jsg [Sat, 15 Jun 2024 03:43:44 +0000 (03:43 +0000)]
drm/amdkfd: Add VRAM accounting for SVM migration
From Mukul Joshi
bdbb7611dd2ebb6b6035c8c039ef931452af8f41 in linux-6.6.y/6.6.33
1e214f7faaf5d842754cd5cfcd76308bfedab3b5 in mainline linux
jsg [Sat, 15 Jun 2024 03:42:34 +0000 (03:42 +0000)]
drm/amd/pm: Restore config space after reset
From Lijo Lazar
7e12479958532fb7f9ce5160dc7bb08513eef807 in linux-6.6.y/6.6.33
30d1cda8ce31ab49051ff7159280c542a738b23d in mainline linux
jsg [Sat, 15 Jun 2024 03:40:23 +0000 (03:40 +0000)]
drm/amdgpu: Update BO eviction priorities
From Felix Kuehling
04cf241fe5e525020a512c5392f37a4541aa5e7c in linux-6.6.y/6.6.33
b0b13d532105e0e682d95214933bb8483a063184 in mainline linux
jsg [Sat, 15 Jun 2024 03:38:25 +0000 (03:38 +0000)]
drm/amd/display: Set color_mgmt_changed to true on unsuspend
From Joshua Ashton
17f689f10fc0095df305c7ee6291dbd9cb30330b in linux-6.6.y/6.6.33
2eb9dd497a698dc384c0dd3e0311d541eb2e13dd in mainline linux
jsg [Sat, 15 Jun 2024 03:30:19 +0000 (03:30 +0000)]
add a GC 12.0 placeholder
mglocker [Fri, 14 Jun 2024 20:52:07 +0000 (20:52 +0000)]
We have an 'handled' variable for the interrupt handler, so use it also for
the return values.
kettenis [Fri, 14 Jun 2024 20:00:32 +0000 (20:00 +0000)]
Disallow setting the voltage of coupled regulators for now. Some RK3588
boards use different regulators for CPU core voltage and memory interface
voltage. But the two have to be kept synchronized. So the devicetree for
these boards marks these regulators as coupled. We have no support for
coupled regulators yet and letting the DVFS code set just the CPU core
voltage would probably lead to strange crashes.
ok mlarkin@
kettenis [Fri, 14 Jun 2024 19:49:17 +0000 (19:49 +0000)]
When loading a device tree using the "mach dtb" command, give firmware
a chance to make modifications (such as applying memory reservations)
by using the EFI devicetree fixup protocol.
ok patrick@, jca@
bluhm [Fri, 14 Jun 2024 15:12:57 +0000 (15:12 +0000)]
Replace deprecated given/when and smartmatch operator in Perl scripts.
op [Fri, 14 Jun 2024 13:59:26 +0000 (13:59 +0000)]
support (ignore) universal ctags extended metadata in tagaddress
universal ctags "abuses" the tagaddress, which can be an arbitrary
vi command even if mg assumes it's just a search pattern, to store
metadata after a "vi comment".
While it could be worthwile to support the uctags annotations this
just ignores them so the search patterns work again.
The diff is from Joachim Wiberg "troglobit" mg.
ok tb@
mglocker [Fri, 14 Jun 2024 13:38:15 +0000 (13:38 +0000)]
Improve return value handling of functions.
no objections from deraadt@
claudio [Fri, 14 Jun 2024 10:17:05 +0000 (10:17 +0000)]
Make arc4random() depend on less subsystems by decoupling extract_entropy()
from the enqueue_randomness() logic.
Add add_event_data() which just enqueues some data into the event buffer
which can be used by extract_entropy(). On top of this remove the
timeout_del() call in dequeue_randomness() it does serve any meaningful
reason.
OK kettenis@ deraadt@ mpi@
mvs [Fri, 14 Jun 2024 08:32:22 +0000 (08:32 +0000)]
Switch AF_ROUTE sockets to the new locking scheme.
At sockets layer only mark buffers as SB_MTXLOCK. At PCB layer only
protect `so_rcv' with corresponding `sb_mtx' mutex(9).
