<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test2/sys/netsmb, branch releng/6.3</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test2/atom?h=releng%2F6.3</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test2/atom?h=releng%2F6.3'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/'/>
<updated>2006-08-11T19:41:51Z</updated>
<entry>
<title>MFC:</title>
<updated>2006-08-11T19:41:51Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2006-08-11T19:41:51Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=0335257194f48dd5afe66be4855c9dbf2d506f3f'/>
<id>urn:sha1:0335257194f48dd5afe66be4855c9dbf2d506f3f</id>
<content type='text'>
- Fix ncp_poll() to not panic by faking up enough poll(2) state in the
  current thread.
- Fix the rselect() routines for netncp and netsmb to return EWOULDBLOCK
  if the timeout is elapsed before they can block and to invoke
  pru_sopoll() directly.
</content>
</entry>
<entry>
<title>MFC the following change:</title>
<updated>2006-04-05T15:44:12Z</updated>
<author>
<name>Hiroki Sato</name>
<email>hrs@FreeBSD.org</email>
</author>
<published>2006-04-05T15:44:12Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=8010b2613527951f9972ea89fa42e4150ad9be0c'/>
<id>urn:sha1:8010b2613527951f9972ea89fa42e4150ad9be0c</id>
<content type='text'>
 Retire NETSMBCRYPTO as a kernel option and make its functionality
 enabled by default in NETSMB and smbfs.ko.

 With the most of modern SMB providers requiring encryption by
 default, there is little sense left in keeping the crypto part
 of NETSMB optional at the build time.

 This will also return smbfs.ko to its former properties users
 are rather accustomed to.

Submitted by:	yar
Approved by:	re (implicitly)
</content>
</entry>
<entry>
<title>MFC revision 1.20</title>
<updated>2006-01-24T04:08:48Z</updated>
<author>
<name>Christian S.J. Peron</name>
<email>csjp@FreeBSD.org</email>
</author>
<published>2006-01-24T04:08:48Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=9fd861d8e5ea8ce6c680e350e8eab9ddb9637c4d'/>
<id>urn:sha1:9fd861d8e5ea8ce6c680e350e8eab9ddb9637c4d</id>
<content type='text'>
date: 2006/01/16 17:03:21;  author: csjp;  state: Exp;  lines: +6 -2
Although we check the return value of copyin(9) while determaining how
long the string is in userspace, afterwards we call malloc(M_WAITOK),
which could sleep for an unknown amount of time. Check the return
value of copyin(9) just to be sure that nothing has changed during that
time.
</content>
</entry>
<entry>
<title>MFC smb_dev.c:1.29 from HEAD to RELENG_6:</title>
<updated>2006-01-13T10:23:39Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2006-01-13T10:23:39Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=2c6192958c8961773ff001f7f4885bc171658054'/>
<id>urn:sha1:2c6192958c8961773ff001f7f4885bc171658054</id>
<content type='text'>
   Prevent module unloading if there are active connections.

   PR:             kern/89085
   Submitted by:   Rostislav Krasny

Requested by:	Rostislav Krasny &lt;rosti dot bsd at gmail dot com&gt;
</content>
</entry>
<entry>
<title>MFC:</title>
<updated>2005-11-22T02:01:01Z</updated>
<author>
<name>Boris Popov</name>
<email>bp@FreeBSD.org</email>
</author>
<published>2005-11-22T02:01:01Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=1f6d41bc4b02b095ae30030beef7c52570bbe754'/>
<id>urn:sha1:1f6d41bc4b02b095ae30030beef7c52570bbe754</id>
<content type='text'>
Allow overriding of remote port numbers.
</content>
</entry>
<entry>
<title>Merge two sets of changes relating to devfs device node cloning from</title>
<updated>2005-08-13T21:24:18Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2005-08-13T21:24:18Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=7e993ff3bc9140ccccc23d520316c214cdad4ac2'/>
<id>urn:sha1:7e993ff3bc9140ccccc23d520316c214cdad4ac2</id>
<content type='text'>
HEAD to RELENG_6: changes to introduce a credentialed version of the
clone event handler, and then changes to merge the regular and
credentialed versions into a single interface (along with updates to
existing consumers).  With this merge, 6.x and 7.x are in sync.

First batch merges devfs_devs.c:1.37, devfs_vnops.c:1.115,
kern_conf.c:1.187, tty_pty.c:1.138, mac_vfs.c:1.109, mac_biba.c:1.36,
mac_lomac.c:1.36, mac_mls.c:1.73, mac_stub.c:1.53, mac_test.c:1.61,
conf.h:1.223, mac.h:1.68, mac_policy.h:1.67 from HEAD to RELENG_6:

  When devfs cloning takes place, provide access to the credential of the
  process that caused the clone event to take place for the device driver
  creating the device.  This allows cloned device drivers to adapt the
  device node based on security aspects of the process, such as the uid,
  gid, and MAC label.

