#
6817f337 |
| 16-Nov-2024 |
Mark Johnston <markj@FreeBSD.org> |
conf: Fix KCSAN enablement checking
Fixes: 6e3875ebcf0e ("sys: move SAN and COVERAGE options handling to kern.mk")
|
#
6e3875eb |
| 10-Nov-2024 |
Ka Ho Ng <khng@FreeBSD.org> |
sys: move SAN and COVERAGE options handling to kern.mk
This allows the flags to be picked up more easily when building external modules.
Sponsored by: Juniper Networks, Inc. Reviewed by: markj (ear
sys: move SAN and COVERAGE options handling to kern.mk
This allows the flags to be picked up more easily when building external modules.
Sponsored by: Juniper Networks, Inc. Reviewed by: markj (earlier) Differential Revision: https://reviews.freebsd.org/D45563
show more ...
|
#
e1d2967b |
| 27-Sep-2024 |
Andrew Turner <andrew@FreeBSD.org> |
sys/conf: Support building kasan with gcc on arm64
- Remove -mllvm flags that don't exist in gcc - Set the shadow offset with -fasan-shadow-offset - Remove this when kasan is disabled as it's an
sys/conf: Support building kasan with gcc on arm64
- Remove -mllvm flags that don't exist in gcc - Set the shadow offset with -fasan-shadow-offset - Remove this when kasan is disabled as it's an error to use this when not building for kasan under gcc
This allows the arm64 GENERIC-KASAN kernel to build with gcc13.
Reviewed by: brooks Sponsored by: Arm Ltd Differential Revision: https://reviews.freebsd.org/D45300
show more ...
|
#
41283b45 |
| 26-Sep-2024 |
Bjoern A. Zeeb <bz@FreeBSD.org> |
LinuxKPI: always include linux/kconfig.h
Always include linux/kconfig.h which seems to match Linux behaviour and avoid errors compiling code expected from that file but never included.
Sponsored by
LinuxKPI: always include linux/kconfig.h
Always include linux/kconfig.h which seems to match Linux behaviour and avoid errors compiling code expected from that file but never included.
Sponsored by: The FreeBSD Foundation MFC after: 3 days Reviewed by: emaste, imp Differential Revision: https://reviews.freebsd.org/D46801
show more ...
|
Revision tags: release/13.4.0 |
|
#
bd8486b9 |
| 23-Aug-2024 |
Simon J. Gerraty <sjg@FreeBSD.org> |
kern.pre.mk include local.kern.pre.mk
Allow for local customization.
Reviewed by: stevek Differential Revision: https://reviews.freebsd.org/D46423
|
#
12a6257a |
| 19-Aug-2024 |
Andrew Turner <andrew@FreeBSD.org> |
sys/conf: Introduce NOSAN_CFLAGS and NOSAN_C
To simplify disabling the kernel sanitizers in some files add NOSAN_CFLAGS and NOSAN_C variables. These are CFLAGS and NORMAL_C with the sanitizer flags
sys/conf: Introduce NOSAN_CFLAGS and NOSAN_C
To simplify disabling the kernel sanitizers in some files add NOSAN_CFLAGS and NOSAN_C variables. These are CFLAGS and NORMAL_C with the sanitizer flags removed.
While here add MSAN_CFLAGS to simplify keeping KMSAN in kern_kcov.c
Reviewed by: khng, brooks, imp, markj Sponsored by: Arm Ltd Differential Revision: https://reviews.freebsd.org/D45498
show more ...
|
#
37d6d682 |
| 01-Aug-2024 |
Warner Losh <imp@FreeBSD.org> |
kernel: Move the debug stuff into a common script
Move a copy of amd64's debug code into debug.ldscript. Make all the kernels use this. This has the effect of modernizing the STABS for powerpc as th
kernel: Move the debug stuff into a common script
Move a copy of amd64's debug code into debug.ldscript. Make all the kernels use this. This has the effect of modernizing the STABS for powerpc as the others were almost already in sync. For the ones that weren't this adds the DWARF 3 debug symbols from i386/amd64.
Sponsored by: Netflix Differential Revision: https://reviews.freebsd.org/D44071
show more ...
|
Revision tags: release/14.1.0 |
|
#
175b2c00 |
| 29-May-2024 |
Warner Losh <imp@FreeBSD.org> |
Fix bnxt build in LINT
LINT includes bnxt_re driver. Adjust the path in files, add missing files and add a new BNXT_C to build (which thinly wraps OFED version with bnxt specicif stuff).
Sponsored
Fix bnxt build in LINT
LINT includes bnxt_re driver. Adjust the path in files, add missing files and add a new BNXT_C to build (which thinly wraps OFED version with bnxt specicif stuff).
