Searched hist:1.233 (Results 1 - 25 of 198) sorted by relevance
| /src/sys/netinet/ | ||
| H A D | in.c | 1.248 Tue Aug 20 08:22:35 GMT 2024 ozaki-r inet: send GARP on link up if DAD is disabled This behavior was accidentally removed at rev 1.233. |
| H A D | udp_usrreq.c | 1.233 Thu Apr 20 08:46:07 GMT 2017 ozaki-r branches: 1.233.4; Remove unnecessary NULL checks for inp_socket and in6p_socket They cannot be NULL except for programming errors. 1.233 Thu Apr 20 08:46:07 GMT 2017 ozaki-r branches: 1.233.4; Remove unnecessary NULL checks for inp_socket and in6p_socket They cannot be NULL except for programming errors. |
| /src/sys/dev/pcmcia/ | ||
| H A D | pcmciadevs.h | 1.233 Wed Jun 01 23:33:24 GMT 2016 pgoyette branches: 1.233.16; Regen 1.233 Wed Jun 01 23:33:24 GMT 2016 pgoyette branches: 1.233.16; Regen |
| H A D | pcmciadevs_data.h | 1.233 Wed Jun 01 23:33:24 GMT 2016 pgoyette branches: 1.233.16; Regen 1.233 Wed Jun 01 23:33:24 GMT 2016 pgoyette branches: 1.233.16; Regen |
| H A D | pcmciadevs | 1.233 Fri Mar 16 00:56:28 GMT 2018 sevan typo |
| /src/sys/arch/i386/conf/ | ||
| H A D | CARDBUS | 1.16 Sat Jul 08 02:47:02 GMT 2000 jhawk Pullup rev 1.233 - rev 1.358 of GENERIC to CARDBUS, and merge conflicts. Add GENERIC rev in "from:" line to aid future merging. Major highlights include COMPAT_14, COMPAT_AOUT, NTFS, OVERLAY, SOFTDEP, INET6, IPSEC, pcic iosiz changes, cz, dpt, rtk (cardbus!), awi, cnw, ray, wi, xi, joy, and gif. |
| /src/sys/kern/ | ||
| H A D | kern_sysctl.c | 1.233 Sat Nov 19 22:51:25 GMT 2011 tls branches: 1.233.2; 1.233.4; First step of random number subsystem rework described in <20111022023242.BA26F14A158@mail.netbsd.org>. This change includes the following: An initial cleanup and minor reorganization of the entropy pool code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are fixed. Some effort is made to accumulate entropy more quickly at boot time. A generic interface, "rndsink", is added, for stream generators to request that they be re-keyed with good quality entropy from the pool as soon as it is available. The arc4random()/arc4randbytes() implementation in libkern is adjusted to use the rndsink interface for rekeying, which helps address the problem of low-quality keys at boot time. An implementation of the FIPS 140-2 statistical tests for random number generator quality is provided (libkern/rngtest.c). This is based on Greg Rose's implementation from Qualcomm. A new random stream generator, nist_ctr_drbg, is provided. It is based on an implementation of the NIST SP800-90 CTR_DRBG by Henric Jungheim. This generator users AES in a modified counter mode to generate a backtracking-resistant random stream. An abstraction layer, "cprng", is provided for in-kernel consumers of randomness. The arc4random/arc4randbytes API is deprecated for in-kernel use. It is replaced by "cprng_strong". The current cprng_fast implementation wraps the existing arc4random implementation. The current cprng_strong implementation wraps the new CTR_DRBG implementation. Both interfaces are rekeyed from the entropy pool automatically at intervals justifiable from best current cryptographic practice. In some quick tests, cprng_fast() is about the same speed as the old arc4randbytes(), and cprng_strong() is about 20% faster than rnd_extract_data(). Performance is expected to improve. The AES code in src/crypto/rijndael is no longer an optional kernel component, as it is required by cprng_strong, which is not an optional kernel component. The entropy pool output is subjected to the rngtest tests at startup time; if it fails, the system will reboot. There is approximately a 3/10000 chance of a false positive from these tests. Entropy pool _input_ from hardware random numbers is subjected to the rngtest tests at attach time, as well as the FIPS continuous-output test, to detect bad or stuck hardware RNGs; if any are detected, they are detached, but the system continues to run. A problem with rndctl(8) is fixed -- datastructures with pointers in arrays are no longer passed to userspace (this was not a security problem, but rather a major issue for compat32). A new kernel will require a new rndctl. The sysctl kern.arandom() and kern.urandom() nodes are hooked up to the new generators, but the /dev/*random pseudodevices are not, yet. Manual pages for the new kernel interfaces are forthcoming. 