| Home | Sort by: relevance | last modified time | path |
| /src/sys/dev/ata/ | |
| wd.c | 1.355 Wed Jan 02 11:48:37 UTC 2008 ad branches: 1.355.2; 1.355.6; Merge vmlocking2 to head. Wed Jan 02 11:48:37 UTC 2008 ad branches: 1.355.2; 1.355.6; Merge vmlocking2 to head. .2; 1.355.6; Merge vmlocking2 to head. 1.355.6.7 Sat Jan 17 13:28:52 UTC 2009 mjf Sync with HEAD. 1.355.6.6 Sun Jun 29 09:33:05 UTC 2008 mjf Sync with HEAD. 1.355.6.5 Mon Jun 02 13:23:13 UTC 2008 mjf Sync with HEAD. 1.355.6.4 Sun Apr 06 09:58:50 UTC 2008 mjf - after some discussion with agc@ i agreed it would be a good idea to move device_unregister_* to device_deregister_* to be more like the pmf(9) functions, especially since a lot of the time the function calls are next to each other. - add device_register_name() support for dk(4). 1.355.6.3 Fri Apr 04 21:21:11 UTC 2008 mjf * Catch up with selnotify() changes. * Catch up with some softc changes in HEAD. * More s/dctl/devfsctl/ changes. * Remove debugging printfs from init(8) that slipped in by mistake. * Cosmetic changes in devfsd, allow multiple attributes to be set in one rule. Switch from err() to syslog() messages. * Fix etc/devfsd.conf, I'd made some changes previously that had syntax errors. 1.355.6.2 Thu Apr 03 00:42:38 UTC 2008 mjf Sync with HEAD. 1.355.6.1 Sat Mar 29 16:17:57 UTC 2008 mjf - etc/devfsd.conf: Add some rules to give nodes like /dev/tty and /dev/null better default modes, i.e. 0666. - sbin/init: Run devfsd -s before going to multiuser. - sys/arch: Provide arm32, i386, sparc with a mem_init() function to request device nodes for /dev/null, /dev/zero, etc. - sys/dev: Convert rnd, wd, agp, raid, cd, sd, wsdisplay, wskbd, wsmouse, wsmux, tty, bpf, swap to devfs New World Order. - sys/fs/devfs: Make the visibility attribute of device nodes configurable. Also provide a function to mount a devfs on boot. - sys/kern: Add a new boot flag, -n. This disables devfs support. Unless the -n flag is specified the kernel will mount a devfs file system on boot. |
| /src/sys/netinet/ | |
| ip_input.c | 1.355 Thu Jun 01 02:45:14 UTC 2017 chs branches: 1.355.2; remove checks for failure after memory allocation calls that cannot fail: kmem_alloc() with KM_SLEEP kmem_zalloc() with KM_SLEEP percpu_alloc() pserialize_create() psref_class_create() all of these paths include an assertion that the allocation has not failed, so callers should not assert that again. Thu Jun 01 02:45:14 UTC 2017 chs branches: 1.355.2; remove checks for failure after memory allocation calls that cannot fail: kmem_alloc() with KM_SLEEP kmem_zalloc() with KM_SLEEP percpu_alloc() pserialize_create() psref_class_create() all of these paths include an assertion that the allocation has not failed, so callers should not assert that again. 1.355.2.9 Sun Mar 07 19:13:24 UTC 2021 martin Pull up following revision(s) (requested by christos in ticket #1661): sys/netinet6/ip6_id.c: revision 1.19-1.21 sys/netinet6/ip6_var.h: revision 1.88 sys/netinet/ip_input.c: revision 1.400 sys/netinet/tcp_subr.c: revision 1.285 sys/netinet/ip6.h: revision 1.30 netinet: Enable random IP fragment ids by default (from riastradh) netinet: Enable RFC 1948 pseudorandom TCP ISS selection by default. (from riastradh) netinet6: Mark randomid unused. Will make merging and bisection easier if anything goes wrong with flow label or fragment id randomization changes. (from riastradh) netinet/netinet6: Add necessary includes to make these standalone. (from riastradh) Replace randomid() by