wkoszek
0f11fa239b
Don't forget to set internal error message in kvm_nlist().
...
Approved by: cognet (mentor)
2006-09-20 12:09:21 +00:00
rwatson
3aa148db24
Hook up au_open.3 man page (and its symlinks), apparently missed during
...
initial OpenBSM merge.
Obtained from: TrustedBSD Project
MFC after: 3 days
2006-09-19 08:30:34 +00:00
maxim
93ed40a8c9
o Don't fseek() on closed file.
...
Submitted by: pgollucci@p6m7g8.com , Mark Costlow
MFC after: 3 weeks
2006-09-18 09:34:48 +00:00
ru
f4eec08060
Markup fixes.
2006-09-17 21:27:35 +00:00
ru
b4db035948
Remove more traces of Alpha.
2006-09-17 20:53:30 +00:00
des
22cf0fa876
Reject user with names that are longer than OPIE is willing to deal with;
...
otherwise OPIE will happily truncate it.
Spotted by: ghelmer
MFC after: 2 weeks
2006-09-15 13:42:38 +00:00
joel
4d276cbac6
Remove reference to T/TCP.
...
Reviewed by: andre
2006-09-13 19:48:00 +00:00
joel
e751eb9832
Bump .Dd.
...
Noticed by: danger
2006-09-13 18:34:32 +00:00
joel
e532d7ce17
Remove references to the pam(8) manual page. It does not exist.
...
Requested by: novel
Discussed with: brueffer, simon
2006-09-13 17:46:20 +00:00
brian
c4fc7dad18
Fix a typo
2006-09-10 20:41:33 +00:00
mbr
283bae6f03
Sync with NetBSD rev. 1.16 + 1.17
...
Coverity CID 2292: Plug memory leak.
Coverity CID 2291: Move function call before allocating storage to prevent
memory leak on error.
MFC after: 1 month
2006-09-09 22:33:21 +00:00
mbr
958b62e8da
Sync with NetBSD rev. 1.29
...
Coverity CID 2293: Fix memory leak.
MFC after: 1 month
2006-09-09 22:32:07 +00:00
mbr
5fb3f2afad
Sync with NetBSD rev. 1.6 + 1.7
...
Coverity CID 779 + 780: Avoid NULL pointer dereference.
MFC after: 1 month
2006-09-09 22:29:16 +00:00
mbr
f5fc251a25
Sync with NetBSD rev. 1.20 + 1.21
...
Coverity CID 2284: Fix multiple memory leaks.
Coverity CID 710: Remove unreachable code.
MFC after: 1 month
2006-09-09 22:26:47 +00:00
mbr
a71d32ed3c
Sync with NetBSD rev. 1.10
...
Coverity CID 2276: Don't leak memory on error.
MFC after: 1 month
2006-09-09 22:22:39 +00:00
mbr
cbf797decd
Sync with NetBSD rev. 1.15
...
Coverity CID 2275: Avoid memory leak on error.
MFC after: 1 month
2006-09-09 22:21:15 +00:00
mbr
a197a4c83b
Sync part of NetBSD rev. 1.14
...
Fix unpaired sigblock which possibly leaves the process with all
signals blocked.
MFC after: 2 weeks
2006-09-09 22:18:57 +00:00
mbr
bc9ee76c28
Sync with NetBSD rev. 1.16 + 1.17
...
Coverity CID 3651: Don't leak ifaddrs on getaddrinfo failure.
Coverity CID 2283: Don't leak sys_auth on error.
MFC after: 1 month
2006-09-09 22:14:42 +00:00
jasone
ce0ab81797
Change the way base allocation is done for internal malloc data
...
structures, in order to avoid the possibility of attempted recursive
lock acquisition for chunks_mtx.
Reported by: Slawa Olhovchenkov <slw@zxy.spb.ru>
2006-09-08 17:52:15 +00:00
davidxu
e83ab88356
Use return value of _thr_umutex_lock instead of using zero.
2006-09-08 09:29:14 +00:00
thomas
e5de30ab6d
Minor comment fix.
2006-09-08 08:14:32 +00:00
davidxu
21e4536026
Replace internal usage of struct umtx with umutex which can supports
...
real-time if we want, no functionality is changed.
2006-09-06 04:04:10 +00:00
ru
cb0ad18d63
alloca() cannot check if the allocation is valid; mention the consequences.
...
Obtained from: OpenBSD
2006-09-05 16:30:11 +00:00
ru
32ef646170
GC dead code. If we want to stay polite to the foreign compilers,
...
we can find another way to issue an #error, but using a preprocessed
assembler for that purpose and clobbering libc.a with an empty .o
just for the sake of #error reporting is way too much of a burden.
