OpenBSD cvs log

created 2024-10-07T17:20:16Z
begin 2024-10-04T00:00:00Z
end 2024-10-05T00:00:00Z
path src/sys
commits 7

date 2024-10-04T05:22:10Z
author yasuoka
files src/sys/dev/pci/if_ix.c log diff annotate
src/sys/dev/pci/if_ix.h log diff annotate
message Expose {T,R}X desc trail and add link_enabled field to prepare VF
support. diff from naito.yuichiro at gmail.com

ok jan jmatthew

date 2024-10-04T06:37:22Z
author jmatthew
files src/sys/dev/pci/if_mcx.c log diff annotate
message As with other multiqueue drivers, print the number of queues we set up
along with the interrupt and ethernet address details.

ok dlg@

date 2024-10-04T07:46:33Z
author kevlo
files src/sys/dev/pci/if_qwx_pci.c log diff annotate
message Remove two MHI LOOPBACK channels, there's no need to match them.

Also move PCI ops registration ahead. That way the ops will be registered
if any subsequent operations within the case processing require the ops to

See Linux commit fbb2a14afe00a5691b43cd19c946472e59e16fc6 and
515bcdf587f9911f2d5de51524cb7e048d295052

ok stsp@

date 2024-10-04T16:58:26Z
author bluhm
files src/sys/dev/ic/psp.c log diff annotate
message Increase psp(4) timeouts.

On EPYC 9124 psp(4) seems to need more to time to respond. Otherwise
it will not attach. Increase timeouts for both polling during
autoconf and interrupt during normal operation.

from hshoexer@ OK mlarkin@

date 2024-10-04T19:00:27Z
author miod
files src/sys/arch/arm/arm/genassym.cf log diff annotate
message Remove unused SIGEMT.

date 2024-10-04T21:15:52Z
author bluhm
files src/sys/arch/amd64/amd64/locore0.S log diff annotate
message Allow kernel boot on QEMU with AMD SEV.

When booting an OpenBSD kernel on Linux QEMU with SEV enabled, the
hypervisor does not forward the SME feature, only the SEV bit is
set. Therefore do not depend on SME when checking for SEV guest
mode in locore0.

from Sebastian Sturm; via hshoexer@; OK jsg@

date 2024-10-04T22:21:28Z
author bluhm
files src/sys/arch/amd64/stand/efiboot/exec_i386.c log diff annotate
message Allow boot loader to run as AMD SEV guest on QEMU with EFI.

When efibooting amd64, the boot loader rewrites the page table built
by EFI firmware to ensure that there are no read-only mappings.
The rewrite is needed for some HP EFI BIOS, that maps computrace
section read-only.
When efibooting on SEV enabled QEMU, we would have to ensure the
crypt bit is set when changing page tables. However, there is no
need for the HP workaround when booting on QEMU (or any other VM),
so just do not modify the page table, when SEV gest mode is detected.

from Sebastian Sturm; via hshoexer@; OK kettenis@