cprng_fast32() 1.355.2.8 Tue Sep 24 18:27:10 UTC 2019 martin Pull up following revision(s) (requested by knakahara in ticket #1385): sys/net/if.c 1.461 sys/net/if.h 1.277 sys/net/if_gif.c 1.149 sys/net/if_gif.h 1.33 sys/net/if_ipsec.c 1.19,1.20,1.24 sys/net/if_ipsec.h 1.5 sys/net/if_l2tp.c 1.33,1.36-1.39 sys/net/if_l2tp.h 1.7,1.8 sys/net/route.c 1.220,1.221 sys/net/route.h 1.125 sys/netinet/in_gif.c 1.95 sys/netinet/in_l2tp.c 1.17 sys/netinet/ip_input.c 1.391,1.392 sys/netinet/wqinput.c 1.6 sys/netinet6/in6_gif.c 1.94 sys/netinet6/in6_l2tp.c 1.18 sys/netinet6/ip6_forward.c 1.97 sys/netinet6/ip6_input.c 1.210,1.211 sys/netipsec/ipsec_output.c 1.82,1.83 (patched) sys/netipsec/ipsecif.c 1.12,1.13,1.15,1.17 (patched) sys/netipsec/key.c 1.259,1.260 ipsecif(4) support input drop packet counter. ipsecif(4) should not increment drop counter by errors not related to if_snd. Pointed out by ozaki-r@n.o, thanks. Remove unnecessary addresses in PF_KEY message. MOBIKE Extensions for PF_KEY draft-schilcher-mobike-pfkey-extension-01.txt says 1.355.2.7 Tue Sep 17 18:57:23 UTC 2019 martin Pull up following revision(s) (requested by bouyer in ticket #1378): sys/netinet6/ip6_input.c: revision 1.209 (patch) sys/netinet/ip_input.c: revision 1.390 (patch) Packet filters can return an mbuf chain with fragmented headers, so m_pullup() it if needed and remove the KASSERT()s. 1.355.2.6 Sun Mar 18 10:57:01 UTC 2018 martin Pull up following revision(s) (requested by tih in ticket #639): sys/kern/uipc_socket.c: revision 1.258 sys/kern/uipc_socket.c: revision 1.259 sys/netinet/ip_input.c: revision 1.364 (via patch) sys/netinet/ip_output.c: revision 1.289 sys/netinet/in.h: revision 1.102 sys/netinet/in_pcb.c: revision 1.181 share/man/man9/sockopt.9: revision 1.11 sys/netinet/in_pcb.h: revision 1.65 sys/sys/socketvar.h: revision 1.146 sys/kern/uipc_syscalls.c: revision 1.189 sys/netinet/ip_output.c: revision 1.290 share/man/man4/ip.4: revision 1.41 share/man/man4/ip.4: revision 1.42 sys/kern/uipc_syscalls.c: revision 1.190 pass valsize for getsockopt like we do for setsockopt make sure that we have enough space, don't require the exact size (Tom Ivar Helbekkmo) 1) "#define ipi_spec_dst ipi_addr" in <netinet/in.h> 2) Change the IP_RECVPKTINFO option to control the generation of IP_PKTINFO control messages, the way it's done in Solaris. 3) Remove the superfluous IP_RECVPKTINFO control message. 4) Change the IP_PKTINFO option to do different things depending on the parameter it's supplied with: - If it's sizeof(int), assume it's being used as in Linux: - If it's non-zero, turn on the IP_RECVPKTINFO option. - If it's zero, turn off the IP_RECVPKTINFO option. - If it's sizeof(struct in_pktinfo), assume it's being used as in Solaris, to set a default for the source interface and/or source address for outgoing packets on the socket. 5) Return what Linux or Solaris compatible code expects, depending on data size, and just added a fallback to a Linux (and current NetBSD) compatible value if the size is unknown (as it is now), or, in the future, if the calling application specifies a receiving buffer that doesn't match either data item. From: Tom Ivar Helbekkmo new sentence-new line Remove comment now that the getsockopt code passes the size. Add a new sockopt member to keep track of the actual size of the option that should be returned to the caller in getsockopt(2). (Tom Ivar Helbekkmo) 1.355.2.5 Mon Feb 26 13:32:01 UTC 2018 martin Pull up following revision(s) (requested by ozaki-r in