Commit Graph

276204 Commits

Author SHA1 Message Date
plunky
94b6940f54 EPT extended page tables 2020-04-27 09:10:45 +00:00
jdolecek
5e7d2b0bdd pass B_PHYS|B_RAW also in nestio_setup(), courtesy to e.g. xbd(4), which
wants to know whether the buf came from user space or bio subsystem
2020-04-27 07:51:02 +00:00
martin
c2f04161f7 Explicitly cast the number of bytes passed to crc_buf() to size_t, as
we made sure it is positive already.
Fixes the build.
2020-04-27 07:30:54 +00:00
thorpej
40105c0e0b We would have bigger problems if PAGE_SIZE were < sizeof(int). Remove
a CTASSERT() that can't be evaluated at compile-time on all platforms.
2020-04-27 05:28:17 +00:00
mrg
e702c935cf mips and hppa have switched. 2020-04-27 03:29:57 +00:00
riastradh
6211b6d5e0 Speed up cksum word-by-word with a 15 KB table generated dynamically.
(Really we could generate the main table dynamically too.)

From anonymous.
2020-04-27 03:26:09 +00:00
mrg
89f8a416b9 invert the GCC 7/8 conditional.
only alpha, vax, m68k and sh3 are still on GCC 7.
2020-04-27 03:15:12 +00:00
rin
c9ab7630f2 Expose _FUTEX_ROBUST_HEAD_SIZE32 for !LP64; fix COMPAT_NETBSD32 for arm. 2020-04-27 02:54:42 +00:00
rin
545b324688 Add missing \ to fix build for PMAP_CACHE_VIVT, i.e., ARMv4 and prior. 2020-04-27 02:47:26 +00:00
christos
2158aa56f5 It is KERNEL_DIR 2020-04-27 01:07:27 +00:00
pgoyette
dfd3313bbb Re-enable crypto and swcrypto - "generic softints" have been available
for quite some time, so no need to disable.

This is a work-around for PR kern/55155.  The root problem, failure to
load modules due to missing kernel symbol table, still exists.
2020-04-26 23:03:37 +00:00
mrg
17ce967706 switch mips to GCC 8. 2020-04-26 22:06:01 +00:00
christos
2196273e5f Fix -static -pie to be -static *and* -pie. Before it was just -static:
- Restructure the begin and end code so the top level conditional is "pie".
  There is no change for the end code, but we use crtbeginS for static pie.
- If -pie is specified, always pass it to the linker (otherwise we end up
  with non pie binaries).
- Remove an extra unneeded space in the shared linker definition.
2020-04-26 21:11:07 +00:00
mlelstv
6676af1407 Add missing futex tests. 2020-04-26 21:05:36 +00:00
mlelstv
b930a11e30 fix DIAGNOSTIC build 2020-04-26 21:04:46 +00:00
roy
62b655452e Guard xen_wallclock with XENPV.
Thanks to riastradh@
2020-04-26 20:41:30 +00:00
skrll
76f1fdb56e Switch hppa to gcc 8 2020-04-26 20:13:43 +00:00
maxv
566cf4817b In nvmm_open(), make sure an implementation was found. This fixes an
initialization bug triggerable in certain conditions.

If you build nvmm inside the kernel, AND have a cpu that is not supported,
AND run nvmmctl (or qemu-nvmm, both being the only binaries in the "nvmm"
group), you get a page fault.

This is because when nvmm is built inside the kernel, the kernel registers
nvmm_cdevsw behind nvmm's back. The ioctl is therefore always accessible,
and will hit NULL pointers if nvmm_init() failed.