2006-09-05 16:21:26 +00:00
davidxu
567ba06917
Same as pthread_setschedparam, use sizeof(struct sched_param) instead.
2006-09-05 14:39:06 +00:00
davidxu
5b28602728
Pass correct parameter size.
2006-09-05 14:37:22 +00:00
kientzle
b70eb6239f
Some minor corrections:
...
* Expose functions for setting the "skip file" dev/ino information
* Expose functions for setting/querying the block size on reads
* Correctly propagate errors out of archive_read_close/archive_write_close
* Update manpage with information about new functions
2006-09-05 05:59:46 +00:00
thomas
2bf8d53a14
(pw_copy): Handle the case of a malformed line in master.passwd
...
(copy it silently, do not dereference NULL pointer).
PR: bin/102848
Reviewed by: security-officer (cperciva)
MFC after: 1 week
2006-09-04 15:09:21 +00:00
marcel
587bff4653
Whitespace fix.
2006-09-02 01:07:21 +00:00
marcel
9dfca48522
Stylize:
...
o avoid using a global register variable.
o redefine struct ia64_tp as a union. We don't have to get to the
fields themselves. We just need it to be of the right size with
the right alignment.
2006-09-01 21:25:22 +00:00
marcel
d21513035e
Stylize: avoid using a global register variable.
2006-09-01 21:01:11 +00:00
marcel
d9435a56c2
Enable TLS on PowerPC.
2006-09-01 19:14:14 +00:00
marcel
657a4c30ac
The ucontext is 16-byte aligned, which means that struct tcb is
...
16-byte aligned. Consequently, struct tcb is a multiple of 16
bytes in size. We need to make sure there's no padding after
struct ppc32_tp. We do this by explicitly adding the necessary
padding in front of it.
2006-09-01 19:13:36 +00:00
marcel
a081b45ede
Stylize. Introduce ppc_{get|set}_tp() and ppc_{get|set}_tcb() to
...
abstract the magic that happens when deriving one or the other.
2006-09-01 17:52:13 +00:00
marcel
64cbc41da3
Fix style(9) in code copied from rtld.
2006-09-01 17:35:48 +00:00
marcel
2d71eb396a
Rename TLS_TP_OFFSET back to TP_OFFSET. The former clashes with rtld.
2006-09-01 06:36:00 +00:00
marcel
aa70489a8b
Enable TLS on ia64.
2006-09-01 06:18:43 +00:00
marcel
74d4bf1cd1
Implement TLS.
2006-09-01 06:17:16 +00:00
marcel
1125db3243
Stylize.
2006-09-01 06:15:00 +00:00
marcel
a2087dd751
Fix the variant I allocation for KSE: Allow a larger TCB and assume
...
that the documented TCB is at the tail of the extended TCB. In other
words, the base of the TCB has a negative offset from the TLS.
2006-09-01 06:13:16 +00:00
rwatson
7313caf832
Remove curdir reference in libbsm build; this is not required as the
...
include path will already point to the populated include tree. This
is left over from boot-strapping the build and install of libbsm
during the initial import and merge.
Obtained from: TrustedBSD Project
Pointed out by: ru
2006-09-01 05:21:45 +00:00
marcel
6a1762d589
Stylize.
2006-08-31 23:31:18 +00:00
marcel
5ffd88a18e
TLS fixes:
...
o The TLS pointer (r2) points 0x7000 after the *end* of the TCB.
o _rtld_allocate_tls() gets a pointer to the current TCB, not the
current TLS pointer.
o _rtld_free_tls() gets the size of the TCB structure.
2006-08-31 19:16:47 +00:00
marcel
c088f26c25
Fix harmless bug: sizeof(tcb) equals sizeof(void*) not sizeof(struct tcb).
...
The argument is (currently) not used by _rtld_free_tls().
2006-08-31 19:06:30 +00:00
marcel
4736b1fdce
o Set TP using inline assembly to avoid dead code elimination.
...
o Eliminate _tcb.
2006-08-30 03:31:32 +00:00
marcel
0b6bc8a47b
Avoid dead code elimination of the assignment to TP by using inline
...
assembly.
2006-08-30 00:57:35 +00:00
marcel
007866fe9c
Prevent dead code elimination for the TP assignmient by using inline
...
assembly.
2006-08-30 00:39:07 +00:00
davidxu
37473cc569
Remove unused file.
2006-08-29 13:01:23 +00:00
kientzle
0cfc107043
When skipping data, track the position in the bytestream correctly.
...
Without this, tar -r breaks badly; new entries overwrite the
middle of the archive instead of being added at the end.
Thanks to: Chris Spiegel
2006-08-29 04:59:25 +00:00
davidxu
faa99f1910
pthread_sigmask is in thr_sig.c, remove this file.
2006-08-28 12:29:54 +00:00