Searched hist:1.465 (Results 1 - 25 of 36) sorted by relevance

12

/src/share/man/man9/
H A DMakefile1.465 Sun Sep 04 21:37:50 GMT 2022 thorpej branches: 1.465.2;
Document the pktqueue interface.

1.465 Sun Sep 04 21:37:50 GMT 2022 thorpej branches: 1.465.2;
Document the pktqueue interface.

/src/sys/dev/ata/
H A Dwd.c1.465 Mon Sep 28 00:47:49 GMT 2020 jakllsch fix typo that prevented bytes/physsect reporting from working

/src/sys/arch/i386/conf/
H A DALL1.465 Sat Mar 16 04:31:25 GMT 2019 isaki Remove duplicated option.

/src/distrib/notes/common/
H A Dmain1.465 Sun Jul 11 20:00:52 GMT 2010 gsutre Add myself
/src/distrib/sets/lists/debug/
H A Dmi1.465 Mon Feb 24 18:02:02 GMT 2025 martin Provide a new attribute, efi_rt, derived from HAVE_EFI_RT, and use
that to mark sbin/efi.
/src/etc/
H A DMakefile1.465 Mon Jun 06 10:56:28 GMT 2022 nia build system: Revert all the recent additions of MK[...] knobs that
allow conditionally disabling the building of certain user space
programs in the 'base' set.

There is not enough consensus that this is the right way and a few
people had strong objections, see source-changes-d@.
/src/share/man/man4/
H A Doptions.41.465 Thu Mar 09 11:39:43 GMT 2017 wiz Bump date for previous. Use American spelling.
H A DMakefile1.465 Sun May 18 22:05:59 GMT 2008 cegger acpidalb(4): Driver for PNP0C32 Hotkeys aka "Direct Application Launch Buttons".
"awesome" jmcneill

/src/sys/dev/usb/
H A Dusbdevs1.465 Mon May 07 07:29:03 GMT 2007 xtraeme Sync the list of supported models with OpenBSD, 4 new models were
added.
H A Dusbdevs.h1.465 Mon May 07 05:44:24 GMT 2007 xtraeme regen
H A Dusbdevs_data.h1.465 Thu May 03 06:34:17 GMT 2007 skrll Regen for DeLorme Earthmate LT-20 GPS
/src/usr.bin/xlint/lint1/
H A Dcgram.y1.465 Sat Jul 15 21:47:35 GMT 2023 rillig lint: each member declarator may have attributes, not only the last one
H A Dtree.c1.465 Fri Jul 01 19:52:41 GMT 2022 rillig lint: restructure 'convert'

The conditions are now grouped by target type, highlighting that
conversions between integer and floating point types are not checked by
this function, in fact, they are not checked at all.

No functional change.
/src/sys/kern/
H A Dinit_main.c1.465 Thu Apr 30 13:46:47 GMT 2015 nat Added a new option for embedding a splash screen into kernel.
Add: options SPLASHSCREEN
makeoptions SPLASHSCREEN_IMAGE="path/to/image"
to your config file. So far it will work on amd64 and RPI/RPI2.

This commit was with ideas, help, and OK from jmcneill@.

H A Dkern_exec.c1.465 Thu May 09 20:50:14 GMT 2019 kamil Report TRAP_EXEC (for exec()) to a debugger in the PT_SYSCALL mode

Orignally exec() reporting was disabled in the NetBSD version as there
was no support for fine-grained reporting. Meanwhile PT_SYSCALL was broken
for years and there is no software that depends on this behavior.

There is need to catch exec() events in syscall tracers using ptrace(2).
Instead of adding workarounds of guessing that exec() happened, report the
event directly from the kernel.

All ATF ptrace(2) tests pass.

H A Dvfs_subr.c1.465 Wed May 24 09:52:59 GMT 2017 hannken Remove the syncer dance from dounmount(). The syncer skips
unmounting file systems as they are suspended.

Remove now unused syncer_mutex.

