6
usr.sbin/sysinst/arch/amd64/md.h: revision 1.9
usr.sbin/sysinst/arch/evbsh3/md.c: revision 1.6
usr.sbin/sysinst/arch/sparc/md.c: revision 1.6
usr.sbin/sysinst/arch/zaurus/md.c: revision 1.10
usr.sbin/sysinst/arch/x68k/md.c: revision 1.11
usr.sbin/sysinst/arch/sandpoint/md.c: revision 1.9
usr.sbin/sysinst/arch/vax/md.c: revision 1.7
usr.sbin/sysinst/arch/luna68k/md.c: revision 1.9
usr.sbin/sysinst/gpt.c: revision 1.19
usr.sbin/sysinst/arch/i386/md.c: revision 1.31
usr.sbin/sysinst/arch/i386/md.c: revision 1.32
usr.sbin/sysinst/arch/evbarm/md.c: revision 1.17
usr.sbin/sysinst/arch/evbarm/md.c: revision 1.18
usr.sbin/sysinst/arch/evbarm/md.c: revision 1.19
usr.sbin/sysinst/arch/shark/md.c: revision 1.6
usr.sbin/sysinst/arch/landisk/md.c: revision 1.14
usr.sbin/sysinst/util.c: revision 1.43
usr.sbin/sysinst/gpt.c: revision 1.20
usr.sbin/sysinst/util.c: revision 1.44
usr.sbin/sysinst/gpt.c: revision 1.21
usr.sbin/sysinst/gpt.c: revision 1.22
usr.sbin/sysinst/arch/evbarm/msg.md.en: revision 1.2
usr.sbin/sysinst/arch/ofppc/md.c: revision 1.11
usr.sbin/sysinst/util.c: revision 1.46
usr.sbin/sysinst/arch/ofppc/md.c: revision 1.12
usr.sbin/sysinst/util.c: revision 1.47
usr.sbin/sysinst/arch/evbarm/md.h: revision 1.6
usr.sbin/sysinst/util.c: revision 1.48
usr.sbin/sysinst/arch/evbarm/md.h: revision 1.7
usr.sbin/sysinst/arch/evbmips/md.c: revision 1.9
usr.sbin/sysinst/msg.mi.fr: revision 1.28
usr.sbin/sysinst/msg.mi.fr: revision 1.29
usr.sbin/sysinst/arch/sgimips/md.c: revision 1.9
usr.sbin/sysinst/arch/evbarm/Makefile: revision 1.3
usr.sbin/sysinst/msg.mi.de: revision 1.23
usr.sbin/sysinst/arch/hpcsh/md.c: revision 1.10
usr.sbin/sysinst/msg.mi.de: revision 1.24
usr.sbin/sysinst/install.c: revision 1.15
usr.sbin/sysinst/install.c: revision 1.16
usr.sbin/sysinst/arch/sparc64/md.c: revision 1.6
usr.sbin/sysinst/install.c: revision 1.17
usr.sbin/sysinst/install.c: revision 1.18
usr.sbin/sysinst/partitions.h: revision 1.16
usr.sbin/sysinst/install.c: revision 1.19
usr.sbin/sysinst/partitions.h: revision 1.17
usr.sbin/sysinst/arch/evbppc/md.c: revision 1.9
usr.sbin/sysinst/arch/playstation2/md.c: revision 1.9
usr.sbin/sysinst/partitions.h: revision 1.18
usr.sbin/sysinst/arch/hpcarm/md.c: revision 1.9
usr.sbin/sysinst/partitions.h: revision 1.19
usr.sbin/sysinst/msg.mi.es: revision 1.24
usr.sbin/sysinst/msg.mi.es: revision 1.25
usr.sbin/sysinst/msg.mi.es: revision 1.26
usr.sbin/sysinst/arch/zaurus/md.c: revision 1.9
usr.sbin/sysinst/target.c: revision 1.13
usr.sbin/sysinst/target.c: revision 1.14
usr.sbin/sysinst/part_edit.c: revision 1.17
usr.sbin/sysinst/part_edit.c: revision 1.18
usr.sbin/sysinst/msg.mi.fr: revision 1.30
usr.sbin/sysinst/arch/mvme68k/md.c: revision 1.11
usr.sbin/sysinst/part_edit.c: revision 1.19
usr.sbin/sysinst/msg.mi.fr: revision 1.31
usr.sbin/sysinst/arch/alpha/md.c: revision 1.9
usr.sbin/sysinst/msg.mi.en: revision 1.30
usr.sbin/sysinst/defs.h: revision 1.56
usr.sbin/sysinst/msg.mi.en: revision 1.31
usr.sbin/sysinst/defs.h: revision 1.57
usr.sbin/sysinst/msg.mi.en: revision 1.32
usr.sbin/sysinst/arch/amiga/md.c: revision 1.6
usr.sbin/sysinst/arch/hpcmips/md.c: revision 1.9
usr.sbin/sysinst/defs.h: revision 1.58
usr.sbin/sysinst/arch/cats/md.c: revision 1.5
usr.sbin/sysinst/defs.h: revision 1.59
usr.sbin/sysinst/arch/newsmips/md.c: revision 1.6
usr.sbin/sysinst/arch/pmax/md.c: revision 1.8
usr.sbin/sysinst/arch/mipsco/md.c: revision 1.8
usr.sbin/sysinst/part_edit.c: revision 1.20
usr.sbin/sysinst/part_edit.c: revision 1.21
usr.sbin/sysinst/arch/macppc/md.c: revision 1.6
usr.sbin/sysinst/part_edit.c: revision 1.22
usr.sbin/sysinst/part_edit.c: revision 1.23
usr.sbin/sysinst/part_edit.c: revision 1.24
usr.sbin/sysinst/defs.h: revision 1.60
usr.sbin/sysinst/arch/mac68k/Makefile: revision 1.3
usr.sbin/sysinst/defs.h: revision 1.61
usr.sbin/sysinst/defs.h: revision 1.63
usr.sbin/sysinst/defs.h: revision 1.64
usr.sbin/sysinst/defs.h: revision 1.65
usr.sbin/sysinst/label.c: revision 1.21
usr.sbin/sysinst/defs.h: revision 1.66
usr.sbin/sysinst/label.c: revision 1.22
usr.sbin/sysinst/defs.h: revision 1.67
usr.sbin/sysinst/label.c: revision 1.23
usr.sbin/sysinst/label.c: revision 1.24
usr.sbin/sysinst/label.c: revision 1.25
