committer filter by committer.
@path/to/ filter by path in repository.
committer@path/to/ filter by committer AND path in repository.
abdef0123 filter by commit's SHA hash.
rNNN filter by SVN revision.
rNNN-rMMM filter by SVN revisions range (inclusive).
Multiple filters can be specified separated by spaces or comas in which case they'll be combined using OR operator.
|147b8ba8||asomers||July 23, 2019, 11:14 p.m.||VOP_FSYNC.9: update copyright after r345677|
|d21036e0||tuexen||July 23, 2019, 9:28 p.m.||Add a sysctl variable ts_offset_per_conn to change the computation
of the TCP TS offset from taking the IP addresses and the TCP port numbers into account to a version just taking only the IP addresses into account. This works around broken middleboxes or endpoints. The default is to keep the behaviour, which is also the behaviour recommended in RFC 7323. Reported by: email@example.com Reviewed by: rrs@ MFC after: 2 weeks Sponsored by: Netflix, Inc. Differential Revision: https://reviews.freebsd.org/D20980cgit ViewVC
|051e692a||emaste||July 23, 2019, 8:59 p.m.||mqueuefs: fix struct file leak|
|0642bc1c||mav||July 23, 2019, 7:42 p.m.||Make `camcontrol hpa` and `camcontrol ama` trigger reprobe.|
|88880fd4||scottl||July 23, 2019, 6:40 p.m.||Fix the register layout for the Buffer Descript List Entry. It|
|9a4f1a24||tuexen||July 23, 2019, 6:31 p.m.||Don't hold a mutex while calling sbwait. This was found by syzkaller.|
|2dc2d580||erj||July 23, 2019, 6:14 p.m.||ixgbe(4): Fix enabling/disabling and reconfiguration of queues
- Wrong order of casting and bit shift caused that enabling and disabling queues didn't work properly for queues number larger than 32. Use literals with right suffix instead. - TX ring tail address was not updated during reinitiailzation of TX structures. It could block sending traffic. - Also remove unused variables 'eims' and 'active_queues'. Submitted by: Krzysztof Galazka <firstname.lastname@example.org> Reviewed by: erj@ Sponsored by: Intel Corporation Differential Revision: https://reviews.freebsd.org/D20826cgit ViewVC
|1a91d698||tuexen||July 23, 2019, 6:07 p.m.||Fix a LOR in SCTP which was found by running syzkaller.|
|e1d8b631||gallatin||July 23, 2019, 4:28 p.m.||pciconf: report PCI Gen4 speeds|
|61db163f||emaste||July 23, 2019, 4:27 p.m.||bhyve: correct out-of-bounds read in XHCI device emulation|
|43806bc5||kib||July 23, 2019, 4:11 p.m.||Update refcount(9).|
|ac4e5827||andrew||July 23, 2019, 2:52 p.m.||As with r350241 use the new UL macro on the main register mask.|
|f31c5955||andrew||July 23, 2019, 2:40 p.m.||Ensure the arm64 ID register fields are 64 bit types.
Previously only some of the ID register fields were 64 bit. To allow for a script to generate these mark them all 64 bit. To allow for their use in assembly we need to use the UINT64_C macro via a new UL macro to stop the lines from being too long. MFC after: 1 week Sponsored by: DARPA, AFRL Differential Revision: https://reviews.freebsd.org/D20977cgit ViewVC
|455d2ecb||ae||July 23, 2019, 12:52 p.m.||Eliminate rmlock from ipfw's BPF code.
After r343631 pfil hooks are invoked in net_epoch_preempt section, this allows to avoid extra locking. Add NET_EPOCH_ASSER() assertion to each ipfw_bpf_*tap*() call to require to be called from inside epoch section. Use NET_EPOCH_WAIT() in ipfw_clone_destroy() to wait until it becomes safe to free() ifnet. And use on-stack ifnet pointer in each ipfw_bpf_*tap*() call to avoid NULL pointer dereference in case when V_*log_if global variable will become NULL during ipfw_bpf_*tap*() call. Sponsored by: Yandex LLCcgit ViewVC
|c2dc497a||lwhsu||July 23, 2019, 9:39 a.m.||Temporarily skip flakey test case|