Searched hist:1.205 (Results 1 - 25 of 241) sorted by relevance
| /src/sys/arch/sparc/conf/ | ||
| H A D | GENERIC | 1.205 Sun Aug 10 15:31:22 GMT 2008 tls branches: 1.205.2; 1.205.4; 1.205.8; Add accept filters to GENERIC kernels where they exist. 1.205 Sun Aug 10 15:31:22 GMT 2008 tls branches: 1.205.2; 1.205.4; 1.205.8; Add accept filters to GENERIC kernels where they exist. 1.205 Sun Aug 10 15:31:22 GMT 2008 tls branches: 1.205.2; 1.205.4; 1.205.8; Add accept filters to GENERIC kernels where they exist. 1.205 Sun Aug 10 15:31:22 GMT 2008 tls branches: 1.205.2; 1.205.4; 1.205.8; Add accept filters to GENERIC kernels where they exist. |
| /src/sys/arch/sparc/sparc/ | ||
| H A D | cpu.c | 1.205 Wed Aug 01 00:06:32 GMT 2007 macallan branches: 1.205.2; 1.205.4; 1.205.6; fix the fix - do not impose all those extra cache ops on all supersparcs, only those without external cache 1.205 Wed Aug 01 00:06:32 GMT 2007 macallan branches: 1.205.2; 1.205.4; 1.205.6; fix the fix - do not impose all those extra cache ops on all supersparcs, only those without external cache 1.205 Wed Aug 01 00:06:32 GMT 2007 macallan branches: 1.205.2; 1.205.4; 1.205.6; fix the fix - do not impose all those extra cache ops on all supersparcs, only those without external cache 1.205 Wed Aug 01 00:06:32 GMT 2007 macallan branches: 1.205.2; 1.205.4; 1.205.6; fix the fix - do not impose all those extra cache ops on all supersparcs, only those without external cache |
| /src/distrib/sets/lists/misc/ | ||
| H A D | mi | 1.205 Sun May 21 15:28:38 GMT 2017 riastradh branches: 1.205.2; Remove MKCRYPTO option. Originally, MKCRYPTO was introduced because the United States classified cryptography as a munition and restricted its export. The export controls were substantially relaxed fifteen years ago, and are essentially irrelevant for software with published source code. In the intervening time, nobody bothered to remove the option after its motivation -- the US export restriction -- was eliminated. I'm not aware of any other operating system that has a similar option; I expect it is mainly out of apathy for churn that we still have it. Today, cryptography is an essential part of modern computing -- you can't use the internet responsibly without cryptography. The position of the TNF board of directors is that TNF makes no representation that MKCRYPTO=no satisfies any country's cryptography regulations. My personal position is that the availability of cryptography is a basic human right; that any local laws restricting it to a privileged few are fundamentally immoral; and that it is wrong for developers to spend effort crippling cryptography to work around such laws. As proposed on tech-crypto, tech-security, and tech-userlevel to no objections: https://mail-index.netbsd.org/tech-crypto/2017/05/06/msg000719.html https://mail-index.netbsd.org/tech-security/2017/05/06/msg000928.html https://mail-index.netbsd.org/tech-userlevel/2017/05/06/msg010547.html P.S. Reviewing all the uses of MKCRYPTO in src revealed a lot of *bad* crypto that was conditional on it, e.g. DES in telnet... That should probably be removed too, but on the grounds that it is bad, not on the grounds that it is (nominally) crypto. 1.205 Sun May 21 15:28:38 GMT 2017 riastradh branches: 1.205.2; Remove MKCRYPTO option. Originally, MKCRYPTO was introduced because the United States classified cryptography as a munition and restricted its export. The export controls were substantially relaxed fifteen years ago, and are essentially irrelevant for software with published source code. In the intervening time, nobody bothered to remove the option after its motivation -- the US export restriction -- was eliminated. I'm not aware of any other operating system that has a similar option; I expect it is mainly out of apathy for churn that we still have it. Today, cryptography is an essential part of modern computing -- you can't use the internet responsibly without cryptography. The position of the TNF board of directors is that TNF makes no representation that MKCRYPTO=no satisfies any country's cryptography regulations. My personal position is that the availability of