committer filter by committer.
@path/to/ filter by path in repository.
committer@path/to/ filter by committer AND path in repository.
abdef0123 filter by commit's SHA hash.
rNNN filter by SVN revision.
rNNN-rMMM filter by SVN revisions range (inclusive).
Multiple filters can be specified separated by spaces or comas in which case they'll be combined using OR operator.
|d5bf1cf1||behlendorf1||June 22, 2019, 11:30 p.m.||Fix build break by "Implement Redacted Send/Receive"
30af21b025 broke build on Fedora. gcc can detect potential overflow on compile-time. Consider strlen of already copied string. Also change strn to strl variants per suggestion from @behlendorf and @ofaaland. -- libzfs_input_check.c: In function 'test_redact': libzfs_input_check.c:711:2: error: 'strncat' specified bound 288 equals destination size [-Werror=stringop-overflow=] strncat(bookmark, "#testbookmark", sizeof (bookmark)); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Reviewed-by: Brian Behlendorf <email@example.com> Reviewed-by: Olaf Faaland <firstname.lastname@example.org> Signed-off-by: Tomohiro Kusumi <email@example.com> Closes #8939cgit
|31d2b1cf||sevan||June 22, 2019, 10:43 p.m.||Add DragonFly BSD 5.6.1|
|07fb2bcc||sevan||June 22, 2019, 10:34 p.m.||Remove question mark from the link between NetBSD & Darwin.
As linked to in bug 26137 as a source https://web.archive.org/web/20001012121507/http://www.opensource.apple.com/projects/darwin/faq.html mentions: "We already synchronize our code periodically with NetBSD for most of our user commands"cgit ViewVC
|9035b225||dougm||June 22, 2019, 7:27 p.m.||You can't use block special nodes for swap, so don't let that happen.|
|6d4d6573||mav||June 22, 2019, 7:09 p.m.||Decouple enc/ses verbosity from bootverbose.|
|05b62601||imp||June 22, 2019, 4:54 p.m.||Add list of valid CPUTYPE flags for arm/arm64 to make.conf example|
|36c5a4cb||alc||June 22, 2019, 4:26 p.m.||Introduce pmap_remove_l3_range() and use it in two places:|
|6ab631e8||dteske||June 22, 2019, 3:39 p.m.||`libjail/jail.c' includes both <sys/param.h> and <sys/types.h>|
|a6d2a24c||rlibby||June 22, 2019, 5:35 a.m.||ddb show proc typo|
|b8038d78||mav||June 22, 2019, 3:50 a.m.||Remove ancient SCSI-2/3 mentioning.|
|a616b253||dougm||June 22, 2019, 3:16 a.m.||Modify swapon(8) to invoke BIO_DELETE to trim swap devices, either if|
|df840654||vangyzen||June 22, 2019, 1:20 a.m.||VirtIO SCSI: validate seg_max on attach
Until r349278, bhyve presented a seg_max to the guest that was too large. Detect this case and clamp it to the virtqueue size. Otherwise, we would fail the "too many segments to enqueue" assertion in virtqueue_enqueue(). I hit this by running a guest with a MAXPHYS of 256 KB. Reviewed by: bryanv cem MFC after: 1 week Sponsored by: Dell EMC Isilon Differential Revision: https://reviews.freebsd.org/D20703cgit ViewVC
|6805c9b7||mav||June 22, 2019, 1:06 a.m.||Make ELEMENT INDEX validation more strict.
SES specifications tell: "The Additional Element Status descriptors shall be in the same order as the status elements in the Enclosure Status diagnostic page". It allows us to question ELEMENT INDEX that is lower then values we already processed. There are many SAS2 enclosures with this kind of problem. While there, add more specific error messages for cases when ELEMENT INDEX is obviously wrong. Also skip elements with INVALID bit set. MFC after: 2 weekscgit ViewVC
|0feb46b0||scottl||June 21, 2019, 11:40 p.m.||Refactor xpt_getattr() to make it more readable. No outwardly|
|44f654fd||asomers||June 21, 2019, 11:29 p.m.||fusefs: fix corruption on short reads caused by r349279|