Searched hist:1.222 (Results 1 - 25 of 218) sorted by relevance
| /src/sys/ufs/lfs/ | ||
| H A D | ulfs_quota1.c | 1.10 Mon Jun 20 00:00:47 GMT 2016 dholland More already-merged or equivalent changes: ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8 ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7 ufs_lookup.c 1.126 does not apply to lfs ufs_lookup.c 1.127 we already have ufs_lookup.c 1.128 does not apply to lfs ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19 ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7 ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8 ufs_quota2.c 1.36 we have equivalent changes for ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5 ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6 ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19 ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20 ufs_vnops.c 1.221 was superseded by later changes ufs_vnops.c 1.222 got fixed independently in lfs |
| H A D | ulfs_dirhash.c | 1.16 Mon Jun 20 00:00:47 GMT 2016 dholland More already-merged or equivalent changes: ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8 ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7 ufs_lookup.c 1.126 does not apply to lfs ufs_lookup.c 1.127 we already have ufs_lookup.c 1.128 does not apply to lfs ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19 ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7 ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8 ufs_quota2.c 1.36 we have equivalent changes for ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5 ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6 ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19 ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20 ufs_vnops.c 1.221 was superseded by later changes ufs_vnops.c 1.222 got fixed independently in lfs |
| H A D | ulfs_extattr.c | 1.9 Mon Jun 20 00:00:47 GMT 2016 dholland More already-merged or equivalent changes: ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8 ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7 ufs_lookup.c 1.126 does not apply to lfs ufs_lookup.c 1.127 we already have ufs_lookup.c 1.128 does not apply to lfs ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19 ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7 ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8 ufs_quota2.c 1.36 we have equivalent changes for ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5 ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6 ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19 ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20 ufs_vnops.c 1.221 was superseded by later changes ufs_vnops.c 1.222 got fixed independently in lfs |
| H A D | lfs_rename.c | 1.18 Mon Jun 20 00:00:47 GMT 2016 dholland More already-merged or equivalent changes: ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8 ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7 ufs_lookup.c 1.126 does not apply to lfs ufs_lookup.c 1.127 we already have ufs_lookup.c 1.128 does not apply to lfs ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19 ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7 ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8 ufs_quota2.c 1.36 we have equivalent changes for ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5 ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6 ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19 ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20 ufs_vnops.c 1.221 was superseded by later changes ufs_vnops.c 1.222 got fixed independently in lfs |
| H A D | ulfs_lookup.c | 1.38 Mon Jun 20 00:00:47 GMT 2016 dholland More already-merged or equivalent changes: ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8 ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7 ufs_lookup.c 1.126 does not apply to lfs ufs_lookup.c 1.127 we already have ufs_lookup.c 1.128 does not apply to lfs ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19 ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7 ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8 ufs_quota2.c 1.36 we have equivalent changes for ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5 ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6 ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19 ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20 ufs_vnops.c 1.221 was superseded by later changes ufs_vnops.c 1.222 got fixed independently in lfs |
