| Home | Sort by: relevance | last modified time | path |
| /src/tests/lib/libc/sys/ | |
| t_recvmmsg.c | 1.1.26.1 Mon Apr 09 13:34:10 UTC 2018 bouyer Pull up following revision(s) (requested by roy in ticket #724): tests/net/icmp/t_ping.c: revision 1.19 sys/netinet6/raw_ip6.c: revision 1.166 sys/netinet6/ip6_input.c: revision 1.195 sys/net/raw_usrreq.c: revision 1.59 sys/sys/socketvar.h: revision 1.151 sys/kern/uipc_socket2.c: revision 1.128 tests/lib/libc/sys/t_recvmmsg.c: revision 1.2 lib/libc/sys/recv.2: revision 1.38 sys/net/rtsock.c: revision 1.239 sys/netinet/udp_usrreq.c: revision 1.246 sys/netinet6/icmp6.c: revision 1.224 tests/net/icmp/t_ping.c: revision 1.20 sys/netipsec/keysock.c: revision 1.63 sys/netinet/raw_ip.c: revision 1.172 sys/kern/uipc_socket.c: revision 1.260 tests/net/icmp/t_ping.c: revision 1.22 sys/kern/uipc_socket.c: revision 1.261 tests/net/icmp/t_ping.c: revision 1.23 sys/netinet/ip_mroute.c: revision 1.155 sbin/route/route.c: revision 1.159 sys/netinet6/ip6_mroute.c: revision 1.123 sys/netatalk/ddp_input.c: revision 1.31 sys/netcan/can.c: revision 1.3 sys/kern/uipc_usrreq.c: revision 1.184 sys/netinet6/udp6_usrreq.c: revision 1.138 tests/net/icmp/t_ping.c: revision 1.18 socket: report receive buffer overflows Add soroverflow() which increments the overflow counter, sets so_error to ENOBUFS and wakes the receive socket up. Replace all code that manually increments this counter with soroverflow(). Add soroverflow() to raw_input(). This allows userland to detect route(4) overflows so it can re-sync with the current state. socket: clear error even when peeking The error has already been reported and it's pointless requiring another recv(2) call just to clear it. socket: remove now incorrect comment that so_error is only udp As it can be affected by route(4) sockets which are raw. rtsock: log dropped messages that we cannot report to userland Handle ENOBUFS when receiving messages. Don't send messages if the receiver has died. Sprinkle more soroverflow(). Handle ENOBUFS in recv Handle ENOBUFS in sendto Note value received. Harden another sendto for ENOBUFS. Handle the routing socket overflowing gracefully. Allow a valid sendto .... duh Handle errors better. Fix test for checking we sent all the data we asked to. |
| /src/sys/ufs/lfs/ | |
| ulfs_dirhash.c | 1.16 Mon Jun 20 00:00:47 UTC 2016 dholland More already-merged or equivalent changes: ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8 ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7 ufs_lookup.c 1.126 does not apply to lfs ufs_lookup.c 1.127 we already have ufs_lookup.c 1.128 does not apply to lfs ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19 ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7 ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8 ufs_quota2.c 1.36 we have equivalent changes for ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5 ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6 ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19 ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20 ufs_vnops.c 1.221 was superseded by later changes ufs_vnops.c 1.222 got fixed independently in lfs |
| ulfs_quota1.c | 1.10 Mon Jun 20 00:00:47 UTC 2016 dholland More already-merged or equivalent changes: ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8 ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7 ufs_lookup.c 1.126 does not apply to lfs ufs_lookup.c 1.127 we already have ufs_lookup.c 1.128 does not apply to lfs ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19 ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7 ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8 ufs_quota2.c 1.36 we have equivalent changes for ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5 ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6 ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19 ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20 ufs_vnops.c 1.221 was superseded by later changes ufs_vnops.c 1.222 got fixed independently in lfs |
| ulfs_extattr.c | 1.9 Mon Jun 20 00:00:47 UTC 2016 dholland More already-merged or equivalent changes: ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8 ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7 ufs_lookup.c 1.126 does not apply to lfs ufs_lookup.c 1.127 we already have ufs_lookup.c 1.128 does not apply to lfs ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19 ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7 ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8 ufs_quota2.c 1.36 we have equivalent changes for ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5 ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6 ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19 ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20 ufs_vnops.c 1.221 was superseded by later changes ufs_vnops.c 1.222 got fixed independently in lfs |