SS_ISCONNECTED and SS_CANTRCVMORE bits are redundant for AF_ROUTE
sockets. Since SS_CANTRCVMORE modifications performed with both solock()
and `sb_mtx' held, the 'unlocked' SS_CANTRCVMORE check in
rtm_senddesync() is safe.
ok bluhm
florian [Fri, 14 Jun 2024 07:45:44 +0000 (07:45 +0000)]
sync to unbound 1.20.0
heavy lifting by sthen
jsg [Fri, 14 Jun 2024 06:08:11 +0000 (06:08 +0000)]
drm/i915/xelpg: Add Wa_14020495402
From Radhakrishna Sripada
b4985cce8136d1cd91fafac1ec9a6d90b774fd01 in mainline linux
jsg [Fri, 14 Jun 2024 05:54:23 +0000 (05:54 +0000)]
drm/i915: Add Wa_14015150844
From Shekhar Chauhan
4632e3209f4b4349ebe67597897045b1a8af9daa in mainline linux
jsg [Fri, 14 Jun 2024 05:31:20 +0000 (05:31 +0000)]
drm/i915/xelpg: Add workaround
14019877138
From Tejas Upadhyay
c5b32a41946139b9f4f7a087fda2355a90f671cb in mainline linux
jsg [Fri, 14 Jun 2024 05:28:34 +0000 (05:28 +0000)]
drm/i915: Add Wa_14019877138
From Haridhar Kalvala
97bb5e691189d342fc617dc0f1ab3e51a3676602 in mainline linux
jmc [Fri, 14 Jun 2024 05:20:34 +0000 (05:20 +0000)]
sort -q in the options list;
djm [Fri, 14 Jun 2024 05:01:22 +0000 (05:01 +0000)]
clarify KEXAlgorithms supported vs available. Inspired by bz3701
from Colin Watson.
djm [Fri, 14 Jun 2024 05:00:42 +0000 (05:00 +0000)]
ssh-keyscan -q man bits
djm [Fri, 14 Jun 2024 04:43:11 +0000 (04:43 +0000)]
split the PerSourcePenalties test in two: one tests penalty enforcement
but not penalty expiry, the other tests penalty expiry.
This lets us disable the expiry testing in certain CI test environments.
jsg [Fri, 14 Jun 2024 04:04:14 +0000 (04:04 +0000)]
drm/i915/mtl: Add Wa_14019821291
From Dnyaneshwar Bhadane
43dea469e99b10ecc967a3576e50a5d416daf13c in mainline linux
jsg [Fri, 14 Jun 2024 01:30:45 +0000 (01:30 +0000)]
unstub probe_gmdid_display()
There is a temporary mapping of the first pci bar as this occurs before
the runtime info is setup and a generation specific bar is mapped based
on that.
jsg [Fri, 14 Jun 2024 01:14:18 +0000 (01:14 +0000)]
unstub ip_ver_read()
djm [Fri, 14 Jun 2024 00:26:12 +0000 (00:26 +0000)]
don't redirect stderr for ssh-keyscan we expect to succeed
djm [Fri, 14 Jun 2024 00:25:25 +0000 (00:25 +0000)]
make host/banner comments go to stderr instead of stdout, so they
are useful as comments without extra shell redirection and so they
don't clutter actual errors on stderr.
Add a -q flag to shut them up.
ok dtucker@
djm [Fri, 14 Jun 2024 00:23:55 +0000 (00:23 +0000)]
specify an algorithm for ssh-keyscan, otherwise it will make
multiple attempts simultaneously and confuse the test
kettenis [Thu, 13 Jun 2024 18:05:54 +0000 (18:05 +0000)]
Implement acpi_target_system_state().
ok jsg@
bluhm [Thu, 13 Jun 2024 17:59:08 +0000 (17:59 +0000)]
Avoid ccp error message if SEV-ES is missing.
PSP is optional to ccp(4). Thus if PSP attachment fails (e.g.
interrupt can not be set up), do not unmap IO space. It will still
be needed by ccp(4). Nonetheless, disestablish interrupt handler
if PSP attachment fails.
