committer filter by committer.
@path/to/ filter by path in repository.
committer@path/to/ filter by committer AND path in repository.
abdef0123 filter by commit's SHA hash.
rNNN filter by SVN revision.
rNNN-rMMM filter by SVN revisions range (inclusive).
Multiple filters can be specified separated by spaces or comas in which case they'll be combined using OR operator.
|f449384c||cem||Oct. 22, 2018, 1:27 a.m.||Add explicit copyright text to trivial header|
|24dd643d||jhibbits||Oct. 22, 2018, 12:27 a.m.||powerpc: stash off srr0 in si_addr for signals|
|6f4827ac||jhibbits||Oct. 22, 2018, 12:21 a.m.||powerpc/booke: Turn tlb*_print_tlbentries() into 'show tlb*' DDB commands|
|410634ef||eugen||Oct. 21, 2018, 9:29 p.m.||New sysctl: net.inet.icmp.error_keeptags
Currently, icmp_error() function copies FIB number from original packet into generated ICMP response but not mbuf_tags(9) chain. This prevents us from easily matching ICMP responses corresponding to tagged original packets by means of packet filter such as ipfw(8). For example, ICMP "time-exceeded in-transit" packets usually generated in response to traceroute probes lose tags attached to original packets. This change adds new sysctl net.inet.icmp.error_keeptags that defaults to 0 to avoid extra overhead when this feature not needed. Set net.inet.icmp.error_keeptags=1 to make icmp_error() copy mbuf_tags from original packet to generated ICMP response. PR: 215874 MFC after: 1 monthcgit ViewVC
|a00d5618||kp||Oct. 21, 2018, 9:17 p.m.||tcpdump: Log uid on pflog interfaces
If pf logs the user id ('pass out log (user)') have tcpdump also print this. Example output: 00:00:00.000000 rule 0/0(match) [uid 1001]: pass out on vtnet0: (tos 0x0, ttl 64, id 57539, offset 0, flags [none], proto UDP (17), length 55) 172.16.2.2.18337 > 172.16.2.1.53: [bad udp cksum 0x5c58 -> 0x16e4!] 40222+ A? google.be. (27) PR: 122773 Differential Revision: https://reviews.freebsd.org/D17625cgit ViewVC
|f252e3f2||ae||Oct. 21, 2018, 6:39 p.m.||Include <sys/eventhandler.h> to fix the build.|
|cc958ed2||ae||Oct. 21, 2018, 6:30 p.m.||Follow the fix in r339532 (by glebius):|
|2c87fdf0||ae||Oct. 21, 2018, 6:24 p.m.||Rework if_ipsec(4) to use epoch(9) instead of rmlock.
* use CK_LIST and FNV hash to keep chains of softc; * read access to softc is protected by epoch(); * write access is protected by ipsec_ioctl_sx. Changing of softc fields is allowed only when softc is unlinked from CK_LIST chains. * linking/unlinking of softc is allowed only when ipsec_ioctl_sx is exclusive locked. * the plain LIST of all softc is replaced by hash table that uses ingress address of tunnels as a key. * added support for appearing/disappearing of ingress address handling. Now it is allowed configure non-local ingress IP address, and thus the problem with if_ipsec(4) configuration that happens on boot, when ingress address is not yet configured, is solved. MFC after: 1 month Sponsored by: Yandex LLC Differential Revision: https://reviews.freebsd.org/D17190cgit ViewVC
|df49ca9f||ae||Oct. 21, 2018, 6:18 p.m.||Add handling for appearing/disappearing of ingress addresses to if_me(4).|
|19873f47||ae||Oct. 21, 2018, 6:13 p.m.||Add handling for appearing/disappearing of ingress addresses to if_gre(4).
* register handler for ingress address appearing/disappearing; * add new srcaddr hash table for fast softc lookup by srcaddr; * when srcaddr disappears, clear IFF_DRV_RUNNING flag from interface, and set it otherwise; MFC after: 1 month Sponsored by: Yandex LLC Differential Revision: https://reviews.freebsd.org/D17214cgit ViewVC
|009d82ee||ae||Oct. 21, 2018, 6:06 p.m.||Add handling for appearing/disappearing of ingress addresses to if_gif(4).
* register handler for ingress address appearing/disappearing; * add new srcaddr hash table for fast softc lookup by srcaddr; * when srcaddr disappears, clear IFF_DRV_RUNNING flag from interface, and set it otherwise; * remove the note about ingress address from BUGS section. MFC after: 1 month Sponsored by: Yandex LLC Differential Revision: https://reviews.freebsd.org/D17134cgit ViewVC
|8251c68d||ae||Oct. 21, 2018, 5:55 p.m.||Add KPI that can be used by tunneling interfaces to handle IP addresses
appearing and disappearing on the host system. Such handling is need, because tunneling interfaces must use addresses, that are configured on the host as ingress addresses for tunnels. Otherwise the system can send spoofed packets with source address, that belongs to foreign host. The KPI uses ifaddr_event_ext event to implement addresses tracking. Tunneling interfaces register event handlers and then they are notified by the kernel, when an address disappears or appears. ifaddr_event_compat() handler from if.c replaced by srcaddr_change_event() in the ip_encap.c MFC after: 1 month Sponsored by: Yandex LLC Differential Revision: https://reviews.freebsd.org/D17134cgit ViewVC
|6ab6e9d3||vmaffione||Oct. 21, 2018, 5:15 p.m.||man: fix vale(4) port naming|
|5191a3ae||kp||Oct. 21, 2018, 4:51 p.m.||vlan: Fix panic with lagg and vlan|
|c4b23051||imp||Oct. 21, 2018, 4:49 p.m.||Remove stray refernce to pdq. Like the infamous twenty first of Johan|