Searched hist:1.449 (Results 1 - 25 of 39) sorted by relevance
| /src/tests/usr.bin/xlint/lint1/ | ||
| H A D | msg_132.c | 1.16 Mon May 30 07:19:28 GMT 2022 rillig lint: fix assertion failure in '(unsigned long)(ptr) >> 12' Since tree.c 1.449 from 2022-05-26. |
| /src/etc/ | ||
| H A D | Makefile | 1.449 Tue Dec 29 16:46:44 GMT 2020 martin branches: 1.449.2; If MKX11 and MKDEBUG, add the xdebug set to the obsolete file handling. 1.449 Tue Dec 29 16:46:44 GMT 2020 martin branches: 1.449.2; If MKX11 and MKDEBUG, add the xdebug set to the obsolete file handling. |
| /src/sys/kern/ | ||
| H A D | vfs_subr.c | 1.449 Thu May 26 11:07:33 GMT 2016 hannken branches: 1.449.2; Merge the vnode and its corresponding vcache_node into one vcache_node structure. Print the vcache_node part in vprint() and vfs_vnode_print(). Presented on tech-kern@ 1.449 Thu May 26 11:07:33 GMT 2016 hannken branches: 1.449.2; Merge the vnode and its corresponding vcache_node into one vcache_node structure. Print the vcache_node part in vprint() and vfs_vnode_print(). Presented on tech-kern@ |
| H A D | init_main.c | 1.449 Wed Jun 05 19:01:26 GMT 2013 christos IPSEC has not come in two speeds for a long time now (IPSEC == kame, FAST_IPSEC). Make everything refer to IPSEC to avoid confusion. |
| H A D | kern_exec.c | 1.449 Fri Oct 20 19:06:46 GMT 2017 riastradh Initialize the in/out parameter vmin. vmin is only an optional hint since we're not passing UVM_FLAG_FIXED, but that doesn't mean we should use uninitialized stack garbage as the hint. Noted by chs@. |
| /src/usr.bin/xlint/lint1/ | ||
| H A D | tree.c | 1.451 Mon May 30 07:19:28 GMT 2022 rillig lint: fix assertion failure in '(unsigned long)(ptr) >> 12' Since tree.c 1.449 from 2022-05-26. 1.449 Thu May 26 20:17:40 GMT 2022 rillig lint: do not warn about 'uint32_t = uint64_t >> 32' If all possible values fit into the destination type, there is no possibility of losing accuracy. Enhances PR 36668. |
| H A D | cgram.y | 1.449 Mon Jul 10 19:00:33 GMT 2023 rillig lint: add debug logging for symbol kinds in the parser An identifier can refer to a variable, type, member, tag or label. Switching between these namespaces is tightly coupled with the evaluation order of the grammar rules. |
| /src/sys/dev/ata/ | ||
| H A D | wd.c | 1.449 Sun Apr 07 13:00:00 GMT 2019 bouyer Really implement WDF_DIRTY. patch(1) did something silly here ... |
| /src/sys/arch/i386/conf/ | ||
| H A D | ALL | 1.449 Sat Aug 25 20:52:41 GMT 2018 rin Add (commented out) mue(4) to where appropriate. Also add MII/PHY drivers for USB NICs if missing. |
| /src/distrib/notes/common/ | ||
| H A D | main | 1.449 Wed Jun 24 00:15:43 GMT 2009 mbalmer Add myself as requested in the welcome mail. |
| /src/distrib/sets/lists/debug/ | ||
| H A D | mi | 1.449 Thu Sep 19 19:43:13 GMT 2024 gdt tests: Add test for remquo This test currently fails, because remquo has bugs. (A bugfix will be committed soon.) Test vectors derived from results from code by Charles Karney in GeodesicLib/proj, and manually inspected. |
| /src/share/man/man9/ | ||
| H A D | Makefile | 1.449 Thu Apr 30 03:28:18 GMT 2020 riastradh Rewrite entropy subsystem. Primary goals: 1. Use cryptography primitives designed and vetted by cryptographers. 2. Be honest about entropy estimation. 3. Propagate full entropy as soon as possible. 4. Simplify the APIs. 5. Reduce overhead of rnd_add_data and cprng_strong. 6. Reduce side channels of HWRNG data and human input sources. 7. Improve visibility of operation with sysctl and event counters. Caveat: rngtest is no longer used generically for RND_TYPE_RNG rndsources. Hardware RNG devices should have hardware-specific health tests. For example, checking for two repeated 256-bit outputs works to detect AMD's 2019 RDRAND bug. Not all hardware RNGs are necessarily designed to produce exactly uniform output. ENTROPY POOL - A Keccak sponge, with test vectors, replaces the old LFSR/SHA-1 kludge as the cryptographic primitive. - `Entropy depletion' is available for testing purposes with a sysctl knob kern.entropy.depletion; otherwise it is disabled, and once the system reaches full entropy it is assumed to stay there as far as modern cryptography is concerned. - No `entropy estimation' based on sample values. Such `entropy estimation' is a contradiction in terms, dishonest to users, and a potential