about summary refs log tree commit diff
Commit message (Collapse)AuthorAgeFilesLines
* Update Slovenian translationsAllan McRae2014-02-032-570/+597
|
* * manual/time.texi (timegm): Add missing blank after @c.Alexandre Oliva2014-02-022-1/+6
| | | | Reported by Joseph Myers <joseph@codesourcery.com>.
* * manual/check-safety.sh: New.Alexandre Oliva2014-02-013-1/+126
| | | | * manual/Makefile ($(objpfx)stamp-summary): Run it.
* * manual/terminal.texi: Document MTASC-safety properties.Alexandre Oliva2014-02-012-0/+178
|
* * manual/filesys.texi: Document MTASC-safety properties.Alexandre Oliva2014-02-012-0/+226
|
* * manual/errno.texi: Document MTASC-safety properties.Alexandre Oliva2014-02-012-0/+47
|
* * manual/intro.texi: Document safety identifiers andAlexandre Oliva2014-02-012-3/+50
| | | | conditionals.
* * manual/string.texi (wcstok): Fix prototype.Alexandre Oliva2014-02-012-19/+19
| | | | (wcstok, strtok, strtok_r): Adjust reentrancy remarks.
* * manual/time.texi: Document MTASC-safety properties.Alexandre Oliva2014-02-012-0/+373
|
* * manual/string.texi: Document MTASC-safety properties.Alexandre Oliva2014-02-012-0/+124
|
* * manual/threads.texi: Document MTASC-safety properties.Alexandre Oliva2014-02-012-0/+142
|
* * manual/stdio.texi: Document MTASC-safety properties.Alexandre Oliva2014-02-012-0/+253
|
* * manual/syslog.texi: Document MTASC-safety properties.Alexandre Oliva2014-02-012-0/+61
|
* * manual/sysinfo.texi: Document MTASC-safety properties.Alexandre Oliva2014-02-012-0/+96
|
* * manual/startup.texi: Document MTASC-safety properties.Alexandre Oliva2014-02-012-2/+81
|
* * manual/socket.texi: Document MTASC-safety properties.Alexandre Oliva2014-02-012-0/+573
|
* * manual/signal.texi: Document MTASC-safety properties.Alexandre Oliva2014-02-012-0/+141
|
* * manual/setjmp.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-0/+48
|
* * manual/search.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-0/+76
|
* * manual/resource.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-0/+88
|
* * manual/process.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-0/+76
|
* * manual/platform.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-0/+22
|
* * manual/pipe.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-0/+114
|
* * manual/pattern.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-0/+731
|
* * manual/message.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-2/+161
|
* [BZ #12751]Alexandre Oliva2014-01-313-1/+539
| | | | * manual/memory.texi: Document MTASC-safety properties.
* * manual/math.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-0/+107
|
* * manual/locale.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-0/+150
|
* * manual/llio.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-0/+284
|
* * manual/libdl.texi: New.Alexandre Oliva2014-01-312-0/+14
|
* * manual/lang.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-0/+21
|
* * manual/job.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-0/+29
|
* * manual/getopt.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-0/+30
|
* * manual/ctype.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-312-0/+77
|
* [BZ #16046] Static dlopen correction fallout fixes.Maciej W. Rozycki2014-01-317-71/+43
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes to address issues from BZ #15022 resolution, as follows: * TLS updates to csu/libc-tls.c -- we now have a proper main map, so there's no longer a need to create a separate fake one to keep TLS structures, * random updates to elf/dl-close.c -- LM_ID_BASE is now a valid name space ID for static executables as well, so assert that we don't unload the main map. Similarly dl_nns isn't supposed to be 0 for static executables anymore, * actual BZ #16046 fix to elf/dl-iteratephdr.c -- the dl_iterate_phdr special function for static executables isn't needed anymore, provided that l_phdr and l_phnum members of the main map have been properly initialized (done in _dl_non_dynamic_init in elf/dl-support.c now), * ld.so.cache loader update to elf/dl-load.c -- GL(dl_ns)[LM_ID_BASE]._ns_loaded is now always initialized in static executables so can become the fallback loader map to check for DF_1_NODEFLIB, provided that the l_flags_1 member of the main map has been properly initialized (done in elf/dl-support.c now); this also ensures previous semantics elsewhere in elf/dl-load.c, * matching updates to elf/dl-support.c -- to complement the two fixes above.
* * manual/debug.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-302-0/+30
|
* Disable x87 inline functions for SSE2 mathH.J. Lu2014-01-293-3/+10
| | | | | | | When i386 and x86-64 mathinline.h was merged into a single mathinline.h, "gcc -m32" enables x87 inline functions on x86-64 even when -mfpmath=sse and SSE2 is enabled. It is a regression on x86-64. We should check __SSE2_MATH__ instead of __x86_64__ when disabling x87 inline functions.
* * manual/charset.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-292-0/+98
|
* [AArch64] Regenerate libm-test-ulps.Marcus Shawcroft2014-01-292-15/+4
| | | | Re-generate libm-test-ulps from scratch.
* Fix spaces before tabsSiddhesh Poyarekar2014-01-292-33/+38
|
* * manual/crypt.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-292-0/+34
|
* * manual/conf.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-292-0/+23
|
* * manual/arith.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-292-0/+153
|
* * manual/argp.texi: Document MTASC-safety properties.Alexandre Oliva2014-01-292-0/+186
|
* * manual/macros.texi: Introduce macros to document multiAlexandre Oliva2014-01-294-0/+860
| | | | | | thread, asynchronous signal and asynchronous cancellation safety properties. * manual/intro.texi: Introduce the properties themselves.
* Add -mieee to SH sysdep-CFLAGS for older SH compilers.Kaz Kojima2014-01-282-0/+7
|
* m68k: regenerate libm test ULPsAndreas Schwab2014-01-272-1667/+3904
|
* Let gen-libm-test.pl find itself when run outside source directoryAndreas Schwab2014-01-272-2/+8
|
* Add bug entry for previous commit in NEWSSiddhesh Poyarekar2014-01-271-1/+1
|
* Fix invalid memory access when parsing netgroup files with blank lines (BZ ↵Siddhesh Poyarekar2014-01-272-1/+6
| | | | | | | | | | | | | | | | | | | | | | #16506) The netgroups file parsing code tries to access the character before the newline in parsed lines to see if it is a backslash (\). This results in an access before the block allocated for the line if the line is blank, i.e. does not have anything other than the newline character. This doesn't seem like it will cause any crashes because the byte belongs to the malloc metadata block and hence access to it will always succeed. There could be an invalid alteration in code flow where a blank line is seen as a continuation due to the preceding byte *happening* to be '\\'. This could be done by interposing malloc, but that's not really a security problem since one could interpose getnetgrent_r itself and achieve a similar 'exploit'. The possibility of actually exploiting this is remote to impossible since it also requires the previous line to end with a '\\', which would happen only on invalid configurations.