| Home | Sort by: relevance | last modified time | path |
| /src/etc/rc.d/ | |
| modules | 1.1.2.2 Thu Mar 26 10:54:35 UTC 2015 martin Pull up following revision(s) (requested by jmcneill in ticket #635): etc/rc.d/Makefile: revision 1.92 distrib/sets/lists/man/mi: revision 1.1497 share/man/man5/Makefile: revision 1.71 etc/defaults/rc.conf: revision 1.132 etc/rc.d/modules: revision 1.1 usr.sbin/postinstall/postinstall: revision 1.190 distrib/sets/lists/etc/mi: revision 1.236 etc/mtree/special: revision 1.152 share/man/man5/modules.conf.5: revision 1.1 Process /etc/modules.conf (if present) at startup, before securelevel is raised, to allow module loading on ports without a module aware bootloader. |
| /src/share/man/man5/ | |
| modules.conf.5 | 1.1.2.2 Thu Mar 26 10:54:35 UTC 2015 martin Pull up following revision(s) (requested by jmcneill in ticket #635): etc/rc.d/Makefile: revision 1.92 distrib/sets/lists/man/mi: revision 1.1497 share/man/man5/Makefile: revision 1.71 etc/defaults/rc.conf: revision 1.132 etc/rc.d/modules: revision 1.1 usr.sbin/postinstall/postinstall: revision 1.190 distrib/sets/lists/etc/mi: revision 1.236 etc/mtree/special: revision 1.152 share/man/man5/modules.conf.5: revision 1.1 Process /etc/modules.conf (if present) at startup, before securelevel is raised, to allow module loading on ports without a module aware bootloader. |
| /src/tests/net/net/ | |
| t_pktinfo_send.c | 1.2.2.2 Thu Dec 21 21:08:13 UTC 2017 snj Pull up following revision(s) (requested by ryo in ticket #445): distrib/sets/lists/debug/mi: revision 1.222 distrib/sets/lists/tests/mi: revision 1.760 share/man/man4/ip.4: revision 1.38 sys/netinet/in.c: revision 1.207 sys/netinet/in.h: revision 1.101 sys/netinet/in_pcb.c: revision 1.179 sys/netinet/in_pcb.h: revision 1.64 sys/netinet/ip_output.c: revision 1.284, 1.286 sys/netinet/ip_var.h: revision 1.120-1.121 sys/netinet/raw_ip.c: revision 1.166-1.167 sys/netinet/udp_usrreq.c: revision 1.235-1.236 sys/netinet/udp_var.h: revision 1.42 tests/net/net/Makefile: revision 1.21 tests/net/net/t_pktinfo_send.c: revision 1.1-1.2 Add support IP_PKTINFO for sendmsg(2). The source address or output interface can be specified by adding IP_PKTINFO to the control part of the message on a SOCK_DGRAM or SOCK_RAW socket. Reviewed by ozaki-r@ and christos@. thanks. -- As is the case with IPV6_PKTINFO, IP_PKTINFO can be sent without EADDRINUSE even if the UDP address:port in use is specified. |
| Makefile | 1.20.4.1 Thu Dec 21 21:08:13 UTC 2017 snj Pull up following revision(s) (requested by ryo in ticket #445): distrib/sets/lists/debug/mi: revision 1.222 distrib/sets/lists/tests/mi: revision 1.760 share/man/man4/ip.4: revision 1.38 sys/netinet/in.c: revision 1.207 sys/netinet/in.h: revision 1.101 sys/netinet/in_pcb.c: revision 1.179 sys/netinet/in_pcb.h: revision 1.64 sys/netinet/ip_output.c: revision 1.284, 1.286 sys/netinet/ip_var.h: revision 1.120-1.121 sys/netinet/raw_ip.c: revision 1.166-1.167 sys/netinet/udp_usrreq.c: revision 1.235-1.236 sys/netinet/udp_var.h: revision 1.42 tests/net/net/Makefile: revision 1.21 tests/net/net/t_pktinfo_send.c: revision 1.1-1.2 Add support IP_PKTINFO for sendmsg(2). The source address or output interface can be specified by adding IP_PKTINFO to the control part of the message on a SOCK_DGRAM or SOCK_RAW socket. Reviewed by ozaki-r@ and christos@. thanks. -- As is the case with IPV6_PKTINFO, IP_PKTINFO can be sent without EADDRINUSE even if the UDP address:port in use is specified. |
| /src/lib/npf/ext_log/ | |
| shlib_version | 1.1.4.2 Sun Nov 18 22:38:29 UTC 2012 riz Pull up following revision(s) (requested by rmind in ticket #693): lib/npf/ext_normalise/shlib_version: revision 1.1 lib/libnpf/npf.c: revision 1.13 distrib/sets/lists/modules/mi: revision 1.48 sys/net/npf/npf_rproc.c: revision 1.3 sys/net/npf/npf_rproc.c: revision 1.4 sys/modules/npf/Makefile: revision 1.11 usr.sbin/npf/npfctl/npfctl.h: revision 1.20 lib/npf/ext_log/npfext_log.c: revision 1.1 lib/libnpf/npf.h: revision 1.11 sys/net/npf/npf_inet.c: revision 1.17 sys/net/npf/npf_log.c: file removal sys/net/npf/npf_handler.c: revision 1.22 distrib/sets/lists/base/shl.mi: revision 1.636 sys/net/npf/npf_impl.h: revision 1.23 usr.sbin/npf/npfctl/Makefile: revision 1.8 lib/npf/Makefile: revision 1.1 lib/npf/ext_log/shlib_version: revision 1.1 lib/Makefile: revision 1.189 distrib/sets/lists/comp/shl.mi: revision 1.236 usr.sbin/npf/npfctl/npf_build.c: revision 1.14 distrib/sets/lists/base/mi: revision 1.1007 usr.sbin/npf/npfctl/npf_scan.l: revision 1.6 distrib/sets/lists/base/mi: revision 1.1009 sys/net/npf/npf.h: revision 1.21 lib/npf/ext_normalise/npfext_normalise.c: revision 1.1 etc/mtree/NetBSD.dist.base: revision 1.105 lib/libnpf/Makefile: revision 1.3 etc/mtree/NetBSD.dist.base: revision 1.106 usr.sbin/npf/npfctl/npf_extmod.c: revision 1.1 sys/net/npf/npf_ctl.c: revision 1.18 lib/npf/ext_log/Makefile: revision 1.1 distrib/sets/lists/comp/mi: revision 1.1781 usr.sbin/npf/npfctl/npf_var.h: revision 1.4 sys/net/npf/npf.c: revision 1.13 sys/modules/Makefile: revision 1.111 sys/net/npf/npf_ext_log.c: revision 1.1 lib/npf/Makefile.inc: revision 1.1 sys/net/npf/npf_ext_normalise.c: revision 1.1 sys/net/npf/files.npf: revision 1.8 sys/rump/net/lib/libnpf/Makefile: revision 1.2 sys/modules/npf_ext_log/Makefile: revision 1.1 lib/npf/ext_normalise/Makefile: revision 1.1 usr.sbin/npf/npfctl/npfctl.c: revision 1.20 usr.sbin/npf/npfctl/npf_parse.y: revision 1.13 sys/modules/npf_ext_normalise/Makefile: revision 1.1 Implement dynamic NPF extensions interface. An extension consists of dynamically loaded module (.so) supplementing npfctl(8) and a kernel module. Move normalisation and logging functionality into their own extensions. More improvements to come. Add /usr/lib/npf. Add ./usr/libdata/debug/usr/lib/npf for rmind Fix MKDEBUG set lists ext_ops does not change during the life cycle and can be fetched without the mutex held. This avoids confusion in the compiler about an uninitialized variable ext_ops. ok rmind@ |
| Makefile | 1.1.4.2 Sun Nov 18 22:38:29 UTC 2012 riz Pull up following revision(s) (requested by rmind in ticket #693): lib/npf/ext_normalise/shlib_version: revision 1.1 lib/libnpf/npf.c: revision 1.13 distrib/sets/lists/modules/mi: revision 1.48 sys/net/npf/npf_rproc.c: revision 1.3 sys/net/npf/npf_rproc.c: revision 1.4 sys/modules/npf/Makefile: revision 1.11 usr.sbin/npf/npfctl/npfctl.h: revision 1.20 lib/npf/ext_log/npfext_log.c: revision 1.1 lib/libnpf/npf.h: revision 1.11 sys/net/npf/npf_inet.c: revision 1.17 sys/net/npf/npf_log.c: file removal sys/net/npf/npf_handler.c: revision 1.22 distrib/sets/lists/base/shl.mi: revision 1.636 sys/net/npf/npf_impl.h: revision 1.23 usr.sbin/npf/npfctl/Makefile: revision 1.8 lib/npf/Makefile: revision 1.1 lib/npf/ext_log/shlib_version: revision 1.1 lib/Makefile: revision 1.189 distrib/sets/lists/comp/shl.mi: revision 1.236 usr.sbin/npf/npfctl/npf_build.c: revision 1.14 distrib/sets/lists/base/mi: revision 1.1007 usr.sbin/npf/npfctl/npf_scan.l: revision 1.6 distrib/sets/lists/base/mi: revision 1.1009 sys/net/npf/npf.h: revision 1.21 lib/npf/ext_normalise/npfext_normalise.c: revision 1.1 etc/mtree/NetBSD.dist.base: revision 1.105 lib/libnpf/Makefile: revision 1.3 etc/mtree/NetBSD.dist.base: revision 1.106 usr.sbin/npf/npfctl/npf_extmod.c: revision 1.1 sys/net/npf/npf_ctl.c: revision 1.18 lib/npf/ext_log/Makefile: revision 1.1 distrib/sets/lists/comp/mi: revision 1.1781 usr.sbin/npf/npfctl/npf_var.h: revision 1.4 sys/net/npf/npf.c: revision 1.13 sys/modules/Makefile: revision 1.111 sys/net/npf/npf_ext_log.c: revision 1.1 lib/npf/Makefile.inc: revision 1.1 sys/net/npf/npf_ext_normalise.c: revision 1.1 sys/net/npf/files.npf: revision 1.8 sys/rump/net/lib/libnpf/Makefile: revision 1.2 sys/modules/npf_ext_log/Makefile: revision 1.1 lib/npf/ext_normalise/Makefile: revision 1.1 usr.sbin/npf/npfctl/npfctl.c: revision 1.20 usr.sbin/npf/npfctl/npf_parse.y: revision 1.13 sys/modules/npf_ext_normalise/Makefile: revision 1.1 Implement dynamic NPF extensions interface. An extension consists of dynamically loaded module (.so) supplementing npfctl(8) and a kernel module. Move normalisation and logging functionality into their own extensions. More improvements to come. Add /usr/lib/npf. Add ./usr/libdata/debug/usr/lib/npf for rmind Fix MKDEBUG set lists ext_ops does not change during the life cycle and can be fetched without the mutex held. This avoids confusion in the compiler about an uninitialized variable ext_ops. ok rmind@ |