| H A D | ulfs_quota2.c | 1.23 Mon Jun 20 00:00:47 GMT 2016 dholland More already-merged or equivalent changes: ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8 ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7 ufs_lookup.c 1.126 does not apply to lfs ufs_lookup.c 1.127 we already have ufs_lookup.c 1.128 does not apply to lfs ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19 ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7 ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8 ufs_quota2.c 1.36 we have equivalent changes for ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5 ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6 ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19 ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20 ufs_vnops.c 1.221 was superseded by later changes ufs_vnops.c 1.222 got fixed independently in lfs |
| H A D | ulfs_vnops.c | 1.40 Mon Jun 20 00:00:47 GMT 2016 dholland More already-merged or equivalent changes: ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8 ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7 ufs_lookup.c 1.126 does not apply to lfs ufs_lookup.c 1.127 we already have ufs_lookup.c 1.128 does not apply to lfs ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19 ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7 ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8 ufs_quota2.c 1.36 we have equivalent changes for ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5 ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6 ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19 ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20 ufs_vnops.c 1.221 was superseded by later changes ufs_vnops.c 1.222 got fixed independently in lfs |
| /src/sys/arch/sparc/sparc/ | ||
| H A D | autoconf.c | 1.222 Sun Mar 04 06:00:45 GMT 2007 christos branches: 1.222.2; 1.222.4; 1.222.10; Kill caddr_t; there will be some MI fallout, but it will be fixed shortly. 1.222 Sun Mar 04 06:00:45 GMT 2007 christos branches: 1.222.2; 1.222.4; 1.222.10; Kill caddr_t; there will be some MI fallout, but it will be fixed shortly. 1.222 Sun Mar 04 06:00:45 GMT 2007 christos branches: 1.222.2; 1.222.4; 1.222.10; Kill caddr_t; there will be some MI fallout, but it will be fixed shortly. 1.222 Sun Mar 04 06:00:45 GMT 2007 christos branches: 1.222.2; 1.222.4; 1.222.10; Kill caddr_t; there will be some MI fallout, but it will be fixed shortly. |
| H A D | locore.s | 1.222 Wed Oct 26 01:30:20 GMT 2005 uwe branches: 1.222.2; sigcode is needed only for COMPAT_16. 1.222 Wed Oct 26 01:30:20 GMT 2005 uwe branches: 1.222.2; sigcode is needed only for COMPAT_16. |
| /src/sys/arch/pmax/pmax/ | ||
| H A D | machdep.c | 1.222 Thu Jan 03 23:02:25 GMT 2008 joerg branches: 1.222.6; 1.222.10; 1.222.12; 1.222.14; Timecounter and generic todr support for pmax. From Garret D'Amore. 1.222 Thu Jan 03 23:02:25 GMT 2008 joerg branches: 1.222.6; 1.222.10; 1.222.12; 1.222.14; Timecounter and generic todr support for pmax. From Garret D'Amore. 1.222 Thu Jan 03 23:02:25 GMT 2008 joerg branches: 1.222.6; 1.222.10; 1.222.12; 1.222.14; Timecounter and generic todr support for pmax. From Garret D'Amore. 1.222 Thu Jan 03 23:02:25 GMT 2008 joerg branches: 1.222.6; 1.222.10; 1.222.12; 1.222.14; Timecounter and generic todr support for pmax. From Garret D'Amore. 1.222 Thu Jan 03 23:02:25 GMT 2008 joerg branches: 1.222.6; 1.222.10; 1.222.12; 1.222.14; Timecounter and generic todr support for pmax. From Garret D'Amore. |
| /src/sys/dev/pcmcia/ | ||
| H A D | pcmciadevs | 1.222 Mon Aug 20 00:29:43 GMT 2007 kiyohara branches: 1.222.2; Add support for AnyCom BlueCard. 1.222 Mon Aug 20 00:29:43 GMT 2007 kiyohara branches: 1.222.2; Add support for AnyCom BlueCard. |
| H A D | pcmciadevs.h | 1.222 Sat Sep 23 15:40:16 GMT 2006 jmcneill Regen for PR# 15666. |
| H A D | pcmciadevs_data.h | 1.222 Sat Sep 23 15:40:16 GMT 2006 jmcneill Regen for PR# 15666. |
| /src/sys/dev/ | ||
| H A D | DEVNAMES | 1.222 Sat Oct 07 14:17:12 GMT 2006 peter branches: 1.222.2; 1.222.4; Add hpcarm devices. 1.222 Sat Oct 07 14:17:12 GMT 2006 peter branches: 1.222.2; 1.222.4; Add hpcarm devices. 1.222 Sat Oct 07 14:17:12 GMT 2006 peter branches: 1.222.2; 1.222.4; Add hpcarm devices. |
| /src/sys/dev/ic/ | ||