source of side channels. It is the responsibility of the driver author to study the entropy of the process that generates the samples. - Per-CPU gathering pools avoid contention on a global queue. - Entropy is occasionally consolidated into global pool -- as soon as it's ready, if we've never reached full entropy, and with a rate limit afterward. Operators can force consolidation now by running sysctl -w kern.entropy.consolidate=1. - rndsink(9) API has been replaced by an epoch counter which changes whenever entropy is consolidated into the global pool. . Usage: Cache entropy_epoch() when you seed. If entropy_epoch() has changed when you're about to use whatever you seeded, reseed. . Epoch is never zero, so initialize cache to 0 if you want to reseed on first use. . Epoch is -1 iff we have never reached full entropy -- in other words, the old rnd_initial_entropy is (entropy_epoch() != -1) -- but it is better if you check for changes rather than for -1, so that if the system estimated its own entropy incorrectly, entropy consolidation has the opportunity to prevent future compromise. - Sysctls and event counters provide operator visibility into what's happening: . kern.entropy.needed - bits of entropy short of full entropy . kern.entropy.pending - bits known to be pending in per-CPU pools, can be consolidated with sysctl -w kern.entropy.consolidate=1 . kern.entropy.epoch - number of times consolidation has happened, never 0, and -1 iff we have never reached full entropy CPRNG_STRONG - A cprng_strong instance is now a collection of per-CPU NIST Hash_DRBGs. There are only two in the system: user_cprng for /dev/urandom and sysctl kern.?random, and kern_cprng for kernel users which may need to operate in interrupt context up to IPL_VM. (Calling cprng_strong in interrupt context does not strike me as a particularly good idea, so I added an event counter to see whether anything actually does.) - Event counters provide operator visibility into when reseeding happens. INTEL RDRAND/RDSEED, VIA C3 RNG (CPU_RNG) - Unwired for now; will be rewired in a subsequent commit. |
| /src/share/mk/ | ||
| H A D | bsd.README | 1.449 Fri Jun 28 21:58:24 GMT 2024 riastradh bsd.lib.mk: Resolve VERSION_MAP like a target prerequisite. Not sure what I did before to make ${${VERSION_MAP}:P} fail to work; can't reproduce it any more! PR lib/58376 |
| /src/share/man/man4/ | ||
| H A D | options.4 | 1.449 Thu Aug 20 11:05:06 GMT 2015 wiz Bump date for previous. |
| H A D | Makefile | 1.449 Wed Nov 21 19:10:23 GMT 2007 pooka A very terse manual for pud(4) (it leaves almost everything as an exercise to the reader). |
| /src/sys/dev/usb/ | ||
| H A D | usbdevs | 1.449 Sun Jan 21 07:10:50 GMT 2007 apb Fix typo in name of USA-19QW. Reported in PR 35452 from H. Todd Fujinaka. |
| H A D | usbdevs.h | 1.449 Fri Jan 05 13:14:48 GMT 2007 jmcneill Regen. |
| H A D | usbdevs_data.h | 1.449 Fri Jan 05 06:12:33 GMT 2007 jmcneill Regen. |
| /src/sys/dev/pci/ | ||
| H A D | files.pci | 1.449 Tue May 27 06:24:42 GMT 2025 macallan pm3fb needs glyphcache now |
| H A D | pcidevs.h | 1.449 Wed Jun 26 10:09:16 GMT 2002 cjs Regenerate. |
| H A D | pcidevs_data.h | 1.449 Wed Jul 03 16:51:36 GMT 2002 msaitoh regen |
| /src/sys/net/ | ||
| H A D | if.c | 1.449 Mon Apr 15 20:51:46 GMT 2019 christos Zero out the ifreq struct for SIOCGIFCONF to avoid up to 127 bytes of stack disclosure. From Andy Nguyen, many thanks! |
| /src/sys/arch/amd64/conf/ | ||
| H A D | GENERIC | 1.449 Sat Dec 31 15:41:39 GMT 2016 christos Add commented out TCP_SIGNATURE |
| /src/usr.bin/make/ | ||
| H A D | job.c | 1.449 Sat Jan 22 18:59:23 GMT 2022 rillig make: add missing newline after "cannot continue" message It was wrong of Parse_File to output an unfinished line and hope for some other code to finish it. As demonstrated in the test, PrintOnError did not do that in the case of additional debug output. To keep the overall behavior as close as possible to before, the other callers of PrintOnError now have to pass the newline themselves. Passing strings that start with newlines but don't end with them looked suspicious anyway. |
| /src/sys/arch/i386/i386/ | ||
| H A D | machdep.c | 1.449 Wed Aug 01 19:50:48 GMT 2001 thorpej Add several more Intel cache info entries, and fetch the CFLUSH line size if we have the CFLUSH insn. |
Completed in 670 milliseconds