cryptography is a basic human right; that any local laws restricting it to a privileged few are fundamentally immoral; and that it is wrong for developers to spend effort crippling cryptography to work around such laws. As proposed on tech-crypto, tech-security, and tech-userlevel to no objections: https://mail-index.netbsd.org/tech-crypto/2017/05/06/msg000719.html https://mail-index.netbsd.org/tech-security/2017/05/06/msg000928.html https://mail-index.netbsd.org/tech-userlevel/2017/05/06/msg010547.html P.S. Reviewing all the uses of MKCRYPTO in src revealed a lot of *bad* crypto that was conditional on it, e.g. DES in telnet... That should probably be removed too, but on the grounds that it is bad, not on the grounds that it is (nominally) crypto. |
| /src/etc/mtree/ | ||
| H A D | NetBSD.dist.tests | 1.205 Sun Apr 28 14:39:22 GMT 2024 rillig branches: 1.205.2; tests/cd9660: replace compressed blob with readable hexdump This test is skipped in most circumstances because it creates a file whose apparent size is 4.5 GB. It's an ISO 9660 image though, containing mostly null bytes. Nevertheless, tmpfs doesn't allow such a big file to be created, so this test is skipped in settings where /tmp is on a tmpfs. If the test is run, the ISO image is uncompressed, which takes several minutes. Replace bzip2 with direct file creation from a hex dump of that disk image, which is easier to inspect manually and also faster by about 3 magnitudes. 1.205 Sun Apr 28 14:39:22 GMT 2024 rillig branches: 1.205.2; tests/cd9660: replace compressed blob with readable hexdump This test is skipped in most circumstances because it creates a file whose apparent size is 4.5 GB. It's an ISO 9660 image though, containing mostly null bytes. Nevertheless, tmpfs doesn't allow such a big file to be created, so this test is skipped in settings where /tmp is on a tmpfs. If the test is run, the ISO image is uncompressed, which takes several minutes. Replace bzip2 with direct file creation from a hex dump of that disk image, which is easier to inspect manually and also faster by about 3 magnitudes. |
| /src/sys/kern/ | ||
| H A D | vfs_lookup.c | 1.205 Fri Apr 22 05:34:58 GMT 2016 riastradh branches: 1.205.2; 1.205.4; #if DIAGNOSTIC panic ---> KASSERTMSG 1.205 Fri Apr 22 05:34:58 GMT 2016 riastradh branches: 1.205.2; 1.205.4; #if DIAGNOSTIC panic ---> KASSERTMSG 1.205 Fri Apr 22 05:34:58 GMT 2016 riastradh branches: 1.205.2; 1.205.4; #if DIAGNOSTIC panic ---> KASSERTMSG |
| H A D | kern_fork.c | 1.205 Tue May 01 16:37:23 GMT 2018 kamil branches: 1.205.2; Implement PTRACE_VFORK Add support for tracing vfork(2) events in the context of ptrace(2). This API covers other frontends to fork1(9) like posix_spawn(2) or clone(2), if they cause parent to wait for exec(2) or exit(2) of the child. Changes: - Add new argument to sigswitch() determining whether we need to acquire the proc_lock or whether it's already held. - Refactor fork1(9) for fork(2) and vfork(2)-like events. Call sigswitch() from fork(1) for forking or vforking parent, instead of emitting kpsignal(9). We need to emit the signal and suspend the parent, returning to user and relock proc_lock. - Add missing prototype for proc_stop_done() in kern_sig.c. - Make sigswitch a public function accessible from other kernel code including <sys/signalvar.h>. - Remove an entry about unimplemented PTRACE_VFORK in the ptrace(2) man page. - Permin PTRACE_VFORK in the ptrace(2) frontend for userland. - Remove expected failure for unimplemented PTRACE_VFORK tests in the ATF ptrace(2) test-suite. - Relax signal routing constraints under a debugger for a vfork(2)ed child. This intended to protect from signaling a parent of a vfork(2)ed child that called PT_TRACE_ME, but wrongly misrouted other signals in vfork(2) use-cases. Add XXX comments about still existing problems and future enhancements: - correct vfork(2) + PT_TRACE_ME handling. - fork1(2) handling of scenarios when a process is collected in valid but rare cases. All ATF ptrace(2) fork[1-8] and vfork[1-8] tests pass. Fix PR kern/51630 by Kamil Rytarowski (myself). Sponsored by <The NetBSD Foundation> 1.205 Tue May 01 16:37:23 GMT 