summaryrefslogtreecommitdiff
path: root/sys
AgeCommit message (Collapse)Author
2002-10-15missing initmsgbuf(), noticed by miod@Michael Shalayeff
2002-10-15Match reality by changing (u_int) -> (int) in comments.Thomas Nordin
2002-10-14Fix from FreeBSD for atlhon problems with mtrr and XFree86. Ok deraadt@Matthieu Herrb
FreeBSD commit messages say: Some BIOSs are using MTRR values that are only documented under NDA to control the mapping of things like the ACPI and APM into memory. The problem is that starting X changes these values, so if something was using the bits of BIOS mapped into memory (say ACPI or APM), then next time they access this memory the machine would hang. This patch refuse to change MTRR values it doesn't understand, unless a new "force" option is given. This means X doesn't change them by accident but someone can override that if they really want to. PR: 28418 Tested by: Christopher Masto <chris at netmonger dot net>, David Bushong <david at bushong dot net>, Santos <casd at myrealbox dot com> Make the MTRR code a bit more defensive - this should help people trying to run X on some Athlon systems where the BIOS does odd things (mines an ASUS A7A266, but it seems to also help on other systems). Here's a description of the problem and my fix: The problem with the old MTRR code is that it only expects to find documented values in the bytes of MTRR registers. To convert the MTRR byte into a FreeBSD "Memory Range Type" (mrt) it uses the byte value and looks it up in an array. If the value is not in range then the mrt value ends up containing random junk. This isn't an immediate problem. The mrt value is only used later when rewriting the MTRR registers. When we finally go to write a value back again, the function i686_mtrrtype() searches for the junk value and returns -1 when it fails to find it. This is converted to a byte (0xff) and written back to the register, causing a GPF as 0xff is an illegal value for a MTRR byte. To work around this problem I've added a new mrt flag MDF_UNKNOWN. We set this when we read a MTRR byte which we do not understand. If we try to convert a MDF_UNKNOWN back into a MTRR value, then the new function, i686_mrt2mtrr, just returns the old value of the MTRR byte. This leaves the memory range type unchanged. I have seen one side effect of the fix, which is that ACPI calls after X has been run seem to hang my machine. As running X would previously panic the machine, this is still an improvement ;-) PR: 28418, 25958 Tested by: jkh, Christopher Masto <chris at netmonger dot net>
2002-10-14Use uvm_km_valloc_prefer_wait instead of doing the same thing manually.Artur Grabowski
<miod> well, my comments are "looks sane, works for me, ok to commit"
2002-10-14Stuff needed for gcc 3.X.Artur Grabowski
gcc has the nice feature of optimizing various common constructs into more optimal ones, inlining various calls, etc. The problem with that is that it assumes that we have a proper libc backing us. We really don't want to loose all those features by defining -ffreestanding and right now there is no way to just disable some of them, so we have to make the kernel more libc-like in some aspects to make it work with newer gcc. rename putchar to kputchar because it was nothing like libc putchar (and only internal to this function). Implement dummy putchar and puts (not prototyped outside this file).
2002-10-14- Do not try to drain other pools if PR_NOWAIT and the allocator can'tArtur Grabowski
give us pages. PR_NOWAIT most likely means "hey, we're coming from an interrupt, don't mess with stuff that doesn't have proper protection". - pool_allocator_free is called in too many places so I don't feel comfortable without that added protection from splvm (and besides, pool_allocator_free is rarely called anyway, so the extra spl will be unnoticeable). It shouldn't matter when fiddling with those flags, but you never know. - Remove a wakeup without a matching tsleep. It's a left-over from some other code path that I've been investigating when reworking the pool a while ago and it should have been removed before that commit. deraadt@ ok
2002-10-14Allow one to specify a netblock in a binat rule:Henning Brauer
binat on fxp0 from 192.168.0.32/27 to any -> 10.0.7.128/27 Both the network mask on the source and redirect addresses MUST be the same, and it works by essentially combining the network section of the redirect address with the host section of the source address. from ryan ok dhartmei@
2002-10-13better USER_LDT comment; originally suggested by seb@todesplanet.de; ok deraadtPeter Valchev
2002-10-13add support forHenning Brauer
Boca Turbo Serial 654 (4 port serial) Boca Turbo Serial 658 (8 port) from Andrey Smagin with a little help by me ok deraadt@
2002-10-13Remove more '\n's from panic() statements. From Chris Kuethe.Kenneth R Westerback
2002-10-13track the end of physmem for use in dmmem_allocMichael Shalayeff
2002-10-13do not flush cache here, better support for intrhook, increase number of ↵Michael Shalayeff
transmit cmds and properly align the rings
2002-10-13split the scp/iscp/scb between the cache lines, make the leds blink betterMichael Shalayeff
2002-10-12Prepare for ELF (mostly _C_LABEL sprinkling); ok drahn artPeter Valchev
2002-10-12Remove more '\n's from panic() statements. Both trailing and leading.Kenneth R Westerback
Last bits of diff generated by Chris Kuethe.
2002-10-12Remove more '\n's from panic() statements. Both trailing and leading.Kenneth R Westerback
Diff generated by Chris Kuethe.
