tb [Wed, 9 Aug 2023 09:32:22 +0000 (09:32 +0000)]
Merge remainder of rsa_crpt.c into rsa_eay.c
Most of these are one line wrappers around methods implemented in rsa_eay.c
by default.
tb [Wed, 9 Aug 2023 09:26:43 +0000 (09:26 +0000)]
Move RSA blinding API from rsa_crpt.c to rsa_blinding.c
tb [Wed, 9 Aug 2023 09:25:13 +0000 (09:25 +0000)]
Move RSA_blinding_{on,off}() to the bottom of the file
tb [Wed, 9 Aug 2023 09:23:03 +0000 (09:23 +0000)]
Move bn_blind.c to rsa_blinding.c
discussed with jsing
tb [Wed, 9 Aug 2023 09:20:00 +0000 (09:20 +0000)]
Make declaration and definition of BN_BLINDING_new() match.
Also, make mod const.
tb [Wed, 9 Aug 2023 09:09:24 +0000 (09:09 +0000)]
Merge BN_BLINDING_create_param() into BN_BLINDING_new()
tb [Wed, 9 Aug 2023 08:39:46 +0000 (08:39 +0000)]
Set up the blinding factors on first use
Only call BN_BLINDING_setup() from BN_BLINDING_update(). This allows
another simplification of the counter logic.
ok jsing
tb [Wed, 9 Aug 2023 08:35:59 +0000 (08:35 +0000)]
Remove retry loop in BN_BLINDING_setup()
If we generate a non-invertible blinding, we have accidentally factored
the modulus. This won't happen, so get rid of this ugly complication.
ok jsing
tb [Wed, 9 Aug 2023 08:31:13 +0000 (08:31 +0000)]
Compute a square using BN_mod_sqr() instead of BN_mod_mul()
ok jsing
tb [Wed, 9 Aug 2023 08:29:23 +0000 (08:29 +0000)]
Simplify BN_BLINDING_invert()
If the blinding is non-NULL, Ai is set on it, so no need to check for
that. Also, we can get away with a single call to BN_mod_mul().
ok jsing
tb [Wed, 9 Aug 2023 08:27:02 +0000 (08:27 +0000)]
Unwrap a line
jsg [Wed, 9 Aug 2023 02:59:41 +0000 (02:59 +0000)]
correct platform id mask, it is 3 bits 52:50
jsg [Wed, 9 Aug 2023 02:08:14 +0000 (02:08 +0000)]
remove some uneeded includes
ok dlg@
jsg [Wed, 9 Aug 2023 00:01:44 +0000 (00:01 +0000)]
show x86 cpu patch level in dmesg
ok guenther@ deraadt@
mvs [Tue, 8 Aug 2023 22:07:25 +0000 (22:07 +0000)]
Merge SO_BINDANY cases from both switch blocks within sosetopt(). This
time SO_LINGER case is separated, so there is no reason for dedicated
switch block.
ok bluhm
mvs [Tue, 8 Aug 2023 22:06:27 +0000 (22:06 +0000)]
Merge SO_SND* with corresponding SO_RCV* cases within sosetopt(). The
only difference is the socket buffer.
As bonus, in the future solock() will be easily replaced by sblock()
instead pushing it down to each SO_SND* and SO_RCV* case.
ok bluhm
tb [Tue, 8 Aug 2023 15:24:02 +0000 (15:24 +0000)]
Unwrap a line
tb [Tue, 8 Aug 2023 15:18:24 +0000 (15:18 +0000)]
Drop the unused BN_BLINDING argument of BN_BLINDING_create_param()
tb [Tue, 8 Aug 2023 15:10:34 +0000 (15:10 +0000)]
Rename ret into b in BN_BLINDING_setup()
tb [Tue, 8 Aug 2023 14:40:56 +0000 (14:40 +0000)]
Factor the actual setup step for the blinding into a helper
ok jsing
schwarze [Tue, 8 Aug 2023 13:59:23 +0000 (13:59 +0000)]
X509_STORE_CTX_get_check_issued(3) is weird.