Problem reported by Andrei M. on netbsd-users@, thanks.
2020-04-26 19:31:36 +00:00
thorpej
cb9aba0e17 Regen for native futex calls. 2020-04-26 19:18:52 +00:00
thorpej
cc2d95549c Mirror the change made to native -- move futex calls to 166-168. 2020-04-26 19:18:36 +00:00
thorpej
e8cbcd2cdd Regen for futex call relocation. 2020-04-26 19:16:35 +00:00
thorpej
631f6430ea Due to a collision with another upcoming change, relocate the futex calls
to the 3 free slots at 166-168.
2020-04-26 19:15:55 +00:00
thorpej
4206b0ab03 Regen for native futex calls. 2020-04-26 18:59:47 +00:00
pgoyette
8d1dd42752 Document ENOSYS return from MODCTL_EXIST.
Remove EMLINK since it is no longer returned.
2020-04-26 18:56:49 +00:00
thorpej
276ef22378 Add a NetBSD native futex implementation, mostly written by riastradh@.
Map the COMPAT_LINUX futex calls to the native ones.
2020-04-26 18:53:31 +00:00
tkusumi
02e6d0f660 autofs: Silence down a warning which should really be a debug message
taken-from: FreeBSD
2020-04-26 17:00:31 +00:00
thorpej
11d794387e Disable ubc_direct by default again. There are still stability issues
(e.g. panic during 2020.04.25.00.07.27 amd64 releng test run).
2020-04-26 16:16:13 +00:00
jakllsch
d9c13f8324 Remove written-only sk_next member of struct (m)sk_chain. 2020-04-26 16:14:14 +00:00
thorpej
a62b3d9939 In expand_pid_table(), calculate the current pid table size before
releasing the lock.
2020-04-26 15:49:10 +00:00
jakllsch
526f1eb5ab Use __aligned(8) with naturally-aligned-yet-__packed msk(4) descriptors.
Allows compiler to generate more efficent struct member accesses.
2020-04-26 15:39:04 +00:00
maxv
129e4c2b33 Use the hotpatch framework for LFENCE/MFENCE. 2020-04-26 14:49:17 +00:00
jakllsch
5bdfc4e5b8 Implement SCTP bug fixes found by maxv@.
Adding these seems to improve the SCTP situation.
2020-04-26 14:21:14 +00:00
maxv
ff17b006af Put the template functions in the rodata section; they get hotpatched
into other places, but never execute directly.
2020-04-26 14:07:43 +00:00
maxv
f012eec2fe Remove unused argument in macro. 2020-04-26 13:59:44 +00:00
maxv
e18b0a4638 Remove unused. 2020-04-26 13:54:02 +00:00
maxv
88b0d179cd Drop the hardcoded array, use the hotpatch section. 2020-04-26 13:37:14 +00:00
jdolecek
25271366ad bump send queue to 2*NET_TX_RING_SIZE to make it less likely packets
are dropped on load

m_defrag() short packets before calling bus_dmamap_load_mbuf() -
if it's fragmented load_mbuf would fail anyway, and even with
eventual feature-sg support it's way faster to pass the short packet
in single fragment
2020-04-26 13:09:52 +00:00
jdolecek
279a045b7c support feature-sg
practical offshot of this xennet(4) now supports jumbo frames, it is
also necessary for eventual TSO support

always defrag short Tx packets before passing to backend - even
with feature-sg it's way faster to process the packet if it's
passed as single fragment
2020-04-26 12:58:28 +00:00
jdolecek
7fbc862a83 if part of checksum was undeferred via sw and part not, count it as both 2020-04-26 12:38:21 +00:00
martin
424dcd472b Update phil-wifi info - moving to hg 2020-04-26 12:15:37 +00:00
maxv
8d6f67019a Add a test on the maximum number of slots. 2020-04-26 12:13:10 +00:00
maxv
4cc4c6ebbe Split in sub-tests for clarity, and add a new test, marked as expected
failure for now.
2020-04-26 11:56:38 +00:00
maxv
e497fc86e6 Add tests on the x86 PTEs. We scan the MMU page tables directly and verify
certain properties.
2020-04-26 09:08:40 +00:00
rin
ca33874d0a Adjust for binutils 2.34 in the same manner as efiboot:
http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/stand/efiboot/Makefile.efiboot#rev1.12

XXX
Compile test only.
2020-04-26 07:01:52 +00:00
rin
e14b16b8c0 Adjust for binutils 2.34. 2020-04-26 06:58:05 +00:00
rin
603bf98b48 Revert our local hack introduced in rev 1.2:
http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/external/bsd/gnu-efi/dist/gnuefi/elf_aarch64_efi.lds#rev1.2

as we've fixed the problem in a different (and correct) way:
http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/stand/efiboot/Makefile.efiboot#rev1.12
2020-04-26 06:56:46 +00:00
rin
e7b4837ce1 Adjust for binutils 2.34 in the same manner as efiboot/x86:
http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/arch/i386/stand/efiboot/Makefile.efiboot#rev1.17
2020-04-26 06:51:35 +00:00
simonb
3fd4d3b537 More path markup. Ref wizd(8). 2020-04-26 00:40:10 +00:00
christos
2f4aa83fe6 Allow root to access and modify system space extended attributes.
XXX: this routine should not be using the string, but the attribute namespace.
I have fixed this in the ACL code.
2020-04-25 22:28:47 +00:00
jmcneill
bb0ccfa1cd Add (commented out) nouveaufb 2020-04-25 22:08:49 +00:00