usr.sbin/sysinst/label.c: revision 1.26
usr.sbin/sysinst/label.c: revision 1.27
usr.sbin/sysinst/msg.mi.pl: revision 1.31
usr.sbin/sysinst/label.c: revision 1.28
usr.sbin/sysinst/msg.mi.pl: revision 1.32
usr.sbin/sysinst/label.c: revision 1.29
usr.sbin/sysinst/arch/atari/md.c: revision 1.7
usr.sbin/sysinst/disklabel.c: revision 1.36
usr.sbin/sysinst/disklabel.c: revision 1.37
usr.sbin/sysinst/disklabel.c: revision 1.38
usr.sbin/sysinst/disklabel.c: revision 1.39
usr.sbin/sysinst/arch/bebox/md.c: revision 1.9
usr.sbin/sysinst/mbr.c: revision 1.32
usr.sbin/sysinst/disks.c: revision 1.66
usr.sbin/sysinst/mbr.c: revision 1.33
usr.sbin/sysinst/disks.c: revision 1.67
usr.sbin/sysinst/mbr.c: revision 1.34
usr.sbin/sysinst/arch/emips/md.c: revision 1.9
usr.sbin/sysinst/disks.c: revision 1.68
usr.sbin/sysinst/partitions.c: revision 1.11
usr.sbin/sysinst/mbr.c: revision 1.35
usr.sbin/sysinst/disks.c: revision 1.69
usr.sbin/sysinst/mbr.c: revision 1.36
usr.sbin/sysinst/arch/hppa/md.c: revision 1.8
usr.sbin/sysinst/arch/prep/md.c: revision 1.13
usr.sbin/sysinst/label.c: revision 1.30
usr.sbin/sysinst/arch/ews4800mips/md.c: revision 1.7
usr.sbin/sysinst/main.c: revision 1.21
usr.sbin/sysinst/main.c: revision 1.22
usr.sbin/sysinst/main.c: revision 1.23
usr.sbin/sysinst/bsddisklabel.c: revision 1.40
usr.sbin/sysinst/main.c: revision 1.24
usr.sbin/sysinst/arch/cobalt/md.h: revision 1.6
usr.sbin/sysinst/bsddisklabel.c: revision 1.41
usr.sbin/sysinst/main.c: revision 1.25
usr.sbin/sysinst/arch/news68k/md.c: revision 1.7
usr.sbin/sysinst/bsddisklabel.c: revision 1.42
usr.sbin/sysinst/bsddisklabel.c: revision 1.43
usr.sbin/sysinst/bsddisklabel.c: revision 1.44
usr.sbin/sysinst/bsddisklabel.c: revision 1.45
Use strlcpy in a few places to guarnatee 0-terminated strings
Rever previous: the d_packname in struct disklabel is not NUL terminated.
Disable the warning instead.
Do not force -Os optimization (unless SMALLPROG)
Remove unused "rel" global variable and make the -r option a no-op.
PR 55045: strlcpy(NULL, ..., 0) considered harmfull in some implementations.
PR misc/54886: bump threshold for automatic/default creation of a tmpfs /tmp
up slightly (to 384 MB ram). This will make sure the default install has
a > 64 MB /tmp available (number pulled out of thin air, 64 MB is the minimum
required by the ZFS tests).
Don't depend on common symbol definitions.
boardype should not be common.
Redo the root-size-limit check again after we grew the root partition
for kernel dumps. Auto-enable the /usr partition if it overflows.
For all non-root partitions, default to FFSv2.
When extending a partition (to fill the total disk size) do respect
size limits.
Do not suggest a size limited partition for extension by default.
Minor tweak to previous: when forcing a /usr partition just to have an
arbitrary extendable partition, still use its default size initially.
At the end of a new installation save entropy.
Ooops, backout previous - twice the entropy saving is not needed.
Instead slightly improve the (slightly) hidden other code that already
did it.
PR 55202: disable swapping if we started it due to low ram
it's "its"
Remove "If you booted from a floppy" message
Set HAVE_INSTALL_IMAGE for evbarm
Change mountpoint of boot ext2fs from /stand to /ext2 to avoid conflict.
Should be pulled up to netbsd-9, with fixes of PR/55060.
MBR type for Ext2 should be MBR_PTYPE_LNXEXT2, not MBR_PTYPE_FAT12.
Silence -Wstringop-truncation for ``name'' in disp_selected_part().
This variable is used only for display, and truncation seems harmless.
PR 55572: avoid crash when answering the mount point prompt for a previously
empty mount point with an emptry sting.
When adding a new partition in the concrete partition editor, make sure
to set a pointer to the partition table interface in the new entry.
Otherwise we may end up not writing back the partitions at all, leading
to further fallout later.
Receipe to reproduce the issue from Frederic Fauberteau, thanks!
In the concrete partitions editor, after deleting the last partition move
the menu selection to the "add a partition" entry (instead of the sentinel
line which is not an active menu entry).