Both the function return type and the function name are so long
that for displaying the function prototype,
a line break is needed after the function return type.
tb [Tue, 8 Aug 2023 13:59:04 +0000 (13:59 +0000)]
Make BN_BLINDING respect some invariants
Pass e and mod into BN_BLINDING_new() for now and unconditionally allocate
A and Ai. This way non-NULL blindings always have these four members set.
This allows removing several unnecessary checks in the update, convert and
parameter creation code paths.
Fix exit BN_BLINDING_create_param() so as to signal errors to the caller
if a non-NULL blinding was passed. This fixes a long standing bug.
ok jsing
tb [Tue, 8 Aug 2023 13:49:45 +0000 (13:49 +0000)]
Simplify RSA_setup_blinding()
Make this look a bit more like other code we cleaned up avoiding nesting
and unnecessary else branches.
ok jsing
tb [Tue, 8 Aug 2023 13:09:28 +0000 (13:09 +0000)]
Remove ECDSA nonce padding kludge
This was a workaround due to the historically non-constant time scalar
multiplication in the EC code. Since Brumley and Tuveri implemented the
Montgomery ladder, this is no longer useful and should have been removed
a long time ago, as it now does more harm than good.
Keep the preallocations as they still help hiding some timing info.
ok jsing
schwarze [Tue, 8 Aug 2023 12:55:08 +0000 (12:55 +0000)]
In objects.h rev. 1.17 (Jan 14, 2022),
tb@ removed the following macros from the public API:
_DECLARE_OBJ_BSEARCH_CMP_FN
DECLARE_OBJ_BSEARCH_CMP_FN DECLARE_OBJ_BSEARCH_GLOBAL_CMP_FN
IMPLEMENT_OBJ_BSEARCH_CMP_FN IMPLEMENT_OBJ_BSEARCH_GLOBAL_CMP_FN
OBJ_bsearch OBJ_bsearch_ex
In objects.h rev. 1.20 (Nov 11, 2022), jsing@ unifdef'ed USE_OBJ_MAC.
Stop marking these names as intentionally undocumented.
espie [Tue, 8 Aug 2023 12:46:56 +0000 (12:46 +0000)]
document new diagnostic
dlg [Tue, 8 Aug 2023 10:31:03 +0000 (10:31 +0000)]
have a go at documenting the Interface config statement.
im not really happy with this, but it's a start.
dlg [Tue, 8 Aug 2023 10:19:15 +0000 (10:19 +0000)]
if sec is being destroyed, prevent it from being brought up again.
jsg [Tue, 8 Aug 2023 10:16:51 +0000 (10:16 +0000)]
adapt more functions to the i915_gem_phys hack
linux stashes a dma va in the vm_page pointer part of the scatterlist.
We use a pointer to a struct with the dma tag and map.
dlg [Tue, 8 Aug 2023 10:14:29 +0000 (10:14 +0000)]
try to avoid a deadlock between sec_down and sec_send.
sec_send runs in the systq (because it calls ipsec stuff which uses
crypto, which is not mpsafe) and takes the net lock (because ipsec
output calls ip_output and other stuff). sec_down is called with
NET_LOCK held and tries to run a barrier for send task. if the send
task is running but is waiting for the net lock while sec_down is
holding the net lock while waiting for the task to finish, we're
deadlocked.
this copies the sc_up thing from pfsync, which hopefuly avoids this.
pointed out by mvs@
nicm [Tue, 8 Aug 2023 08:21:29 +0000 (08:21 +0000)]
Add flag to next-prompt/previous-prompt to go to command output instead,
from Magnus Gross.
nicm [Tue, 8 Aug 2023 08:08:47 +0000 (08:08 +0000)]
Add options and flags for menu styles similar to those existing for
popups, from Alexis Hildebrandt. GitHub issue 3650.
nicm [Tue, 8 Aug 2023 07:41:04 +0000 (07:41 +0000)]
Extend the menu drawing function to support custom characters and
styles, from Alexis Hildebrandt.
nicm [Tue, 8 Aug 2023 07:19:48 +0000 (07:19 +0000)]
Fix a couple of rounded border characters, from Alexis Hildebrandt.
guenther [Tue, 8 Aug 2023 04:45:44 +0000 (04:45 +0000)]
Replace use of the old BSD st_*timensec members in struct stat with
the POSIX-standard st_*tim.tv_nsec members.
ok millert@
deraadt [Tue, 8 Aug 2023 02:42:35 +0000 (02:42 +0000)]
sync
schwarze [Mon, 7 Aug 2023 23:10:03 +0000 (23:10 +0000)]
No need to mark BN_options() as intentionally undocumented any longer.