| ulfs_lookup.c | 1.38 Mon Jun 20 00:00:47 UTC 2016 dholland More already-merged or equivalent changes: ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8 ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7 ufs_lookup.c 1.126 does not apply to lfs ufs_lookup.c 1.127 we already have ufs_lookup.c 1.128 does not apply to lfs ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19 ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7 ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8 ufs_quota2.c 1.36 we have equivalent changes for ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5 ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6 ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19 ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20 ufs_vnops.c 1.221 was superseded by later changes ufs_vnops.c 1.222 got fixed independently in lfs |
| ulfs_quota2.c | 1.23 Mon Jun 20 00:00:47 UTC 2016 dholland More already-merged or equivalent changes: ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8 ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7 ufs_lookup.c 1.126 does not apply to lfs ufs_lookup.c 1.127 we already have ufs_lookup.c 1.128 does not apply to lfs ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19 ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7 ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8 ufs_quota2.c 1.36 we have equivalent changes for ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5 ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6 ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19 ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20 ufs_vnops.c 1.221 was superseded by later changes ufs_vnops.c 1.222 got fixed independently in lfs |
| lfs_rename.c | 1.18 Mon Jun 20 00:00:47 UTC 2016 dholland More already-merged or equivalent changes: ufs_dirhash.c 1.36 corresponds to ulfs_dirhash.c 1.8 ufs_extattr.c 1.43 corresponds to ulfs_extattr.c 1.7 ufs_lookup.c 1.126 does not apply to lfs ufs_lookup.c 1.127 we already have ufs_lookup.c 1.128 does not apply to lfs ufs_lookup.c 1.129 corresponds to ulfs_lookup.c 1.19 ufs_quota1.c 1.19 corresponds to ulfs_quota1.c 1.7 ufs_quota1.c 1.20 corresponds to ulfs_quota1.c 1.8 ufs_quota2.c 1.36 we have equivalent changes for ufs_rename.c 1.9 corresponds to lfs_rename.c 1.5 ufs_rename.c 1.10 corresponds to lfs_rename.c 1.6 ufs_vnops.c 1.219 corresponds to lfs_vnops.c 1.260 and ulfs_vnops.c 1.19 ufs_vnops.c 1.220 corresponds to lfs_vnops.c 1.261 and ulfs_vnops.c 1.20 ufs_vnops.c 1.221 was superseded by later changes ufs_vnops.c 1.222 got fixed independently in lfs |
| /src/tests/net/icmp/ | |
| t_ping.c | 1.17.6.1 Mon Apr 09 13:34:10 UTC 2018 bouyer Pull up following revision(s) (requested by roy in ticket #724): tests/net/icmp/t_ping.c: revision 1.19 sys/netinet6/raw_ip6.c: revision 1.166 sys/netinet6/ip6_input.c: revision 1.195 sys/net/raw_usrreq.c: revision 1.59 sys/sys/socketvar.h: revision 1.151 sys/kern/uipc_socket2.c: revision 1.128 tests/lib/libc/sys/t_recvmmsg.c: revision 1.2 lib/libc/sys/recv.2: revision 1.38 sys/net/rtsock.c: revision 1.239 sys/netinet/udp_usrreq.c: revision 1.246 sys/netinet6/icmp6.c: revision 1.224 tests/net/icmp/t_ping.c: revision 1.20 sys/netipsec/keysock.c: revision 1.63 sys/netinet/raw_ip.c: revision 1.172 sys/kern/uipc_socket.c: revision 1.260 tests/net/icmp/t_ping.c: revision 1.22 sys/kern/uipc_socket.c: revision 1.261 tests/net/icmp/t_ping.c: revision 1.23 sys/netinet/ip_mroute.c: revision 1.155 sbin/route/route.c: revision 1.159 sys/netinet6/ip6_mroute.c: revision 1.123 sys/netatalk/ddp_input.c: revision 1.31 sys/netcan/can.c: revision 1.3 sys/kern/uipc_usrreq.c: revision 1.184 sys/netinet6/udp6_usrreq.c: revision 1.138 tests/net/icmp/t_ping.c: revision 1.18 socket: report receive buffer overflows Add soroverflow() which increments the overflow counter, sets so_error to ENOBUFS and wakes the receive socket up. Replace all code that manually increments this counter with soroverflow(). Add soroverflow() to raw_input(). This allows userland to detect route(4) overflows so it can re-sync with the current state. socket: clear error even when peeking The error has already been reported and it's pointless requiring another recv(2) call just to clear it. socket: remove now incorrect comment that so_error is only udp As it can be affected by route(4) sockets which are raw. rtsock: log dropped messages that we cannot report to userland Handle ENOBUFS when receiving messages. Don't send messages if the receiver has died. Sprinkle more soroverflow(). Handle ENOBUFS in recv Handle ENOBUFS in sendto Note value received. Harden another sendto for ENOBUFS. Handle the routing socket overflowing gracefully. Allow a valid sendto .... duh Handle errors better. Fix test for checking we sent all the data we asked to. |
| /src/lib/libc/sys/ | |