2002-10-11pad keys of size != RC4KEYLEN or RC4KEYLEN/2 with zero; noticed and tested ↵Markus Friedl
by millert@
2002-10-11Stash the value of letoh16(ver.wi_ver[0]) in a variable so we don'tTodd C. Miller
evaluate the same thing for each loop iteration in wi_get_id(). [ previous commit contained unrelated changes and has been removed ]
2002-10-11Sigh, we can't just put the htole16() in the WI_CARD_IDS macroTodd C. Miller
since gcc doesn't seem to evaluate htole16() of a constant at compile time after all. Noticed by deraadt@
2002-10-11make CBQ aware of the pf API so that pf developers can play with CBQ.Kenjiro Cho
for now, implemnet a tentative transition mechanism to allow the old API and the new API to coexit. the old API will go away when pfctl(8) becomes ready.
2002-10-10constify a few strings. various@ okArtur Grabowski
2002-10-10Make wi_get_id() table driven, similar to NetBSD and FreeBSD butTodd C. Miller
make the table itself a #define so we can reuse it in wicontrol. Also add a bunch of chip IDs from NetBSD/FreeBSD. mickey@ OK
2002-10-10Match the Sun Crypto Adapter 1000, it appears to be a broadcom 5821.Jason Wright
2002-10-10sync; sun crypto 1000; from Jamil NimehJason Wright
2002-10-10Sun Crypto 1000Jason Wright
2002-10-10Missing m_pullup() and mbuf corruption. This potentially causedDaniel Hartmeier
panic: m_copym0: m == 0 and not COPYALL and/or panic: m_copydata: null muf on bridges running pf with scrubbing enabled. Bug report, test vector and confirmation by Jon Morby. ok jason@, jasoni@
2002-10-10protect against multiple inclusion; pointed out by naddy, miod okPeter Valchev
2002-10-10padd pf_state; dhartmei@ okMichael Shalayeff
2002-10-10add a borrow flag to be used by pf/altq.Kenjiro Cho
2002-10-10preserve the m_tag order in m_tag_copy_chain() as originally intended.Kenjiro Cho
the order doesn't matter at this moment but could be problematic if 2 tags of the same type are ever added. ok jason@, dhartmei@, angelos@
2002-10-09Remove trailing '\n's from panic messages.Kenneth R Westerback
Started by a commit to siop from provos@netbsd.org. ok miod@ millert@
2002-10-09pretty printTheo de Raadt
2002-10-09supress too noisy log - can be re-enabled by sysctl. sync w/kameJun-ichiro itojun Hagino
2002-10-09Nobody expects the spanish inquisition!Miod Vallat
2002-10-09regenHenning Brauer
2002-10-09Broadcom BCM4401Henning Brauer
2002-10-09new message to track uid/gid changesJun-ichiro itojun Hagino
from provos
2002-10-08the first step of pf/altq merge.Kenjiro Cho
this commit is to allow further development in both userland and kernel. the goal is to replace altq's classifier by pf(4). - make pf tag a queue id to mbuf and make altq read the queue id - merge altq config into pf.conf(5) ok dhartmei@, henning@
2002-10-07Remove a diagnostic check that I added when reorganizing the code.Artur Grabowski
It triggers on ppc and while the check itself is correct, it's better to fix the bug before breaking peoples systems.
2002-10-07this removes the functionality of adding allocatedMichael Shalayeff
pages into the queue already containing allocated pages. breaks i386:setup_buffers() because of this.
2002-10-07also s/_PSW/_PSL/Michael Shalayeff
2002-10-07s/PSW_/PSL_/ to match other archsMichael Shalayeff
2002-10-07-Wsign-compare cleanDaniel Hartmeier
2002-10-07proper terminate the user stack on signalMichael Shalayeff
2002-10-07on implementations w/ fpu included unimplemented instructionsMichael Shalayeff
are signaled through the exception trap w/ invalid opcode marked instruction in the exception registers, not through the emulation trap (as long as the fpu is enabled, of course). parse emulation from the exception trap as well as the emulation trap and fix the dispatcher into usable condition. parse invalid op exception on trap and signal the user appropriately. reset the exception on exec and for child on fork. the later is appropriate since exceptions are delayed until next fpu instruction, which was in the parent indeed, let him get it. save parent's fpu context on fork before cipying it, if the parent owned the fpu.
2002-10-07set block-policy [drop|return]Henning Brauer
drop is default, same behaviour as before support block drop to override a return policy
2002-10-07support a generic returnHenning Brauer
block return in|out ... acts like return-rst on tcp, like return-icmp on udp and like an ordinary block on anything else ok dhartmei@
2002-10-07make return-icmp work for rules covering both v4 and v6Henning Brauer
-new field "return_icmp6" in pf_rule -parser accepts block return-icmp(ipv4-icmpcode, ipv6-icmpcode) ok and some input dhartmei@
2002-10-07use a new rule_flag PFRULE_RETURNICMP to decide wether to return-icmp or notHenning Brauer
instead of just testing return_icmp > 0 ok dhartmei@
2002-10-07Add 'reply-to' to filter rules, similar to route-to, but applying toDaniel Hartmeier
replies (packets that flow in the opposite direction of the packet that created state), used for symmetric routing enforcement. Document how route-to and reply-to work in context of stateful filtering.