Project

General

Profile

Bug #3963 ยป 0001-Bug-3963-Various-incorrect-flag-handling-changes.patch

Prasad Joshi, 2013-08-02 06:33 AM

View differences:

usr/src/cmd/avs/rdc/sndrsyncd.c
1017 1017
	for (i = 0; i < host_list->numhosts; i++) {
1018 1018
		int found = 0;
1019 1019
		for (j = 0; (j < rdc_maxsets) && !found; j++) {
1020
			if (!rdc_info->rdc_set[j].flags & RDC_ENABLED)
1020
			if (!(rdc_info->rdc_set[j].flags & RDC_ENABLED))
1021 1021
				continue;
1022 1022
			if ((!host_list->configured[i]) ||
1023 1023
			    (host_list->hosts[i] == '\0')) {
usr/src/cmd/lvm/util/metaclust.c
1763 1763
				md_exit(local_sp, 1);
1764 1764
			}
1765 1765
			/* Set is owned - is it stale? */
1766
			if (!set_info[setno] & SET_INFO_NO_WR) {
1766
			if (!(set_info[setno] & SET_INFO_NO_WR)) {
1767 1767
				(void) memset(&cfg, 0, sizeof (cfg));
1768 1768
				cfg.c_id = 0;
1769 1769
				cfg.c_setno = sp->setno;
usr/src/cmd/mdb/common/mdb/mdb_cmds.c
2249 2249
	const char *c;
2250 2250
	mdb_pipe_t p;
2251 2251

  
2252
	if (!flags & DCMD_PIPE)
2252
	if (!(flags & DCMD_PIPE))
2253 2253
		return (DCMD_USAGE);
2254 2254

  
2255 2255
	if (argc == 1 || argc == 2) {
usr/src/cmd/mdb/common/modules/crypto/spi.c
191 191
	crypto_mech_info_t minfo;
192 192
	const char *unit = "bits";
193 193

  
194
	if (! flags & DCMD_ADDRSPEC)
194
	if (!(flags & DCMD_ADDRSPEC))
195 195
		return (DCMD_USAGE);
196 196

  
197 197
	if (mdb_vread(&minfo, sizeof (crypto_mech_info_t), addr)
usr/src/cmd/mdb/common/modules/libumem/umem.c
1945 1945
		    (vs->vs_type == VMEM_ALLOC) ? "allocated" : "freed",
1946 1946
		    wi->wi_vmem->vm_name);
1947 1947

  
1948
		if (!mdb_whatis_flags(w) & WHATIS_QUIET)
1948
		if (!(mdb_whatis_flags(w) & WHATIS_QUIET))
1949 1949
			whatis_call_printer(vmem_seg, addr);
1950 1950
		else
1951 1951
			mdb_printf("\n");
usr/src/grub/grub-0.97/netboot/e1000.c
3443 3443
	struct e1000_rx_desc *rd;
3444 3444

  
3445 3445
	rd = rx_base + rx_last;
3446
	if (!rd->status & E1000_RXD_STAT_DD)
3446
	if (!(rd->status & E1000_RXD_STAT_DD))
3447 3447
		return 0;
3448 3448

  
3449 3449
	if ( ! retrieve ) return 1;
usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
995 995
		    continue;
996 996

  
997 997
		/* Solaris Kerberos: fix key history issue */
998
		if (ptr->tl_data_type == KRB5_TL_KADM_DATA && ! entries->mask & KADM5_KEY_HIST)
998
		if (ptr->tl_data_type == KRB5_TL_KADM_DATA && !(entries->mask & KADM5_KEY_HIST))
999 999
		    continue;
1000 1000
		    
1001 1001
		count++;
......
1022 1022
		     * Solaris Kerberos: key history needs to be stored (it's in
1023 1023
		     * the KRB5_TL_KADM_DATA).
1024 1024
		     */
1025
		    if (ptr->tl_data_type == KRB5_TL_KADM_DATA && ! entries->mask & KADM5_KEY_HIST)
1025
		    if (ptr->tl_data_type == KRB5_TL_KADM_DATA && !(entries->mask & KADM5_KEY_HIST))
1026 1026
			continue;
1027 1027

  
1028 1028
		    if ((st = tl_data2berval (ptr, &ber_tl_data[j])) != 0)
usr/src/lib/pkcs11/pkcs11_softtoken/common/softKeysUtil.c
1111 1111
	}
1112 1112