| recv.2 | 1.36.20.1 Mon Apr 09 13:34:10 UTC 2018 bouyer Pull up following revision(s) (requested by roy in ticket #724): tests/net/icmp/t_ping.c: revision 1.19 sys/netinet6/raw_ip6.c: revision 1.166 sys/netinet6/ip6_input.c: revision 1.195 sys/net/raw_usrreq.c: revision 1.59 sys/sys/socketvar.h: revision 1.151 sys/kern/uipc_socket2.c: revision 1.128 tests/lib/libc/sys/t_recvmmsg.c: revision 1.2 lib/libc/sys/recv.2: revision 1.38 sys/net/rtsock.c: revision 1.239 sys/netinet/udp_usrreq.c: revision 1.246 sys/netinet6/icmp6.c: revision 1.224 tests/net/icmp/t_ping.c: revision 1.20 sys/netipsec/keysock.c: revision 1.63 sys/netinet/raw_ip.c: revision 1.172 sys/kern/uipc_socket.c: revision 1.260 tests/net/icmp/t_ping.c: revision 1.22 sys/kern/uipc_socket.c: revision 1.261 tests/net/icmp/t_ping.c: revision 1.23 sys/netinet/ip_mroute.c: revision 1.155 sbin/route/route.c: revision 1.159 sys/netinet6/ip6_mroute.c: revision 1.123 sys/netatalk/ddp_input.c: revision 1.31 sys/netcan/can.c: revision 1.3 sys/kern/uipc_usrreq.c: revision 1.184 sys/netinet6/udp6_usrreq.c: revision 1.138 tests/net/icmp/t_ping.c: revision 1.18 socket: report receive buffer overflows Add soroverflow() which increments the overflow counter, sets so_error to ENOBUFS and wakes the receive socket up. Replace all code that manually increments this counter with soroverflow(). Add soroverflow() to raw_input(). This allows userland to detect route(4) overflows so it can re-sync with the current state. socket: clear error even when peeking The error has already been reported and it's pointless requiring another recv(2) call just to clear it. socket: remove now incorrect comment that so_error is only udp As it can be affected by route(4) sockets which are raw. rtsock: log dropped messages that we cannot report to userland Handle ENOBUFS when receiving messages. Don't send messages if the receiver has died. Sprinkle more soroverflow(). Handle ENOBUFS in recv Handle ENOBUFS in sendto Note value received. Harden another sendto for ENOBUFS. Handle the routing socket overflowing gracefully. Allow a valid sendto .... duh Handle errors better. Fix test for checking we sent all the data we asked to. |
| /src/sys/dev/scsipi/ | |
| sd.c | 1.261 Sun Mar 04 06:02:43 UTC 2007 christos branches: 1.261.2; 1.261.4; Kill caddr_t; there will be some MI fallout, but it will be fixed shortly. Sun Mar 04 06:02:43 UTC 2007 christos branches: 1.261.2; 1.261.4; Kill caddr_t; there will be some MI fallout, but it will be fixed shortly. .2; 1.261.4; Kill caddr_t; there will be some MI fallout, but it will be fixed shortly. 1.261.4.1 Wed Jul 11 20:08:19 UTC 2007 mjf Sync with head. 1.261.2.5 Tue Oct 09 15:22:12 UTC 2007 ad Sync with head. 1.261.2.4 Mon Aug 20 18:16:15 UTC 2007 ad - Alter disk attach/detach to fix a panic when closing a vnd device. - Sync with HEAD. 1.261.2.3 Sun Aug 19 19:24:34 UTC 2007 ad - Back out the biodone() changes. - Eliminate B_ERROR (from HEAD). 1.261.2.2 Sun Jul 01 21:48:59 UTC 2007 ad Adapt to callout API change. 1.261.2.1 Sun May 13 17:36:29 UTC 2007 ad - Pass the error number and residual count to biodone(), and let it handle setting error indicators. Prepare to eliminate B_ERROR. - Add a flag argument to brelse() to be set into the buf's flags, instead of doing it directly. Typically used to set B_INVAL. - Add a "struct cpu_info *" argument to kthread_create(), to be used to create bound threads. Change "bool mpsafe" to "int flags". - Allow exit of LWPs in the IDL state when (l != curlwp). - More locking fixes & conversion to the new API. |
| cd.c | 1.261 Sun Jan 14 09:29:24 UTC 2007 martin branches: 1.261.2; The previous fix for PR 34202 was wrong (some sizeof used the union, not the command block) - but instead of fixing this, we can now revert it completley: the real fix has been applied to ../ic/wdc.c in rev. 1.244, removing the alignement constraints. Sun Jan 14 09:29:24 UTC 2007 martin branches: 1.261.2; The previous fix for PR 34202 was wrong (some sizeof used the union, not the command block) - but instead of fixing this, we can now revert it completley: the real fix has been applied to ../ic/wdc.c in rev. 1.244, removing the alignement constraints. 1.260.2.1 Mon Jan 15 22:15:13 UTC 2007 pavel branches: 1.260.2.1.2; Pull up following revision(s) (requested by martin in ticket #371): sys/dev/scsipi/cd.c: revision 1.261 sys/dev/ic/wdc.c: revision 1.244 If __NO_STRICT_ALIGNMENT is not defined, take special care to do PIO transfers with proper alignement - this removes alignement restrictions of the buffer pointer passed. Thanks to bouyer, reinoud, jdc for helping with the code, and special thanks to Dave Huang for testing. The previous fix for PR 34202 was wrong (some sizeof used the union, not the command block) - but instead of fixing this, we can now revert it completley: the real fix has been applied to ../ic/wdc.c in rev. 1.244, removing the alignement constraints. 1.261.2.1 Mon Mar 12 05:57:09 UTC 2007 rmind Sync with HEAD. |
| /src/sys/netcan/ | |
