Searched hist:1.222 (Results 1 - 25 of 218) sorted by relevance

123456789

/src/sys/ufs/lfs/
H A Dulfs_quota1.c1.10 Mon Jun 20 00:00:47 GMT 2016 dholland More already-merged or equivalent changes:

ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8
ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7
ufs_lookup.c 1.126 does not apply to lfs
ufs_lookup.c 1.127 we already have
ufs_lookup.c 1.128 does not apply to lfs
ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19
ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7
ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8
ufs_quota2.c 1.36 we have equivalent changes for
ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5
ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6
ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19
ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20
ufs_vnops.c 1.221 was superseded by later changes
ufs_vnops.c 1.222 got fixed independently in lfs

H A Dulfs_dirhash.c1.16 Mon Jun 20 00:00:47 GMT 2016 dholland More already-merged or equivalent changes:

ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8
ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7
ufs_lookup.c 1.126 does not apply to lfs
ufs_lookup.c 1.127 we already have
ufs_lookup.c 1.128 does not apply to lfs
ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19
ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7
ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8
ufs_quota2.c 1.36 we have equivalent changes for
ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5
ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6
ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19
ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20
ufs_vnops.c 1.221 was superseded by later changes
ufs_vnops.c 1.222 got fixed independently in lfs

H A Dulfs_extattr.c1.9 Mon Jun 20 00:00:47 GMT 2016 dholland More already-merged or equivalent changes:

ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8
ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7
ufs_lookup.c 1.126 does not apply to lfs
ufs_lookup.c 1.127 we already have
ufs_lookup.c 1.128 does not apply to lfs
ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19
ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7
ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8
ufs_quota2.c 1.36 we have equivalent changes for
ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5
ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6
ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19
ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20
ufs_vnops.c 1.221 was superseded by later changes
ufs_vnops.c 1.222 got fixed independently in lfs

H A Dlfs_rename.c1.18 Mon Jun 20 00:00:47 GMT 2016 dholland More already-merged or equivalent changes:

ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8
ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7
ufs_lookup.c 1.126 does not apply to lfs
ufs_lookup.c 1.127 we already have
ufs_lookup.c 1.128 does not apply to lfs
ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19
ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7
ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8
ufs_quota2.c 1.36 we have equivalent changes for
ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5
ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6
ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19
ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20
ufs_vnops.c 1.221 was superseded by later changes
ufs_vnops.c 1.222 got fixed independently in lfs

H A Dulfs_lookup.c1.38 Mon Jun 20 00:00:47 GMT 2016 dholland More already-merged or equivalent changes:

ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8
ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7
ufs_lookup.c 1.126 does not apply to lfs
ufs_lookup.c 1.127 we already have
ufs_lookup.c 1.128 does not apply to lfs
ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19
ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7
ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8
ufs_quota2.c 1.36 we have equivalent changes for
ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5
ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6
ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19
ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20
ufs_vnops.c 1.221 was superseded by later changes
ufs_vnops.c 1.222 got fixed independently in lfs

H A Dulfs_quota2.c1.23 Mon Jun 20 00:00:47 GMT 2016 dholland More already-merged or equivalent changes:

ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8
ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7
ufs_lookup.c 1.126 does not apply to lfs
ufs_lookup.c 1.127 we already have
ufs_lookup.c 1.128 does not apply to lfs
ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19
ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7
ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8
ufs_quota2.c 1.36 we have equivalent changes for
ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5
ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6
ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19
ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20
ufs_vnops.c 1.221 was superseded by later changes
ufs_vnops.c 1.222 got fixed independently in lfs

H A Dulfs_vnops.c1.40 Mon Jun 20 00:00:47 GMT 2016 dholland More already-merged or equivalent changes:

ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8
ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7
ufs_lookup.c 1.126 does not apply to lfs
ufs_lookup.c 1.127 we already have
ufs_lookup.c 1.128 does not apply to lfs
ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19
ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7
ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8
ufs_quota2.c 1.36 we have equivalent changes for
ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5
ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6
ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19
ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20
ufs_vnops.c 1.221 was superseded by later changes
ufs_vnops.c 1.222 got fixed independently in lfs

/src/sys/arch/sparc/sparc/
H A Dautoconf.c1.222 Sun Mar 04 06:00:45 GMT 2007 christos branches: 1.222.2; 1.222.4; 1.222.10;
Kill caddr_t; there will be some MI fallout, but it will be fixed shortly.

