Searched hist:1.437 (Results 1 - 25 of 41) sorted by relevance
| /src/sys/arch/arm/arm32/ | ||
| H A D | pmap.c | 1.437 Tue May 03 20:12:28 GMT 2022 skrll branches: 1.437.4; Catch up with aarch64 TTBR0 handling in pmap_{,de}activate_efirt and kpreempt_{en,dis}able. 1.437 Tue May 03 20:12:28 GMT 2022 skrll branches: 1.437.4; Catch up with aarch64 TTBR0 handling in pmap_{,de}activate_efirt and kpreempt_{en,dis}able. |
| /src/share/man/man9/ | ||
| H A D | Makefile | 1.437 Wed May 08 14:25:39 GMT 2019 isaki branches: 1.437.2; Update manpages respond to isaki-audio2 branch. 1.437 Wed May 08 14:25:39 GMT 2019 isaki branches: 1.437.2; Update manpages respond to isaki-audio2 branch. |
| /src/share/man/man4/ | ||
| H A D | options.4 | 1.437 Sun Mar 23 00:50:20 GMT 2014 dholland branches: 1.437.2; Fix the heading for ext2fs options to be consistent with the others. 1.437 Sun Mar 23 00:50:20 GMT 2014 dholland branches: 1.437.2; Fix the heading for ext2fs options to be consistent with the others. |
| H A D | Makefile | 1.437 Sun Aug 19 18:58:36 GMT 2007 tnn Move spdmem.4 to the i2c section. |
| /src/sys/kern/ | ||
| H A D | init_main.c | 1.437 Sat Nov 19 22:51:25 GMT 2011 tls branches: 1.437.2; First step of random number subsystem rework described in <20111022023242.BA26F14A158@mail.netbsd.org>. This change includes the following: An initial cleanup and minor reorganization of the entropy pool code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are fixed. Some effort is made to accumulate entropy more quickly at boot time. A generic interface, "rndsink", is added, for stream generators to request that they be re-keyed with good quality entropy from the pool as soon as it is available. The arc4random()/arc4randbytes() implementation in libkern is adjusted to use the rndsink interface for rekeying, which helps address the problem of low-quality keys at boot time. An implementation of the FIPS 140-2 statistical tests for random number generator quality is provided (libkern/rngtest.c). This is based on Greg Rose's implementation from Qualcomm. A new random stream generator, nist_ctr_drbg, is provided. It is based on an implementation of the NIST SP800-90 CTR_DRBG by Henric Jungheim. This generator users AES in a modified counter mode to generate a backtracking-resistant random stream. An abstraction layer, "cprng", is provided for in-kernel consumers of randomness. The arc4random/arc4randbytes API is deprecated for in-kernel use. It is replaced by "cprng_strong". The current cprng_fast implementation wraps the existing arc4random implementation. The current cprng_strong implementation wraps the new CTR_DRBG implementation. Both interfaces are rekeyed from the entropy pool automatically at intervals justifiable from best current cryptographic practice. In some quick tests, cprng_fast() is about the same speed as the old arc4randbytes(), and cprng_strong() is about 20% faster than rnd_extract_data(). Performance is expected to improve. The AES code in src/crypto/rijndael is no longer an optional kernel component, as it is required by cprng_strong, which is not an optional kernel component. The entropy pool output is subjected to the rngtest tests at startup time; if it fails, the system will reboot. There is approximately a 3/10000 chance of a false positive from these tests. Entropy pool _input_ from hardware random numbers is subjected to the rngtest tests at attach time, as well as the FIPS continuous-output test, to detect bad or stuck hardware RNGs; if any are detected, they are detached, but the system continues to run. A problem with rndctl(8) is fixed -- datastructures with pointers in arrays are no longer passed to userspace (this was not a security problem, but rather a major issue for compat32). A new kernel will require a new rndctl. The sysctl kern.arandom() and kern.urandom() nodes are hooked up to the new generators, but the /dev/*random pseudodevices are not, yet. Manual pages for the new kernel interfaces are forthcoming. 