Commit Graph

62946 Commits

Author SHA1 Message Date
dd
95023d1052 Fix grammar nit. 2001-08-01 20:16:12 +00:00
dougb
e967b3ddc0 Scratch an itch of long standing by adding entries for the most
commonly used x11 ports
2001-08-01 20:13:49 +00:00
dd
c78ea16c57 Oops, note MFC of UFS_DIRHASH. 2001-08-01 20:08:37 +00:00
dd
1efad8f385 Fix previous commit: actually move the UFS_DIRHAS stuff, not the
ddb(4) stuff.  I have *no* idea how I managed to screw that up.
2001-08-01 20:07:51 +00:00
dd
7fc33189dd Move the UFS_DIRHASH paragraph to 'filesystems' and note its MFC. 2001-08-01 20:05:36 +00:00
dd
83864eb4be Note MFCs: WARNS, GCC_OPTIONS, and GNATS. 2001-08-01 20:04:19 +00:00
dougb
24d7d07293 I could have sworn I did this already, but obviously I didn't. So,
take another stab at updating the IANA web page.
2001-08-01 19:48:12 +00:00
imp
15c0c44955 TI cardbus bridges, 12xx and newer, have an interesting register. It
is the diagnostics register at offset 0x93.  When bit 5 is set in this
register, bits 4-7 in ExCA register 0x5 being 0000 are required for
pci interrupt routing.  When it is clear, then bit 4 of ExCA register
0x3 is used to enable it.

The only other issue is that when you route interrupts this way, you
must read ExCA register 0x4 in order to clear the interrupt, else you
get an interrupt storm.

Deal with this requirement by setting things up.  It is believed that
this won't hurt other chipsets, but other chipsets may require their
own work arounds.
2001-08-01 19:41:56 +00:00
mjacob
19b910842d Don't initialize a clock twice (it's not a function of number of
cpus).
2001-08-01 19:40:11 +00:00
obrien
6b5bce7420 Correct the version number. 2001-08-01 18:35:54 +00:00
ghelmer
ec9077022b Add "use Fcntl" to resolve O_RDWR|O_CREAT|O_EXCL macros used in
new sysopen call.

PR:		29366 (in part)
2001-08-01 16:32:36 +00:00
dd
649f740e57 mdoc(7) police: remove hard sentence breaks. 2001-08-01 16:07:50 +00:00
ghelmer
df24500a50 Install the new password file with pwd_mkdb, not the old one.
PR:		29366 (in part)
2001-08-01 15:27:39 +00:00
dd
ddc87708b4 New release notes: file(1) update.
Note MFCs: install(1) cleanup, bzip2 import, libpcap update.
2001-08-01 14:22:27 +00:00
sheldonh
80fcc4abbc MFS: in HISTORY section, fix release number of first appearance 2001-08-01 12:15:21 +00:00
sheldonh
f153c10891 Fix broken Fn calls; Fn doesn't take a manual page section as an
argument.

Terminate the last sentence with a period.
2001-08-01 12:04:32 +00:00
tg
3425197e87 Don't wait for a keypress in INT 16 function 01, just return the current
state. This fixes Easytrax.
2001-08-01 11:47:06 +00:00
iedowse
a39dd4a8a2 Fix a client-side memory leak in nfs_flush(). The code allocates
a temporary array to store struct buf pointers if the list doesn't
fit in a local array. Usually it frees the array when finished,
but if it jumps to the 'again' label and the new list does fit in
the local array then it can forget to free a previously malloc'd
M_TEMP memory.

Move the free() up a line so that it frees any previously allocated
memory whether or not it needs to malloc a new array.

