aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2014-02-01* manual/string.texi (wcstok): Fix prototype.Alexandre Oliva2-19/+19
(wcstok, strtok, strtok_r): Adjust reentrancy remarks.
2014-02-01* manual/time.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+373
2014-02-01* manual/string.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+124
2014-02-01* manual/threads.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+142
2014-02-01* manual/stdio.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+253
2014-02-01* manual/syslog.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+61
2014-02-01* manual/sysinfo.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+96
2014-02-01* manual/startup.texi: Document MTASC-safety properties.Alexandre Oliva2-2/+81
2014-02-01* manual/socket.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+573
2014-02-01* manual/signal.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+141
2014-01-31* manual/setjmp.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+48
2014-01-31* manual/search.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+76
2014-01-31* manual/resource.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+88
2014-01-31* manual/process.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+76
2014-01-31* manual/platform.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+22
2014-01-31* manual/pipe.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+114
2014-01-31* manual/pattern.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+731
2014-01-31* manual/message.texi: Document MTASC-safety properties.Alexandre Oliva2-2/+161
2014-01-31[BZ #12751]Alexandre Oliva3-1/+539
* manual/memory.texi: Document MTASC-safety properties.
2014-01-31* manual/math.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+107
2014-01-31* manual/locale.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+150
2014-01-31* manual/llio.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+284
2014-01-31* manual/libdl.texi: New.Alexandre Oliva2-0/+14
2014-01-31* manual/lang.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+21
2014-01-31* manual/job.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+29
2014-01-31* manual/getopt.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+30
2014-01-31* manual/ctype.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+77
2014-01-31[BZ #16046] Static dlopen correction fallout fixes.Maciej W. Rozycki7-71/+43
Fixes to address issues from BZ #15022 resolution, as follows: * TLS updates to csu/libc-tls.c -- we now have a proper main map, so there's no longer a need to create a separate fake one to keep TLS structures, * random updates to elf/dl-close.c -- LM_ID_BASE is now a valid name space ID for static executables as well, so assert that we don't unload the main map. Similarly dl_nns isn't supposed to be 0 for static executables anymore, * actual BZ #16046 fix to elf/dl-iteratephdr.c -- the dl_iterate_phdr special function for static executables isn't needed anymore, provided that l_phdr and l_phnum members of the main map have been properly initialized (done in _dl_non_dynamic_init in elf/dl-support.c now), * ld.so.cache loader update to elf/dl-load.c -- GL(dl_ns)[LM_ID_BASE]._ns_loaded is now always initialized in static executables so can become the fallback loader map to check for DF_1_NODEFLIB, provided that the l_flags_1 member of the main map has been properly initialized (done in elf/dl-support.c now); this also ensures previous semantics elsewhere in elf/dl-load.c, * matching updates to elf/dl-support.c -- to complement the two fixes above.
2014-01-30* manual/debug.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+30
2014-01-29Disable x87 inline functions for SSE2 mathH.J. Lu3-3/+10
When i386 and x86-64 mathinline.h was merged into a single mathinline.h, "gcc -m32" enables x87 inline functions on x86-64 even when -mfpmath=sse and SSE2 is enabled. It is a regression on x86-64. We should check __SSE2_MATH__ instead of __x86_64__ when disabling x87 inline functions.
2014-01-29* manual/charset.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+98
2014-01-29[AArch64] Regenerate libm-test-ulps.Marcus Shawcroft2-15/+4
Re-generate libm-test-ulps from scratch.
2014-01-29Fix spaces before tabsSiddhesh Poyarekar2-33/+38
2014-01-29* manual/crypt.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+34
2014-01-29* manual/conf.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+23
2014-01-29* manual/arith.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+153
2014-01-29* manual/argp.texi: Document MTASC-safety properties.Alexandre Oliva2-0/+186
2014-01-29* manual/macros.texi: Introduce macros to document multiAlexandre Oliva4-0/+860
thread, asynchronous signal and asynchronous cancellation safety properties. * manual/intro.texi: Introduce the properties themselves.
2014-01-28Add -mieee to SH sysdep-CFLAGS for older SH compilers.Kaz Kojima2-0/+7
2014-01-27m68k: regenerate libm test ULPsAndreas Schwab2-1667/+3904
2014-01-27Let gen-libm-test.pl find itself when run outside source directoryAndreas Schwab2-2/+8
2014-01-27Add bug entry for previous commit in NEWSSiddhesh Poyarekar1-1/+1
2014-01-27Fix invalid memory access when parsing netgroup files with blank lines (BZ ↵Siddhesh Poyarekar2-1/+6
#16506) The netgroups file parsing code tries to access the character before the newline in parsed lines to see if it is a backslash (\). This results in an access before the block allocated for the line if the line is blank, i.e. does not have anything other than the newline character. This doesn't seem like it will cause any crashes because the byte belongs to the malloc metadata block and hence access to it will always succeed. There could be an invalid alteration in code flow where a blank line is seen as a continuation due to the preceding byte *happening* to be '\\'. This could be done by interposing malloc, but that's not really a security problem since one could interpose getnetgrent_r itself and achieve a similar 'exploit'. The possibility of actually exploiting this is remote to impossible since it also requires the previous line to end with a '\\', which would happen only on invalid configurations.
2014-01-27Avoid undefined behaviour in netgroupcacheSiddhesh Poyarekar2-5/+16
Using a buffer after it has been reallocated is undefined behaviour, so get offsets of the triplets in the old buffer before reallocating it.
2014-01-27Update French translationsAllan McRae2-468/+524
2014-01-27Regenerate SH libm-test-ulps with proper compiler options.Kaz Kojima2-9/+720
2014-01-24Rebuild sparc ULPs.David S. Miller2-1203/+9821
* sysdeps/sparc/fpu/libm-test-ulps: Regenerate.
2014-01-25Move SH libm-test-ulps to sysdeps/sh and regenerate it.Kaz Kojima3-1094/+5491
2014-01-24tile: Regenerate libm-test-ulpsChris Metcalf2-496/+1522
2014-01-24alpha: Update libm-test-ulpsRichard Henderson2-1142/+9873