1.233 Sat Nov 19 22:51:25 GMT 2011 tls branches: 1.233.2; 1.233.4; First step of random number subsystem rework described in <20111022023242.BA26F14A158@mail.netbsd.org>. This change includes the following: An initial cleanup and minor reorganization of the entropy pool code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are fixed. Some effort is made to accumulate entropy more quickly at boot time. A generic interface, "rndsink", is added, for stream generators to request that they be re-keyed with good quality entropy from the pool as soon as it is available. The arc4random()/arc4randbytes() implementation in libkern is adjusted to use the rndsink interface for rekeying, which helps address the problem of low-quality keys at boot time. An implementation of the FIPS 140-2 statistical tests for random number generator quality is provided (libkern/rngtest.c). This is based on Greg Rose's implementation from Qualcomm. A new random stream generator, nist_ctr_drbg, is provided. It is based on an implementation of the NIST SP800-90 CTR_DRBG by Henric Jungheim. This generator users AES in a modified counter mode to generate a backtracking-resistant random stream. An abstraction layer, "cprng", is provided for in-kernel consumers of randomness. The arc4random/arc4randbytes API is deprecated for in-kernel use. It is replaced by "cprng_strong". The current cprng_fast implementation wraps the existing arc4random implementation. The current cprng_strong implementation wraps the new CTR_DRBG implementation. Both interfaces are rekeyed from the entropy pool automatically at intervals justifiable from best current cryptographic practice. In some quick tests, cprng_fast() is about the same speed as the old arc4randbytes(), and cprng_strong() is about 20% faster than rnd_extract_data(). Performance is expected to improve. The AES code in src/crypto/rijndael is no longer an optional kernel component, as it is required by cprng_strong, which is not an optional kernel component. The entropy pool output is subjected to the rngtest tests at startup time; if it fails, the system will reboot. There is approximately a 3/10000 chance of a false positive from these tests. Entropy pool _input_ from hardware random numbers is subjected to the rngtest tests at attach time, as well as the FIPS continuous-output test, to detect bad or stuck hardware RNGs; if any are detected, they are detached, but the system continues to run. A problem with rndctl(8) is fixed -- datastructures with pointers in arrays are no longer passed to userspace (this was not a security problem, but rather a major issue for compat32). A new kernel will require a new rndctl. The sysctl kern.arandom() and kern.urandom() nodes are hooked up to the new generators, but the /dev/*random pseudodevices are not, yet. Manual pages for the new kernel interfaces are forthcoming. 1.233 Sat Nov 19 22:51:25 GMT 2011 tls branches: 1.233.2; 1.233.4; First step of random number subsystem rework described in <20111022023242.BA26F14A158@mail.netbsd.org>. This change includes the following: An initial cleanup and minor reorganization of the entropy pool code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are fixed. Some effort is made to accumulate entropy more quickly at boot time. A generic interface, "rndsink", is added, for stream generators to request that they be re-keyed with good quality entropy from the pool as soon as it is available. The arc4random()/arc4randbytes() implementation in libkern is adjusted to use the rndsink interface for rekeying, which helps address the problem of low-quality keys at boot time. An implementation of the FIPS 140-2 statistical tests for random number generator quality is provided (libkern/rngtest.c). This is based on Greg Rose's implementation from Qualcomm. A new random stream generator, nist_ctr_drbg, is provided. It is based on an implementation of the NIST SP800-90 CTR_DRBG by Henric Jungheim. This generator users AES in a modified counter mode to generate a backtracking-resistant random stream. An abstraction layer, "cprng", is provided for in-kernel consumers of randomness. The arc4random/arc4randbytes