Searched hist:1.233 (Results 1 - 25 of 198) sorted by relevance

12345678

/src/sys/netinet/
H A Din.c1.248 Tue Aug 20 08:22:35 GMT 2024 ozaki-r inet: send GARP on link up if DAD is disabled

This behavior was accidentally removed at rev 1.233.

H A Dudp_usrreq.c1.233 Thu Apr 20 08:46:07 GMT 2017 ozaki-r branches: 1.233.4;
Remove unnecessary NULL checks for inp_socket and in6p_socket

They cannot be NULL except for programming errors.

1.233 Thu Apr 20 08:46:07 GMT 2017 ozaki-r branches: 1.233.4;
Remove unnecessary NULL checks for inp_socket and in6p_socket

They cannot be NULL except for programming errors.

/src/sys/dev/pcmcia/
H A Dpcmciadevs.h1.233 Wed Jun 01 23:33:24 GMT 2016 pgoyette branches: 1.233.16;
Regen

1.233 Wed Jun 01 23:33:24 GMT 2016 pgoyette branches: 1.233.16;
Regen

H A Dpcmciadevs_data.h1.233 Wed Jun 01 23:33:24 GMT 2016 pgoyette branches: 1.233.16;
Regen

1.233 Wed Jun 01 23:33:24 GMT 2016 pgoyette branches: 1.233.16;
Regen

H A Dpcmciadevs1.233 Fri Mar 16 00:56:28 GMT 2018 sevan typo

/src/sys/arch/i386/conf/
H A DCARDBUS1.16 Sat Jul 08 02:47:02 GMT 2000 jhawk Pullup rev 1.233 - rev 1.358 of GENERIC to CARDBUS, and merge conflicts.
Add GENERIC rev in "from:" line to aid future merging.
Major highlights include COMPAT_14, COMPAT_AOUT, NTFS, OVERLAY,
SOFTDEP, INET6, IPSEC, pcic iosiz changes, cz, dpt, rtk (cardbus!),
awi, cnw, ray, wi, xi, joy, and gif.

/src/sys/kern/
H A Dkern_sysctl.c1.233 Sat Nov 19 22:51:25 GMT 2011 tls branches: 1.233.2; 1.233.4;
First step of random number subsystem rework described in
<20111022023242.BA26F14A158@mail.netbsd.org>. This change includes
the following:

An initial cleanup and minor reorganization of the entropy pool
code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are
fixed. Some effort is made to accumulate entropy more quickly at
boot time.

A generic interface, "rndsink", is added, for stream generators to
request that they be re-keyed with good quality entropy from the pool
as soon as it is available.

The arc4random()/arc4randbytes() implementation in libkern is
adjusted to use the rndsink interface for rekeying, which helps
address the problem of low-quality keys at boot time.

An implementation of the FIPS 140-2 statistical tests for random
number generator quality is provided (libkern/rngtest.c). This
is based on Greg Rose's implementation from Qualcomm.

A new random stream generator, nist_ctr_drbg, is provided. It is
based on an implementation of the NIST SP800-90 CTR_DRBG by
Henric Jungheim. This generator users AES in a modified counter
mode to generate a backtracking-resistant random stream.

An abstraction layer, "cprng", is provided for in-kernel consumers
of randomness. The arc4random/arc4randbytes API is deprecated for
in-kernel use. It is replaced by "cprng_strong". The current
cprng_fast implementation wraps the existing arc4random
implementation. The current cprng_strong implementation wraps the
new CTR_DRBG implementation. Both interfaces are rekeyed from
the entropy pool automatically at intervals justifiable from best
current cryptographic practice.

In some quick tests, cprng_fast() is about the same speed as
the old arc4randbytes(), and cprng_strong() is about 20% faster
than rnd_extract_data(). Performance is expected to improve.

The AES code in src/crypto/rijndael is no longer an optional
kernel component, as it is required by cprng_strong, which is
not an optional kernel component.

The entropy pool output is subjected to the rngtest tests at
startup time; if it fails, the system will reboot. There is
approximately a 3/10000 chance of a false positive from these
tests. Entropy pool _input_ from hardware random numbers is
subjected to the rngtest tests at attach time, as well as the
FIPS continuous-output test, to detect bad or stuck hardware
RNGs; if any are detected, they are detached, but the system
continues to run.

A problem with rndctl(8) is fixed -- datastructures with
pointers in arrays are no longer passed to userspace (this
was not a security problem, but rather a major issue for
compat32). A new kernel will require a new rndctl.

