jsg [Thu, 11 Apr 2024 03:13:06 +0000 (03:13 +0000)]
drm/i915/mtl: Update workaround
14016712196
From Tejas Upadhyay
338db8193cb2dd93544ac445a7b4b4a7f77094ad in linux-6.6.y/6.6.26
7467e1da906468bcbd311023b30708193103ecf9 in mainline linux
jsg [Thu, 11 Apr 2024 03:11:25 +0000 (03:11 +0000)]
drm/i915: Replace several IS_METEORLAKE with proper IP version checks
From Matt Roper
ec84b2a44b057b2c51ed9f670b92690904e1106c in linux-6.6.y/6.6.26
14128d64090fa88445376cb8ccf91c50c08bd410 in mainline linux
jsg [Thu, 11 Apr 2024 03:09:31 +0000 (03:09 +0000)]
drm/i915: Eliminate IS_MTL_GRAPHICS_STEP
From Matt Roper
b3749611a5e51188d17b4898eed8ecea571bc539 in linux-6.6.y/6.6.26
5a213086a025349361b5cf75c8fd4591d96a7a99 in mainline linux
jsg [Thu, 11 Apr 2024 03:06:59 +0000 (03:06 +0000)]
drm/i915/xelpg: Call Xe_LPG workaround functions based on IP version
From Matt Roper
18e77951e14a73f75d269e54b90c648b1e18b66e in linux-6.6.y/6.6.26
f7696ded7c9e358670dae1801660f442f059c7db in mainline linux
jsg [Thu, 11 Apr 2024 03:04:44 +0000 (03:04 +0000)]
drm/i915: Consolidate condition for Wa_22011802037
From Matt Roper
67f7fba8a08608cfd42ab354b79df56e9fee8856 in linux-6.6.y/6.6.26
28c46feec7f8760683ef08f12746630a3598173e in mainline linux
jsg [Thu, 11 Apr 2024 03:02:42 +0000 (03:02 +0000)]
drm/i915: Tidy workaround definitions
From Matt Roper
6b25099eea4b65ba3b750ce49fa1a9a13d158046 in linux-6.6.y/6.6.26
f1c805716516f9e648e13f0108cea8096e0c7023 in mainline linux
jsg [Thu, 11 Apr 2024 03:01:04 +0000 (03:01 +0000)]
drm/i915/dg2: Drop pre-production GT workarounds
From Matt Roper
0a9901fdb7bb785ec4975aeeebc1428e3abae172 in linux-6.6.y/6.6.26
eaeb4b3614529bfa8a7edfdd7ecf6977b27f18b2 in mainline linux
jsg [Thu, 11 Apr 2024 02:58:50 +0000 (02:58 +0000)]
drm/i915: Pre-populate the cursor physical dma address
From Ville Syrjala
cc696ce93089e3e1bc28d749aee321a37cabe4bd in linux-6.6.y/6.6.26
582dc04b0658ef3b90aeb49cbdd9747c2f1eccc3 in mainline linux
jsg [Thu, 11 Apr 2024 02:56:48 +0000 (02:56 +0000)]
drm/i915/display: Use i915_gem_object_get_dma_address to get dma address
From Maarten Lankhorst
2c07e2437a3e98027c049ca560e4b6e39a975089 in linux-6.6.y/6.6.26
7054b551de18e9875fbdf8d4f3baade428353545 in mainline linux
bluhm [Wed, 10 Apr 2024 22:24:07 +0000 (22:24 +0000)]
Make TCP debug code MP safe.
Protect the global variables in TCP debug code with global mutex.
Add a missing include and also fix the -Wunused-but-set-variable
warning.
OK mvs@
bluhm [Wed, 10 Apr 2024 22:10:03 +0000 (22:10 +0000)]
Move global variables for TCP debug onto the tcp_input() stack.
