a1601073 cy Aug. 4, 2019, 12:47 p.m.
When the ipfilter kld is loaded, used within VNET jail, and unloaded,
then subsequent loading, use, and unloading of another packet filters
will cause the subsequently loaded netpfil kld's to panic.

The scenario is as follows:

cd /usr/tests/sys/netpfil/common

kldunload ipl
kldunload pfsync
kldunload ipfw

kyua test pass_block

kldload ipl
kyua test pass_block
kldunload ipl

kldload pfsync
kyua test pass_block
kldunload pfsync
-- page fault panic occurs here --

Reported by:	"Ahsan Barkati" <ahsanbarkati@g.....com> via kp@
Discussed with:	kp@
Tested by:	kp@
MFC after:	3 days
cgit ViewVC
ded28caa cy Aug. 4, 2019, 12:47 p.m.
MFC after:	3 days
cgit ViewVC
3f894e98 delphij Aug. 4, 2019, 4:51 a.m.
sys/conf/files.
cgit ViewVC
278ba86c mav Aug. 3, 2019, 7:24 p.m.
It allows to delete all user data from NVM subsystem in one of 3 methods.
It is a close equivalent of SCSI SANITIZE command of `camcontrol sanitize`,
so I tried to keep arguments as close as possible.

While there, fix supported sanitize methods reporting in `identify`.

MFC after:	2 weeks
Relnotes:	yes
Sponsored by:	iXsystems, Inc.
cgit ViewVC
83b50693 kib Aug. 3, 2019, 6:26 p.m.
Sponsored by:	The FreeBSD Foundation
cgit ViewVC
1947b298 kib Aug. 3, 2019, 5:07 p.m.
PTI-mode entry points were coded to set up the environment identical
to non-PTI entry and then fall-through to non-PTI handlers, mostly.
This has the drawback of requiring two more SWAPGS, first to access
PCPU, and then to return to the state expected by the non-PTI entry
point.

Eliminate the duplication by doing more in entry stubs both for PTI
and non-PTI, and adjusting the common code to expect that SWAPGS and
some minimal registers saving is done by entries.

Some less often used entries, in particular, #GP, #NP, and #SS, which
can fault on doreti, are left as is because there are basically four
variants of entrance, and they are not performance-critical,
esp. comparing with e.g. #PF or interrupts.

Reviewed by:	markj (previous version)
Tested by:	pho (previous version)
MFC after:	1 week
Sponsored by:	The FreeBSD Foundation
cgit ViewVC
e5506316 kib Aug. 3, 2019, 4:57 p.m.
physical destination mode.

This is mostly a nop, because the vmm initializes all vCPUs up to
vm_maxcpus, so even if the target CPU is not active, lapic/vlapic code
still has the valid data to use.  As John notes, dropping such
interrupts more closely matches the real harware, which ignores all
interrupts for not started APs.

Reviewed by:	jhb
admbugs:	837
MFC after:	1 week
Sponsored by:	The FreeBSD Foundation
cgit ViewVC
f349c821 bz Aug. 3, 2019, 4:56 p.m.
Bring back systm.h after r350532 and banish errno.h, time.h, and
machine/atomic.h.

Reported by:	bde (Thank you!)
Pointyhat to:	bz
MFC after:	12 weeks
X-MFC:		with r350532
Sponsored by:	Netflix
cgit ViewVC
5f0099fc takawata Aug. 3, 2019, 4:13 p.m.
Reviewed by:hselasky
Differential Revision:	https://reviews.freebsd.org/D20865
cgit ViewVC
d8dc4e35 gnn Aug. 3, 2019, 2:42 p.m.
Reported by: Liang Zhuo brightiup.zhuo@gmail.com
MFC after:	1 week
cgit ViewVC
2943ddcf asomers Aug. 3, 2019, 1:53 p.m.
Add capsicum support to ping6, mostly copying the strategy used for ping.

Submitted by:	Ján Sučan <jansucan@gmail.com>
Reviewed by:	markj
MFC after:	2 weeks
Sponsored by:	Google, inc. (Google Summer of Code 2019)
Differential Revision:	https://reviews.freebsd.org/D21050
cgit ViewVC
ea44065c mav Aug. 3, 2019, 4:30 a.m.
MFC after:	2 weeks
cgit ViewVC
1dbf944a delphij Aug. 3, 2019, 3:36 a.m.
PR:		229763
Submitted by:	Yoshihiro Ota <ota j email ne jp>
Differential Revision:	https://reviews.freebsd.org/D20272
cgit ViewVC
a6d222eb mav Aug. 3, 2019, 2:36 a.m.
MFC after:	2 weeks
cgit ViewVC
84ce4f03 jhibbits Aug. 3, 2019, 1:55 a.m.
Freeze clearing needs to heppen any time OPAL reads return either an error
(except OPAL_HARDWARE), AND any time it returns 0xff for all bytes.

For cfgwrite, any error that's not OPAL_HARDWARE should be cleaned up.
cgit ViewVC