components as well, i.e., polling.
2. Stress that if_capenable should be modified only from within
the interface driver because it solely knows about how to control
the capabilities.
Removed paragraph about "new experimental feature" the hw.ata.tags
which sysctl -a knows nothing about.
Fix typos while I'm here.
PR: docs/66493
Submitted by: Julien Gabel <jpeg@thilelli.net>
Remove references to termcap@berkeley.edu and uunet!ucbvax!termcap in
favor of send-pr(1).
Add comment about how to use cap_mkdb to build a new termcap db.
Submitted by: Ted Mittelstaedt <tedm@toybox.placo.com>
MFC After: 2 weeks
after. Unify the paths for all Cx states. Remove cpu_idle_busy and
instead do the little profiling we need before re-enabling interrupts.
Use 1 quantum as estimate for C1 sleep duration since the timer interrupt
is the main reason we wake.
While here, change the cx_history sysctl to cx_usage and report statistics
for which idle states were used in terms of percent. This seems more
intuitive than counters. Remove the cx_stats structure since it's no
longer used. Update the man page.
Change various types which do not need explicit size.
- Remove entry which tells about periodical INDEX updates in
the CVS repository
- Add description for fetchindex target
Requested by: ru [1]
Approved by: josef (mentor)
behaviour lost in the change from 4.x style netgraph tee nodes.
Alter the tee node to use the new method. Document the behaviour.
Step the ABI version number... old netgraph klds will refuse to load.
Better than just crashing.
Submitted by: Gleb Smirnoff <glebius@cell.sick.ru>
eg:
[foo]
...
matches any executable 'foo'
[/usr/bin/foo/]
...
matches any executable under the directory /usr/bin/foo/
Exact matches continue to function as before.
PR: bin/66769
Submitted-by: Dan Nelson
man page after Orla, so the mistakes are probably mine. Leave a
note on the door welcoming the mdoc police.
Submitted by: Orla McGann <orly@cnri.dit.ie>
Use em dashes instead of " - ".
Use .Em instead of *emphasis*.
Note that securing root indirectly (by securing staff accounts) works
only if direct root access has been limited. [1]
s/hacker/attacker, as done in the handbook. (inspired by [1])
PR: 52878 [1]
Submitted by: Brian Minard <bminard@flatfoot.ca> [1]