OK mvs@
jan [Wed, 10 Apr 2024 19:55:50 +0000 (19:55 +0000)]
Implement TCP Segmentation Offload for vio(4)
Tested by Brian Conway and bluhm
With tweaks from bluhm
ok bluhm
miod [Wed, 10 Apr 2024 19:43:16 +0000 (19:43 +0000)]
When rewriting an ELF header (i.e. in strip and objcopy), keep the
.openbsd.syscalls section with the PT_OPENBSD_SYSCALLS phdr, even though is
does not have the ALLOC flag; otherwise the phdr gets rewritten with a size
of zero, which prevents the binary from working.
ok kettenis@
tb [Wed, 10 Apr 2024 16:12:10 +0000 (16:12 +0000)]
symbols test: Remove a few things that are long gone
mpi [Wed, 10 Apr 2024 15:38:11 +0000 (15:38 +0000)]
Use km_alloc(9) to allocate USPACE instead of uvm_pglistalloc(9).
ok miod@
mpi [Wed, 10 Apr 2024 15:26:18 +0000 (15:26 +0000)]
Use uvmpd_dropswap() in the case of swap shortage.
ok kn@, kettenis@, miod@
mpi [Wed, 10 Apr 2024 15:25:14 +0000 (15:25 +0000)]
Call uao_dropswap() instead of rerolling it.
ok kn@, kettenis@, miod@
beck [Wed, 10 Apr 2024 15:13:23 +0000 (15:13 +0000)]
Re-guard the crypto_malloc macros.
accidentally not included in crypto.h commit
requested and ok tb@
tb [Wed, 10 Apr 2024 15:09:03 +0000 (15:09 +0000)]
Remove the prototype of BN_gcd_nonct()
beck [Wed, 10 Apr 2024 15:01:31 +0000 (15:01 +0000)]
Hide deprecated functions in ec.h
use LCRYPTO_UNUSED and remove the LIBRESSL_INTERNAL guard
ok tb@
beck [Wed, 10 Apr 2024 15:00:38 +0000 (15:00 +0000)]
Hide deprecated functions in evp.h
use LCRYPTO_UNUSED and remove the LIBRESSL_INTERNAL guard around them.
ok tb@
beck [Wed, 10 Apr 2024 14:59:39 +0000 (14:59 +0000)]
Add HMAC_init and HMAC_CTX_reset to Symbols.namespace.
ok tb@
beck [Wed, 10 Apr 2024 14:58:06 +0000 (14:58 +0000)]
Hide symbols in bn.h
Mark them LCRYPTO_UNUSED appropriately and remove the LIBRESSL_INTERNAL
guards around them
ok tb@
beck [Wed, 10 Apr 2024 14:55:12 +0000 (14:55 +0000)]
Hide a couple of LCRYPTO_UNUSED in asn1.h
and remove the LIBRESSL_INTERNAL guards around them
ok tb@
beck [Wed, 10 Apr 2024 14:54:13 +0000 (14:54 +0000)]
Add RC2 symbols to Symbols.namespace.
These got missed when they were hidden
ok tb@
beck [Wed, 10 Apr 2024 14:53:01 +0000 (14:53 +0000)]
Finish hiding symbols in rand.h
This removes the LIBRESSL_INTERNAL guards and marks
the functions within as LCRYPTO_UNUSED
beck [Wed, 10 Apr 2024 14:51:02 +0000 (14:51 +0000)]
Finish Hiding symbols in crypto.h
crypto.h already had the symbols not hidden behind LIBRESSL_INTERNAL
hidden - This now picks up the reset of them marking them as
LCRYPTO_UNUSED, and removes the LIBRESSL_INTERNAL guard.
These symbols will now be hidden, but if we use them inside
the library in a namespaced build we will get a deprecation
warning. use outside the library will be as with any other hidden
symbol, so fine.
ok tb@
naddy [Wed, 10 Apr 2024 13:59:05 +0000 (13:59 +0000)]
remove unused hton[ls] functions from libkern
These have been superseded by inlines from endian.h.
ok miod@ mpi@
dv [Wed, 10 Apr 2024 13:03:41 +0000 (13:03 +0000)]
vmctl: fix incorrect scaling when converting disk images.
ctl_convert still had old logic assuming disk sizes were in MiB and
not bytes, causing an attempt to create a new disk using the '-i'
argument to generate impossibly large output disk images (e.g. 1 MiB
ends up 1 TiB).