2018 kamil branches: 1.205.2; Implement PTRACE_VFORK Add support for tracing vfork(2) events in the context of ptrace(2). This API covers other frontends to fork1(9) like posix_spawn(2) or clone(2), if they cause parent to wait for exec(2) or exit(2) of the child. Changes: - Add new argument to sigswitch() determining whether we need to acquire the proc_lock or whether it's already held. - Refactor fork1(9) for fork(2) and vfork(2)-like events. Call sigswitch() from fork(1) for forking or vforking parent, instead of emitting kpsignal(9). We need to emit the signal and suspend the parent, returning to user and relock proc_lock. - Add missing prototype for proc_stop_done() in kern_sig.c. - Make sigswitch a public function accessible from other kernel code including <sys/signalvar.h>. - Remove an entry about unimplemented PTRACE_VFORK in the ptrace(2) man page. - Permin PTRACE_VFORK in the ptrace(2) frontend for userland. - Remove expected failure for unimplemented PTRACE_VFORK tests in the ATF ptrace(2) test-suite. - Relax signal routing constraints under a debugger for a vfork(2)ed child. This intended to protect from signaling a parent of a vfork(2)ed child that called PT_TRACE_ME, but wrongly misrouted other signals in vfork(2) use-cases. Add XXX comments about still existing problems and future enhancements: - correct vfork(2) + PT_TRACE_ME handling. - fork1(2) handling of scenarios when a process is collected in valid but rare cases. All ATF ptrace(2) fork[1-8] and vfork[1-8] tests pass. Fix PR kern/51630 by Kamil Rytarowski (myself). Sponsored by <The NetBSD Foundation> |
| /src/sys/arch/mips/mips/ | ||
| H A D | mips_machdep.c | 1.205 Fri Oct 17 00:46:07 GMT 2008 uebayasi branches: 1.205.2; 1.205.4; Oops; redo previous. 1.205 Fri Oct 17 00:46:07 GMT 2008 uebayasi branches: 1.205.2; 1.205.4; Oops; redo previous. 1.205 Fri Oct 17 00:46:07 GMT 2008 uebayasi branches: 1.205.2; 1.205.4; Oops; redo previous. |
| /src/sys/arch/amiga/amiga/ | ||
| H A D | machdep.c | 1.205 Sat Jul 14 21:48:17 GMT 2007 ad branches: 1.205.8; 1.205.10; Generic soft interrupts are mandatory. 1.205 Sat Jul 14 21:48:17 GMT 2007 ad branches: 1.205.8; 1.205.10; Generic soft interrupts are mandatory. 1.205 Sat Jul 14 21:48:17 GMT 2007 ad branches: 1.205.8; 1.205.10; Generic soft interrupts are mandatory. |
| /src/sys/arch/vax/conf/ | ||
| H A D | GENERIC | 1.205 Wed Apr 25 11:12:55 GMT 2018 ragge branches: 1.205.2; Enable CPU_IN_CKSUM. 1.205 Wed Apr 25 11:12:55 GMT 2018 ragge branches: 1.205.2; Enable CPU_IN_CKSUM. |
| /src/sys/compat/netbsd32/ | ||
| H A D | netbsd32_netbsd.c | 1.205 Wed Oct 19 09:44:01 GMT 2016 skrll branches: 1.205.6; PR kern/51514: ptrace(2) fails for 32-bit process on 64-bit kernel Updated from the original patch in the PR by me. 1.205 Wed Oct 19 09:44:01 GMT 2016 skrll branches: 1.205.6; PR kern/51514: ptrace(2) fails for 32-bit process on 64-bit kernel Updated from the original patch in the PR by me. |
| /src/sys/arch/hp300/hp300/ | ||
| H A D | machdep.c | 1.205 Wed Jan 21 16:24:34 GMT 2009 he branches: 1.205.2; Re-adapt to the changed return types for major() and minor(). 1.205 Wed Jan 21 16:24:34 GMT 2009 he branches: 1.205.2; Re-adapt to the changed return types for major() and minor(). |
| /src/sys/dev/ic/ | ||
| H A D | tulip.c | 1.208 Mon Aug 01 10:30:28 GMT 2022 kre Revert this to 1.205, undoing changes apparently mistakenly committed in 1.206, and the total disaster that the attempt to revert those in 1.207 created. 1.205 Sat Jun 25 02:46:15 GMT 2022 tsutsui Pass proper status values to rnd_add_uint32(9) as rnd(9) man page claims. |
| /src/sys/dev/pcmcia/ | ||
| H A D | pcmciadevs.h | 1.205 Sat Aug 07 17:18:20 GMT 2004 mycroft Regen. |
| H A D | pcmciadevs_data.h | 1.205 Sat Aug 07 17:18:20 GMT 2004 mycroft Regen. |
| /src/sys/dev/pci/ | ||
