Up to [cvs.NetBSD.org] / src / sys / kern
Request diff between arbitrary revisions
Default branch: MAIN
Current tag: netbsd-5
Revision 18.104.22.168 / (download) - annotate - [select for diffs], Mon Aug 8 19:45:57 2011 UTC (4 years ago) by riz
CVS Tags: netbsd-5-2-RELEASE, netbsd-5-2-RC1, netbsd-5-2-3-RELEASE, netbsd-5-2-2-RELEASE, netbsd-5-2-1-RELEASE, netbsd-5-2
Changes since 22.214.171.124: +48 -68 lines
Diff to previous 126.96.36.199 (colored) to branchpoint 1.177 (colored) next main 1.178 (colored)
Pull up following revision(s) (requested by bouyer in ticket #1644): sys/sys/socketvar.h: revision 1.126 sys/kern/init_main.c: revision 1.433 sys/kern/uipc_socket.c: revision 1.205 Fix kern/45093 as discussed on tech-kern@: http://mail-index.netbsd.org/tech-kern/2011/06/17/msg010734.html The cause of the problem is that the so_pendfree is processed with the softnet_lock held at one point, and processing the list calls sodoloanfree() which may kpause(). As the thread sleeps with softnet_lock held, it ultimately cause a deadlock (see the PR or tech-kern thread for details). Although it should be possible to call sodopendfree() after releasing the socket lock, it's not so easy to know where he socket lock is held and where it's not, so we may hit the issue again later. Add a kernel thread to handle the so_pendfree list, and wake up this thread when adding mbufs to this list. Get rid of the various sodopendfree() calls, hopefully fixing definitively the problem.
Revision 188.8.131.52 / (download) - annotate - [select for diffs], Sun May 3 13:18:55 2009 UTC (6 years, 4 months ago) by bouyer
CVS Tags: netbsd-5-1-RELEASE, netbsd-5-1-RC4, netbsd-5-1-RC3, netbsd-5-1-RC2, netbsd-5-1-RC1, matt-nb5-pq3-base, matt-nb5-pq3
Branch point for: netbsd-5-1
Changes since 184.108.40.206: +3 -3 lines
Diff to previous 220.127.116.11 (colored) to branchpoint 1.177 (colored)
Pull up following revision(s) (requested by ad in ticket #731): sys/kern/uipc_socket.c: revision 1.189 PR kern/41311: Mutex error: mutex_vector_enter: locking against myself
Revision 18.104.22.168 / (download) - annotate - [select for diffs], Sat Apr 4 23:36:27 2009 UTC (6 years, 4 months ago) by snj
CVS Tags: netbsd-5-0-RELEASE, netbsd-5-0-RC4
Branch point for: netbsd-5-0
Changes since 22.214.171.124: +18 -4 lines
Diff to previous 126.96.36.199 (colored) to branchpoint 1.177 (colored)
Pull up following revision(s) (requested by ad in ticket #661): sys/arch/xen/xen/xenevt.c: revision 1.32 sys/compat/svr4/svr4_net.c: revision 1.56 sys/compat/svr4_32/svr4_32_net.c: revision 1.19 sys/dev/dmover/dmover_io.c: revision 1.32 sys/dev/putter/putter.c: revision 1.21 sys/kern/kern_descrip.c: revision 1.190 sys/kern/kern_drvctl.c: revision 1.23 sys/kern/kern_event.c: revision 1.64 sys/kern/sys_mqueue.c: revision 1.14 sys/kern/sys_pipe.c: revision 1.109 sys/kern/sys_socket.c: revision 1.59 sys/kern/uipc_syscalls.c: revision 1.136 sys/kern/vfs_vnops.c: revision 1.164 sys/kern/uipc_socket.c: revision 1.188 sys/net/bpf.c: revision 1.144 sys/net/if_tap.c: revision 1.55 sys/opencrypto/cryptodev.c: revision 1.47 sys/sys/file.h: revision 1.67 sys/sys/param.h: patch sys/sys/socketvar.h: revision 1.119 Add fileops::fo_drain(), to be called from fd_close() when there is more than one active reference to a file descriptor. It should dislodge threads sleeping while holding a reference to the descriptor. Implemented only for sockets but should be extended to pipes, fifos, etc. Fixes the case of a multithreaded process doing something like the following, which would have hung until the process got a signal. thr0 accept(fd, ...) thr1 close(fd)
Revision 188.8.131.52 / (download) - annotate - [select for diffs], Mon Feb 2 21:04:45 2009 UTC (6 years, 7 months ago) by snj
CVS Tags: netbsd-5-0-RC3, netbsd-5-0-RC2
Changes since 1.177: +3 -3 lines
Diff to previous 1.177 (colored)
Pull up following revision(s) (requested by yamt in ticket #393): sys/kern/uipc_socket.c: revision 1.185 sys/kern/uipc_socket2.c: revision 1.101 sys/kern/uipc_syscalls.c: revision 1.135 sys/miscfs/portal/portal_vnops.c: revision 1.81 sys/netsmb/smb_trantcp.c: revision 1.40 sys/nfs/nfs_socket.c: revision 1.177 sys/sys/socketvar.h: revision 1.118 restore the pre socket locking patch signal behaviour. this fixes a busy-loop in nfs_connect.
Revision 1.177 / (download) - annotate - [select for diffs], Tue Oct 14 13:45:26 2008 UTC (6 years, 10 months ago) by ad
CVS Tags: netbsd-5-base, netbsd-5-0-RC1, matt-mips64-base2, haad-dm-base1, ad-audiomp2-base, ad-audiomp2
Branch point for: nick-hppapmap, netbsd-5
Changes since 1.176: +46 -34 lines
Diff to previous 1.176 (colored)
Accept filters: - Remove remaining #ifdef INET. - Avoid holding locks so we don't need to do KM_NOSLEEP allocations. - Use a rwlock to protect the accept filter list. - Make it safe to unload accept filter modules. - Minor KNF.
This form allows you to request diff's between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.