Reported by and diff from Jesper Wallin.
mvs [Wed, 10 Apr 2024 12:04:41 +0000 (12:04 +0000)]
Remove `head' socket re-locking in sonewconn().
uipc_attach() releases solock() because it should be taken after
`unp_gc_lock' rwlock(9) which protects the `unp_link' list. For this
reason, the listening `head' socket should be unlocked too while
sonewconn() calls uipc_attach(). This could be reworked because now
`so_rcv' sockbuf relies on `sb_mtx' mutex(9).
The last one `unp_link' foreach loop within unp_gc() discards sockets
previously marked as UNP_GCDEAD. These sockets are not accessed from the
userland. The only exception is the sosend() threads of connected
sending peers, but they only sbappend*() mbuf(9) to `so_rcv'. So it's
enough to unlink mbuf(9) chain with `sb_mtx' held and discard lockless.
Please note, the existing SS_NEWCONN_WAIT logic was never used because
the listening unix(4) socket protected from concurrent unp_detach() by
vnode(9) lock, however `head' re-locked all times.
ok bluhm
mglocker [Wed, 10 Apr 2024 10:40:27 +0000 (10:40 +0000)]
Remove obsolete headers.
Spotted by jsg@
claudio [Wed, 10 Apr 2024 10:05:26 +0000 (10:05 +0000)]
Unlock dosigsuspend() and with that some aspects of ppoll and pselect
Change p_sigmask from atomic back to non-atomic updates. All changes to
p_sigmask are only allowed by curproc (the owner). There is no need for
atomic instructions here.
p_sigmask is mostly accessed by curproc with the exception of ptsignal().
In ptsignal() p_sigmask is now only read once unless a SSLEEP proc gets
the signal. In that case recheck the p_sigmask before wakeup to ensure
that no unnecessary wakeup happens.
Add some KASSERT(p == curproc) to ensure this precondition.
sigabort() is special since it is also called by ddb but apart from that
only works for curproc.
With and OK mvs@ OK mpi@
claudio [Wed, 10 Apr 2024 09:05:32 +0000 (09:05 +0000)]
Rework the logic to not send double notifications in session_notification().
last_sent_errcode is now cleared late (when state changes to ESTABLISHED)
and so notifications sent in the OPEN phase would be dropped after the
first incident. Using the session state to know if sending a message is
possible seems more robust and is what session_stop() uses as well.
For now log the notification which are not sent as 'dropping' to see how
often this happens.
OK tb@
nicm [Wed, 10 Apr 2024 07:36:25 +0000 (07:36 +0000)]
Add an option allow-set-title to forbid applications from changing the
pane title, from someone in GitHub issue 3930.
nicm [Wed, 10 Apr 2024 07:29:15 +0000 (07:29 +0000)]
Correct handling of mouse up events (don't ignore all but the last
released button), and always process down event for double click. From
Rudy Dellomas III in GitHub issue 3919.
nicm [Wed, 10 Apr 2024 07:15:21 +0000 (07:15 +0000)]
Do not get muddled and crash if focusing a pane that is exiting,
reported by Saul Nogueras in GitHub issue 3776.
dv [Tue, 9 Apr 2024 21:55:16 +0000 (21:55 +0000)]
vmm/vmd: add exception injection and refactor inject api.
In order to continue work on mmio and other instruction emulation,
vmd(8) needs the ability to inject exceptions (like page faults)
from userland.
Refactor the way events are injected from userland, cleaning up how
hardware (external) interrupts are injected in the process.
ok mlarkin@
mglocker [Tue, 9 Apr 2024 20:18:37 +0000 (20:18 +0000)]
Add ufshci(4) to pci(4). While there, add ahci(4) to acpi(4).
Suggested and ok jmc@
tb [Tue, 9 Apr 2024 18:12:11 +0000 (18:12 +0000)]
whirlpool_test: avoid calling arc4random_uniform(0)
This causes a SIGFPE on solaris
Fixes https://github.com/libressl/portable/issues/1042
tb [Tue, 9 Apr 2024 18:08:43 +0000 (18:08 +0000)]
whirlpool_test: zap lots of trailing whitespace
tb [Tue, 9 Apr 2024 16:06:01 +0000 (16:06 +0000)]
bn_convert: plug leak spotted by ASAN
tobhe [Tue, 9 Apr 2024 15:48:01 +0000 (15:48 +0000)]
Sync removal of setsid(), setpgid() and a few dup2() from relayd. They are
redundant since we call daemon() earlier.
ok bluhm@
cheloha [Tue, 9 Apr 2024 15:08:21 +0000 (15:08 +0000)]
make(1): inline set_times() into Job_Touch()
set_times() has one caller: Job_Touch(). set_times() is a thin
utimes(2) wrapper. Using utimes(2) to reset a file's atime/mtime
to the current time is not cumbersome.
