Commit Graph

271394 Commits

Author SHA1 Message Date
skrll f563530044 Fix a UVMHIST_LOG format broken in 1.91 2019-11-07 07:45:14 +00:00
msaitoh cc6c2e1ed4 micphy(4): Add support for Microchip KSZ80[0456]1, KSZ87[23]1, KSZ9[01]31 and KSZ9477. 2019-11-07 02:34:44 +00:00
sevan 8d42f92ab0 bsd-family-tree 2019-11-06 23:44:39 +00:00
sevan df20fab130 sync with FreeBSD r354417 2019-11-06 23:43:35 +00:00
wiz 66041a7b29 Add missing El. Use more markup. 2019-11-06 23:17:37 +00:00
mrg 2c291b342a oops, regen these again with right iconv prototype present. 2019-11-06 21:33:07 +00:00
christos 5d36819ed2 Correct documentation of -m and -M.
From Ed Maste @ FreeBSD
2019-11-06 21:04:22 +00:00
christos c7395fee77 Ordinarily, the continue clause of the for-loop would free 'line.' In this
case we instead return early, missing the free.  Add an explicit free to
avoid the leak. Found via coverity.

From Conrad Meyer @ FreeBSD r331230
2019-11-06 21:01:17 +00:00
christos 51d806a701 The original blacklist library supported two operations - a
notification of a failed auth attempt, and a notification of a
successful auth attempt.

Implements a third option - notification of abusive behavior, and
accepts, but does not act on a forth type - "bad username". It is
envisioned that a system administrator will configure a small list
of "known bad usernames" that should be blocked immediately.

From Kurt Lidl @ FreeBSD
2019-11-06 20:50:01 +00:00
para 84640cec8a fix stupid typo... 2019-11-06 20:33:30 +00:00
christos ba6f1286be Add signal documentation from Kurt Lidl @ FreeBSD
s/don't/do not/
2019-11-06 20:29:46 +00:00
para e36a941a83 blacklistd.conf.5: pluralization fix
(as currently comitted in FreeBSD)
2019-11-06 20:29:41 +00:00
mrg 88ed255da2 regen mknative for powerpc and powerpc64. 2019-11-06 19:14:29 +00:00
msaitoh 9068f29f34 Add support for KSZ80[0456]1, KSZ8721, KSZ9[01]31, KS8731 and KSZ9477.
It also supports LAN7430's internal PHY. First wrote by nisimura@ and added
some device support by me. Not tested well.
2019-11-06 16:02:53 +00:00
msaitoh 6661287af5 Regen. 2019-11-06 16:00:33 +00:00
msaitoh 3aee105e22 Add Micrel (now Microchip) KSZ80[0456]1, KSZ8721, KSZ9[01]31, KS8731 and
KSZ9477.
2019-11-06 16:00:02 +00:00
nisimura 723defd1ee major rework to fix link control breakage 2019-11-06 14:33:52 +00:00
pgoyette 2f690417ed Belatedly update several entries that move from year to year. 2019-11-06 13:46:04 +00:00
isaki 5f15becb18 Fix a wrong calculation of recording ring buffer. Reported on
http://mail-index.netbsd.org/current-users/2019/11/04/msg036976.html
2019-11-06 13:37:27 +00:00
kamil 4e5cb50b58 Avoid unaligned pointer arithmetic in check_label_magic()
Replace the logic of calculating the address with with base + offset.

Reported by GCC8.

Reported-by: syzbot+56769dece0ec3e35731e@syzkaller.appspotmail.com
2019-11-06 13:07:32 +00:00
wiz 39fe99ec7b Remove superfluous Pp. 2019-11-06 11:55:18 +00:00
mrg 96ef73dee0 update the comment above LIB_SPEC to remove 2 wrong things we fixed. 2019-11-06 10:42:00 +00:00
mrg 7c07e1db8f revert the powerpc config.gcc changes i made while merging,
they end up mis-ordering tm files.

revert the rs6000/netbsd64.h change and put it back as
SUBSUBTARGET_EXTRA_SPECS.


this seems to make the build work again, though mknative will
need a re-run for ppc*.
2019-11-06 09:10:50 +00:00
mrg f4d45be376 remove stray ; 2019-11-06 07:31:20 +00:00
mrg 3d9ffcffd7 add a note about ifnet lock vs usbnet locks. 2019-11-06 07:30:59 +00:00
mrg 91cecf62cf elide recently introduced warnings that trigger in normal cases, eg:
savecore: dump_exists:471: kvm_read newdumpmag: _kvm_kvatop(ffffffff8180030c)
2019-11-06 07:29:08 +00:00
mrg 500cd05674 add something to auto-detect when GCC has changed from gcc to gcc.old
or back and auto-cleandir tools/gcc.

