Searched hist:1.889 (Results 1 - 14 of 14) sorted by relevance
| /src/sys/arch/i386/conf/ | ||
| H A D | GENERIC | 1.889 Fri Apr 11 11:55:18 GMT 2008 tsutsui branches: 1.889.2; Please don't leave a debug option in GENERIC. 1.889 Fri Apr 11 11:55:18 GMT 2008 tsutsui branches: 1.889.2; Please don't leave a debug option in GENERIC. |
| /src/sys/dev/pci/ | ||
| H A D | pcidevs.h | 1.889 Sat Aug 11 02:06:12 GMT 2007 jnemeth regem |
| H A D | pcidevs_data.h | 1.889 Tue Aug 14 16:14:22 GMT 2007 jnemeth regen |
| H A D | pcidevs | 1.889 Sat Aug 11 02:05:11 GMT 2007 jnemeth PR/36759 - Christoph Egger -- AMD product updates |
| /src/distrib/sets/lists/base/ | ||
| H A D | shl.mi | 1.889 Thu May 28 17:06:24 GMT 2020 christos bump openssh |
| H A D | mi | 1.889 Sat Nov 27 00:11:54 GMT 2010 roy Install the 02-dump hook for dhcpcd. |
| /src/doc/ | ||
| H A D | 3RDPARTY | 1.889 Thu Nov 24 00:40:31 GMT 2011 roy import openresolv-3.4.5 |
| H A D | CHANGES | 1.889 Wed Jul 11 07:53:30 GMT 2007 kiyohara Add support for NVIDIA nForce 2/3/4 SMBus controller and SMBus driver. |
| /src/distrib/sets/lists/man/ | ||
| H A D | mi | 1.889 Tue May 16 00:08:24 GMT 2006 elad Introduce PaX MPROTECT -- mprotect(2) restrictions used to strengthen W^X mappings. Disabled by default. First proposed in: http://mail-index.netbsd.org/tech-security/2005/12/18/0000.html More information in: http://pax.grsecurity.net/docs/mprotect.txt Read relevant parts of options(4) and sysctl(3) before using! Lots of thanks to the PaX author and Matt Thomas. |
| /src/distrib/sets/lists/tests/ | ||
| H A D | mi | 1.889 Fri Aug 14 00:53:16 GMT 2020 riastradh New system call getrandom() compatible with Linux and others. Three ways to call: getrandom(p, n, 0) Blocks at boot until full entropy. Returns up to n bytes at p; guarantees up to 256 bytes even if interrupted after blocking. getrandom(0,0,0) serves as an entropy barrier: return only after system has full entropy. getrandom(p, n, GRND_INSECURE) Never blocks. Guarantees up to 256 bytes even if interrupted. Equivalent to /dev/urandom. Safe only after successful getrandom(...,0), getrandom(...,GRND_RANDOM), or read from /dev/random. getrandom(p, n, GRND_RANDOM) May block at any time. Returns up to n bytes at p, but no guarantees about how many -- may return as short as 1 byte. Equivalent to /dev/random. Legacy. Provided only for source compatibility with Linux. Can also use flags|GRND_NONBLOCK to fail with EWOULDBLOCK/EAGAIN without producing any output instead of blocking. - The combination GRND_INSECURE|GRND_NONBLOCK is the same as GRND_INSECURE, since GRND_INSECURE never blocks anyway. - The combinations GRND_INSECURE|GRND_RANDOM and GRND_INSECURE|GRND_RANDOM|GRND_NONBLOCK are nonsensical and fail with EINVAL. As proposed on tech-userlevel, tech-crypto, tech-security, and tech-kern, and subsequently adopted by core (minus the getentropy part of the proposal, because other operating systems and participants in the discussion couldn't come to an agreement about getentropy and blocking semantics): https://mail-index.netbsd.org/tech-userlevel/2020/05/02/msg012333.html |
| /src/share/mk/ | ||
| H A D | bsd.own.mk | 1.889 Fri Jan 29 15:33:51 GMT 2016 christos new binutils will be 2.26 |
| /src/usr.bin/make/ | ||
| H A D | var.c | 1.889 Mon Mar 15 19:02:57 GMT 2021 rillig make: document an example for a 'chain of modifiers' No functional change. |
| /src/sys/conf/ | ||
| H A D | files | 1.889 Mon Jan 28 14:31:15 GMT 2008 dholland Fix some race conditions in rename. Introduce a per-FS rename lock and new vfsops to manipulate it. Get this lock while renaming. Also add another relookup() in do_sys_rename, which is a hack to kludge around some of the worst deficiencies of ufs_rename. reviewed-by: pooka (and an earlier rev by ad) posted on tech-kern with no objections. |
| /src/distrib/sets/lists/comp/ | ||
| H A D | mi | 1.889 Sun Jun 18 21:02:16 GMT 2006 uwe Do not instal net/if_pppvar.h, net/if_slvar.h and net/if_stripvar.h. The former two are no longer necessary as slstats is no more and pppstats now uses an ioctl instead of rummaging through kmem. The latter has nothign interesting for the userland, but uses struct bintime that I'm about to hide under #ifdef _KERNEL. A bunch of remaining <net/if_*.h> headers is pretty useless to the userland too, but ... someone else's yag to shave... |
Completed in 1298 milliseconds