David Xu
e6747c7ce1
use rtprio_thread system call to get or set thread priority.
2006-09-21 04:21:30 +00:00
Alexander Kabaev
63ed5a7e06
Silence GCC4 warning.
...
strlen, strcmp live in <string.h> not <string.h>.
2006-09-21 01:30:04 +00:00
Wojciech A. Koszek
6e6dfbf26e
Don't forget to set internal error message in kvm_nlist().
...
Approved by: cognet (mentor)
2006-09-20 12:09:21 +00:00
Robert Watson
b91c45f25e
Hook up au_open.3 man page (and its symlinks), apparently missed during
...
initial OpenBSM merge.
Obtained from: TrustedBSD Project
MFC after: 3 days
2006-09-19 08:30:34 +00:00
Maxim Konovalov
0ba6effc8c
o Don't fseek() on closed file.
...
Submitted by: pgollucci@p6m7g8.com , Mark Costlow
MFC after: 3 weeks
2006-09-18 09:34:48 +00:00
Ruslan Ermilov
a73a3ab56b
Markup fixes.
2006-09-17 21:27:35 +00:00
Ruslan Ermilov
b31a663480
Remove more traces of Alpha.
2006-09-17 20:53:30 +00:00
Dag-Erling Smørgrav
f63ebe36f6
Reject user with names that are longer than OPIE is willing to deal with;
...
otherwise OPIE will happily truncate it.
Spotted by: ghelmer
MFC after: 2 weeks
2006-09-15 13:42:38 +00:00
Joel Dahl
f832d58dc8
Remove reference to T/TCP.
...
Reviewed by: andre
2006-09-13 19:48:00 +00:00
Joel Dahl
cec65ede6c
Bump .Dd.
...
Noticed by: danger
2006-09-13 18:34:32 +00:00
Joel Dahl
3e1f331553
Remove references to the pam(8) manual page. It does not exist.
...
Requested by: novel
Discussed with: brueffer, simon
2006-09-13 17:46:20 +00:00
Brian Somers
cd0ac75c13
Fix a typo
2006-09-10 20:41:33 +00:00
Martin Blapp
794295bab8
Sync with NetBSD rev. 1.16 + 1.17
...
Coverity CID 2292: Plug memory leak.
Coverity CID 2291: Move function call before allocating storage to prevent
memory leak on error.
MFC after: 1 month
2006-09-09 22:33:21 +00:00
Martin Blapp
8306b5154c
Sync with NetBSD rev. 1.29
...
Coverity CID 2293: Fix memory leak.
MFC after: 1 month
2006-09-09 22:32:07 +00:00
Martin Blapp
c317a5c2f6
Sync with NetBSD rev. 1.6 + 1.7
...
Coverity CID 779 + 780: Avoid NULL pointer dereference.
MFC after: 1 month
2006-09-09 22:29:16 +00:00
Martin Blapp
f340bd4070
Sync with NetBSD rev. 1.20 + 1.21
...
Coverity CID 2284: Fix multiple memory leaks.
Coverity CID 710: Remove unreachable code.
MFC after: 1 month
2006-09-09 22:26:47 +00:00
Martin Blapp
dc9fde8d4f
Sync with NetBSD rev. 1.10
...
Coverity CID 2276: Don't leak memory on error.
MFC after: 1 month
2006-09-09 22:22:39 +00:00
Martin Blapp
b0718451b8
Sync with NetBSD rev. 1.15
...
Coverity CID 2275: Avoid memory leak on error.
MFC after: 1 month
2006-09-09 22:21:15 +00:00
Martin Blapp
b0eb405d46
Sync part of NetBSD rev. 1.14
...
Fix unpaired sigblock which possibly leaves the process with all
signals blocked.
MFC after: 2 weeks
2006-09-09 22:18:57 +00:00
Martin Blapp
e0c693387f
Sync with NetBSD rev. 1.16 + 1.17
...
Coverity CID 3651: Don't leak ifaddrs on getaddrinfo failure.
Coverity CID 2283: Don't leak sys_auth on error.
MFC after: 1 month
2006-09-09 22:14:42 +00:00
Jason Evans
820e03699c
Change the way base allocation is done for internal malloc data
...
structures, in order to avoid the possibility of attempted recursive
lock acquisition for chunks_mtx.
Reported by: Slawa Olhovchenkov <slw@zxy.spb.ru>
2006-09-08 17:52:15 +00:00
David Xu
ddaf6689e3
Use return value of _thr_umutex_lock instead of using zero.
2006-09-08 09:29:14 +00:00
Thomas Quinot
3a1d9c271b
Minor comment fix.
2006-09-08 08:14:32 +00:00
David Xu
bddd24cd9c
Replace internal usage of struct umtx with umutex which can supports
...
real-time if we want, no functionality is changed.
2006-09-06 04:04:10 +00:00
Ruslan Ermilov
4d6ff03d50
alloca() cannot check if the allocation is valid; mention the consequences.
...