Typo in comment
Keep a list of all partition tables from which we have deleted partitions
and make sure we update those partition tables when writing partitions,
even if no install related partition remains on them.
Fix display of timezone selection menu
If there is no current partitioning manager assume we are editing the
current system and make target_already_root() return true.
Fixes various fallout when using sysinst post installation.
PR 55377: mark boot partitions in the partition size display, as suggested
by Izumi Tsutsui (minor modifications + all bugs by me)
PR 55378: do not assume RAW_PART to be either 2 or 3
PR 55379: avoid creating bogus /etc/fstab lines for /dev/cd* if no
cdrom is available.
PR 55381: try to deal with moved (but not yet saved) partitions when
calculating free space
Apply patch provided by Izumi Tsutsui in PR 55382: make ext2 partitions
show up in the outer (MBR) partition table, needed for example on Cobalt
where firmware boots from that partition.
PR 55384: detangle pm->ptstart from the "install" flag (selecting a
target partition). Instead introduce a new PTI_INSTALL_TARGET per partition
flag and deal with it in the partitioning backends.
Honour pm->ptstart when allocating new partitions - it is supposed to be
the first sector usable by NetBSD.
If we have no explicitly marke target root partition, make sure to set
the proper flag on the implicit one.
When merging existing partitions with desired target system layout
information, only force the "mount" flag if the existing partitions
has a valid mount point.
Add a heuristic to detect and properly mark EFI system partitions
when re-using pre-existing partitions.
When MD code requests a reserved area (at the start of the disk)
make sure to properly account for the "lost" space during all calculations
and especially when expanding the main partition to fill the disk.
Avoid using the global "pm" or a passed device descriptons when we are
passing disk limits explicitly anyway.
Simplify/fix a few rounding calculations.
When creating new partitions for "full disk" use, pass a install target
hint to the partitioning backend (for the outer NetBSD partition).
Use an install target hint to mark a new partition active.
When compiled with BOOTSEL support, also name the new partition "NetBSD".
Remove more pm->ptstart abuse - calculate values localy where needed
instead.
Fix editing start and size of not yet existing outer partitions.
Previously we abused pm->ptstart / pm->ptsize to pass the bounds of the
NetBSD outer partition to the inner partition editor - but now this is
not a valid assumption any more, so explicitly fix the bounds if an
outer partition exists.
Remove very strange code that special-cased MSDOS file systems and refused
to newfs the partition (despite explicit request to do so) if it was
mountable.
Accidently carried over from a dim and distant past, before we had
fsck_newfs.
PR 55536: when we find existing partition tables and have alternative
formats available, offer to delete partitions and create new ones from
scratch (in some other or the same on-disk format).
Minor fix to previous: fix condition when we offer the partition type
switch - it makes sense even if the disk is partitioned but has no valid
partitions.
Before forcing MBR partitions into our disklabel, make sure they are not
there yet - could happen in various paths when reusing existing partitions
(or parts of that) - previously we would blindly duplicate identical
partitions.
Ooops, part of previous was not meant to be included yet
When renumbering partitions (after deletions) be slightly more lax
in matching, to cope with differences between MBR EFI partitions and
disklabel MSDOS partitions.
PR 55142: on popular demand bring back expert options to adjust the
number of free inodes, block size and fragment size for FFS and LFS.
Fix copy & pasto noticed by Jason Mitchell: change the type of a GPT
partition via "gpt type" - not "gpt label".
Fix copy & pasto (missing "again" label)
Remove dead code
Move MBR writing (if any) post disklabel writing, otherwise strange
interactions happen.
Properly convert partition default sizes in MB to number of sectors

