OpenBSD cvs log

created 2018-11-30T05:45:22Z
begin 2018-10-04T00:00:00Z
end 2018-10-05T00:00:00Z
path src/sys
commits 6

date 2018-10-04T01:14:30Z
author kevlo
files src/sys/dev/ic/rtwn.c log diff annotate
message Force 8051 reset/enable before waiting for firmware to get ready for
RTL8723AE, like we alreay do for RTL8188C/RTL8192C.

ok jmatthew@

date 2018-10-04T05:00:40Z
author guenther
files src/sys/arch/amd64/amd64/acpi_wakecode.S log diff annotate
src/sys/arch/amd64/amd64/cpu.c log diff annotate
src/sys/arch/amd64/amd64/genassym.cf log diff annotate
src/sys/arch/amd64/amd64/identcpu.c log diff annotate
src/sys/arch/amd64/amd64/lapic.c log diff annotate
src/sys/arch/amd64/amd64/locore.S log diff annotate
src/sys/arch/amd64/amd64/pmap.c log diff annotate
src/sys/arch/amd64/amd64/vector.S log diff annotate
src/sys/arch/amd64/include/codepatch.h log diff annotate
src/sys/arch/amd64/include/cpufunc.h log diff annotate
src/sys/arch/amd64/include/i82489var.h log diff annotate
src/sys/arch/amd64/include/pmap.h log diff annotate
message Use PCIDs where they and the INVPCID instruction are available.
This uses one PCID for kernel threads, one for the U+K tables of
normal processes, one for the matching U-K tables (when meltdown
in effect), and one for temporary mappings when poking other
processes. Some further tweaks are envisioned but this is good
enough to provide more separation and has (finally) been stable
under ports testing.

lots of ports testing and valid complaints from naddy@ and sthen@
feedback from mlarkin@ and sf@

date 2018-10-04T17:33:40Z
author bluhm
files src/sys/kern/kern_sysctl.c log diff annotate
message Revert the inpcb table mutex commit. It triggers a witness panic
in raw IP delivery and UDP broadcast loops. There inpcbtable_mtx
is held and sorwakeup() is called within the loop. As sowakeup()
grabs the kernel lock, we have a lock ordering problem.
found by Hrvoje Popovski; OK deraadt@ mpi@

date 2018-10-04T17:33:41Z
author bluhm
files src/sys/netinet/in_pcb.c log diff annotate
src/sys/netinet/in_pcb.h log diff annotate
src/sys/netinet/ip_divert.c log diff annotate
src/sys/netinet/raw_ip.c log diff annotate
src/sys/netinet/tcp_subr.c log diff annotate
src/sys/netinet/udp_usrreq.c log diff annotate
src/sys/netinet6/in6_pcb.c log diff annotate
src/sys/netinet6/ip6_divert.c log diff annotate
src/sys/netinet6/raw_ip6.c log diff annotate
message Revert the inpcb table mutex commit. It triggers a witness panic
in raw IP delivery and UDP broadcast loops. There inpcbtable_mtx
is held and sorwakeup() is called within the loop. As sowakeup()
grabs the kernel lock, we have a lock ordering problem.
found by Hrvoje Popovski; OK deraadt@ mpi@

date 2018-10-04T20:07:54Z
author kettenis
files src/sys/kern/kern_exit.c log diff annotate
message Call unveil_destroy() from exit1() instead of from the reaper. Fixes a
race between the reaper and unveil_removevnode() that would trigger a
KASSERT. At least as far as I can tell. Pointed out by semarie@

ok beck@, deraadt@

date 2018-10-04T20:25:59Z
author kn
files src/sys/net/pf.c log diff annotate
message Honor quick on anchor rules

When evaluating the anchor's ruleset, prevent clobbering it's very own
`quick' test result by blindly setting it.

This makes the following pf.conf work as intended (packets would be blocked
since `quick' had no effect):

anchor quick {
pass
}
block

Broken since after 6.1 release as reported by Fabian Mueller-Knapp, thanks!

OK henning sashan