| H A D | wi.c | 1.222 Fri Oct 19 00:00:05 GMT 2007 ad branches: 1.222.4; 1.222.6; machine/{bus,cpu,intr}.h -> sys/{bus,cpu,intr}.h 1.222 Fri Oct 19 00:00:05 GMT 2007 ad branches: 1.222.4; 1.222.6; machine/{bus,cpu,intr}.h -> sys/{bus,cpu,intr}.h 1.222 Fri Oct 19 00:00:05 GMT 2007 ad branches: 1.222.4; 1.222.6; machine/{bus,cpu,intr}.h -> sys/{bus,cpu,intr}.h |
| /src/sys/nfs/ | ||
| H A D | nfs_subs.c | 1.222 Sat Nov 19 22:51:30 GMT 2011 tls branches: 1.222.8; 1.222.12; First step of random number subsystem rework described in <20111022023242.BA26F14A158@mail.netbsd.org>. This change includes the following: An initial cleanup and minor reorganization of the entropy pool code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are fixed. Some effort is made to accumulate entropy more quickly at boot time. A generic interface, "rndsink", is added, for stream generators to request that they be re-keyed with good quality entropy from the pool as soon as it is available. The arc4random()/arc4randbytes() implementation in libkern is adjusted to use the rndsink interface for rekeying, which helps address the problem of low-quality keys at boot time. An implementation of the FIPS 140-2 statistical tests for random number generator quality is provided (libkern/rngtest.c). This is based on Greg Rose's implementation from Qualcomm. A new random stream generator, nist_ctr_drbg, is provided. It is based on an implementation of the NIST SP800-90 CTR_DRBG by Henric Jungheim. This generator users AES in a modified counter mode to generate a backtracking-resistant random stream. An abstraction layer, "cprng", is provided for in-kernel consumers of randomness. The arc4random/arc4randbytes API is deprecated for in-kernel use. It is replaced by "cprng_strong". The current cprng_fast implementation wraps the existing arc4random implementation. The current cprng_strong implementation wraps the new CTR_DRBG implementation. Both interfaces are rekeyed from the entropy pool automatically at intervals justifiable from best current cryptographic practice. In some quick tests, cprng_fast() is about the same speed as the old arc4randbytes(), and cprng_strong() is about 20% faster than rnd_extract_data(). Performance is expected to improve. The AES code in src/crypto/rijndael is no longer an optional kernel component, as it is required by cprng_strong, which is not an optional kernel component. The entropy pool output is subjected to the rngtest tests at startup time; if it fails, the system will reboot. There is approximately a 3/10000 chance of a false positive from these tests. Entropy pool _input_ from hardware random numbers is subjected to the rngtest tests at attach time, as well as the FIPS continuous-output test, to detect bad or stuck hardware RNGs; if any are detected, they are detached, but the system continues to run. A problem with rndctl(8) is fixed -- datastructures with pointers in arrays are no longer passed to userspace (this was not a security problem, but rather a major issue for compat32). A new kernel will require a new rndctl. The sysctl kern.arandom() and kern.urandom() nodes are hooked up to the new generators, but the /dev/*random pseudodevices are not, yet. Manual pages for the new kernel interfaces are forthcoming. 1.222 Sat Nov 19 22:51:30 GMT 2011 tls branches: 1.222.8; 1.222.12; First step of random number subsystem rework described in <20111022023242.BA26F14A158@mail.netbsd.org>. This change includes the following: An initial cleanup and minor reorganization of the entropy pool code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are fixed. Some effort is made to accumulate entropy more quickly at boot time. A generic interface, "rndsink", is added, for stream generators to request that they be re-keyed with good quality entropy from the pool as soon as it is available. The arc4random()/arc4randbytes() implementation in libkern is adjusted to use the rndsink interface for rekeying, which helps address the problem of low-quality keys at boot time. An implementation of the FIPS 140-2 statistical tests for random number generator quality is provided (libkern/rngtest.c). This is based on Greg Rose's implementation from Qualcomm. A new random stream generator, nist_ctr_drbg, is provided. It is based on an implementation of the NIST SP800-90 CTR_DRBG by Henric Jungheim. This generator users