| npfext_log.c | 1.1.4.2 Sun Nov 18 22:38:29 UTC 2012 riz Pull up following revision(s) (requested by rmind in ticket #693): lib/npf/ext_normalise/shlib_version: revision 1.1 lib/libnpf/npf.c: revision 1.13 distrib/sets/lists/modules/mi: revision 1.48 sys/net/npf/npf_rproc.c: revision 1.3 sys/net/npf/npf_rproc.c: revision 1.4 sys/modules/npf/Makefile: revision 1.11 usr.sbin/npf/npfctl/npfctl.h: revision 1.20 lib/npf/ext_log/npfext_log.c: revision 1.1 lib/libnpf/npf.h: revision 1.11 sys/net/npf/npf_inet.c: revision 1.17 sys/net/npf/npf_log.c: file removal sys/net/npf/npf_handler.c: revision 1.22 distrib/sets/lists/base/shl.mi: revision 1.636 sys/net/npf/npf_impl.h: revision 1.23 usr.sbin/npf/npfctl/Makefile: revision 1.8 lib/npf/Makefile: revision 1.1 lib/npf/ext_log/shlib_version: revision 1.1 lib/Makefile: revision 1.189 distrib/sets/lists/comp/shl.mi: revision 1.236 usr.sbin/npf/npfctl/npf_build.c: revision 1.14 distrib/sets/lists/base/mi: revision 1.1007 usr.sbin/npf/npfctl/npf_scan.l: revision 1.6 distrib/sets/lists/base/mi: revision 1.1009 sys/net/npf/npf.h: revision 1.21 lib/npf/ext_normalise/npfext_normalise.c: revision 1.1 etc/mtree/NetBSD.dist.base: revision 1.105 lib/libnpf/Makefile: revision 1.3 etc/mtree/NetBSD.dist.base: revision 1.106 usr.sbin/npf/npfctl/npf_extmod.c: revision 1.1 sys/net/npf/npf_ctl.c: revision 1.18 lib/npf/ext_log/Makefile: revision 1.1 distrib/sets/lists/comp/mi: revision 1.1781 usr.sbin/npf/npfctl/npf_var.h: revision 1.4 sys/net/npf/npf.c: revision 1.13 sys/modules/Makefile: revision 1.111 sys/net/npf/npf_ext_log.c: revision 1.1 lib/npf/Makefile.inc: revision 1.1 sys/net/npf/npf_ext_normalise.c: revision 1.1 sys/net/npf/files.npf: revision 1.8 sys/rump/net/lib/libnpf/Makefile: revision 1.2 sys/modules/npf_ext_log/Makefile: revision 1.1 lib/npf/ext_normalise/Makefile: revision 1.1 usr.sbin/npf/npfctl/npfctl.c: revision 1.20 usr.sbin/npf/npfctl/npf_parse.y: revision 1.13 sys/modules/npf_ext_normalise/Makefile: revision 1.1 Implement dynamic NPF extensions interface. An extension consists of dynamically loaded module (.so) supplementing npfctl(8) and a kernel module. Move normalisation and logging functionality into their own extensions. More improvements to come. Add /usr/lib/npf. Add ./usr/libdata/debug/usr/lib/npf for rmind Fix MKDEBUG set lists ext_ops does not change during the life cycle and can be fetched without the mutex held. This avoids confusion in the compiler about an uninitialized variable ext_ops. ok rmind@ |
| /src/sys/arch/alpha/alpha/ | |
| pmap.c | 1.236 Mon Apr 28 20:23:10 UTC 2008 martin branches: 1.236.6; 1.236.8; 1.236.10; 1.236.14; 1.236.16; Remove clause 3 and 4 from TNF licenses Mon Apr 28 20:23:10 UTC 2008 martin branches: 1.236.6; 1.236.8; 1.236.10; 1.236.14; 1.236.16; Remove clause 3 and 4 from TNF licenses .6; 1.236.8; 1.236.10; 1.236.14; 1.236.16; Remove clause 3 and 4 from TNF licenses .8; 1.236.10; 1.236.14; 1.236.16; Remove clause 3 and 4 from TNF licenses .10; 1.236.14; 1.236.16; Remove clause 3 and 4 from TNF licenses .14; 1.236.16; Remove clause 3 and 4 from TNF licenses 1.236.16.1 Wed Apr 21 00:33:53 UTC 2010 matt sync to netbsd-5 1.236.14.3 Sun Nov 15 05:55:00 UTC 2009 snj Pull up following revision(s) (requested by mhitch in ticket #1137): sys/arch/alpha/alpha/pmap.c: revision 1.250 The tlb shootdown IPI can interrupt the pool_cache_get() in places that can cause a deadlock or pool cache corruption. Take the shootdown job queue mutex before calling pool_cache_get(), which will block the IPI interrupts and seems to fix the remaining tlb shootdown deadlocks and pool cache corruption I've been seeing. Should address both PR port-alpha/38335 and PR port-alpha/42174. 1.236.14.2 Fri Oct 16 06:45:40 UTC 2009 snj Pull up following revision(s) (requested by mhitch in ticket #1073): sys/arch/alpha/alpha/pmap.c: revision 1.243 IPI interrupts occur above IPL_VM, so using IPL_VM in for the tlb shootdown queue mutex doesn't work very well. I get various deadlocks and corrupted queue entries. Change to IPL_SCHED [IPL_CLOCK] to block IPI interrupts while the cpu is mucking with the shootdown queue. 1.236.14.1 Wed Sep 16 04:26:04 UTC 2009 snj Pull up following revision(s) (requested by mhitch in ticket #953): sys/arch/alpha/alpha/pmap.c: revision 1.241 Now that secondary cpus are added the cpu_info list earlier, attempt to send pmap tlb shootdowns to them cause the shootdown job queue to fill up, but since the cpus aren't running yet, no IPIs get sent. When the job queue is full, the bit mask of cpus to send the IPI to is not set and no shootdown IPI ever gets sent after the cpu is marked running. Always set the cpumask even when the queue is full. Now I get shootdown ipis on all the secondary cpus. |
| /src/sys/dev/scsipi/ | |
| files.scsipi | 1.41.156.1 Fri Mar 01 17:29:32 UTC 2019 martin Pull up following revision(s) (requested by kardel in ticket #1197): sys/dev/scsipi/st.c: revision 1.236 sys/dev/scsipi/st.c: revision 1.237 sys/dev/scsipi/files.scsipi: revision 1.42 Fix PR kern/53949: Fix inconsistent/incomplete file mark handling to conform again to mtio(4) at close(2) time. This was necessary as the PREVENT/ALLOW bracket was reduced from a whole mount session to cover only the open(2)/close(2) time on ~2002-03-22. The rationale was to allow robots and humans to change the media during a mount session. Unfortunately this lead to file marks being written to potentially other media at the beginning on drives that used the two file marks as EOM pattern. In order for that to happen the media had to be removed after data and at most one file mark had been written before removal. The mount error message has been clarified and a warning about potential data/file mark lossage on UNIT ATTENTION during an active mount session with unfinished file marks has been added. While there, fix, but disable the commented SUN compatibility to write final file marks by opening and immediately closing the device in O_WRONLY mode. That code has not been working since around 1998. It can now be enabled with options ST_SUNCOMPAT. Additionally debug output coverage has been extended. - Correct printing type of b_blkno (int64_t) in st.c Fixes build with kUBSan on NetBSD/i386. Fix, but disable the commented SUN compatibility in st.c to write final file marks by opening and immediately closing the device in O_WRONLY mode. That code has not been working since around 1998. It can now be enabled with options ST_SUNCOMPAT. 1.41.150.1 Thu Mar 07 16:50:58 UTC 2019 martin Pull up following revision(s) (requested by kardel in ticket #1682): sys/dev/scsipi/st.c: revision 1.236 (patch) sys/dev/scsipi/st.c: revision 1.237 sys/dev/scsipi/files.scsipi: revision 1.42 Fix PR kern/53949: Fix inconsistent/incomplete file mark handling to conform again to mtio(4) at close(2) time. This was necessary as the PREVENT/ALLOW bracket was reduced from a whole mount session to cover only the open(2)/close(2) time on ~2002-03-22. The rationale was to allow robots and humans to change the media during a mount session. Unfortunately this lead to file marks being written to potentially other media at the beginning on drives that used the two file marks as EOM pattern. In order for that to happen the media had to be removed after data and at most one file mark had been written before removal. The mount error message has been clarified and a warning about potential data/file mark lossage on UNIT ATTENTION during an active mount session with unfinished file marks has been added. While there, fix, but disable the commented SUN compatibility to write final file marks by opening and immediately closing the device in O_WRONLY mode. That code has not been working since around 1998. It can now be enabled with options ST_SUNCOMPAT. Additionally debug output coverage has been extended. Correct printing type of b_blkno (int64_t) in st.c Fixes build with kUBSan on NetBSD/i386. Fix, but disable the commented SUN compatibility in st.c to write final file marks by opening and immediately closing the device in O_WRONLY mode. That code has not been working since around 1998. It can now be enabled with options ST_SUNCOMPAT. 1.41.142.1 Thu Mar 07 16:51:50 UTC 2019 martin Pull up following revision(s) (requested by kardel in ticket #1682): sys/dev/scsipi/st.c: revision 1.236 (patch) sys/dev/scsipi/st.c: revision 1.237 sys/dev/scsipi/files.scsipi: revision 1.42 Fix PR kern/53949: Fix inconsistent/incomplete file mark handling to conform again to mtio(4) at close(2) time. This was necessary as the PREVENT/ALLOW bracket was reduced from a whole mount session to cover only the open(2)/close(2) time on ~2002-03-22. The rationale was to allow robots and humans to change the media during a mount session. Unfortunately this lead to file marks being written to potentially other media at the beginning on drives that used the two file marks as EOM pattern. In order for that to happen the media had to be removed after data and at most one file mark had been written before removal. The mount error message has been clarified and a warning about potential data/file mark lossage on UNIT ATTENTION during an active mount session with unfinished file marks has been added. While there, fix, but disable the commented SUN compatibility to write final file marks by opening and immediately closing the device in O_WRONLY mode. That code has not been working since around 1998. It can now be enabled with options ST_SUNCOMPAT. Additionally debug output coverage has been extended. Correct printing type of b_blkno (int64_t) in st.c Fixes build with kUBSan on NetBSD/i386. Fix, but disable the commented SUN compatibility in st.c to write final file marks by opening and immediately closing the device in O_WRONLY mode. That code has not been working since around 1998. It can now be enabled with options ST_SUNCOMPAT. 