Another tweak: If PSP can not be initialized, there's no need to
actually flush caches (wbinvd) on all CPUs.
Cleanup dmesg output and make it more precise.
from hshoexer@; reported and tested by Hrvoje Popovski
naddy [Thu, 13 Jun 2024 15:06:33 +0000 (15:06 +0000)]
separate keywords with comma
sthen [Thu, 13 Jun 2024 14:30:28 +0000 (14:30 +0000)]
merge unbound 1.20.0
sthen [Thu, 13 Jun 2024 14:29:32 +0000 (14:29 +0000)]
import unbound 1.20.0, ok florian
jsg [Thu, 13 Jun 2024 09:01:13 +0000 (09:01 +0000)]
sync uncore mmio sizes with intel_uncore_setup_mmio()
claudio [Thu, 13 Jun 2024 06:47:13 +0000 (06:47 +0000)]
Enable uvm percpu caches on sparc64.
OK kettenis@ jca@ mpi@
guenther [Thu, 13 Jun 2024 02:19:20 +0000 (02:19 +0000)]
Wrong variable used in indexing meant that when a CPU's cache setup
differed on the second or later cache, the generated dmesg didn't
report the earlier, identical cache levels correctly.
report, testing, and ok jsg@
djm [Wed, 12 Jun 2024 22:36:00 +0000 (22:36 +0000)]
split PerSourcePenalties address tracking. Previously it used one
shared table and overflow policy for IPv4 and IPv6 addresses, now
it will use separate tables and optionally different overflow
policies.
This prevents misbehaviour from IPv6 addresses (which are vastly easier
to obtain many of) from affecting IPv4 connections and may allow for
stricter overflow policies.
ok deraadt@
bluhm [Wed, 12 Jun 2024 12:54:54 +0000 (12:54 +0000)]
Add support for the AMD Platform Security Processor (PSP) to ccp(4).
Several commands for basic platform initialization and launch of
SEV/SEV-ES enabled guests are implemented. These can be used by
e.g. vmd(8) later.
from hshoexer@; OK mlarkin@
tb [Wed, 12 Jun 2024 10:03:09 +0000 (10:03 +0000)]
rpki-client: avoid hard error when hitting the maximum cert id
Instead, continue processing what we can but avoid lots of warning noise.
Error out at the end of the parser process to avoid loading a bad config
into bgpd. This isn't great as it is and can be refined in tree.
ok claudio
kettenis [Wed, 12 Jun 2024 09:08:43 +0000 (09:08 +0000)]
Update
kettenis [Wed, 12 Jun 2024 09:06:15 +0000 (09:06 +0000)]
Add RK3588 support.
ok mlarkin@, kurt@
tb [Wed, 12 Jun 2024 04:24:59 +0000 (04:24 +0000)]
rpki-client: mention same-origin policy draft in STANDARDS
ok job
tb [Wed, 12 Jun 2024 04:11:19 +0000 (04:11 +0000)]
rpki-client: bump version
It's been a few months with lots of changes. We should release soon-ish.
discussed with job
tb [Wed, 12 Jun 2024 04:01:20 +0000 (04:01 +0000)]
rpki-client: use better variable names for issuer and subject UID
piuid and psuid annoy me every time I see them.
no functional change
tb [Wed, 12 Jun 2024 03:55:46 +0000 (03:55 +0000)]
piuid, psuid -> issuerUID, subjectUID
jsg [Wed, 12 Jun 2024 02:50:25 +0000 (02:50 +0000)]
remove BMAJ and CMAJ defines only used by arm64; ok deraadt@
jsg [Tue, 11 Jun 2024 23:35:27 +0000 (23:35 +0000)]
reentrant functions were not in 386BSD
spotted by and ok deraadt@
kettenis [Tue, 11 Jun 2024 17:35:26 +0000 (17:35 +0000)]
Avoid powering down PCI devices if we're rebooting. This makes some
machines (e.g. the t410) unhappy.