Sponsored by: Netflix Fixes: acd884dec99a ("RDMA/bnxt_re: Add bnxt_re RoCE driver")
show more ...
|
#
b811dac2 |
| 07-Apr-2024 |
Dimitry Andric <dim@FreeBSD.org> |
Fix GENERIC-KASAN kernel build for amd64
Work around https://github.com/llvm/llvm-project/issues/87923, which leads to an assertion failure compiling several kernel source files with asan enabled.
Fix GENERIC-KASAN kernel build for amd64
Work around https://github.com/llvm/llvm-project/issues/87923, which leads to an assertion failure compiling several kernel source files with asan enabled.
PR: 276104 MFC after: 1 month
show more ...
|
Revision tags: release/13.3.0 |
|
#
d682a917 |
| 11-Jan-2024 |
Mark Johnston <markj@FreeBSD.org> |
conf: Do not set -fno-sanitize-memory-param-retval for old compilers
The option was introduced in LLVM 16.
Fixes: b6c653c97463 ("kmsan: Set -fno-sanitize-memory-param-retval for now") MFC after: 1
conf: Do not set -fno-sanitize-memory-param-retval for old compilers
The option was introduced in LLVM 16.
Fixes: b6c653c97463 ("kmsan: Set -fno-sanitize-memory-param-retval for now") MFC after: 1 week Sponsored by: Klara, Inc. Sponsored by: Juniper Networks, Inc.
show more ...
|
Revision tags: release/14.0.0 |
|
#
b6c653c9 |
| 16-Oct-2023 |
Mark Johnston <markj@FreeBSD.org> |
kmsan: Set -fno-sanitize-memory-param-retval for now
As of LLVM 16, -fsanitize-memory-param-retval is the default. It yields significantly smaller code, but the KMSAN runtime interceptors need to b
kmsan: Set -fno-sanitize-memory-param-retval for now
As of LLVM 16, -fsanitize-memory-param-retval is the default. It yields significantly smaller code, but the KMSAN runtime interceptors need to be updated to stop checking shadow state of parameters. Apply a minimal workaround for now.
MFC after: 3 days Sponsored by: Klara, Inc. Sponsored by: Juniper Networks, Inc.
show more ...
|
#
031beb4e |
| 16-Aug-2023 |
Warner Losh <imp@FreeBSD.org> |
sys: Remove $FreeBSD$: one-line sh pattern
Remove /^\s*#[#!]?\s*\$FreeBSD\$.*$\n/
|
#
8a6ab0f7 |
| 28-Jul-2023 |
Jessica Clarke <jrtc27@FreeBSD.org> |
Pre-quote macros passed to .incbin to avoid unwanted substitution
Currently for the MFS, firmware and VDSO template assembly files we pass the path to include with .incbin unquoted and use __XSTRING
Pre-quote macros passed to .incbin to avoid unwanted substitution
Currently for the MFS, firmware and VDSO template assembly files we pass the path to include with .incbin unquoted and use __XSTRING within the assembly file to stringify it. However, __XSTRING doesn't just perform a single level of expansion, it performs the normal full expansion of the macro, and so if the path itself happens to tokenise to something that includes a defined macro in it that will itself be substituted. For example, with #define MACRO 1, a path like /path/containing/MACRO/in/it will expand to /path/containing/1/in/it and then, when stringified, end up as "/path/containing/1/in/it", not the intended string. Normally, macros have names that start or end witih underscores and are unlikely to appear in a tokenised path (even if technically they could), but now that we've switched to GNU C as of commit ec41a96daaa6 ("sys: Switch the kernel's C standard from C99 to GNU99.") there are a few new macros defined which don't start or end with underscores: unix, which is always defined to 1, and i386, which is defined to 1 on i386. The former probably doesn't appear in user paths in practice, but the latter has been seen to and is likely quite common in the wild.
Fix this by defining the macro pre-quoted instead of using __XSTRING. Note that technically we don't need to do this for vdso_wrap.S today as all the paths passed to it are safe file names with no user-controlled prefix but we should do it anyway for consistency and robustness against future changes.
This allows make tinderbox to pass when built with source and object directories inside ~/path-with-unix, which would otherwise expand to ~/path-with-1 and break.
PR: 272744 Fixes: ec41a96daaa6 ("sys: Switch the kernel's C standard from C99 to GNU99.")
show more ...
|
#
b36f469a |
| 17-Jul-2023 |
Yuri Pankov <yuripv@FreeBSD.org> |
zfs: set autotrim default to 'off'
As it turns out having autotrim default to 'on' on FreeBSD never really worked due to mess with defines where userland and kernel module were getting different def
zfs: set autotrim default to 'off'
As it turns out having autotrim default to 'on' on FreeBSD never really worked due to mess with defines where userland and kernel module were getting different default values (userland was defaulting to 'off', module was thinking it's 'on').
