HomeSort by: relevance | last modified time | path
    Searched hist:1.355 (Results 1 - 25 of 80) sorted by relevancy

1 2 3 4

  /src/sys/dev/ata/
wd.c 1.355 Wed Jan 02 11:48:37 UTC 2008 ad branches: 1.355.2; 1.355.6;
Merge vmlocking2 to head.
Wed Jan 02 11:48:37 UTC 2008 ad branches: 1.355.2; 1.355.6;
Merge vmlocking2 to head.
.2; 1.355.6;
Merge vmlocking2 to head.
1.355.6.7 Sat Jan 17 13:28:52 UTC 2009 mjf Sync with HEAD.
1.355.6.6 Sun Jun 29 09:33:05 UTC 2008 mjf Sync with HEAD.
1.355.6.5 Mon Jun 02 13:23:13 UTC 2008 mjf Sync with HEAD.
1.355.6.4 Sun Apr 06 09:58:50 UTC 2008 mjf - after some discussion with agc@ i agreed it would be a good idea to move
device_unregister_* to device_deregister_* to be more like the pmf(9)
functions, especially since a lot of the time the function calls are next
to each other.

- add device_register_name() support for dk(4).
1.355.6.3 Fri Apr 04 21:21:11 UTC 2008 mjf * Catch up with selnotify() changes.

* Catch up with some softc changes in HEAD.

* More s/dctl/devfsctl/ changes.

* Remove debugging printfs from init(8) that slipped in by mistake.

* Cosmetic changes in devfsd, allow multiple attributes to be set in
one rule. Switch from err() to syslog() messages.

* Fix etc/devfsd.conf, I'd made some changes previously that had syntax
errors.
1.355.6.2 Thu Apr 03 00:42:38 UTC 2008 mjf Sync with HEAD.
1.355.6.1 Sat Mar 29 16:17:57 UTC 2008 mjf - etc/devfsd.conf: Add some rules to give nodes like /dev/tty and
/dev/null better default modes, i.e. 0666.

- sbin/init: Run devfsd -s before going to multiuser.

- sys/arch: Provide arm32, i386, sparc with a mem_init() function to request
device nodes for /dev/null, /dev/zero, etc.

- sys/dev: Convert rnd, wd, agp, raid, cd, sd, wsdisplay, wskbd, wsmouse,
wsmux, tty, bpf, swap to devfs New World Order.

- sys/fs/devfs: Make the visibility attribute of device nodes configurable.
Also provide a function to mount a devfs on boot.

- sys/kern: Add a new boot flag, -n. This disables devfs support. Unless
the -n flag is specified the kernel will mount a devfs file
system on boot.
  /src/sys/netinet/
ip_input.c 1.355 Thu Jun 01 02:45:14 UTC 2017 chs branches: 1.355.2;
remove checks for failure after memory allocation calls that cannot fail:

kmem_alloc() with KM_SLEEP
kmem_zalloc() with KM_SLEEP
percpu_alloc()
pserialize_create()
psref_class_create()

all of these paths include an assertion that the allocation has not failed,
so callers should not assert that again.
Thu Jun 01 02:45:14 UTC 2017 chs branches: 1.355.2;
remove checks for failure after memory allocation calls that cannot fail:

kmem_alloc() with KM_SLEEP
kmem_zalloc() with KM_SLEEP
percpu_alloc()
pserialize_create()
psref_class_create()

all of these paths include an assertion that the allocation has not failed,
so callers should not assert that again.
1.355.2.9 Sun Mar 07 19:13:24 UTC 2021 martin Pull up following revision(s) (requested by christos in ticket #1661):

sys/netinet6/ip6_id.c: revision 1.19-1.21
sys/netinet6/ip6_var.h: revision 1.88
sys/netinet/ip_input.c: revision 1.400
sys/netinet/tcp_subr.c: revision 1.285
sys/netinet/ip6.h: revision 1.30

netinet: Enable random IP fragment ids by default (from riastradh)

netinet: Enable RFC 1948 pseudorandom TCP ISS selection by default.
(from riastradh)

netinet6: Mark randomid unused.

