Commit Graph

275630 Commits

Author SHA1 Message Date
christos
e7f6bcb612 flip the comparison again 2020-04-09 02:07:01 +00:00
christos
b241bd1476 use __arraycount, and fix comparison 2020-04-09 01:55:58 +00:00
christos
343f4126b1 Add EX2 for Vortex86 SoCs (Andrius V) 2020-04-09 01:49:26 +00:00
jdolecek
0b4aefec80 add a warning in checksum offload that hardware TCP segmentation might be
slow

on I219 I observe about 35% transmit performance drop when tso4 enabled
2020-04-08 23:01:51 +00:00
jdolecek
740ee3f26c wm_tx_offload() and wm_nq_tx_offload() actually always return 0, make them
return void and remove the check for their return value
2020-04-08 21:57:24 +00:00
jdolecek
e9c41d1b81 fixup field names in previous 2020-04-08 21:56:01 +00:00
jdolecek
a1d10a8d03 actually writing always the checksum offload context descriptor
makes the hw do extra processing, avoid doing that if possible -
on my computer with I219 this results in about 2% speedup in Tx performance

change adoped from FreeBSD

XXX should be also done for multiqueue case, but I don't have hw to test it
2020-04-08 21:51:42 +00:00
pgoyette
1352bf2652 Revert previous change to use SYSCTL_SETUP since it breaks on macppc.
For some reason, the crypto module fails to link, and this results in
opencrypto sysctl failures.

Should resolve PR kern/55154
2020-04-08 15:27:18 +00:00
skrll
c5635b4d6c Simplify #ifdefs 2020-04-08 10:57:16 +00:00
skrll
1d725ebb5c Provide UVMHIST_CALLARGS 2020-04-08 07:56:34 +00:00
wiz
15604ae0df Pull in https://gcc.gnu.org/g:3d947f1f27188e3a61ba7f42399b1c348469fe13
middle-end/94479 - fix gimplification of address

    When gimplifying an address operand we may expose an indirect
    ref via DECL_VALUE_EXPR for example.  This is dealt with in the
    code already but it fails to consider that INDIRECT_REFs get
    gimplified to MEM_REFs.

    Fixed which makes the ICE observed on x86_64-netbsd go away.

    2020-04-07  Richard Biener  <rguenther@suse.de>

            PR middle-end/94479
            * gimplify.c (gimplify_addr_expr): Also consider generated
            MEM_REFs.

            * gcc.dg/torture/pr94479.c: New testcase.

Fixes -fstack-check ICE when building devel/git-base.
2020-04-08 06:49:28 +00:00
msaitoh
f247c48be2 Correctly spell "count". 2020-04-08 04:32:14 +00:00
knakahara
9672f51c5f Fix typo in comment 2020-04-08 03:37:14 +00:00
msaitoh
114be2d1a2 Add two new RDC PHYs from Andrius V. 2020-04-08 03:01:58 +00:00
msaitoh
7b253dbc0f Regen. 2020-04-08 03:01:28 +00:00
msaitoh
eb639955e5 Add two new RDC PHYs from Andrius V. 2020-04-08 03:01:05 +00:00
ryo
ebe3e284a8 use PMAP_PAGE_INIT() to initialize mutex in pmap_page.
VM_MDPAGE_INIT() in pmap_free_pdp() had initialized pp_flags,
so it unintentionally cleared PMAP_PAGE_FLAGS_PV_TRACKED.
use PMAP_PAGE_INIT to avoid using PMAP_PAGE_FLAGS_PV_TRACKED.

pointed out by tnn@, thanks
2020-04-08 00:13:40 +00:00
ad
d93b379632 lookup_fastforward(): failure to vget foundobj vnode also translates into
EOPNOTSUPP; VOP_LOOKUP() should retry it.
2020-04-07 19:17:50 +00:00
ad
e7b964a876 For single page I/O, use direct mapping if available. 2020-04-07 19:15:23 +00:00
ad
5294ba607b ubc_direct_release(): remove spurious call to uvm_pagemarkdirty(). 2020-04-07 19:12:25 +00:00
ad
f3fdb8c6cb PR kern/54759: vm.ubc_direct deadlock when read()/write() into mapping of itself
Prevent ubc_uiomove_direct() on mapped vnodes.
2020-04-07 19:11:13 +00:00
ad
2abe5509cd PR kern/55146 (100+ file system test cases failing)
- namei_oneroot(): key on negative return from lookup_fastforward()
  (EOPNOTSUPP), not positive.

- lookup_crossmount(): don't lose track of founddir.