So, remove set_times() and just call utimes(2) directly.
Thread: https://marc.info/?l=openbsd-tech&m=
171262211713835&w=2
ok kn@
tb [Tue, 9 Apr 2024 15:00:44 +0000 (15:00 +0000)]
Add a comment on abuse of EXFLAG_INVALID
We added things we probably shouldn't have, and so did BoringSSL and
OpenSSL. Terrible API is terrible.
discussed with jsing
jsing [Tue, 9 Apr 2024 14:59:57 +0000 (14:59 +0000)]
Add initial regress for BN_set_bit(), BN_clear_bit() and BN_mask_bits().
mglocker [Tue, 9 Apr 2024 14:58:41 +0000 (14:58 +0000)]
Add PCI support for ufshci(4). Tested on the Microsoft Surface Go 4.
CAVEATS:
The ufshci(4) openings need to be limited to 1 currently, otherwise
file system corruptions have been identified using PCI. I hope this
can be fixed soon.
Help and ok jsg@, kettenis@
tb [Tue, 9 Apr 2024 14:57:28 +0000 (14:57 +0000)]
Add hidden conf.h, missed in an earlier commit
jsing [Tue, 9 Apr 2024 14:56:21 +0000 (14:56 +0000)]
Add regress coverage for BN_bn2mpi()/BN_mpi2bn().
beck [Tue, 9 Apr 2024 13:56:29 +0000 (13:56 +0000)]
Hide symbols in conf.h
This guentherizes the public symbols from conf.h
ok tb@
tb [Tue, 9 Apr 2024 13:56:00 +0000 (13:56 +0000)]
Plug leaks in ASN1_TIME_set_string_internal()
This API can be called with s == NULL, in which case the tm_to_*()
functions helpfully allocate a new s and then leak. This is a rather
ugly fix to make portable ASAN regress happy again, the better fix
will be to rewrite the tm_to_*() functions and adjust their callers.
That is more intrusive and will be done in a later pass.
ok bcook jsing
beck [Tue, 9 Apr 2024 13:55:02 +0000 (13:55 +0000)]
Hide public symbols in x509.h
This picks up most of the remaining public symbols in
x509.h
ok tb@
beck [Tue, 9 Apr 2024 13:52:41 +0000 (13:52 +0000)]
Hide public symbols in evp.h
largely mechanically done by the guentherizer 9000
ok tb@
beck [Tue, 9 Apr 2024 13:48:51 +0000 (13:48 +0000)]
Rename EVP_aes_XXX_cfb to EVP_aes_XXX_cfb128.
For consitency with everything else.
ok tb@
claudio [Tue, 9 Apr 2024 12:53:08 +0000 (12:53 +0000)]
Don't include net/art.h in net/rtable.h instead let the two users
include the file themselves.
OK bluhm@ mpi@
claudio [Tue, 9 Apr 2024 12:40:01 +0000 (12:40 +0000)]
Limit the number of provider ASnumbers to MAX_ASPA_SPAS_COUNT (10'000)
in the parser as well.
OK tb@
claudio [Tue, 9 Apr 2024 12:09:19 +0000 (12:09 +0000)]
Increase RTR PDU limit to 48k and limit number of SPAS to 10'000.
PDU larger then 48k will result in a session reset while ASPA records
with more than 10'000 entries will be implicitly withdrawn.
Also truncate RTR error PDUs to only include 256 bytes of the faulty PDU.
It makes no sense to include more to identify the issue.
OK tb@
claudio [Tue, 9 Apr 2024 12:05:07 +0000 (12:05 +0000)]
Check that the ASPA tas array fits in an IMSG before sending the ASPA
record over to RTR or the RDE.
The long term goal is to increase the IMSG size considerably but that
requires some additional API changes to the imsg API.