Will make merging and bisection easier if anything goes wrong with
flow label or fragment id randomization changes.
(from riastradh)

netinet/netinet6: Add necessary includes to make these standalone.
(from riastradh)

Replace randomid() by cprng_fast32()
1.355.2.8 Tue Sep 24 18:27:10 UTC 2019 martin Pull up following revision(s) (requested by knakahara in ticket #1385):

sys/net/if.c 1.461
sys/net/if.h 1.277
sys/net/if_gif.c 1.149
sys/net/if_gif.h 1.33
sys/net/if_ipsec.c 1.19,1.20,1.24
sys/net/if_ipsec.h 1.5
sys/net/if_l2tp.c 1.33,1.36-1.39
sys/net/if_l2tp.h 1.7,1.8
sys/net/route.c 1.220,1.221
sys/net/route.h 1.125
sys/netinet/in_gif.c 1.95
sys/netinet/in_l2tp.c 1.17
sys/netinet/ip_input.c 1.391,1.392
sys/netinet/wqinput.c 1.6
sys/netinet6/in6_gif.c 1.94
sys/netinet6/in6_l2tp.c 1.18
sys/netinet6/ip6_forward.c 1.97
sys/netinet6/ip6_input.c 1.210,1.211
sys/netipsec/ipsec_output.c 1.82,1.83 (patched)
sys/netipsec/ipsecif.c 1.12,1.13,1.15,1.17 (patched)
sys/netipsec/key.c 1.259,1.260

ipsecif(4) support input drop packet counter.

ipsecif(4) should not increment drop counter by errors not related to if_snd. Pointed out by ozaki-r@n.o, thanks.
Remove unnecessary addresses in PF_KEY message.

MOBIKE Extensions for PF_KEY draft-schilcher-mobike-pfkey-extension-01.txt says
1.355.2.7 Tue Sep 17 18:57:23 UTC 2019 martin Pull up following revision(s) (requested by bouyer in ticket #1378):

sys/netinet6/ip6_input.c: revision 1.209 (patch)
sys/netinet/ip_input.c: revision 1.390 (patch)

Packet filters can return an mbuf chain with fragmented headers, so
m_pullup() it if needed and remove the KASSERT()s.
1.355.2.6 Sun Mar 18 10:57:01 UTC 2018 martin Pull up following revision(s) (requested by tih in ticket #639):
sys/kern/uipc_socket.c: revision 1.258
sys/kern/uipc_socket.c: revision 1.259
sys/netinet/ip_input.c: revision 1.364 (via patch)
sys/netinet/ip_output.c: revision 1.289
sys/netinet/in.h: revision 1.102
sys/netinet/in_pcb.c: revision 1.181
share/man/man9/sockopt.9: revision 1.11
sys/netinet/in_pcb.h: revision 1.65
sys/sys/socketvar.h: revision 1.146
sys/kern/uipc_syscalls.c: revision 1.189
sys/netinet/ip_output.c: revision 1.290
share/man/man4/ip.4: revision 1.41
share/man/man4/ip.4: revision 1.42
sys/kern/uipc_syscalls.c: revision 1.190

pass valsize for getsockopt like we do for setsockopt
make sure that we have enough space, don't require the exact size
(Tom Ivar Helbekkmo)

1) "#define ipi_spec_dst ipi_addr" in <netinet/in.h>
2) Change the IP_RECVPKTINFO option to control the generation of
IP_PKTINFO control messages, the way it's done in Solaris.
3) Remove the superfluous IP_RECVPKTINFO control message.
4) Change the IP_PKTINFO option to do different things depending on
the parameter it's supplied with:
- If it's sizeof(int), assume it's being used as in Linux:
- If it's non-zero, turn on the IP_RECVPKTINFO option.
- If it's zero, turn off the IP_RECVPKTINFO option.
- If it's sizeof(struct in_pktinfo), assume it's being used as in
Solaris, to set a default for the source interface and/or
source address for outgoing packets on the socket.
5) Return what Linux or Solaris compatible code expects, depending
on data size, and just added a fallback to a Linux (and current NetBSD)
compatible value if the size is unknown (as it is now), or,
in the future, if the calling application specifies a receiving
buffer that doesn't match either data item.

From: Tom Ivar Helbekkmo

new sentence-new line

Remove comment now that the getsockopt code passes the size.

