created | 2025-02-03T14:23:34Z |
---|---|
begin | 2025-01-18T00:00:00Z |
end | 2025-01-19T00:00:00Z |
path | src/sys |
commits | 6 |
date | 2025-01-18T10:44:52Z | |||
---|---|---|---|---|
author | bluhm | |||
files | src/sys/kern/uipc_socket2.c | log | diff | annotate |
message |
Assert that socket queue 0 is not used by TCP. Queue 0 is only used for UNIX socket and socket pair. Its locking code in soisconnected() is never reached with internet sockets. Replacing the persocket "if" condition with an "assert" makes arguing about TCP input socket locking easier. OK mvs@ |
date | 2025-01-18T12:31:49Z | |||
---|---|---|---|---|
author | mglocker | |||
files | src/sys/dev/kstat.c | log | diff | annotate |
message |
Add missing 16-bit integer types to kstat_kv_unit_init(). ok dlg@ |
date | 2025-01-18T16:35:30Z | |||
---|---|---|---|---|
author | kettenis | |||
files | src/sys/arch/arm64/arm64/pmap.c | log | diff | annotate |
src/sys/arch/arm64/include/pmap.h | log | diff | annotate | |
src/sys/uvm/uvm_fault.c | log | diff | annotate | |
message |
The pmap_enter(9) function may fail even if we have enough free physical memory. This happens if we can't allocate KVA to map that memory. This is especially likely to happen with the arm64 pmap (and the riscv64 pmap that is derived from it) since lock contention on the kernel map will make us fail to allocate the required KVA. But this may happen on other architectures as well, especially those that don't define __HAVE_PMAP_DIRECT. Fix this issue by introducing a new pmap_populate() interface that may be called to populate the page tables such that a subsequent pmap_enter(9) call that uses the same virtual address will succeed. Use this in the uvm fault handler after a failed pmap_enter(9) call before we retry the fault. tested by phessler@, mglocker@ ok mpi@ |
date | 2025-01-18T16:35:31Z | |||
---|---|---|---|---|
author | kettenis | |||
files | src/sys/uvm/uvm_pmap.h | log | diff | annotate |
message |
The pmap_enter(9) function may fail even if we have enough free physical memory. This happens if we can't allocate KVA to map that memory. This is especially likely to happen with the arm64 pmap (and the riscv64 pmap that is derived from it) since lock contention on the kernel map will make us fail to allocate the required KVA. But this may happen on other architectures as well, especially those that don't define __HAVE_PMAP_DIRECT. Fix this issue by introducing a new pmap_populate() interface that may be called to populate the page tables such that a subsequent pmap_enter(9) call that uses the same virtual address will succeed. Use this in the uvm fault handler after a failed pmap_enter(9) call before we retry the fault. tested by phessler@, mglocker@ ok mpi@ |
date | 2025-01-18T19:42:39Z | |||
---|---|---|---|---|
author | mglocker | |||
files | src/sys/dev/ic/ufshci.c | log | diff | annotate |
src/sys/dev/ic/ufshcivar.h | log | diff | annotate | |
message |
Replace debug timeout printf's for statistics with kstat. Suggested by dlg@ |
date | 2025-01-18T19:50:55Z | |||
---|---|---|---|---|
author | kirill | |||
files | src/sys/sys/videoio.h | log | diff | annotate |
message |
sys/videoio.h: drop accedently commited comment OK: mglocker@ |