AES in a modified counter mode to generate a backtracking-resistant random stream. An abstraction layer, "cprng", is provided for in-kernel consumers of randomness. The arc4random/arc4randbytes API is deprecated for in-kernel use. It is replaced by "cprng_strong". The current cprng_fast implementation wraps the existing arc4random implementation. The current cprng_strong implementation wraps the new CTR_DRBG implementation. Both interfaces are rekeyed from the entropy pool automatically at intervals justifiable from best current cryptographic practice. In some quick tests, cprng_fast() is about the same speed as the old arc4randbytes(), and cprng_strong() is about 20% faster than rnd_extract_data(). Performance is expected to improve. The AES code in src/crypto/rijndael is no longer an optional kernel component, as it is required by cprng_strong, which is not an optional kernel component. The entropy pool output is subjected to the rngtest tests at startup time; if it fails, the system will reboot. There is approximately a 3/10000 chance of a false positive from these tests. Entropy pool _input_ from hardware random numbers is subjected to the rngtest tests at attach time, as well as the FIPS continuous-output test, to detect bad or stuck hardware RNGs; if any are detected, they are detached, but the system continues to run. A problem with rndctl(8) is fixed -- datastructures with pointers in arrays are no longer passed to userspace (this was not a security problem, but rather a major issue for compat32). A new kernel will require a new rndctl. The sysctl kern.arandom() and kern.urandom() nodes are hooked up to the new generators, but the /dev/*random pseudodevices are not, yet. Manual pages for the new kernel interfaces are forthcoming. 1.222 Sat Nov 19 22:51:30 GMT 2011 tls branches: 1.222.8; 1.222.12; First step of random number subsystem rework described in <20111022023242.BA26F14A158@mail.netbsd.org>. This change includes the following: An initial cleanup and minor reorganization of the entropy pool code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are fixed. Some effort is made to accumulate entropy more quickly at boot time. A generic interface, "rndsink", is added, for stream generators to request that they be re-keyed with good quality entropy from the pool as soon as it is available. The arc4random()/arc4randbytes() implementation in libkern is adjusted to use the rndsink interface for rekeying, which helps address the problem of low-quality keys at boot time. An implementation of the FIPS 140-2 statistical tests for random number generator quality is provided (libkern/rngtest.c). This is based on Greg Rose's implementation from Qualcomm. A new random stream generator, nist_ctr_drbg, is provided. It is based on an implementation of the NIST SP800-90 CTR_DRBG by Henric Jungheim. This generator users AES in a modified counter mode to generate a backtracking-resistant random stream. An abstraction layer, "cprng", is provided for in-kernel consumers of randomness. The arc4random/arc4randbytes API is deprecated for in-kernel use. It is replaced by "cprng_strong". The current cprng_fast implementation wraps the existing arc4random implementation. The current cprng_strong implementation wraps the new CTR_DRBG implementation. Both interfaces are rekeyed from the entropy pool automatically at intervals justifiable from best current cryptographic practice. In some quick tests, cprng_fast() is about the same speed as the old arc4randbytes(), and cprng_strong() is about 20% faster than rnd_extract_data(). Performance is expected to improve. The AES code in src/crypto/rijndael is no longer an optional kernel component, as it is required by cprng_strong, which is not an optional kernel component. The entropy pool output is subjected to the rngtest tests at startup time; if it fails, the system will reboot. There is approximately a 3/10000 chance of a false positive from these tests. Entropy pool _input_ from hardware random numbers is subjected to the rngtest tests at attach time, as well as the FIPS continuous-output test, to detect bad or stuck hardware RNGs; if any are detected, they are detached, but the system continues to run. A problem with rndctl(8) is fixed -- datastructures with pointers in arrays are no longer passed to userspace (this was not a security problem, but rather a major issue for compat32). A new kernel will require a new rndctl. The sysctl kern.arandom() and kern.urandom() nodes are hooked up to the new generators, but the /dev/*random pseudodevices are not, yet. Manual pages for the new kernel interfaces are forthcoming. |
