| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
| |
initial OpenBSM merge.
Obtained from: TrustedBSD Project
MFC after: 3 days
|
|
|
|
|
| |
Submitted by: pgollucci@p6m7g8.com, Mark Costlow
MFC after: 3 weeks
|
| |
|
| |
|
|
|
|
|
|
|
| |
otherwise OPIE will happily truncate it.
Spotted by: ghelmer
MFC after: 2 weeks
|
|
|
|
| |
Reviewed by: andre
|
|
|
|
| |
Noticed by: danger
|
|
|
|
|
| |
Requested by: novel
Discussed with: brueffer, simon
|
| |
|
|
|
|
|
|
|
|
| |
Coverity CID 2292: Plug memory leak.
Coverity CID 2291: Move function call before allocating storage to prevent
memory leak on error.
MFC after: 1 month
|
|
|
|
|
|
| |
Coverity CID 2293: Fix memory leak.
MFC after: 1 month
|
|
|
|
|
|
| |
Coverity CID 779 + 780: Avoid NULL pointer dereference.
MFC after: 1 month
|
|
|
|
|
|
|
| |
Coverity CID 2284: Fix multiple memory leaks.
Coverity CID 710: Remove unreachable code.
MFC after: 1 month
|
|
|
|
|
|
| |
Coverity CID 2276: Don't leak memory on error.
MFC after: 1 month
|
|
|
|
|
|
| |
Coverity CID 2275: Avoid memory leak on error.
MFC after: 1 month
|
|
|
|
|
|
|
| |
Fix unpaired sigblock which possibly leaves the process with all
signals blocked.
MFC after: 2 weeks
|
|
|
|
|
|
|
| |
Coverity CID 3651: Don't leak ifaddrs on getaddrinfo failure.
Coverity CID 2283: Don't leak sys_auth on error.
MFC after: 1 month
|
|
|
|
|
|
|
| |
structures, in order to avoid the possibility of attempted recursive
lock acquisition for chunks_mtx.
Reported by: Slawa Olhovchenkov <slw@zxy.spb.ru>
|
| |
|
| |
|
|
|
|
| |
real-time if we want, no functionality is changed.
|
|
|
|
| |
Obtained from: OpenBSD
|
|
|
|
|
|
| |
we can find another way to issue an #error, but using a preprocessed
assembler for that purpose and clobbering libc.a with an empty .o
just for the sake of #error reporting is way too much of a burden.
|
| |
|
| |
|
|
|
|
|
|
|
| |
* Expose functions for setting the "skip file" dev/ino information
* Expose functions for setting/querying the block size on reads
* Correctly propagate errors out of archive_read_close/archive_write_close
* Update manpage with information about new functions
|
|
|
|
|
|
|
|
| |
(copy it silently, do not dereference NULL pointer).
PR: bin/102848
Reviewed by: security-officer (cperciva)
MFC after: 1 week
|
| |
|
|
|
|
|
|
|
| |
o avoid using a global register variable.
o redefine struct ia64_tp as a union. We don't have to get to the
fields themselves. We just need it to be of the right size with
the right alignment.
|
| |
|
| |
|
|
|
|
|
|
|
| |
16-byte aligned. Consequently, struct tcb is a multiple of 16
bytes in size. We need to make sure there's no padding after
struct ppc32_tp. We do this by explicitly adding the necessary
padding in front of it.
|
|
|
|
| |
abstract the magic that happens when deriving one or the other.
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
| |
that the documented TCB is at the tail of the extended TCB. In other
words, the base of the TCB has a negative offset from the TLS.
|
|
|
|
|
|
|
|
|
| |
include path will already point to the populated include tree. This
is left over from boot-strapping the build and install of libbsm
during the initial import and merge.
Obtained from: TrustedBSD Project
Pointed out by: ru
|
| |
|
|
|
|
|
|
|
| |
o The TLS pointer (r2) points 0x7000 after the *end* of the TCB.
o _rtld_allocate_tls() gets a pointer to the current TCB, not the
current TLS pointer.
o _rtld_free_tls() gets the size of the TCB structure.
|
|
|
|
| |
The argument is (currently) not used by _rtld_free_tls().
|
|
|
|
| |
o Eliminate _tcb.
|
|
|
|
| |
assembly.
|
|
|
|
| |
assembly.
|
| |
|
|
|
|
|
|
|
| |
Without this, tar -r breaks badly; new entries overwrite the
middle of the archive instead of being added at the end.
Thanks to: Chris Spiegel
|
| |
|
| |
|