committer filter by committer.
@path/to/ filter by path in repository.
committer@path/to/ filter by committer AND path in repository.
NNN or rNNN filter by revision.
NNN-MMM or rNNN-rMMM filter by revisions range (inclusive).
Multiple filters can be specified separated by spaces or comas in which case they'll be combined using OR operator.
|r354663||brooks||Nov. 12, 2019, 10:31 p.m.||libcompat: Correct rtld MLINKS
Don't install duplicate ld-elf.so.1.1 and ld.so.1 links in rtld-elf32. Do install lib-elf32.so.1.1 and ldd32.1 links. Reported by: madpilotViewVC
|r354662||jhb||Nov. 12, 2019, 9:35 p.m.||Sync target triple generation with the version in Makefile.inc1.|
|r354661||jhb||Nov. 12, 2019, 9:29 p.m.||Force MK_CLANG_IS_CC on in XMAKE.
This ensures that a bootstrap clang compiler is always installed as cc in WORLDTMP. If it is only installed as 'clang' then /usr/bin/cc is used during the build instead of the bootstrap compiler. Reviewed by: imp MFC after: 1 month Sponsored by: DARPA Differential Revision: https://reviews.freebsd.org/D22332ViewVC
|r354660||jhb||Nov. 12, 2019, 9:26 p.m.||Enable the RISC-V LLVM backend by default.|
|r354659||vmaffione||Nov. 12, 2019, 9:07 p.m.||bhyve: rework mevent processing to fix a race condition
At the end of both mevent_add() and mevent_update(), mevent_notify() is called to wakeup the I/O thread, that will call kevent(changelist) to update the kernel. A race condition is possible where the client calls mevent_add() and mevent_update(EV_ENABLE) before the I/O thread has the chance to wake up and call mevent_build()+kevent(changelist) in response to mevent_add(). The mevent_add() is therefore ignored by the I/O thread, and kevent(fd, EV_ENABLE) is called before kevent(fd, EV_ADD), resuliting in a failure of the kevent(fd, EV_ENABLE) call. PR: 241808 Reviewed by: jhb, markj MFC with: r354288 Differential Revision: https://reviews.freebsd.org/D22286ViewVC
|r354655||scottl||Nov. 12, 2019, 7:15 p.m.||Add new bit definitions for TSX, related to the TAA issue. The actual
mitigation will follow in a future commit. Sponsored by: IntelViewVC
|r354649||kib||Nov. 12, 2019, 6:01 p.m.||Workaround for Intel SKL002/SKL012S errata.
Disable the use of executable 2M page mappings in EPT-format page tables on affected CPUs. For bhyve virtual machines, this effectively disables all use of superpage mappings on affected CPUs. The vm.pmap.allow_2m_x_ept sysctl can be set to override the default and enable mappings on affected CPUs. Alternate approaches have been suggested, but at present we do not believe the complexity is warranted for typical bhyve's use cases. Reviewed by: alc, emaste, markj, scottl Security: CVE-2018-12207 Sponsored by: The FreeBSD Foundation Differential revision: https://reviews.freebsd.org/D21884ViewVC
|r354648||scottph||Nov. 12, 2019, 4:24 p.m.||nvdimm(4): Fix various problems when the using the second label index block
struct nvdimm_label_index is dynamically sized, with the `free` bitfield expanding to hold `slot_cnt` entries. Fix a few places where we were treating the struct as though it had a fixed sized. Reviewed by: cem Approved by: scottl (mentor) MFC after: 1 week Sponsored by: Intel Corporation Differential Revision: https://reviews.freebsd.org/D22253ViewVC
|r354647||kib||Nov. 12, 2019, 3:56 p.m.||i386: stop guessing the address of the trap frame in ddb backtrace.
Save the address of the trap frame in %ebp on kernel entry. This automatically provides it in struct i386_frame.f_frame to unwinder. While there, more accurately handle the terminating frames, Reviewed by: avg, markj Sponsored by: The FreeBSD Foundation MFC after: 1 week Differential revision: https://reviews.freebsd.org/D22321ViewVC
|r354646||kib||Nov. 12, 2019, 3:51 p.m.||amd64: move GDT into PCPU area.|
|r354645||scottph||Nov. 12, 2019, 3:50 p.m.||nvdimm(4): Only expose namespaces for accessible data SPAs
Apply the same user accessible filter to namespaces as is applied to full-SPA devices. Also, explicitly filter out control region SPAs which don't expose the nvdimm data area. Reviewed by: cem Approved by: scottl (mentor) MFC after: 1 week Sponsored by: Intel Corporation Differential Revision: https://reviews.freebsd.org/D21987ViewVC
|r354644||kib||Nov. 12, 2019, 3:47 p.m.||amd64: assert that size of the software prototype table for gdt is equal|
|r354643||bz||Nov. 12, 2019, 3:46 p.m.||netinet*: update *mp to pass the proper value back
In ip6_[direct_]input() we are looping over the extension headers to deal with the next header. We pass a pointer to an mbuf pointer to the handling functions. In certain cases the mbuf can be updated there and we need to pass the new one back. That missing in dest6_input() and route6_input(). In tcp6_input() we should also update it before we call tcp_input(). In addition to that mark the mbuf NULL all the times when we return that we are done with handling the packet and no next header should be checked (IPPROTO_DONE). This will eventually allow us to assert proper behaviour and catch the above kind of errors more easily, expecting *mp to always be set. This change is extracted from a larger patch and not an exhaustive change across the entire stack yet. PR: 240135 Reported by: prabhakar.lakhera gmail.com MFC after: 3 weeks Sponsored by: NetflixViewVC
|r354639||bz||Nov. 12, 2019, 1:57 p.m.||netstat: igmp stats, error on unexpected information, not only warn
The igmp stats tend to print two lines of warning for an unexpected version and length. Despite an invalid version and struct size it continues to try to do something with the data. Do not try to parse the remainder of the struct and error on warning. Note the underlying issue of the data not being available properly is still there and needs to be fixed seperately. Reported by: test cases, lwhsu MFC after: 3 weeksViewVC
|r354638||avg||Nov. 12, 2019, 11 a.m.||teach db_nextframe/x86 about [X]xen_intr_upcall interrupt handler
Discussed with: kib, royger MFC after: 3 weeks Sponsored by: PanzuraViewVC