1.222 Sun Mar 04 06:00:45 GMT 2007 christos branches: 1.222.2; 1.222.4; 1.222.10;
Kill caddr_t; there will be some MI fallout, but it will be fixed shortly.

1.222 Sun Mar 04 06:00:45 GMT 2007 christos branches: 1.222.2; 1.222.4; 1.222.10;
Kill caddr_t; there will be some MI fallout, but it will be fixed shortly.

1.222 Sun Mar 04 06:00:45 GMT 2007 christos branches: 1.222.2; 1.222.4; 1.222.10;
Kill caddr_t; there will be some MI fallout, but it will be fixed shortly.

H A Dlocore.s1.222 Wed Oct 26 01:30:20 GMT 2005 uwe branches: 1.222.2;
sigcode is needed only for COMPAT_16.

1.222 Wed Oct 26 01:30:20 GMT 2005 uwe branches: 1.222.2;
sigcode is needed only for COMPAT_16.

/src/sys/arch/pmax/pmax/
H A Dmachdep.c1.222 Thu Jan 03 23:02:25 GMT 2008 joerg branches: 1.222.6; 1.222.10; 1.222.12; 1.222.14;
Timecounter and generic todr support for pmax. From Garret D'Amore.

1.222 Thu Jan 03 23:02:25 GMT 2008 joerg branches: 1.222.6; 1.222.10; 1.222.12; 1.222.14;
Timecounter and generic todr support for pmax. From Garret D'Amore.

1.222 Thu Jan 03 23:02:25 GMT 2008 joerg branches: 1.222.6; 1.222.10; 1.222.12; 1.222.14;
Timecounter and generic todr support for pmax. From Garret D'Amore.

1.222 Thu Jan 03 23:02:25 GMT 2008 joerg branches: 1.222.6; 1.222.10; 1.222.12; 1.222.14;
Timecounter and generic todr support for pmax. From Garret D'Amore.

1.222 Thu Jan 03 23:02:25 GMT 2008 joerg branches: 1.222.6; 1.222.10; 1.222.12; 1.222.14;
Timecounter and generic todr support for pmax. From Garret D'Amore.

/src/sys/dev/pcmcia/
H A Dpcmciadevs1.222 Mon Aug 20 00:29:43 GMT 2007 kiyohara branches: 1.222.2;
Add support for AnyCom BlueCard.

1.222 Mon Aug 20 00:29:43 GMT 2007 kiyohara branches: 1.222.2;
Add support for AnyCom BlueCard.

H A Dpcmciadevs.h1.222 Sat Sep 23 15:40:16 GMT 2006 jmcneill Regen for PR# 15666.

H A Dpcmciadevs_data.h1.222 Sat Sep 23 15:40:16 GMT 2006 jmcneill Regen for PR# 15666.

/src/sys/dev/
H A DDEVNAMES1.222 Sat Oct 07 14:17:12 GMT 2006 peter branches: 1.222.2; 1.222.4;
Add hpcarm devices.

1.222 Sat Oct 07 14:17:12 GMT 2006 peter branches: 1.222.2; 1.222.4;
Add hpcarm devices.

1.222 Sat Oct 07 14:17:12 GMT 2006 peter branches: 1.222.2; 1.222.4;
Add hpcarm devices.

/src/sys/dev/ic/
H A Dwi.c1.222 Fri Oct 19 00:00:05 GMT 2007 ad branches: 1.222.4; 1.222.6;
machine/{bus,cpu,intr}.h -> sys/{bus,cpu,intr}.h

1.222 Fri Oct 19 00:00:05 GMT 2007 ad branches: 1.222.4; 1.222.6;
machine/{bus,cpu,intr}.h -> sys/{bus,cpu,intr}.h

1.222 Fri Oct 19 00:00:05 GMT 2007 ad branches: 1.222.4; 1.222.6;
machine/{bus,cpu,intr}.h -> sys/{bus,cpu,intr}.h

/src/sys/nfs/
H A Dnfs_subs.c1.222 Sat Nov 19 22:51:30 GMT 2011 tls branches: 1.222.8; 1.222.12;
First step of random number subsystem rework described in
<20111022023242.BA26F14A158@mail.netbsd.org>. This change includes
the following:

An initial cleanup and minor reorganization of the entropy pool
code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are
fixed. Some effort is made to accumulate entropy more quickly at
boot time.

