Remove CYGWIN=detect_bloda option

This commit is contained in:
Corinna Vinschen
2015-12-15 18:28:03 +01:00
parent da5b48ef3c
commit cb34fffe07
6 changed files with 7 additions and 97 deletions

View File

@@ -15,16 +15,6 @@ by prefixing with <literal>no</literal>.</para>
<itemizedlist mark="bullet">
<listitem>
<para><envar>(no)detect_bloda</envar> - If set, Cygwin will try to detect
foreign applications which try to inject threads into a Cygwin process,
or which redirect system sockets by providing an enforced so-called
<literal>Layered Service Provider</literal>. This may or may not help to
detect <ulink url="https://cygwin.com/faq/faq.html#faq.using.bloda">
BLODAs</ulink>. Don't use this option for day-to-day usage, it will slow
down every thread and socket creation!</para>
</listitem>
<listitem>
<para><envar>(no)dosfilewarning</envar> - If set, Cygwin will warn the
first time a user uses an "MS-DOS" style path name rather than a POSIX-style
@@ -130,6 +120,11 @@ explicitly in the open(2) call.
</para>
</listitem>
<listitem>
<para><envar>(no)detect_bloda</envar> - No case of a BLODA found by this
option has been reported in years.</para>
</listitem>
<listitem>
<para><envar>check_case</envar> - This option has been removed in favor of
real case sensitivity and the per-mount option "posix=[0|1]". For more

View File

@@ -276,10 +276,7 @@ BLODA</ulink>. Badly-behaved applications which
inject dlls into other processes often manage to clobber important
sections of the child's address space, leading to base address
collisions which rebasing cannot fix. The only way to resolve this
problem is to remove (usually uninstall) the offending app. See
<xref linkend="cygwinenv-implemented-options"></xref> for the
<literal>detect_bloda</literal> option, which may be able to identify the
BLODA.</para></listitem>
problem is to remove (usually uninstall) the offending app.</para></listitem>
</itemizedlist>