Add a new sockopt member to keep track of the actual size of the option
that should be returned to the caller in getsockopt(2).
(Tom Ivar Helbekkmo)
1.355.2.5 Mon Feb 26 13:32:01 UTC 2018 martin Pull up following revision(s) (requested by ozaki-r in ticket #588):
sys/netinet6/in6.c: revision 1.260
sys/netinet/in.c: revision 1.219
sys/netinet/wqinput.c: revision 1.4
sys/rump/net/lib/libnetinet/netinet_component.c: revision 1.11
sys/netinet/ip_input.c: revision 1.376
sys/netinet6/ip6_input.c: revision 1.193
Avoid a deadlock between softnet_lock and IFNET_LOCK

A deadlock occurs because there is a violation of the rule of lock ordering;
softnet_lock is held with hodling IFNET_LOCK, which violates the rule.
To avoid the deadlock, replace softnet_lock in in_control and in6_control
with KERNEL_LOCK.

We also need to add some KERNEL_LOCKs to protect the network stack surely.
This is required, for example, for PR kern/51356.

Fix PR kern/53043
1.355.2.4 Mon Feb 12 18:23:29 UTC 2018 snj Pull up following revision(s) (requested by maxv in ticket #547):
sys/netinet/ip_input.c: 1.366
Disable ip_allowsrcrt and ip_forwsrcrt. Enabling them by default was a
completely dumb idea, because they have security implications.
By sending an IPv4 packet containing an LSRR option, an attacker will
cause the system to forward the packet to another IPv4 address - and
this way he white-washes the source of the packet.
It is also possible for an attacker to reach hidden networks: if a server
has a public address, and a private one on an internal network (network
which has several internal machines connected), the attacker can send a
packet with:
source = 0.0.0.0
destination = public address of the server
LSRR first address = address of a machine on the internal network
And the packet will be forwarded, by the server, to the internal machine,
in some cases even with the internal IP address of the server as a source.
1.355.2.3 Tue Jan 02 10:20:34 UTC 2018 snj Pull up following revision(s) (requested by ozaki-r in ticket #456):
sys/arch/arm/sunxi/sunxi_emac.c: 1.9
sys/dev/ic/dwc_gmac.c: 1.43-1.44
sys/dev/pci/if_iwm.c: 1.75
sys/dev/pci/if_wm.c: 1.543
sys/dev/pci/ixgbe/ixgbe.c: 1.112
sys/dev/pci/ixgbe/ixv.c: 1.74
sys/kern/sys_socket.c: 1.75
sys/net/agr/if_agr.c: 1.43
sys/net/bpf.c: 1.219
sys/net/if.c: 1.397, 1.399, 1.401-1.403, 1.406-1.410, 1.412-1.416
sys/net/if.h: 1.242-1.247, 1.250, 1.252-1.257
sys/net/if_bridge.c: 1.140 via patch, 1.142-1.146
sys/net/if_etherip.c: 1.40
sys/net/if_ethersubr.c: 1.243, 1.246
sys/net/if_faith.c: 1.57
sys/net/if_gif.c: 1.132
sys/net/if_l2tp.c: 1.15, 1.17
sys/net/if_loop.c: 1.98-1.101
sys/net/if_media.c: 1.35
sys/net/if_pppoe.c: 1.131-1.132
sys/net/if_spppsubr.c: 1.176-1.177
sys/net/if_tun.c: 1.142
sys/net/if_vlan.c: 1.107, 1.109, 1.114-1.121
sys/net/npf/npf_ifaddr.c: 1.3
sys/net/npf/npf_os.c: 1.8-1.9
sys/net/rtsock.c: 1.230
sys/netcan/if_canloop.c: 1.3-1.5
sys/netinet/if_arp.c: 1.255
sys/netinet/igmp.c: 1.65
sys/netinet/in.c: 1.210-1.211
sys/netinet/in_pcb.c: 1.180
sys/netinet/ip_carp.c: 1.92, 1.94
sys/netinet/ip_flow.c: 1.81
sys/netinet/ip_input.c: 1.362
sys/netinet/ip_mroute.c: 1.147
sys/netinet/ip_output.c: 1.283, 1.285, 1.287
sys/netinet6/frag6.c: 1.61
sys/netinet6/in6.c: 1.251, 1.255
sys/netinet6/in6_pcb.c: 1.162
sys/netinet6/ip6_flow.c: 1.35
sys/netinet6/ip6_input.c: 1.183
sys/netinet6/ip6_output.c: 1.196
sys/netinet6/mld6.c: 1.90
sys/netinet6/nd6.c: 1.239-1.240
sys/netinet6/nd6_nbr.c: 1.139