  - Add a cred reference to struct cdev, so that when a device node is
    instantiated as a vnode, the cloning credential can be exposed to
    MAC.

  - Add make_dev_cred(), a version of make_dev() that additionally
    accepts the credential to stick in the struct cdev.  Implement it and
    make_dev() in terms of a back-end make_dev_credv().

  - Add a new event handler, dev_clone_cred, which can be registered to
    receive the credential instead of dev_clone, if desired.

  - Modify the MAC entry point mac_create_devfs_device() to accept an
    optional credential pointer (may be NULL), so that MAC policies can
    inspect and act on the label or other elements of the credential
    when initializing the skeleton device protections.

  - Modify tty_pty.c to register clone_dev_cred and invoke make_dev_cred(),
    so that the pty clone credential is exposed to the MAC Framework.

  While currently primarily focussed on MAC policies, this change is also
  a prerequisite for changes to allow ptys to be instantiated with the UID
  of the process looking up the pty.  This requires further changes to the
  pty driver -- in particular, to immediately recycle pty nodes on last
  close so that the credential-related state can be recreated on next
  lookup.

  Submitted by:   Andrew Reisse &lt;andrew.reisse@sparta.com&gt;
  Obtained from:  TrustedBSD Project
  Sponsored by:   SPAWAR, SPARTA

Second batch merges scsi_target.c:1.68, coda_fbsd.c:1.43,
firewirereg.h:1.38, fwdev.c:1.47, nmdm.c:1.36, snp.c:1.100, dsp.c:1.82,
mixer.c:1.45, vkbd.c:1.9, devfs_vnops.c:1.117, tty_pty.c:1.139,
tty_tty.c:1.57, bpf.c:1.156, if_tap.c:1.56, if_tun.c:1.153,
smb_dev.c:1.28, conf.h:1.224 from HEAD to RELENG_6:

  Merge the dev_clone and dev_clone_cred event handlers into a single
  event handler, dev_clone, which accepts a credential argument.
  Implementors of the event can ignore it if they're not interested,
  and most do.  This avoids having multiple event handler types and
  fall-back/precedence logic in devfs.

  This changes the kernel API for /dev cloning, and may affect third
  party packages containg cloning kernel modules.

  Requested by:   phk

These changes modifies the kernel device driver API for device cloning,
and might require minor modifications to third party device drivers that
make use of devfs cloning.  It will not be merged to RELENG_5.

Approved by:	re (scottl)
</content>
</entry>
<entry>
<title>lockmgr(...,LK_DRAIN,...) requires a balancing LK_RELEASE: recent</title>
<updated>2005-05-13T11:27:48Z</updated>
<author>
<name>Peter Edwards</name>
<email>peadar@FreeBSD.org</email>
</author>
<published>2005-05-13T11:27:48Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=34ddec12b1268763cece5b628326e37edb74d3a5'/>
<id>urn:sha1:34ddec12b1268763cece5b628326e37edb74d3a5</id>
<content type='text'>
INVARIANTS dependent checks in userret() pinpointed a missing
invocation here.

Remove an unused variable while here.

Reviewed By: bp@
Reported By: yongari@
MFC After: 3 days
</content>
</entry>
<entry>
<title>Explicitly hold a reference to the cdev we have just cloned.  This</title>
<updated>2005-03-31T12:19:44Z</updated>
<author>
<name>Poul-Henning Kamp</name>
<email>phk@FreeBSD.org</email>
</author>
<published>2005-03-31T12:19:44Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=f4f6abcb4ea1f4c91714febe157d0eaaf3e236ec'/>
<id>urn:sha1:f4f6abcb4ea1f4c91714febe157d0eaaf3e236ec</id>
<content type='text'>
closes the race where the cdev was reclaimed before it ever made it
back to devfs lookup.
</content>
</entry>
<entry>
<title>/* -&gt; /*- for license, minor formatting changes</title>
<updated>2005-01-07T01:45:51Z</updated>
<author>
<name>Warner Losh</name>
<email>imp@FreeBSD.org</email>
</author>
<published>2005-01-07T01:45:51Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=c398230b64aea809cb7c5cea8db580af7097920c'/>
<id>urn:sha1:c398230b64aea809cb7c5cea8db580af7097920c</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Don't use vn_todev().</title>
<updated>2004-11-10T07:16:59Z</updated>
<author>
<name>Poul-Henning Kamp</name>
<email>phk@FreeBSD.org</email>
</author>
<published>2004-11-10T07:16:59Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=38bb5ccdfd98e151a24f5cfdfcd269a179f7108f'/>
<id>urn:sha1:38bb5ccdfd98e151a24f5cfdfcd269a179f7108f</id>
<content type='text'>
</content>
</entry>
</feed>