  
1113 1113
	/* Derive the CKA_ALWAYS_SENSITIVE flag */
1114
	if (!basekey->bool_attr_mask & ALWAYS_SENSITIVE_BOOL_ON) {
1114
	if (!(basekey->bool_attr_mask & ALWAYS_SENSITIVE_BOOL_ON)) {
1115 1115
		/*
1116 1116
		 * If the base key has its CKA_ALWAYS_SENSITIVE set to
1117 1117
		 * FALSE, then the derived key will as well.
......
1131 1131
	}
1132 1132

  
1133 1133
	/* Derive the CKA_NEVER_EXTRACTABLE flag */
1134
	if (!basekey->bool_attr_mask & NEVER_EXTRACTABLE_BOOL_ON) {
1134
	if (!(basekey->bool_attr_mask & NEVER_EXTRACTABLE_BOOL_ON)) {
1135 1135
		/*
1136 1136
		 * If the base key has its CKA_NEVER_EXTRACTABLE set to
1137 1137
		 * FALSE, then the derived key will as well.
usr/src/uts/common/avs/ns/rdc/rdc_io.c
3628 3628
	 */
3629 3629
	if (krdc->aux_state & RDC_AUXSYNCIP) {
3630 3630
#ifdef DEBUG
3631
		if (!rdc_get_vflags(urdc) & RDC_SYNCING) {
3631
		if (!(rdc_get_vflags(urdc) & RDC_SYNCING)) {
3632 3632
			cmn_err(CE_WARN, "!rdc_sync: "
3633 3633
			    "RDC_AUXSYNCIP set, SYNCING off");
3634 3634
		}
usr/src/uts/common/fs/nfs/nfs4_vnops.c
12467 12467
		 * If the caller only asked for the ace count (VSA_ACECNT)
12468 12468
		 * don't give them the full acl (VSA_ACE), free it.
12469 12469
		 */
12470
		if (!orig_mask & VSA_ACE) {
12470
		if (!(orig_mask & VSA_ACE)) {
12471 12471
			if (vsap->vsa_aclentp != NULL) {
12472 12472
				kmem_free(vsap->vsa_aclentp,
12473 12473
				    vsap->vsa_aclcnt * sizeof (ace_t));
......
12489 12489
		 * and/or the default acl count (VSA_DFACLCNT) don't give them
12490 12490
		 * the acl (VSA_ACL) or default acl (VSA_DFACL), free it.
12491 12491
		 */
12492
		if (!orig_mask & VSA_ACL) {
12492
		if (!(orig_mask & VSA_ACL)) {
12493 12493
			if (vsap->vsa_aclentp != NULL) {
12494 12494
				kmem_free(vsap->vsa_aclentp,
12495 12495
				    vsap->vsa_aclcnt * sizeof (aclent_t));
......
12497 12497
			}
12498 12498
		}
12499 12499

  
12500
		if (!orig_mask & VSA_DFACL) {
12500
		if (!(orig_mask & VSA_DFACL)) {
12501 12501
			if (vsap->vsa_dfaclentp != NULL) {
12502 12502
				kmem_free(vsap->vsa_dfaclentp,
12503 12503
				    vsap->vsa_dfaclcnt * sizeof (aclent_t));
usr/src/uts/common/io/fibre-channel/ulp/fcip.c
7219 7219
			fptr->fcip_flags |= FCIP_LINK_DOWN;
7220 7220
		}
7221 7221
	}
7222
	if (!fptr->fcip_flags & FCIP_RTE_REMOVING) {
7222
	if (!(fptr->fcip_flags & FCIP_RTE_REMOVING)) {
7223 7223
		dispatch_rte_removal = 1;
7224 7224
	}
7225 7225
	mutex_exit(&fptr->fcip_mutex);
usr/src/uts/common/io/sata/impl/sata.c
12958 12958
	int i;
12959 12959

  
12960 12960
	if (sdinfo->satadrv_type != SATA_DTYPE_ATADISK ||
12961
	    !sdinfo->satadrv_id.ai_cap & SATA_LBA_SUPPORT)
12961
	    !(sdinfo->satadrv_id.ai_cap & SATA_LBA_SUPPORT))
12962 12962
		/* Capacity valid only for LBA-addressable disk devices */
12963 12963
		return (0);
12964 12964

  
    (1-1/1)