sys/netinet6/nd6_rtr.c: 1.136
sys/netipsec/ipsec_output.c: 1.65
sys/rump/net/lib/libnetinet/netinet_component.c: 1.9-1.10
kmem_intr_free kmem_intr_[z]alloced memory
the underlying pools are the same but api-wise those should match
Unify IFEF_*_MPSAFE into IFEF_MPSAFE
There are already two flags for if_output and if_start, however, it seems such
MPSAFE flags are eventually needed for all if_XXX operations. Having discrete
flags for each operation is wasteful of if_extflags bits. So let's unify
the flags into one: IFEF_MPSAFE.
Fortunately IFEF_*_MPSAFE flags have never been included in any releases, so
we can change them without breaking backward compatibility of the releases
(though the kernel version of -current should be bumped).
Note that if an interface have both MP-safe and non-MP-safe operations at a
time, we have to set the IFEF_MPSAFE flag and let callees of non-MP-safe
opeartions take the kernel lock.
Proposed on tech-kern@ and tech-net@
Provide macros for softnet_lock and KERNEL_LOCK hiding NET_MPSAFE switch
It reduces C&P codes such as "#ifndef NET_MPSAFE KERNEL_LOCK(1, NULL); ..."
scattered all over the source code and makes it easy to identify remaining
KERNEL_LOCK and/or softnet_lock that are held even if NET_MPSAFE.
No functional change
Hold KERNEL_LOCK on if_ioctl selectively based on IFEF_MPSAFE
If IFEF_MPSAFE is set, hold the lock and otherwise don't hold.
This change requires additions of KERNEL_LOCK to subsequence functions from
if_ioctl such as ifmedia_ioctl and ifioctl_common to protect non-MP-safe
components.
Proposed on tech-kern@ and tech-net@
Ensure to hold if_ioctl_lock when calling if_flags_set
Fix locking against myself on ifpromisc
vlan_unconfig_locked could be called with holding if_ioctl_lock.
Ensure to not turn on IFF_RUNNING of an interface until its initialization completes
And ensure to turn off it before destruction as per IFF_RUNNING's description
"resource allocated". (The description is a bit doubtful though, I believe the
change is still proper.)
Ensure to hold if_ioctl_lock on if_up and if_down
One exception for if_down is if_detach; in the case the lock isn't needed
because it's guaranteed that no other one can access ifp at that point.
Make if_link_queue MP-safe if IFEF_MPSAFE
if_link_queue is a queue to store events of link state changes, which is
used to pass events from (typically) an interrupt handler to
if_link_state_change softint. The queue was protected by KERNEL_LOCK so far,
but if IFEF_MPSAFE is enabled, it becomes unsafe because (perhaps) an interrupt
handler of an interface with IFEF_MPSAFE doesn't take KERNEL_LOCK. Protect it
by a spin mutex.
Additionally with this change KERNEL_LOCK of if_link_state_change softint is
omitted if NET_MPSAFE is enabled.
Note that the spin mutex is now ifp->if_snd.ifq_lock as well as the case of
if_timer (see the comment).
Use IFADDR_WRITER_FOREACH instead of IFADDR_READER_FOREACH
At that point no other one modifies the list so IFADDR_READER_FOREACH
is unnecessary. Use of IFADDR_READER_FOREACH is harmless in general though,
if we try to detect contract violations of pserialize, using it violates
the contract. So avoid using it makes life easy.
Ensure to call if_addr_init with holding if_ioctl_lock
Get rid of outdated comments
Fix build of kernels without ether
By throwing out if_enable_vlan_mtu and if_disable_vlan_mtu that
created a unnecessary dependency from if.c to if_ethersubr.c.
PR kern/52790
Rename IFNET_LOCK to IFNET_GLOBAL_LOCK
