#
8bc4b666 |
| 14-Nov-2023 |
Aaron LI <aly@aaronly.me> |
Minor cleanups to 'sruct domain' definitions
|
Revision tags: v6.4.0, v6.4.0rc1, v6.5.0, v6.2.2, v6.2.1, v6.2.0, v6.3.0, v6.0.1, v6.0.0, v6.0.0rc1, v6.1.0, v5.8.3, v5.8.2, v5.8.1, v5.8.0, v5.9.0, v5.8.0rc1, v5.6.3, v5.6.2, v5.6.1, v5.6.0, v5.6.0rc1, v5.7.0, v5.4.3, v5.4.2, v5.4.1, v5.4.0, v5.5.0, v5.4.0rc1, v5.2.2, v5.2.1, v5.2.0, v5.3.0, v5.2.0rc, v5.0.2, v5.0.1, v5.0.0, v5.0.0rc2, v5.1.0, v5.0.0rc1, v4.8.1 |
|
#
2eb060ca |
| 01-Aug-2017 |
Sepherosa Ziehau <sephe@dragonflybsd.org> |
domain: Nuke pfslowtimo.
|
#
d2a45df8 |
| 31-Jul-2017 |
Sepherosa Ziehau <sephe@dragonflybsd.org> |
domain: Nuke pffasttimo
|
Revision tags: v4.8.0, v4.6.2, v4.9.0, v4.8.0rc |
|
#
3091de50 |
| 17-Dec-2016 |
Matthew Dillon <dillon@apollo.backplane.com> |
kernel - Tag vm_map_entry structure, slight optimization to zalloc, misc.
* Tag the vm_map_entry structure, allowing debugging programs to break-down how KMEM is being used more easily.
This re
kernel - Tag vm_map_entry structure, slight optimization to zalloc, misc.
* Tag the vm_map_entry structure, allowing debugging programs to break-down how KMEM is being used more easily.
This requires an additional argument to vm_map_find() and most kmem_alloc*() functions.
* Remove the page chunking parameter to zinit() and zinitna(). It was only being used degeneratively. Increase the chunking from one page to four pages, which will reduce the amount of vm_map_entry spam in the kernel_map.
* Use atomic ops when adjusting zone_kern_pages.
show more ...
|
Revision tags: v4.6.1, v4.6.0, v4.6.0rc2, v4.6.0rc, v4.7.0, v4.4.3, v4.4.2, v4.4.1, v4.4.0, v4.5.0, v4.4.0rc, v4.2.4, v4.3.1, v4.2.3, v4.2.1, v4.2.0, v4.0.6, v4.3.0, v4.2.0rc, v4.0.5, v4.0.4, v4.0.3, v4.0.2, v4.0.1, v4.0.0, v4.0.0rc3, v4.0.0rc2, v4.0.0rc, v4.1.0, v3.8.2, v3.8.1, v3.6.3, v3.8.0, v3.8.0rc2, v3.9.0, v3.8.0rc, v3.6.2, v3.6.1, v3.6.0, v3.7.1, v3.6.0rc, v3.7.0, v3.4.3, v3.4.2, v3.4.0, v3.4.1, v3.4.0rc, v3.5.0, v3.2.2, v3.2.1, v3.2.0, v3.3.0, v3.0.3, v3.0.2, v3.0.1, v3.1.0, v3.0.0 |
|
#
86d7f5d3 |
| 26-Nov-2011 |
John Marino <draco@marino.st> |
Initial import of binutils 2.22 on the new vendor branch
Future versions of binutils will also reside on this branch rather than continuing to create new binutils branches for each new version.
|
Revision tags: v2.12.0, v2.13.0, v2.10.1, v2.11.0, v2.10.0, v2.9.1, v2.8.2, v2.8.1, v2.8.0, v2.9.0, v2.6.3, v2.7.3, v2.6.2, v2.7.2, v2.7.1, v2.6.1, v2.7.0, v2.6.0, v2.5.1, v2.4.1, v2.5.0, v2.4.0 |
|
#
3d0fe62d |
| 05-Sep-2009 |
Alexander Polakov <polachok@gmail.com> |
netbt: add MODULE_VERSION
Reported-by: Rumko <rumcic@gmail.com> DragonFly-bug: http://bugs.dragonflybsd.org/issue1487
|
Revision tags: v2.3.2, v2.3.1, v2.2.1 |
|
#
f92bfd8c |
| 20-Mar-2009 |
Sepherosa Ziehau <sephe@dragonflybsd.org> |
netisr: Add pktinfo struct; add new netisr method to find msgport using pktinfo
The new netisr method, ni_mport_pktinfo, returns NULL if the passed in pktinfo does not contain enough information to
netisr: Add pktinfo struct; add new netisr method to find msgport using pktinfo
The new netisr method, ni_mport_pktinfo, returns NULL if the passed in pktinfo does not contain enough information to determine the msgport.
show more ...
|
Revision tags: v2.2.0, v2.3.0, v2.1.1 |
|
#
716da958 |
| 01-Nov-2008 |
Sepherosa Ziehau <sephe@dragonflybsd.org> |
Install pr_ctlport for the rest of the protocols.
Reported-by: tomas@
|
#
95af0087 |
| 24-Sep-2008 |
Sepherosa Ziehau <sephe@dragonflybsd.org> |
Add NETISR_FLAG_NOTMPSAFE, which could be used as the last parameter to netisr_register(), more expressive and less error-prone than 0.
