OpenBSD cvs log

created 2024-07-14T07:14:28Z
begin 2024-07-09T00:00:00Z
end 2024-07-10T00:00:00Z
path src/sys
commits 13

date 2024-07-09T01:21:19Z
author jsg
files src/sys/arch/amd64/amd64/db_disasm.c log diff annotate
src/sys/arch/i386/i386/db_disasm.c log diff annotate
message fix disasm of fucompp

when merging changes from FreeBSD in i386 rev 1.10
db_Esca5 was added but not used

ok mlarkin@

date 2024-07-09T04:42:48Z
author jsg
files src/sys/kern/sysv_sem.c log diff annotate
message change format strings to fix SEM_DEBUG build

date 2024-07-09T07:28:12Z
author mlarkin
files src/sys/arch/i386/i386/machdep.c log diff annotate
message Remove trailing whitespace. No code change.

date 2024-07-09T08:44:36Z
author claudio
files src/sys/kern/kern_sched.c log diff annotate
message In sched_toidle() only call the TRACEPOINT if curproc is set.
sched_toidle() is called by cpu_hatch() to start APs and then curproc
may be NULL.
OK mpi@

date 2024-07-09T08:47:10Z
author kettenis
files src/sys/dev/fdt/dwpcie.c log diff annotate
message Implement MSI multiple-vector support.

ok patrick@

date 2024-07-09T09:22:50Z
author claudio
files src/sys/kern/kern_sig.c log diff annotate
message Reshuffle the switch cases in ptsignal and single_thread_set to be
in the order needed for future changes. No functional change.
OK mpi@

date 2024-07-09T09:31:37Z
author dv
files src/sys/arch/amd64/include/vmmvar.h log diff annotate
src/sys/dev/vmm/vmm.h log diff annotate
message vmd/vmm: move vm_run_params into mi header.

To prepare for mi/md splitting vmd, need to fixup the dev/vmm/vmm.h
mi header. Move the vm_run_params struct and clean up the includes
in vmd.

"sure", mlarkin@

date 2024-07-09T09:33:13Z
author bluhm
files src/sys/netinet6/ip6_forward.c log diff annotate
message IPv6 forward copies small packet content on the stack.

Unfortunately RFC 4443 demands that the ICMP6 error packet containing
the orignal packet is up to 1280 bytes long. That means for every
forwarded packet forward() creates a mbuf copy, just in case delivery
fails.

For small packets we can copy the content on the stack like IPv4
forward does. This saves us some mbuf allocations if the content
is shorter than the mbuf data size.

OK mvs@

date 2024-07-09T10:51:14Z
author tb
files src/sys/lib/libz/zconf.h log diff annotate
message sync with userland: let z_off_t fall back to long long instead of long

In the boot blocks, this would result in various 64-bit instruction being
used, which might result in undesirable bloat in legacy boot loaders, so
add a workaround for the _STANDALONE case to still fall back to long
instead of long long.

with/ok deraadt, ok millert

date 2024-07-09T11:15:58Z
author deraadt
files src/sys/arch/amd64/amd64/vmm_support.S log diff annotate
message do a manual ret-clean operation inside the vmm_dispatch_intr asm code
ok mlarkin

date 2024-07-09T15:20:15Z
author claudio
files src/sys/kern/kern_resource.c log diff annotate
message Remove splassert() for now since IPL_STATCLOCK is MD and not all archs have it.
Noticed by bluhm@ on octeon

date 2024-07-09T16:04:15Z
author jmatthew
files src/sys/dev/pci/if_iavf.c log diff annotate
message netlock is no longer held for SIOCSIFMEDIA and SIOCGIFMEDIA, so rely on
the kernel lock instead, as done in if_ixl.c r1.84.

from Yuichiro NAITO

date 2024-07-09T19:11:06Z
author bluhm
files src/sys/arch/amd64/amd64/pmap.c log diff annotate
src/sys/arch/amd64/include/pmap.h log diff annotate
src/sys/arch/amd64/include/pte.h log diff annotate
message Prepare pmap for using the AMD SEV C-bit to encrypt guest memory.

The C-bit in a page table entry is used by a SEV guest to specify,
which pages are to be encrypted and which not. The latter is needed
to share pages with the hypervisor for virtio(4).
The actual position of the C-bit within a PTE is CPU implementation
dependend and needs to be determined dynamically at system boot.
The position of the C-bit also determines the actual size of page
frame mask. This will be provided by a separate change.
To be able to use the same kernel as both host and guest, the C-bit
is provided as variable similar to the NX-bit. Same holds for the
page frame masks.
Right now, pg_crypt is set to 0, pg_frame an pg_lgframe to PG_FRAME
and PG_LGFRAME respectively. Thus the kernel works as a host system
same as before.
Also introduce a PMAP_NOCRYPT flag. A guest will use this with
busdma to establish unencrypted mappings that can be shared with
the hypervisor.

from hshoexer@; OK mlarkin@