CTM_BEGIN 2.0 src-cur 11604 20140910031112Z . CTMFS .ctm_status 1004 1004 644 3d8eed2ccf18f6b85759ba0877bbec63 0162827df9ca02c3095d16493734001e 14 src-cur 11604 CTMFN etc/periodic/daily/110.clean-tmps 1004 1004 755 b7dbbc6c080eda6ce03dfe2c3c304c8e 79a81c7f72a9548ab73e1f1224465e80 213 d3 1 a3 1 # $FreeBSD: head/etc/periodic/daily/110.clean-tmps 271321 2014-09-09 17:03:58Z bdrewery $ d48 2 a49 2 find -x -d . -type f $args -delete $print find -x -d . ! -name . -type d $dargs -delete $print CTMFN lib/libc/sys/kqueue.2 1004 1004 644 cbbd4e12b7b153f4c7a4204f67efd998 880e4274e0aa16212dd2c65d8e87ecfe 95 d25 1 a25 1 .\" $FreeBSD: head/lib/libc/sys/kqueue.2 271315 2014-09-09 14:34:54Z joel $ d481 1 CTMFN release/doc/en_US.ISO8859-1/share/xml/release.xsl 1004 1004 644 4dc79f67a1aac36040105ce7614671c8 bc05d57e698b748ae542853f71282dfe 314 d2 1 a2 1 a10 1 d21 1 a21 1 subscribe to the <@FreeBSD.org> CTMFN release/doc/share/mk/doc.relnotes.mk 1004 1004 644 b95f9b6922c009872666fe616f43ffff 68e9738f31de14f03c37d0aa89b82733 297 d1 1 a1 1 # $FreeBSD: head/release/doc/share/mk/doc.relnotes.mk 271331 2014-09-09 19:51:57Z gjb $ a8 1 RELEASEMAILLIST!= grep -o 'release.maillist "\([^"]*\)"' ${RELN_ROOT}/share/xml/release.ent | sed 's|[^ ]* "\([^"]*\)"|\1|' a17 1 XSLTPROCFLAGS+= --param release.maillist "'${RELEASEMAILLIST}'" CTMFN release/doc/share/xml/release.ent 1004 1004 644 30b3745cad4ff5de88894b713422a63b 67d1f612716c9ede6aa041ad80a63c3e 233 d3 1 a3 1 $FreeBSD: head/release/doc/share/xml/release.ent 271332 2014-09-09 19:58:55Z gjb $ a29 3 a70 1 CTMFN release/doc/share/xml/release.xsl 1004 1004 644 0d7d93101355aa7b703baf5bd852a7bf f118978812a98176dc6d4ceaf3cdd23c 147 d2 1 a2 1 a14 1 CTMFN share/man/man9/sysctl.9 1004 1004 644 7bf29f129d3d0f475b67c6b197d4cce8 819071405d1197a1cd5a02bebde83448 1664 d26 1 a26 1 .\" $FreeBSD: head/share/man/man9/sysctl.9 271314 2014-09-09 14:31:56Z joel $ d108 1 a108 1 .Fa "const char *descr" d508 43 a704 43 .Sh SECURITY CONSIDERATIONS When creating new sysctls, careful attention should be paid to the security implications of the monitoring or management interface being created. Most sysctls present in the kernel are read-only or writable only by the superuser. Sysctls exporting extensive information on system data structures and operation, especially those implemented using procedures, will wish to implement access control to limit the undesired exposure of information about other processes, network connections, etc. .Pp The following top level sysctl name spaces are commonly used: .Bl -tag -width ".Va regression" .It Va compat Compatibility layer information. .It Va debug Debugging information. Various name spaces exist under .Va debug . .It Va hw Hardware and device driver information. .It Va kern Kernel behavior tuning; generally deprecated in favor of more