ticket #588): sys/netinet6/in6.c: revision 1.260 sys/netinet/in.c: revision 1.219 sys/netinet/wqinput.c: revision 1.4 sys/rump/net/lib/libnetinet/netinet_component.c: revision 1.11 sys/netinet/ip_input.c: revision 1.376 sys/netinet6/ip6_input.c: revision 1.193 Avoid a deadlock between softnet_lock and IFNET_LOCK A deadlock occurs because there is a violation of the rule of lock ordering; softnet_lock is held with hodling IFNET_LOCK, which violates the rule. To avoid the deadlock, replace softnet_lock in in_control and in6_control with KERNEL_LOCK. We also need to add some KERNEL_LOCKs to protect the network stack surely. This is required, for example, for PR kern/51356. Fix PR kern/53043 1.355.2.4 Mon Feb 12 18:23:29 UTC 2018 snj Pull up following revision(s) (requested by maxv in ticket #547): sys/netinet/ip_input.c: 1.366 Disable ip_allowsrcrt and ip_forwsrcrt. Enabling them by default was a completely dumb idea, because they have security implications. By sending an IPv4 packet containing an LSRR option, an attacker will cause the system to forward the packet to another IPv4 address - and this way he white-washes the source of the packet. It is also possible for an attacker to reach hidden networks: if a server has a public address, and a private one on an internal network (network which has several internal machines connected), the attacker can send a packet with: source = 0.0.0.0 destination = public address of the server LSRR first address = address of a machine on the internal network And the packet will be forwarded, by the server, to the internal machine, in some cases even with the internal IP address of the server as a source. 1.355.2.3 Tue Jan 02 10:20:34 UTC 2018 snj Pull up following revision(s) (requested by ozaki-r in ticket #456): sys/arch/arm/sunxi/sunxi_emac.c: 1.9 sys/dev/ic/dwc_gmac.c: 1.43-1.44 sys/dev/pci/if_iwm.c: 1.75 sys/dev/pci/if_wm.c: 1.543 sys/dev/pci/ixgbe/ixgbe.c: 1.112 sys/dev/pci/ixgbe/ixv.c: 1.74 sys/kern/sys_socket.c: 1.75 sys/net/agr/if_agr.c: 1.43 sys/net/bpf.c: 1.219 sys/net/if.c: 1.397, 1.399, 1.401-1.403, 1.406-1.410, 1.412-1.416 sys/net/if.h: 1.242-1.247, 1.250, 1.252-1.257 sys/net/if_bridge.c: 1.140 via patch, 1.142-1.146 sys/net/if_etherip.c: 1.40 sys/net/if_ethersubr.c: 1.243, 1.246 sys/net/if_faith.c: 1.57 sys/net/if_gif.c: 1.132 sys/net/if_l2tp.c: 1.15, 1.17 sys/net/if_loop.c: 1.98-1.101 sys/net/if_media.c: 1.35 sys/net/if_pppoe.c: 1.131-1.132 sys/net/if_spppsubr.c: 1.176-1.177 sys/net/if_tun.c: 1.142 sys/net/if_vlan.c: 1.107, 1.109, 1.114-1.121 sys/net/npf/npf_ifaddr.c: 1.3 sys/net/npf/npf_os.c: 1.8-1.9 sys/net/rtsock.c: 1.230 sys/netcan/if_canloop.c: 1.3-1.5 sys/netinet/if_arp.c: 1.255 sys/netinet/igmp.c: 1.65 sys/netinet/in.c: 1.210-1.211 sys/netinet/in_pcb.c: 1.180 sys/netinet/ip_carp.c: 1.92, 1.94 sys/netinet/ip_flow.c: 1.81 sys/netinet/ip_input.c: 1.362 sys/netinet/ip_mroute.c: 1.147 sys/netinet/ip_output.c: 1.283, 1.285, 1.287 sys/netinet6/frag6.c: 1.61 sys/netinet6/in6.c: 1.251, 1.255 sys/netinet6/in6_pcb.c: 1.162 sys/netinet6/ip6_flow.c: 1.35 sys/netinet6/ip6_input.c: 1.183 sys/netinet6/ip6_output.c: 1.196 sys/netinet6/mld6.c: 1.90 sys/netinet6/nd6.c: 1.239-1.240 sys/netinet6/nd6_nbr.c: 1.139 sys/netinet6/nd6_rtr.c: 1.136 sys/netipsec/ipsec_output.c: 1.65 sys/rump/net/lib/libnetinet/netinet_component.c: 1.9-1.10 kmem_intr_free kmem_intr_[z]alloced memory the underlying pools are the same but api-wise those should match Unify IFEF_*_MPSAFE into IFEF_MPSAFE There are already two flags for