Commit Graph

20886 Commits

Author SHA1 Message Date
Richard Scheffenegger
a78fee8182 Adding PRR sysctls to tcp(4) man page
Summary:
Documenting the newly added, and enabled by default,
Proportional Rate Reduction algorithm's governing sysctls.

MFC: 3 days

Reviewed By: kbowling, rgrimes

Differential Revision: https://reviews.freebsd.org/D28568
2021-02-12 12:33:27 +01:00
Guangyuan Yang
c03ccb991d VOP_ADVLOCK(9): fix a typo
Submitted by:	Ka Ho Ng <khng300@gmail.com>
MFC after:	1 week
Differential Revision:	https://reviews.freebsd.org/D28575
2021-02-11 14:02:43 +00:00
Jessica Clarke
9c6954329a bsd.compiler.mk: Detect distribution-provided GCC when executed as cc
Clang always prints "clang $VERSION" regardless of the name used to
execute it, whereas GCC prints "$progname $VERSION", meaning if CC is
set to cc and cc is GCC it will print "cc $VERSION". We are able to
detect some of those cases since it then prints "($PKGVERSION)", where
the default is "GCC", but many distributions override that to print
their name and the package version number (e.g. "Debian 10.2.1-6"), so
nothing tells us it's GCC other than the fact that it's not Clang (and
that there's an FSF copyright disclaimer).

However, GCC's -v option will always print "gcc version $VERSION", so
fall back on using that to detect GCC. Whilst Clang also supports this
option, we should never get here, so Clang handling is not added.

Reviewed by:	brooks, emaste, arichardson
Differential Revision:	https://reviews.freebsd.org/D28315
2021-02-09 21:40:24 +00:00
Vladimir Kondratyev
d8c6d4c732 wsp: Add sysctl tunable for Z-Axis inversion
This adds a new sysctl to Wellspring Touchpad driver for controlling
Z-Axis (2-finger vertical scroll) direction "hw.usb.wsp.z_invert".

Submitted by:	James Wright <james.wright_AT_digital-chaos_DOT_com>
Reviewed by:	wulf
PR:		253321
Differential revision:	https://reviews.freebsd.org/D28521
2021-02-09 00:35:39 +03:00
Gordon Bergling
6c34d8ce11 ktls(4): Mention WITH_OPENSSL_KTLS in the ktls(4) manual page
Since we ship a ktls(4) enabled OpenSSL version, mention
the src.conf(5) option WITH_OPENSSL_KTLS in the manual page.

Reviewed by:	jhb
MFC after:	3 days
Differential Revision:	https://reviews.freebsd.org/D28435
2021-02-08 21:21:26 +01:00
Mark Johnston
68f6800ce0 opencrypto: Introduce crypto_dispatch_async()
Currently, OpenCrypto consumers can request asynchronous dispatch by
setting a flag in the cryptop.  (Currently only IPSec may do this.)   I
think this is a bit confusing: we (conditionally) set cryptop flags to
request async dispatch, and then crypto_dispatch() immediately examines
those flags to see if the consumer wants async dispatch. The flag names
are also confusing since they don't specify what "async" applies to:
dispatch or completion.

Add a new KPI, crypto_dispatch_async(), rather than encoding the
requested dispatch type in each cryptop. crypto_dispatch_async() falls
back to crypto_dispatch() if the session's driver provides asynchronous
dispatch. Get rid of CRYPTOP_ASYNC() and CRYPTOP_ASYNC_KEEPORDER().

Similarly, add crypto_dispatch_batch() to request processing of a tailq
of cryptops, rather than encoding the scheduling policy using cryptop
flags.  Convert GELI, the only user of this interface (disabled by
default) to use the new interface.

Add CRYPTO_SESS_SYNC(), which can be used by consumers to determine
whether crypto requests will be dispatched synchronously. This is just
a helper macro. Use it instead of looking at cap flags directly.

Fix style in crypto_done(). Also get rid of CRYPTO_RETW_EMPTY() and
just check the relevant queues directly. This could result in some
unnecessary wakeups but I think it's very uncommon to be using more than
one queue per worker in a given workload, so checking all three queues
is a waste of cycles.