(bouyer)

2020-09-15 10:58:02 UTC MAIN commitmail json YAML

Fix side effect of previous commit: skip xencons attachement only for
PVHVM guests. Should fix issue with console on PV dom0 reported by
kardel@ in private mail

(bouyer)

2020-09-09 16:46:06 UTC MAIN commitmail json YAML

Workarounds for amazon's Xen 4.2 version, still present on some instances:
- It doens't provides an xencons, so allow HVM_PARAM_CONSOLE_PFN to fail
- the xen clock is not fully functionnal, so don't try to use it if
  HVM_PARAM_CONSOLE_PFN failed.
- it doesn't have XEN_HVM_CPUID_VCPU_ID_PRESENT so fall back to ci_acpiid
  as ci_vcpuid in this case.

It also doesn't support the per-CPU event callback; so fix the fallback
to global vector (don't try to register more per-cpu vector)
Should fix port-amd64/55543

(bouyer)

2020-09-03 19:31:34 UTC MAIN commitmail json YAML

If we hit an unknown header type (likely to be a corrupt record), and
the user choose to not abort, skip to the next header instead of trying
to use it.
This allowed me to recover files from a corrupt dump, instead of
getting a segfault.

(bouyer)

2020-09-02 17:37:57 UTC MAIN commitmail json YAML

pmap_enter_gnt():
An empty PTP has a wire_count of 1, so KASSERT > 1 if we're sure we have
at last one entry.

(bouyer)

2020-09-02 17:07:45 UTC MAIN commitmail json YAML

pmap_enter_gnt(): call pmap_free_ptp() if needed. We can have a 0 wire count
if we had an old mapping and grant map hypercall failed, and this was the
only page in this ptp.
while there remove ptp != NULL checks for gnt operations: we always have
a ptp here.

(bouyer)

2020-09-01 11:24:14 UTC MAIN commitmail json YAML

Fix braino in pmap_find_gnt(), really return the gnt entry covering the range
and not one that starts just after.
Fixes a KASSERT in pmap_remove_gnt().

(bouyer)

2020-08-31 11:32:01 UTC MAIN commitmail json YAML

2020-07-04 09:03:55 UTC MAIN commitmail json YAML

Fix unset_idtgate() for XENPV, pointed out by yamaguchi@

(bouyer)

2020-06-21 16:57:18 UTC MAIN commitmail json YAML

On amd64, Xen PV calls syscalls and traps with events enabled.
Disable events on entry to be safe.
It should have been mostly safe for most cases, but for FPU traps
we need to reload the FPU state if we got interrupted at trap entry.

