Searched hist:1.428 (Results 1 - 25 of 42) sorted by relevance
| /src/sys/dev/ata/ | ||
| H A D | wd.c | 1.431 Sat Oct 14 13:15:14 GMT 2017 jdolecek only call drive reset with AT_POLL when the command itself was polled, so that the logic for AT_POLL matches how e.g. ata_dmaerr() is called; this was the original intent of the change in 1.428.2.25, to make the error handling safe wrt. polled xfers this is stopgap fix for ATA channel wedge after DMA error, as reported by Martin Husemann in PR kern/52606, and PR kern/52605 problem happened due to ata_reset_channel() being called once in ata_dmaerr() with flags == 0, which freezed channel and set flag to reset via thread, then ata_reset_channel() was called via wdc_drive_reset() with AT_POLL, which just executed the reset and cleared the flag, without clearing the extra freeze; that logic will be refactored in separate commit 1.428 Sun Mar 05 23:07:12 GMT 2017 mlelstv branches: 1.428.2; Enhance disk metrics by calculating a weighted sum that is incremented by the number of concurrent I/O requests. Also introduce a new disk_wait() function to measure requests waiting in a bufq. iostat -y now reports data about waiting and active requests. So far only drivers using dksubr and dk, ccd, wd and xbd collect data about waiting requests. 1.428 Sun Mar 05 23:07:12 GMT 2017 mlelstv branches: 1.428.2; Enhance disk metrics by calculating a weighted sum that is incremented by the number of concurrent I/O requests. Also introduce a new disk_wait() function to measure requests waiting in a bufq. iostat -y now reports data about waiting and active requests. So far only drivers using dksubr and dk, ccd, wd and xbd collect data about waiting requests. |
| /src/etc/ | ||
| H A D | Makefile | 1.428 Sun May 21 15:28:38 GMT 2017 riastradh branches: 1.428.2; Remove MKCRYPTO option. Originally, MKCRYPTO was introduced because the United States classified cryptography as a munition and restricted its export. The export controls were substantially relaxed fifteen years ago, and are essentially irrelevant for software with published source code. In the intervening time, nobody bothered to remove the option after its motivation -- the US export restriction -- was eliminated. I'm not aware of any other operating system that has a similar option; I expect it is mainly out of apathy for churn that we still have it. Today, cryptography is an essential part of modern computing -- you can't use the internet responsibly without cryptography. The position of the TNF board of directors is that TNF makes no representation that MKCRYPTO=no satisfies any country's cryptography regulations. My personal position is that the availability of cryptography is a basic human right; that any local laws restricting it to a privileged few are fundamentally immoral; and that it is wrong for developers to spend effort crippling cryptography to work around such laws. As proposed on tech-crypto, tech-security, and tech-userlevel to no objections: https://mail-index.netbsd.org/tech-crypto/2017/05/06/msg000719.html https://mail-index.netbsd.org/tech-security/2017/05/06/msg000928.html https://mail-index.netbsd.org/tech-userlevel/2017/05/06/msg010547.html P.S. Reviewing all the uses of MKCRYPTO in src revealed a lot of *bad* crypto that was conditional on it, e.g. DES in telnet... That should probably be removed too, but on the grounds that it is bad, not on the grounds that it is (nominally) crypto. 