| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
| |
Disussed with: gavin
No objection from: doc
Approved by: joel
MFC after: 3 days
|
|
|
|
|
| |
Reviewed by: gjb
Approved by: sbruno
|
|
|
|
| |
Reviewed by: gabor
|
| |
|
| |
|
| |
|
|
|
|
| |
Reviewed by: brueffer
|
| |
|
| |
|
| |
|
|
|
|
| |
Reviewed by: brueffer
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
Because the utmpx interface is generally not required to be thread-safe,
but it is nice to have, if easy to do so. Therefore don't make a mess
out of the code and only use it if __NO_TLS is not defined.
|
|
|
|
| |
Pointed out by: stefanf
|
|
|
|
|
|
| |
when passing damaged user-supplied fstab file data.
MFC after: 1 week
|
| |
|
|
|
|
|
|
|
| |
no waiters, we still increase and decrease count in user mode without
entering kernel, once there is a waiter, sem_post will enter kernel to
increase count and wake thread up, this is atomicy and allow us to
gracefully destroy semaphore after sem_wait returned.
|
|
|
|
|
|
| |
debug mode (without optimisations) it doesn't generate a linker failure.
Approved by: dim (mentor)
|
|
|
|
| |
Approved by: hrs (mentor)
|
|
|
|
|
|
|
|
| |
how it may be set, and current limitations on the value.
Approved by: hrs (mentor)
PR: docs/157453
MFC after: 1 week
|
|
|
|
|
|
|
|
| |
PR: docs/163771
Submitted by: phk
Reviewed by: If someone else reviewed your modification.
Approved by: cperciva
MFC after: 1 week
|
|
|
|
|
|
|
|
|
|
|
| |
pathnames.
With the current API (no *at functions), FTS_NOCHDIR requires that the
fts_accpath start with the original path passed to fts_open(); therefore,
the depth that can be reached is limited by the {PATH_MAX} constraint on
this pathname.
MFC after: 1 week
|
|
|
|
|
|
| |
PR: docs/166091
Submitted by: Matthew Story
MFC after: 1 week
|
| |
|
|
|
|
| |
Approved by: cognet
|
|
|
|
|
|
|
|
| |
Document EIO from msync(2).
Inspired by PR: docs/165929 [1]
Reviewed by: jilles
MFC after: 2 weeks
|
|
|
|
|
|
|
|
| |
Just like kill(2), it is impossible for killpg(0, ...) to fail with
ESRCH, as a process always has a process group.
Discussed on: arch@
MFC after: 1 week
|
|
|
|
|
|
|
|
| |
This errno can also be returned if the passed process identifier doesn't
correspond with a process group.
Discussed on: arch@
MFC after: 1 week
|
|
|
|
|
|
|
|
|
| |
On FreeBSD, all processes have a process group, so it is impossible for
kill(2) to fail this way. POSIX also doesn't mention this error
condition.
Discussed on: arch@
MFC after: 3 weeks
|
|
|
|
| |
MFC after: 3 days
|
|
|
|
| |
Approved by: dim (mentor)
|
|
|
|
| |
Approved by: dim (mentor)
|
| |
|
|
|
|
|
|
| |
of __getCurrentRuneLocale().
Pointy hat to: me
|
|
|
|
| |
Approved by: dim (mentor)
|
|
|
|
|
|
| |
- Fix TLS allocation for Variant I: both rtld and libc allocators
assume that tls_static_space includes space for TLS structure.
So increment calculated static size by the size of it.
|
| |
|
|
|
|
| |
MFC after: 3 days
|
|
|
|
|
|
| |
PR: docs/116116
Approved by: cperciva
MFC after: 1 week
|
|
|
|
|
|
|
|
|
| |
doesn't exist in recent releases (and is bad advice anyway)
PR: docs/163119
Submitted by: Yuri Pankov <yuri.pankov@gmail.com>
Approved by: cperciva
MFC after: 1 week
|
|
|
|
|
|
|
| |
PR: kern/140690
Submitted by: Jeremy Huddleston <jeremyhu@apple.com>
Approved by: cperciva
MFC after: 2 weeks
|
|
|
|
|
|
| |
universe with gcc.
Approved by: dim (mentor)
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
syscall. Before r5958, seekdir() was called for its side effect of
freeing memory allocated by opendir() for rewinddir(), but that revision
added _reclaim_telldir() that frees all memory allocated by telldir()
calls, making this call redundant.
This introduces a slight change. If an application duplicated the descriptor
obtained through dirfd(), it can no longer rely on file position to be
reset to the start of file after a call to closedir(). It's believed to
be safe because neither POSIX, nor any other OS I've tested (NetBSD, Linux,
OS X) rewind the file offset pointer on closedir().
Reported by: Igor Sysoev
|
|
|
|
| |
MFC after: 3 days
|
|
|
|
|
|
|
|
|
|
|
| |
They were made excessive in r205424 by opening with O_DIRECTORY.
Also eliminated the fcntl() call used to set FD_CLOEXEC by opening
with O_CLOEXEC.
(fdopendir() still checks that the passed descriptor is a directory,
and sets FD_CLOEXEC on it.)
Reviewed by: ed
|
|
|
|
| |
MFC after: 1 week
|