summaryrefslogtreecommitdiffstats
path: root/lib/libc
diff options
context:
space:
mode:
authorngie <ngie@FreeBSD.org>2017-07-18 18:15:28 +0000
committerngie <ngie@FreeBSD.org>2017-07-18 18:15:28 +0000
commit38e7ed4e86b3bc42b51a471f280090c60801334e (patch)
treec53497258617a2d7b054dd19b179a1bc3ad61adb /lib/libc
parent4d2e9edbe12e16a1d9bc56a2a80d619064750b1e (diff)
downloadFreeBSD-src-38e7ed4e86b3bc42b51a471f280090c60801334e.zip
FreeBSD-src-38e7ed4e86b3bc42b51a471f280090c60801334e.tar.gz
MFC r318715,r318717,r318718,r318719,r318720,r318721:
r318715: _umtx_op(2): fix minor manlint issues - Sort .Xr entries in SEE ALSO section. - Sort SEE ALSO and STANDARDS sections properly, in terms of the entire document. r318717: cap_enter(2): fix manlint issues - Sort SEE ALSO section appropriately. - Correct section for sysctl(9). r318718: rctl_add_rule(2): fix manlint warnings - Fix commas (either missing or misused) after .Nm entries in SYNOPSIS r318719: open(2): fix manlint warnings - Sort SEE ALSO .Xr entries. - Sort sections (HISTORY comes after STANDARDS). r318720: ptrace(2): clean up trailing whitespace r318721: kill(2): add missing section for sysctl(9)
Diffstat (limited to 'lib/libc')
-rw-r--r--lib/libc/sys/_umtx_op.246
-rw-r--r--lib/libc/sys/cap_enter.28
-rw-r--r--lib/libc/sys/kill.22
-rw-r--r--lib/libc/sys/open.221
-rw-r--r--lib/libc/sys/ptrace.24
-rw-r--r--lib/libc/sys/rctl_add_rule.28
6 files changed, 45 insertions, 44 deletions
diff --git a/lib/libc/sys/_umtx_op.2 b/lib/libc/sys/_umtx_op.2
index 6350999..4682b34 100644
--- a/lib/libc/sys/_umtx_op.2
+++ b/lib/libc/sys/_umtx_op.2
@@ -28,7 +28,7 @@
.\"
.\" $FreeBSD$
.\"
-.Dd May 29, 2016
+.Dd May 23, 2017
.Dt _UMTX_OP 2
.Os
.Sh NAME
@@ -1382,32 +1382,11 @@ Mutex lock requests without timeout specified are restartable.
The error is not returned to userspace code since restart
is handled by usual adjustment of the instruction counter.
.El
-.Sh BUGS
-A window between a unlocking robust mutex and resetting the pointer in the
-.Dv robust_inact_offset
-member of the registered
-.Vt struct umtx_robust_lists_params
-allows another thread to destroy the mutex, thus making the kernel inspect
-freed or reused memory.
-The
-.Li libthr
-implementation is only vulnerable to this race when operating on
-a shared mutex.
-A possible fix for the current implementation is to strengthen the checks
-for shared mutexes before terminating them, in particular, verifying
-that the mutex memory is mapped from a shared memory object allocated
-by the
-.Dv UMTX_OP_SHM
-request.
-This is not done because it is believed that the race is adequately
-covered by other consistency checks, while adding the check would
-prevent alternative implementations of
-.Li libpthread .
.Sh SEE ALSO
.Xr clock_gettime 2 ,
.Xr mmap 2 ,
-.Xr shm_open 2 ,
.Xr setrlimit 2 ,
+.Xr shm_open 2 ,
.Xr sigaction 2 ,
.Xr thr_exit 2 ,
.Xr thr_kill 2 ,
@@ -1425,3 +1404,24 @@ to implement
.St -p1003.1-2001
.Xr pthread 3
functionality.
+.Sh BUGS
+A window between a unlocking robust mutex and resetting the pointer in the
+.Dv robust_inact_offset
+member of the registered
+.Vt struct umtx_robust_lists_params
+allows another thread to destroy the mutex, thus making the kernel inspect
+freed or reused memory.
+The
+.Li libthr
+implementation is only vulnerable to this race when operating on
+a shared mutex.
+A possible fix for the current implementation is to strengthen the checks
+for shared mutexes before terminating them, in particular, verifying
+that the mutex memory is mapped from a shared memory object allocated
+by the
+.Dv UMTX_OP_SHM
+request.
