created | 2022-05-02T16:10:05Z |
---|---|
begin | 2022-04-30T00:00:00Z |
end | 2022-05-01T00:00:00Z |
path | src/sys |
commits | 5 |
date | 2022-04-30T07:20:35Z | |||
---|---|---|---|---|
author | claudio | |||
files | src/sys/net/route.c | log | diff | annotate |
src/sys/net/route.h | log | diff | annotate | |
src/sys/netinet/ip_icmp.c | log | diff | annotate | |
src/sys/netinet/ip_mroute.c | log | diff | annotate | |
src/sys/netinet6/icmp6.c | log | diff | annotate | |
src/sys/netinet6/ip6_mroute.c | log | diff | annotate | |
message |
Convert the 2nd rttimer callback from struct rttimer to u_int rtableid. The callback only needs to know the rtableid all the other info from struct rtableid is not needed. Also change the default rttimer callback to only delete routes that are RTF_HOST and RTF_DYNAMIC. This way 2 of the ICMP handlers can use NULL as the callback. OK bluhm@ |
date | 2022-04-30T13:28:53Z | |||
---|---|---|---|---|
author | mvs | |||
files | src/sys/netinet/ip_ipsp.c | log | diff | annotate |
src/sys/netinet/ip_ipsp.h | log | diff | annotate | |
message |
When performing ipsp_ids_free(), grab `ipsec_flows_mtx' mutex(9) before do `id_refcount' decrement. This should be consistent with `ipsp_ids_gc_list' list modifications, otherwise concurrent ipsp_ids_insert() could remove this dying `ids' from the list before if was placed there by ipsp_ids_free(). This makes atomic operations with `id_refcount' useless. Also prevent ipsp_ids_lookup() to return dying `ids'. ok bluhm@ |
date | 2022-04-30T14:44:04Z | |||
---|---|---|---|---|
author | visa | |||
files | src/sys/kern/kern_synch.c | log | diff | annotate |
message |
Enforce proper memory ordering in refcnt_rele() and refcnt_finalize() Make refcnt_rele() and refcnt_finalize() order memory operations so that preceding loads and stores happen before 1->0 transition. Also ensure that loads and stores that depend on the transition really begin only after the transition has occurred. Otherwise the object destructor might not see the object's latest state. OK bluhm@ |
date | 2022-04-30T17:58:43Z | |||
---|---|---|---|---|
author | mpi | |||
files | src/sys/uvm/uvm_pdaemon.c | log | diff | annotate |
message |
Recheck PG_BUSY after locking the page. Another thread can set the bit if we sleep during rw_enter(9) in which case the page shouldn't be touched. ok semarie@ |
date | 2022-04-30T21:13:57Z | |||
---|---|---|---|---|
author | bluhm | |||
files | src/sys/net/if.c | log | diff | annotate |
src/sys/net/ifq.c | log | diff | annotate | |
message |
Run IP input and forwarding with shared netlock. Also distribute packets from the interface receive rings into multiple net task queues. Note that we still have only one softnet task. So there will be no concurrency yet, but we can notice wrong exclusive lock assertions. Soon the final step will be to increase the NET_TASKQ define. lots of testing Hrvoje Popovski; OK sashan@ |