1.41.138.1 Thu Mar 07 16:49:10 UTC 2019 martin Pull up following revision(s) (requested by kardel in ticket #1682): sys/dev/scsipi/st.c: revision 1.236 (patch) sys/dev/scsipi/st.c: revision 1.237 sys/dev/scsipi/files.scsipi: revision 1.42 Fix PR kern/53949: Fix inconsistent/incomplete file mark handling to conform again to mtio(4) at close(2) time. This was necessary as the PREVENT/ALLOW bracket was reduced from a whole mount session to cover only the open(2)/close(2) time on ~2002-03-22. The rationale was to allow robots and humans to change the media during a mount session. Unfortunately this lead to file marks being written to potentially other media at the beginning on drives that used the two file marks as EOM pattern. In order for that to happen the media had to be removed after data and at most one file mark had been written before removal. The mount error message has been clarified and a warning about potential data/file mark lossage on UNIT ATTENTION during an active mount session with unfinished file marks has been added. While there, fix, but disable the commented SUN compatibility to write final file marks by opening and immediately closing the device in O_WRONLY mode. That code has not been working since around 1998. It can now be enabled with options ST_SUNCOMPAT. Additionally debug output coverage has been extended. Correct printing type of b_blkno (int64_t) in st.c Fixes build with kUBSan on NetBSD/i386. Fix, but disable the commented SUN compatibility in st.c to write final file marks by opening and immediately closing the device in O_WRONLY mode. That code has not been working since around 1998. It can now be enabled with options ST_SUNCOMPAT. |
| /src/sys/modules/npf_ext_log/ | |
| Makefile | 1.1.4.2 Sun Nov 18 22:38:38 UTC 2012 riz Pull up following revision(s) (requested by rmind in ticket #693): lib/npf/ext_normalise/shlib_version: revision 1.1 lib/libnpf/npf.c: revision 1.13 distrib/sets/lists/modules/mi: revision 1.48 sys/net/npf/npf_rproc.c: revision 1.3 sys/net/npf/npf_rproc.c: revision 1.4 sys/modules/npf/Makefile: revision 1.11 usr.sbin/npf/npfctl/npfctl.h: revision 1.20 lib/npf/ext_log/npfext_log.c: revision 1.1 lib/libnpf/npf.h: revision 1.11 sys/net/npf/npf_inet.c: revision 1.17 sys/net/npf/npf_log.c: file removal sys/net/npf/npf_handler.c: revision 1.22 distrib/sets/lists/base/shl.mi: revision 1.636 sys/net/npf/npf_impl.h: revision 1.23 usr.sbin/npf/npfctl/Makefile: revision 1.8 lib/npf/Makefile: revision 1.1 lib/npf/ext_log/shlib_version: revision 1.1 lib/Makefile: revision 1.189 distrib/sets/lists/comp/shl.mi: revision 1.236 usr.sbin/npf/npfctl/npf_build.c: revision 1.14 distrib/sets/lists/base/mi: revision 1.1007 usr.sbin/npf/npfctl/npf_scan.l: revision 1.6 distrib/sets/lists/base/mi: revision 1.1009 sys/net/npf/npf.h: revision 1.21 lib/npf/ext_normalise/npfext_normalise.c: revision 1.1 etc/mtree/NetBSD.dist.base: revision 1.105 lib/libnpf/Makefile: revision 1.3 etc/mtree/NetBSD.dist.base: revision 1.106 usr.sbin/npf/npfctl/npf_extmod.c: revision 1.1 sys/net/npf/npf_ctl.c: revision 1.18 lib/npf/ext_log/Makefile: revision 1.1 distrib/sets/lists/comp/mi: revision 1.1781 usr.sbin/npf/npfctl/npf_var.h: revision 1.4 sys/net/npf/npf.c: revision 1.13 sys/modules/Makefile: revision 1.111 sys/net/npf/npf_ext_log.c: revision 1.1 lib/npf/Makefile.inc: revision 1.1 sys/net/npf/npf_ext_normalise.c: revision 1.1 sys/net/npf/files.npf: revision 1.8 sys/rump/net/lib/libnpf/Makefile: revision 1.2 sys/modules/npf_ext_log/Makefile: revision 1.1 lib/npf/ext_normalise/Makefile: revision 1.1 usr.sbin/npf/npfctl/npfctl.c: revision 1.20 usr.sbin/npf/npfctl/npf_parse.y: revision 1.13 sys/modules/npf_ext_normalise/Makefile: revision 1.1 Implement dynamic NPF extensions interface. An extension consists of dynamically loaded module (.so) supplementing npfctl(8) and a kernel module. Move normalisation and logging functionality into their own extensions. More improvements to come. Add /usr/lib/npf. Add ./usr/libdata/debug/usr/lib/npf for rmind Fix MKDEBUG set lists ext_ops does not change during the life cycle and can be fetched without the mutex held. This avoids confusion in the compiler about an uninitialized variable ext_ops. ok rmind@ |
| /src/usr.bin/make/unit-tests/ | |
| varmod-indirect.mk | 1.9 Mon Mar 15 20:00:50 UTC 2021 rillig make: rename ApplyModifiersState to ModChain The new name accurately describes the structural element that holds such properties as the separator character and whether the expression value is considered a single word. The old name ApplyModifiersState was too long and was meant as a placeholder anyway, when I introduced it in var.c 1.236 from 2020-07-03. |
| moderrs.mk | 1.2 Sun Jul 26 10:04:06 UTC 2020 rillig make(1): add test about missing delimiters in :@ modifier These error conditions have been broken since var.c 1.236 on 2020-07-03. |
| /src/usr.sbin/npf/npfctl/ | |
| npf_extmod.c | 1.3.2.2 Sun Nov 18 22:38:28 UTC 2012 riz Pull up following revision(s) (requested by rmind in ticket #693): lib/npf/ext_normalise/shlib_version: revision 1.1 lib/libnpf/npf.c: revision 1.13 distrib/sets/lists/modules/mi: revision 1.48 sys/net/npf/npf_rproc.c: revision 1.3 sys/net/npf/npf_rproc.c: revision 1.4 sys/modules/npf/Makefile: revision 1.11 usr.sbin/npf/npfctl/npfctl.h: revision 1.20 lib/npf/ext_log/npfext_log.c: revision 1.1 lib/libnpf/npf.h: revision 1.11 sys/net/npf/npf_inet.c: revision 1.17 sys/net/npf/npf_log.c: file removal sys/net/npf/npf_handler.c: revision 1.22 distrib/sets/lists/base/shl.mi: revision 1.636 sys/net/npf/npf_impl.h: revision 1.23 usr.sbin/npf/npfctl/Makefile: revision 1.8 lib/npf/Makefile: revision 1.1 lib/npf/ext_log/shlib_version: revision 1.1 lib/Makefile: revision 1.189 distrib/sets/lists/comp/shl.mi: revision 1.236 usr.sbin/npf/npfctl/npf_build.c: revision 1.14 distrib/sets/lists/base/mi: revision 1.1007 usr.sbin/npf/npfctl/npf_scan.l: revision 1.6 distrib/sets/lists/base/mi: revision 1.1009 sys/net/npf/npf.h: revision 1.21 lib/npf/ext_normalise/npfext_normalise.c: revision 1.1 etc/mtree/NetBSD.dist.base: revision 1.105 lib/libnpf/Makefile: revision 1.3 etc/mtree/NetBSD.dist.base: revision 1.106 usr.sbin/npf/npfctl/npf_extmod.c: revision 1.1 sys/net/npf/npf_ctl.c: revision 1.18 lib/npf/ext_log/Makefile: revision 1.1 distrib/sets/lists/comp/mi: revision 1.1781 usr.sbin/npf/npfctl/npf_var.h: revision 1.4 sys/net/npf/npf.c: revision 1.13 sys/modules/Makefile: revision 1.111 sys/net/npf/npf_ext_log.c: revision 1.1 lib/npf/Makefile.inc: revision 1.1 sys/net/npf/npf_ext_normalise.c: revision 1.1 sys/net/npf/files.npf: revision 1.8 sys/rump/net/lib/libnpf/Makefile: revision 1.2 sys/modules/npf_ext_log/Makefile: revision 1.1 lib/npf/ext_normalise/Makefile: revision 1.1 usr.sbin/npf/npfctl/npfctl.c: revision 1.20 usr.sbin/npf/npfctl/npf_parse.y: revision 1.13 sys/modules/npf_ext_normalise/Makefile: revision 1.1 Implement dynamic NPF extensions interface. An extension consists of dynamically loaded module (.so) supplementing npfctl(8) and a kernel module. Move normalisation and logging functionality into their own extensions. More improvements to come. Add /usr/lib/npf. Add ./usr/libdata/debug/usr/lib/npf for rmind Fix MKDEBUG set lists ext_ops does not change during the life cycle and can be fetched without the mutex held. This avoids confusion in the compiler about an uninitialized variable ext_ops. ok rmind@ |
| /src/lib/npf/ | |