| can.c | 1.2.2.1 Mon Apr 09 13:34:11 UTC 2018 bouyer Pull up following revision(s) (requested by roy in ticket #724): tests/net/icmp/t_ping.c: revision 1.19 sys/netinet6/raw_ip6.c: revision 1.166 sys/netinet6/ip6_input.c: revision 1.195 sys/net/raw_usrreq.c: revision 1.59 sys/sys/socketvar.h: revision 1.151 sys/kern/uipc_socket2.c: revision 1.128 tests/lib/libc/sys/t_recvmmsg.c: revision 1.2 lib/libc/sys/recv.2: revision 1.38 sys/net/rtsock.c: revision 1.239 sys/netinet/udp_usrreq.c: revision 1.246 sys/netinet6/icmp6.c: revision 1.224 tests/net/icmp/t_ping.c: revision 1.20 sys/netipsec/keysock.c: revision 1.63 sys/netinet/raw_ip.c: revision 1.172 sys/kern/uipc_socket.c: revision 1.260 tests/net/icmp/t_ping.c: revision 1.22 sys/kern/uipc_socket.c: revision 1.261 tests/net/icmp/t_ping.c: revision 1.23 sys/netinet/ip_mroute.c: revision 1.155 sbin/route/route.c: revision 1.159 sys/netinet6/ip6_mroute.c: revision 1.123 sys/netatalk/ddp_input.c: revision 1.31 sys/netcan/can.c: revision 1.3 sys/kern/uipc_usrreq.c: revision 1.184 sys/netinet6/udp6_usrreq.c: revision 1.138 tests/net/icmp/t_ping.c: revision 1.18 socket: report receive buffer overflows Add soroverflow() which increments the overflow counter, sets so_error to ENOBUFS and wakes the receive socket up. Replace all code that manually increments this counter with soroverflow(). Add soroverflow() to raw_input(). This allows userland to detect route(4) overflows so it can re-sync with the current state. socket: clear error even when peeking The error has already been reported and it's pointless requiring another recv(2) call just to clear it. socket: remove now incorrect comment that so_error is only udp As it can be affected by route(4) sockets which are raw. rtsock: log dropped messages that we cannot report to userland Handle ENOBUFS when receiving messages. Don't send messages if the receiver has died. Sprinkle more soroverflow(). Handle ENOBUFS in recv Handle ENOBUFS in sendto Note value received. Harden another sendto for ENOBUFS. Handle the routing socket overflowing gracefully. Allow a valid sendto .... duh Handle errors better. Fix test for checking we sent all the data we asked to. |
| /src/sys/dev/ic/ | |
| com.c | 1.261 Sat Jul 14 21:02:37 UTC 2007 ad branches: 1.261.2; 1.261.6; Generic soft interrupts are mandatory. Sat Jul 14 21:02:37 UTC 2007 ad branches: 1.261.2; 1.261.6; Generic soft interrupts are mandatory. .2; 1.261.6; Generic soft interrupts are mandatory. 1.261.6.4 Sun Dec 09 19:37:48 UTC 2007 jmcneill Sync with HEAD. 1.261.6.3 Wed Nov 21 21:54:49 UTC 2007 joerg Sync with HEAD. 1.261.6.2 Fri Oct 26 15:44:40 UTC 2007 joerg Sync with HEAD. Follow the merge of pmap.c on i386 and amd64 and move pmap_init_tmp_pgtbl into arch/x86/x86/pmap.c. Modify the ACPI wakeup code to restore CR4 before jumping back into kernel space as the large page option might cover that. 1.261.6.1 Mon Sep 03 16:47:59 UTC 2007 jmcneill Sync with HEAD. 1.261.2.1 Mon Sep 03 10:20:18 UTC 2007 skrll Sync with HEAD. |
| /src/sys/arch/alpha/conf/ | |
| GENERIC | 1.261 Fri Feb 18 21:05:50 UTC 2005 dsl branches: 1.261.4; Invert FFS_SNAPSHOT to FFS_NO_SNAPSHOT Fri Feb 18 21:05:50 UTC 2005 dsl branches: 1.261.4; Invert FFS_SNAPSHOT to FFS_NO_SNAPSHOT 1.261.4.6 Sat Nov 05 00:39:47 UTC 2005 tron Pull up following revision(s) (requested by chs in ticket #929): sys/arch/hp300/conf/GENERIC: revision 1.124 sys/arch/acorn32/conf/GENERIC: revision 1.62 sys/arch/pdp10/conf/GENERIC: revision 1.19 sys/arch/mvme68k/conf/GENERIC: revision 1.61 sys/arch/netwinder/conf/GENERIC: revision 1.70 sys/arch/sbmips/conf/GENERIC: revision 1.46 sys/arch/macppc/conf/GENERIC: revision 1.214 sys/arch/bebox/conf/GENERIC: revision 1.89 sys/arch/cobalt/conf/GENERIC: revision 1.83 sys/arch/cats/conf/GENERIC: revision 1.92 sys/arch/shark/conf/GENERIC: revision 1.53 sys/arch/amiga/conf/GENERIC.in: revision 1.45 sys/arch/acorn26/conf/GENERIC: revision 1.37 sys/arch/cesfic/conf/GENERIC: revision 1.38 sys/arch/iyonix/conf/GENERIC: revision 1.21 sys/arch/alpha/conf/GENERIC: revision 1.277 sys/arch/vax/conf/GENERIC: revision 1.143 sys/arch/atari/conf/GENERIC.in: revision 1.56 sys/arch/mipsco/conf/GENERIC: revision 1.53 sys/arch/ofppc/conf/GENERIC: revision 1.85 sys/arch/next68k/conf/GENERIC: revision 1.96 sys/arch/arc/conf/GENERIC: revision 1.125 sys/arch/dreamcast/conf/GENERIC: revision 1.62 turn off DEBUG and DIAGNOSTIC in GENERIC kernels so that they are compatible with the LKMs that are part of the release. 1.261.4.5 Sat Oct 01 10:41:00 UTC 2005 tron Pull up following revision(s) (requested by abs in ticket #840): sys/arch/alpha/conf/GENERIC: revision 1.276 If we're enabling ipfilter then we should really have IPFILTER_LOG 1.261.4.4 Sun Aug 14 21:13:30 UTC 2005 riz Pull up revision 1.269 (requested by hubertf in ticket #625): Add support for reading cloop2 compressed filesystem images, enable by putting VND_COMPRESSION into kernel config file. Written by Cliff Wright, polished up slightly by me. 1.261.4.3 Mon Jul 18 21:15:01 UTC 2005 riz Pull up revision 1.267 (requested by tron in ticket #566): Add (commented out) IPSEC_NAT_T option. 1.261.4.2 Wed Jun 01 17:20:01 UTC 2005 riz Pull up revision 1.264 (requested by tron in ticket #362): Remove attachment for the piixide(4) driver from all non-x86 kernel configurations because Intel IDE disk controllers only exist as part of Intel chipsets for x86 systems. 1.261.4.1 Sun Apr 17 11:44:40 UTC 2005 tron Pull up revision 1.263 (requested by itohy in ticket #160): Add ukyopon(4). |
