PGO_NOWAIT & time to fault again

2021-10-01 Thread Martin Pieuchot
Diff below brings back the fix for the deadlock between uvn_io() and uvn_flush() (uvm/uvm_vnode.c r1.110) that doesn't introduces a lock ordering issue with the inode lock. This solution makes a thread return VM_PAGER_AGAIN and restart the fault if there's some contention on the underlying vnode.

Re: Unref/free amap w/o KERNEL_LOCK()

2021-10-01 Thread Theo de Raadt
> but please wait with putting in further diffs until Theo has started > building snaps That is very important: continual community testing of snapshot kernels is incredibly important, otherwise layers of related commits can happen, and it becomes harder to diagnose introduced problems.

Re: Unref/free amap w/o KERNEL_LOCK()

2021-10-01 Thread Mark Kettenis
> Date: Fri, 1 Oct 2021 20:07:20 +0200 > From: Martin Pieuchot > > amaps operation are already serialized by their own lock so it is > possible to free them w/o holding the KERNEL_LOCK(). This has been > tested by many as part of the UVM unlocking diff. > > ok? ok kettenis@ but please wait wi

Re: i386: pmap_collect()

2021-10-01 Thread Mark Kettenis
> Date: Fri, 1 Oct 2021 20:10:35 +0200 > From: Martin Pieuchot > > Diff below turns i386's pmap_collect() into a noop like it is on > amd64/arm64/powerpc64... This is part of the UVM unlocking diff and > might no longer be necessary now that pmap_extract() has been fixed. I think it is no longe

i386: pmap_collect()

2021-10-01 Thread Martin Pieuchot
Diff below turns i386's pmap_collect() into a noop like it is on amd64/arm64/powerpc64... This is part of the UVM unlocking diff and might no longer be necessary now that pmap_extract() has been fixed. So I'd like to know if we want to align i386's behavior with other archs, which should help us

Unref/free amap w/o KERNEL_LOCK()

2021-10-01 Thread Martin Pieuchot
amaps operation are already serialized by their own lock so it is possible to free them w/o holding the KERNEL_LOCK(). This has been tested by many as part of the UVM unlocking diff. ok? Index: uvm/uvm_map.c === RCS file: /cvs/src/s

Re: CVE-2021-26333 Low privileged malicious users may be able to access and leak data through the AMD Chipset Driver

2021-10-01 Thread Theo de Raadt
Dear Chicken Little - We would appreciate if you learn to actually read before yelling about the sky falling. The alert is not about spectre, meltdown, or foreshadow. The report is not about hurricanes, forest fires, salmonena in the spinach, or cancer-causing chemicals in the chicken-feed eithe

CVE-2021-26333 Low privileged malicious users may be able to access and leak data through the AMD Chipset Driver

2021-10-01 Thread Jerome KASPER
Hello tech@, After spectre, meltdown and foreshadow, sounds like speculative attacks are to come in a next future. Today i just came through that bulletin from AMD: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1009 Details of the Attack there : https://zeroperil.co.uk/wp-conten

ober_oid_cmp: copy over ax_oid_cmp logic

2021-10-01 Thread Martijn van Duren
Right now ober_oid_cmp has inverted logic compared to other *cmp functions. Specifically values greater than 0 are returned when a is smaller than b. Additionally, the value of 2 is only used b is a child of a, but -1 is returned when a is a child of b. This makes it harder than needed to use it w

Re: Relayd daily crash ca_dispatch_relay invalid

2021-10-01 Thread abyxcos
On Fri, Oct 1, 2021, at 09:44, Stuart Henderson wrote: > On 2021/10/01 14:43, Stuart Henderson wrote: >> On 2021/10/01 09:29, abyx...@mnetic.ch wrote: >> > I'm getting a daily crash (call to fatalx). No clue what triggers it and >> > the logging is really sparse. I couldn't follow what the code in

Re: Relayd daily crash ca_dispatch_relay invalid

2021-10-01 Thread Stuart Henderson
On 2021/10/01 14:43, Stuart Henderson wrote: > On 2021/10/01 09:29, abyx...@mnetic.ch wrote: > > I'm getting a daily crash (call to fatalx). No clue what triggers it and > > the logging is really sparse. I couldn't follow what the code in ca.c is > > actually doing (what the hash belongs to that

Re: Relayd daily crash ca_dispatch_relay invalid

2021-10-01 Thread Stuart Henderson
On 2021/10/01 09:29, abyx...@mnetic.ch wrote: > I'm getting a daily crash (call to fatalx). No clue what triggers it and the > logging is really sparse. I couldn't follow what the code in ca.c is actually > doing (what the hash belongs to that is triggering the crash). A snip from > /var/log/dae

Relayd daily crash ca_dispatch_relay invalid

2021-10-01 Thread abyxcos
I'm getting a daily crash (call to fatalx). No clue what triggers it and the logging is really sparse. I couldn't follow what the code in ca.c is actually doing (what the hash belongs to that is triggering the crash). A snip from /var/log/daemon is reproduced below. There are no other log messag