specific name spaces. .It Va machdep Machine-dependent configuration parameters. .It Va net Network subsystem. Various protocols have name spaces under .Va net . .It Va regression Regression test configuration and information. .It Va security Security and security-policy configuration and information. .It Va sysctl Reserved name space for the implementation of sysctl. .It Va user Configuration settings relating to user application behavior. Generally, configuring applications using kernel sysctls is discouraged. .It Va vfs Virtual file system configuration and information. .It Va vm Virtual memory subsystem configuration and information. .El CTMFN sys/arm/include/atomic.h 1004 1004 644 00f88a1c41be9cdb5f1f77870d6a8773 c6f7e63b43d06e973159ca0781f1d034 331 d36 1 a36 1 * $FreeBSD: head/sys/arm/include/atomic.h 271310 2014-09-09 13:50:21Z ian $ d271 1 a271 1 " teq %Q[tmp], %Q[cmpval]\n" d273 1 a273 1 " teqeq %R[tmp], %R[cmpval]\n" d276 1 a276 1 " strexd %[ret], %[newval], [%[ptr]]\n" d285 2 a286 2 [cmpval] "r" (cmpval), [newval] "r" (newval) CTMFN sys/cam/ctl/ctl.c 1004 1004 644 0ebf9df2ee8c76c930b0135ba5ee4623 950321cc887cfb360811ac2b9fc62392 5554 d45 1 a45 1 __FBSDID("$FreeBSD: head/sys/cam/ctl/ctl.c 271316 2014-09-09 15:19:38Z mav $"); d266 1 a266 1 /*flags1*/ SCP_WCE | SCP_RCD, a322 1 * Mode Page Policy (0x87), d326 1 a326 1 #define SCSI_EVPD_NUM_SUPPORTED_PAGES 9 a381 1 static int ctl_inquiry_evpd_mpp(struct ctl_scsiio *ctsio, int alloc_len); a6251 47 ctl_caching_sp_handler(struct ctl_scsiio *ctsio, struct ctl_page_index *page_index, uint8_t *page_ptr) { struct scsi_caching_page *current_cp, *saved_cp, *user_cp; struct ctl_lun *lun; int set_ua; uint32_t initidx; lun = (struct ctl_lun *)ctsio->io_hdr.ctl_private[CTL_PRIV_LUN].ptr; initidx = ctl_get_initindex(&ctsio->io_hdr.nexus); set_ua = 0; user_cp = (struct scsi_caching_page *)page_ptr; current_cp = (struct scsi_caching_page *) (page_index->page_data + (page_index->page_len * CTL_PAGE_CURRENT)); saved_cp = (struct scsi_caching_page *) (page_index->page_data + (page_index->page_len * CTL_PAGE_SAVED)); mtx_lock(&lun->lun_lock); if ((current_cp->flags1 & (SCP_WCE | SCP_RCD)) != (user_cp->flags1 & (SCP_WCE | SCP_RCD))) set_ua = 1; current_cp->flags1 &= ~(SCP_WCE | SCP_RCD); current_cp->flags1 |= user_cp->flags1 & (SCP_WCE | SCP_RCD); saved_cp->flags1 &= ~(SCP_WCE | SCP_RCD); saved_cp->flags1 |= user_cp->flags1 & (SCP_WCE | SCP_RCD); if (set_ua != 0) { int i; /* * Let other initiators know that the mode * parameters for this LUN have changed. */ for (i = 0; i < CTL_MAX_INITIATORS; i++) { if (i == initidx) continue; lun->pending_ua[i] |= CTL_UA_MODE_CHANGE; } } mtx_unlock(&lun->lun_lock); return (0); } int d7011 1 a7011 2 if (control_dev == 0) header->dev_specific = 0x10; /* DPOFUA */ a7027 2 if (control_dev == 0) header->dev_specific = 0x10; /* DPOFUA */ d8979 2 a8980 1 int flags, retval; d8987 3 a8989 1 flags = 0; d9035 1 d9037 1 a9037 1 flags |= CTL_LLF_FUA; d9039 2 a9040 1 flags |= CTL_LLF_DPO; d9049 8 a9056 1 flags |= CTL_LLF_FUA; d9058 2 a9059 1 flags |= CTL_LLF_DPO; d9069 1 d9071 1 a9071 1 flags |= CTL_LLF_FUA; d9073 1 a9073 1 flags |= CTL_LLF_DPO; d9082 1 a9082 1 flags |= CTL_LLF_FUA; d9084 2 a9085 1 flags |= CTL_LLF_DPO; d9088 1 d9096 1 d9098 1 a9098 1 flags |= CTL_LLF_FUA; d9100 2 a9101 1 flags |= CTL_LLF_DPO; d9110 1 a9110 1 flags |= CTL_LLF_FUA; d9112 2 a9113 1 flags |= CTL_LLF_DPO; d9131 7 a9160 11 /* Set FUA and/or DPO if caches are disabled. */ if (isread) { if ((lun->mode_pages.caching_page[CTL_PAGE_CURRENT].flags1 & SCP_RCD) != 0) flags |= CTL_LLF_FUA | CTL_LLF_DPO; } else { if ((lun->mode_pages.caching_page[CTL_PAGE_CURRENT].flags1 & SCP_WCE) == 0) flags |= CTL_LLF_FUA; } d9165 1 a9165 1 lbalen->flags = (isread ? CTL_LLF_READ : CTL_LLF_WRITE) | flags; d9191 1 a9191 2 lbalen->flags &= ~CTL_LLF_COMPARE; lbalen->flags |= CTL_LLF_WRITE; d9205 2 a9206 1 int flags, retval; d9212 3 a9214 1 flags = 0; d9222 1 d9224 1 a9224 1 flags |= CTL_LLF_FUA; d9226 1 a9226 1 flags |= CTL_LLF_DPO; d9244 7 a9271 5 /* Set FUA if write cache is disabled. */ if ((lun->mode_pages.caching_page[CTL_PAGE_CURRENT].flags1 & SCP_WCE) == 0) flags |= CTL_LLF_FUA; d9287 1 a9287 1 lbalen->flags = CTL_LLF_COMPARE | flags; d9301 1 a9301 1 int bytchk, flags; d9309 1 a9309 1 flags = CTL_LLF_FUA; d9320 1 a9320 1 flags |= CTL_LLF_DPO; d9332 1 a9332 1 flags |= CTL_LLF_DPO; d9344 1 a9344 1 flags |= CTL_LLF_DPO; d9386 1 a9386 1 lbalen->flags = CTL_LLF_COMPARE | flags; d9389 1 a9389 1 lbalen->flags = CTL_LLF_VERIFY | flags; a9806 2 /* Mode Page Policy */ pages->page_list[3] = SVPD_MODE_PAGE_POLICY; d9808 1 a9808 1 pages->page_list[4] = SVPD_SCSI_PORTS; d9810 1 a9810 1 pages->page_list[5] = SVPD_SCSI_TPC; d9812 1 a9812 1 pages->page_list[6] = SVPD_BLOCK_LIMITS; d9814 1 a9814 1 pages->page_list[7] = SVPD_BDC; d9816 1 a9816 1 pages->page_list[8] = SVPD_LBP; a9884 52 ctl_inquiry_evpd_mpp(struct ctl_scsiio *ctsio, int alloc_len) { struct scsi_vpd_mode_page_policy *mpp_ptr; struct ctl_lun *lun; int data_len; lun = (struct ctl_lun *)ctsio->io_hdr.ctl_private[CTL_PRIV_LUN].ptr; data_len = sizeof(struct scsi_vpd_mode_page_policy) + sizeof(struct scsi_vpd_mode_page_policy_descr); ctsio->kern_data_ptr = malloc(data_len, M_CTL, M_WAITOK | M_ZERO); mpp_ptr = (struct scsi_vpd_mode_page_policy *)ctsio->kern_data_ptr; ctsio->kern_sg_entries = 0; if (data_len < alloc_len) { ctsio->residual = alloc_len - data_len; ctsio->kern_data_len = data_len; ctsio->kern_total_len = data_len; } else { ctsio->residual = 0; ctsio->kern_data_len = alloc_len; ctsio->kern_total_len = alloc_len; } ctsio->kern_data_resid = 0; ctsio->kern_rel_offset = 