OK tb@
jsg [Tue, 9 Apr 2024 11:20:10 +0000 (11:20 +0000)]
reduce diff to linux
kettenis [Tue, 9 Apr 2024 11:13:51 +0000 (11:13 +0000)]
Remove the "cubie" miniroot. There are far more popular armv7 boards
with Allwinner SoCs and the presence of this particular miniroot is making
it hard to update U-Boot.
ok jsg@
bluhm [Tue, 9 Apr 2024 11:05:05 +0000 (11:05 +0000)]
Plug route leak in IP output.
If no struct route is passed to ip_output() or ip6_output(), it
uses its own iproute on the stack. In that case any route entry
in the local route cache has to be freed. After pf decides to
reroute, struct route is reset to NULL. Then the route reference
counter has to be released. Call rtfree() without needless NULL
check.
OK mvs@
claudio [Tue, 9 Apr 2024 09:35:57 +0000 (09:35 +0000)]
Add a capability enforcement integration test.
This should ensure that no / yes and enforce work the way we want.
claudio [Tue, 9 Apr 2024 09:33:46 +0000 (09:33 +0000)]
Add capability announce enforcement test and fixup some other result files
since the role capability is now shown in more cases.
claudio [Tue, 9 Apr 2024 09:03:18 +0000 (09:03 +0000)]
Allow operators to enforce the presence of certain capabilities on sessions.
For simple capabilities this just adds enforce to the yes/no option of the
announce statement. For multi-protocol capabilities and add-path there is
an extra keyword. On top of this for add-path the enforcement requires the
neighbor to send a matching capability, e.g
'announce add-path recv enforce' requires the other side to send any
'announce add-path send XYZ' capability.
This is mainly to enforce as-4byte and extra multi-protocol capabilities.
OK denis@ tb@
beck [Tue, 9 Apr 2024 01:39:27 +0000 (01:39 +0000)]
Clean up Symbols.namespace
These did not get removed from here when they got removed
from Symbols.list after a major bump.
ok tb@
jsg [Tue, 9 Apr 2024 01:23:58 +0000 (01:23 +0000)]
regen
jsg [Tue, 9 Apr 2024 01:22:19 +0000 (01:22 +0000)]
more Intel DG2 graphics ids
from ark.intel.com and github.com/intel/compute-runtime
jsg [Tue, 9 Apr 2024 01:14:35 +0000 (01:14 +0000)]
drm/i915: ATS-M device ID update
From Haridhar Kalvala
5032c607e886e0c40749a05d37b835c1757d38ff in mainline linux
jsg [Tue, 9 Apr 2024 00:56:48 +0000 (00:56 +0000)]
drm/i915: Add new PCI IDs to DG2 platform in driver
From Ravi Kumar Vodapalli
in drm-intel-next
jsg [Tue, 9 Apr 2024 00:52:10 +0000 (00:52 +0000)]
drm/i915: Add new DG2 PCI IDs
From Shekhar Chauhan
d0c908d2978e0ef3c1ac1357c1c58224a153f8d4 in mainline linux
beck [Mon, 8 Apr 2024 23:46:21 +0000 (23:46 +0000)]
Remove notBefore and notAfter cacheing.
This cache was added because our time conversion used timegm()
and gmtime() which aren't very cheap. These calls were noticably
expensive when profiling things like rpki-client which do many
X.509 validations.
Now that we convert times using julien seconds from the unix
epoch, BoringSSL style, instead of a julien days from a
Byzantine date, we no longer use timegm() and gmtime().
Since the julien seconds calculaitons are cheap for conversion,
we don't need to bother caching this, it doesn't have a noticable
performance impact.
While we are at this correct a bug where
x509_verify_asn1_time_to_time_t was not NULL safe.
Tested for performance regressions by tb@ and job@
ok tb@ job@
tb [Mon, 8 Apr 2024 20:47:32 +0000 (20:47 +0000)]
Remove spaces before tabs
miod [Mon, 8 Apr 2024 20:09:18 +0000 (20:09 +0000)]
Stop redeclaring ENTRY, the <machine/asm.h> flavour is as good as we need it.