PR: 264234 Reviewed by: mav (zfs) Differential Revision: https://reviews.freebsd.org/D41056
show more ...
|
Revision tags: release/13.2.0 |
|
#
89c52f9d |
| 23-Mar-2023 |
Kyle Evans <kevans@FreeBSD.org> |
arm64: add KASAN support
This entails: - Marking some obvious candidates for __nosanitizeaddress - Similar trap frame markings as amd64, for similar reasons - Shadow map implementation
The shadow m
arm64: add KASAN support
This entails: - Marking some obvious candidates for __nosanitizeaddress - Similar trap frame markings as amd64, for similar reasons - Shadow map implementation
The shadow map implementation is roughly similar to what was done on amd64, with some exceptions. Attempting to use available space at preinit_map_va + PMAP_PREINIT_MAPPING_SIZE (up to the end of that range, as depicted in the physmap) results in odd failures, so we instead search the physmap for free regions that we can carve out, fragmenting the shadow map as necessary to try and fit as much as we need for the initial kernel map. pmap_bootstrap_san() is thus after pmap_bootstrap(), which still included some technically reserved areas of the memory map that needed to be included in the DMAP.
The odd failure noted above may be a bug, but I haven't investigated it all that much.
Initial work by mhorne with additional fixes from kevans and markj.
Reviewed by: andrew, markj Sponsored by: Juniper Networks, Inc. Sponsored by: Klara, Inc. Differential Revision: https://reviews.freebsd.org/D36701
show more ...
|
#
4ffeb3b8 |
| 22-Mar-2023 |
John Baldwin <jhb@FreeBSD.org> |
sys: Stop enabling -Wnested-externs.
clang doesn't implement this warning, so violations are only caught by GCC. It is also no longer a common practice to use this as it was in the original BSD cod
sys: Stop enabling -Wnested-externs.
clang doesn't implement this warning, so violations are only caught by GCC. It is also no longer a common practice to use this as it was in the original BSD code, so the need for the warning is not as important as when it was used to do cleanups 20 years ago. A recent commit (c3179891f897d840f578a5139839fcacb587c96d) triggers this warning on GCC, but that commit uses nested externs purposefully.
Reviewed by: markj, emaste Differential Revision: https://reviews.freebsd.org/D39214
show more ...
|
#
b5d248c0 |
| 25-Feb-2023 |
Warner Losh <imp@FreeBSD.org> |
kern: Remove gcc2_compiled stripping
Bruce added stripping of gcc2_compiled and other symbols when he made the boot loader load the symbols for the kernel in 1995 (b5d89ca8ade3) before the FreeBSD 2
kern: Remove gcc2_compiled stripping
Bruce added stripping of gcc2_compiled and other symbols when he made the boot loader load the symbols for the kernel in 1995 (b5d89ca8ade3) before the FreeBSD 2.1 release. This was copied around a bit and tweaked over the years, but these symbols aren't produced by clang, nor gcc12. The were to support dbx for a.out stabs format. gcc removed them with stabs support last year. gcc 2.95.4 in FreeBSD 4.x continued to emit these symbols unconditionally (it was missing a test for aout vs elf it would appaer). They disappeared entirely with gcc 3.2.4 in 5.x for all non a.out builds, and entirely in FreeBSD 6.x which had gcc 3.2.6.
Sponsored by: Netflix Differential Revision: https://reviews.freebsd.org/D38764
show more ...
|
#
1a1f7b7d |
| 13-Feb-2023 |
Warner Losh <imp@FreeBSD.org> |
zlib: Add proper NO_WSTRICT_PROTYPES too
Also move NO_WDEPRECATED_NON_PROTOTYPE to a better place...
Sponsored by: Netflix Noticed by: jhb Fixes: b9f235ba3178
|
#
b9f235ba |
| 13-Feb-2023 |
Warner Losh <imp@FreeBSD.org> |
Properly conditionalize clang 15-only flags
Sponsored by: Netflix Reviewed by: emaste Differential Revision: https://reviews.freebsd.org/D38550
|
#
8372afd0 |
| 03-Jan-2023 |
Mitchell Horne <mhorne@FreeBSD.org> |
Clarify DTR_ENABLED make variable
Rename it to DTRACE_ENABLED.