API is deprecated for in-kernel use. It is replaced by "cprng_strong". The current cprng_fast implementation wraps the existing arc4random implementation. The current cprng_strong implementation wraps the new CTR_DRBG implementation. Both interfaces are rekeyed from the entropy pool automatically at intervals justifiable from best current cryptographic practice. In some quick tests, cprng_fast() is about the same speed as the old arc4randbytes(), and cprng_strong() is about 20% faster than rnd_extract_data(). Performance is expected to improve. The AES code in src/crypto/rijndael is no longer an optional kernel component, as it is required by cprng_strong, which is not an optional kernel component. The entropy pool output is subjected to the rngtest tests at startup time; if it fails, the system will reboot. There is approximately a 3/10000 chance of a false positive from these tests. Entropy pool _input_ from hardware random numbers is subjected to the rngtest tests at attach time, as well as the FIPS continuous-output test, to detect bad or stuck hardware RNGs; if any are detected, they are detached, but the system continues to run. A problem with rndctl(8) is fixed -- datastructures with pointers in arrays are no longer passed to userspace (this was not a security problem, but rather a major issue for compat32). A new kernel will require a new rndctl. The sysctl kern.arandom() and kern.urandom() nodes are hooked up to the new generators, but the /dev/*random pseudodevices are not, yet. Manual pages for the new kernel interfaces are forthcoming. |
| H A D | kern_lwp.c | 1.233 Sat Apr 04 20:20:12 GMT 2020 thorpej branches: 1.233.2; Add support for lazily generating a "global thread ID" for a LWP. This identifier uniquely identifies an LWP across the entire system, and will be used in future improvements in user-space synchronization primitives. (Test disabled and libc stub not included intentionally so as to avoid multiple libc version bumps.) 1.233 Sat Apr 04 20:20:12 GMT 2020 thorpej branches: 1.233.2; Add support for lazily generating a "global thread ID" for a LWP. This identifier uniquely identifies an LWP across the entire system, and will be used in future improvements in user-space synchronization primitives. (Test disabled and libc stub not included intentionally so as to avoid multiple libc version bumps.) |
| H A D | kern_proc.c | 1.233 Tue Jun 11 23:18:55 GMT 2019 kamil branches: 1.233.2; Add support for PTRACE_POSIX_SPAWN to report posix_spawn(3) events posix_spawn(3) is a first class syscall in NetBSD, different to (V)FORK+EXEC as these operations are executed in one go. This differs to Linux and FreeBSD, where posix_spawn(3) is implemented with existing kernel primitives (clone(2), vfork(2), exec(3)) inside libc. Typically LLDB and GDB software is aware of FORK/VFORK events. As discussed with the LLDB community, instead of slicing the posix_spawn(3) operation into phases emulating (V)FORK+EXEC(+VFORK_DONE) and returning intermediate state to the debugger, that might have abnormal state, introduce new event type: PTRACE_POSIX_SPAWN. A debugger implementor can easily map it into existing fork+exec semantics or treat as a distinct event. There is no functional change for existing debuggers as there was no support for reporting posix_spawn(3) events on the kernel side. 1.233 Tue Jun 11 23:18:55 GMT 2019 kamil branches: 1.233.2; Add support for PTRACE_POSIX_SPAWN to report posix_spawn(3) events posix_spawn(3) is a first class syscall in NetBSD, different to (V)FORK+EXEC as these operations are executed in one go. This differs to Linux and FreeBSD, where posix_spawn(3) is implemented with existing kernel primitives (clone(2), vfork(2), exec(3)) inside libc. Typically LLDB and GDB software is aware of FORK/VFORK events. As discussed with the LLDB community, instead of slicing the posix_spawn(3) operation into phases emulating (V)FORK+EXEC(+VFORK_DONE) and returning intermediate state to the debugger, that might have abnormal state, introduce new event type: PTRACE_POSIX_SPAWN. A debugger implementor can easily map it into existing fork+exec semantics or treat as a distinct event. There is no functional change for existing debuggers as there was no support for reporting posix_spawn(3) events on the kernel side. |