1.437 Sat Nov 19 22:51:25 GMT 2011 tls branches: 1.437.2; First step of random number subsystem rework described in <20111022023242.BA26F14A158@mail.netbsd.org>. This change includes the following: An initial cleanup and minor reorganization of the entropy pool code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are fixed. Some effort is made to accumulate entropy more quickly at boot time. A generic interface, "rndsink", is added, for stream generators to request that they be re-keyed with good quality entropy from the pool as soon as it is available. The arc4random()/arc4randbytes() implementation in libkern is adjusted to use the rndsink interface for rekeying, which helps address the problem of low-quality keys at boot time. An implementation of the FIPS 140-2 statistical tests for random number generator quality is provided (libkern/rngtest.c). This is based on Greg Rose's implementation from Qualcomm. A new random stream generator, nist_ctr_drbg, is provided. It is based on an implementation of the NIST SP800-90 CTR_DRBG by Henric Jungheim. This generator users AES in a modified counter mode to generate a backtracking-resistant random stream. An abstraction layer, "cprng", is provided for in-kernel consumers of randomness. The arc4random/arc4randbytes API is deprecated for in-kernel use. It is replaced by "cprng_strong". The current cprng_fast implementation wraps the existing arc4random implementation. The current cprng_strong implementation wraps the new CTR_DRBG implementation. Both interfaces are rekeyed from the entropy pool automatically at intervals justifiable from best current cryptographic practice. In some quick tests, cprng_fast() is about the same speed as the old arc4randbytes(), and cprng_strong() is about 20% faster than rnd_extract_data(). Performance is expected to improve. The AES code in src/crypto/rijndael is no longer an optional kernel component, as it is required by cprng_strong, which is not an optional kernel component. The entropy pool output is subjected to the rngtest tests at startup time; if it fails, the system will reboot. There is approximately a 3/10000 chance of a false positive from these tests. Entropy pool _input_ from hardware random numbers is subjected to the rngtest tests at attach time, as well as the FIPS continuous-output test, to detect bad or stuck hardware RNGs; if any are detected, they are detached, but the system continues to run. A problem with rndctl(8) is fixed -- datastructures with pointers in arrays are no longer passed to userspace (this was not a security problem, but rather a major issue for compat32). A new kernel will require a new rndctl. The sysctl kern.arandom() and kern.urandom() nodes are hooked up to the new generators, but the /dev/*random pseudodevices are not, yet. Manual pages for the new kernel interfaces are forthcoming. |
| H A D | vfs_subr.c | 1.437 Mon Mar 18 19:35:43 GMT 2013 plunky branches: 1.437.6; C99 section 6.7.2.3 (Tags) Note 3 states that: A type specifier of the form enum identifier without an enumerator list shall only appear after the type it specifies is complete. which means that we cannot pass an "enum vtype" argument to kauth_access_action() without fully specifying the type first. Unfortunately there is a complicated include file loop which makes that difficult, so convert this minimal function into a macro (and capitalize it). (ok elad@) 1.437 Mon Mar 18 19:35:43 GMT 2013 plunky branches: 1.437.6; C99 section 6.7.2.3 (Tags) Note 3 states that: A type specifier of the form enum identifier without an enumerator list shall only appear after the type it specifies is complete. which means that we cannot pass an "enum vtype" argument to kauth_access_action() without fully specifying the type first. Unfortunately there is a complicated include file loop which makes that difficult, so convert this minimal function into a macro (and capitalize it). (ok elad@) |
| H A D | kern_exec.c | 1.437 Thu Sep 15 17:44:16 GMT 2016 christos m68k binaries load @ pagesize. unbreak. |
| /src/sys/arch/sparc64/sparc64/ | ||