| Makefile | 1.1.4.2 Sun Nov 18 22:38:32 UTC 2012 riz Pull up following revision(s) (requested by rmind in ticket #693): lib/npf/ext_normalise/shlib_version: revision 1.1 lib/libnpf/npf.c: revision 1.13 distrib/sets/lists/modules/mi: revision 1.48 sys/net/npf/npf_rproc.c: revision 1.3 sys/net/npf/npf_rproc.c: revision 1.4 sys/modules/npf/Makefile: revision 1.11 usr.sbin/npf/npfctl/npfctl.h: revision 1.20 lib/npf/ext_log/npfext_log.c: revision 1.1 lib/libnpf/npf.h: revision 1.11 sys/net/npf/npf_inet.c: revision 1.17 sys/net/npf/npf_log.c: file removal sys/net/npf/npf_handler.c: revision 1.22 distrib/sets/lists/base/shl.mi: revision 1.636 sys/net/npf/npf_impl.h: revision 1.23 usr.sbin/npf/npfctl/Makefile: revision 1.8 lib/npf/Makefile: revision 1.1 lib/npf/ext_log/shlib_version: revision 1.1 lib/Makefile: revision 1.189 distrib/sets/lists/comp/shl.mi: revision 1.236 usr.sbin/npf/npfctl/npf_build.c: revision 1.14 distrib/sets/lists/base/mi: revision 1.1007 usr.sbin/npf/npfctl/npf_scan.l: revision 1.6 distrib/sets/lists/base/mi: revision 1.1009 sys/net/npf/npf.h: revision 1.21 lib/npf/ext_normalise/npfext_normalise.c: revision 1.1 etc/mtree/NetBSD.dist.base: revision 1.105 lib/libnpf/Makefile: revision 1.3 etc/mtree/NetBSD.dist.base: revision 1.106 usr.sbin/npf/npfctl/npf_extmod.c: revision 1.1 sys/net/npf/npf_ctl.c: revision 1.18 lib/npf/ext_log/Makefile: revision 1.1 distrib/sets/lists/comp/mi: revision 1.1781 usr.sbin/npf/npfctl/npf_var.h: revision 1.4 sys/net/npf/npf.c: revision 1.13 sys/modules/Makefile: revision 1.111 sys/net/npf/npf_ext_log.c: revision 1.1 lib/npf/Makefile.inc: revision 1.1 sys/net/npf/npf_ext_normalise.c: revision 1.1 sys/net/npf/files.npf: revision 1.8 sys/rump/net/lib/libnpf/Makefile: revision 1.2 sys/modules/npf_ext_log/Makefile: revision 1.1 lib/npf/ext_normalise/Makefile: revision 1.1 usr.sbin/npf/npfctl/npfctl.c: revision 1.20 usr.sbin/npf/npfctl/npf_parse.y: revision 1.13 sys/modules/npf_ext_normalise/Makefile: revision 1.1 Implement dynamic NPF extensions interface. An extension consists of dynamically loaded module (.so) supplementing npfctl(8) and a kernel module. Move normalisation and logging functionality into their own extensions. More improvements to come. Add /usr/lib/npf. Add ./usr/libdata/debug/usr/lib/npf for rmind Fix MKDEBUG set lists ext_ops does not change during the life cycle and can be fetched without the mutex held. This avoids confusion in the compiler about an uninitialized variable ext_ops. ok rmind@ |
| /src/sbin/ifconfig/ | |
| ifconfig.c | 1.236 Thu Jan 07 11:32:21 UTC 2016 roy branches: 1.236.14; 1.236.16; -W seconds will wait for the detached flag to clear on addresses on interfaces marked up to allow time for the carrier to appear on the interface. This does not extend the -w option duration. Thu Jan 07 11:32:21 UTC 2016 roy branches: 1.236.14; 1.236.16; -W seconds will wait for the detached flag to clear on addresses on interfaces marked up to allow time for the carrier to appear on the interface. This does not extend the -w option duration. .14; 1.236.16; -W seconds will wait for the detached flag to clear on addresses on interfaces marked up to allow time for the carrier to appear on the interface. This does not extend the -w option duration. 1.236.16.3 Mon Apr 13 08:03:20 UTC 2020 martin Mostly merge changes from HEAD upto 20200411 1.236.16.2 Wed Apr 08 14:07:19 UTC 2020 martin Merge changes from current as of 20200406 1.236.16.1 Mon Jun 10 22:05:34 UTC 2019 christos Sync with HEAD 1.236.14.2 Wed Dec 26 14:01:29 UTC 2018 pgoyette Sync with HEAD, resolve a few conflicts 1.236.14.1 Mon Nov 26 01:52:14 UTC 2018 pgoyette Sync with HEAD, resolve a couple of conflicts |
| /src/sys/arch/i386/i386/ | |
| i386_trap.S | 1.18.4.1 Sun Jan 25 16:41:13 UTC 2026 martin Pull up following revision(s) (requested by bouyer in ticket #1998): sys/arch/amd64/include/frameasm.h: revision 1.56 sys/arch/xen/x86/xen_intr.c: revision 1.32 sys/arch/i386/include/frameasm.h: revision 1.36 sys/arch/i386/i386/locore.S: revision 1.206 sys/arch/amd64/amd64/cpufunc.S: revision 1.71 sys/arch/i386/i386/i386_trap.S: revision 1.25 sys/arch/i386/i386/spl.S: revision 1.59 sys/arch/amd64/amd64/locore.S: revision 1.236 sys/arch/amd64/amd64/spl.S: revision 1.50 sys/arch/x86/x86/fpu.c: revision 1.94 sys/arch/amd64/amd64/amd64_trap.S: revision 1.56 (all via patch) fputrap: enable interrupts before panic(), for consistency. noticed while working on PR port-xen/58561 updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movq CPUVAR(VCPU),%r ## temp_reg ; movb $1,EVTCHN_UPCALL_MASK(%r ## temp_reg); With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/amd64: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI while there, remove PUSHF/POPF macros which are unused Hopefully fixes PR port-xen/58561 Thanks to Konrad Schroder for testing and Taylor R Campbell for review. Port amd64 fix for PR port-xen/58561 to i386, with one extra fix: with recent Xen (maybe since pvshim), traps handlers are called with interrupts enabled, so adjust the i386 assembly code for this. updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movl CPUVAR(VCPU),reg movb $1,EVTCHN_UPCALL_MASK(reg) With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/i386: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI and STIC - rename PUSHF to PUSHFCLI and change it to both read and disable EVTCHN_UPCALL_MASK with preemption disabled - remove the XENPVHVM version of STIC which is unused 1.23.4.1 Sun Jan 25 16:38:53 UTC 2026 martin Pull up following revision(s) (requested by bouyer in ticket #1226): sys/arch/amd64/include/frameasm.h: revision 1.56 sys/arch/xen/x86/xen_intr.c: revision 1.32 sys/arch/i386/include/frameasm.h: revision 1.36 sys/arch/i386/i386/locore.S: revision 1.206 sys/arch/amd64/amd64/cpufunc.S: revision 1.71 sys/arch/i386/i386/i386_trap.S: revision 1.25 sys/arch/i386/i386/spl.S: revision 1.59 sys/arch/amd64/amd64/locore.S: revision 1.236 sys/arch/amd64/amd64/spl.S: revision 1.50 sys/arch/x86/x86/fpu.c: revision 1.94 sys/arch/amd64/amd64/amd64_trap.S: revision 1.56 fputrap: enable interrupts before panic(), for consistency. noticed while working on PR port-xen/58561 updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movq CPUVAR(VCPU),%r ## temp_reg ; movb $1,EVTCHN_UPCALL_MASK(%r ## temp_reg); With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/amd64: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI while there, remove PUSHF/POPF macros which are unused Hopefully fixes PR port-xen/58561 Thanks to Konrad Schroder for testing and Taylor R Campbell for review. Port amd64 fix for PR port-xen/58561 to i386, with one extra fix: with recent Xen (maybe since pvshim), traps handlers are called with interrupts enabled, so adjust the i386 assembly code for this. updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movl CPUVAR(VCPU),reg movb $1,EVTCHN_UPCALL_MASK(reg) With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/i386: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI and STIC - rename PUSHF to PUSHFCLI and change it to both read and disable EVTCHN_UPCALL_MASK with preemption disabled - remove the XENPVHVM version of STIC which is unused 1.24.2.1 Sun Jan 25 16:36:40 UTC 2026 martin Pull up following revision(s) (requested by bouyer in ticket #165): sys/arch/amd64/include/frameasm.h: revision 1.56 sys/arch/xen/x86/xen_intr.c: revision 1.32 sys/arch/i386/include/frameasm.h: revision 1.36 sys/arch/i386/i386/locore.S: revision 1.206 sys/arch/amd64/amd64/cpufunc.S: revision 1.71 sys/arch/i386/i386/i386_trap.S: revision 1.25 sys/arch/i386/i386/spl.S: revision 1.59 sys/arch/amd64/amd64/locore.S: revision 1.236 sys/arch/amd64/amd64/spl.S: revision 1.50 sys/arch/x86/x86/fpu.c: revision 1.94 sys/arch/amd64/amd64/amd64_trap.S: revision 1.56 fputrap: enable interrupts before panic(), for consistency. noticed while working on PR port-xen/58561 updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movq CPUVAR(VCPU),%r ## temp_reg ; movb $1,EVTCHN_UPCALL_MASK(%r ## temp_reg); With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/amd64: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI while there, remove PUSHF/POPF macros which are unused Hopefully fixes PR port-xen/58561 Thanks to Konrad Schroder for testing and Taylor R Campbell for review. Port amd64 fix for PR port-xen/58561 to i386, with one extra fix: with recent Xen (maybe since pvshim), traps handlers are called with interrupts enabled, so adjust the i386 assembly code for this. updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movl CPUVAR(VCPU),reg movb $1,EVTCHN_UPCALL_MASK(reg) With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/i386: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI and STIC - rename PUSHF to PUSHFCLI and change it to both read and disable EVTCHN_UPCALL_MASK with preemption disabled - remove the XENPVHVM version of STIC which is unused |
| /src/sys/arch/i386/include/ | |