| H A D | init_sysent.c | 1.233 Fri Nov 14 23:34:23 GMT 2008 ad Regen. |
| H A D | syscalls.c | 1.233 Mon Dec 14 00:48:35 GMT 2009 matt Merge from matt-nb5-mips64 |
| /src/sys/arch/sparc64/conf/ | ||
| H A D | GENERIC | 1.233 Fri Oct 30 06:44:37 GMT 2020 jdc branches: 1.233.2; Add pcagpio and pcf8574io - hardware status monitors on V210/V240 and E250. 1.233 Fri Oct 30 06:44:37 GMT 2020 jdc branches: 1.233.2; Add pcagpio and pcf8574io - hardware status monitors on V210/V240 and E250. |
| /src/sys/sys/ | ||
| H A D | sysctl.h | 1.233 Tue Apr 13 01:10:24 GMT 2021 mrg branches: 1.233.2; in struct evcnt_sysctl, change ev_strings[0] to ev_strings[]. GCC 10 does not like accesses to zero length arrays. 1.233 Tue Apr 13 01:10:24 GMT 2021 mrg branches: 1.233.2; in struct evcnt_sysctl, change ev_strings[0] to ev_strings[]. GCC 10 does not like accesses to zero length arrays. |
| H A D | vnode.h | 1.233 Mon Jun 27 11:52:24 GMT 2011 uch branches: 1.233.2; 7th Edition(V7) File System support. and NetBSD symbolic-link, socket, FIFO extension. see newfs_v7fs(8). 1.233 Mon Jun 27 11:52:24 GMT 2011 uch branches: 1.233.2; 7th Edition(V7) File System support. and NetBSD symbolic-link, socket, FIFO extension. see newfs_v7fs(8). |
| H A D | syscallargs.h | 1.233 Sun Feb 19 17:50:50 GMT 2012 matt Regen. |
| /src/sys/uvm/ | ||
| H A D | uvm_extern.h | 1.233 Sun Feb 26 07:27:14 GMT 2023 skrll branches: 1.233.6; nkmempages should be size_t 1.233 Sun Feb 26 07:27:14 GMT 2023 skrll branches: 1.233.6; nkmempages should be size_t |
| /src/sys/arch/sparc64/sparc64/ | ||
| H A D | autoconf.c | 1.233 Sat Jul 03 19:39:07 GMT 2021 palle branches: 1.233.2; sun4v: request hypervisor api major version 3 for the interrupt group - should solve issues when setting up interrupts on S7 systems 1.233 Sat Jul 03 19:39:07 GMT 2021 palle branches: 1.233.2; sun4v: request hypervisor api major version 3 for the interrupt group - should solve issues when setting up interrupts on S7 systems |
| /src/sys/dev/ | ||
| H A D | DEVNAMES | 1.233 Sun Dec 02 03:33:09 GMT 2007 kiyohara branches: 1.233.2; Add bcsp and btbc and btuart. 1.233 Sun Dec 02 03:33:09 GMT 2007 kiyohara branches: 1.233.2; Add bcsp and btbc and btuart. |
| /src/sys/dev/acpi/ | ||
| H A D | acpi.c | 1.233 Thu Jan 13 05:58:05 GMT 2011 jruoho branches: 1.233.2; Clean-up acpi_print(). XXX: The 'acpiverbose' module is still broken... 1.233 Thu Jan 13 05:58:05 GMT 2011 jruoho branches: 1.233.2; Clean-up acpi_print(). XXX: The 'acpiverbose' module is still broken... |
| /src/sys/arch/mips/mips/ | ||
| H A D | trap.c | 1.233 Thu Aug 18 21:04:23 GMT 2011 matt branches: 1.233.2; Change bcond/BCOND to regimm/REGIMM to better match the MIPS nomenclature. 1.233 Thu Aug 18 21:04:23 GMT 2011 matt branches: 1.233.2; Change bcond/BCOND to regimm/REGIMM to better match the MIPS nomenclature. |
| /src/sys/arch/amiga/amiga/ | ||
| H A D | machdep.c | 1.233 Mon May 16 13:22:51 GMT 2011 tsutsui branches: 1.233.2; - merge and move pasted m68k MD setreg() functions into m68k/m68k_machdep.c - move m68881_save() and m68881_restore() declarations into <m68k/m68k.h> Briefly tested and no obvious breakage on atari, sun3, and x68k. 1.233 Mon May 16 13:22:51 GMT 2011 tsutsui branches: 1.233.2; - merge and move pasted m68k MD setreg() functions into m68k/m68k_machdep.c - move m68881_save() and m68881_restore() declarations into <m68k/m68k.h> Briefly tested and no obvious breakage on atari, sun3, and x68k. |
| /src/share/misc/ | ||
| H A D | acronyms | 1.233 Fri Apr 24 01:17:32 GMT 2015 rodent +nmu loic nypa |
| /src/sys/miscfs/procfs/ | ||
| H A D | procfs_vnops.c | 1.233 Mon Jul 01 01:35:53 GMT 2024 christos Add linux POSIX message queue support (Ricardo Branco) |
| /src/sys/compat/netbsd32/ | ||
| H A D | netbsd32_netbsd.c | 1.233 Mon Sep 20 01:07:45 GMT 2021 thorpej Add the eventfd(2) system call to COMPAT_NETBSD32. |
| /src/sys/arch/sparc/conf/ | ||
| H A D | GENERIC | 1.233 Tue Jun 26 02:04:55 GMT 2012 macallan switch to WSEMUL_VT100 to reduce differences with sparc64 and other wscons and fb console using ports WSEMUL_SUN is left in but commented out so whoever wants it back can have it with minimal effort |
Completed in 264 milliseconds