Age | Commit message (Collapse) | Author |
|
|
|
|
|
dying as soon as I can make it doesn't mean I shouldn't be able to look
at it in the meantime.
|
|
kill the compat define. Should have done this ages ago.
|
|
|
|
|
|
|
|
|
|
|
|
ago.
|
|
handler anyway. replace it with ${OpenBSD_driver_name}_intr like most of
the rest of the tree. No functional change.
|
|
defines. 0 and 1 are fine for returning from irq handlers so why bother
with the indirection?
|
|
the unmacroed/typedefed version.
|
|
the dev->driver irq_handler member since we now don't need to know.
Shaves a few bytes, and makes me happy.
|
|
We already have a lock protecting the irq registers, so extend it
trivially so it protects user interrupts too. Switch irq handler to
purely local handler. Finally remove an extra test in i915_wait_irq()
since we won't sleep even without that if the test will pass.
irq_lock and handler_wrap may now die. Coming soon.
|
|
handler directly, no fences to worry about right now.
|
|
interrupt we provide is vblank, it's just switching the handler. knf
while here.
|
|
races when waiting on fences, and use that in preference to irq_lock.
Don't use drm_irq_handler_wrap() anymore for irq handler, just the
mgadrm main irq handler. knf while here.
|
|
(vblank is already protected by that subsystem). Also, do all checks for
the correct software interrupt having fired inside DRM_WAIT_ON(), since
it won't sleep if it's already passed it doesn't gain us much (skips one
lock grab). Finally, establish the interrupt with only the main radeon
irq handler, don't bother with drm_irq_wrap. bunch of knf while i'm in
here.
|
|
expanding the function in line here.
|
|
and the lock to manipulate.
first step of removing drm_irq_handler_wrap which just grabs the
irq_lock, and eventually irq_lock. drivers should manage their own.
|
|
needed, but some machines seem to work much better with it.
|
|
forever.
|
|
noticed the hard way here at work.
commiting with opencvs,
permission by deraadt@
|
|
imap, mostly) to provide "username1\0real_username\0password" as your
base64 encoded string for authentication. We currently don't handle
that, instead expecting the first byte to be a NUL. So fix that up by
scanning for the first string, and ignoring it if it's there. The string
is also stupid in that the last bit (password) may not be NUL
terminated, so pay attention to that in our decoding and make sure that
it's always terminated correctly.
It's been discussed, and this decoding really should happen in the
unauthenticated process, not in the privileged one, but that is another
diff.
Problem found by todd@, who kindly helped me debug this and confirmed
that it now works with kmail, mutt and thunderbird.
"if it makes more stuff work, please commit" jacekm@.
-0- - not a smtpd hacker and I resent your implication.
|
|
of the struct proc* as the identifier for SEM_UNDO tracking and only
call semexit() from the original thread, once the process as a whole
is exiting
ok tedu@
|
|
member from the lock structure.
|
|
have a file on disk we'll need to load the revision into
a temporary file to do our comparison.
do not even bother trying diffing 2 off the same revisions
either. causes less noise... way less.
you guessed it, commited using opencvs entirely.
with permission from deraadt@
|
|
to the server for verification.
commited with opencvs,
permission by deraadt@
|
|
hardware virtual address offset, not a physical one. From upstream.
|
|
unobfuscate things a bit.
|
|
failure while i'm at it.
Been in snaps for a while. ok deraadt@
|
|
ok deraadt@
|
|
+ sort Corega entry
|
|
|
|
spotted by Fukaumi Naoki
|
|
server certificates when connecting as an SSL client from relays. it
works so far, but needs more testing and is currently lacking support
for certificate revocation (like CRL or OCSP). the file ssl_privsep.c
is extended to implement more code that should be in openssl to allow
loading the ca from chroot...
|
|
ok jmc@
|
|
|
|
makemap as !sendmail versions of this binary are not valid here.
pointed out by and ok sthen@
|
|
commited with opencvs,
with permission by deraadt@
|
|
|
|
|
|
From Padcal Lalonde, closes PR 6114
|
|
From Pascal Lalonde, closes PR 6112
|
|
will show as NTFS in fdisk output.
ok todd@ otto@ deraadt@
|
|
now sit between two SSL connections (Oitm - OpenBSD-in-the-middle),
accept SSL connections and forward to TCP, accept TCP connections and
forward to SSL, and do TCP to TCP of course.
This was tested by some people a while ago.
|
|
correctly (anchor names with characters after the terminating NUL byte
are considered invalid).
Thanks to camield@
|
|
|
|
|