Reviewed by:	jhb
Sponsored by:	Ampere Computing
Submitted by:	Klara, Inc.
MFC after:	2 weeks
Differential Revision:	https://reviews.freebsd.org/D28194
2021-02-08 09:19:19 -05:00
Nuno Eduardo Simões Leal Teixeira
7b51ac0275 Update Mentor and Mentee Information (eduardo) 2021-02-07 13:46:13 +00:00
Lutz Donnerhacke
c869d905ba netgraph/ng_bridge: Derive forwarding mode from first attached hook
Handling of unknown MACs on an bridge with incomplete learning
capabilites (aka uplink ports) can be defined in different ways.

The classical approach is to broadcast unicast frames send to an
unknown MAC, because the unknown devices can be everywhere. This mode
is default for ng_bridge(4).

In the case of dedicated uplink ports, which prohibit learning of MAC
addresses in order to save memory and CPU cycles, the broadcast
approach is dangerous. All traffic to the uplink port is broadcasted
to every downlink port, too. In this case, it's better to restrict the
distribution of frames to unknown MAC to the uplink ports only.

In order to keep the chance small and the handling as natural as
possible, the first attached link is used to determine the behaviour
of the bridge: If it is an "uplink" port, then the bridge switch from
classical mode to restricted mode.

Reviewed By:	kp
Approved by:	kp (mentor)
MFC after:	2 weeks
Differential Revision: https://reviews.freebsd.org/D28487
2021-02-06 15:01:15 +01:00
Lutz Donnerhacke
689561d403 ng_bridge.4: Use more suitable mandoc macros
yuripv@ suggested to replace inapprobriate macros by better ones.

Reviewed by:	philip
Approved by:	philip (mentor)
MFC after:	2 weeks
Differential Revision: https://reviews.freebsd.org/D28510
2021-02-06 11:36:11 +01:00
Lutz Donnerhacke
f961caf218 netgraph/ng_bridge: Introduce "uplink" ports without MAC learning
The ng_bridge(4) node is designed to work in moderately small
environments. Connecting such a node to a larger network rapidly fills
the MAC table for no reason. It even become complicated to obtain data
from the gettable message, because the result is too large to
transmit.

This patch introduces, two new functionality bits on the hooks:
  - Allow or disallow MAC address learning for incoming patckets.
  - Allow or disallow sending unknown MACs through this hook.

Uplinks are characterized by denied learing while sending out
unknowns. Normal links are charaterized by allowed learning and
sending out unknowns.

Reviewed by:	kp
Approved by:	kp (mentor)
MFC after:	2 weeks
Differential Revision: https://reviews.freebsd.org/D23963
2021-02-06 11:09:26 +01:00
Alfredo Dal'Ava Junior
20e1817f9a mrsas: update man page
update mrsas(4) since big-endian is supported since
e34a057ca6

Reviewed by:    bdragon, gbe
Sponsored by:   Eldorado Research Institute (eldorado.org.br)
MFC after:      1 week
Differential Revision:  https://reviews.freebsd.org/D28475
2021-02-05 19:47:45 -03:00
Gordon Bergling
c1b1354789 wg(4): Add authors of the wg(4) driver to the manual page
Glen (@gjb) noticed that I am haven't mentioned the authors of the
WireGuard device driver in the manual page.

This is commit addressed this commit.

Reviewed by:	gjb, brueffer
Differential Revision:	https://reviews.freebsd.org/D28464
X-MFC-with:	e59d9cb412
2021-02-03 16:01:32 +01:00
Gordon Bergling
064e52c2d8 wg(4): Fix Copyright statement in man page 2021-02-02 20:16:52 +01:00
Gordon Bergling
e59d9cb412 Add a wg(4) manual page
Reviewed by:	brueffer, donner, debdrup, ygy
MFC after:	2 days
2021-02-02 20:13:53 +01:00
Konstantin Belousov
d0ca28d7c9 src.conf.5: regenerate 2021-02-02 18:48:34 +02:00
Mitchell Horne
243125c81a src.conf(5): regenerate after MK_ZFS change
With e5cc1c4748, this option is also disabled by WITHOUT_OPENSSL and
WITHOUT_CRYPT.
2021-02-01 10:39:55 -04:00
Mitchell Horne
e5cc1c4748 src.opts.mk: set MK_ZFS conditional on MK_OPENSSL
libzfs has a dependency on libcrypto. This causes a buildworld link
failure when WITHOUT_OPENSSL/WITHOUT_CRYPT is set.