if_output and if_start, however, it seems such MPSAFE flags are eventually needed for all if_XXX operations. Having discrete flags for each operation is wasteful of if_extflags bits. So let's unify the flags into one: IFEF_MPSAFE. Fortunately IFEF_*_MPSAFE flags have never been included in any releases, so we can change them without breaking backward compatibility of the releases (though the kernel version of -current should be bumped). Note that if an interface have both MP-safe and non-MP-safe operations at a time, we have to set the IFEF_MPSAFE flag and let callees of non-MP-safe opeartions take the kernel lock. Proposed on tech-kern@ and tech-net@ Provide macros for softnet_lock and KERNEL_LOCK hiding NET_MPSAFE switch It reduces C&P codes such as "#ifndef NET_MPSAFE KERNEL_LOCK(1, NULL); ..." scattered all over the source code and makes it easy to identify remaining KERNEL_LOCK and/or softnet_lock that are held even if NET_MPSAFE. No functional change Hold KERNEL_LOCK on if_ioctl selectively based on IFEF_MPSAFE If IFEF_MPSAFE is set, hold the lock and otherwise don't hold. This change requires additions of KERNEL_LOCK to subsequence functions from if_ioctl such as ifmedia_ioctl and ifioctl_common to protect non-MP-safe components. Proposed on tech-kern@ and tech-net@ Ensure to hold if_ioctl_lock when calling if_flags_set Fix locking against myself on ifpromisc vlan_unconfig_locked could be called with holding if_ioctl_lock. Ensure to not turn on IFF_RUNNING of an interface until its initialization completes And ensure to turn off it before destruction as per IFF_RUNNING's description "resource allocated". (The description is a bit doubtful though, I believe the change is still proper.) Ensure to hold if_ioctl_lock on if_up and if_down One exception for if_down is if_detach; in the case the lock isn't needed because it's guaranteed that no other one can access ifp at that point. Make if_link_queue MP-safe if IFEF_MPSAFE if_link_queue is a queue to store events of link state changes, which is used to pass events from (typically) an interrupt handler to if_link_state_change softint. The queue was protected by KERNEL_LOCK so far, but if IFEF_MPSAFE is enabled, it becomes unsafe because (perhaps) an interrupt handler of an interface with IFEF_MPSAFE doesn't take KERNEL_LOCK. Protect it by a spin mutex. Additionally with this change KERNEL_LOCK of if_link_state_change softint is omitted if NET_MPSAFE is enabled. Note that the spin mutex is now ifp->if_snd.ifq_lock as well as the case of if_timer (see the comment). Use IFADDR_WRITER_FOREACH instead of IFADDR_READER_FOREACH At that point no other one modifies the list so IFADDR_READER_FOREACH is unnecessary. Use of IFADDR_READER_FOREACH is harmless in general though, if we try to detect contract violations of pserialize, using it violates the contract. So avoid using it makes life easy. Ensure to call if_addr_init with holding if_ioctl_lock Get rid of outdated comments Fix build of kernels without ether By throwing out if_enable_vlan_mtu and if_disable_vlan_mtu that created a unnecessary dependency from if.c to if_ethersubr.c. PR kern/52790 Rename IFNET_LOCK to IFNET_GLOBAL_LOCK IFNET_LOCK will be used in another lock, if_ioctl_lock (might be renamed then). Wrap if_ioctl_lock with IFNET_* macros (NFC) Also if_ioctl_lock perhaps needs to be renamed to something because it's now not just for ioctl... Reorder some destruction routines in if_detach - Destroy if_ioctl_lock at the end of the if_detach