The sysctl kern.arandom() and kern.urandom() nodes are hooked
up to the new generators, but the /dev/*random pseudodevices
are not, yet.

Manual pages for the new kernel interfaces are forthcoming.

1.233 Sat Nov 19 22:51:25 GMT 2011 tls branches: 1.233.2; 1.233.4;
First step of random number subsystem rework described in
<20111022023242.BA26F14A158@mail.netbsd.org>. This change includes
the following:

An initial cleanup and minor reorganization of the entropy pool
code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are
fixed. Some effort is made to accumulate entropy more quickly at
boot time.

A generic interface, "rndsink", is added, for stream generators to
request that they be re-keyed with good quality entropy from the pool
as soon as it is available.

The arc4random()/arc4randbytes() implementation in libkern is
adjusted to use the rndsink interface for rekeying, which helps
address the problem of low-quality keys at boot time.

An implementation of the FIPS 140-2 statistical tests for random
number generator quality is provided (libkern/rngtest.c). This
is based on Greg Rose's implementation from Qualcomm.

A new random stream generator, nist_ctr_drbg, is provided. It is
based on an implementation of the NIST SP800-90 CTR_DRBG by
Henric Jungheim. This generator users AES in a modified counter
mode to generate a backtracking-resistant random stream.

An abstraction layer, "cprng", is provided for in-kernel consumers
of randomness. The arc4random/arc4randbytes API is deprecated for
in-kernel use. It is replaced by "cprng_strong". The current
cprng_fast implementation wraps the existing arc4random
implementation. The current cprng_strong implementation wraps the
new CTR_DRBG implementation. Both interfaces are rekeyed from
the entropy pool automatically at intervals justifiable from best
current cryptographic practice.

In some quick tests, cprng_fast() is about the same speed as
the old arc4randbytes(), and cprng_strong() is about 20% faster
than rnd_extract_data(). Performance is expected to improve.

The AES code in src/crypto/rijndael is no longer an optional
kernel component, as it is required by cprng_strong, which is
not an optional kernel component.

The entropy pool output is subjected to the rngtest tests at
startup time; if it fails, the system will reboot. There is
approximately a 3/10000 chance of a false positive from these
tests. Entropy pool _input_ from hardware random numbers is
subjected to the rngtest tests at attach time, as well as the
FIPS continuous-output test, to detect bad or stuck hardware
RNGs; if any are detected, they are detached, but the system
continues to run.

A problem with rndctl(8) is fixed -- datastructures with
pointers in arrays are no longer passed to userspace (this
was not a security problem, but rather a major issue for
compat32). A new kernel will require a new rndctl.

The sysctl kern.arandom() and kern.urandom() nodes are hooked
up to the new generators, but the /dev/*random pseudodevices
are not, yet.

Manual pages for the new kernel interfaces are forthcoming.

1.233 Sat Nov 19 22:51:25 GMT 2011 tls branches: 1.233.2; 1.233.4;
First step of random number subsystem rework described in
<20111022023242.BA26F14A158@mail.netbsd.org>. This change includes
the following:

An initial cleanup and minor reorganization of the entropy pool
code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are
fixed. Some effort is made to accumulate entropy more quickly at
boot time.

A generic interface, "rndsink", is added, for stream generators to
request that they be re-keyed with good quality entropy from the pool
as soon as it is available.

The arc4random()/arc4randbytes() implementation in libkern is
adjusted to use the rndsink interface for rekeying, which helps
address the problem of low-quality keys at boot time.

An implementation of the FIPS 140-2 statistical tests for random
number generator quality is provided (libkern/rngtest.c). This
is based on Greg Rose's implementation from Qualcomm.

A new random stream generator, nist_ctr_drbg, is provided. It is
based on an implementation of the NIST SP800-90 CTR_DRBG by
Henric Jungheim. This generator users AES in a modified counter
mode to generate a backtracking-resistant random stream.

An abstraction layer, "cprng", is provided for in-kernel consumers
of randomness. The arc4random/arc4randbytes API is deprecated for
in-kernel use. It is replaced by "cprng_strong". The current
cprng_fast implementation wraps the existing arc4random
implementation. The current cprng_strong implementation wraps the
new CTR_DRBG implementation. Both interfaces are rekeyed from
the entropy pool automatically at intervals justifiable from best
current cryptographic practice.

In some quick tests, cprng_fast() is about the same speed as
the old arc4randbytes(), and cprng_strong() is about 20% faster
than rnd_extract_data(). Performance is expected to improve.

The AES code in src/crypto/rijndael is no longer an optional
kernel component, as it is required by cprng_strong, which is
not an optional kernel component.