Suggested by: jhb MFC after: 3 days Sponsored by: The FreeBSD Foundation
|
Revision tags: release/12.4.0 |
|
#
dbd5678d |
| 16-Nov-2022 |
Martin Matuska <mm@FreeBSD.org> |
zfs: merge openzfs/zfs@2163cde45
Notable upstream pull request merges: #13680 Add options to zfs redundant_metadata property #13758 Allow mounting snapshots in .zfs/snapshot as a regular user
zfs: merge openzfs/zfs@2163cde45
Notable upstream pull request merges: #13680 Add options to zfs redundant_metadata property #13758 Allow mounting snapshots in .zfs/snapshot as a regular user #13838 quota: disable quota check for ZVOL #13839 quota: extend quota for dataset #13973 Fix memory leaks in dmu_send()/dmu_send_obj() #13977 Avoid unnecessary metaslab_check_free calling #13978 PAM: Fix unchecked return value from zfs_key_config_load() #13979 Handle possible null pointers from malloc/strdup/strndup() #13997 zstream: allow decompress to fix metadata for uncompressed records #13998 zvol_wait logic may terminate prematurely #14001 FreeBSD: Fix a pair of bugs in zfs_fhtovp() #14003 Stop ganging due to past vdev write errors #14039 Optimize microzaps #14050 Fix draid2+2s metadata error on simultaneous 2 drive failures #14062 zed: Avoid core dump if wholedisk property does not exist #14077 Propagate extent_bytes change to autotrim thread #14079 FreeBSD: vn_flush_cached_data: observe vnode locking contract #14093 Fix ARC target collapse when zfs_arc_meta_limit_percent=100 #14106 Add ability to recompress send streams with new compression algorithm #14119 Deny receiving into encrypted datasets if the keys are not loaded #14120 Fix arc_p aggressive increase #14129 zed: Prevent special vdev to be replaced by hot spare #14133 Expose zfs_vdev_open_timeout_ms as a tunable #14135 FreeBSD: Fix out of bounds read in zfs_ioctl_ozfs_to_legacy() #14152 Adds the `-p` option to `zfs holds` #14161 Handle and detect #13709's unlock regression
Obtained from: OpenZFS OpenZFS commit: 2163cde450d0898b5f7bac16afb4e238485411ff
show more ...
|
#
f8bad561 |
| 23-Sep-2022 |
Bjoern A. Zeeb <bz@FreeBSD.org> |
LinuxKPI: add the "dummy" includes directory to builds
While we could add the dummy includes directory manually to only the drivers needing it, it seems a lot easier to simply add it to all without
LinuxKPI: add the "dummy" includes directory to builds
While we could add the dummy includes directory manually to only the drivers needing it, it seems a lot easier to simply add it to all without any expected harm.
This is needed for more drivers (and to remove some #ifdef in current ones) with empty header files being present not yielding errors.
Sponsored by: The FreeBSD Foundation MFC after: 1 week Reviewed by: hselasky, imp Differential Revision: https://reviews.freebsd.org/D36684
show more ...
|
#
d1aefbc0 |
| 23-Jun-2022 |
Martin Matuska <mm@FreeBSD.org> |
zfs: fix static module build broken in 1f1e2261e
|
Revision tags: release/13.1.0 |
|
#
da5137ab |
| 29-Mar-2022 |
Martin Matuska <mm@FreeBSD.org> |
zfs: merge openzfs/zfs@bc3f12bfa (master) into main
Notable upstream pull request merges: #12083 libzfs: FreeBSD doesn't resize partitions for you #13106 add physical device size to SIZE column
zfs: merge openzfs/zfs@bc3f12bfa (master) into main
Notable upstream pull request merges: #12083 libzfs: FreeBSD doesn't resize partitions for you #13106 add physical device size to SIZE column in 'zpool list -v' #13158 Allow zfs send to exclude datasets #13190 module: zfs: zio_inject: zio_match_handler: don't << -1 #13219 FreeBSD: add missing replay check to an assert in zfs_xvattr_set #13220 module: freebsd: avoid a taking a destroyed lock in zfs_zevent bits #13221 Fix ACL checks for NFS kernel server
Obtained from: OpenZFS OpenZFS commit: bc3f12bfac152a0c28951cec92340ba14f9ccee9
show more ...
|
#
369216b0 |
| 02-Mar-2022 |
Warner Losh <imp@FreeBSD.org> |
ath: fix older clang build.
Define NO_WUNUSED_BUT_SET_VARIABLE for newer clang, and use it in ATH_C to account for different clang versions. Use it in Makefiles as well.
Sponsored by: Netflix Revi
ath: fix older clang build.
Define NO_WUNUSED_BUT_SET_VARIABLE for newer clang, and use it in ATH_C to account for different clang versions. Use it in Makefiles as well.
Sponsored by: Netflix Reviewed by: kevans, jhb Differential Revision: https://reviews.freebsd.org/D34408
show more ...
|