| /src/sys/kern/ | |
| kern_sysctl.c | 1.261 Sat Jan 27 00:00:26 UTC 2018 christos branches: 1.261.2; 1.261.4; remove useless KASSERT. Sat Jan 27 00:00:26 UTC 2018 christos branches: 1.261.2; 1.261.4; remove useless KASSERT. .2; 1.261.4; remove useless KASSERT. 1.261.4.2 Mon Apr 13 08:05:04 UTC 2020 martin Mostly merge changes from HEAD upto 20200411 1.261.4.1 Mon Jun 10 22:09:03 UTC 2019 christos Sync with HEAD 1.261.2.1 Sat Oct 20 06:58:45 UTC 2018 pgoyette Sync with head |
| init_sysent.c | 1.261 Sat Feb 11 23:18:13 UTC 2012 martin branches: 1.261.2; Regen for posix_spawn Sat Feb 11 23:18:13 UTC 2012 martin branches: 1.261.2; Regen for posix_spawn 1.261.2.1 Tue Apr 14 15:03:38 UTC 2015 msaitoh Pull up following revision(s) (requested by khorben in ticket #1264): include/unistd.h 1.144 sys/kern/init_sysent.c regen sys/kern/syscalls.c regen sys/kern/syscalls.master 1.272 sys/rump/include/rump/rump_syscalls.h regen sys/rump/librump/rumpkern/rump_syscalls.c regen sys/sys/syscall.h regen sys/sys/syscallargs.h regen sys/compat/netbds32/netbsd32_syscall.h regen sys/compat/netbds32/netbsd32_syscallargs.h regen sys/compat/netbds32/netbsd32_syscalls.c regen sys/compat/netbds32/netbsd32_sysent.c regen sys/compat/netbsd32/syscalls.master 1.102 Fix return type of the readlinkat(2) syscall. PR#49684. |
| init_main.c | 1.261 Sat Dec 24 19:12:23 UTC 2005 perry branches: 1.261.2; 1.261.4; 1.261.6; Remove leading __ from __(const|inline|signed|volatile) -- it is obsolete. Sat Dec 24 19:12:23 UTC 2005 perry branches: 1.261.2; 1.261.4; 1.261.6; Remove leading __ from __(const|inline|signed|volatile) -- it is obsolete. .2; 1.261.4; 1.261.6; Remove leading __ from __(const|inline|signed|volatile) -- it is obsolete. .4; 1.261.6; Remove leading __ from __(const|inline|signed|volatile) -- it is obsolete. 1.261.6.4 Thu Jun 01 23:21:08 UTC 2006 kardel initialize ntp variables before timing code would reference them 1.261.6.3 Thu Jun 01 22:38:06 UTC 2006 kardel Sync with head. 1.261.6.2 Sat Apr 22 11:39:58 UTC 2006 simonb Sync with head. 1.261.6.1 Sat Feb 04 14:37:37 UTC 2006 simonb Adjust for timecounters, call ntp_init(). 1.261.4.1 Sat Sep 09 02:57:15 UTC 2006 rpaulo sync with head 1.261.2.1 Sat Feb 18 15:39:18 UTC 2006 yamt sync with head. |
| vfs_subr.c | 1.261 Wed Jan 18 14:26:55 UTC 2006 reinoud branches: 1.261.2; 1.261.4; vfs_mountedon() can only and only handle special device nodes and will otherwise generate an UVM trap or will access random memory. This is due to the dereference of vp->v_specmountpoint that is really vp->v_specinfo->si_mountpoint. The field v_specinfo is multiplexed with other structs in the vun union in struct vnode like struct socket. The patch adds a sanity check for accessing the specinfo fields by only allowing VBLK nodes to be passed. In theory also VCHR could be valid since its also a special node though mounting is only done on VBLK so be strict. Ok'd by yamt. Wed Jan 18 14:26:55 UTC 2006 reinoud branches: 1.261.2; 1.261.4; vfs_mountedon() can only and only handle special device nodes and will otherwise generate an UVM trap or will access random memory. This is due to the dereference of vp->v_specmountpoint that is really vp->v_specinfo->si_mountpoint. The field v_specinfo is multiplexed with other structs in the vun union in struct vnode like struct socket. The patch adds a sanity check for accessing the specinfo fields by only allowing VBLK nodes to be passed. In theory also VCHR could be valid since its also a special node though mounting is only done on VBLK so be strict. Ok'd by yamt. .2; 1.261.4; vfs_mountedon() can only and only handle special device nodes and will otherwise generate an UVM trap or will access random memory. This is due to the dereference of vp->v_specmountpoint that is really vp->v_specinfo->si_mountpoint. The field v_specinfo is multiplexed with other structs in the vun union in struct vnode like struct socket. The patch adds a sanity check for accessing the specinfo fields by only allowing VBLK nodes to be passed. In theory also VCHR could be valid since its also a special node though mounting is only done on VBLK so be strict. Ok'd by yamt. 1.261.4.2 Thu Jun 01 22:38:10 UTC 2006 kardel Sync with head. 1.261.4.1 Sat Apr 22 11:40:00 UTC 2006 simonb Sync with head. 1.261.2.1 Sat Sep 09 02:57:17 UTC 2006 rpaulo sync with head |
| /src/share/man/man9/ | |
| Makefile | 1.261 Wed Apr 02 14:49:31 UTC 2008 xtraeme branches: 1.261.2; 1.261.4; Add MLINKS for the sysmon_envsys_* functions. Wed Apr 02 14:49:31 UTC 2008 xtraeme branches: 1.261.2; 1.261.4; Add MLINKS for the sysmon_envsys_* functions. .2; 1.261.4; Add MLINKS for the sysmon_envsys_* functions. 1.261.4.1 Sun May 18 00:31:12 UTC 2008 yamt sync with head. 1.261.2.3 Sun Oct 05 20:11:23 UTC 2008 mjf Sync with HEAD. 1.261.2.2 Mon Jun 02 13:21:40 UTC 2008 mjf Sync with HEAD. 1.261.2.1 Wed Apr 02 14:49:31 UTC 2008 mjf file Makefile was added on branch mjf-devfs2 on 2008-06-02 13:21:40 +0000 |