ok mglocker@
op [Tue, 11 Jun 2024 16:35:24 +0000 (16:35 +0000)]
sync includes in tls_signer.c
pthread -> mutex
stdint -> uint8_t
stdio.h -> asprintf
stdlib.h -> calloc
string.h -> memcpy
ecdsa -> ECDSA_METHOD leftover, remove
ec -> EC_KEY
evp -> EVP_PKEY
pem -> PEM_read_bio_X509
x509 -> X509
90% of the diff is from tb@, I only spotted the missing string.h :)
ok tb@
tb [Tue, 11 Jun 2024 16:30:06 +0000 (16:30 +0000)]
smtpd: fix indent
ok op
jca [Tue, 11 Jun 2024 16:02:35 +0000 (16:02 +0000)]
Enable UVM percpu cache on riscv64
Proved stable in multiple ports bulk builds. ok kettenis@ phessler@
kettenis [Tue, 11 Jun 2024 15:44:55 +0000 (15:44 +0000)]
Clamp CPU clock frequencies to [min, max] range when determining the
initial perflevel.
ok deraadt@, phessler@, patrick@, jca@
tb [Tue, 11 Jun 2024 15:33:46 +0000 (15:33 +0000)]
rpki-client: add link to rpki-rs PR that supposedly fixes this bug
https://github.com/NLnetLabs/rpki-rs/pull/295
tb [Tue, 11 Jun 2024 13:09:02 +0000 (13:09 +0000)]
rpki-client: grammar tweak in comment
tb [Tue, 11 Jun 2024 12:44:00 +0000 (12:44 +0000)]
rpki-client: turn assert() into a NULL check
ok claudio
tb [Tue, 11 Jun 2024 10:38:40 +0000 (10:38 +0000)]
rpki-client: fix incorrect use of ASN1_tag2str()
This goes back to the initial import in mft.c and was then copied to rsc.c.
ASN1_tag2str() doesn't take a nid but rather an ASN.1 tag. Use nid2str()
instead.
ok claudio (who helped me use nid2str() correctly)
stsp [Tue, 11 Jun 2024 10:06:35 +0000 (10:06 +0000)]
Make sure qwx(4) always calls refcnt_init() before other refcnt functions.
I recently enabled automatic recovery from firmware crashes. if loading
firmware at boot would fail with a firmware error then the init task would
call refcnt_finalize() via qwx_stop() before refcnt_init() was called and
trigger a KASSERT in the refcnt code.
ok patrick@, who also reported the problem to me and tested the fix
jsg [Tue, 11 Jun 2024 09:55:38 +0000 (09:55 +0000)]
remove prototypes and defines for drivers landisk doesn't use
build test and ok miod@
jsg [Tue, 11 Jun 2024 09:21:32 +0000 (09:21 +0000)]
remove drm prototypes duplicating those in sys/conf.h
kettenis [Tue, 11 Jun 2024 09:15:33 +0000 (09:15 +0000)]
Add RK3588 TSADC clocks and resets.
ok patrick@, dlg@
tb [Tue, 11 Jun 2024 07:30:47 +0000 (07:30 +0000)]
I've written/touched/contributed to most of crl.c
tb [Tue, 11 Jun 2024 07:27:14 +0000 (07:27 +0000)]
rpki-client: simplify signature type checking for certs/CRLs
The OpenSSL 1.1 get_signature_nid() API is available for all libraries
that we support and it does exactly what we want. It is much simpler
than the unergonomic accessors we used previously. The ASN.1 templates
ensure that the relevant struct members aren't NULL after successful
deserialization, so the calls are safe.
