OpenBSD cvs log

created 2021-12-11T13:42:11Z
begin 2021-12-05T00:00:00Z
end 2021-12-06T00:00:00Z
path src/sys
commits 3

date 2021-12-05T11:33:45Z
author stsp
files src/sys/net80211/ieee80211.c log diff annotate
src/sys/net80211/ieee80211_proto.c log diff annotate
src/sys/net80211/ieee80211_proto.h log diff annotate
src/sys/net80211/ieee80211_var.h log diff annotate
message Defer rtm_80211info() call from ieee80211_set_link_state() to a task context.

Sending routing messages requires a socket lock which may sleep.
ieee80211_set_link_state() is called from interrupts and timeouts where
sleeping is not allowed. mvs@ pointed out that if_link_state_change()
is already using a task for this reason.

Should fix a witness-related panic reported by cheloha@

ok mvs@ tobhe@ florian@

date 2021-12-05T15:35:32Z
author jsg
files src/sys/dev/usb/uhidpp.c log diff annotate
message add missing mtx_leave() calls in error paths
ok anton@

date 2021-12-05T22:00:42Z
author cheloha
files src/sys/kern/kern_fork.c log diff annotate
src/sys/sys/proc.h log diff annotate
src/sys/uvm/uvm_mmap.c log diff annotate
message kbind(2): disable system call if not initialized before first __tfork(2)

To unlock kbind(2) we need to protect ps_kbind_addr and
ps_kbind_cookie.

The simplest way to do this is to disallow kbind(2) initialization
after the first __tfork(2) call. If the first thread does not
initialize the kbind(2) variables before __tfork(2) then we disable
kbind(2) during that first __tfork(2) call.

This is guenther@'s patch, I'm just committing it.

Discussed with guenther@, deraadt@, kettenis@, and mpi@.

ok kettenis@, positive response from mpi@, "I am busy" guenther@