| frameasm.h | 1.28.4.1 Sun Jan 25 16:41:13 UTC 2026 martin Pull up following revision(s) (requested by bouyer in ticket #1998): sys/arch/amd64/include/frameasm.h: revision 1.56 sys/arch/xen/x86/xen_intr.c: revision 1.32 sys/arch/i386/include/frameasm.h: revision 1.36 sys/arch/i386/i386/locore.S: revision 1.206 sys/arch/amd64/amd64/cpufunc.S: revision 1.71 sys/arch/i386/i386/i386_trap.S: revision 1.25 sys/arch/i386/i386/spl.S: revision 1.59 sys/arch/amd64/amd64/locore.S: revision 1.236 sys/arch/amd64/amd64/spl.S: revision 1.50 sys/arch/x86/x86/fpu.c: revision 1.94 sys/arch/amd64/amd64/amd64_trap.S: revision 1.56 (all via patch) fputrap: enable interrupts before panic(), for consistency. noticed while working on PR port-xen/58561 updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movq CPUVAR(VCPU),%r ## temp_reg ; movb $1,EVTCHN_UPCALL_MASK(%r ## temp_reg); With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/amd64: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI while there, remove PUSHF/POPF macros which are unused Hopefully fixes PR port-xen/58561 Thanks to Konrad Schroder for testing and Taylor R Campbell for review. Port amd64 fix for PR port-xen/58561 to i386, with one extra fix: with recent Xen (maybe since pvshim), traps handlers are called with interrupts enabled, so adjust the i386 assembly code for this. updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movl CPUVAR(VCPU),reg movb $1,EVTCHN_UPCALL_MASK(reg) With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/i386: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI and STIC - rename PUSHF to PUSHFCLI and change it to both read and disable EVTCHN_UPCALL_MASK with preemption disabled - remove the XENPVHVM version of STIC which is unused 1.35.12.1 Sun Jan 25 16:36:40 UTC 2026 martin Pull up following revision(s) (requested by bouyer in ticket #165): sys/arch/amd64/include/frameasm.h: revision 1.56 sys/arch/xen/x86/xen_intr.c: revision 1.32 sys/arch/i386/include/frameasm.h: revision 1.36 sys/arch/i386/i386/locore.S: revision 1.206 sys/arch/amd64/amd64/cpufunc.S: revision 1.71 sys/arch/i386/i386/i386_trap.S: revision 1.25 sys/arch/i386/i386/spl.S: revision 1.59 sys/arch/amd64/amd64/locore.S: revision 1.236 sys/arch/amd64/amd64/spl.S: revision 1.50 sys/arch/x86/x86/fpu.c: revision 1.94 sys/arch/amd64/amd64/amd64_trap.S: revision 1.56 fputrap: enable interrupts before panic(), for consistency. noticed while working on PR port-xen/58561 updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movq CPUVAR(VCPU),%r ## temp_reg ; movb $1,EVTCHN_UPCALL_MASK(%r ## temp_reg); With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/amd64: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI while there, remove PUSHF/POPF macros which are unused Hopefully fixes PR port-xen/58561 Thanks to Konrad Schroder for testing and Taylor R Campbell for review. Port amd64 fix for PR port-xen/58561 to i386, with one extra fix: with recent Xen (maybe since pvshim), traps handlers are called with interrupts enabled, so adjust the i386 assembly code for this. updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movl CPUVAR(VCPU),reg movb $1,EVTCHN_UPCALL_MASK(reg) With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/i386: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI and STIC - rename PUSHF to PUSHFCLI and change it to both read and disable EVTCHN_UPCALL_MASK with preemption disabled - remove the XENPVHVM version of STIC which is unused 1.35.4.1 Sun Jan 25 16:38:53 UTC 2026 martin Pull up following revision(s) (requested by bouyer in ticket #1226): sys/arch/amd64/include/frameasm.h: revision 1.56 sys/arch/xen/x86/xen_intr.c: revision 1.32 sys/arch/i386/include/frameasm.h: revision 1.36 sys/arch/i386/i386/locore.S: revision 1.206 sys/arch/amd64/amd64/cpufunc.S: revision 1.71 sys/arch/i386/i386/i386_trap.S: revision 1.25 sys/arch/i386/i386/spl.S: revision 1.59 sys/arch/amd64/amd64/locore.S: revision 1.236 sys/arch/amd64/amd64/spl.S: revision 1.50 sys/arch/x86/x86/fpu.c: revision 1.94 sys/arch/amd64/amd64/amd64_trap.S: revision 1.56 fputrap: enable interrupts before panic(), for consistency. noticed while working on PR port-xen/58561 updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movq CPUVAR(VCPU),%r ## temp_reg ; movb $1,EVTCHN_UPCALL_MASK(%r ## temp_reg); With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/amd64: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI while there, remove PUSHF/POPF macros which are unused Hopefully fixes PR port-xen/58561 Thanks to Konrad Schroder for testing and Taylor R Campbell for review. Port amd64 fix for PR port-xen/58561 to i386, with one extra fix: with recent Xen (maybe since pvshim), traps handlers are called with interrupts enabled, so adjust the i386 assembly code for this. updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movl CPUVAR(VCPU),reg movb $1,EVTCHN_UPCALL_MASK(reg) With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/i386: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI and STIC - rename PUSHF to PUSHFCLI and change it to both read and disable EVTCHN_UPCALL_MASK with preemption disabled - remove the XENPVHVM version of STIC which is unused |
| /src/sys/arch/xen/x86/ | |
| xen_intr.c | 1.17.2.2 Sun Jan 25 16:41:13 UTC 2026 martin Pull up following revision(s) (requested by bouyer in ticket #1998): sys/arch/amd64/include/frameasm.h: revision 1.56 sys/arch/xen/x86/xen_intr.c: revision 1.32 sys/arch/i386/include/frameasm.h: revision 1.36 sys/arch/i386/i386/locore.S: revision 1.206 sys/arch/amd64/amd64/cpufunc.S: revision 1.71 sys/arch/i386/i386/i386_trap.S: revision 1.25 sys/arch/i386/i386/spl.S: revision 1.59 sys/arch/amd64/amd64/locore.S: revision 1.236 sys/arch/amd64/amd64/spl.S: revision 1.50 sys/arch/x86/x86/fpu.c: revision 1.94 sys/arch/amd64/amd64/amd64_trap.S: revision 1.56 (all via patch) fputrap: enable interrupts before panic(), for consistency. noticed while working on PR port-xen/58561 updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movq CPUVAR(VCPU),%r ## temp_reg ; movb $1,EVTCHN_UPCALL_MASK(%r ## temp_reg); With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/amd64: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI while there, remove PUSHF/POPF macros which are unused Hopefully fixes PR port-xen/58561 Thanks to Konrad Schroder for testing and Taylor R Campbell for review. Port amd64 fix for PR port-xen/58561 to i386, with one extra fix: with recent Xen (maybe since pvshim), traps handlers are called with interrupts enabled, so adjust the i386 assembly code for this. updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movl CPUVAR(VCPU),reg movb $1,EVTCHN_UPCALL_MASK(reg) With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/i386: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI and STIC - rename PUSHF to PUSHFCLI and change it to both read and disable EVTCHN_UPCALL_MASK with preemption disabled - remove the XENPVHVM version of STIC which is unused 1.30.4.2 Sun Jan 25 16:38:53 UTC 2026 martin Pull up following revision(s) (requested by bouyer in ticket #1226): sys/arch/amd64/include/frameasm.h: revision 1.56 sys/arch/xen/x86/xen_intr.c: revision 1.32 sys/arch/i386/include/frameasm.h: revision 1.36 sys/arch/i386/i386/locore.S: revision 1.206 sys/arch/amd64/amd64/cpufunc.S: revision 1.71 sys/arch/i386/i386/i386_trap.S: revision 1.25 sys/arch/i386/i386/spl.S: revision 1.59 sys/arch/amd64/amd64/locore.S: revision 1.236 sys/arch/amd64/amd64/spl.S: revision 1.50 sys/arch/x86/x86/fpu.c: revision 1.94 sys/arch/amd64/amd64/amd64_trap.S: revision 1.56 fputrap: enable interrupts before panic(), for consistency. noticed while working on PR port-xen/58561 updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movq CPUVAR(VCPU),%r ## temp_reg ; movb $1,EVTCHN_UPCALL_MASK(%r ## temp_reg); With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/amd64: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI while there, remove PUSHF/POPF macros which are unused Hopefully fixes PR port-xen/58561 Thanks to Konrad Schroder for testing and Taylor R Campbell for review. Port amd64 fix for PR port-xen/58561 to i386, with one extra fix: with recent Xen (maybe since pvshim), traps handlers are called with interrupts enabled, so adjust the i386 assembly code for this. updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movl CPUVAR(VCPU),reg movb $1,EVTCHN_UPCALL_MASK(reg) With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/i386: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI and STIC - rename PUSHF to PUSHFCLI and change it to both read and disable EVTCHN_UPCALL_MASK with preemption disabled - remove the XENPVHVM version of STIC which is unused 1.31.8.1 Sun Jan 25 16:36:40 UTC 2026 martin Pull up following revision(s) (requested by bouyer in ticket #165): sys/arch/amd64/include/frameasm.h: revision 1.56 sys/arch/xen/x86/xen_intr.c: revision 1.32 sys/arch/i386/include/frameasm.h: revision 1.36 sys/arch/i386/i386/locore.S: revision 1.206 sys/arch/amd64/amd64/cpufunc.S: revision 1.71 sys/arch/i386/i386/i386_trap.S: revision 1.25 sys/arch/i386/i386/spl.S: revision 1.59 sys/arch/amd64/amd64/locore.S: revision 1.236 sys/arch/amd64/amd64/spl.S: revision 1.50 sys/arch/x86/x86/fpu.c: revision 1.94 sys/arch/amd64/amd64/amd64_trap.S: revision 1.56 fputrap: enable interrupts before panic(), for consistency. noticed while working on PR port-xen/58561 updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movq CPUVAR(VCPU),%r ## temp_reg ; movb $1,EVTCHN_UPCALL_MASK(%r ## temp_reg); With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/amd64: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI while there, remove PUSHF/POPF macros which are unused Hopefully fixes PR port-xen/58561 Thanks to Konrad Schroder for testing and Taylor R Campbell for review. Port amd64 fix for PR port-xen/58561 to i386, with one extra fix: with recent Xen (maybe since pvshim), traps handlers are called with interrupts enabled, so adjust the i386 assembly code for this. updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movl CPUVAR(VCPU),reg movb $1,EVTCHN_UPCALL_MASK(reg) With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/i386: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI and STIC - rename PUSHF to PUSHFCLI and change it to both read and disable EVTCHN_UPCALL_MASK with preemption disabled - remove the XENPVHVM version of STIC which is unused |
