created | 2024-07-14T07:14:28Z |
---|---|
begin | 2024-07-09T00:00:00Z |
end | 2024-07-10T00:00:00Z |
path | src/sys |
commits | 13 |
date | 2024-07-09T01:21:19Z | |||
---|---|---|---|---|
author | jsg | |||
files | src/sys/arch/amd64/amd64/db_disasm.c | log | diff | annotate |
src/sys/arch/i386/i386/db_disasm.c | log | diff | annotate | |
message |
fix disasm of fucompp when merging changes from FreeBSD in i386 rev 1.10 db_Esca5 was added but not used ok mlarkin@ |
date | 2024-07-09T04:42:48Z | |||
---|---|---|---|---|
author | jsg | |||
files | src/sys/kern/sysv_sem.c | log | diff | annotate |
message | change format strings to fix SEM_DEBUG build |
date | 2024-07-09T07:28:12Z | |||
---|---|---|---|---|
author | mlarkin | |||
files | src/sys/arch/i386/i386/machdep.c | log | diff | annotate |
message | Remove trailing whitespace. No code change. |
date | 2024-07-09T08:44:36Z | |||
---|---|---|---|---|
author | claudio | |||
files | src/sys/kern/kern_sched.c | log | diff | annotate |
message |
In sched_toidle() only call the TRACEPOINT if curproc is set. sched_toidle() is called by cpu_hatch() to start APs and then curproc may be NULL. OK mpi@ |
date | 2024-07-09T08:47:10Z | |||
---|---|---|---|---|
author | kettenis | |||
files | src/sys/dev/fdt/dwpcie.c | log | diff | annotate |
message |
Implement MSI multiple-vector support. ok patrick@ |
date | 2024-07-09T09:22:50Z | |||
---|---|---|---|---|
author | claudio | |||
files | src/sys/kern/kern_sig.c | log | diff | annotate |
message |
Reshuffle the switch cases in ptsignal and single_thread_set to be in the order needed for future changes. No functional change. OK mpi@ |
date | 2024-07-09T09:31:37Z | |||
---|---|---|---|---|
author | dv | |||
files | src/sys/arch/amd64/include/vmmvar.h | log | diff | annotate |
src/sys/dev/vmm/vmm.h | log | diff | annotate | |
message |
vmd/vmm: move vm_run_params into mi header. To prepare for mi/md splitting vmd, need to fixup the dev/vmm/vmm.h mi header. Move the vm_run_params struct and clean up the includes in vmd. "sure", mlarkin@ |
date | 2024-07-09T09:33:13Z | |||
---|---|---|---|---|
author | bluhm | |||
files | src/sys/netinet6/ip6_forward.c | log | diff | annotate |
message |
IPv6 forward copies small packet content on the stack. Unfortunately RFC 4443 demands that the ICMP6 error packet containing the orignal packet is up to 1280 bytes long. That means for every forwarded packet forward() creates a mbuf copy, just in case delivery fails. For small packets we can copy the content on the stack like IPv4 forward does. This saves us some mbuf allocations if the content is shorter than the mbuf data size. OK mvs@ |
date | 2024-07-09T10:51:14Z | |||
---|---|---|---|---|
author | tb | |||
files | src/sys/lib/libz/zconf.h | log | diff | annotate |
message |
sync with userland: let z_off_t fall back to long long instead of long In the boot blocks, this would result in various 64-bit instruction being used, which might result in undesirable bloat in legacy boot loaders, so add a workaround for the _STANDALONE case to still fall back to long instead of long long. with/ok deraadt, ok millert |
date | 2024-07-09T11:15:58Z | |||
---|---|---|---|---|
author | deraadt | |||
files | src/sys/arch/amd64/amd64/vmm_support.S | log | diff | annotate |
message |
do a manual ret-clean operation inside the vmm_dispatch_intr asm code ok mlarkin |
date | 2024-07-09T15:20:15Z | |||
---|---|---|---|---|
author | claudio | |||
files | src/sys/kern/kern_resource.c | log | diff | annotate |
message |
Remove splassert() for now since IPL_STATCLOCK is MD and not all archs have it. Noticed by bluhm@ on octeon |
date | 2024-07-09T16:04:15Z | |||
---|---|---|---|---|
author | jmatthew | |||
files | src/sys/dev/pci/if_iavf.c | log | diff | annotate |
message |
netlock is no longer held for SIOCSIFMEDIA and SIOCGIFMEDIA, so rely on the kernel lock instead, as done in if_ixl.c r1.84. from Yuichiro NAITO |
date | 2024-07-09T19:11:06Z | |||
---|---|---|---|---|
author | bluhm | |||
files | src/sys/arch/amd64/amd64/pmap.c | log | diff | annotate |
src/sys/arch/amd64/include/pmap.h | log | diff | annotate | |
src/sys/arch/amd64/include/pte.h | log | diff | annotate | |
message |
Prepare pmap for using the AMD SEV C-bit to encrypt guest memory. The C-bit in a page table entry is used by a SEV guest to specify, which pages are to be encrypted and which not. The latter is needed to share pages with the hypervisor for virtio(4). The actual position of the C-bit within a PTE is CPU implementation dependend and needs to be determined dynamically at system boot. The position of the C-bit also determines the actual size of page frame mask. This will be provided by a separate change. To be able to use the same kernel as both host and guest, the C-bit is provided as variable similar to the NX-bit. Same holds for the page frame masks. Right now, pg_crypt is set to 0, pg_frame an pg_lgframe to PG_FRAME and PG_LGFRAME respectively. Thus the kernel works as a host system same as before. Also introduce a PMAP_NOCRYPT flag. A guest will use this with busdma to establish unencrypted mappings that can be shared with the hypervisor. from hshoexer@; OK mlarkin@ |