The entropy pool output is subjected to the rngtest tests at
startup time; if it fails, the system will reboot. There is
approximately a 3/10000 chance of a false positive from these
tests. Entropy pool _input_ from hardware random numbers is
subjected to the rngtest tests at attach time, as well as the
FIPS continuous-output test, to detect bad or stuck hardware
RNGs; if any are detected, they are detached, but the system
continues to run.

A problem with rndctl(8) is fixed -- datastructures with
pointers in arrays are no longer passed to userspace (this
was not a security problem, but rather a major issue for
compat32). A new kernel will require a new rndctl.

The sysctl kern.arandom() and kern.urandom() nodes are hooked
up to the new generators, but the /dev/*random pseudodevices
are not, yet.

Manual pages for the new kernel interfaces are forthcoming.

H A Dkern_lwp.c1.233 Sat Apr 04 20:20:12 GMT 2020 thorpej branches: 1.233.2;
Add support for lazily generating a "global thread ID" for a LWP. This
identifier uniquely identifies an LWP across the entire system, and will
be used in future improvements in user-space synchronization primitives.

(Test disabled and libc stub not included intentionally so as to avoid
multiple libc version bumps.)

1.233 Sat Apr 04 20:20:12 GMT 2020 thorpej branches: 1.233.2;
Add support for lazily generating a "global thread ID" for a LWP. This
identifier uniquely identifies an LWP across the entire system, and will
be used in future improvements in user-space synchronization primitives.

(Test disabled and libc stub not included intentionally so as to avoid
multiple libc version bumps.)

H A Dkern_proc.c1.233 Tue Jun 11 23:18:55 GMT 2019 kamil branches: 1.233.2;
Add support for PTRACE_POSIX_SPAWN to report posix_spawn(3) events

posix_spawn(3) is a first class syscall in NetBSD, different to
(V)FORK+EXEC as these operations are executed in one go. This differs to
Linux and FreeBSD, where posix_spawn(3) is implemented with existing kernel
primitives (clone(2), vfork(2), exec(3)) inside libc.

Typically LLDB and GDB software is aware of FORK/VFORK events. As discussed
with the LLDB community, instead of slicing the posix_spawn(3) operation
into phases emulating (V)FORK+EXEC(+VFORK_DONE) and returning intermediate
state to the debugger, that might have abnormal state, introduce new event
type: PTRACE_POSIX_SPAWN.

A debugger implementor can easily map it into existing fork+exec semantics
or treat as a distinct event.

There is no functional change for existing debuggers as there was no
support for reporting posix_spawn(3) events on the kernel side.

1.233 Tue Jun 11 23:18:55 GMT 2019 kamil branches: 1.233.2;
Add support for PTRACE_POSIX_SPAWN to report posix_spawn(3) events

posix_spawn(3) is a first class syscall in NetBSD, different to
(V)FORK+EXEC as these operations are executed in one go. This differs to
Linux and FreeBSD, where posix_spawn(3) is implemented with existing kernel
primitives (clone(2), vfork(2), exec(3)) inside libc.

Typically LLDB and GDB software is aware of FORK/VFORK events. As discussed
with the LLDB community, instead of slicing the posix_spawn(3) operation
into phases emulating (V)FORK+EXEC(+VFORK_DONE) and returning intermediate
state to the debugger, that might have abnormal state, introduce new event
type: PTRACE_POSIX_SPAWN.

A debugger implementor can easily map it into existing fork+exec semantics
or treat as a distinct event.

There is no functional change for existing debuggers as there was no
support for reporting posix_spawn(3) events on the kernel side.

H A Dinit_sysent.c1.233 Fri Nov 14 23:34:23 GMT 2008 ad Regen.

H A Dsyscalls.c1.233 Mon Dec 14 00:48:35 GMT 2009 matt Merge from matt-nb5-mips64

/src/sys/arch/sparc64/conf/
H A DGENERIC1.233 Fri Oct 30 06:44:37 GMT 2020 jdc branches: 1.233.2;
Add pcagpio and pcf8574io - hardware status monitors on V210/V240 and E250.

1.233 Fri Oct 30 06:44:37 GMT 2020 jdc branches: 1.233.2;
Add pcagpio and pcf8574io - hardware status monitors on V210/V240 and E250.

/src/sys/sys/
H A Dsysctl.h1.233 Tue Apr 13 01:10:24 GMT 2021 mrg branches: 1.233.2;
in struct evcnt_sysctl, change ev_strings[0] to ev_strings[].