| /src/share/mk/ | |
| bsd.README | 1.236 Sun Oct 26 23:13:24 UTC 2008 apb branches: 1.236.2; Always define TOOL_* variables in bsd.own.mk, not in bsd.sys.mk. Previously, they were defined in bsd.own.mk if USETOOLS=yes, but in bsd.sys.mk if USETOOLS!=yes. This caused makefiles that did this: .include <bsd.own.mk> FOO != ${TOOL_BAR} args... to work in the USETOOLS=yes case but not in the USETOOLS!=yes case. Sun Oct 26 23:13:24 UTC 2008 apb branches: 1.236.2; Always define TOOL_* variables in bsd.own.mk, not in bsd.sys.mk. Previously, they were defined in bsd.own.mk if USETOOLS=yes, but in bsd.sys.mk if USETOOLS!=yes. This caused makefiles that did this: .include <bsd.own.mk> FOO != ${TOOL_BAR} args... to work in the USETOOLS=yes case but not in the USETOOLS!=yes case. 1.236.2.9 Wed Sep 03 02:09:24 UTC 2014 msaitoh Pull up following revision(s) (requested by tls in ticket #1338): share/mk/bsd.README: revision 1.265 share/mk/bsd.lib.mk: revision 1.304 Change shared object file extension from .so to .pico, to avoid conflicts with shared libaries names libXX.so; as recently seen with MKUPDATE=yes builds for libelf and libnvpair. All now stalled regular .so files need to be manually removed from object directories. 1.236.2.8 Sat Jun 06 22:10:12 UTC 2009 bouyer Pull up following revision(s) (requested by snj in ticket #790): share/mk/bsd.lib.mk: revision 1.298 share/mk/bsd.man.mk: revision 1.100 share/mk/bsd.hostprog.mk: revision 1.55 distrib/sets/maketars: revision 1.66 share/zoneinfo/Makefile: revision 1.43 share/mk/bsd.kmodule.mk: revision 1.19 usr.bin/xinstall/xinstall.c: revisions 1.106 - 1.108 via patch share/mk/bsd.prog.mk: revision 1.241 share/dict/Makefile: revision 1.17 share/mk/bsd.README: revision 1.249 distrib/common/parselist.awk: revision 1.16 share/mk/bsd.links.mk: revision 1.34 Explicitly sort entries on preparing set files from METALOG. METALOG could have different order due to install(1) race on parallel builds, and mtree(8) doesn't sort files. Should fix inconsistent shared sets among builds as seen in /pub/NetBSD-daily/netbsd-5/200904010000Z/shared/ and /pub/NetBSD-daily/netbsd-5/200904010002Z/shared/ dirs. Okay'ed by snj@. Changes for installing with a metalog: * When installing hard links and using a metalog, if -o, -g, -m, or -f args were explicitly specified on the command line, then believe them, but do not implicitly believe uname/gname/mode/flags from the file system. * Output fields in the same order used by mtree. Fix -Wshadow -Wcast-qual issues Re-calculate size and digestresult after stripping, to ensure that correct values appear in the metalog. Add LINKSOWN, LINKSGRP, and LINKSMODE variables for use by bsd.links.mk when installing hard links. They have no effect except when using a metalog, in which case the information is added to the metalog. In the future, these variables may be replaced by a method for explicitly recording hard links in a metadata log. Also change a few things that called ${INSTALL_LINK} without going through bsd.links.mk. Reviewed by perry and joerg. This should fix PR 24457 and PR 41155. 1.236.2.7 Mon Jan 26 00:30:32 UTC 2009 snj branches: 1.236.2.7.2; Pull up following revision(s) (requested by christos in ticket #309): share/mk/bsd.README: revision 1.246 Document USE_FORT. .2.7 Mon Jan 26 00:30:32 UTC 2009 snj branches: 1.236.2.7.2; Pull up following revision(s) (requested by christos in ticket #309): share/mk/bsd.README: revision 1.246 Document USE_FORT. 1.236.2.6 Fri Jan 16 21:41:10 UTC 2009 bouyer Apply patch, requested by pooka in ticket 259: distrib/sets/sets.subr patch distrib/sets/lists/base/lkm.mi patch distrib/sets/lists/base/md.amd64 patch distrib/sets/lists/base/md.sparc64 patch distrib/sets/lists/base/mi patch distrib/sets/lists/base/shl.elf patch distrib/sets/lists/base/shl.mi patch distrib/sets/lists/comp/md.amd64 patch distrib/sets/lists/comp/md.sparc64 patch distrib/sets/lists/comp/mi patch distrib/sets/lists/comp/shl.mi patch distrib/sets/lists/man/mi patch lib/Makefile patch share/man/man5/mk.conf.5 patch share/mk/bsd.README patch share/mk/bsd.own.mk patch sys/lkm/vfs/Makefile patch usr.sbin/Makefile patch Now that MKPUFFS is default, kill it as advertised. While there, give puffs and refuse files sensible syspkg entries. 1.236.2.5 Fri Jan 09 03:35:50 UTC 2009 snj Pull up following revision(s) (requested by mrg in ticket #242): external/mit/xorg/lib/libGLU/Makefile: revision 1.3 share/mk/bsd.README: revision 1.244 share/mk/bsd.lib.mk: revision 1.291 add LIBISCXX. if it is != "no", use ${CXX} instead of ${CC} to link shared libraries. use it for the one c++ library we have. fixes PR#39936. 1.236.2.4 Sat Dec 06 21:58:43 UTC 2008 snj Pull up following revision(s) (requested by cube in ticket #168): share/mk/bsd.README: revision 1.243 share/mk/bsd.files.mk: revision 1.40 Implement FILESBUILD_<file> to allow a FILES element to be built through a target. 1.236.2.3 Sat Nov 15 22:10:33 UTC 2008 snj Pull up following revision(s) (requested by mrg in ticket #64): share/man/man5/mk.conf.5: revision 1.46 share/mk/bsd.own.mk: revision 1.550 doc/BUILDING.mdoc: revision 1.70 BUILDING: revision 1.81 share/mk/bsd.README: revision 1.242 revert sparc back to default of XFree86 at the request of macallan. |
| /src/sys/kern/ | |
| kern_exit.c | 1.236 Wed Feb 15 11:59:30 UTC 2012 martin branches: 1.236.2; Fix fallout from the new tests exercising all error paths: do not deactivate the pmap of a vmspace-less child of a posix spawn operation that never made it to userland. Wed Feb 15 11:59:30 UTC 2012 martin branches: 1.236.2; Fix fallout from the new tests exercising all error paths: do not deactivate the pmap of a vmspace-less child of a posix spawn operation that never made it to userland. 1.236.2.5 Sun Nov 15 20:44:10 UTC 2015 bouyer Pull up following revision(s) (requested by pgoyette in ticket #1336): sys/kern/kern_exit.c: revision 1.248 Update value of p_stat before we release the proc_lock. Thanks to Robert Elz. XXX Pull-ups for -7, -6{,-0,-1} and -5{,-0,-1,-2} 1.236.2.4 Sun Nov 15 20:37:04 UTC 2015 bouyer Pull up following revision(s) (requested by pgoyette in ticket #1333): sys/kern/kern_exec.c: revision 1.420 sys/kern/kern_synch.c: revision 1.309 sys/kern/kern_exit.c: revision 1.246 sys/kern/kern_exit.c: revision 1.247 sys/kern/kern_exec.c: revision 1.419 In execve_runproc(), update the p_waited entry for the process being moved to SSTOP state, not for its parent. (It is correct to update the parent's p_nstopchild count.) If the value is not already zero, it could prevent its parent from waiting for the process. Fixes PR kern/50298 Pullups will be requested for: NetBSD-7, -6, -6-0, -6-1, -5, -5-0, -5-1, and -5-2 When clearing out the scheduler queues during system shutdown, we move all processes to the SSTOP state. Make sure we update each process's p_waited and the parents' p_nstopchild counters to maintain consistent values. Should not make any real difference this late in the shutdown process, but we should still be consistent just in case. Fixes PR kern/50318 Pullups will be requested for: NetBSD-7, -6, -6-0, -6-1, -5, -5-0, -5-1, and -5-2 Currently, if a process is exiting and its parent has indicated no intent of reaping the process (nor any other children), the process wil get reparented to init. Since the state of the exiting process at this point is SDEAD, proc_reparent() will not update either the old or new parent's p_nstopchild counters. This change causes both old and new parents to be properly updated. Fixes PR kern/50300 Pullups will be requested for: NetBSD-7, -6, -6-0, -6-1, -5, -5-0, -5-1, and -5-2 For processes marked with PS_STOPEXIT, update the process's p_waited value, and update its parent's p_nstopchild value when marking the process's p_stat to SSTOP. The process needed to be SACTIVE to get here, so this transition represents an additional process for which the parent needs to wait. Fixes PR kern/50308 Pullups will be requested for: NetBSD-7, -6, -6-0, -6-1, -5, -5-0, -5-1, and -5-2 In spawn_return() we temporarily move the process state to SSTOP, but without updating its p_waited value or its parent's p_nstopchild counter. Later, we restore the original state, again without any adjustment of the related values. This leaves a relatively short window when the values are inconsistent and could interfere with the proper operation of sys_wait() for the parent (if it manages to be scheduled; it's not totally clear what, if anything, prevents scheduling/execution of the parent). If during this window, any of the checks being made result in an error, we call exit1() which will eventually migrate the