While there, replace inlined NENTRY by actual use of that macro.
ok kettenis@
miod [Mon, 8 Apr 2024 20:08:19 +0000 (20:08 +0000)]
Fix misplaced END() macro.
ok kettenis@
miod [Mon, 8 Apr 2024 20:07:53 +0000 (20:07 +0000)]
Remove unused tf_fault and tf_kstack members from struct trapframe. These
fields were (seldom) written to but never used for anything.
ok kettenis@
miod [Mon, 8 Apr 2024 20:07:07 +0000 (20:07 +0000)]
Remove demap code for MMU miss faults.
This code was #if 0, except for instruction misses where it had been enabled
probably by mistake... and was demapping in the data mmu anyway...
(#include <facepalm.h>)
ok kettenis@
miod [Mon, 8 Apr 2024 20:05:51 +0000 (20:05 +0000)]
There is too much #ifdef DEBUG stuff cluttering locore, really. While some of
it had sense in the early days of the sparc64 port, this code has bitrotten
and is getting in the way. Time for a visit to the Attic.
This removes:
- interrupt handling debug code (forcing hz = 1, probably broken since years).
- unused or too invasive DEBUG code which noone will ever use in this state.
- #if 0 code blocks which have been this way since locore.s revision 1.1 and
will never get enabled.
ok kettenis@
miod [Mon, 8 Apr 2024 20:02:18 +0000 (20:02 +0000)]
Introduce more assembler macros to deduplicate code and improve readability:
- one macro for the inline pseg_get logic used in various MMU trap handlers.
- one macro for the TSB locking logic in various PTE update routines.
- one macro for the sun4v rwindow content saving.
ok kettenis@
miod [Mon, 8 Apr 2024 20:00:27 +0000 (20:00 +0000)]
Remove dead code and data, fix typos, kill wrong comments.
ok kettenis@
miod [Mon, 8 Apr 2024 19:59:57 +0000 (19:59 +0000)]
Fix cut'n'paste error in data miss handler causing wrong label to be used in
some failure conditions.
miod [Mon, 8 Apr 2024 19:59:28 +0000 (19:59 +0000)]
Fix sun4v patching of sp_tlb_flush_ctx() to pass flags in the right register.
ok kettenis@
beck [Mon, 8 Apr 2024 19:57:40 +0000 (19:57 +0000)]
Make ASN1_TIME_set_string_X509 and ASN1_TIME_set_string match the man page
This makes it where people can't put dumb values in certs without
trying harder, and changes the regress to test this.
GENERALIZED times outside of the RFC5280 spec are required for OCSP
but these should be constructed with the GENERALIZED time string
setters.
ok tb@
tb [Mon, 8 Apr 2024 14:02:13 +0000 (14:02 +0000)]
Fix capping of VAPs
The previous approach introduced a cap, but it might not always be hit as
intended (I missed this on review). Fix this to check the cap after merging
an ASPA into an already existing VAP. Also free the list of providers since
nothing should be looking at it anymore.
Count VAPs that hit the limit with a new overflowed counter. There are
still a few aspects of the accounting that probably aren't entirely right.
This will be fixed at another point. It's just statistics after all.
with/ok claudio, ok job
tobhe [Mon, 8 Apr 2024 13:18:54 +0000 (13:18 +0000)]
Call daemon() only in parent and before proc_exec() to avoid orphaning child
processes. Synced from relayd.
ok florian@
tobhe [Mon, 8 Apr 2024 12:50:05 +0000 (12:50 +0000)]
Move daemon() after proc_setup() to sync with other proc.c daemons.
tobhe [Mon, 8 Apr 2024 12:48:26 +0000 (12:48 +0000)]
Call daemon() only in parent and before proc_exec() to avoid orphaning child
processes. Synced from relayd.
ok mlarkin@ dv@
tobhe [Mon, 8 Apr 2024 12:45:18 +0000 (12:45 +0000)]
Call daemon() only in parent and before proc_exec() to avoid orphaning child
processes. Synced from relayd.
