OpenBSD cvs log

created 2022-01-02T02:42:18Z
begin 2021-12-26T00:00:00Z
end 2021-12-27T00:00:00Z
path src/sys
commits 5

date 2021-12-26T01:00:32Z
author sashan
files src/sys/net/if.c log diff annotate
src/sys/net/pf_if.c log diff annotate
src/sys/net/pf_ioctl.c log diff annotate
src/sys/net/pfvar.h log diff annotate
message make 'set skip on ...' in pf.conf dynamic

This is an old issue in pf(4): whenever new interface appears
in IP stack, we must reload pf.conf to apply 'set skip on ...'
to newly plumbed network interfaces. Time has come to fix it.
The idea is to also create pfi_kif for interfaces, which are
referred by 'set skip on ...'. Such pfi_kif instances are
created/destroyed by pfi_set_flags()/pfi_clear_flags().

claudio@ dragged my attention to this in Gouveia. Also his
feedback helped me to put change into shape.

OK claudio@

date 2021-12-26T13:55:36Z
author kettenis
files src/sys/arch/amd64/conf/GENERIC log diff annotate
src/sys/arch/amd64/conf/RAMDISK log diff annotate
src/sys/arch/amd64/conf/RAMDISK_CD log diff annotate
src/sys/dev/acpi/acpivar.h log diff annotate
src/sys/dev/acpi/com_acpi.c log diff annotate
src/sys/dev/acpi/files.acpi log diff annotate
message Add address locators for the ACPI "bus" and use these to fix the order of
the com(4) devices to match the traditional order one the ISA bus.

ok patrick@, anton@

date 2021-12-26T14:04:29Z
author sashan
files src/sys/net/pf_ioctl.c log diff annotate
message DIOCHANGERRULE ioctl must set pointer to ruleset in rule it inserts.

Reported-by: [email protected]

OK bluhm@, OK jmatthew@

date 2021-12-26T20:50:17Z
author patrick
files src/sys/dev/ic/bwfm.c log diff annotate
src/sys/dev/ic/bwfmreg.h log diff annotate
src/sys/dev/ic/bwfmvar.h log diff annotate
message Add information about TCM rambase and how to check the SR capability for
a few more chips.

date 2021-12-26T23:41:41Z
author mvs
files src/sys/kern/uipc_usrreq.c log diff annotate
src/sys/sys/unpcb.h log diff annotate
message Rework garbage collector for unix(4) sockets.

This time unix(4) sockets garbage collector always destroys any socket
with positive "fp->f_count == unp->unp_msgcount" equation. This is wrong
because unix(4) sockets within SCM_RIGHTS message but closed on sender
side also have this equation positive. Such sockets are not in the loop,
and if garbage collector kill them before they are received, we get
kernel panic.

FreeBSD already has garbage collector reworked to fix this issue [1]. The
logic is pretty simple so import it to our garbage collector.

1. https://reviews.freebsd.org/D23142

ok bluhm@