ok claudio
jsg [Tue, 11 Jun 2024 06:11:50 +0000 (06:11 +0000)]
remove kbd/ms prototypes with no matching functions
jmc [Tue, 11 Jun 2024 05:24:39 +0000 (05:24 +0000)]
do not mark up "(default: 20ms)";
jsg [Tue, 11 Jun 2024 03:28:42 +0000 (03:28 +0000)]
remove prototypes for pre-wscons mouse drivers
djm [Tue, 11 Jun 2024 02:54:51 +0000 (02:54 +0000)]
reap preauth net child if it hangs up during privsep message send, not
just message receive
djm [Tue, 11 Jun 2024 02:00:30 +0000 (02:00 +0000)]
reap the pre-auth [net] child if it hangs up during privsep message
sending, not just receiving
djm [Tue, 11 Jun 2024 01:58:27 +0000 (01:58 +0000)]
fix PIDFILE handling, broken for SUDO=doas in last commit here
jsg [Tue, 11 Jun 2024 01:49:17 +0000 (01:49 +0000)]
remove cdev_decl(ses), none of the prototypes have matching functions
djm [Tue, 11 Jun 2024 01:23:25 +0000 (01:23 +0000)]
a little more RB_TREE paranoia
djm [Tue, 11 Jun 2024 01:22:25 +0000 (01:22 +0000)]
fix off-by-one comparison for PerSourcePenalty overflow:deny-all mode
djm [Tue, 11 Jun 2024 01:21:41 +0000 (01:21 +0000)]
move tree init before possible early return
djm [Tue, 11 Jun 2024 01:07:35 +0000 (01:07 +0000)]
update to mention that PerSourcePenalties default to being enabled
and document the default values for each parameter.
djm [Tue, 11 Jun 2024 00:44:52 +0000 (00:44 +0000)]
reap the [net] child if it hangs up while writing privsep message
payloads, not just the message header
djm [Tue, 11 Jun 2024 00:40:21 +0000 (00:40 +0000)]
log waitpid() status for abnormal exits
djm [Tue, 11 Jun 2024 00:36:20 +0000 (00:36 +0000)]
correct error message
jan [Mon, 10 Jun 2024 19:26:17 +0000 (19:26 +0000)]
Use TCP Large Receive Offload in vio(4).
Also introduce the guest offload feature to turn LRO off/on.
Tested by Mark Patruck, sf@ and bluhm@
ok sf@ and bluhm@
jan [Mon, 10 Jun 2024 18:21:59 +0000 (18:21 +0000)]
Clarify panic strings in vio(4)
suggested by bluhm
ok bluhm
claudio [Mon, 10 Jun 2024 12:51:25 +0000 (12:51 +0000)]
In get_alternate_addr() consider sessions to IPv6 link-local addresses
as connected (they are so by definition).
Issue reported by Jason Tubnor ( Jason.Tubnor (at) lchs.com.au )
OK tb@
tb [Mon, 10 Jun 2024 12:44:06 +0000 (12:44 +0000)]
rpki-client: allow multiple EKU OIDs for BGPsec certs
Nothing says there may be only one purpose. We only need to find
id-kp-bgpsec-router among them. This matches the intention of the
extended key usage extension in RFCs 5280 and 8209 more closely.
ok claudio
tb [Mon, 10 Jun 2024 11:49:29 +0000 (11:49 +0000)]
rpki-client: zap outdated comment.
The valid_x509() in proc_parser_gbr() was initially left unchecked but
has been checked since r1.79.
tb [Mon, 10 Jun 2024 10:50:13 +0000 (10:50 +0000)]
rpki-client: fix and move more KU/EKU to x509_get_purpose()
Now all key usage and extended key usage handling is at the same place.
This fixes a bug for BGPsec Router certs where key usage was ignored.
Another omission that is fixed here is that criticality of the key usage
extension was not checked. Drop a comment about possible use of EKU that
was in the TA/CA code path but would only apply to EE certs.
ok claudio
jsg [Mon, 10 Jun 2024 04:59:15 +0000 (04:59 +0000)]
remove decls for removed gpr(4) and urio(4)
jsg [Mon, 10 Jun 2024 04:10:25 +0000 (04:10 +0000)]
Remove struct mymsg. An example from SVID, not intended for a header.
ok millert@ miod@ jca@
jca [Sun, 9 Jun 2024 21:15:29 +0000 (21:15 +0000)]
Add a compiler barrier where missing in CPU_BUSY_CYCLE() implems
Having differences between architectures is asking for problems. And
adding a barrier here just makes sense in most cases. This is also what
cpu_relax() provides in Linux land.
ok kettenis@ claudio@
afresh1 [Sun, 9 Jun 2024 18:31:17 +0000 (18:31 +0000)]
Silently ignore setuid changes in relinked binaries
If these files are being relinked at reboot, this causes false positives
and alert fatigue.