Reviewed by:	dillon
2001-08-01 10:25:13 +00:00
obrien
783238c99f style(9) 2001-08-01 07:05:51 +00:00
eric
14b5ca4478 Update man page to actually match the source.
PR:		7456
2001-08-01 06:23:00 +00:00
obrien
1eda6c61f9 This is actually making its enterance in FreeBSD 4.4. 2001-08-01 05:53:12 +00:00
obrien
b8605bc696 style(9) 2001-08-01 05:12:39 +00:00
grog
9df97b6d1e open_device: Recognize ar device.
Submitted by:  Valery Kotchiev <valery@rudiment.dk>
2001-08-01 04:35:28 +00:00
obrien
e3e1b0bdbc It appears we really shouldn't be following this example man page -- one
should not use a `%' in examples.

I don't know if this is the consensus of doc@, or just a unilateral decision
of committer that corrected my following of this example.  Maybe a docs
person could review these files and see if they still show current guidelines.
2001-08-01 04:27:48 +00:00
gshapiro
46051bb094 Revert change to always include _FFR_TLS_O_T as it requires FEATURE(access_db)
Problem found by:	nsayer
2001-08-01 02:12:39 +00:00
obrien
cd3f6b3b20 Remove a misplaced space. 2001-08-01 02:09:09 +00:00
gshapiro
e476a7ccdc Note the import of sendmail 8.11.5 2001-08-01 01:40:56 +00:00
gshapiro
fe5563a270 Update FreeBSD import information 2001-08-01 01:36:17 +00:00
gshapiro
dd6c7dd907 Resolve conflicts from import of sendmail 8.11.5 2001-08-01 01:34:52 +00:00
gshapiro
e147a0c4ed This commit was generated by cvs2svn to compensate for changes in r80785,
which included commits to RCS files with non-trunk default branches.
2001-08-01 01:33:27 +00:00
gshapiro
1164bba81c Import sendmail 8.11.5 2001-08-01 01:33:27 +00:00
bmilekic
cceec8d181 Move CPU_ABSENT() macro to smp.h, where it belongs anyway. It will be
defined to 0 in the non-SMP case, which very much makes sense as it
permits its usage in per-CPU initialization loops (for an example, check
out subr_mbuf.c).
  Further, on a UP system, make mb_alloc always use the first per-CPU
container, regardless of cpuid (i.e. remove reliability on cpuid in the
UP case).

Requested by: alfred
2001-08-01 00:54:00 +00:00
fenner
db46728f21 Update our bpf.h with tcpdump.org's new DLT_ types.
Use our bpf.h instead of tcpdump.org's to build libpcap.
2001-07-31 23:27:06 +00:00
jhb
6394826cde Apply the cluebat to myself and undo the await() -> mawait() rename. The
asleep() and await() functions split the functionality of msleep() up into
two halves.  Only the asleep() half (which is what puts the process on the
sleep queue) actually needs the lock usually passed to msleep() held to
prevent lost wakeups.  await() does not need the lock held, so the lock
can be released prior to calling await() and does not need to be passed in
to the await() function.  Typical usage of these functions would be as
follows:

        mtx_lock(&foo_mtx);
        ... do stuff ...
        asleep(&foo_cond, PRIxx, "foowt", hz);
        ...
        mtx_unlock&foo_mtx);
        ...
        await(-1, -1);

Inspired by:	dillon on the couch at Usenix
2001-07-31 22:06:56 +00:00
brian
704f051282 Don't include a NUL at the end of our CHAP SUCCESS packet.
When encryption (MPPE) is enabled, WindowsME and Windows98 both
fail because of the extra byte, suggesting that they autheticated
successfully in their log and then dropping the connection, telling
the user that the peer doesn't support compatible encryption
options.

MFC after: 1 week
2001-07-31 21:36:00 +00:00
eric
d5e7d19520 Reword for consistency. 2001-07-31 21:30:57 +00:00
jhb
a5cd152fc8 Add a safety belt to mawait() for the (cold || panicstr) case identical to
the one in msleep() such that we return immediately rather than blocking.

Submitted by:	peter
Prodded by:	sheldonh
2001-07-31 20:57:57 +00:00
jhb
198dfe1ce3 Add in a hack to support IBM "El Torito" CD-ROM booting BIOS's which expect
the first sector of the emulated floppy to contain a valid MS-DOS BPB that
it can modify.  Since boot1 is the first sector of boot.flp, this resulted
in the BIOS overwriting part of boot1: specifically the function used to
read in sectors from the disk.