0; ctsio->kern_sg_entries = 0; /* * The control device is always connected. The disk device, on the * other hand, may not be online all the time. */ if (lun != NULL) mpp_ptr->device = (SID_QUAL_LU_CONNECTED << 5) | lun->be_lun->lun_type; else mpp_ptr->device = (SID_QUAL_LU_OFFLINE << 5) | T_DIRECT; mpp_ptr->page_code = SVPD_MODE_PAGE_POLICY; scsi_ulto2b(data_len - 4, mpp_ptr->page_length); mpp_ptr->descr[0].page_code = 0x3f; mpp_ptr->descr[0].subpage_code = 0xff; mpp_ptr->descr[0].policy = SVPD_MPP_SHARED; ctsio->scsi_status = SCSI_STATUS_OK; ctsio->io_hdr.flags |= CTL_FLAG_ALLOCATED; ctsio->be_move_done = ctl_config_move_done; ctl_datamove((union ctl_io *)ctsio); return (CTL_RETVAL_COMPLETE); } static int a10313 3 case SVPD_MODE_PAGE_POLICY: retval = ctl_inquiry_evpd_mpp(ctsio, alloc_len); break; CTMFN sys/cam/ctl/ctl.h 1004 1004 644 16384fe99a5401f390dde92b7a8d761b 61161e2850fe03409148bb84277a09f5 201 d31 1 a31 1 * $FreeBSD: head/sys/cam/ctl/ctl.h 271309 2014-09-09 11:38:29Z mav $ a164 2 int ctl_caching_sp_handler(struct ctl_scsiio *ctsio, struct ctl_page_index *page_index, uint8_t *page_ptr); CTMFN sys/cam/ctl/ctl_backend_block.c 1004 1004 644 89b9c799900ecfbdebc2ca64f7c9ed1f 696996e0834b730711e7f026ba53d8a8 808 d43 1 a43 1 __FBSDID("$FreeBSD: head/sys/cam/ctl/ctl_backend_block.c 271309 2014-09-09 11:38:29Z mav $"); d206 1 d602 1 a602 5 flags = 0; if (ARGS(io)->flags & CTL_LLF_DPO) flags |= IO_DIRECT; if (beio->bio_cmd == BIO_WRITE && ARGS(io)->flags & CTL_LLF_FUA) flags |= IO_SYNC; d652 2 a653 1 error = VOP_READ(be_lun->vn, &xuio, flags, file_data->cred); d690 2 a691 1 error = VOP_WRITE(be_lun->vn, &xuio, flags, file_data->cred); d755 1 a755 5 flags = 0; if (ARGS(io)->flags & CTL_LLF_DPO) flags |= IO_DIRECT; if (beio->bio_cmd == BIO_WRITE && ARGS(io)->flags & CTL_LLF_FUA) flags |= IO_SYNC; d783 1 a783 1 error = (*dev_data->csw->d_read)(dev_data->cdev, &xuio, flags); d786 1 a786 1 error = (*dev_data->csw->d_write)(dev_data->cdev, &xuio, flags); d877 1 d976 1 d1055 9 d1161 9 d1308 14 CTMFN sys/cam/ctl/ctl_io.h 1004 1004 644 959911a78e49b43b8343f7b998bb1a09 4f88bcc05a63cb0df5a63d6e177fc6d7 154 d31 1 a31 1 * $FreeBSD: head/sys/cam/ctl/ctl_io.h 271309 2014-09-09 11:38:29Z mav $ a141 2 #define CTL_LLF_FUA 0x04000000 #define CTL_LLF_DPO 0x08000000 CTMFN sys/cam/ctl/ctl_private.h 1004 1004 644 cb8c417b86cc07c15551e74d1df28236 8cfa5f43b77bfb950ec1048c6a255dc8 162 d31 1 a31 1 * $FreeBSD: head/sys/cam/ctl/ctl_private.h 271309 2014-09-09 11:38:29Z mav $ d307 1 a307 1 CTL_PAGE_FLAG_DISK_ONLY, NULL, ctl_caching_sp_handler}, CTMFN sys/cam/scsi/scsi_all.h 1004 1004 644 98b547ae649fbec0f4ebee7b83ae3ad8 3e9ffb192d05c3b2725f9f58f35ec3f5 520 d17 1 a17 1 * $FreeBSD: head/sys/cam/scsi/scsi_all.h 271313 2014-09-09 14:20:55Z mav $ a2112 21 struct scsi_vpd_mode_page_policy_descr { uint8_t page_code; uint8_t