In bn.h rev. 1.75 (July 31, 2023), tb@ removed it from the public API.
While here, stop marking BN_prime_checks as obsolete.
In BN_generate_prime.3 rev. 1.23 (May 11, 2023), tb@ documented
the constant BN_prime_checks in that manual page.
schwarze [Mon, 7 Aug 2023 22:39:49 +0000 (22:39 +0000)]
Mark asn1_ps_func as obsolete and intentionally undocumented.
In bio.h rev. 1.59 (July 28, 2023), tb@ removed the last four functions
that took function pointers of this type from the public API.
schwarze [Mon, 7 Aug 2023 22:22:15 +0000 (22:22 +0000)]
Mark BIT_STRING_BITNAME as obsolete and intentionally undocumented.
In asn1.h rev. 1.80 (July 28, 2023), tb@ removed the last three
functions that were using this data type from the public API.
kettenis [Mon, 7 Aug 2023 20:28:47 +0000 (20:28 +0000)]
Raise transmit threshold to 512 bytes. This makes dwqe(4) work at
1000baseT. We still see a small number of underflow errors when hammering
the interface with packets, but it is defenitely usable.
While there, make sure we count transmit errors.
ok jmatthew@
miod [Mon, 7 Aug 2023 17:11:13 +0000 (17:11 +0000)]
Revert 1.43 and always make our own mapping of the Mostek chip. Trying to
reuse the prom mapping here is a bad idea because we alter its writeability
and the prom will not always expect this.
Repairs powerdown on Tapdole Ultrabook IIe.
discussed with and ok kettenis@
jmc [Mon, 7 Aug 2023 16:29:36 +0000 (16:29 +0000)]
some readability tweaks; ok dlg
tb [Mon, 7 Aug 2023 11:00:54 +0000 (11:00 +0000)]
Add a regress test exercising BIO_dup_chain() and triggering the leak
fixed in bio_lib.c r1.47 as confirmed by ASAN.
tb [Mon, 7 Aug 2023 10:58:56 +0000 (10:58 +0000)]
Fix two leaks in BIO_dup_chain()
If CRYPTO_dup_ex_data() fails, the new_bio is leaked. If an error occurs
after the first iteration, all members of the new chain except the head
are leaked.
ok jsing
tb [Mon, 7 Aug 2023 10:54:14 +0000 (10:54 +0000)]
Add missing space before =
nicm [Mon, 7 Aug 2023 10:52:00 +0000 (10:52 +0000)]
Free title earlier, from Alexis Hildebrandt.
nicm [Mon, 7 Aug 2023 10:04:29 +0000 (10:04 +0000)]
Trim can generate strings longer than the original if there are many #s,
so create a bigger buffer. Reported by Robert Morris.
mbuhl [Mon, 7 Aug 2023 08:22:52 +0000 (08:22 +0000)]
add LJG
guenther [Mon, 7 Aug 2023 06:21:53 +0000 (06:21 +0000)]
In 2016, chat changed its syslog output for hidden strings.