Hopefully fixes:
panic: kernel diagnostic assertion "curlwp->l_md.md_flags & MDL_FPU_IN_CPU" failed: file "/home/source/ab/HEAD/src/sys/arch/x86/x86/fpu.c", line 524

when running tests.

(bouyer)

2020-06-21 16:53:37 UTC MAIN commitmail json YAML

2020-06-16 10:36:03 UTC netbsd-7 commitmail json YAML

2020-06-16 10:34:49 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by martin in ticket #1735):
sys/dev/usb/if_run.c: revision 1.41
Better bounds checking for oversized packets, to avoid kernel memory
corruption. Pointed out by Ilja Van Sprundel.

(bouyer)

2020-06-16 10:33:38 UTC netbsd-7 commitmail json YAML

Pull up following revision(s) (requested by martin in ticket #1734):
sys/dev/usb/if_otus.c: revision 1.45 via patch
Stricter bounds check for some packet length we get from the usb chip,
to make sure we do not corrupt kernel memory.
Pointed out by Ilja Van Sprundel.

(bouyer)

2020-06-16 10:29:16 UTC netbsd-8 commitmail json YAML

2020-06-16 10:28:29 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by martin in ticket #1559):
sys/dev/usb/if_run.c: revision 1.41
Better bounds checking for oversized packets, to avoid kernel memory
corruption. Pointed out by Ilja Van Sprundel.

(bouyer)

2020-06-16 10:27:04 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by martin in ticket #1558):
sys/dev/usb/if_otus.c: revision 1.45 via patch
Stricter bounds check for some packet length we get from the usb chip,
to make sure we do not corrupt kernel memory.
Pointed out by Ilja Van Sprundel.

(bouyer)

2020-06-16 10:23:04 UTC netbsd-8 commitmail json YAML

Pull up following revision(s) (requested by tsutsui in ticket #1557):
sys/arch/mac68k/dev/ams.c: revision 1.23
Fix inverted Y-axis value passed to wsmouse_input(9).
Note this is what src/sys/arch/macppc/dev/ams.c does as
"upward (moving the mouse forward) is positive" as noted in wsmouse(9):
http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/arch/macppc/dev/ams.c#rev1.4
Reported and tested by @NonameInsect on his SE/30 and Xorg server.
Should be pulled up to netbsd-8 and netbsd-9.

(bouyer)

2020-06-03 18:25:26 UTC MAIN commitmail json YAML

Don't print an error message on spurious interrupt. Way too noisy for Xen.

(bouyer)

2020-05-26 10:37:25 UTC MAIN commitmail json YAML

Add need-flags for kernfs.
Compile Xen kernfs support only if kernfs is compiled in the kernel.
Should fix MODULAR build.

(bouyer)

2020-05-26 10:36:20 UTC MAIN commitmail json YAML

2020-05-26 10:11:56 UTC MAIN commitmail json YAML

Implement new ioctl, needed by Xen 4.13:
IOCTL_PRIVCMD_MMAPBATCH_V2
IOCTL_PRIVCMD_MMAP_RESOURCE
IOCTL_GNTDEV_MMAP_GRANT_REF
IOCTL_GNTDEV_ALLOC_GRANT_REF

(bouyer)

2020-05-26 10:10:32 UTC MAIN commitmail json YAML

Ajust pmap_enter_ma() for upcoming new Xen privcmd ioctl:
pass flags to xpq_update_foreign()
Introduce a pmap MD flag: PMAP_MD_XEN_NOTR, which cause xpq_update_foreign()
to use the MMU_PT_UPDATE_NO_TRANSLATE flag.
make xpq_update_foreign() return the raw Xen error. This will cause
pmap_enter_ma() to return a negative error number in this case, but the
only user of this code path is privcmd.c and it can deal with it.

Add pmap_enter_gnt()m which maps a set of Xen grant entries at the
specified va in the specified pmap. Use the hooks implemented for EPT to
keep track of mapped grand entries in the pmap, and unmap them
when pmap_remove() is called. This requires pmap_remove() to be split
into a pmap_remove_locked(), to be called from pmap_remove_gnt().

