Searched hist:1.889 (Results 1 - 14 of 14) sorted by relevance

/src/sys/arch/i386/conf/
H A DGENERIC1.889 Fri Apr 11 11:55:18 GMT 2008 tsutsui branches: 1.889.2;
Please don't leave a debug option in GENERIC.
1.889 Fri Apr 11 11:55:18 GMT 2008 tsutsui branches: 1.889.2;
Please don't leave a debug option in GENERIC.
/src/sys/dev/pci/
H A Dpcidevs.h1.889 Sat Aug 11 02:06:12 GMT 2007 jnemeth regem
H A Dpcidevs_data.h1.889 Tue Aug 14 16:14:22 GMT 2007 jnemeth regen
H A Dpcidevs1.889 Sat Aug 11 02:05:11 GMT 2007 jnemeth PR/36759 - Christoph Egger -- AMD product updates
/src/distrib/sets/lists/base/
H A Dshl.mi1.889 Thu May 28 17:06:24 GMT 2020 christos bump openssh
H A Dmi1.889 Sat Nov 27 00:11:54 GMT 2010 roy Install the 02-dump hook for dhcpcd.
/src/doc/
H A D3RDPARTY1.889 Thu Nov 24 00:40:31 GMT 2011 roy import openresolv-3.4.5
H A DCHANGES1.889 Wed Jul 11 07:53:30 GMT 2007 kiyohara Add support for NVIDIA nForce 2/3/4 SMBus controller and SMBus driver.
/src/distrib/sets/lists/man/
H A Dmi1.889 Tue May 16 00:08:24 GMT 2006 elad Introduce PaX MPROTECT -- mprotect(2) restrictions used to strengthen
W^X mappings.

Disabled by default.

First proposed in:

http://mail-index.netbsd.org/tech-security/2005/12/18/0000.html

More information in:

http://pax.grsecurity.net/docs/mprotect.txt

Read relevant parts of options(4) and sysctl(3) before using!

Lots of thanks to the PaX author and Matt Thomas.
/src/distrib/sets/lists/tests/
H A Dmi1.889 Fri Aug 14 00:53:16 GMT 2020 riastradh New system call getrandom() compatible with Linux and others.

Three ways to call:

getrandom(p, n, 0) Blocks at boot until full entropy.
Returns up to n bytes at p; guarantees
up to 256 bytes even if interrupted
after blocking. getrandom(0,0,0)
serves as an entropy barrier: return
only after system has full entropy.

getrandom(p, n, GRND_INSECURE) Never blocks. Guarantees up to 256
bytes even if interrupted. Equivalent
to /dev/urandom. Safe only after
successful getrandom(...,0),
getrandom(...,GRND_RANDOM), or read
from /dev/random.

getrandom(p, n, GRND_RANDOM) May block at any time. Returns up to n
bytes at p, but no guarantees about how
many -- may return as short as 1 byte.
Equivalent to /dev/random. Legacy.
Provided only for source compatibility
with Linux.

Can also use flags|GRND_NONBLOCK to fail with EWOULDBLOCK/EAGAIN
without producing any output instead of blocking.

- The combination GRND_INSECURE|GRND_NONBLOCK is the same as
GRND_INSECURE, since GRND_INSECURE never blocks anyway.

- The combinations GRND_INSECURE|GRND_RANDOM and
GRND_INSECURE|GRND_RANDOM|GRND_NONBLOCK are nonsensical and fail
with EINVAL.

As proposed on tech-userlevel, tech-crypto, tech-security, and
tech-kern, and subsequently adopted by core (minus the getentropy part
of the proposal, because other operating systems and participants in
the discussion couldn't come to an agreement about getentropy and
blocking semantics):

https://mail-index.netbsd.org/tech-userlevel/2020/05/02/msg012333.html
/src/share/mk/
H A Dbsd.own.mk1.889 Fri Jan 29 15:33:51 GMT 2016 christos new binutils will be 2.26
/src/usr.bin/make/
H A Dvar.c1.889 Mon Mar 15 19:02:57 GMT 2021 rillig make: document an example for a 'chain of modifiers'

No functional change.
/src/sys/conf/
H A Dfiles1.889 Mon Jan 28 14:31:15 GMT 2008 dholland Fix some race conditions in rename.
Introduce a per-FS rename lock and new vfsops to manipulate it.
Get this lock while renaming. Also add another relookup() in do_sys_rename,
which is a hack to kludge around some of the worst deficiencies of
ufs_rename.
reviewed-by: pooka (and an earlier rev by ad)
posted on tech-kern with no objections.
/src/distrib/sets/lists/comp/
H A Dmi1.889 Sun Jun 18 21:02:16 GMT 2006 uwe Do not instal net/if_pppvar.h, net/if_slvar.h and net/if_stripvar.h.
The former two are no longer necessary as slstats is no more
and pppstats now uses an ioctl instead of rummaging through kmem.
The latter has nothign interesting for the userland, but uses
struct bintime that I'm about to hide under #ifdef _KERNEL.

A bunch of remaining <net/if_*.h> headers is pretty useless to the
userland too, but ... someone else's yag to shave...

Completed in 1298 milliseconds