Submitted by:	Mark Peek <mark@whistle.com>
Submitted by:	Doug Ambrisko <ambrisko@ambrisko.com>
PR:		i386/26382
Obtained from:	NetBSD, OpenBSD (the example BPB)
MFC after:	1 month
2001-07-31 19:50:09 +00:00
wilko
153539de08 164LX can have SRM or AlphaBIOS in flash. 2001-07-31 18:43:40 +00:00
jhb
02db8471a3 If we have already panic'd then don't bother enforcing mutex asserts as
things are pretty much shot already and all panic'ing does is hurt our
chances of getting a dump.

Inspired by:	sheldonh
2001-07-31 17:45:50 +00:00
jhb
a0a2e280bd - Fix panicstr checks to explicitly check against NULL.
- Add a few more panicstr checks so that we don't panic recursively.

Requested by:	sheldonh (2)
2001-07-31 17:44:57 +00:00
rwatson
c1e081808c o Modify p_candebug() such that there is no longer automatic acceptance
of debugging the current process when that is in conflict with other
  restrictions (such as jail, unprivileged_procdebug_permitted, etc).
o This corrects anomolies in the behavior of
  kern.security.unprivileged_procdebug_permitted when using truss and
  ktrace.  The theory goes that this is now safe to use.

Obtained from:	TrustedBSD Project
2001-07-31 17:25:12 +00:00
wpaul
fdddc3e2c4 Re-order things slightly in the RX handler for VLAN support: we need
call vlan_input_tag() after stripping the ether header from the frame
with m_adj(), not before.

Noticed by: Brooks Davis <brooks@one-eyed-alien.net>
2001-07-31 16:38:58 +00:00
mp
8151115973 Only pull in the MD files if they exist. This allows for progressive
implementation and compilation when bringing up a new architecture.
2001-07-31 16:34:52 +00:00
obrien
bee43330be jhb says a 10 line change containing casts is more invasive than a 28 line
change.
2001-07-31 16:25:55 +00:00
mp
eb299211ae Fix compilation errors by adding forward declarations and fix typo. 2001-07-31 16:10:51 +00:00
asmodai
c0101eaa52 Logging should wind up in /var/log, not /etc/ppp/.
PR:		11989
Submitted by:	Phil Homewood <phil@rivendell.apana.org.au>
MFC after:	1 week
2001-07-31 16:09:29 +00:00
imp
3d3900e5ca bsh and bst are unused in softc, except for setting them. We do use the
bsh and bst in the pcic_slot structures.
2001-07-31 15:53:17 +00:00
mp
9cd078f86a Make include file consistent with the rest of libstand. 2001-07-31 15:49:50 +00:00
rwatson
09d5fb71b9 o Introduce new kern.security sysctl tree for kernel security policy
MIB entries.
o Relocate kern.suser_permitted to kern.security.suser_permitted.
o Introduce new kern.security.unprivileged_procdebug_permitted, which
  (when set to 0) prevents processes without privilege from performing
  a variety of inter-process debugging activities.  The default is 1,
  to provide current behavior.

  This feature allows "hardened" systems to disable access to debugging
  facilities, which have been associated with a number of past security
  vulnerabilities.  Previously, while procfs could be unmounted, other
  in-kernel facilities (such as ptrace()) were still available.  This
  setting should not be modified on normal development systems, as it
  will result in frustration.  Some utilities respond poorly to
  failing to get the debugging access they require, and error response
  by these utilities may be improved in the future in the name of
  beautification.

  Note that there are currently some odd interactions with some
  facilities, which will need to be resolved before this should be used
  in production, including odd interactions with truss and ktrace.
  Note also that currently, tracing is permitted on the current process
  regardless of this flag, for compatibility with previous
  authorization code in various facilities, but that will probably
  change (and resolve the odd interactions).

Obtained from:	TrustedBSD Project
2001-07-31 15:48:21 +00:00