OpenBSD cvs log

created 2020-12-27T22:07:03Z
begin 2020-12-20T00:00:00Z
end 2020-12-21T00:00:00Z
path src/sys
commits 9

date 2020-12-20T03:42:01Z
author jsg
files src/sys/dev/pci/drm/include/linux/uaccess.h log diff annotate
message test against [VM_MIN_ADDRESS, VM_MAXUSER_ADDRESS] in access_ok()

ok kettenis@

date 2020-12-20T03:58:42Z
author jsg
files src/sys/dev/pci/drm/i915/i915_devlist.h log diff annotate
message remove duplicate device id caused by subids in INTEL_IVB_Q_IDS

date 2020-12-20T04:12:14Z
author jsg
files src/sys/dev/pci/drm/include/drm/i915_pciids.h log diff annotate
message drm/i915: Remove dubious Valleyview PCI IDs

From Alexei Podtelezhnikov
f2bde2546b81b64fb58aa04888fdd82a090b3908 in mainline linux

date 2020-12-20T04:13:12Z
author jsg
files src/sys/dev/pci/drm/i915/i915_devlist.h log diff annotate
message sync with i915_pciids.h

date 2020-12-20T09:49:53Z
author jmatthew
files src/sys/arch/amd64/amd64/mpbios.c log diff annotate
src/sys/arch/i386/i386/mpbios.c log diff annotate
message Convert uvm_km_valloc(9) calls to km_alloc(9). Tested in qemu with
acpi disabled, no real mpbios hardware in sight.

ok kettenis@

date 2020-12-20T12:54:05Z
author visa
files src/sys/kern/kern_event.c log diff annotate
src/sys/sys/event.h log diff annotate
message Introduce klistops

This patch extends struct klist with a callback descriptor and
an argument. The main purpose of this is to let the kqueue subsystem
assert when a klist should be locked, and operate the klist lock
in klist_invalidate().

Access to a knote list of a kqueue-monitored object has to be
serialized somehow. Because the object often has a lock for protecting
its state, and because the object often acquires this lock at the latest
in its f_event callback function, it makes sense to use this lock also
for the knote lists. The existing uses of NOTE_SUBMIT already show
a pattern that is likely to become more prevalent.

There could be an embedded lock in klist. However, such a lock would be
redundant in many cases. The code cannot rely on a single lock type
(mutex, rwlock, something else) because the needs of monitored objects
vary. In addition, an embedded lock would introduce new lock order
constraints. Note that the patch does not rule out use of dedicated
klist locks.

The patch introduces a way to associate lock operations with a klist.
The caller can provide a custom implementation, or use a ready-made
interface with a mutex or rwlock.

For compatibility with old code, the new code falls back to using the
kernel lock if no specific klist initialization has been done. The
existing code already relies on implicit initialization of klist.

Sadly, this change increases the size of struct klist. dlg@ thinks this
is not fatal, though.

OK mpi@

date 2020-12-20T13:02:10Z
author kettenis
files src/sys/arch/powerpc64/dev/phb.c log diff annotate
message The TCE table needs to be aligned on a boundary that is a multiple of its
size. Fixes booting on machines that have memory banks higher up in
physical address space which needs a larger TCE table.

date 2020-12-20T21:03:53Z
author kettenis
files src/sys/arch/powerpc64/dev/phb.c log diff annotate
message Fix typo.

date 2020-12-20T21:15:47Z
author bluhm
files src/sys/netinet/ip_icmp.c log diff annotate
src/sys/netinet/ip_icmp.h log diff annotate
src/sys/netinet/ip_output.c log diff annotate
src/sys/netinet/tcp_timer.c log diff annotate
message Accept reject and blackhole routes for IPsec PMTU discovery.

Since revision 1.87 of ip_icmp.c icmp_mtudisc_clone() ignored reject
routes. Otherwise TCP would clone these routes for PMTU discovery.
They will not work, even after dynamic routing has found a better
route than the reject route.

With IPsec the use case is different. First you need a route, but
then the flow handles the packet without routing. Usually this
route should be a reject route to avoid sending unencrypted traffic
if the flow is missing. But IPsec needs this route for PMTU
discovery, so use it for that.

OK claudio@ tobhe@