IFNET_LOCK will be used in another lock, if_ioctl_lock (might be renamed then).
Wrap if_ioctl_lock with IFNET_* macros (NFC)
Also if_ioctl_lock perhaps needs to be renamed to something because it's now
not just for ioctl...
Reorder some destruction routines in if_detach
- Destroy if_ioctl_lock at the end of the if_detach because it's used in various
destruction routines
- Move psref_target_destroy after pr_purgeif because we want to use psref in
pr_purgeif (otherwise destruction procedures can be tricky)
Ensure to call if_mcast_op with holding IFNET_LOCK
Note that CARP doesn't deal with IFNET_LOCK yet.
Remove IFNET_GLOBAL_LOCK where it's unnecessary because IFNET_LOCK is held
Describe which lock is used to protect each member variable of struct ifnet
Requested by skrll@
Write a guideline for converting an interface to IFEF_MPSAFE
Requested by skrll@
Note that IFNET_LOCK must not be held in softint
Don't set IFEF_MPSAFE unless NET_MPSAFE at this point
Because recent investigations show that interfaces with IFEF_MPSAFE need to
follow additional restrictions to work with the flag safely. We should enable it
on an interface by default only if the interface surely satisfies the
restrictions, which are described in if.h.
Note that enabling IFEF_MPSAFE solely gains a few benefit on performance because
the network stack is still serialized by the big kernel locks by default.
1.355.2.2 Sun Dec 10 09:24:30 UTC 2017 snj Pull up following revision(s) (requested by roy in ticket #390):
sys/netinet/ip_input.c: 1.363
sys/netinet6/ip6_input.c: 1.184-1.185
sys/netinet6/ip6_output.c: 1.194-1.195
sys/netinet6/in6_src.c: 1.83-1.84
Allow local communication over DETACHED addresses.
Allow binding to DETACHED or TENTATIVE addresses as we deny
sending upstream from them anyway.
Prefer non DETACHED or TENTATIVE addresses.
--
Attempt to restore v6 networking. Not 100% certain that these
changes are all that is needed, but they're certainly a big part of it
(especially the ip6_input.c change.)
--
Treat unvalidated addresses as deprecated in rule 3.
  /src/sys/arch/i386/conf/
files.i386 1.355 Thu Jul 08 11:24:59 UTC 2010 rmind branches: 1.355.2; 1.355.4;
Unify i386 and amd64 procfs MD code into x86.
Thu Jul 08 11:24:59 UTC 2010 rmind branches: 1.355.2; 1.355.4;
Unify i386 and amd64 procfs MD code into x86.
.2; 1.355.4;
Unify i386 and amd64 procfs MD code into x86.
1.355.4.1 Sat Mar 05 15:09:43 UTC 2011 bouyer Sync with HEAD
1.355.2.1 Mon Jun 06 09:05:48 UTC 2011 jruoho Sync with HEAD.
  /src/sys/dev/scsipi/
cd.c 1.355 Sat Jun 22 10:07:46 UTC 2024 palle branches: 1.355.2;
Add quirk for devices that does not handle READ_DISCINFO
Sat Jun 22 10:07:46 UTC 2024 palle branches: 1.355.2;
Add quirk for devices that does not handle READ_DISCINFO
1.355.2.1 Sat Aug 02 05:57:03 UTC 2025 perseant Sync with HEAD
  /src/sys/kern/
init_main.c 1.355 Thu May 01 14:44:48 UTC 2008 ad branches: 1.355.2;
Get the pre-loaded module code working.
Thu May 01 14:44:48 UTC 2008 ad branches: 1.355.2;
Get the pre-loaded module code working.
1.355.2.5 Fri Oct 10 22:34:14 UTC 2008 skrll Sync with HEAD.
1.355.2.4 Thu Sep 18 04:31:41 UTC 2008 wrstuden Sync with wrstuden-revivesa-base-2.
1.355.2.3 Mon Jun 23 04:31:50 UTC 2008 wrstuden Sync w/ -current. 34 merge conflicts to follow.
1.355.2.2 Wed May 14 01:35:12 UTC 2008 wrstuden Per discussion with ad, remove most of the #include <sys/sa.h> lines
as they were including sa.h just for the type(s) needed for syscallargs.h.