| /src/sys/dev/usb/ | |
| xhcivar.h | 1.4.8.2 Sat Aug 25 14:57:35 UTC 2018 martin Pull up following revision(s) (requested by mrg in ticket #1632): sys/dev/usb/usbdivar.h: revision 1.117 sys/external/bsd/dwc2/dwc2.c: revision 1.52 sys/dev/usb/xhcivar.h: revision 1.10 sys/dev/usb/motg.c: revision 1.22 sys/dev/usb/ehci.c: revision 1.260 sys/dev/usb/ehci.c: revision 1.261 sys/dev/usb/xhci.c: revision 1.96 sys/dev/usb/ohci.c: revision 1.282 sys/dev/usb/ohci.c: revision 1.283 sys/dev/usb/ehcivar.h: revision 1.45 sys/dev/usb/uhci.c: revision 1.281 sys/dev/usb/uhci.c: revision 1.282 sys/dev/usb/usbdi.c: revision 1.177 sys/dev/usb/ohcivar.h: revision 1.60 sys/dev/usb/uhcivar.h: revision 1.55 (all via patch) pull across abort fixes from nick-nhusb. add more abort fixes, using ideas from Taylor and Nick, and myself. special thanks to both who inspired much of the code here, if not wrote it directly. among other problems, this assert should no longer trigger: panic: kernel diagnostic assertion "xfer->ux_state == XFER_ONQU" failed: file "/current/src/sys/dev/usb/usbdi.c", line 914 using usbhist i was able to track down my instance of it being related to userland close() beginning, dropping the sc_lock, and then the usb softintr completes the transfer normally, and when it is done, the abort path attempts to re-complete the transfer, and the above assert is tripped. changes from nhusb were commited with these logs: -- Move the struct usb_task to struct usbd_xfer for everyone to use. -- Set device transfer status to USBD_IN_PROGRESS if start methods succeeds -- Actually set the transfer status on transfers in ohci_abort_xfer and the controller is dying -- Don't supply the lock to callout_halt when polling as it won't be held -- Improve transfer abort -- Mark device transfers as USBD_IN_PROGRESS appropriately and improve abort handling -- -- Mark device transfers as USBD_IN_PROGRESS appropriately and improve abort handling -- additional changes include: - initialise the usb abort task in the HCI allocx routine, so that it can be safely usb_rem_task()'d. - rework the handling of softintr vs cancellation vs timeout abort based upon a scheme from Taylor: when completing a transfer normally: - if the status is not in progress, it must be cancelled or timed out, and we should not process this xfer. - set the status as normal. - unconditionallly callout_stop() and usb_rem_task(). they're safe and either aren't running, or will run and do nothing. - finally call usb_transfer_complete(). when aborting a transfer: - status should be cancelled or timed out. - if cancelling, callout_halt and usb_rem_task_wait() to make sure the timer is either done or cancelled. - at this point, the ux_status must not be cancelled or timed out, and if it is not in progress we're done. - set the status. - if the controller is dying, just return. - perform HCI-specific tasks to abort this xfer. - finally call usb_transfer_complete(). for the timeout and timeout task: - if the HCI is not dying, and the ux_status is in progress, then trigger the usb abort task. - remove UXFER_ABORTWAIT and UXFER_ABORTING. tested on: - multiple PC systems with several types of devices: ugen/UPS, ucom, umass with disk, ssd and cdrom backends, kbd, ms, using uhci, ehci and xhci. - erlite3: sd@umass on dwc2. - sunblade2000: kbd/ms and umass disk on ohci. untested: - motg, slhci and ahci. motg has some portion of the new scheme applied, but slhci and ahci require more study. future work includes pushing a lot of the common abort handling into usbdi.c and leaving upm_abort() for HC specific tasks, but this change is pullup-able to netbsd-7 and netbsd-8 as it does not change any external API, as well as removing over 100 lines of code while adding over 30 new asserts. XXX: pullup-7, pullup-8. fix DIAGNOSTIC build by not copying ub_usepolling to stack before use Sprinkle __diagused 1.7.6.1 Sat Aug 25 11:29:52 UTC 2018 martin Pull up following revision(s) (requested by mrg in ticket #980): sys/dev/usb/usbdivar.h: revision 1.117 sys/external/bsd/dwc2/dwc2.c: revision 1.52 sys/dev/usb/xhcivar.h: revision 1.10 sys/dev/usb/motg.c: revision 1.22 sys/dev/usb/ehci.c: revision 1.260 sys/dev/usb/ehci.c: revision 1.261 sys/dev/usb/xhci.c: revision 1.96 sys/dev/usb/ohci.c: revision 1.282 sys/dev/usb/ohci.c: revision 1.283 sys/dev/usb/ehcivar.h: revision 1.45 sys/dev/usb/uhci.c: revision 1.281 sys/dev/usb/uhci.c: revision 1.282 sys/dev/usb/usbdi.c: revision 1.177 sys/dev/usb/ohcivar.h: revision 1.60 sys/dev/usb/uhcivar.h: revision 1.55 (all via patch) pull across abort fixes from nick-nhusb. add more abort fixes, using ideas from Taylor and Nick, and myself. special thanks to both who inspired much of the code here, if not wrote it directly. among other problems, this assert should no longer trigger: panic: kernel diagnostic assertion "xfer->ux_state == XFER_ONQU" failed: file "/current/src/sys/dev/usb/usbdi.c", line 914 using usbhist i was able to track down my instance of it being related to userland close() beginning, dropping