From hannken@, with a couple of tweaks.
2020-04-07 18:28:31 +00:00
sevan
219fc162e3 Add history section 2020-04-07 17:57:33 +00:00
jdolecek
79743bc4f3 add wrapper to free response from xenbus_dev_request_and_reply(), so
that call in xenbus_dev_write() wouldn't need to know how it's allocated
2020-04-07 16:10:48 +00:00
jdolecek
125dad3d64 add a small wrapper xenbus_directory_free() to free result of
xenbus_directory(), so that caller doesn't need to be aware how the memory
was allocated
2020-04-07 15:59:57 +00:00
jdolecek
1c0b49f5ee mostly convert to kmem_alloc()
doing this, remove check for failed allocation with KM_SLEEP, and make
sure to not hold mutex during the call
2020-04-07 15:43:42 +00:00
jdolecek
43fc8b6fb5 partially convert to kmem_alloc()
plug memory leak in one xenbus_probe_device_type() error path
when read_backend_details() fails
2020-04-07 15:40:14 +00:00
jdolecek
b95803dc6b convert from malloc() to kmem_alloc() 2020-04-07 15:16:52 +00:00
jdolecek
418f6d13ac convert the node watch code to use kmem_alloc() instead of malloc() 2020-04-07 14:07:01 +00:00
jdolecek
786f885750 make xenbus_watch_path() static, it's not used outside xenbus_client.c 2020-04-07 13:38:50 +00:00
jdolecek
08090ccf7a revert the watch.node change, xenbus_watch_path() and xenbus_watch_path2()
need to use non-constant path
2020-04-07 13:36:22 +00:00
jdolecek
22ba269296 drop wd lock in wdstart1() before calling the ata_bio hook; when called
from ata thread context, that can still need to sleep for wdc attachments
in wdcwait()
2020-04-07 13:22:05 +00:00
christos
c2ac6d470a Recognize more rdc devices (Andrius V.) 2020-04-07 12:42:11 +00:00
christos
94faa8ea2e regen 2020-04-07 12:32:02 +00:00
christos
c0b1f57987 Add more RDC products (Andrius V) 2020-04-07 12:31:13 +00:00
jdolecek
782d82899b change xenbus_read() interface so that caller supplies the buffer and it's
size, caller doesn't free(9) the returned value any more
2020-04-07 11:47:05 +00:00
martin
426a541861 Disable userconf in the RAMDISK kernel to shrink it a bit 2020-04-07 11:12:25 +00:00
martin
32f67d2cf1 Ooops, editor mishap in previous 2020-04-07 10:22:00 +00:00
jdolecek
015b4bd710 switch from malloc() to kmem_zalloc() 2020-04-07 10:19:53 +00:00
jdolecek
b07f99d6d8 no need to malloc()+copy watch.node, it's constant string - either "device"
or "backend"; just use the strings direct
2020-04-07 09:18:00 +00:00
jdolecek
3ec73fa964 convert from malloc() to kmem_alloc() 2020-04-07 09:05:14 +00:00
jdolecek
8d1e4d9c00 switch to kmem_zalloc() instead of malloc() for struct kernfs_mount 2020-04-07 08:35:49 +00:00
jdolecek
8a3ee72648 switch KERNFS_ALLOCENTRY() to use kmem_zalloc() instead of malloc() 2020-04-07 08:14:42 +00:00
skrll
a6a8f0073d Fix KASAN build on aarch64 2020-04-07 08:07:58 +00:00
jdolecek
4bbb8f42de remove <sys/malloc.h> include, not used here 2020-04-07 07:43:33 +00:00
ryo
1518c9789e avoid "panic: LOCKDEBUG: Mutex error: rw_vector_enter,309: spin lock held"
ok nonaka@. thanks
2020-04-07 07:25:41 +00:00
jdolecek
1243d69abd bring the section on automatic acquisition of kernel_lock up-to-date 2020-04-07 07:25:09 +00:00
skrll
0edf09d843 Whitespace 2020-04-06 20:26:16 +00:00
jdolecek
5783ce1ef4 adjust previous - set the Tx flag only when the feature supported, instead
of first setting it and then masking it when unsupported
2020-04-06 19:58:09 +00:00
maya
b0f199cb12 Exit successfully after printing the search path, stop further processing.
Continuing to process had the unintended effect that `man` failed to find
a matching manual page for {EMPTY LIST OF REQUESTED MANUAL PAGES}, and
exited with 1.

Prompted by a fish shell snippet that tried and failed to distinguish between
FreeBSD man (-p takes argument) and NetBSD man (-p no argument) by comparing
`man -p` exit code.

ok riastradh, logix (which also pointed out the manual page SYNOPSIS is
saying man -p should be used this way).
2020-04-06 19:53:22 +00:00