created | 2020-12-27T22:07:03Z |
---|---|
begin | 2020-12-20T00:00:00Z |
end | 2020-12-21T00:00:00Z |
path | src/sys |
commits | 9 |
date | 2020-12-20T03:42:01Z | |||
---|---|---|---|---|
author | jsg | |||
files | src/sys/dev/pci/drm/include/linux/uaccess.h | log | diff | annotate |
message |
test against [VM_MIN_ADDRESS, VM_MAXUSER_ADDRESS] in access_ok() ok kettenis@ |
date | 2020-12-20T03:58:42Z | |||
---|---|---|---|---|
author | jsg | |||
files | src/sys/dev/pci/drm/i915/i915_devlist.h | log | diff | annotate |
message | remove duplicate device id caused by subids in INTEL_IVB_Q_IDS |
date | 2020-12-20T04:12:14Z | |||
---|---|---|---|---|
author | jsg | |||
files | src/sys/dev/pci/drm/include/drm/i915_pciids.h | log | diff | annotate |
message |
drm/i915: Remove dubious Valleyview PCI IDs From Alexei Podtelezhnikov f2bde2546b81b64fb58aa04888fdd82a090b3908 in mainline linux |
date | 2020-12-20T04:13:12Z | |||
---|---|---|---|---|
author | jsg | |||
files | src/sys/dev/pci/drm/i915/i915_devlist.h | log | diff | annotate |
message | sync with i915_pciids.h |
date | 2020-12-20T09:49:53Z | |||
---|---|---|---|---|
author | jmatthew | |||
files | src/sys/arch/amd64/amd64/mpbios.c | log | diff | annotate |
src/sys/arch/i386/i386/mpbios.c | log | diff | annotate | |
message |
Convert uvm_km_valloc(9) calls to km_alloc(9). Tested in qemu with acpi disabled, no real mpbios hardware in sight. ok kettenis@ |
date | 2020-12-20T12:54:05Z | |||
---|---|---|---|---|
author | visa | |||
files | src/sys/kern/kern_event.c | log | diff | annotate |
src/sys/sys/event.h | log | diff | annotate | |
message |
Introduce klistops This patch extends struct klist with a callback descriptor and an argument. The main purpose of this is to let the kqueue subsystem assert when a klist should be locked, and operate the klist lock in klist_invalidate(). Access to a knote list of a kqueue-monitored object has to be serialized somehow. Because the object often has a lock for protecting its state, and because the object often acquires this lock at the latest in its f_event callback function, it makes sense to use this lock also for the knote lists. The existing uses of NOTE_SUBMIT already show a pattern that is likely to become more prevalent. There could be an embedded lock in klist. However, such a lock would be redundant in many cases. The code cannot rely on a single lock type (mutex, rwlock, something else) because the needs of monitored objects vary. In addition, an embedded lock would introduce new lock order constraints. Note that the patch does not rule out use of dedicated klist locks. The patch introduces a way to associate lock operations with a klist. The caller can provide a custom implementation, or use a ready-made interface with a mutex or rwlock. For compatibility with old code, the new code falls back to using the kernel lock if no specific klist initialization has been done. The existing code already relies on implicit initialization of klist. Sadly, this change increases the size of struct klist. dlg@ thinks this is not fatal, though. OK mpi@ |
date | 2020-12-20T13:02:10Z | |||
---|---|---|---|---|
author | kettenis | |||
files | src/sys/arch/powerpc64/dev/phb.c | log | diff | annotate |
message |
The TCE table needs to be aligned on a boundary that is a multiple of its size. Fixes booting on machines that have memory banks higher up in physical address space which needs a larger TCE table. |
date | 2020-12-20T21:03:53Z | |||
---|---|---|---|---|
author | kettenis | |||
files | src/sys/arch/powerpc64/dev/phb.c | log | diff | annotate |
message | Fix typo. |
date | 2020-12-20T21:15:47Z | |||
---|---|---|---|---|
author | bluhm | |||
files | src/sys/netinet/ip_icmp.c | log | diff | annotate |
src/sys/netinet/ip_icmp.h | log | diff | annotate | |
src/sys/netinet/ip_output.c | log | diff | annotate | |
src/sys/netinet/tcp_timer.c | log | diff | annotate | |
message |
Accept reject and blackhole routes for IPsec PMTU discovery. Since revision 1.87 of ip_icmp.c icmp_mtudisc_clone() ignored reject routes. Otherwise TCP would clone these routes for PMTU discovery. They will not work, even after dynamic routing has found a better route than the reject route. With IPsec the use case is different. First you need a route, but then the flow handles the packet without routing. Usually this route should be a reject route to avoid sending unencrypted traffic if the flow is missing. But IPsec needs this route for PMTU discovery, so use it for that. OK claudio@ tobhe@ |