process's state to SDEAD (with an intermediate transition to SDYING). At this point the other variables get updated, and we finally restore a consistent state. This change updates the p_waited and parent's p_nstopchild at each step to eliminate any windows during which the values could lead to incorrect decisions. Fixes PR kern/50330 Pullups will be requested for NetBSD-7, -6, -6-0, and -6-1 1.236.2.3 Wed May 21 21:04:31 UTC 2014 bouyer Pull up following revision(s) (requested by christos in ticket #1061): sys/kern/kern_exit.c: revision 1.244 Free pid for linux processes. Reported by Mark Davies, fix by dsl@ XXX: pullup 6 1.236.2.2 Mon Oct 01 23:07:07 UTC 2012 riz branches: 1.236.2.2.2; 1.236.2.2.4; Pull up following revision(s) (requested by rmind in ticket #583): sys/kern/sys_lwp.c: revision 1.55 sys/sys/lwp.h: revision 1.164 sys/kern/kern_exit.c: revision 1.242 sys/kern/kern_lwp.c: revision 1.173 exit_lwps, lwp_wait: fix a race condition by re-trying if p_lock was dropped in a case of process exit. Necessary to re-flag all LWPs for exit, as their state might have changed or new LWPs spawned. Should fix PR/46168 and PR/46402. .2.2 Mon Oct 01 23:07:07 UTC 2012 riz branches: 1.236.2.2.2; 1.236.2.2.4; Pull up following revision(s) (requested by rmind in ticket #583): sys/kern/sys_lwp.c: revision 1.55 sys/sys/lwp.h: revision 1.164 sys/kern/kern_exit.c: revision 1.242 sys/kern/kern_lwp.c: revision 1.173 exit_lwps, lwp_wait: fix a race condition by re-trying if p_lock was dropped in a case of process exit. Necessary to re-flag all LWPs for exit, as their state might have changed or new LWPs spawned. Should fix PR/46168 and PR/46402. .2.2.2; 1.236.2.2.4; Pull up following revision(s) (requested by rmind in ticket #583): sys/kern/sys_lwp.c: revision 1.55 sys/sys/lwp.h: revision 1.164 sys/kern/kern_exit.c: revision 1.242 sys/kern/kern_lwp.c: revision 1.173 exit_lwps, lwp_wait: fix a race condition by re-trying if p_lock was dropped in a case of process exit. Necessary to re-flag all LWPs for exit, as their state might have changed or new LWPs spawned. Should fix PR/46168 and PR/46402. 1.236.2.1 Thu Apr 12 17:05:36 UTC 2012 riz branches: 1.236.2.1.2; Pull up following revision(s) (requested by martin in ticket #175): sys/kern/kern_exit.c: revision 1.238 tests/lib/libc/gen/posix_spawn/t_fileactions.c: revision 1.4 tests/lib/libc/gen/posix_spawn/t_fileactions.c: revision 1.5 sys/uvm/uvm_extern.h: revision 1.183 lib/libc/gen/posix_spawn_fileactions.c: revision 1.2 sys/kern/kern_exec.c: revision 1.348 sys/kern/kern_exec.c: revision 1.349 sys/compat/netbsd32/syscalls.master: revision 1.95 sys/uvm/uvm_glue.c: revision 1.159 sys/uvm/uvm_map.c: revision 1.317 sys/compat/netbsd32/netbsd32.h: revision 1.95 sys/kern/exec_elf.c: revision 1.38 sys/sys/spawn.h: revision 1.2 sys/sys/exec.h: revision 1.135 sys/compat/netbsd32/netbsd32_execve.c: revision 1.34 Rework posix_spawn locking and memory management: - always provide a vmspace for the new proc, initially borrowing from proc0 (this part fixes PR 46286) - increase parallelism between parent and child if arguments allow this, avoiding a potential deadlock on exec_lock - add a new flag for userland to request old (lockstepped) behaviour for better error reporting - adapt test cases to the previous two and add a new variant to test the diagnostics flag - fix a few memory (and lock) leaks - provide netbsd32 compat Fix asynchronous posix_spawn child exit status (and test for it). .2.1 Thu Apr 12 17:05:36 UTC 2012 riz branches: 1.236.2.1.2; Pull up following revision(s) (requested by martin in ticket #175): sys/kern/kern_exit.c: revision 1.238 tests/lib/libc/gen/posix_spawn/t_fileactions.c: revision 1.4 tests/lib/libc/gen/posix_spawn/t_fileactions.c: revision 1.5 sys/uvm/uvm_extern.h: revision 1.183 lib/libc/gen/posix_spawn_fileactions.c: revision 1.2 sys/kern/kern_exec.c: revision 1.348 sys/kern/kern_exec.c: revision 1.349 sys/compat/netbsd32/syscalls.master: revision 1.95 sys/uvm/uvm_glue.c: revision 1.159 sys/uvm/uvm_map.c: revision 1.317 sys/compat/netbsd32/netbsd32.h: revision 1.95 sys/kern/exec_elf.c: revision 1.38 sys/sys/spawn.h: revision 1.2 sys/sys/exec.h: revision 1.135 sys/compat/netbsd32/netbsd32_execve.c: revision 1.34 Rework posix_spawn locking and memory management: - always provide a vmspace for the new proc, initially borrowing from proc0 (this part fixes PR 46286) - increase parallelism between parent and child if arguments allow this, avoiding a potential deadlock on exec_lock - add a new flag for userland to request old (lockstepped) behaviour for better error reporting - adapt test cases to the previous two and add a new variant to test the diagnostics flag - fix a few memory (and lock) leaks - provide netbsd32 compat Fix asynchronous posix_spawn child exit status (and test for it). |
| /src/sys/net/ | |
| if_arcsubr.c | 1.63.20.1 Sun Feb 05 05:46:51 UTC 2017 snj Pull up following revision(s) (requested by maxv in ticket #1429): sys/net/if_arcsubr.c: revision 1.76 via patch sys/net/if_ecosubr.c: revision 1.50 via patch sys/net/if_ethersubr.c: revision 1.236 via patch sys/net/if_fddisubr.c: revision 1.104 via patch sys/net/if_tokensubr.c: revision 1.80 via patch Don't forget to free the mbuf when we decide not to reply to an ARP request. This obviously is a terrible bug, since it allows a remote sender to DoS the system with specially-crafted requests sent in a loop. 1.63.14.2 Sun Feb 05 05:48:00 UTC 2017 snj Pull up following revision(s) (requested by maxv in ticket #1429): sys/net/if_arcsubr.c: revision 1.76 via patch sys/net/if_ecosubr.c: revision 1.50 via patch sys/net/if_ethersubr.c: revision 1.236 via patch sys/net/if_fddisubr.c: revision 1.104 via patch sys/net/if_tokensubr.c: revision 1.80 via patch Don't forget to free the mbuf when we decide not to reply to an ARP request. This obviously is a terrible bug, since it allows a remote sender to DoS the system with specially-crafted requests sent in a loop. 1.63.14.1.2.1 Sun Feb 05 05:47:28 UTC 2017 snj Pull up following revision(s) (requested by maxv in ticket #1429): sys/net/if_arcsubr.c: revision 1.76 via patch sys/net/if_ecosubr.c: revision 1.50 via patch sys/net/if_ethersubr.c: revision 1.236 via patch sys/net/if_fddisubr.c: revision 1.104 via patch sys/net/if_tokensubr.c: revision 1.80 via patch Don't forget to free the mbuf when we decide not to reply to an ARP request. This obviously is a terrible bug, since it allows a remote sender to DoS the system with specially-crafted requests sent in a loop. 1.66.6.1 Sun Feb 05 19:14:01 UTC 2017 snj Pull up following revision(s) (requested by maxv in ticket #1355): sys/net/if_arcsubr.c: revision 1.76 via patch sys/net/if_ecosubr.c: revision 1.50 via patch sys/net/if_ethersubr.c: revision 1.236 via patch sys/net/if_fddisubr.c: revision 1.104 via patch sys/net/if_tokensubr.c: revision 1.80 via patch Don't forget to free the mbuf when we decide not to reply to an ARP request. This obviously is a terrible bug, since it allows a remote sender to DoS the system with specially-crafted requests sent in a loop. 1.66.2.1 Sun Feb 05 19:14:17 UTC 2017 snj Pull up following revision(s) (requested by maxv in ticket #1355): sys/net/if_arcsubr.c: revision 1.76 via patch sys/net/if_ecosubr.c: revision 1.50 via patch sys/net/if_ethersubr.c: revision 1.236 via patch sys/net/if_fddisubr.c: revision 1.104 via patch sys/net/if_tokensubr.c: revision 1.80 via patch Don't forget to free the mbuf when we decide not to reply to an ARP request. This obviously is a terrible bug, since it allows a remote sender to DoS the system with specially-crafted requests sent in a loop. |
| /src/sys/arch/amd64/amd64/ | |