1.428 Sun May 21 15:28:38 GMT 2017 riastradh branches: 1.428.2; Remove MKCRYPTO option. Originally, MKCRYPTO was introduced because the United States classified cryptography as a munition and restricted its export. The export controls were substantially relaxed fifteen years ago, and are essentially irrelevant for software with published source code. In the intervening time, nobody bothered to remove the option after its motivation -- the US export restriction -- was eliminated. I'm not aware of any other operating system that has a similar option; I expect it is mainly out of apathy for churn that we still have it. Today, cryptography is an essential part of modern computing -- you can't use the internet responsibly without cryptography. The position of the TNF board of directors is that TNF makes no representation that MKCRYPTO=no satisfies any country's cryptography regulations. My personal position is that the availability of cryptography is a basic human right; that any local laws restricting it to a privileged few are fundamentally immoral; and that it is wrong for developers to spend effort crippling cryptography to work around such laws. As proposed on tech-crypto, tech-security, and tech-userlevel to no objections: https://mail-index.netbsd.org/tech-crypto/2017/05/06/msg000719.html https://mail-index.netbsd.org/tech-security/2017/05/06/msg000928.html https://mail-index.netbsd.org/tech-userlevel/2017/05/06/msg010547.html P.S. Reviewing all the uses of MKCRYPTO in src revealed a lot of *bad* crypto that was conditional on it, e.g. DES in telnet... That should probably be removed too, but on the grounds that it is bad, not on the grounds that it is (nominally) crypto. |
| /src/sys/dev/usb/ | ||
| H A D | usbdevs | 1.428 Sun May 14 21:47:00 GMT 2006 elad branches: 1.428.2; integrate kauth. 1.428 Sun May 14 21:47:00 GMT 2006 elad branches: 1.428.2; integrate kauth. |
| H A D | usbdevs_data.h | 1.428 Mon Mar 13 16:30:41 GMT 2006 christos branches: 1.428.2; regen 1.428 Mon Mar 13 16:30:41 GMT 2006 christos branches: 1.428.2; regen |
| H A D | usbdevs.h | 1.428 Sat Mar 25 14:13:57 GMT 2006 gdt regen |
| /src/sys/net/ | ||
| H A D | if.c | 1.428 Tue Jun 26 06:48:02 GMT 2018 msaitoh branches: 1.428.2; Implement the BPF direction filter (BIOC[GS]DIRECTION). It provides backward compatibility with BIOC[GS]SEESENT ioctl. The userland interface is the same as FreeBSD. This change also fixes a bug that the direction is misunderstand on some environment by passing the direction to bpf_mtap*() instead of checking m->m_pkthdr.rcvif. 1.428 Tue Jun 26 06:48:02 GMT 2018 msaitoh branches: 1.428.2; Implement the BPF direction filter (BIOC[GS]DIRECTION). It provides backward compatibility with BIOC[GS]SEESENT ioctl. The userland interface is the same as FreeBSD. This change also fixes a bug that the direction is misunderstand on some environment by passing the direction to bpf_mtap*() instead of checking m->m_pkthdr.rcvif. |
| /src/sys/netinet/ | ||
| H A D | tcp_input.c | 1.428 Mon Mar 08 18:17:27 GMT 2021 christos branches: 1.428.4; Remove the unused "addin" argument (it was always 0) and go back using a random iss by default (instead of rfc1948) 1.428 Mon Mar 08 18:17:27 GMT 2021 christos branches: 1.428.4; Remove the unused "addin" argument (it was always 0) and go back using a random iss by default (instead of rfc1948) |
| /src/sys/arch/sparc64/sparc64/ | ||
| H A D | locore.s | 1.428 Mon May 16 21:28:05 GMT 2022 mrg try to handle ultrasparc III* "fast ecc error" traps. i had a sunblade 2500 reset with this trap recently, and the manual says it should have been recoverable. in particular, the US IIIv2 manual says in section 12.4.4.2 that the i-cache won't see this data ever (so nothing needed there), and that the d-cache needs to be disabled, and all the entries flushed, and then re-enabled. tested with a "trap 0x70" from kernel space, that trap.c converted the "0x170" back to "0x70" (with an ADVANCE). this code not commited. |
| /src/sys/arch/i386/conf/ | ||
| H A D | ALL | 1.428 Wed Aug 30 15:44:01 GMT 2017 maxv Don't allow userland to create 286/386 call gates anymore - they are not used by Wine. While here, don't allow it to overwrite the static entries either, don't allow unknown entry types, remove LDT_DEBUG, and style. |
| /src/sys/arch/arm/arm32/ | ||
| H A D | pmap.c | 1.428 Tue Mar 23 10:21:49 GMT 2021 skrll Another missing kpreempt_enable |
