summaryrefslogtreecommitdiffstats
path: root/lib
Commit message (Collapse)AuthorAgeFilesLines
* o Don't fseek() on closed file.maxim2006-09-181-2/+2
| | | | | Submitted by: pgollucci@p6m7g8.com, Mark Costlow MFC after: 3 weeks
* Markup fixes.ru2006-09-1727-184/+196
|
* Remove more traces of Alpha.ru2006-09-171-4/+0
|
* Reject user with names that are longer than OPIE is willing to deal with;des2006-09-151-4/+13
| | | | | | | otherwise OPIE will happily truncate it. Spotted by: ghelmer MFC after: 2 weeks
* Remove reference to T/TCP.joel2006-09-131-5/+2
| | | | Reviewed by: andre
* Bump .Dd.joel2006-09-131-1/+1
| | | | Noticed by: danger
* Remove references to the pam(8) manual page. It does not exist.joel2006-09-131-1/+0
| | | | | Requested by: novel Discussed with: brueffer, simon
* Fix a typobrian2006-09-101-2/+2
|
* Sync with NetBSD rev. 1.16 + 1.17mbr2006-09-091-2/+5
| | | | | | | | Coverity CID 2292: Plug memory leak. Coverity CID 2291: Move function call before allocating storage to prevent memory leak on error. MFC after: 1 month
* Sync with NetBSD rev. 1.29mbr2006-09-091-0/+4
| | | | | | Coverity CID 2293: Fix memory leak. MFC after: 1 month
* Sync with NetBSD rev. 1.6 + 1.7mbr2006-09-091-4/+4
| | | | | | Coverity CID 779 + 780: Avoid NULL pointer dereference. MFC after: 1 month
* Sync with NetBSD rev. 1.20 + 1.21mbr2006-09-091-6/+11
| | | | | | | Coverity CID 2284: Fix multiple memory leaks. Coverity CID 710: Remove unreachable code. MFC after: 1 month
* Sync with NetBSD rev. 1.10mbr2006-09-091-0/+1
| | | | | | Coverity CID 2276: Don't leak memory on error. MFC after: 1 month
* Sync with NetBSD rev. 1.15mbr2006-09-091-0/+1
| | | | | | Coverity CID 2275: Avoid memory leak on error. MFC after: 1 month
* Sync part of NetBSD rev. 1.14mbr2006-09-091-1/+1
| | | | | | | Fix unpaired sigblock which possibly leaves the process with all signals blocked. MFC after: 2 weeks
* Sync with NetBSD rev. 1.16 + 1.17mbr2006-09-091-1/+4
| | | | | | | Coverity CID 3651: Don't leak ifaddrs on getaddrinfo failure. Coverity CID 2283: Don't leak sys_auth on error. MFC after: 1 month
* Change the way base allocation is done for internal malloc datajasone2006-09-081-56/+93
| | | | | | | structures, in order to avoid the possibility of attempted recursive lock acquisition for chunks_mtx. Reported by: Slawa Olhovchenkov <slw@zxy.spb.ru>
* Use return value of _thr_umutex_lock instead of using zero.davidxu2006-09-081-2/+1
|
* Minor comment fix.thomas2006-09-081-1/+1
|
* Replace internal usage of struct umtx with umutex which can supportsdavidxu2006-09-0614-158/+94
| | | | real-time if we want, no functionality is changed.
* alloca() cannot check if the allocation is valid; mention the consequences.ru2006-09-051-4/+13
| | | | Obtained from: OpenBSD
* GC dead code. If we want to stay polite to the foreign compilers,ru2006-09-052-63/+1
| | | | | | we can find another way to issue an #error, but using a preprocessed assembler for that purpose and clobbering libc.a with an empty .o just for the sake of #error reporting is way too much of a burden.