A generic interface, "rndsink", is added, for stream generators to
request that they be re-keyed with good quality entropy from the pool
as soon as it is available.

The arc4random()/arc4randbytes() implementation in libkern is
adjusted to use the rndsink interface for rekeying, which helps
address the problem of low-quality keys at boot time.

An implementation of the FIPS 140-2 statistical tests for random
number generator quality is provided (libkern/rngtest.c). This
is based on Greg Rose's implementation from Qualcomm.

A new random stream generator, nist_ctr_drbg, is provided. It is
based on an implementation of the NIST SP800-90 CTR_DRBG by
Henric Jungheim. This generator users AES in a modified counter
mode to generate a backtracking-resistant random stream.

An abstraction layer, "cprng", is provided for in-kernel consumers
of randomness. The arc4random/arc4randbytes API is deprecated for
in-kernel use. It is replaced by "cprng_strong". The current
cprng_fast implementation wraps the existing arc4random
implementation. The current cprng_strong implementation wraps the
new CTR_DRBG implementation. Both interfaces are rekeyed from
the entropy pool automatically at intervals justifiable from best
current cryptographic practice.

In some quick tests, cprng_fast() is about the same speed as
the old arc4randbytes(), and cprng_strong() is about 20% faster
than rnd_extract_data(). Performance is expected to improve.

The AES code in src/crypto/rijndael is no longer an optional
kernel component, as it is required by cprng_strong, which is
not an optional kernel component.

The entropy pool output is subjected to the rngtest tests at
startup time; if it fails, the system will reboot. There is
approximately a 3/10000 chance of a false positive from these
tests. Entropy pool _input_ from hardware random numbers is
subjected to the rngtest tests at attach time, as well as the
FIPS continuous-output test, to detect bad or stuck hardware
RNGs; if any are detected, they are detached, but the system
continues to run.

A problem with rndctl(8) is fixed -- datastructures with
pointers in arrays are no longer passed to userspace (this
was not a security problem, but rather a major issue for
compat32). A new kernel will require a new rndctl.

The sysctl kern.arandom() and kern.urandom() nodes are hooked
up to the new generators, but the /dev/*random pseudodevices
are not, yet.

Manual pages for the new kernel interfaces are forthcoming.

1.222 Sat Nov 19 22:51:30 GMT 2011 tls branches: 1.222.8; 1.222.12;
First step of random number subsystem rework described in
<20111022023242.BA26F14A158@mail.netbsd.org>. This change includes
the following:

An initial cleanup and minor reorganization of the entropy pool
code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are
fixed. Some effort is made to accumulate entropy more quickly at
boot time.

A generic interface, "rndsink", is added, for stream generators to
request that they be re-keyed with good quality entropy from the pool
as soon as it is available.

The arc4random()/arc4randbytes() implementation in libkern is
adjusted to use the rndsink interface for rekeying, which helps
address the problem of low-quality keys at boot time.

An implementation of the FIPS 140-2 statistical tests for random
number generator quality is provided (libkern/rngtest.c). This
is based on Greg Rose's implementation from Qualcomm.

A new random stream generator, nist_ctr_drbg, is provided. It is
based on an implementation of the NIST SP800-90 CTR_DRBG by
Henric Jungheim. This generator users AES in a modified counter
mode to generate a backtracking-resistant random stream.

An abstraction layer, "cprng", is provided for in-kernel consumers
of randomness. The arc4random/arc4randbytes API is deprecated for
in-kernel use. It is replaced by "cprng_strong". The current
cprng_fast implementation wraps the existing arc4random
implementation. The current cprng_strong implementation wraps the
new CTR_DRBG implementation. Both interfaces are rekeyed from
the entropy pool automatically at intervals justifiable from best
current cryptographic practice.

In some quick tests, cprng_fast() is about the same speed as
the old arc4randbytes(), and cprng_strong() is about 20% faster
than rnd_extract_data(). Performance is expected to improve.

The AES code in src/crypto/rijndael is no longer an optional
kernel component, as it is required by cprng_strong, which is
not an optional kernel component.