ok kn@
jsg [Mon, 8 Apr 2024 02:51:14 +0000 (02:51 +0000)]
more ansi function decls
ok deraadt@
jsg [Mon, 8 Apr 2024 01:59:36 +0000 (01:59 +0000)]
drm: panel-orientation-quirks: Add quirk for GPD Win Mini
From Samuel Dionne-Riel
2f862fdc0fd802e728b6ca96bc78ec3f01bf161e in mainline linux
jsg [Mon, 8 Apr 2024 01:56:20 +0000 (01:56 +0000)]
drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go
From Brenton Simpson
430143b0d3611f4a9c8434319e5e504244749e79 in mainline linux
kettenis [Sun, 7 Apr 2024 21:08:59 +0000 (21:08 +0000)]
The RISC-V architecture has cache-coherent DMA... until it doesn't. This
is indicated by a "dma-noncoherent" property on the bus or device nodes
in the device tree. Set the BUS_DMA_COHERENT flag on the DMA tag for
mainbus(4) and modify the flags based on the presence of "dma-coherent"
and "dma-noncoherent" properties where appropriate.
ok patrick@
tb [Sun, 7 Apr 2024 06:34:42 +0000 (06:34 +0000)]
Rework CMS_add_simple_smimecap()
This is an API to add an OID attribute to the set of SMIMECapabilities.
While attributes are complicated in general, this only supports simple
capabilities encoded as an OID with an optional integer parameter (e.g.,
the key size of a cipher).
Make this API transactional, i.e., don't leave a new empty set behind on
failure or leak the key size if setting the parameter on the X509_ALGOR
fails.
Also convert to single exit and add a doc comment with a reference.
ok beck
jsg [Sun, 7 Apr 2024 01:04:58 +0000 (01:04 +0000)]
match another two Alder Lake-N DesignWare I2C ids
Not in the Intel datasheet but are matched by their Windows driver.
ok mglocker@ who tested on Surface Go 4.
jsg [Sun, 7 Apr 2024 00:59:23 +0000 (00:59 +0000)]
regen
jsg [Sun, 7 Apr 2024 00:58:57 +0000 (00:58 +0000)]
another two Alder Lake-N DesignWare I2C ids
Not in the Intel datasheet but are matched by their Windows driver.
Seen on Surface Go 4.
ok mglocker@
kettenis [Sat, 6 Apr 2024 18:33:54 +0000 (18:33 +0000)]
Now that we support RISC-V CPUs that have MMUs with memory cachability
attributes, the "direct map" becomes problematic as it results in
mappings for the same physical memory pages with different cachability
addresses. The RISC-V specification of the "Svpbmt" extension doesn't
outright state that this is "verboten" like on some other
architectures that we support. But it does say that it may result in
access with the wrong attributes. So restrict the use of the direct
map to just mapping the 64MB block that the bootloader loaded us into.
To make this possible map the device tree later like we do on arm64.
This allows us to get rid of some assembly code in locore.S as a bonus!
ok miod@, jca@
bluhm [Sat, 6 Apr 2024 14:23:27 +0000 (14:23 +0000)]
IP multicast sysctl mrtmfc must not write outside of allocation.
Reading sysctl mrt_sysctl_mfc() allocates memory to be copied back
to user. Chunks of struct mfcinfo are copied from routing table
to linear heap memory. If the allocated memory was not a multiple
the struct size, a struct mfcinfo could be copied to a partially
unallocated destination. Check that the end of the struct is within
the allocation.
From Alfredo Ortega; OK claudio@
mpi [Sat, 6 Apr 2024 11:18:02 +0000 (11:18 +0000)]
Remove (unused) in-kernel event filtering, it's currently dead code.
All events are currently exported to userland in order to support complex
filters. If this becomes a bottleneck it should be possible to translate
(some) user-land filters to in-kernel fitlers.
Prodded by a diff from Christian Ludwig to also trace the tracing program.
ok claudio@
mpi [Sat, 6 Apr 2024 10:59:52 +0000 (10:59 +0000)]
Prevent accounting bug when an anon w/ swap slot is passed to uvm_anon_release()
uvm_anon_release() is always called for anon that have an associated page so
decrementing `uvmexp.swpgonly' is incorrect. This happened because the page
was cleared before calling uvm_anfree().
Reported by many including mvs@, miod@ and robert@
ok kettenis@, miod@
jsg [Sat, 6 Apr 2024 08:40:27 +0000 (08:40 +0000)]
regen
jsg [Sat, 6 Apr 2024 08:39:51 +0000 (08:39 +0000)]
more Alder Lake-N ids
from:
Intel Processor and Intel Core i3 N-Series
Datasheet, Volume 1 of 2, Doc. No.: 759603, Rev.: 001