* Same as pthread_setschedparam, use sizeof(struct sched_param) instead.davidxu2006-09-051-2/+2
|
* Pass correct parameter size.davidxu2006-09-051-2/+2
|
* Some minor corrections:kientzle2006-09-0510-41/+127
| | | | | | | * Expose functions for setting the "skip file" dev/ino information * Expose functions for setting/querying the block size on reads * Correctly propagate errors out of archive_read_close/archive_write_close * Update manpage with information about new functions
* (pw_copy): Handle the case of a malformed line in master.passwdthomas2006-09-041-2/+11
| | | | | | | | (copy it silently, do not dereference NULL pointer). PR: bin/102848 Reviewed by: security-officer (cperciva) MFC after: 1 week
* Whitespace fix.marcel2006-09-021-1/+1
|
* Stylize:marcel2006-09-014-70/+102
| | | | | | | o avoid using a global register variable. o redefine struct ia64_tp as a union. We don't have to get to the fields themselves. We just need it to be of the right size with the right alignment.
* Stylize: avoid using a global register variable.marcel2006-09-012-6/+8
|
* Enable TLS on PowerPC.marcel2006-09-011-1/+0
|
* The ucontext is 16-byte aligned, which means that struct tcb ismarcel2006-09-012-0/+2
| | | | | | | 16-byte aligned. Consequently, struct tcb is a multiple of 16 bytes in size. We need to make sure there's no padding after struct ppc32_tp. We do this by explicitly adding the necessary padding in front of it.
* Stylize. Introduce ppc_{get|set}_tp() and ppc_{get|set}_tcb() tomarcel2006-09-014-58/+118
| | | | abstract the magic that happens when deriving one or the other.
* Fix style(9) in code copied from rtld.marcel2006-09-011-3/+3
|
* Rename TLS_TP_OFFSET back to TP_OFFSET. The former clashes with rtld.marcel2006-09-011-3/+3
|
* Enable TLS on ia64.marcel2006-09-011-1/+0
|
* Implement TLS.marcel2006-09-018-100/+122
|
* Stylize.marcel2006-09-012-17/+11
|
* Fix the variant I allocation for KSE: Allow a larger TCB and assumemarcel2006-09-011-46/+37
| | | | | that the documented TCB is at the tail of the extended TCB. In other words, the base of the TCB has a negative offset from the TLS.
* Remove curdir reference in libbsm build; this is not required as therwatson2006-09-011-1/+1
| | | | | | | | | include path will already point to the populated include tree. This is left over from boot-strapping the build and install of libbsm during the initial import and merge. Obtained from: TrustedBSD Project Pointed out by: ru
* Stylize.marcel2006-08-311-6/+2
|
* TLS fixes:marcel2006-08-312-4/+8
| | | | | | | o The TLS pointer (r2) points 0x7000 after the *end* of the TCB. o _rtld_allocate_tls() gets a pointer to the current TCB, not the current TLS pointer. o _rtld_free_tls() gets the size of the TCB structure.
* Fix harmless bug: sizeof(tcb) equals sizeof(void*) not sizeof(struct tcb).marcel2006-08-311-1/+1
| | | | The argument is (currently) not used by _rtld_free_tls().
* o Set TP using inline assembly to avoid dead code elimination.marcel2006-08-301-5/+3
| | | | o Eliminate _tcb.
* Avoid dead code elimination of the assignment to TP by using inlinemarcel2006-08-301-2/+2
| | | | assembly.
* Prevent dead code elimination for the TP assignmient by using inlinemarcel2006-08-301-2/+1
| | | | assembly.
* Remove unused file.davidxu2006-08-291-59/+0
|
* When skipping data, track the position in the bytestream correctly.kientzle2006-08-291-1/+2
| | | | | | | Without this, tar -r breaks badly; new entries overwrite the middle of the archive instead of being added at the end. Thanks to: Chris Spiegel
* pthread_sigmask is in thr_sig.c, remove this file.davidxu2006-08-281-52/+0
|
* Kill unused files.davidxu2006-08-282-187/+0
|
* Use umutex APIs to implement pthread_mutex, member pp_mutexq is addeddavidxu2006-08-284-73/+116
| | | | | | into pthread structure to keep track of locked PTHREAD_PRIO_PROTECT mutex, no real mutex code is changed, the mutex locking and unlocking code should has same performance as before.
OpenPOWER on IntegriCloud