based upon the code for PREVIOUSTOOLDIR in tools/Makefile.
2019-11-06 07:26:31 +00:00
maxv 9cce0b0a08 Change kcsan_md_is_avail() to always return true; I was testing with
interrupts disabled as debugging. Change the delay/sample parameters
to have better fluidity.
2019-11-06 06:57:22 +00:00
msaitoh fed9b39940 ixv(4): disable RSS configuration on 82599 and X540 VFs.
Those VFs share their RSS configuration with PF and, thus,
they cannot be configured independently. From FreeBSD r354349.
2019-11-06 04:17:16 +00:00
jmcneill 29967b31f2 Reserve enough memory at boot to support the drmfb buffer plus a 4K buffer
for Xorg.
2019-11-05 23:31:23 +00:00
jmcneill 65b0425d84 Add support for DRM GEM/CMA helpers using a driver provided vmem arena. 2019-11-05 23:29:28 +00:00
jmcneill 810998e8ba Arm DMA tags with _nranges=0 require no address translation. Handle this
in PHYS_TO_BUS_MEM and BUS_TO_PHYS_MEM instead of panicing.
2019-11-05 23:27:23 +00:00
joerg 336e4f812b Use alignof and not size_t for platforms with non-natural base
alignments.
2019-11-05 22:22:42 +00:00
dyoung 19dbe0f014 Fix typo: vmem_add(9) does not actually take an `addrp` argument. 2019-11-05 22:19:43 +00:00
maxv 5c12d3cd79 Note kCSan. 2019-11-05 20:23:44 +00:00
maxv 1205187376 Add the __nocsan attribute on this function. Races on ci_want_resched are
accepted (part of the design).
2019-11-05 20:21:34 +00:00
maxv b7edd3d132 Add Kernel Concurrency Sanitizer (kCSan) support. This sanitizer allows us
to detect race conditions at runtime. It is a variation of TSan that is
easy to implement and more suited to kernel internals, albeit theoretically
less precise than TSan's happens-before.

We do basically two things:

 - On every KCSAN_NACCESSES (=2000) memory accesses, we create a cell
   describing the access, and delay the calling CPU (10ms).

 - On all memory accesses, we verify if the memory we're reading/writing
   is referenced in a cell already.

The combination of the two means that, if for example cpu0 does a read that
is selected and cpu1 does a write at the same address, kCSan will fire,
because cpu1's write collides with cpu0's read cell.

The coverage of the instrumentation is the same as that of kASan. Also, the
code is organized in a way similar to kASan, so it is easy to add support
for more architectures than amd64. kCSan is compatible with KCOV.

Reviewed by Kamil.
2019-11-05 20:19:17 +00:00
christos 1bfb63bfe1 regen powerpc64 2019-11-05 20:07:20 +00:00
christos 9c9fe86bc2 - Use EXTRA_SPECS like we did for aarch64 instead of SUBSUBTARGET_EXTRA_SPECS
so that assembly specs get propagated (they were lost before)
- adjust the block register padding (like the other OS's) so that code compiles
- XXX: linker still broken for shared libraries because the os specific spec
  is not chosen
2019-11-05 20:06:41 +00:00
tnn a12cabe254 ssdfb: fix i2c transfer error with some controllers
If the controller doesn't support the full 128 byte transfer size we need,
then split the write across multiple transactions.
2019-11-05 19:59:35 +00:00
martin 7dbd222d55 Add GPT wedge autodiscovery 2019-11-05 12:59:54 +00:00
martin 9da70fb6ae Add siisata* at pci (no idea why it was missing) 2019-11-05 12:28:23 +00:00
jmcneill bbd6b5bcf8 Do not try to use direct map for prefetchable mappings 2019-11-05 10:21:31 +00:00
jmcneill b27ec4bb31 Map buffer objects with BUS_DMA_PREFETCHABLE. 2019-11-05 09:59:16 +00:00
jmcneill 80fc328b35 bus_dmamem_map: honour BUS_DMA_PREFETCHABLE hint 2019-11-05 09:57:47 +00:00
msaitoh 58c2d6794b Avoid null pointer dereference found by kUBSan with "member access within
null pointer of type 'struct drm_fb_helper_crtc'".
2019-11-05 04:09:51 +00:00
prlw1 958bc58d6c Fix locking bug seen when using WDCNDELAY_DEBUG in PR kern/52126
(Observed
  piixide0:0:0: warning: busy-wait took 200us
with no panic)
2019-11-04 15:12:10 +00:00
joerg a0e0f8b685 PR 54093: Align static TLS area to max_align_t. 2019-11-04 12:45:10 +00:00
rin 722445852f regen 2019-11-04 11:33:01 +00:00
rin 7c942e66ce netbsd32_size_t should be used instead of size_t for argument of
32-bit syscalls:

- netbsd32___getvfsstat90: bufsize
- netbsd32___fhstatvfs190: fh_size

No need to pullup, since these syscalls were introduced after
branch of netbsd-9.
2019-11-04 11:32:22 +00:00