because it's used in various destruction routines - Move psref_target_destroy after pr_purgeif because we want to use psref in pr_purgeif (otherwise destruction procedures can be tricky) Ensure to call if_mcast_op with holding IFNET_LOCK Note that CARP doesn't deal with IFNET_LOCK yet. Remove IFNET_GLOBAL_LOCK where it's unnecessary because IFNET_LOCK is held Describe which lock is used to protect each member variable of struct ifnet Requested by skrll@ Write a guideline for converting an interface to IFEF_MPSAFE Requested by skrll@ Note that IFNET_LOCK must not be held in softint Don't set IFEF_MPSAFE unless NET_MPSAFE at this point Because recent investigations show that interfaces with IFEF_MPSAFE need to follow additional restrictions to work with the flag safely. We should enable it on an interface by default only if the interface surely satisfies the restrictions, which are described in if.h. Note that enabling IFEF_MPSAFE solely gains a few benefit on performance because the network stack is still serialized by the big kernel locks by default. 1.355.2.2 Sun Dec 10 09:24:30 UTC 2017 snj Pull up following revision(s) (requested by roy in ticket #390): sys/netinet/ip_input.c: 1.363 sys/netinet6/ip6_input.c: 1.184-1.185 sys/netinet6/ip6_output.c: 1.194-1.195 sys/netinet6/in6_src.c: 1.83-1.84 Allow local communication over DETACHED addresses. Allow binding to DETACHED or TENTATIVE addresses as we deny sending upstream from them anyway. Prefer non DETACHED or TENTATIVE addresses. -- Attempt to restore v6 networking. Not 100% certain that these changes are all that is needed, but they're certainly a big part of it (especially the ip6_input.c change.) -- Treat unvalidated addresses as deprecated in rule 3. |
| /src/sys/arch/i386/conf/ | |
| files.i386 | 1.355 Thu Jul 08 11:24:59 UTC 2010 rmind branches: 1.355.2; 1.355.4; Unify i386 and amd64 procfs MD code into x86. Thu Jul 08 11:24:59 UTC 2010 rmind branches: 1.355.2; 1.355.4; Unify i386 and amd64 procfs MD code into x86. .2; 1.355.4; Unify i386 and amd64 procfs MD code into x86. 1.355.4.1 Sat Mar 05 15:09:43 UTC 2011 bouyer Sync with HEAD 1.355.2.1 Mon Jun 06 09:05:48 UTC 2011 jruoho Sync with HEAD. |
| /src/sys/dev/scsipi/ | |
| cd.c | 1.355 Sat Jun 22 10:07:46 UTC 2024 palle branches: 1.355.2; Add quirk for devices that does not handle READ_DISCINFO Sat Jun 22 10:07:46 UTC 2024 palle branches: 1.355.2; Add quirk for devices that does not handle READ_DISCINFO 1.355.2.1 Sat Aug 02 05:57:03 UTC 2025 perseant Sync with HEAD |
| /src/sys/kern/ | |
| init_main.c | 1.355 Thu May 01 14:44:48 UTC 2008 ad branches: 1.355.2; Get the pre-loaded module code working. Thu May 01 14:44:48 UTC 2008 ad branches: 1.355.2; Get the pre-loaded module code working. 1.355.2.5 Fri Oct 10 22:34:14 UTC 2008 skrll Sync with HEAD. 1.355.2.4 Thu Sep 18 04:31:41 UTC 2008 wrstuden Sync with wrstuden-revivesa-base-2. 1.355.2.3 Mon Jun 23 04:31:50 UTC 2008 wrstuden Sync w/ -current. 34 merge conflicts to follow. 1.355.2.2 Wed May 14 01:35:12 UTC 2008 wrstuden Per discussion with ad, remove most of the #include <sys/sa.h> lines as they were including sa.h just for the type(s) needed for syscallargs.h. Instead, create a new file, sys/satypes.h, which contains just the types needed for syscallargs.h. Yes, there's only one now, but that may change and it's probably more likely to change if it'd be difficult to handle. :-) Per discussion with matt at n dot o, add an include of satypes.h to sigtypes.h. Upcall handlers are kinda signal handlers, and signalling is the header file that's already included for syscallargs.h that closest matches SA. This shaves about 3000 lines off of the diff of the branch relative to the base. That also represents about 18% of the total before this checkin. I think this reduction is very good thing. 