Sync the manpage to match.
markup advice jmc@
dlg [Mon, 7 Aug 2023 04:10:08 +0000 (04:10 +0000)]
add support route based ipsec vpn negotiation with sec(4) via isakmpd.
this adds "interface secX" to the grammar that you can use instead
of specifying tunnel/transport modes and traffic selectors.
if you have config like "ike interface sec0 local ... peer ...",
ipsecctl will generate the right config for isakmpd to negotiate
esp tunnels for all traffic between 0.0.0.0/0 and 0.0.0.0/0. however,
this also specifies that they should be set up as interface SAs in
the kernel for use with sec(4).
this supports route-based instead of policy based ipsec encapsulation,
and allows us to more easily operate with other vendors and products
that also offer route-based vpns with opinions about the negotiated
policy that doesnt fit with the SPD.
support from many including markus@ tobhe@ claudio@ sthen@ patrick@
now is a good time deraadt@
dlg [Mon, 7 Aug 2023 04:01:29 +0000 (04:01 +0000)]
support configuring interface SAs for route-based ipsec vpns.
add "Interface NUMBER" to the config parser to specify that once
SAs have been negotiated with a peer, install the SAs with the
sadb_x_iface extension set up, but skip installing the flows/SPD
entries.
this allows for the negotiation of multiple esp tunnels covering
all traffic between 0.0.0.0/0 to 0.0.0.0/0, and then being able to
do something useful with them using the routing table and sec(4)
interfaces instead of having SPD entries fight over those packets
in the kernel.
this in turn allows interoperation with other ipsec/vpn solutions
that require the negotiation of such tunnels.
support from many including markus@ tobhe@ claudio@ sthen@ patrick@
now is a good time deraadt@
dlg [Mon, 7 Aug 2023 03:43:57 +0000 (03:43 +0000)]
add the glue between ipsec security associations and sec(4) interfaces.
if TDBF_IFACE is set on a tdb, the ipsec stack will pass it to the
sec(4) driver to keep track of instead of wiring it up for security
associations to use.
when sec(4) transmits a packet, it will look up it's list of tdbs
to find the right SA to encrypt and send the packet out with.
if an incoming ipsec packet arrives with TDBF_IFACE set, it's passed
to sec(4) to be injected back into the network stack as if it was
received on the sec interface, instead of being reinjected into the
IP stack like normal SA/SPD processing does.
note that this means you do not have to configure tunnel endpoints
on sec(4) interfaces, instead you line the interface unit number
in the ipsec config up with the minor number of the sec(4) interfaces.
the peer IPs used on the SAs are what's used as the traffic endpoints.
support from many including markus@ tobhe@ claudio@ sthen@ patrick@
now is a good time deraadt@
dlg [Mon, 7 Aug 2023 03:35:06 +0000 (03:35 +0000)]
add a struct sadb_x_iface message for interface SAs
this allows userland to install (and see) security associations for
route-based ipsec vpns. if this message is part of an SA, it causes
the TDBF_IFACE flag and associated fields in a tdb to be set.
the interface unit field in this message maps to minor number of
the sec(4) interface you want to the SA to work with. ie, set the
sadb_x_iface_unit field in struct sadb_x_iface to 1 to set up an
SA for use with sec1. the sadb_x_iface_direction in the message
uses IPSP_DIRECTION_IN and IPSP_DIRECTION_OUT to specify in which
direction that SA is supposed to process traffic.
support from many including markus@ tobhe@ claudio@ sthen@ patrick@
now is a good time deraadt@
dlg [Mon, 7 Aug 2023 03:17:42 +0000 (03:17 +0000)]
sec(4) to support route-based ipsec vpns.
committing it now so jmc@ gets commits for any fixes he makes.
jsg [Mon, 7 Aug 2023 02:47:55 +0000 (02:47 +0000)]
744c rev ce is Radeon RX 7900 GRE
found in AMD Software: Adrenalin Edition 23.7.2
dlg [Mon, 7 Aug 2023 01:59:38 +0000 (01:59 +0000)]
wire sec(4) into the kernel config.
this makes #include "sec.h" and #if NSEC > 0 work in kernel code.
dlg [Mon, 7 Aug 2023 01:57:33 +0000 (01:57 +0000)]
add sec(4) to support route based ipsec vpns.
ipsec security associations (SAs, aka tdbs inside the kernel) can
now specify that they're to be used with an interface (using
TDBF_IFACE) rather than the ipsec security policy database. sec(4)
is the driver providing that interface.