+This is not done because it is believed that the race is adequately
+covered by other consistency checks, while adding the check would
+prevent alternative implementations of
+.Li libpthread .
diff --git a/lib/libc/sys/cap_enter.2 b/lib/libc/sys/cap_enter.2
index 03be524..adfea3f 100644
--- a/lib/libc/sys/cap_enter.2
+++ b/lib/libc/sys/cap_enter.2
@@ -28,7 +28,7 @@
.\"
.\" $FreeBSD$
.\"
-.Dd September 27, 2016
+.Dd May 23, 2017
.Dt CAP_ENTER 2
.Os
.Sh NAME
@@ -139,11 +139,11 @@ points outside the process's allocated address space.
.Xr cap_fcntls_limit 2 ,
.Xr cap_ioctls_limit 2 ,
.Xr cap_rights_limit 2 ,
-.Xr procctl 2 ,
-.Xr sysctl 2 ,
.Xr fexecve 2 ,
+.Xr procctl 2 ,
.Xr cap_sandboxed 3 ,
-.Xr capsicum 4
+.Xr capsicum 4 ,
+.Xr sysctl 9
.Sh HISTORY
Support for capabilities and capabilities mode was developed as part of the
.Tn TrustedBSD
diff --git a/lib/libc/sys/kill.2 b/lib/libc/sys/kill.2
index 98c3050..95b56f4 100644
--- a/lib/libc/sys/kill.2
+++ b/lib/libc/sys/kill.2
@@ -71,7 +71,7 @@ A single exception is the signal SIGCONT, which may always be sent
to any process with the same session ID as the sender.
In addition, if the
.Va security.bsd.conservative_signals
-.Xr sysctl
+.Xr sysctl 9
is set to 1, the user is not a super-user, and
the receiver is set-uid, then
only job control and terminal control signals may
diff --git a/lib/libc/sys/open.2 b/lib/libc/sys/open.2
index c7ac38a..74538fe 100644
--- a/lib/libc/sys/open.2
+++ b/lib/libc/sys/open.2
@@ -471,16 +471,8 @@ is specified and the file is not a directory.
.Xr read 2 ,
.Xr umask 2 ,
.Xr write 2 ,
-.Xr fopen 3
-.Sh HISTORY
-The
-.Fn open
-function appeared in
-.At v6 .
-The
-.Fn openat
-function was introduced in
-.Fx 8.0 .
+.Xr fopen 3 ,
+.Xr capsicum 4
.Sh STANDARDS
These functions are specified by
.St -p1003.1-2008 .
@@ -497,6 +489,15 @@ when
is set in flags and the final component of pathname is a symbolic link
to distinguish it from the case of too many symbolic link traversals
in one of its non-final components.
+.Sh HISTORY
+The
+.Fn open
+function appeared in
+.At v6 .
+The
+.Fn openat
+function was introduced in
+.Fx 8.0 .
.Sh BUGS
The Open Group Extended API Set 2 specification requires that the test
for whether
diff --git a/lib/libc/sys/ptrace.2 b/lib/libc/sys/ptrace.2
index 2cd26ee..8eb26dd 100644
--- a/lib/libc/sys/ptrace.2
+++ b/lib/libc/sys/ptrace.2
@@ -166,7 +166,7 @@ new child processes will execute without tracing enabled.
This event flag controls tracing of LWP
.Pq kernel thread
creation and destruction.
-When this event is enabled,
+When this event is enabled,
new LWPs will stop and report an event with
.Dv PL_FLAG_BORN
set before executing their first instruction,
@@ -215,7 +215,7 @@ or
includes only
.Dv PTRACE_EXEC
events.
-All other event flags are disabled.
+All other event flags are disabled.
.Pp
The
.Fa request
diff --git a/lib/libc/sys/rctl_add_rule.2 b/lib/libc/sys/rctl_add_rule.2
index 667a005..b1d807b 100644
--- a/lib/libc/sys/rctl_add_rule.2
+++ b/lib/libc/sys/rctl_add_rule.2
@@ -28,10 +28,10 @@
.Dt RCTL_ADD_RULE 2
.Os
.Sh NAME
-.Nm rctl_add_rule,
-.Nm rctl_get_limits
-.Nm rctl_get_racct,
-.Nm rctl_get_rules,
+.Nm rctl_add_rule ,
+.Nm rctl_get_limits ,
+.Nm rctl_get_racct ,
+.Nm rctl_get_rules ,
.Nm rctl_remove_rule
.Nd manipulate and query the resource limits database
.Sh LIBRARY
OpenPOWER on IntegriCloud