This dependency was added implicitly by the switch to OpenZFS, and
explicitly in 40d0fd2875 and cd568e2b1b.

PR:		252841
Reviewed by:	kevans, freqlabs
MFC after:	3 days
Differential Revision:	https://reviews.freebsd.org/D28431
2021-02-01 10:31:17 -04:00
Alex Richardson
5cf6f1c4bc Remove the MK_LIBCPLUSPLUS option
This option has been equivalent to any form of C++ support since libstdc++
was removed. Therefore, replace all MK_LIBCPLUSPLUS uses with MK_CXX.

Reviewed By:	emaste
Differential Revision: https://reviews.freebsd.org/D27974
2021-02-01 09:32:07 +00:00
Robert Wing
7436a63ba9 g_provider_by_name(9): argument can be a geom name or fullpath
The argument passed to g_provider_by_name(9) can be a geom name or a
fullpath.

- g_provider_by_name() gained this functionality in
  769afdc71e.

Reviewed by:    imp, kevans
Approved by:    kevans (mentor)
Differential Revision:  https://reviews.freebsd.org/D27566
2021-01-30 08:25:10 -09:00
Kyle Evans
7587d9823a build: options: mention ports in the WITH_OPENLDAP description
There's a third party dependency on this option; currently,
net/openldap24-{,sasl-}client.  At least mention that an openldap from ports
is needed for this option.

PR:		252866
Reported-by:	Build Option Survey via Michael Dexter
MFC-after:	3 days
2021-01-30 10:41:52 -06:00
Gleb Smirnoff
cf6ff85fe8 Catch up with 6edfd179c8: document M_EXTPG. While here sore flags
as they are in sys/mbuf.h
2021-01-29 11:46:24 -08:00
Vladimir Kondratyev
5c689e2136 hsctrl: Fix manpage typo
Use hsctrl_load to load the module at boot time.

Submitted by:	Shunchao Hu <ankohuu_outlook.com>
Reviewed by:	wulf
MFC after:	3 days
Differential revision:	https://reviews.freebsd.org/D28343
2021-01-29 00:40:01 +03:00
Allan Jude
b1f1917de4 Regenerate src.conf.5 after enabling MK_OPENSSL_KTLS for arm64 2021-01-28 21:35:43 +00:00
Allan Jude
e6b7809cdf Flip the default for OPENSSL_KTLS to arm64
This is required to make use of KERN_TLS

Reviewed by:	jhb
Sponsored by:	Ampere Computing
Submitted by:	Klara, Inc.
Differential Revision:	https://reviews.freebsd.org/D28405
2021-01-28 21:35:42 +00:00
John Baldwin
d2c9d0a418 Bump date after ae257282ae. 2021-01-28 12:55:22 -08:00
Ed Maste
4f9548640d arch.7: update 11.x to 11.4 as the last FreeBSD 11 release
armeb and pc98 were both discontinued after FreeBSD 11.  FreeBSD 11.4
is now known to be the final 11.x release, so update to the specific
version.
2021-01-28 15:03:25 -05:00
John Baldwin
ae257282ae Regenerate src.conf.5 for MK_OPENSSL_KTLS 2021-01-28 10:24:24 -08:00
John Baldwin
aa906e2a49 OpenSSL: Support for kernel TLS offload (KTLS)
This merges upstream patches from OpenSSL's master branch to add
KTLS infrastructure for TLS 1.0-1.3 including both RX and TX
offload and SSL_sendfile support on both Linux and FreeBSD.

Note that TLS 1.3 only supports TX offload.

A new WITH/WITHOUT_OPENSSL_KTLS determines if OpenSSL is built with
KTLS support.  It defaults to enabled on amd64 and disabled on all
other architectures.