subpage_code; uint8_t policy; #define SVPD_MPP_SHARED 0x00 #define SVPD_MPP_PORT 0x01 #define SVPD_MPP_I_T 0x03 #define SVPD_MPP_MLUS 0x80 uint8_t reserved; }; struct scsi_vpd_mode_page_policy { uint8_t device; uint8_t page_code; #define SVPD_MODE_PAGE_POLICY 0x87 uint8_t page_length[2]; struct scsi_vpd_mode_page_policy_descr descr[0]; }; CTMFN sys/cddl/contrib/opensolaris/uts/common/fs/zfs/zvol.c 1004 1004 644 03586dea41c9964ca69158a23fcc7e2c cdf59b4e27e38ccef1215130cbd28ea4 46 d1636 1 a1636 1 sync = (ioflag & IO_SYNC) || CTMFN sys/dev/cxgbe/t4_netmap.c 1004 1004 644 45ccd82f44e2af01d47903a62e37c0d5 aba59b7011719ec7a40d75d17cd39fcc 171 d29 1 a29 1 __FBSDID("$FreeBSD: head/sys/dev/cxgbe/t4_netmap.c 271328 2014-09-09 18:36:00Z np $"); d380 1 a380 1 nm_txq->equiqidx = nm_txq->equeqidx = nm_txq->dbidx = 0; CTMFN sys/dev/vt/vt.h 1004 1004 644 f2c1e923e94f77f16122ee54911a0b0d c88b2d7c40268d87b4fcfc5a2825ad40 86 d32 1 a32 1 * $FreeBSD: head/sys/dev/vt/vt.h 271312 2014-09-09 14:18:56Z ray $ d90 6 CTMFN sys/dev/vt/vt_core.c 1004 1004 644 4a7fd0f5d6f0fb0da1f55e59fe652c9a 7470b052073e2e39b85b8ed3db865ac0 336 d34 1 a34 1 __FBSDID("$FreeBSD: head/sys/dev/vt/vt_core.c 271312 2014-09-09 14:18:56Z ray $"); d125 3 d491 2 a492 1 kdb_enter(KDB_WHY_BREAK, "manual escape to debugger"); d495 3 a497 2 /* XXX: Make this configurable! */ shutdown_nice(0); d500 2 a501 1 shutdown_nice(RB_HALT); d504 2 a505 1 shutdown_nice(RB_HALT|RB_POWEROFF); CTMFN sys/kern/kern_jail.c 1004 1004 644 b7bdfad1e4ba7af5527418086108fe53 f189b1ee57e95aed8b66f9e14c87410c 251 d30 1 a30 1 __FBSDID("$FreeBSD: head/sys/kern/kern_jail.c 271317 2014-09-09 16:05:33Z trasz $"); d1815 1 a1815 2 if (!(flags & JAIL_ATTACH)) sx_sunlock(&allprison_lock); d1817 1 a1817 2 if (!(flags & JAIL_ATTACH)) sx_slock(&allprison_lock); CTMFN sys/sys/param.h 1004 1004 644 b4420acacfd09668c46498fdb4d88c54 63621b9a1c7435a45b474f51eee300fa 162 d35 1 a35 1 * $FreeBSD: head/sys/sys/param.h 271341 2014-09-10 00:19:33Z gjb $ d61 1 a61 1 #define __FreeBSD_version 1100031 /* Master, propagated to newvers */ CTMFN tools/regression/lib/msun/test-invctrig.c 1004 1004 644 33b211fc8aea13c21ac55aaca4c8352e 067178baee5ec77d3017fd96c9d6a7f8 621 d32 1 a32 1 __FBSDID("$FreeBSD: head/tools/regression/lib/msun/test-invctrig.c 271336 2014-09-09 22:14:15Z ngie $"); d318 19 a336 14 complex long double z; complex long double acos_z; complex long double asin_z; complex long double atan_z; z = CMPLXL(0.75L, 0.25L); acos_z = CMPLXL(pi / 4, -0.34657359027997265470861606072908828L); asin_z = CMPLXL(pi / 4, 0.34657359027997265470861606072908828L); atan_z = CMPLXL(0.66290883183401623252961960521423782L, 0.15899719167999917436476103600701878L); testall_tol(cacos, z, acos_z, 2); testall_odd_tol(casin, z, asin_z, 2); testall_odd_tol(catan, z, atan_z, 2); CTMFN