the name is specifically chosen to not be ipsec(4) because that's
already taken by the manpage for the ipsec stack generally. sec(4)
is short, easy to type and pronounce, and kind of sounds like ipsec
anyway. the names for this type of interface in other platforms
seems to be universally terrible and too generic, so i didn't want
to copy any of those either.
sec(4) can be considered equivalent to gif(4) protected by ipsec,
and on the wire it actually looks the same. sec(4) exists to better
support how security associations for route-based ipsec VPNs are
negotiated and to avoid SPD entries for them.
the code is a little green, but i'm putting it in now so it can be
hacked on in the tree.
support from many including markus@ tobhe@ claudio@ sthen@ patrick@
now is a good time deraadt@
dlg [Mon, 7 Aug 2023 01:44:51 +0000 (01:44 +0000)]
start adding support for route-based ipsec vpns.
rather than use ipsec flows (aka, entries in the ipsec security
policy database) to decide which traffic should be encapsulated in
ipsec and sent to a peer, this tweaks security associations (SAs)
so they can refer to a tunnel interface. when traffic is routed
over that tunnel interface, an ipsec SA is looked up and used to
encapsulate traffic before being sent to the peer on the SA. When
traffic is received from a peer using an interface SA, the specified
interface is looked up and the packet is handed to it so it looks
like packets come out of the tunnel.
to support this, SAs get a TDBF_IFACE flag and iface and iface_dir
fields. When TDBF_IFACE is set the iface and dir fields are
considered valid, and the tdb/SA should be used with the tunnel
interface instead of the SPD.
support from many including markus@ tobhe@ claudio@ sthen@ patrick@
now is a good time deraadt@
guenther [Sun, 6 Aug 2023 19:36:13 +0000 (19:36 +0000)]
Prefer the POSIX standard st_*tim struct timespec members over the
older BSD st_*timespec names.
ok millert@
guenther [Sun, 6 Aug 2023 19:33:54 +0000 (19:33 +0000)]
Apply rev 1.29 from NetBSD:
-----
Don't printf time_t with %d; fixes PR 44128 from yamt. With this change it
successfully prints mtimes after 2038.
-----
ok millert@
jsg [Sun, 6 Aug 2023 14:41:10 +0000 (14:41 +0000)]
regen
jsg [Sun, 6 Aug 2023 14:40:25 +0000 (14:40 +0000)]
add another Navi 33 device id
7480 rev 00 is Radeon Pro W7600
7489 rev 00 is Radeon Pro W7500
found in AMD Software: PRO Edition 23.Q3 W7000 Series
tobhe [Sun, 6 Aug 2023 14:30:08 +0000 (14:30 +0000)]
Add acpi_softc == NULL checks and return ENXIO instead of crashing on
non-acpi x86 machines. This was lost in refactoring when moving /dev/apm
code from acpi.c to acpi_apm.c.
Found by Anton Lindqvist after report from xavier.s at mailoo dot org
ok kettenis@
cheloha [Sat, 5 Aug 2023 20:07:55 +0000 (20:07 +0000)]
hardclock(9): move setitimer(2) code into itimer_update()
- Move the setitimer(2) code responsible for updating the ITIMER_VIRTUAL
and ITIMER_PROF timers from hardclock(9) into a new clock interrupt
routine, itimer_update(). itimer_update() is periodic and runs at the
same frequency as the hardclock.
+ Revise itimerdecr() to run within itimer_mtx instead of entering
and leaving it.
- Each schedstate_percpu has its own itimer_update() handle, spc_itimer.
A new scheduler flag, SPCF_ITIMER, indicates whether spc_itimer was
started during the last mi_switch() and needs to be stopped during the
next mi_switch() or sched_exit().
- A new per-process flag, PS_ITIMER, indicates whether ITIMER_VIRTUAL
and/or ITIMER_PROF are running. Checking the flag is easier than
entering itimer_mtx to check process.ps_timer[]. The flag is set
and cleared in a new helper function, process_reset_itimer_flag().