Obtained from: OpenBSD
2006-09-05 16:30:11 +00:00
Ruslan Ermilov
3c03c7095e
GC dead code. If we want to stay polite to the foreign compilers,
...
we can find another way to issue an #error, but using a preprocessed
assembler for that purpose and clobbering libc.a with an empty .o
just for the sake of #error reporting is way too much of a burden.
2006-09-05 16:21:26 +00:00
David Xu
8549079365
Same as pthread_setschedparam, use sizeof(struct sched_param) instead.
2006-09-05 14:39:06 +00:00
David Xu
be0bfdd207
Pass correct parameter size.
2006-09-05 14:37:22 +00:00
Tim Kientzle
c12a9d810e
Some minor corrections:
...
* Expose functions for setting the "skip file" dev/ino information
* Expose functions for setting/querying the block size on reads
* Correctly propagate errors out of archive_read_close/archive_write_close
* Update manpage with information about new functions
2006-09-05 05:59:46 +00:00
Thomas Quinot
71219ddbd1
(pw_copy): Handle the case of a malformed line in master.passwd
...
(copy it silently, do not dereference NULL pointer).
PR: bin/102848
Reviewed by: security-officer (cperciva)
MFC after: 1 week
2006-09-04 15:09:21 +00:00
Marcel Moolenaar
ee35caa0b3
Whitespace fix.
2006-09-02 01:07:21 +00:00
Marcel Moolenaar
4d630a8f11
Stylize:
...
o avoid using a global register variable.
o redefine struct ia64_tp as a union. We don't have to get to the
fields themselves. We just need it to be of the right size with
the right alignment.
2006-09-01 21:25:22 +00:00
Marcel Moolenaar
be2f4bda88
Stylize: avoid using a global register variable.
2006-09-01 21:01:11 +00:00
Marcel Moolenaar
ce2dfbd199
Enable TLS on PowerPC.
2006-09-01 19:14:14 +00:00
Marcel Moolenaar
4c91d168a7
The ucontext is 16-byte aligned, which means that struct tcb is
...
16-byte aligned. Consequently, struct tcb is a multiple of 16
bytes in size. We need to make sure there's no padding after
struct ppc32_tp. We do this by explicitly adding the necessary
padding in front of it.
2006-09-01 19:13:36 +00:00
Marcel Moolenaar
5df93cb787
Stylize. Introduce ppc_{get|set}_tp() and ppc_{get|set}_tcb() to
...
abstract the magic that happens when deriving one or the other.
2006-09-01 17:52:13 +00:00
Marcel Moolenaar
9d353fbc3f
Fix style(9) in code copied from rtld.
2006-09-01 17:35:48 +00:00
Marcel Moolenaar
cc79b334de
Rename TLS_TP_OFFSET back to TP_OFFSET. The former clashes with rtld.
2006-09-01 06:36:00 +00:00
Marcel Moolenaar
bc14049e96
Enable TLS on ia64.
2006-09-01 06:18:43 +00:00
Marcel Moolenaar
20b18e870b
Implement TLS.
2006-09-01 06:17:16 +00:00
Marcel Moolenaar
8e61dbecfc
Stylize.
2006-09-01 06:15:00 +00:00
Marcel Moolenaar
3614156c7d
Fix the variant I allocation for KSE: Allow a larger TCB and assume
...
that the documented TCB is at the tail of the extended TCB. In other
words, the base of the TCB has a negative offset from the TLS.
2006-09-01 06:13:16 +00:00
Robert Watson
b8f3034c1f
Remove curdir reference in libbsm build; this is not required as the
...
include path will already point to the populated include tree. This
is left over from boot-strapping the build and install of libbsm
during the initial import and merge.
Obtained from: TrustedBSD Project
Pointed out by: ru
2006-09-01 05:21:45 +00:00
Marcel Moolenaar
35ca217bf0
Stylize.
2006-08-31 23:31:18 +00:00
Marcel Moolenaar
9f7b8b0d3c
TLS fixes:
...
o The TLS pointer (r2) points 0x7000 after the *end* of the TCB.
o _rtld_allocate_tls() gets a pointer to the current TCB, not the
current TLS pointer.
o _rtld_free_tls() gets the size of the TCB structure.
2006-08-31 19:16:47 +00:00
Marcel Moolenaar
91705de0c2
Fix harmless bug: sizeof(tcb) equals sizeof(void*) not sizeof(struct tcb).
...
The argument is (currently) not used by _rtld_free_tls().
2006-08-31 19:06:30 +00:00
Marcel Moolenaar
57c2251d5c
o Set TP using inline assembly to avoid dead code elimination.
...
o Eliminate _tcb.
2006-08-30 03:31:32 +00:00
Marcel Moolenaar
f3cec68877
Avoid dead code elimination of the assignment to TP by using inline
...
assembly.
2006-08-30 00:57:35 +00:00
Marcel Moolenaar
7d3f85133a
Prevent dead code elimination for the TP assignmient by using inline
...
assembly.
2006-08-30 00:39:07 +00:00
David Xu
fd2b89c48c
Remove unused file.
2006-08-29 13:01:23 +00:00