Reviewed by:	jkim (earlier version)
Approved by:	secteam
Obtained from:	OpenSSL (patches from master)
MFC after:	1 week
Relnotes:	yes
Sponsored by:	Netflix
Differential Revision:	https://reviews.freebsd.org/D28273
2021-01-28 10:24:13 -08:00
Baptiste Daroussin
f59810e34b pci_vendors: update to 2021.01.11 2021-01-28 09:20:09 +01:00
Mark Johnston
e1b50e8184 qat.4: Minor tweaks
- Document a constraint on the AAD size for AES-GCM.
- Note that the list of supported platforms and add-on devices is not
  complete and indicate that QAT devices will show up in pciconf
  output. [1]

PR:		252984 [1]
MFC after:	3 days
Sponsored by:	Rubicon Communications, LLC ("Netgate")
2021-01-27 15:31:10 -05:00
Lutz Donnerhacke
d0d2e523ba netgraph/ng_car: Add color marking code
Chained policing should be able to reuse the classification of
traffic.  A new mbuf_tag type is defined to handle gereral QoS
marking.  A new subtype is defined to track the color marking.

Reviewed by:	manpages (bcr), melifaro, kp
Approved by:	kp (mentor)
Sponsored by:	IKS Service GmbH
MFC after:	1 month
Differential Revision: https://reviews.freebsd.org/D22110
2021-01-27 21:22:51 +01:00
Gordon Bergling
8a2f9dff2b VOP_BMAP(9): Remove obsolete comma 2021-01-27 18:20:04 +01:00
Gordon Bergling
8dba3dd846 cnv(9): Use a proper manual page section 2021-01-27 18:18:17 +01:00
Bjoern A. Zeeb
6f65b50546 firmware(9): extend firmware_get() by a "no warn" flag.
With the upcoming usage from LinuxKPI but also from drivers
ported natively we are seeing more probing of various
firmware (names).

Add the ability to firmware(9) to silence the
"firmware image loading/registering errors" by adding a new
firmware_get_flags() functions extending firmware_get() and
taking a flags argument as firmware_put() already does.

Requested-by:	zeising (for future LinuxKPI/DRM)
Sponsored-by:	The FreeBSD Foundation
Sponsored-by:	Rubicon Communications, LLC ("Netgate")
MFC after:	3 days
Reviewed-by:	markj
Differential Revision:	https://reviews.freebsd.org/D27413
2021-01-27 13:51:26 +00:00
Marius Strobl
7a731da592 rc.conf(5): regenerate after WITHOUT_NDIS removal
ndis(4) has been removed in bfc99943b0
and its build option in 84876bf702.
2021-01-26 23:02:39 +01:00
Marius Strobl
f39b49969a man: remove stale references to ndis(4)
The latter has been removed in bfc99943b0.
2021-01-26 22:46:59 +01:00
Konstantin Belousov
ee55e19a79 vm_map_protect.9: update after code changes
Reviewed by:	brooks, markj
Discussed with:	emaste
Sponsored by:	The FreeBSD Foundation
MFC after:	3 days
Differential Revision:	https://reviews.freebsd.org/D28311
2021-01-26 19:15:05 +02:00
Lutz Donnerhacke
cfd6422a52 netgraph/ng_vlan_rotate: IEEE 802.1ad VLAN manipulation netgraph type
This node is part of an A10-NSP (L2-BSA) development.

Carrier networks tend to stack three or more tags for internal
purposes and therefore hiding the service tags deep inside of the
stack. When decomposing such an access network frame, the processing
order is typically reversed: First distinguish by service, than by
other means.

This new netgragh node allows to bring the relevant VLAN in front (to
the out-most position). This way other netgraph nodes (like ng_vlan)
can operate on this specific type.

Reviewed by:	manpages (gbe), brueffer (manpages), kp
Approved by:	kp (mentor)
MFC after:	1 month
Relnotes:	yes
Sponsored by:	IKS Service GmbH
Differential Revision: https://reviews.freebsd.org/D22076
2021-01-26 16:53:24 +01:00
Brooks Davis
bfc99943b0 ndis(4): remove as previous announced
nids(4) was a clever idea in the early 2000's when the market was
flooded with 10/100 NICs with Windows-only drivers, but that hasn't been
the case for ages and the driver has had no meaningful maintenance in
ages. It only supports Windows-XP era drivers.

Also remove:
 - ndis support from wpa_supplicant
 - ndiscvt(8)

Reviewed By:	emaste, bcr (manpages)
Differential Revision:	https://reviews.freebsd.org/D27609
2021-01-25 21:45:03 +00:00
Neel Chauhan
5fe433a6e4 netgraph/ng_nat: Add RFC 6598/Carrier Grade NAT support
This extends upon the RFC 6598 support to libalias/ipfw in r357092.