- In setitimer(), call need_resched() when the state of ITIMER_VIRTUAL
or ITIMER_PROF is changed to force an mi_switch() and update
spc_itimer.
claudio@ notes that ITIMER_PROF could be implemented as a high-res
timer using the thread's execution time as a guide for when to
interrupt the process and assert SIGPROF. This would probably work
really well in single-threaded processes. ITIMER_VIRTUAL would be
more difficult to make high-res, though, as you need to exclude time
spent in the kernel.
Tested on powerpc64 by gkoehler@. With input from claudio@.
Thread: https://marc.info/?l=openbsd-tech&m=
169038818517101&w=2
ok claudio@
jmc [Sat, 5 Aug 2023 18:27:55 +0000 (18:27 +0000)]
remove trailing comma in NAME;
claudio [Sat, 5 Aug 2023 12:41:04 +0000 (12:41 +0000)]
Remove the P_WSLEEP specific KASSERT(). Not only procs in state SSTOP
can be added to the run queue but also procs in state SRUN. The latter
happens when schedcpu() kicks in before the proc had a chance to run.
Problem spotted by gkoehler@
OK cheloha@
tb [Sat, 5 Aug 2023 08:47:31 +0000 (08:47 +0000)]
Remove empty file left behind in a revert during p2k17
guenther [Sat, 5 Aug 2023 05:46:36 +0000 (05:46 +0000)]
cpu_idle_{enter,leave} are no-ops on mips64, so just #define
away the calls
ok jca@
guenther [Sat, 5 Aug 2023 05:45:52 +0000 (05:45 +0000)]
cpu_idle_{enter,leave} are no-ops on riscv64, so just #define
away the calls
ok jca@
aoyama [Sat, 5 Aug 2023 00:34:19 +0000 (00:34 +0000)]
Inform 8bpp capability on 8bpp framebuffer in
WSDISPLAYIO_GETSUPPORTEDDEPTH ioctl.
This is needed to use recent updated wsfb(4) driver in 8bpp mode.
We can use 1bpp X server on 8bpp framebuffer by 'startx -- -depth 1'.
Tested by me.
claudio [Fri, 4 Aug 2023 19:06:25 +0000 (19:06 +0000)]
Convert calls to ibuf_length() where it is clear that the ibuf is not
NULL to ibuf_size(). In some cases it is clear that the ibuf pointer
should just be checked for NULL since afterwards a new ibuf is allocated
in its place.
OK tb@
jan [Fri, 4 Aug 2023 10:58:27 +0000 (10:58 +0000)]
Remove unused struct field vlan_stripping.
pointed out by bluhm
ok bluhm@
fcambus [Fri, 4 Aug 2023 10:29:09 +0000 (10:29 +0000)]
Sync the supported hardware list with arm64.html.
jsg [Fri, 4 Aug 2023 09:36:28 +0000 (09:36 +0000)]
dma-buf: fix an error pointer vs NULL bug
From Dan Carpenter
c3d576baa6c8f0b34750a0b6f9b12e9d64625512 in linux-6.1.y/6.1.43
00ae1491f970acc454be0df63f50942d94825860 in mainline linux
jsg [Fri, 4 Aug 2023 09:31:20 +0000 (09:31 +0000)]
drm_syncobj.c now uses dma_fence_allocate_private_stub() with an arg
jsg [Fri, 4 Aug 2023 09:30:48 +0000 (09:30 +0000)]
dma-buf: keep the signaling time of merged fences v3
From Christian Koenig
23acc2b850ba4dfdfe2700d728be3e27710260a1 in linux-6.1.y/6.1.43
f781f661e8c99b0cb34129f2e374234d61864e77 in mainline linux
jsg [Fri, 4 Aug 2023 09:23:40 +0000 (09:23 +0000)]
drm/amd/display: Write to correct dirty_rect
From Benjamin Cheng
d701687c898e5358f29ca11bccdfc8f54129e69c in linux-6.1.y/6.1.43
751281c55579f0cb0e56c9797d4663f689909681 in mainline linux
jsg [Fri, 4 Aug 2023 09:22:11 +0000 (09:22 +0000)]
drm/amd/display: perform a bounds check before filling dirty rectangles
From Hamza Mahfooz
d58fb94f24f89c833bd73d370b27b58867d78120 in linux-6.1.y/6.1.43
af22d6a869cc26b519bfdcd54293c53f2e491870 in mainline linux
jsg [Fri, 4 Aug 2023 09:20:15 +0000 (09:20 +0000)]
drm/amd/display: set per pipe dppclk to 0 when dpp is off
From Dmytro Laktyushkin
f5e8f7a02c158afbfe7657e0358ee964978ee138 in linux-6.1.y/6.1.43
6609141c49df1b86fbad26a8643d4b4044f28b11 in mainline linux
claudio [Fri, 4 Aug 2023 09:20:12 +0000 (09:20 +0000)]
Instead of forcing a NUL into struct ctl_neighbor descr adjust the
peer matching code to only match at maximum sizeof(n->descr) bytes
using strncmp().