The entropy pool output is subjected to the rngtest tests at
startup time; if it fails, the system will reboot. There is
approximately a 3/10000 chance of a false positive from these
tests. Entropy pool _input_ from hardware random numbers is
subjected to the rngtest tests at attach time, as well as the
FIPS continuous-output test, to detect bad or stuck hardware
RNGs; if any are detected, they are detached, but the system
continues to run.

A problem with rndctl(8) is fixed -- datastructures with
pointers in arrays are no longer passed to userspace (this
was not a security problem, but rather a major issue for
compat32). A new kernel will require a new rndctl.

The sysctl kern.arandom() and kern.urandom() nodes are hooked
up to the new generators, but the /dev/*random pseudodevices
are not, yet.

Manual pages for the new kernel interfaces are forthcoming.

1.222 Sat Nov 19 22:51:30 GMT 2011 tls branches: 1.222.8; 1.222.12;
First step of random number subsystem rework described in
<20111022023242.BA26F14A158@mail.netbsd.org>. This change includes
the following:

An initial cleanup and minor reorganization of the entropy pool
code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are
fixed. Some effort is made to accumulate entropy more quickly at
boot time.

A generic interface, "rndsink", is added, for stream generators to
request that they be re-keyed with good quality entropy from the pool
as soon as it is available.

The arc4random()/arc4randbytes() implementation in libkern is
adjusted to use the rndsink interface for rekeying, which helps
address the problem of low-quality keys at boot time.

An implementation of the FIPS 140-2 statistical tests for random
number generator quality is provided (libkern/rngtest.c). This
is based on Greg Rose's implementation from Qualcomm.

A new random stream generator, nist_ctr_drbg, is provided. It is
based on an implementation of the NIST SP800-90 CTR_DRBG by
Henric Jungheim. This generator users AES in a modified counter
mode to generate a backtracking-resistant random stream.

An abstraction layer, "cprng", is provided for in-kernel consumers
of randomness. The arc4random/arc4randbytes API is deprecated for
in-kernel use. It is replaced by "cprng_strong". The current
cprng_fast implementation wraps the existing arc4random
implementation. The current cprng_strong implementation wraps the
new CTR_DRBG implementation. Both interfaces are rekeyed from
the entropy pool automatically at intervals justifiable from best
current cryptographic practice.

In some quick tests, cprng_fast() is about the same speed as
the old arc4randbytes(), and cprng_strong() is about 20% faster
than rnd_extract_data(). Performance is expected to improve.

The AES code in src/crypto/rijndael is no longer an optional
kernel component, as it is required by cprng_strong, which is
not an optional kernel component.

The entropy pool output is subjected to the rngtest tests at
startup time; if it fails, the system will reboot. There is
approximately a 3/10000 chance of a false positive from these
tests. Entropy pool _input_ from hardware random numbers is
subjected to the rngtest tests at attach time, as well as the
FIPS continuous-output test, to detect bad or stuck hardware
RNGs; if any are detected, they are detached, but the system
continues to run.

A problem with rndctl(8) is fixed -- datastructures with
pointers in arrays are no longer passed to userspace (this
was not a security problem, but rather a major issue for
compat32). A new kernel will require a new rndctl.

The sysctl kern.arandom() and kern.urandom() nodes are hooked
up to the new generators, but the /dev/*random pseudodevices
are not, yet.

Manual pages for the new kernel interfaces are forthcoming.

/src/sys/arch/hp300/hp300/
H A Dmachdep.c1.222 Mon May 16 13:22:52 GMT 2011 tsutsui branches: 1.222.2;
- merge and move pasted m68k MD setreg() functions into m68k/m68k_machdep.c
- move m68881_save() and m68881_restore() declarations into <m68k/m68k.h>

Briefly tested and no obvious breakage on atari, sun3, and x68k.

1.222 Mon May 16 13:22:52 GMT 2011 tsutsui branches: 1.222.2;
- merge and move pasted m68k MD setreg() functions into m68k/m68k_machdep.c
- move m68881_save() and m68881_restore() declarations into <m68k/m68k.h>

Briefly tested and no obvious breakage on atari, sun3, and x68k.