| /src/sys/arch/hp300/hp300/ | ||
| H A D | machdep.c | 1.222 Mon May 16 13:22:52 GMT 2011 tsutsui branches: 1.222.2; - merge and move pasted m68k MD setreg() functions into m68k/m68k_machdep.c - move m68881_save() and m68881_restore() declarations into <m68k/m68k.h> Briefly tested and no obvious breakage on atari, sun3, and x68k. 1.222 Mon May 16 13:22:52 GMT 2011 tsutsui branches: 1.222.2; - merge and move pasted m68k MD setreg() functions into m68k/m68k_machdep.c - move m68881_save() and m68881_restore() declarations into <m68k/m68k.h> Briefly tested and no obvious breakage on atari, sun3, and x68k. |
| /src/sys/arch/hpcmips/conf/ | ||
| H A D | GENERIC | 1.222 Wed Jun 05 23:08:01 GMT 2013 christos branches: 1.222.2; remove obsolete networking options 1.222 Wed Jun 05 23:08:01 GMT 2013 christos branches: 1.222.2; remove obsolete networking options |
| /src/sys/dev/pci/ | ||
| H A D | pci_subr.c | 1.222 Sat Mar 21 17:09:29 GMT 2020 thorpej branches: 1.222.2; When parsing Enhanced Allocation entries, use the correct calulation for finding the next entry. 1.222 Sat Mar 21 17:09:29 GMT 2020 thorpej branches: 1.222.2; When parsing Enhanced Allocation entries, use the correct calulation for finding the next entry. |
| /src/tools/ | ||
| H A D | Makefile | 1.222 Sat Jun 08 13:03:41 GMT 2024 tsutsui branches: 1.222.2; Build src/distrib/cdrom/macppc_installboot in src/tools as a tool. Also use the tools version ${TOOLS_MACPPC_INSTALLBOOT} to create bootable ISO9660/HFS hybrid installcd image for macppc. 1.222 Sat Jun 08 13:03:41 GMT 2024 tsutsui branches: 1.222.2; Build src/distrib/cdrom/macppc_installboot in src/tools as a tool. Also use the tools version ${TOOLS_MACPPC_INSTALLBOOT} to create bootable ISO9660/HFS hybrid installcd image for macppc. |
| /src/sys/uvm/ | ||
| H A D | uvm_extern.h | 1.222 Sun Mar 22 18:32:42 GMT 2020 ad branches: 1.222.2; Process concurrent page faults on individual uvm_objects / vm_amaps in parallel, where the relevant pages are already in-core. Proposed on tech-kern. Temporarily disabled on MP architectures with __HAVE_UNLOCKED_PMAP until adjustments are made to their pmaps. 1.222 Sun Mar 22 18:32:42 GMT 2020 ad branches: 1.222.2; Process concurrent page faults on individual uvm_objects / vm_amaps in parallel, where the relevant pages are already in-core. Proposed on tech-kern. Temporarily disabled on MP architectures with __HAVE_UNLOCKED_PMAP until adjustments are made to their pmaps. |
| /src/sys/kern/ | ||
| H A D | syscalls.master | 1.222 Mon Jan 26 00:20:05 GMT 2009 pooka branches: 1.222.2; Tag a few more socket syscalls with RUMP: recvmsg, sendmsg, recvfrom, getpeername, getsockname, sendto, shutdown, socketpair 1.222 Mon Jan 26 00:20:05 GMT 2009 pooka branches: 1.222.2; Tag a few more socket syscalls with RUMP: recvmsg, sendmsg, recvfrom, getpeername, getsockname, sendto, shutdown, socketpair |
| H A D | vfs_bio.c | 1.222 Tue Nov 17 14:38:31 GMT 2009 pooka branches: 1.222.2; Add a comment saying "name" to pool_init() is never freed (fixing requires touching pool implementation). No biggie, though, since the pools themselves are never freed. 1.222 Tue Nov 17 14:38:31 GMT 2009 pooka branches: 1.222.2; Add a comment saying "name" to pool_init() is never freed (fixing requires touching pool implementation). No biggie, though, since the pools themselves are never freed. |
| /src/sys/modules/ | ||
| H A D | Makefile | 1.222 Thu Jun 20 03:31:29 GMT 2019 pgoyette branches: 1.222.2; Split the ufs code out of the ffs module and into its own module. Adapt chfs and ext2fs modules accordingly. 1.222 Thu Jun 20 03:31:29 GMT 2019 pgoyette branches: 1.222.2; Split the ufs code out of the ffs module and into its own module. Adapt chfs and ext2fs modules accordingly. |
| /src/sys/arch/macppc/conf/ | ||
| H A D | GENERIC | 1.222 Thu Feb 02 21:32:09 GMT 2006 reinoud branches: 1.222.2; Add commented out UDF file-system entry in all GENERIC configurations. 1.222 Thu Feb 02 21:32:09 GMT 2006 reinoud branches: 1.222.2; Add commented out UDF file-system entry in all GENERIC configurations. |
Completed in 181 milliseconds