| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
characters '*', '?' and '['.
|
|
|
|
| |
lacking the issetugid() and utrace() syscalls.
|
|
|
|
|
|
| |
No functionality change.
Obtained from: NetBSD
|
|
|
|
| |
Obtained from: NetBSD
|
|
|
|
| |
Obtained from: NetBSD
|
|
|
|
| |
Obtained from: NetBSD
|
|
|
|
|
|
|
|
|
|
|
| |
send strhash(3) off to sleep with the fishes. Nothing in our tree uses it.
It has no documentation. It is nonstandard and in spite of the filename
strhash.c and strhash.h, it lives in application namespace by providing
compulsory global symbols hash_create()/hash_destroy()/hash_search()/
hash_traverse()/hash_purge()/hash_stats() regardless of whether you
#include <strhash.h> or not. If it turns out that there is a huge
application for this after all, I can repocopy it somewhere safer and
we can revive it elsewhere. But please, not in libc!
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
is not size_t but socklen_t.
Reported by: tinderbox
|
|
|
|
|
|
| |
PR: docs/58413
Reviewed by: rwatson
Approved by: blackend (mentor)
|
|
|
|
|
| |
to RFC3493. The previous change was related to RFC3484 (Default
Address Selection for IPv6), and it will come later.
|
|
|
|
|
|
|
|
|
|
| |
(aka RFC2292bis). Though I believe this commit doesn't break
backward compatibility againt existing binaries, it breaks
backward compatibility of API.
Now, the applications which use Advanced Sockets API such as
telnet, ping6, mld6query and traceroute6 use RFC3542 API.
Obtained from: KAME
|
| |
|
|
|
|
|
|
|
|
| |
(aka RFC2553bis). Now, getaddrinfo(3) returns EAI_NONAME
instead of EAI_NODATA. Our getaddrinfo(3) nor getnameinfo(3)
didn't use EAI_ADDRFAMILY.
Obtained from: KAME
|
| |
|
|
|
|
| |
isn't found in ai_errlist.
|
|
|
|
|
|
| |
(EAI_NODATA is depricated).
Obtained from: KAME
|
|
|
|
|
|
|
|
|
|
|
|
| |
the denormal/unnormal trap, is not a standard IEEE trap. We did
not exclude it from being returned by fpgetmask(), nor did we make
sure that fpsetmask() didn't clobber it. Since the non-IEEE trap
is not part of fp_except_t, users of ifpgetmask()/fpsetmask() would
be confronted with unexpected behaviour, one of which is a SIGFPE
for denormal/unnormal FP results.
This commit makes sure that we don't leak the denormal/unnormal mask
bit in fp_except_t and also that we don't clobber it.
|
|
|
|
| |
Obtained from: KAME
|
|
|
|
|
|
| |
closer to reality. More work remains to be done. st_mtime should
be the most complete based on IEEE Std 1003.1, 2003 Edition, a
review of ufs_vnops.c, and some experimentation.
|
|
|
|
|
|
| |
nevents is 0.
PR: kern/45291
|
| |
|
|
|
|
|
| |
The former is a kernel-only visible constant, the latter the
POSIX-specified userland constant defined by including limits.h.
|
|
|
|
| |
an email address. Spell McIlroy correctly.
|
|
|
|
| |
Pull 'A' evilness for realloc(3) from OpenBSD.
|
| |
|
|
|
|
|
|
|
|
|
| |
(fstp stores a mem32 value, fstpl stores a mem64 value)
This fixes ghostscript for 'make release' on amd64. Ghostscript for some
reason thinks it is a good idea to use -fno-builtin, which means it is
vulnerable to bugs in libc that are normally hidden by the builtin gcc
functions. Oops.
|
|
|
|
|
|
|
|
|
|
|
|
| |
always widen the imputed netmask if it is narrower than the specified octets.
fixes a strange behaviour where inet_net_pton would always return 4 (bits)
for multicast addresses no matter how many octets were specified.
negotiated with Paul Vixie, original author of this function.
PR: standards/53151
Submitted by: Max Laier <max@love2party.net>
Optained from: OpenBSD
|
|
|
|
|
|
| |
some limitation.
Reported by: Marc G. Fournier <scrappy@hub.org>
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
connected).
PR: docs/56683
Submitted by: Chris S.J. Peron <maneo@bsdpro.com>
MFC after: 3 days
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
specified directory is not found in the mount list. Before the
MNT_BYFSID changes, unmount(2) used to return ENOENT for a nonexistent
path and EINVAL for a non-mountpoint, but we can no longer distinguish
between these cases. Of the two error codes, EINVAL was more likely
to occur in practice, and it was the only one of the two that was
documented.
Update the manual page to match the current behaviour.
Suggested by: tjr
Reviewed by: tjr
|
|
|
|
|
|
|
|
|
| |
no peer address information is desired.
PR: 56044
Submitted by: Felix Opatz <felix@zotteljedi.de> and
Bernd Luevelsmeyer <bdluevel@heitec.net>
MFC after: 1 month
|
| |
|
|
|
|
|
|
|
|
| |
(where it didn't really belong), to the DESCRIPTION section.
English advice: ceri
Requested by: das
MFC after: 4 weeks
|
| |
|
|
|
|
|
|
| |
value for getcontext() in a preserved register rather than on the stack.
The second time around, the stack value would likely have changed so we
can't depend on it for the return value.
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
otherwise the return from the syscall stub for getcontext will pop off
the return value for the caller to the getcontext stub and it will appear
as though the setcontext() syscall returned instead of the getcontext().
The same bug exists on amd64, a fix is coming there too.
The bug can be demonstrated with this test code fragment:
main()
{
ucontext_t top;
if (getcontext(&top) == 0) {
write(2, "PING!\n", 6);
/* Cause a return value of 1 from getcontext this time */
top.uc_mcontext.mc_eax = 1;
setcontext(&top);
err(1, "setcontext() returned");
}
write(2, "PONG!\n", 6);
_exit(0);
}
|
|
|
|
|
|
|
|
| |
better represent failures of special files accessed over NFS.
Approved by: schweikh (mentor)
Reviewed by: bde (as a description)
MFC after: 6 weeks
|
|
|
|
|
|
| |
used, and refer to <osreldate.h> to get userland date.
Submitted by: ru
|
|
|
|
|
|
|
| |
ENOENT instead.
Reported by: "Kenneth D. Merry" <ken@kdm.org>
Submitted by: Bryan Liesner <bleez@comcast.net>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
See e.g. nfsclient/nfs_vnops.c
static int
nfs_read(struct vop_read_args *ap)
{
struct vnode *vp = ap->a_vp;
if (vp->v_type != VREG)
return (EPERM);
return (nfs_bioread(vp, ap->a_uio, ap->a_ioflag, ap->a_cred));
}
Approved by: schweikh (mentor)
MFC after: 6 weeks
|
| |
|
|
|
|
|
| |
Obtained from: TrustedBSD Project
Sponsored by: DARPA, Network Associates Laboratories
|