Prompted by florian@
Feedback from millert@ and deraadt@
deraadt [Sun, 9 Jun 2024 17:24:19 +0000 (17:24 +0000)]
include BUILDINFO file in the iso/img files; requested by florian for sysupgrade changes
jan [Sun, 9 Jun 2024 16:25:27 +0000 (16:25 +0000)]
Introduce IFCAP_VLAN_HWOFFLOAD for vio(4).
Add IFCAP_VLAN_HWOFFLOAD to signal hardware like vio(4) can handle
checksum or TSO offloading with inline VLAN tags.
tested by Mark Patruck, sf@ and bluhm@
ok sf@ and bluhm@
gilles [Sun, 9 Jun 2024 10:13:05 +0000 (10:13 +0000)]
introduce a new K_AUTH service to allow offloading the credentials to a
table for non-crypt(3) authentication. tables configured with auth that
support K_AUTH are asked to check if a user and passwd are valid rather
than asked to provide the password for a user so smtpd does crypt(3) on
its side. helps with cases like ldap or custom auth.
ok op@
jsg [Sun, 9 Jun 2024 05:18:12 +0000 (05:18 +0000)]
remove prototypes with no matching function
jsg [Sun, 9 Jun 2024 03:21:54 +0000 (03:21 +0000)]
remove prototypes for functions removed in rev 1.34
jsg [Sun, 9 Jun 2024 03:12:59 +0000 (03:12 +0000)]
remove unused prototypes and pin number defines
bluhm [Sat, 8 Jun 2024 22:50:40 +0000 (22:50 +0000)]
Perl 5.38 permanently stops reading a file after it has seen EOF.
Call clearerr() to continously receive log file from remote machine
while grepping for test patterns.
mglocker [Sat, 8 Jun 2024 16:05:23 +0000 (16:05 +0000)]
Fix typo in last commits comment.
tb [Sat, 8 Jun 2024 13:34:59 +0000 (13:34 +0000)]
Improve the check for is_ta in filemode
Instead of checking for EXFLAG_SS use the more accurate information
we already gathered.
ok job
tb [Sat, 8 Jun 2024 13:33:49 +0000 (13:33 +0000)]
Tigthen cert_parse_ee_cert() and ta_parse()
Require that a cert fed to cert_parse_ee_cert() have an EE cert purpose.
Instead of throwing a warning for BGPsec router certs, check for the TA
purpose in ta_parse() and reject everything else.
ok job
tb [Sat, 8 Jun 2024 13:32:30 +0000 (13:32 +0000)]
Add a TODO item for BGPsec router certs
It is currently assumed that there is only one extended key usage OID.
RFC 8209 allows others. For example, it may well make sense for operators
to include the anyExtendedKeyUsage OID to be able to use validators that
don't recognize the BGPsec Router purpose.
ok job
tb [Sat, 8 Jun 2024 13:31:37 +0000 (13:31 +0000)]
Improve x509_get_purpose()
Instead of only differentiating between CA and BGPsec Router certs,
make it recognize TA and EE certs as well. TAs and CAs have the cA
boolean in the basic constraints, while EE and BGPsec router certs
do not.
TAs are self-signed, CAs not self-issued, all other certs with the
cA boolean are invalid. EE certs do not have an extended key usage
and BGPsec certs contain the id-kp-bgpsec-router OID.
Handle the new purposes where needed.
ok job
tb [Sat, 8 Jun 2024 13:30:35 +0000 (13:30 +0000)]
Helper to convert purpose into a printable string
ok job
tb [Sat, 8 Jun 2024 13:29:54 +0000 (13:29 +0000)]
Extend the cert_purpose enum
This adds a TA and an EE purpose to be used in upcoming commits.
ok job