the sc_lock, and then the usb softintr completes the transfer normally, and when it is done, the abort path attempts to re-complete the transfer, and the above assert is tripped. changes from nhusb were commited with these logs: -- Move the struct usb_task to struct usbd_xfer for everyone to use. -- Set device transfer status to USBD_IN_PROGRESS if start methods succeeds -- Actually set the transfer status on transfers in ohci_abort_xfer and the controller is dying -- Don't supply the lock to callout_halt when polling as it won't be held -- Improve transfer abort -- Mark device transfers as USBD_IN_PROGRESS appropriately and improve abort handling -- -- Mark device transfers as USBD_IN_PROGRESS appropriately and improve abort handling -- additional changes include: - initialise the usb abort task in the HCI allocx routine, so that it can be safely usb_rem_task()'d. - rework the handling of softintr vs cancellation vs timeout abort based upon a scheme from Taylor: when completing a transfer normally: - if the status is not in progress, it must be cancelled or timed out, and we should not process this xfer. - set the status as normal. - unconditionallly callout_stop() and usb_rem_task(). they're safe and either aren't running, or will run and do nothing. - finally call usb_transfer_complete(). when aborting a transfer: - status should be cancelled or timed out. - if cancelling, callout_halt and usb_rem_task_wait() to make sure the timer is either done or cancelled. - at this point, the ux_status must not be cancelled or timed out, and if it is not in progress we're done. - set the status. - if the controller is dying, just return. - perform HCI-specific tasks to abort this xfer. - finally call usb_transfer_complete(). for the timeout and timeout task: - if the HCI is not dying, and the ux_status is in progress, then trigger the usb abort task. - remove UXFER_ABORTWAIT and UXFER_ABORTING. tested on: - multiple PC systems with several types of devices: ugen/UPS, ucom, umass with disk, ssd and cdrom backends, kbd, ms, using uhci, ehci and xhci. - erlite3: sd@umass on dwc2. - sunblade2000: kbd/ms and umass disk on ohci. untested: - motg, slhci and ahci. motg has some portion of the new scheme applied, but slhci and ahci require more study. future work includes pushing a lot of the common abort handling into usbdi.c and leaving upm_abort() for HC specific tasks, but this change is pullup-able to netbsd-7 and netbsd-8 as it does not change any external API, as well as removing over 100 lines of code while adding over 30 new asserts. XXX: pullup-7, pullup-8. fix DIAGNOSTIC build by not copying ub_usepolling to stack before use Sprinkle __diagused |
| /src/sys/arch/sparc64/sparc64/ | |
| locore.s | 1.261 Mon Oct 22 01:43:39 UTC 2007 martin branches: 1.261.2; 1.261.4; 1.261.6; Remove an unused .globl declaration Mon Oct 22 01:43:39 UTC 2007 martin branches: 1.261.2; 1.261.4; 1.261.6; Remove an unused .globl declaration .2; 1.261.4; 1.261.6; Remove an unused .globl declaration .4; 1.261.6; Remove an unused .globl declaration 1.232.2.5 Thu Sep 25 19:40:12 UTC 2008 bouyer Pull up following revision(s) (requested by martin in ticket #945): sys/arch/sparc64/sparc64/locore.s: revision 1.261 Remove an unused .globl declaration 1.261.6.1 Tue Dec 11 15:20:46 UTC 2007 yamt sync with head. 1.261.4.1 Wed Dec 26 19:42:48 UTC 2007 ad Sync with head. 1.261.2.1 Mon Feb 18 21:05:07 UTC 2008 mjf Sync with HEAD. |
| /src/sys/net/ | |
| if_llatbl.c | 1.18.6.3 Tue Mar 13 13:27:10 UTC 2018 martin Pull up following revision(s) (requested by ozaki-r in ticket #622): sys/netinet/if_arp.c: revision 1.270 sys/net/if_llatbl.c: revision 1.24 (patch) sys/net/if_llatbl.c: revision 1.25 sys/net/if_llatbl.c: revision 1.26 sys/net/route.c: revision 1.204 sys/netinet6/in6.c: revision 1.261 sys/netinet6/in6.c: revision 1.262 (patch) sys/netinet6/in6.c: revision 1.263 sys/netinet/in.c: revision 1.216 sys/netinet6/in6.c: revision 1.264 sys/netinet6/nd6.c: revision 1.246 (patch) sys/netinet/if_arp.c: revision 1.269 sys/net/if_llatbl.h: revision 1.14 sys/netinet6/in6.c: revision 1.259 sys/netinet/in.c: revision 1.220 sys/netinet/in.c: revision 1.221 (patch) sys/netinet/in.c: revision 1.222 sys/netinet/in.c: revision 1.223 Suppress noisy debugging outputs Even if DEBUG they are too noisy under load. Tweak sanity checks Scheduling a timer of static entries is wrong. Add assertions We must not destroy llentries holding mbufs. Fix reference leaks of llentry callout_reset and callout_halt can cancel a pending callout without telling us. Detect a cancel and remove a reference by using callout_pending and callout_stop (it's a bit tricy though, we can detect it). While here, we can remove remaining abuses of mutex_owned for softnet_lock. Fix memory leaks on arp -d and ndp -d for static entries We have to delete entries on in_lltable_delete and in6_lltable_delete unconditionally. Note that we don't need to worry about LLE_IFADDR because there is no such entries now. Use pool(9) for llentry allocations llentry is easy to be leaked and pool suits for it because pool is usable to detect leaks. Also sweep unnecessary wrappers for llentry, in_llentry and in6_llentry. |