Instead, create a new file, sys/satypes.h, which contains just the
types needed for syscallargs.h. Yes, there's only one now, but that
may change and it's probably more likely to change if it'd be difficult
to handle. :-)

Per discussion with matt at n dot o, add an include of satypes.h to
sigtypes.h. Upcall handlers are kinda signal handlers, and signalling
is the header file that's already included for syscallargs.h that
closest matches SA.

This shaves about 3000 lines off of the diff of the branch relative
to the base. That also represents about 18% of the total before this
checkin.

I think this reduction is very good thing.
1.355.2.1 Sat May 10 23:49:02 UTC 2008 wrstuden Initial checkin of re-adding SA. Everything except kern_sa.c
compiles in GENERIC for i386. This is still a work-in-progress, but
this checkin covers most of the mechanical work (changing signalling
to be able to accomidate SA's process-wide signalling and re-adding
includes of sys/sa.h and savar.h). Subsequent changes will be much
more interesting.

Also, kern_sa.c has received partial cleanup. There's still more
to do, though.
kern_exec.c 1.355 Wed Aug 29 18:56:39 UTC 2012 dholland branches: 1.355.2;
Add missing newline to printf (in the disabled code for $ORIGIN).
Wed Aug 29 18:56:39 UTC 2012 dholland branches: 1.355.2;
Add missing newline to printf (in the disabled code for $ORIGIN).
1.355.2.4 Sun Dec 03 11:38:44 UTC 2017 jdolecek update from HEAD
1.355.2.3 Wed Aug 20 00:04:28 UTC 2014 tls Rebase to HEAD as of a few days ago.
1.355.2.2 Sun Jun 23 06:18:57 UTC 2013 tls resync from head
1.355.2.1 Tue Nov 20 03:02:42 UTC 2012 tls Resync to 2012-11-19 00:00:00 UTC
  /src/doc/
BRANCHES 1.355 Sun Nov 01 15:41:56 UTC 2020 thorpej Document the thorpej-futex branch.
  /src/usr.bin/make/
make.1 1.355 Sun Jan 01 19:10:58 UTC 2023 rillig make.1: sync list of built-in variables with reality

Fixes PR 57029.
1.350.2.1 Mon Jan 02 10:11:24 UTC 2023 martin Pull up following revision(s) (requested by rillig in ticket #31):

usr.bin/make/make.1: revision 1.351
usr.bin/make/make.1: revision 1.352
usr.bin/make/make.1: revision 1.353
usr.bin/make/make.1: revision 1.354
usr.bin/make/make.1: revision 1.355
usr.bin/make/make.1: revision 1.356

make.1: reduce indentation of the long list of variable names

make.1: move description of .MAKE.MODE below the .MAKE.META block

make.1: use consistent markup for boolean flags

make.1: sort list of built-in variables

make.1: sync list of built-in variables with reality
Fixes PR 57029.

make.1: fix markup
cond.c 1.355 Sun Nov 19 22:50:11 UTC 2023 rillig make: replace 'variable expression' with 'expression' in comments

No binary change.
suff.c 1.355 Sun Nov 28 22:48:06 UTC 2021 rillig make: move duplicate function Buf_AddFlag to buf.c

It is used only for debug output, therefore performance doesn't matter.

No functional change.
make.h 1.355 Sun May 18 06:24:27 UTC 2025 rillig make: rename variables, remove now-redundant comments
  /src/share/misc/
acronyms.comp 1.355 Mon Jun 12 21:00:38 UTC 2023 alnsn Add DPDK.
  /src/distrib/notes/common/
main 1.355 Sun Oct 07 23:46:16 UTC 2007 jnemeth expand details about removed components
1.320.2.5 Tue Oct 30 15:24:14 UTC 2007 liamjfoy Pull up following revision(s) (requested by pavel in ticket #962):
distrib/notes/common/main: revision 1.360
distrib/notes/common/main: revision 1.361
distrib/notes/common/main: revision 1.362
distrib/notes/common/main: revision 1.363
distrib/notes/common/main: revision 1.364
distrib/notes/common/main: revision 1.355
distrib/notes/common/main: revision 1.357
distrib/notes/common/main: revision 1.358
distrib/notes/common/main: revision 1.359
expand details about removed components