Suggested-by: hsu@
|
#
92db3805 |
| 23-Sep-2008 |
Sepherosa Ziehau <sephe@dragonflybsd.org> |
Add following three network protocol threads running mode: 1) BGL (default) 2) Adaptive BGL. Protocol threads run without BGL by default. BGL will be held if the received msg does not have MSGF_
Add following three network protocol threads running mode: 1) BGL (default) 2) Adaptive BGL. Protocol threads run without BGL by default. BGL will be held if the received msg does not have MSGF_MPSAFE turned on the ms_flags field 3) No BGL (experimental)
The code on the main path is done by dillon@
Following three sysctls and tunables are added to adjust the "mode": net.netisr.mpsafe_thread net.inet.tcp.mpsafe_thread net.inet.udp.mpsafe_thread
They have same set of values, 0 (default) -- BGL 1 -- Adaptive BGL 2 -- No BGL
NETISR_FLAG_MPSAFE is added (netisr.ni_flags), so that: - netisr_queue() and schednetisr() could set MSGF_MPSAFE during msg initialization - netisr_run() (called by ether_input_oncpu()) could hold BGL based on this flag before calling netisr's handler
PR_MPSAFE is added (protosw.pr_flags), so that tranport_processing_oncpu() could hold BGL before calling protocol's input handler
Kernel API changes: - The thread parameter to netmsg_service_loop() must be supplied (running mode) and it must have the type of "int *" - netisr_register() takes additional flags parameter to indicate whether its handler is MPSAFE (NETISR_FLAG_MPSAFE) or not
Reviewed-by: dillon@
show more ...
|
Revision tags: v2.0.1 |
|
#
0ca0cd25 |
| 20-Apr-2008 |
Sascha Wildner <swildner@dragonflybsd.org> |
Another round of typo fixes (mostly in messages).
|
#
83aacede |
| 18-Mar-2008 |
Hasso Tepper <hasso@dragonflybsd.org> |
Sync Bluetooth stack with NetBSD.
Obtained-from: NetBSD via OpenBSD
|
#
9ce3a983 |
| 01-Feb-2008 |
Hasso Tepper <hasso@dragonflybsd.org> |
Implement net.bluetooth sysctls.
Obtained-from: NetBSD
|
#
0a9108eb |
| 30-Dec-2007 |
Hasso Tepper <hasso@dragonflybsd.org> |
Kernel part of bluetooth stack ported by Dmitry Komissaroff. Very much work in progress.
Obtained-from: NetBSD via OpenBSD
|
#
c157ff7a |
| 17-Jan-2011 |
Sascha Wildner <saw@online.de> |
kernel: Use NELEM() where we can.
|
#
5179415a |
| 02-Jan-2011 |
Sascha Wildner <saw@online.de> |
bluetooth(4): Fix loading bluetooth without pf.
bluetooth(4) was previously using pf(4)'s pool_* macros. Now that pool_get() has been turned into a function in pf(4), this is no longer possible, sin
bluetooth(4): Fix loading bluetooth without pf.
bluetooth(4) was previously using pf(4)'s pool_* macros. Now that pool_get() has been turned into a function in pf(4), this is no longer possible, since the bluetooth(4) module would have to depend on the pf(4) module for that.
To unbreak module loading, convert all calls to these macros to the zone(9) calls which they really are.
show more ...
|
#
002c1265 |
| 14-Sep-2010 |
Matthew Dillon <dillon@apollo.backplane.com> |
network - Major netmsg retooling, part 1
* Remove all the netmsg shims and make all pr_usrreqs and some proto->pr_* requests directly netmsg'd.
* Fix issues with tcp implied connects and tcp6->tc
network - Major netmsg retooling, part 1
* Remove all the netmsg shims and make all pr_usrreqs and some proto->pr_* requests directly netmsg'd.
* Fix issues with tcp implied connects and tcp6->tcp4 fallbacks with implied connects.
* Fix an issue with a stack-based udp netmsg (allocate it)
* Consolidate struct ip6protosw and struct protosw into a single structure and normalize the API functions which differed between the two (primarily proto->pr_input()).
* Remove protosw->pr_soport()
* Replace varargs protocol *_input() functions (ongoing) with fixed arguments.
show more ...
|
#
c3c96e44 |
| 09-Sep-2010 |
Matthew Dillon <dillon@apollo.backplane.com> |
network - Completely revamp the netisr / dispatch code
* All netisrs are dispatched MPSAFE (followup in later commits)
* Centralize the protocol threads. There is now just one thread per cpu man
network - Completely revamp the netisr / dispatch code
* All netisrs are dispatched MPSAFE (followup in later commits)
* Centralize the protocol threads. There is now just one thread per cpu managed by the netisr code. No more separate tcp/udp threads on each cpu.
* Make the mbuf M_HASH/m_pkthdr.hash mechanic the central routing mechanic for netmsgs.
* Remove the netisr ip_mport and pktinfo_portfn stuff and replace with a cpufn function which handles M_HASH/m_pkthdr.hash when M_HASH is not already set.
* Seriously clean up the packet input paths. Adjust ether_input_chain() and friends to not have to adjust the mbuf forwards and backwards, instead pass a header offset to the ni_cpufn function. The ip pullup and other related code will use the offset to determine where the ip header is within the packet.
show more ...
|