usr.sbin/bhyve/pci_virtio_net.c 1004 1004 644 e728a403bff0a962e45f1d34e1456bf6 9d352223f77fe516eb8bbbeebf54360b 2071 d26 1 a26 1 * $FreeBSD: head/usr.sbin/bhyve/pci_virtio_net.c 271338 2014-09-09 22:35:02Z grehan $ d30 1 a30 1 __FBSDID("$FreeBSD: head/usr.sbin/bhyve/pci_virtio_net.c 271338 2014-09-09 22:35:02Z grehan $"); d138 1 a138 2 uint64_t vsc_features; /* negotiated features */ a142 2 int rx_vhdrlen; int rx_merge; /* merged rx bufs in use */ a153 1 static void pci_vtnet_neg_features(void *, uint64_t); d163 1 a163 1 pci_vtnet_neg_features, /* apply negotiated features */ a215 2 sc->rx_merge = 1; sc->rx_vhdrlen = sizeof(struct virtio_net_rxhdr); a256 21 static __inline struct iovec * rx_iov_trim(struct iovec *iov, int *niov, int tlen) { struct iovec *riov; /* XXX short-cut: assume first segment is >= tlen */ assert(iov[0].iov_len >= tlen); iov[0].iov_len -= tlen; if (iov[0].iov_len == 0) { assert(*niov > 1); *niov -= 1; riov = &iov[1]; } else { iov[0].iov_base = (void *)((uintptr_t)iov[0].iov_base + tlen); riov = &iov[0]; } return (riov); } a259 1 struct iovec iov[VTNET_MAXSEGS], *riov; d261 4 a264 2 void *vrx; int len, n; d300 3 a302 1 * Get descriptor chain. d304 1 a304 2 n = vq_getchain(vq, iov, VTNET_MAXSEGS, NULL); assert(n >= 1 && n <= VTNET_MAXSEGS); d310 2 a311 2 vrx = iov[0].iov_base; riov = rx_iov_trim(iov, &n, sc->rx_vhdrlen); d313 2 a314 1 len = readv(sc->vsc_tapfd, riov, n); d327 2 a328 1 * number of buffers if merged rx bufs were negotiated. d330 2 a331 8 memset(vrx, 0, sc->rx_vhdrlen); if (sc->rx_merge) { struct virtio_net_rxhdr *vrxh; vrxh = vrx; vrxh->vrh_bufs = 1; } d336 1 a336 1 vq_relchain(vq, len + sc->rx_vhdrlen); a626 2 sc->rx_merge = 1; sc->rx_vhdrlen = sizeof(struct virtio_net_rxhdr); a659 1 /* silently ignore other writes */ d661 1 a662 1 a676 14 static void pci_vtnet_neg_features(void *vsc, uint64_t negotiated_features) { struct pci_vtnet_softc *sc = vsc; sc->vsc_features = negotiated_features; if (!(sc->vsc_features & VIRTIO_NET_F_MRG_RXBUF)) { sc->rx_merge = 0; /* non-merge rx header is 2 bytes shorter */ sc->rx_vhdrlen -= 2; } } CTMFN usr.sbin/ctld/login.c 1004 1004 644 892325b20ad542bcfdba177abc376ae8 72cf36ff630aeab183f8f2e5b6ecf2be 629 d32 1 a32 1 __FBSDID("$FreeBSD: head/usr.sbin/ctld/login.c 271320 2014-09-09 16:57:02Z trasz $"); a808 10 if (skipped_security && conn->conn_session_type == CONN_SESSION_TYPE_NORMAL) { if (conn->conn_target->t_alias != NULL) keys_add(response_keys, "TargetAlias", conn->conn_target->t_alias); keys_add_int(response_keys, "TargetPortalGroupTag", conn->conn_portal->p_portal_group->pg_tag); } d839 2 d1019 1 a1019 1 keys_add_int(response_keys, "TargetPortalGroupTag", d1021 5 d1072 7 a1081 2 keys_add_int(response_keys, "TargetPortalGroupTag", conn->conn_portal->p_portal_group->pg_tag); CTM_END 470f7ad78a1c6c535b51ad4104e5a4fe