| amd64_trap.S | 1.48.2.1 Sun Jan 25 16:41:13 UTC 2026 martin Pull up following revision(s) (requested by bouyer in ticket #1998): sys/arch/amd64/include/frameasm.h: revision 1.56 sys/arch/xen/x86/xen_intr.c: revision 1.32 sys/arch/i386/include/frameasm.h: revision 1.36 sys/arch/i386/i386/locore.S: revision 1.206 sys/arch/amd64/amd64/cpufunc.S: revision 1.71 sys/arch/i386/i386/i386_trap.S: revision 1.25 sys/arch/i386/i386/spl.S: revision 1.59 sys/arch/amd64/amd64/locore.S: revision 1.236 sys/arch/amd64/amd64/spl.S: revision 1.50 sys/arch/x86/x86/fpu.c: revision 1.94 sys/arch/amd64/amd64/amd64_trap.S: revision 1.56 (all via patch) fputrap: enable interrupts before panic(), for consistency. noticed while working on PR port-xen/58561 updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movq CPUVAR(VCPU),%r ## temp_reg ; movb $1,EVTCHN_UPCALL_MASK(%r ## temp_reg); With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/amd64: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI while there, remove PUSHF/POPF macros which are unused Hopefully fixes PR port-xen/58561 Thanks to Konrad Schroder for testing and Taylor R Campbell for review. Port amd64 fix for PR port-xen/58561 to i386, with one extra fix: with recent Xen (maybe since pvshim), traps handlers are called with interrupts enabled, so adjust the i386 assembly code for this. updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movl CPUVAR(VCPU),reg movb $1,EVTCHN_UPCALL_MASK(reg) With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/i386: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI and STIC - rename PUSHF to PUSHFCLI and change it to both read and disable EVTCHN_UPCALL_MASK with preemption disabled - remove the XENPVHVM version of STIC which is unused 1.54.4.2 Sun Jan 25 16:38:53 UTC 2026 martin Pull up following revision(s) (requested by bouyer in ticket #1226): sys/arch/amd64/include/frameasm.h: revision 1.56 sys/arch/xen/x86/xen_intr.c: revision 1.32 sys/arch/i386/include/frameasm.h: revision 1.36 sys/arch/i386/i386/locore.S: revision 1.206 sys/arch/amd64/amd64/cpufunc.S: revision 1.71 sys/arch/i386/i386/i386_trap.S: revision 1.25 sys/arch/i386/i386/spl.S: revision 1.59 sys/arch/amd64/amd64/locore.S: revision 1.236 sys/arch/amd64/amd64/spl.S: revision 1.50 sys/arch/x86/x86/fpu.c: revision 1.94 sys/arch/amd64/amd64/amd64_trap.S: revision 1.56 fputrap: enable interrupts before panic(), for consistency. noticed while working on PR port-xen/58561 updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movq CPUVAR(VCPU),%r ## temp_reg ; movb $1,EVTCHN_UPCALL_MASK(%r ## temp_reg); With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/amd64: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI while there, remove PUSHF/POPF macros which are unused Hopefully fixes PR port-xen/58561 Thanks to Konrad Schroder for testing and Taylor R Campbell for review. Port amd64 fix for PR port-xen/58561 to i386, with one extra fix: with recent Xen (maybe since pvshim), traps handlers are called with interrupts enabled, so adjust the i386 assembly code for this. updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movl CPUVAR(VCPU),reg movb $1,EVTCHN_UPCALL_MASK(reg) With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/i386: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI and STIC - rename PUSHF to PUSHFCLI and change it to both read and disable EVTCHN_UPCALL_MASK with preemption disabled - remove the XENPVHVM version of STIC which is unused 1.55.8.1 Sun Jan 25 16:36:40 UTC 2026 martin Pull up following revision(s) (requested by bouyer in ticket #165): sys/arch/amd64/include/frameasm.h: revision 1.56 sys/arch/xen/x86/xen_intr.c: revision 1.32 sys/arch/i386/include/frameasm.h: revision 1.36 sys/arch/i386/i386/locore.S: revision 1.206 sys/arch/amd64/amd64/cpufunc.S: revision 1.71 sys/arch/i386/i386/i386_trap.S: revision 1.25 sys/arch/i386/i386/spl.S: revision 1.59 sys/arch/amd64/amd64/locore.S: revision 1.236 sys/arch/amd64/amd64/spl.S: revision 1.50 sys/arch/x86/x86/fpu.c: revision 1.94 sys/arch/amd64/amd64/amd64_trap.S: revision 1.56 fputrap: enable interrupts before panic(), for consistency. noticed while working on PR port-xen/58561 updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movq CPUVAR(VCPU),%r ## temp_reg ; movb $1,EVTCHN_UPCALL_MASK(%r ## temp_reg); With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/amd64: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI while there, remove PUSHF/POPF macros which are unused Hopefully fixes PR port-xen/58561 Thanks to Konrad Schroder for testing and Taylor R Campbell for review. Port amd64 fix for PR port-xen/58561 to i386, with one extra fix: with recent Xen (maybe since pvshim), traps handlers are called with interrupts enabled, so adjust the i386 assembly code for this. updating curcup()->ci_vcpu->evtchn_upcall_mask requires 2 intructions, e.g. movl CPUVAR(VCPU),reg movb $1,EVTCHN_UPCALL_MASK(reg) With preemption enabled we may be moved to another CPU between the 2 intructions and we end up updating the evtchn_upcall_mask of another VCPU than the one we're now running on. Fix for Xen/i386: - Add a CLI2 macro, which disables preemtion before the above sequence. Use it instead of CLI where preemtion may be enabled - Add DIAGNOSTIC code to check that preemtion is disabled in CLI - Add DIAGNOSTIC code to check that interrupts are disabled when calling STI and STIC - rename PUSHF to PUSHFCLI and change it to both read and disable EVTCHN_UPCALL_MASK with preemption disabled - remove the XENPVHVM version of STIC which is unused |
| /src/sys/sys/ | |
| proc.h | 1.236 Fri Feb 16 00:39:16 UTC 2007 ad branches: 1.236.2; proc_free() was returning a NULL rusage pointer to wait() when a traced process was reparented. Change proc_free() to copy the rusage to a buffer on the stack if required, so it can be passed both to the debugger and to the real parent process. Fixes kern/35582 (kernel panics with gdb). Fri Feb 16 00:39:16 UTC 2007 ad branches: 1.236.2; proc_free() was returning a NULL rusage pointer to wait() when a traced process was reparented. Change proc_free() to copy the rusage to a buffer on the stack if required, so it can be passed both to the debugger and to the real parent process. Fixes kern/35582 (kernel panics with gdb). 1.236.2.11 Thu May 17 13:41:56 UTC 2007 yamt sync with head. 1.236.2.10 Mon May 07 10:56:14 UTC 2007 yamt sync with head. 1.236.2.9 Sat Apr 21 15:50:22 UTC 2007 ad Some changes mainly for top/ps: - Add an optional name field to struct lwp. - Count the total number of context switches + involuntary, not voluntary + involuntary. - Mark the idle threads as LSIDL when not running, otherwise they show up funny in a top(1) that shows threads. - Make pctcpu and cpticks per-LWP attributes. - Add to kinfo_lwp: cpticks, pctcpu, pid, name. 1.236.2.8 Tue Apr 03 15:20:43 UTC 2007 matt Allow cpu_lwp_free2 to be defined away 1.236.2.7 Fri Mar 23 20:16:55 UTC 2007 ad curlwp is never NULL now. 1.236.2.6 Mon Mar 12 06:00:53 UTC 2007 rmind Sync with HEAD. 1.236.2.5 Fri Mar 09 15:16:26 UTC 2007 rmind Checkpoint: - Addition of scheduler-specific pointers in the struct proc, lwp and schedstate_percpu. - Addition of sched_lwp_fork(), sched_lwp_exit() and sched_slept() hooks. - mi_switch() now has only one argument. - sched_nextlwp(void) becomes sched_switch(struct lwp *) and does an enqueueing of LWP. - Addition of general kern.sched sysctl node. - Remove twice called uvmexp.swtch++, other cleanups. Discussed on tech-kern@ 1.236.2.4 Tue Feb 27 16:55:16 UTC 2007 yamt - sync with head. - move sched_changepri back to kern_synch.c as it doesn't know PPQ anymore. |
| /src/sys/dev/pci/ | |
| pcidevs | 1.236 Fri Jun 16 08:13:25 UTC 2000 soren branches: 1.236.2; Add some S3 chips. Fri Jun 16 08:13:25 UTC 2000 soren branches: 1.236.2; Add some S3 chips. 1.236.2.27 Wed Apr 07 07:12:44 UTC 2004 jmc Pullup rev 1.563-1.564 (requested by itojun in ticket #71) Add National Semiconductors SC1100 (GEODE) PCI devices 1.236.2.26 Thu Jun 06 19:44:09 UTC 2002 he Pull up revision 1.324 (via patch, requested by mycroft): Add Intel ICH3 network controller IDs. Part of fix to fxp driver to work around a bug which can cause some machines to randomly hang, and to drag along performance improvements and improved hardware support. 1.236.2.25 Mon Mar 25 17:55:22 UTC 2002 he Pull up revision 1.412 (via patch, requested by bouyer): Add support for the pciide part of the AMD-768 chipset. 1.236.2.24 Wed Feb 06 14:17:01 UTC 2002 he Pull up revisions 1.277,1.279,1.318 (requested by tsutsui): Add support for Acard ATP-850/860 pciide controllers. 1.236.2.23 Tue Jan 29 22:38:40 UTC 2002 he Pull up revision 1.287 (requested by bouyer): Add support for the 53c1010-33, and bring documentation up to date. 1.236.2.22 Thu Jan 24 22:35:10 UTC 2002 he Pull up revisions 1.352-1.353 (requested by he): Add driver for the ESS Allegro-1 / Maestro-3 audio hardware. 1.236.2.21 Thu Oct 25 17:57:28 UTC 2001 he Pull up revisions 1.282,1.285,1.299 (requested by ad): Add Mylex DACC960, CAC-EISA, and I2O block/SCSI drivers. 1.236.2.20 Mon Jun 18 16:48:57 UTC 2001 jhawk Pull up revision 1.329 (requested by tsubai): Support the new dual USB iBook. |
| /src/sys/arch/amiga/conf/ | |
| GENERIC | 1.236 Sun Feb 05 05:01:49 UTC 2006 cube branches: 1.236.2; 1.236.4; 1.236.6; Remove 'count' argument for pseudo-devices that ignore it (vnd, bpfilter, ppp, gif, gre, tun, sl, strip, faith, stf). Sun Feb 05 05:01:49 UTC 2006 cube branches: 1.236.2; 1.236.4; 1.236.6; Remove 'count' argument for pseudo-devices that ignore it (vnd, bpfilter, ppp, gif, gre, tun, sl, strip, faith, stf). .2; 1.236.4; 1.236.6; Remove 'count' argument for pseudo-devices that ignore it (vnd, bpfilter, ppp, gif, gre, tun, sl, strip, faith, stf). .4; 1.236.6; Remove 'count' argument for pseudo-devices that ignore it (vnd, bpfilter, ppp, gif, gre, tun, sl, strip, faith, stf). 1.236.6.1 Fri Mar 31 09:44:56 UTC 2006 tron Merge 2006-03-31 NetBSD-current into the "peter-altq" branch. 1.236.4.1 Wed Apr 19 02:31:58 UTC 2006 elad sync with head - hopefully this will work 1.236.2.3 Sun Sep 03 15:22:41 UTC 2006 yamt sync with head. 1.236.2.2 Fri Aug 11 15:41:09 UTC 2006 yamt sync with head 1.236.2.1 Sat Apr 01 00:06:08 UTC 2006 yamt sync with head. |