OK tb@
jsg [Fri, 4 Aug 2023 09:18:11 +0000 (09:18 +0000)]
drm/i915/dpt: Use shmem for dpt objects
From Radhakrishna Sripada
507f70c06aa99d05fbb0f36de2be31ef1cf88497 in linux-6.1.y/6.1.43
3844ed5e78823eebb5f0f1edefc403310693d402 in mainline linux
jsg [Fri, 4 Aug 2023 09:16:46 +0000 (09:16 +0000)]
drm/amd/display: Unlock on error path in dm_handle_mst_sideband_msg_ready_event()
From Dan Carpenter
e139cc2974b801f3f6e38efa047a7e3b7121fc8d in linux-6.1.y/6.1.43
38ac4e8385ffb275b1837986ca6c16f26ea028c5 in mainline linux
jsg [Fri, 4 Aug 2023 09:15:07 +0000 (09:15 +0000)]
drm/amd: Fix an error handling mistake in psp_sw_init()
From Mario Limonciello
5c58d120bf81a1fe6cc05e640568c0da14042c09 in linux-6.1.y/6.1.43
c01aebeef3ce45f696ffa0a1303cea9b34babb45 in mainline linux
jsg [Fri, 4 Aug 2023 09:13:44 +0000 (09:13 +0000)]
drm/i915: Fix an error handling path in igt_write_huge()
From Christophe JAILLET
a71cd15a8592482bc3adead423ec4ff4502f0a72 in linux-6.1.y/6.1.43
e354f67733115b4453268f61e6e072e9b1ea7a2f in mainline linux
jsg [Fri, 4 Aug 2023 09:12:01 +0000 (09:12 +0000)]
drm/amd/display: Prevent vtotal from being set to 0
From Daniel Miess
15c94c3151d9fa86294efb4c6618cae44530e49b in linux-6.1.y/6.1.43
2a9482e55968ed7368afaa9c2133404069117320 in mainline linux
jsg [Fri, 4 Aug 2023 09:10:24 +0000 (09:10 +0000)]
drm/amd/display: Fix possible underflow for displays with large vblank
From Daniel Miess
d5741133e6e2f304b40ca1da0e16f62af06f4d22 in linux-6.1.y/6.1.43
1a4bcdbea4319efeb26cc4b05be859a7867e02dc in mainline linux
tb [Fri, 4 Aug 2023 09:09:52 +0000 (09:09 +0000)]
Sync with userland libz
tb [Fri, 4 Aug 2023 09:09:04 +0000 (09:09 +0000)]
Fix a couple of typos in a comment
from upstream
jsg [Fri, 4 Aug 2023 09:08:44 +0000 (09:08 +0000)]
drm/amd/display: update extended blank for dcn314 onwards
From Gabe Teeger
342ec1696d2dcc66e7d2905c5aa52e9c9e86d527 in linux-6.1.y/6.1.43
469a62938a45ef382c9cb7b9fec6c6c1fcd781c0 in mainline linux
jsg [Fri, 4 Aug 2023 09:05:41 +0000 (09:05 +0000)]
drm/amd/display: Add FAMS validation before trying to use it
From Rodrigo Siqueira
27931ea53ce59ff421c42c08d4ad3df4b632babe in linux-6.1.y/6.1.43
e3416e872f84086667df21daf166506fab97358d in mainline linux
jsg [Fri, 4 Aug 2023 09:03:05 +0000 (09:03 +0000)]
drm/amd/display: fix dc/core/dc.c kernel-doc
From Randy Dunlap
6415d5de13f532297005ef100cefa92c80fe40db in linux-6.1.y/6.1.43