| H A D | locore.s | 1.437 Tue Nov 04 19:42:59 GMT 2025 palle Add missing comment termination |
| /src/sys/dev/ata/ | ||
| H A D | wd.c | 1.437 Wed Dec 13 10:24:31 GMT 2017 pgoyette Fix build for WD_SOFTBADSECT option. PR kern/52814 XXX No clue if this option actually works. This fix just makes it XXX compile without error. |
| /src/sys/arch/i386/conf/ | ||
| H A D | ALL | 1.437 Sun Apr 08 00:52:38 GMT 2018 mrg turn on GCC spectre v2 mitigation options. XXX: amd64 ALL doesn't build for me right now |
| /src/distrib/notes/common/ | ||
| H A D | main | 1.437 Mon Feb 23 16:42:58 GMT 2009 weinem added myself to the list of developers |
| /src/distrib/sets/lists/debug/ | ||
| H A D | mi | 1.437 Sun Jul 07 17:37:33 GMT 2024 riastradh t_ifunc: Test with all combinations of {relro, bindnow}. PR lib/57792 |
| /src/etc/ | ||
| H A D | Makefile | 1.437 Mon Oct 01 09:47:34 GMT 2018 martin Redo xz vs. gzip selection via conditional make expressions, suggested by joerg. |
| /src/share/mk/ | ||
| H A D | bsd.README | 1.437 Sun May 29 08:10:00 GMT 2022 nia mk: Add a MKPPP flag to exclude pppd(8) and related utilities from the build |
| /src/sys/dev/usb/ | ||
| H A D | usbdevs | 1.437 Sun Sep 24 17:17:17 GMT 2006 christos From Claus Andersen: - change uftdi driver to use usb_lookup - are more devices (from FreeBSD/OpenBSD) |
| H A D | usbdevs.h | 1.437 Sat Jul 01 08:15:16 GMT 2006 martin Regen |
| H A D | usbdevs_data.h | 1.437 Fri Jun 30 13:56:25 GMT 2006 chap Ankh-Morpork, we have a MIDI driver.... Merge from chap-midi branch, after ~month for review Comments by thorpej@ drochner@ and Alexandre Ratchov Incorporated: points by thorpej@ drochner@; preliminary support for a stats-collecting ioctl suggested by martin@ from comments by A.R. PR kern/32441 kern/32442 kern/32567 kern/32588 kern/32694 kern/33590 kern/33614 and one instance of kern/32651 ok martin@ |
| /src/sys/dev/pci/ | ||
| H A D | files.pci | 1.437 Mon Apr 26 19:28:24 GMT 2021 thorpej - The "eso" device does not need to carry the "midibus" interface attribute. It attaches "opl" and "mpu" instances, which themselves attach "midi". - Be explicit about specifying the "eso" interface attribute when attaching "opl", "mpu", and "joy" instances. |
| H A D | pcidevs.h | 1.437 Tue May 28 17:08:57 GMT 2002 tron Regen from "pcidevs". |
| H A D | pcidevs_data.h | 1.437 Sun Jun 02 18:37:25 GMT 2002 seb regen for Titan PCI-800L. |
| /src/usr.bin/xlint/lint1/ | ||
| H A D | cgram.y | 1.437 Thu Jun 29 05:03:03 GMT 2023 rillig lint: clean up completion of struct, union and enum declarations No functional change. |
| H A D | tree.c | 1.437 Sat Apr 30 19:18:48 GMT 2022 rillig lint: inline macro Sflag in cases of expected behavior In the grammar rules 'enums_with_opt_comma' and 'block_item_list', checking for allow_c99 was redundant since c99ism does not warn in C99 mode. In the grammar rule 'designator', align the two actions structurally. No functional change. |
| /src/sys/net/ | ||
| H A D | if.c | 1.437 Thu Oct 18 11:34:54 GMT 2018 knakahara fix panic when do ifconfig -vlanif and ifconfig vlanif again. advised by ozaki-r@. e.g. do the following commands. ==================== # ifconfig vlan0 create # ifconfig vlan0 vlan 100 vlanif wm0 # ifconfig vlan0 -vlanif wm0 # ifconfig vlan0 vlan 100 vlanif wm0 ==================== ATF net/if_vlan do this type of test, however it cannot detect this bug. Because the shmif(4)'s ifp->if_hwdl is always NULL as shmif(4)'s ethernet address is set U/L bit. See: https://nxr.netbsd.org/xref/src/sys/net/if_ethersubr.c#997 |
| /src/sys/arch/amd64/conf/ | ||
| H A D | GENERIC | 1.437 Sun Aug 07 10:44:05 GMT 2016 christos rename ifmpls to mpls, so we don't have if_ifmpls... |
| /src/usr.bin/make/ | ||
| H A D | job.c | 1.437 Sun Nov 28 00:02:07 GMT 2021 rillig make: with the option -de in jobs mode, output expanded commands This helps tracking down the actual cause of build failures in build systems like NetBSD's build.sh that use highly abstracted commands that are mainly defined in terms of variables. |
Completed in 920 milliseconds