/src/sys/net/
H A Dif.c1.465 Thu Nov 14 16:23:53 GMT 2019 maxv Add support for Kernel Memory Sanitizer (kMSan). It detects uninitialized
memory used by the kernel at run time, and just like kASan and kCSan, it
is an excellent feature. It has already detected 38 uninitialized variables
in the kernel during my testing, which I have since discreetly fixed.

We use two shadows:
- "shad", to track uninitialized memory with a bit granularity (1:1).
Each bit set to 1 in the shad corresponds to one uninitialized bit of
real kernel memory.
- "orig", to track the origin of the memory with a 4-byte granularity
(1:1). Each uint32_t cell in the orig indicates the origin of the
associated uint32_t of real kernel memory.

The memory consumption of these shadows is consequent, so at least 4GB of
RAM is recommended to run kMSan.

The compiler inserts calls to specific __msan_* functions on each memory
access, to manage both the shad and the orig and detect uninitialized
memory accesses that change the execution flow (like an "if" on an
uninitialized variable).

We mark as uninit several types of memory buffers (stack, pools, kmem,
malloc, uvm_km), and check each buffer passed to copyout, copyoutstr,
bwrite, if_transmit_lock and DMA operations, to detect uninitialized memory
that leaves the system. This allows us to detect kernel info leaks in a way
that is more efficient and also more user-friendly than KLEAK.

Contrary to kASan, kMSan requires comprehensive coverage, ie we cannot
tolerate having one non-instrumented function, because this could cause
false positives. kMSan cannot instrument ASM functions, so I converted
most of them to __asm__ inlines, which kMSan is able to instrument. Those
that remain receive special treatment.

Contrary to kASan again, kMSan uses a TLS, so we must context-switch this
TLS during interrupts. We use different contexts depending on the interrupt
level.

The orig tracks precisely the origin of a buffer. We use a special encoding
for the orig values, and pack together in each uint32_t cell of the orig:
- a code designating the type of memory (Stack, Pool, etc), and
- a compressed pointer, which points either (1) to a string containing
the name of the variable associated with the cell, or (2) to an area
in the kernel .text section which we resolve to a symbol name + offset.

This encoding allows us not to consume extra memory for associating
information with each cell, and produces a precise output, that can tell
for example the name of an uninitialized variable on the stack, the
function in which it was pushed on the stack, and the function where we
accessed this uninitialized variable.

kMSan is available with LLVM, but not with GCC.

The code is organized in a way that is similar to kASan and kCSan, so it
means that other architectures than amd64 can be supported.

/src/sys/arch/amd64/conf/
H A DGENERIC1.465 Wed Sep 13 22:24:42 GMT 2017 sevan Remove support for VERIFIED_EXEC_FP_RMD160, VERIFIED_EXEC_FP_SHA1, and VERIFIED_EXEC_FP_MD5 options.
These algorithms are either broken or on their way to being broken.

Discussed on tech-security
http://mail-index.netbsd.org/tech-security/2017/08/21/msg000936.html

ok riastradh
/src/sys/dev/pci/
H A Dpcidevs.h1.465 Sat Aug 03 17:12:42 GMT 2002 kent regen
H A Dpcidevs_data.h1.465 Thu Aug 08 09:57:21 GMT 2002 drochner regen
/src/usr.bin/make/
H A Djob.c1.465 Sun Jan 07 11:39:04 GMT 2024 rillig make: clean up comments, constify shell name

H A Dmain.c1.465 Sat Nov 14 18:36:27 GMT 2020 rillig make(1): clean up Fatal

Use the shortest possible scope between va_start and the corresponding
va_end.
/src/sys/arch/i386/i386/
H A Dmachdep.c1.465 Tue Jan 15 13:34:52 GMT 2002 drochner recognize Athlon model 6 (Palomino) and 7 (Morgan)
/src/distrib/sets/lists/base/
H A Dshl.mi1.465 Sat Apr 25 05:54:50 GMT 2009 agc Enable netpgp in the build, and amend set lists accordingly.
/src/doc/
H A D3RDPARTY1.465 Mon Sep 11 05:53:40 GMT 2006 wiz new openssl out.

Completed in 987 milliseconds

12