1.355.2.1 Sat May 10 23:49:02 UTC 2008 wrstuden Initial checkin of re-adding SA. Everything except kern_sa.c compiles in GENERIC for i386. This is still a work-in-progress, but this checkin covers most of the mechanical work (changing signalling to be able to accomidate SA's process-wide signalling and re-adding includes of sys/sa.h and savar.h). Subsequent changes will be much more interesting. Also, kern_sa.c has received partial cleanup. There's still more to do, though. |
| kern_exec.c | 1.355 Wed Aug 29 18:56:39 UTC 2012 dholland branches: 1.355.2; Add missing newline to printf (in the disabled code for $ORIGIN). Wed Aug 29 18:56:39 UTC 2012 dholland branches: 1.355.2; Add missing newline to printf (in the disabled code for $ORIGIN). 1.355.2.4 Sun Dec 03 11:38:44 UTC 2017 jdolecek update from HEAD 1.355.2.3 Wed Aug 20 00:04:28 UTC 2014 tls Rebase to HEAD as of a few days ago. 1.355.2.2 Sun Jun 23 06:18:57 UTC 2013 tls resync from head 1.355.2.1 Tue Nov 20 03:02:42 UTC 2012 tls Resync to 2012-11-19 00:00:00 UTC |
| /src/doc/ | |
| BRANCHES | 1.355 Sun Nov 01 15:41:56 UTC 2020 thorpej Document the thorpej-futex branch. |
| /src/usr.bin/make/ | |
| make.1 | 1.355 Sun Jan 01 19:10:58 UTC 2023 rillig make.1: sync list of built-in variables with reality Fixes PR 57029. 1.350.2.1 Mon Jan 02 10:11:24 UTC 2023 martin Pull up following revision(s) (requested by rillig in ticket #31): usr.bin/make/make.1: revision 1.351 usr.bin/make/make.1: revision 1.352 usr.bin/make/make.1: revision 1.353 usr.bin/make/make.1: revision 1.354 usr.bin/make/make.1: revision 1.355 usr.bin/make/make.1: revision 1.356 make.1: reduce indentation of the long list of variable names make.1: move description of .MAKE.MODE below the .MAKE.META block make.1: use consistent markup for boolean flags make.1: sort list of built-in variables make.1: sync list of built-in variables with reality Fixes PR 57029. make.1: fix markup |
| cond.c | 1.355 Sun Nov 19 22:50:11 UTC 2023 rillig make: replace 'variable expression' with 'expression' in comments No binary change. |
| suff.c | 1.355 Sun Nov 28 22:48:06 UTC 2021 rillig make: move duplicate function Buf_AddFlag to buf.c It is used only for debug output, therefore performance doesn't matter. No functional change. |
| make.h | 1.355 Sun May 18 06:24:27 UTC 2025 rillig make: rename variables, remove now-redundant comments |
| /src/share/misc/ | |
| acronyms.comp | 1.355 Mon Jun 12 21:00:38 UTC 2023 alnsn Add DPDK. |
| /src/distrib/notes/common/ | |
| main | 1.355 Sun Oct 07 23:46:16 UTC 2007 jnemeth expand details about removed components 1.320.2.5 Tue Oct 30 15:24:14 UTC 2007 liamjfoy Pull up following revision(s) (requested by pavel in ticket #962): distrib/notes/common/main: revision 1.360 distrib/notes/common/main: revision 1.361 distrib/notes/common/main: revision 1.362 distrib/notes/common/main: revision 1.363 distrib/notes/common/main: revision 1.364 distrib/notes/common/main: revision 1.355 distrib/notes/common/main: revision 1.357 distrib/notes/common/main: revision 1.358 distrib/notes/common/main: revision 1.359 expand details about removed components Add a blurb about sendmail->postfix transition. Do not say that one should extract etc.tgz into a temporary directory before running postinstall, postinstall does it itself. Mention that sysinst runs "postinstall fix". use .Sy for emphasis instead of .Ic add mention of _sdpd/_sdpd user/group in the compatibility section sort users/groups to be manually created group rwhod -> _rwhod and add user _rwhod no such user as _authpf, just a group regen the list of changes from htdocs/releases/formal-4/NetBSD-4.0.xml#major-changes, rev. 1.28. bump date. |