| H A D | if_bgereg.h | 1.50 Thu Apr 16 01:38:34 GMT 2009 msaitoh Take some code from FreeBSD and OpenBSD: Fix some bugs that the driver unable to detect link loss (OpenBSD 1.135, FreeBSD 1.102) bge_tick(): fix some extra input error (OpenBSD 1.221 FreeBSD 1.212) Acknowledge link change interrupts by setting the 'link changed' bit in the status register (used to have no effect). FreeBSD 1.44 (OpenBSD 1.21) Add some fiber support (OpenBSD 1.220) Set BGE_MISCCFG_KEEP_GPHY_POWER as {Open,Free}BSD and linux. Add special case code to fix a problem with the BCM5704 in TBI mode (FreeBSD rev. 1.71, OpenBSD rev. 1.35) Force an interrupt in bge_ifmedia_upd (FreeBSD rev. 1.205, OpenBSD rev. 1.242) Add missing workaround for 5705 (FreeBSD rev. 1.44, OpenBSD rev. 1.21) Add some known CHIPID entries. |
| /src/sys/ufs/ufs/ | ||
| H A D | ufs_vnops.c | 1.205 Tue Sep 27 02:10:32 GMT 2011 christos branches: 1.205.2; include the proper headers to make {LFS,EXT2FS}_MAXNAMLEN visible 1.205 Tue Sep 27 02:10:32 GMT 2011 christos branches: 1.205.2; include the proper headers to make {LFS,EXT2FS}_MAXNAMLEN visible |
| /src/sys/fs/puffs/ | ||
| H A D | puffs_vnops.c | 1.205 Thu Jul 21 18:21:27 GMT 2016 christos branches: 1.205.2; replace variable stack declaration with a large enough one and KASSERT. 1.205 Thu Jul 21 18:21:27 GMT 2016 christos branches: 1.205.2; replace variable stack declaration with a large enough one and KASSERT. |
| /src/sys/modules/ | ||
| H A D | Makefile | 1.205 Wed Jun 06 16:46:02 GMT 2018 jakllsch branches: 1.205.2; add virtio_pci to list of not-yet-enabled modules 1.205 Wed Jun 06 16:46:02 GMT 2018 jakllsch branches: 1.205.2; add virtio_pci to list of not-yet-enabled modules |
| /src/sys/compat/linux/common/ | ||
| H A D | linux_misc.c | 1.205 Mon Jan 19 13:31:40 GMT 2009 njoly branches: 1.205.2; Small personality(2) update. - Allow querying current personality. - Use symbolic names instead of magic values. 1.205 Mon Jan 19 13:31:40 GMT 2009 njoly branches: 1.205.2; Small personality(2) update. - Allow querying current personality. - Use symbolic names instead of magic values. |
| /src/etc/ | ||
| H A D | MAKEDEV.tmpl | 1.205 Mon Jul 29 17:53:20 GMT 2019 gdt branches: 1.205.2; MAKEDEV.tmpl: Create nodes for 16 USB hubs As proposed on current-users, but with better formatting. 1.205 Mon Jul 29 17:53:20 GMT 2019 gdt branches: 1.205.2; MAKEDEV.tmpl: Create nodes for 16 USB hubs As proposed on current-users, but with better formatting. |
| /src/sys/dev/scsipi/ | ||
| H A D | st.c | 1.205 Sun Jun 08 18:18:34 GMT 2008 tsutsui branches: 1.205.4; Use device_lookup_private() rather than using cd_devs[] directly to get softc. XXX maybe we should change a type of cd_devs[] in struct cfdriver from (void *) to device_t. 1.205 Sun Jun 08 18:18:34 GMT 2008 tsutsui branches: 1.205.4; Use device_lookup_private() rather than using cd_devs[] directly to get softc. XXX maybe we should change a type of cd_devs[] in struct cfdriver from (void *) to device_t. |
| /src/sys/dev/usb/ | ||
| H A D | ohci.c | 1.205 Fri Jan 08 20:39:04 GMT 2010 dyoung branches: 1.205.2; Expand PMF_FN_* macros. 1.205 Fri Jan 08 20:39:04 GMT 2010 dyoung branches: 1.205.2; Expand PMF_FN_* macros. |
| H A D | uhci.c | 1.205 Thu Nov 16 01:33:26 GMT 2006 christos branches: 1.205.2; __unused removal on arguments; approved by core. 1.205 Thu Nov 16 01:33:26 GMT 2006 christos branches: 1.205.2; __unused removal on arguments; approved by core. |
| /src/usr.bin/ftp/ | ||
| H A D | fetch.c | 1.205 Thu Nov 07 02:06:51 GMT 2013 christos branches: 1.205.4; more volatile for m68k 1.205 Thu Nov 07 02:06:51 GMT 2013 christos branches: 1.205.4; more volatile for m68k |
| /src/sys/sys/ | ||
| H A D | lwp.h | 1.205 Sat Apr 04 20:20:12 GMT 2020 thorpej branches: 1.205.2; Add support for lazily generating a "global thread ID" for a LWP. This identifier uniquely identifies an LWP across the entire system, and will be used in future improvements in user-space synchronization primitives. (Test disabled and libc stub not included intentionally so as to avoid multiple libc version bumps.) 1.205 Sat Apr 04 20:20:12 GMT 2020 thorpej branches: 1.205.2; Add support for lazily generating a "global thread ID" for a LWP. This identifier uniquely identifies an LWP across the entire system, and will be used in future improvements in user-space synchronization primitives. (Test disabled and libc stub not included intentionally so as to avoid multiple libc version bumps.) |
Completed in 236 milliseconds