GCC 10 does not like accesses to zero length arrays.

1.233 Tue Apr 13 01:10:24 GMT 2021 mrg branches: 1.233.2;
in struct evcnt_sysctl, change ev_strings[0] to ev_strings[].

GCC 10 does not like accesses to zero length arrays.

H A Dvnode.h1.233 Mon Jun 27 11:52:24 GMT 2011 uch branches: 1.233.2;
7th Edition(V7) File System support. and NetBSD symbolic-link, socket, FIFO extension. see newfs_v7fs(8).

1.233 Mon Jun 27 11:52:24 GMT 2011 uch branches: 1.233.2;
7th Edition(V7) File System support. and NetBSD symbolic-link, socket, FIFO extension. see newfs_v7fs(8).

H A Dsyscallargs.h1.233 Sun Feb 19 17:50:50 GMT 2012 matt Regen.

/src/sys/uvm/
H A Duvm_extern.h1.233 Sun Feb 26 07:27:14 GMT 2023 skrll branches: 1.233.6;
nkmempages should be size_t
1.233 Sun Feb 26 07:27:14 GMT 2023 skrll branches: 1.233.6;
nkmempages should be size_t
/src/sys/arch/sparc64/sparc64/
H A Dautoconf.c1.233 Sat Jul 03 19:39:07 GMT 2021 palle branches: 1.233.2;
sun4v: request hypervisor api major version 3 for the interrupt group - should solve issues when setting up interrupts on S7 systems

1.233 Sat Jul 03 19:39:07 GMT 2021 palle branches: 1.233.2;
sun4v: request hypervisor api major version 3 for the interrupt group - should solve issues when setting up interrupts on S7 systems

/src/sys/dev/
H A DDEVNAMES1.233 Sun Dec 02 03:33:09 GMT 2007 kiyohara branches: 1.233.2;
Add bcsp and btbc and btuart.

1.233 Sun Dec 02 03:33:09 GMT 2007 kiyohara branches: 1.233.2;
Add bcsp and btbc and btuart.

/src/sys/dev/acpi/
H A Dacpi.c1.233 Thu Jan 13 05:58:05 GMT 2011 jruoho branches: 1.233.2;
Clean-up acpi_print(). XXX: The 'acpiverbose' module is still broken...

1.233 Thu Jan 13 05:58:05 GMT 2011 jruoho branches: 1.233.2;
Clean-up acpi_print(). XXX: The 'acpiverbose' module is still broken...

/src/sys/arch/mips/mips/
H A Dtrap.c1.233 Thu Aug 18 21:04:23 GMT 2011 matt branches: 1.233.2;
Change bcond/BCOND to regimm/REGIMM to better match the MIPS nomenclature.

1.233 Thu Aug 18 21:04:23 GMT 2011 matt branches: 1.233.2;
Change bcond/BCOND to regimm/REGIMM to better match the MIPS nomenclature.

/src/sys/arch/amiga/amiga/
H A Dmachdep.c1.233 Mon May 16 13:22:51 GMT 2011 tsutsui branches: 1.233.2;
- merge and move pasted m68k MD setreg() functions into m68k/m68k_machdep.c
- move m68881_save() and m68881_restore() declarations into <m68k/m68k.h>

Briefly tested and no obvious breakage on atari, sun3, and x68k.

1.233 Mon May 16 13:22:51 GMT 2011 tsutsui branches: 1.233.2;
- merge and move pasted m68k MD setreg() functions into m68k/m68k_machdep.c
- move m68881_save() and m68881_restore() declarations into <m68k/m68k.h>

Briefly tested and no obvious breakage on atari, sun3, and x68k.

/src/share/misc/
H A Dacronyms1.233 Fri Apr 24 01:17:32 GMT 2015 rodent +nmu loic nypa

/src/sys/miscfs/procfs/
H A Dprocfs_vnops.c1.233 Mon Jul 01 01:35:53 GMT 2024 christos Add linux POSIX message queue support (Ricardo Branco)

/src/sys/compat/netbsd32/
H A Dnetbsd32_netbsd.c1.233 Mon Sep 20 01:07:45 GMT 2021 thorpej Add the eventfd(2) system call to COMPAT_NETBSD32.

/src/sys/arch/sparc/conf/
H A DGENERIC1.233 Tue Jun 26 02:04:55 GMT 2012 macallan switch to WSEMUL_VT100 to reduce differences with sparc64 and other wscons
and fb console using ports
WSEMUL_SUN is left in but commented out so whoever wants it back can have it
with minimal effort

Completed in 264 milliseconds

12345678