| if_llatbl.h | 1.10.8.3 Tue Mar 13 13:27:10 UTC 2018 martin Pull up following revision(s) (requested by ozaki-r in ticket #622): sys/netinet/if_arp.c: revision 1.270 sys/net/if_llatbl.c: revision 1.24 (patch) sys/net/if_llatbl.c: revision 1.25 sys/net/if_llatbl.c: revision 1.26 sys/net/route.c: revision 1.204 sys/netinet6/in6.c: revision 1.261 sys/netinet6/in6.c: revision 1.262 (patch) sys/netinet6/in6.c: revision 1.263 sys/netinet/in.c: revision 1.216 sys/netinet6/in6.c: revision 1.264 sys/netinet6/nd6.c: revision 1.246 (patch) sys/netinet/if_arp.c: revision 1.269 sys/net/if_llatbl.h: revision 1.14 sys/netinet6/in6.c: revision 1.259 sys/netinet/in.c: revision 1.220 sys/netinet/in.c: revision 1.221 (patch) sys/netinet/in.c: revision 1.222 sys/netinet/in.c: revision 1.223 Suppress noisy debugging outputs Even if DEBUG they are too noisy under load. Tweak sanity checks Scheduling a timer of static entries is wrong. Add assertions We must not destroy llentries holding mbufs. Fix reference leaks of llentry callout_reset and callout_halt can cancel a pending callout without telling us. Detect a cancel and remove a reference by using callout_pending and callout_stop (it's a bit tricy though, we can detect it). While here, we can remove remaining abuses of mutex_owned for softnet_lock. Fix memory leaks on arp -d and ndp -d for static entries We have to delete entries on in_lltable_delete and in6_lltable_delete unconditionally. Note that we don't need to worry about LLE_IFADDR because there is no such entries now. Use pool(9) for llentry allocations llentry is easy to be leaked and pool suits for it because pool is usable to detect leaks. Also sweep unnecessary wrappers for llentry, in_llentry and in6_llentry. |
| /src/sys/netatalk/ | |
| ddp_input.c | 1.29.8.1 Mon Apr 09 13:34:11 UTC 2018 bouyer Pull up following revision(s) (requested by roy in ticket #724): tests/net/icmp/t_ping.c: revision 1.19 sys/netinet6/raw_ip6.c: revision 1.166 sys/netinet6/ip6_input.c: revision 1.195 sys/net/raw_usrreq.c: revision 1.59 sys/sys/socketvar.h: revision 1.151 sys/kern/uipc_socket2.c: revision 1.128 tests/lib/libc/sys/t_recvmmsg.c: revision 1.2 lib/libc/sys/recv.2: revision 1.38 sys/net/rtsock.c: revision 1.239 sys/netinet/udp_usrreq.c: revision 1.246 sys/netinet6/icmp6.c: revision 1.224 tests/net/icmp/t_ping.c: revision 1.20 sys/netipsec/keysock.c: revision 1.63 sys/netinet/raw_ip.c: revision 1.172 sys/kern/uipc_socket.c: revision 1.260 tests/net/icmp/t_ping.c: revision 1.22 sys/kern/uipc_socket.c: revision 1.261 tests/net/icmp/t_ping.c: revision 1.23 sys/netinet/ip_mroute.c: revision 1.155 sbin/route/route.c: revision 1.159 sys/netinet6/ip6_mroute.c: revision 1.123 sys/netatalk/ddp_input.c: revision 1.31 sys/netcan/can.c: revision 1.3 sys/kern/uipc_usrreq.c: revision 1.184 sys/netinet6/udp6_usrreq.c: revision 1.138 tests/net/icmp/t_ping.c: revision 1.18 socket: report receive buffer overflows Add soroverflow() which increments the overflow counter, sets so_error to ENOBUFS and wakes the receive socket up. Replace all code that manually increments this counter with soroverflow(). Add soroverflow() to raw_input(). This allows userland to detect route(4) overflows so it can re-sync with the current state. socket: clear error even when peeking The error has already been reported and it's pointless requiring another recv(2) call just to clear it. socket: remove now incorrect comment that so_error is only udp As it can be affected by route(4) sockets which are raw. rtsock: log dropped messages that we cannot report to userland Handle ENOBUFS when receiving messages. Don't send messages if the receiver has died. Sprinkle more soroverflow(). Handle ENOBUFS in recv Handle ENOBUFS in sendto Note value received. Harden another sendto for ENOBUFS. Handle the routing socket overflowing gracefully. Allow a valid sendto .... duh Handle errors better. Fix test for checking we sent all the data we asked to. |
| /src/sys/sys/ | |
| proc.h | 1.261 Mon Nov 12 23:12:00 UTC 2007 ad branches: 1.261.2; Add _lwp_ctl() system call: provides a bidirectional, per-LWP communication area between processes and the kernel. Mon Nov 12 23:12:00 UTC 2007 ad branches: 1.261.2; Add _lwp_ctl() system call: provides a bidirectional, per-LWP communication area between processes and the kernel. 1.261.2.4 Wed Dec 26 23:05:55 UTC 2007 ad - Push kernel_lock back into exit, wait and sysctl system calls, mainly for visibility. - Serialize calls to brk() from within the same process. - Mark more syscalls MPSAFE. 1.261.2.3 Wed Dec 26 21:39:56 UTC 2007 ad Sync with head. 1.261.2.2 Sat Dec 15 03:16:53 UTC 2007 ad - Use pool_cache for a few more items and make those caches static. - Mark another 10 syscalls MPSAFE including execve(). A small bit of work is required to fix a couple of issues (tty, kqueue). 1.261.2.1 Sat Dec 08 17:58:07 UTC 2007 ad Sync with head. |