(bouyer)

2020-05-13 08:43:28 UTC MAIN commitmail json YAML

xen: enable MULTIPROCESSOR for Xen dom0

(bouyer)

2020-05-13 08:42:01 UTC MAIN commitmail json YAML

MULTIPROCESSOR for dom0 should be safe now. Enable it.

(bouyer)

2020-05-09 08:01:38 UTC MAIN commitmail json YAML

Also set x86_delay to xen_delay, unbreaks PVH

(bouyer)

2020-05-08 17:28:33 UTC MAIN commitmail json YAML

strlcpy() the command line only if it's present.

(bouyer)

2020-05-07 19:52:50 UTC MAIN commitmail json YAML

Go back using cpu_info_primary, all events are bound to vCPU 0 by default.
Register the event handler on cpu_info_primary.
While there. update the event counter on interrupts.
Finally this should be MP-safe.

(bouyer)

2020-05-07 19:49:30 UTC MAIN commitmail json YAML

This should be mpsafe, register the event handler as such.

(bouyer)

2020-05-07 19:48:58 UTC MAIN commitmail json YAML

Change event_set_handler() to take the target CPU parameter. If ci is NULL,
  event_set_handler() will choose the CPU and bind the event.
  If ci is not NULL the caller is responsible for binding the event.
Use a IPI xcall to register the handlers if needed.
pull in a hack from x86 to force pirq handlers to be mpsafe if registered at
a level != IPL_VM. This is for the com at isa interrupt handler, which
registers at IPL_HIGH and has to way to tell it's mpsafe (taking
KERNEL_LOCK at IPL_HIGH causes deadlocks on MP systems).

(bouyer)

2020-05-07 15:44:35 UTC MAIN commitmail json YAML

Cast physical address to uintptr_t, fix PAE build.
Pointed out by John D. Baker

(bouyer)

2020-05-06 20:40:33 UTC MAIN commitmail json YAML

The event channel is not necesserely bound to the primary CPU.
Use the CPU returned in the interrupt handler instead.

(bouyer)

2020-05-06 20:09:26 UTC MAIN commitmail json YAML

Drop xbdi_lock() before calling intr_disestablish(), it needs to take
cpu_lock.

(bouyer)

2020-05-06 19:52:19 UTC MAIN commitmail json YAML

Attempts to make MP-safe:
xpmap_ptom_unmap() doens't need to be called at splvm; we own the pa.
Use atomic ops to change pmap_pa_end
Make sure the ptom/mtop are up to date before giving the pages back to the
pool.

(bouyer)

2020-05-06 19:50:26 UTC MAIN commitmail json YAML

Make MP-safe: make sure the xpq_queue* are flushed before making the
pages visible to UVM.

(bouyer)

2020-05-06 19:49:00 UTC MAIN commitmail json YAML

We can't take v_interlock with a spin lock held. Release xbdi_lock
before scheduling the I/O, and take again once queued.
It looks safe to drop the lock here.

(bouyer)

2020-05-06 19:47:05 UTC MAIN commitmail json YAML

xpq_queue_* use per-cpu queue; splvm() is enough to protect them.
remove the XXX SMP comments.

(bouyer)

2020-05-06 19:45:12 UTC MAIN commitmail json YAML

x86/x86/ipi.c should not be built for XENPV, even if dom0ops is defined.

(bouyer)

2020-05-06 17:28:26 UTC MAIN commitmail json YAML

KASSERT() that the per-cpu queues are run at IPL_VM after boot.

(bouyer)

2020-05-06 17:27:39 UTC MAIN commitmail json YAML

No need to run hypercalls at IPL_VM.
XXX still not MP-safe

(bouyer)

2020-05-06 16:50:13 UTC MAIN commitmail json YAML

Convert remaining splfoo/splx and tsleep/wakeup to mutex and condvar.
Mark kernel threads and interrupt handlers MPSAFE.

(bouyer)

2020-05-06 13:43:48 UTC MAIN commitmail json YAML

remove the per-channel spin lock and instead make sure that events
add/remove will only be done on the CPU the handler is bound to, with
interrupts disabled.
Should be similar to the native x86 interrupts add/remove.

(bouyer)

2020-05-06 09:18:10 UTC MAIN commitmail json YAML

Bump INSTIMAGEMB, hopefully fix releng autobuilds

(bouyer)

2020-05-05 17:02:01 UTC MAIN commitmail json YAML

2020-05-05 16:58:11 UTC MAIN commitmail json YAML

disable I/O or mem decode before probing BAR size.
Bar size is probed writing 0xffffffff to the BAR and reading back; but while
doing this the decoding address is not guaranteed to be valid and could have
side effect.