| /src/distrib/notes/common/ | ||
| H A D | main | 1.428 Sat Nov 15 03:47:49 GMT 2008 snj Two wording fixes. |
| /src/distrib/sets/lists/debug/ | ||
| H A D | mi | 1.428 Thu Feb 22 00:58:49 GMT 2024 christos add new bind tools |
| /src/share/man/man9/ | ||
| H A D | Makefile | 1.428 Thu Jul 12 10:46:41 GMT 2018 maxv Remove the kernel PMC code. Sent yesterday on tech-kern@. This change: * Removes "options PERFCTRS", the associated includes, and the associated ifdefs. In doing so, it removes several XXXSMPs in the MI code, which is good. * Removes the PMC code of ARM XSCALE. * Removes all the pmc.h files. They were all empty, except for ARM XSCALE. * Reorders the x86 PMC code not to rely on the legacy pmc.h file. The definitions are put in sysarch.h. * Removes the kern/sys_pmc.c file, and along with it, the sys_pmc_control and sys_pmc_get_info syscalls. They are marked as OBSOL in kern, netbsd32 and rump. * Removes the pmc_evid_t and pmc_ctr_t types. * Removes all the associated man pages. The sets are marked as obsolete. |
| /src/share/mk/ | ||
| H A D | bsd.README | 1.428 Thu Dec 23 20:08:07 GMT 2021 christos remove extra C in OBJCOPTS (from Anon Ymous) |
| /src/share/man/man4/ | ||
| H A D | options.4 | 1.428 Fri Oct 04 15:15:39 GMT 2013 rkujawa Remove long dead options NKPTADD, NKPTADDSHIT. |
| H A D | Makefile | 1.428 Tue May 15 17:53:43 GMT 2007 bouyer add jmide(4), a driver for the JMicron Technology JMB36x PCIe to SATA II/PATA controllers. These controllers can be found on add-on PCIe cards, or on some motherboards to provide the PATA connectivity (e.g. some intel ICH8-based motherboards). Thanks to JMicron Technology for providing me documentation and different sample boards for this work. |
| /src/sys/dev/pci/ | ||
| H A D | files.pci | 1.428 Thu May 21 22:58:46 GMT 2020 macallan - remove i2cbus etc. on drivers that don't use iic - for private iic buses pull in only what we need and skip the bus attachment |
| H A D | pcidevs | 1.428 Sun May 19 16:00:19 GMT 2002 bouyer branches: 1.428.2; Add HPT372 and 74 PCI IDE controllers. 1.428 Sun May 19 16:00:19 GMT 2002 bouyer branches: 1.428.2; Add HPT372 and 74 PCI IDE controllers. |
| H A D | pcidevs.h | 1.428 Tue May 14 00:05:35 GMT 2002 augustss Regen. |
| /src/usr.bin/xlint/lint1/ | ||
| H A D | cgram.y | 1.428 Sat Jan 21 00:45:27 GMT 2023 rillig lint: clean up grammar for type-qualifier A type-qualifier by itself does not carry pointer information, so add a helper rule in the grammar for those cases where a type-qualifier is actually used in a type like 'int *const'. This allows general type qualifier checks to be performed during parsing, for example to ensure that '_Atomic' is only used in C11 or later. No functional change. |
| /src/sys/kern/ | ||
| H A D | init_main.c | 1.428 Thu Apr 14 16:20:52 GMT 2011 yamt comment |
| H A D | kern_exec.c | 1.428 Sun May 08 20:00:21 GMT 2016 christos Enable DEBUG_EXEC, if we have DEBUG (since it only fires on errors) and disable the super verbose printing by protecting it against TRACE_EXEC. |
| H A D | vfs_subr.c | 1.428 Sun Jan 29 06:34:57 GMT 2012 dholland Move the proplib-based quota command dispatching (that is, the code that knows the magic string names for the allowed actions) out of UFS-specific code and to fs-independent code. This introduces QUOTACTL_* operation codes and changes the signature of VFS_QUOTACTL() again for compile safety. Note: this change requires a kernel version bump. |
| /src/sys/arch/x86/x86/ | ||
| H A D | pmap.c | 1.428 Wed Sep 03 16:07:12 GMT 2025 bouyer We need to allocate HYPERVISOR_shared_info and HYPERVISOR_shared_info_pa only for VM_GUEST_XENHVM, not in all but VM_GUEST_XENPVH cases. |
| /src/sys/arch/amd64/conf/ | ||
| H A D | GENERIC | 1.428 Sun Apr 10 15:28:24 GMT 2016 christos - Turn on ASLR by default - Add PAX_MPROTECT_DEBUG flag |
Completed in 686 milliseconds