/src/sys/arch/hpcmips/conf/
H A DGENERIC1.222 Wed Jun 05 23:08:01 GMT 2013 christos branches: 1.222.2;
remove obsolete networking options

1.222 Wed Jun 05 23:08:01 GMT 2013 christos branches: 1.222.2;
remove obsolete networking options

/src/sys/dev/pci/
H A Dpci_subr.c1.222 Sat Mar 21 17:09:29 GMT 2020 thorpej branches: 1.222.2;
When parsing Enhanced Allocation entries, use the correct calulation for
finding the next entry.

1.222 Sat Mar 21 17:09:29 GMT 2020 thorpej branches: 1.222.2;
When parsing Enhanced Allocation entries, use the correct calulation for
finding the next entry.

/src/tools/
H A DMakefile1.222 Sat Jun 08 13:03:41 GMT 2024 tsutsui branches: 1.222.2;
Build src/distrib/cdrom/macppc_installboot in src/tools as a tool.

Also use the tools version ${TOOLS_MACPPC_INSTALLBOOT} to create
bootable ISO9660/HFS hybrid installcd image for macppc.

1.222 Sat Jun 08 13:03:41 GMT 2024 tsutsui branches: 1.222.2;
Build src/distrib/cdrom/macppc_installboot in src/tools as a tool.

Also use the tools version ${TOOLS_MACPPC_INSTALLBOOT} to create
bootable ISO9660/HFS hybrid installcd image for macppc.

/src/sys/uvm/
H A Duvm_extern.h1.222 Sun Mar 22 18:32:42 GMT 2020 ad branches: 1.222.2;
Process concurrent page faults on individual uvm_objects / vm_amaps in
parallel, where the relevant pages are already in-core. Proposed on
tech-kern.

Temporarily disabled on MP architectures with __HAVE_UNLOCKED_PMAP until
adjustments are made to their pmaps.
1.222 Sun Mar 22 18:32:42 GMT 2020 ad branches: 1.222.2;
Process concurrent page faults on individual uvm_objects / vm_amaps in
parallel, where the relevant pages are already in-core. Proposed on
tech-kern.

Temporarily disabled on MP architectures with __HAVE_UNLOCKED_PMAP until
adjustments are made to their pmaps.
/src/sys/kern/
H A Dsyscalls.master1.222 Mon Jan 26 00:20:05 GMT 2009 pooka branches: 1.222.2;
Tag a few more socket syscalls with RUMP:
recvmsg, sendmsg, recvfrom, getpeername, getsockname, sendto,
shutdown, socketpair

1.222 Mon Jan 26 00:20:05 GMT 2009 pooka branches: 1.222.2;
Tag a few more socket syscalls with RUMP:
recvmsg, sendmsg, recvfrom, getpeername, getsockname, sendto,
shutdown, socketpair

H A Dvfs_bio.c1.222 Tue Nov 17 14:38:31 GMT 2009 pooka branches: 1.222.2;
Add a comment saying "name" to pool_init() is never freed (fixing
requires touching pool implementation). No biggie, though, since
the pools themselves are never freed.

1.222 Tue Nov 17 14:38:31 GMT 2009 pooka branches: 1.222.2;
Add a comment saying "name" to pool_init() is never freed (fixing
requires touching pool implementation). No biggie, though, since
the pools themselves are never freed.

/src/sys/modules/
H A DMakefile1.222 Thu Jun 20 03:31:29 GMT 2019 pgoyette branches: 1.222.2;
Split the ufs code out of the ffs module and into its own module.

Adapt chfs and ext2fs modules accordingly.

1.222 Thu Jun 20 03:31:29 GMT 2019 pgoyette branches: 1.222.2;
Split the ufs code out of the ffs module and into its own module.

Adapt chfs and ext2fs modules accordingly.

/src/sys/arch/macppc/conf/
H A DGENERIC1.222 Thu Feb 02 21:32:09 GMT 2006 reinoud branches: 1.222.2;
Add commented out UDF file-system entry in all GENERIC configurations.

1.222 Thu Feb 02 21:32:09 GMT 2006 reinoud branches: 1.222.2;
Add commented out UDF file-system entry in all GENERIC configurations.

Completed in 181 milliseconds

123456789