db4107e92a817502ad19fdd30250f87dcb6f6331 in mainline linux
jsg [Fri, 4 Aug 2023 09:00:56 +0000 (09:00 +0000)]
drm/amd/display: Rework comments on dc file
From Rodrigo Siqueira
549f20581996835bae1d6567b2cc60ad0a5ef9cd in linux-6.1.y/6.1.43
e366f36958f60c431a7430c8c421c9db0ec6738d in mainline linux
jsg [Fri, 4 Aug 2023 08:58:34 +0000 (08:58 +0000)]
drm/ttm: never consider pinned BOs for eviction&swap
From Christian Koenig
17e188e0feb008bab5f4b083083dff7cdc633ca1 in linux-6.1.y/6.1.43
a2848d08742c8e8494675892c02c0d22acbe3cf8 in mainline linux
jsg [Fri, 4 Aug 2023 08:57:11 +0000 (08:57 +0000)]
drm/ttm: Don't leak a resource on eviction error
From Thomas Hellstrom
e9c44738cb1f537b177cc1beabcf6913690460cd in linux-6.1.y/6.1.43
e8188c461ee015ba0b9ab2fc82dbd5ebca5a5532 in mainline linux
jsg [Fri, 4 Aug 2023 08:55:47 +0000 (08:55 +0000)]
drm/ttm: Don't print error message if eviction was interrupted
From Thomas Hellstrom
3a8f9b8ccf2b34623cd7264cd78c80f8806959d5 in linux-6.1.y/6.1.43
8ab3b0663e279ab550bc2c0b5d602960e8b94e02 in mainline linux
jsg [Fri, 4 Aug 2023 08:54:09 +0000 (08:54 +0000)]
drm/amd/display: Set minimum requirement for using PSR-SU on Phoenix
From Mario Limonciello
76fcfc6ae3a64033626647bae7b6d1f2d8bea72a in linux-6.1.y/6.1.43
cd2e31a9ab93d13c412a36c6e26811e0f830985b in mainline linux
jsg [Fri, 4 Aug 2023 08:52:17 +0000 (08:52 +0000)]
drm/amd/display: Set minimum requirement for using PSR-SU on Rembrandt
From Mario Limonciello
f8b61a2c29fc70f64daad698cf09c1f79a0e39f9 in linux-6.1.y/6.1.43
c35b6ea8f2ecfa9d775530b70d4e727869099a9c in mainline linux
jsg [Fri, 4 Aug 2023 08:49:46 +0000 (08:49 +0000)]
drm/amd/display: Update correct DCN314 register header
From Cruise Hung
41c666e2b7515c551940ae5ba0437bd2e17fbe85 in linux-6.1.y/6.1.43
268182606f26434c5d3ebd0e86efcb0418dec487 in mainline linux
jsg [Fri, 4 Aug 2023 08:44:44 +0000 (08:44 +0000)]
drm/amd/display: fix dcn315 single stream crb allocation
From Dmytro Laktyushkin
8f0582fb6d0edf3581b1ece0cc186ab82fb083b4 in linux-6.1.y/6.1.43
49f26218c344741cb3eaa740b1e44e960551a87f in mainline linux
jsg [Fri, 4 Aug 2023 08:43:06 +0000 (08:43 +0000)]
drm/amd/display: add pixel rate based CRB allocation support
From Dmytro Laktyushkin
38fa05cad9df113fb31fabc0b88f5ca681235bd2 in linux-6.1.y/6.1.43
9ba90d760e9354c124fa9bbea08017d96699a82c in mainline linux