| /src/sys/ufs/ffs/ | |
| ffs_vfsops.c | 1.355 Wed Nov 15 21:21:18 UTC 2017 christos PR/52728: Izumi Tsutsui: "mount -u /dev/ /" triggers kernel panic Simplify the control flow of the mount code and make sure that the mountfrom argument can be converted to a block device in the update case. XXX: pullup-8 1.353.4.2 Wed Apr 11 14:49:08 UTC 2018 martin Pull up following revision(s) (requested by christos in ticket #738): sys/ufs/ffs/ffs_vfsops.c: revision 1.355 PR/52728: Izumi Tsutsui: "mount -u /dev/ /" triggers kernel panic Simplify the control flow of the mount code and make sure that the mountfrom argument can be converted to a block device in the update case. |
| /src/ | |
| UPDATING | 1.355 Tue Aug 13 09:49:05 UTC 2024 martin Note gdb switch may require removing tool gdb build dirs. |
| /src/share/man/man4/ | |
| options.4 | 1.355 Sun Dec 02 21:09:21 UTC 2007 wiz Use Fn; fix duplicate word and time problem. Use Cd for options. |
| /src/sys/arch/sparc/sparc/ | |
| pmap.c | 1.355 Tue Dec 10 17:24:47 UTC 2013 macallan shut up an unused variable warning that shows up in UP kernels |
| /src/sys/dev/ic/ | |
| com.c | 1.355 Fri Jan 11 23:10:40 UTC 2019 thorpej Simplify regmap initialization, and fix an regmap issue that affected TI OMAP (LCR register would get clobbered due to using the wrong offset for the MDR1 register) reported by Lwazi Dube (who also found the root cause). |
| /src/sys/rump/librump/rumpkern/ | |
| rump.c | 1.355 Mon Mar 28 20:49:32 UTC 2022 christos no need to include suser; it gets autoloaded as a module. |
| /src/usr.bin/indent/ | |
| indent.c | 1.355 Sat Jun 10 18:46:42 UTC 2023 rillig indent: fix line break between semicolon and brace |
| /src/sys/dev/pci/ | |
| pcidevs | 1.355 Wed Sep 05 13:46:51 UTC 2001 drochner branches: 1.355.2; we (research center Juelich) are a PCISIG member now - add the vendor ID and some products Wed Sep 05 13:46:51 UTC 2001 drochner branches: 1.355.2; we (research center Juelich) are a PCISIG member now - add the vendor ID and some products 1.355.2.2 Thu Oct 11 00:02:11 UTC 2001 fvdl Catch up with -current. Fix some bogons in the sparc64 kbd/ms attach code. cd18xx conversion provided by mrg. 1.355.2.1 Mon Oct 01 00:45:58 UTC 2001 fvdl Catch up with -current. |
| /src/usr.bin/make/unit-tests/ | |
| Makefile | 1.355 Sat Jan 25 22:46:30 UTC 2025 sjg make/unit-tests: avoid failure on NFS The 'rm -rf ${TMPDIR}' at the end of the 'test' target, fails when building on NFS because the temp file used for the target script keeps the directory from being empty. Move it to a separate target attached to '.END' Reviewed by: rillig |
| /src/usr.bin/xlint/lint1/ | |
| decl.c | 1.355 Thu Jul 13 23:27:20 UTC 2023 rillig lint: merge duplicate code for checking duplicate type qualifiers |
| cgram.y | 1.355 Wed Aug 11 05:19:32 UTC 2021 rillig lint: allow GCC __attribute__ after array brackets GCC accepts this, so should lint. Seen in pam_lastlog.c:115. |
| /src/sys/arch/mac68k/mac68k/ | |
| machdep.c | 1.355 Sun Aug 18 07:05:16 UTC 2019 rin 0x%p ---> %p |