Reviewed By:	manpages (bcr), donner, adrian, kp
Approved by:	kp (mentor)
MFC after:	1 month
Differential Revision: https://reviews.freebsd.org/D23461
2021-01-24 20:38:35 +01:00
Ed Maste
7680431a38 Regen src.conf.5 after LLD description updates 2021-01-24 12:25:04 -05:00
Gordon Bergling
1f73236b03 Add a manual page for axp(4) / AMD 10G Ethernet driver
Submitted by:	Rajesh Kumar <rajesh1 dot kumar at amd dot com>
Reviewed by:	bcr, brueffer, rpokala
MFC after:	2 weeks
Differential Revision:	https://reviews.freebsd.org/D27800
2021-01-24 14:57:16 +01:00
Vladimir Kondratyev
0d528e6354 hcons: Fix manpage typo
Submitted by:	Shunchao Hu <ankohuu_outlook.com>
Reviewed by:	wulf, gbe
MFC after:	1 week
Differential revision:	https://reviews.freebsd.org/D28294
2021-01-23 22:19:50 +03:00
Kyle Evans
251a6ddfbd Regen src.conf after MK_{LIBTHR,LIBPTHREAD} removal 2021-01-22 12:34:41 -06:00
Kyle Evans
123ae3045d build: remove LIBPTHREAD/LIBTHR build options
WITHOUT_LIBTHR has been broken for a little over five years now, since the
xz 5.2.0 update introduced a hard liblzma dependency on libthr, and building
a useful system without threading support is becoming increasingly more
difficult.

Additionally, in the five plus years that it's been broken more reverse
dependencies have cropped up in libzstd, libsqlite3, and libcrypto (among
others) that make it more and more difficult to reconcile the effort needed
to fix these options.

Remove the broken options.

PR:		252760
Reviewed by:	brooks, emaste, kib
Differential Revision:	https://reviews.freebsd.org/D28263
2021-01-22 12:33:27 -06:00
Lewis Cook
e808c8309c Complete Steps 5 and 9 from the Committer's guide
Summary:
Steps 5 and 9:
 - Update Mentor and Mentee Information
 - Update Ports with Personal Information

Reviewers: tcberner, fernape

Reviewed By: fernape

Subscribers: imp

Differential Revision: https://reviews.freebsd.org/D28281
2021-01-22 11:54:05 +00:00
Mateusz Guzik
bb3b6995c4 Revert "[mips] revert r366664 - flip mips back from -O2 to -O"
This reverts commit bd72252aac.

The commit at hand breaks the build for all mips targets and does not
have a one-liner fix.

make[5]: "/usr/src/share/mk/sys.mk" line 169: Malformed conditional (${MACHINE_CPUARCH} == "mips" && ${COMPILER_TYPE} == "gcc")
2021-01-22 10:17:34 +00:00
Glen Barber
a53ce3fc49 Bump CURRENT to 14.0
This one goes to 14.

Approved by:	re (implicit)
Sponsored by:	Rubicon Communications, LLC ("Netgate")
2021-01-21 19:10:07 -05:00
Jessica Clarke
32cb85d0f1 Build VirtIO modules on all architectures
Currently only amd64, i386 and powerpc build VirtIO modules, yet all other
architectures have at least one kernel configuration that includes the
transport drivers, and so they lack drivers for all the devices they don't
statically compile into the kernel. Instead, enable the build everywhere so all
architectures have the full set of device drivers available.

Reviewed by:	bryanv (earlier version), imp (earlier version)
Differential Revision:	https://reviews.freebsd.org/D28058
2021-01-21 01:21:35 +00:00
John Baldwin
4a6cd37b75 Restructure the crypto(7) manpage and add authentication algorithms.
Add separate sections for authentication algorithms, block ciphers,
stream ciphers, and AEAD algorithms.  Describe properties commmon to
algorithms in each section to avoid duplication.

Use flat tables to list algorithm properties rather than nested
tables.

List implemented authentication algorithms.

Reviewed by:	gbe (manpages)
Sponsored by:	Netflix
Differential Revision:	https://reviews.freebsd.org/D27833
2021-01-20 16:40:03 -08:00