Xen PVH enforces disabling decoding before writing to a BAR.

Proposed on tech-kern@, got positive comments

(bouyer)

2020-05-05 09:07:35 UTC MAIN commitmail json YAML

build start_xenpvh only if XEN. Fixes NET4501 build issue reported by
John D. Baker

(bouyer)

2020-05-03 17:24:11 UTC MAIN commitmail json YAML

For PVH and HVM, copy hvm_start_info.flags to xen_start_info.flags

(bouyer)

2020-05-03 17:23:14 UTC MAIN commitmail json YAML

Hanble dom0 console. This one doesn't need a ring to be mapped, and
can be used earlier.

(bouyer)

2020-05-03 17:22:03 UTC MAIN commitmail json YAML

If hvm_start_info has no memmap_entries, fall back to XENMEM_memory_map
hypercall.

(bouyer)

2020-05-02 18:49:57 UTC MAIN commitmail json YAML

HANDLE_DEFERRED_FPU has to be donne with interrupt disabled;
move it before STIC.
Fix fpudna panic on i386 PV

(bouyer)

2020-05-02 17:14:02 UTC MAIN commitmail json YAML

Move x86_hotpatch() in !XENPV section. Fixes XEN3* builds.

(bouyer)

2020-05-02 17:11:25 UTC MAIN commitmail json YAML

Note Xen PVH support

(bouyer)

2020-05-02 16:46:06 UTC MAIN commitmail json YAML

This is called pvh_consinit not hvm_consinit

(bouyer)

2020-05-02 16:44:36 UTC MAIN commitmail json YAML

Introduce Xen PVH support in GENERIC.
This is compiled in with
options XENPVHVM
x86 changes:
- add Xen section and xen pvh entry points to locore.S. Set vm_guest
  to VM_GUEST_XENPVH in this entry point.
  Most of the boot procedure (especially page table setup and switch to
  paged mode) is shared with native.
- change some x86_delay() to delay_func(), which points to x86_delay() for
  native/HVM, and xen_delay() for PVH

Xen changes:
- remove Xen bits from init_x86_64_ksyms() and init386_ksyms()
  and move to xen_init_ksyms(), used for both PV and PVH
- set ISA no-legacy-devices property for PVH
- factor out code from Xen's cpu_bootconf() to xen_bootconf()
  in xen_machdep.c
- set up a specific pvh_consinit() which starts with printk()
  (which uses a simple hypercall that is available early) and switch to
  xencons when we can use pmap_kenter_pa().

(bouyer)

2020-04-30 22:09:32 UTC MAIN commitmail json YAML

Change module path to xen-* only for XENPV

(bouyer)

2020-04-30 22:05:18 UTC MAIN commitmail json YAML

Don't #include xen/intrdefs.h is !XEN.
Should fix third-party module builds (e.g. virtualbox)

(bouyer)

2020-04-28 15:43:34 UTC MAIN commitmail json YAML

Add xbd to the list of valid disks.
Remove hardcoded root on xbd0 for Xen PVHVM, now that the x86 findroot()
knowns about xbd disks.

(bouyer)

2020-04-28 13:27:29 UTC MAIN commitmail json YAML

2020-04-28 13:21:01 UTC MAIN commitmail json YAML

Skip block device  with device-type "cdrom", as their emulation can't be
disabled; and the backend driver doesn't handle them either.
Fix hang when booting with 'ioemu:hdc:cdrom' type disks.
While there convert some printf to aprint_error()

(bouyer)

2020-04-27 18:08:26 UTC MAIN commitmail json YAML

Note Xen PV drivers under HVM guests

(bouyer)

2020-04-27 16:55:50 UTC MAIN commitmail json YAML

Limit the amount of code in TEXT_USER_BEGIN/TEXT_USER_END for
hypervisor_pvhvm_callback, for the benefit of SVS. Suggested by maxv@

(bouyer)

2020-04-27 16:29:17 UTC MAIN commitmail json YAML

Move ci_vcpu under the #ifdef XEN section at the end of the struct cpu_info.
Hopefully will fix the nvmm module.

(bouyer)

2020-04-25 16:10:06 UTC MAIN commitmail json YAML