created | 2021-12-11T13:42:11Z |
---|---|
begin | 2021-12-05T00:00:00Z |
end | 2021-12-06T00:00:00Z |
path | src/sys |
commits | 3 |
date | 2021-12-05T11:33:45Z | |||
---|---|---|---|---|
author | stsp | |||
files | src/sys/net80211/ieee80211.c | log | diff | annotate |
src/sys/net80211/ieee80211_proto.c | log | diff | annotate | |
src/sys/net80211/ieee80211_proto.h | log | diff | annotate | |
src/sys/net80211/ieee80211_var.h | log | diff | annotate | |
message |
Defer rtm_80211info() call from ieee80211_set_link_state() to a task context. Sending routing messages requires a socket lock which may sleep. ieee80211_set_link_state() is called from interrupts and timeouts where sleeping is not allowed. mvs@ pointed out that if_link_state_change() is already using a task for this reason. Should fix a witness-related panic reported by cheloha@ ok mvs@ tobhe@ florian@ |
date | 2021-12-05T15:35:32Z | |||
---|---|---|---|---|
author | jsg | |||
files | src/sys/dev/usb/uhidpp.c | log | diff | annotate |
message |
add missing mtx_leave() calls in error paths ok anton@ |
date | 2021-12-05T22:00:42Z | |||
---|---|---|---|---|
author | cheloha | |||
files | src/sys/kern/kern_fork.c | log | diff | annotate |
src/sys/sys/proc.h | log | diff | annotate | |
src/sys/uvm/uvm_mmap.c | log | diff | annotate | |
message |
kbind(2): disable system call if not initialized before first __tfork(2) To unlock kbind(2) we need to protect ps_kbind_addr and ps_kbind_cookie. The simplest way to do this is to disallow kbind(2) initialization after the first __tfork(2) call. If the first thread does not initialize the kbind(2) variables before __tfork(2) then we disable kbind(2) during that first __tfork(2) call. This is guenther@'s patch, I'm just committing it. Discussed with guenther@, deraadt@, kettenis@, and mpi@. ok kettenis@, positive response from mpi@, "I am busy" guenther@ |