Add a blurb about sendmail->postfix transition.
Do not say that one should extract etc.tgz into a temporary directory
before running postinstall, postinstall does it itself.
Mention that sysinst runs "postinstall fix".

use .Sy for emphasis instead of .Ic

add mention of _sdpd/_sdpd user/group in the compatibility section

sort users/groups to be manually created

group rwhod -> _rwhod and add user _rwhod

no such user as _authpf, just a group

regen the list of changes from
htdocs/releases/formal-4/NetBSD-4.0.xml#major-changes, rev. 1.28.

bump date.
  /src/sys/ufs/ffs/
ffs_vfsops.c 1.355 Wed Nov 15 21:21:18 UTC 2017 christos PR/52728: Izumi Tsutsui: "mount -u /dev/ /" triggers kernel panic
Simplify the control flow of the mount code and make sure that the
mountfrom argument can be converted to a block device in the update
case.
XXX: pullup-8
1.353.4.2 Wed Apr 11 14:49:08 UTC 2018 martin Pull up following revision(s) (requested by christos in ticket #738):

sys/ufs/ffs/ffs_vfsops.c: revision 1.355

PR/52728: Izumi Tsutsui: "mount -u /dev/ /" triggers kernel panic

Simplify the control flow of the mount code and make sure that the
mountfrom argument can be converted to a block device in the update
case.
  /src/
UPDATING 1.355 Tue Aug 13 09:49:05 UTC 2024 martin Note gdb switch may require removing tool gdb build dirs.
  /src/share/man/man4/
options.4 1.355 Sun Dec 02 21:09:21 UTC 2007 wiz Use Fn; fix duplicate word and time problem. Use Cd for options.
  /src/sys/arch/sparc/sparc/
pmap.c 1.355 Tue Dec 10 17:24:47 UTC 2013 macallan shut up an unused variable warning that shows up in UP kernels
  /src/sys/dev/ic/
com.c 1.355 Fri Jan 11 23:10:40 UTC 2019 thorpej Simplify regmap initialization, and fix an regmap issue that
affected TI OMAP (LCR register would get clobbered due to
using the wrong offset for the MDR1 register) reported by Lwazi Dube
(who also found the root cause).
  /src/sys/rump/librump/rumpkern/
rump.c 1.355 Mon Mar 28 20:49:32 UTC 2022 christos no need to include suser; it gets autoloaded as a module.
  /src/usr.bin/indent/
indent.c 1.355 Sat Jun 10 18:46:42 UTC 2023 rillig indent: fix line break between semicolon and brace
  /src/sys/dev/pci/
pcidevs 1.355 Wed Sep 05 13:46:51 UTC 2001 drochner branches: 1.355.2;
we (research center Juelich) are a PCISIG member now - add the vendor ID
and some products
Wed Sep 05 13:46:51 UTC 2001 drochner branches: 1.355.2;
we (research center Juelich) are a PCISIG member now - add the vendor ID
and some products
1.355.2.2 Thu Oct 11 00:02:11 UTC 2001 fvdl Catch up with -current. Fix some bogons in the sparc64 kbd/ms
attach code. cd18xx conversion provided by mrg.
1.355.2.1 Mon Oct 01 00:45:58 UTC 2001 fvdl Catch up with -current.
  /src/usr.bin/make/unit-tests/
Makefile 1.355 Sat Jan 25 22:46:30 UTC 2025 sjg make/unit-tests: avoid failure on NFS

The 'rm -rf ${TMPDIR}' at the end of the 'test' target, fails
when building on NFS because the temp file used for the target script
keeps the directory from being empty.

Move it to a separate target attached to '.END'

Reviewed by: rillig
  /src/usr.bin/xlint/lint1/
decl.c 1.355 Thu Jul 13 23:27:20 UTC 2023 rillig lint: merge duplicate code for checking duplicate type qualifiers
cgram.y 1.355 Wed Aug 11 05:19:32 UTC 2021 rillig lint: allow GCC __attribute__ after array brackets

GCC accepts this, so should lint. Seen in pam_lastlog.c:115.
  /src/sys/arch/mac68k/mac68k/
machdep.c 1.355 Sun Aug 18 07:05:16 UTC 2019 rin 0x%p ---> %p

Completed in 779 milliseconds

1 2 3 4