History log of /netbsd-src/sys/uvm/uvm_unix.c (Results 1 – 25 of 51)
Revision Date Author Comments
# 9fd2cb69 10-Jan-2022 christos <christos@NetBSD.org>

Use p->p_stackbase instead of USRSTACK because the stackbase can move because
of ASLR.


# f98f70a7 06-Jan-2018 kamil <kamil@NetBSD.org>

Revert vadvise(2) removal

This system call was used in legacy Lisp code, that was inherited to modern
age and still compiled against supported compat layers (e.g. in clisp,
oaklisp, Franz Lisp).

It

Revert vadvise(2) removal

This system call was used in legacy Lisp code, that was inherited to modern
age and still compiled against supported compat layers (e.g. in clisp,
oaklisp, Franz Lisp).

It used to instruct the kernel about paging policy (G/C aware, flush etc).

Newly compiled code (assuming that it will detect vadvise()) will use the
libc stub for vadvise(). The headers for this interface are gone.

vadvise(2) could be marked as COMPAT_80, but as long as we support ultrix,
sunos or aout68k ABI, don't bother with this.

Requested by <mrg>

show more ...


# 102875f8 19-Dec-2017 kamil <kamil@NetBSD.org>

Drop SYS_vadvise

The (o)vadvise syscall is dummy since the beginning of NetBSD.

It is an obsolete remnant from the old UNIX.

Sponsored by <The NetBSD Foundation>


# 4f77b889 06-May-2017 joerg <joerg@NetBSD.org>

Extend the mmap(2) interface to allow requesting protections for later
use with mprotect(2), but without enabling them immediately.

Extend the mremap(2) interface to allow duplicating mappings, i.e.

Extend the mmap(2) interface to allow requesting protections for later
use with mprotect(2), but without enabling them immediately.

Extend the mremap(2) interface to allow duplicating mappings, i.e.
create a second range of virtual addresses references the same physical
pages. Duplicated mappings can have different effective protections.

Adjust PAX mprotect logic to disallow effective protections of W&X, but
allow one mapping W and another X protections. This obsoletes using
temporary files for purposes like JIT.

Adjust PAX logic for mmap(2) and mprotect(2) to fail if W&X is requested
and not silently drop the X protection.

Improve test cases to ensure correct operation of the changed
interfaces.

show more ...


# 57b625b6 07-Apr-2016 christos <christos@NetBSD.org>

remove more ifdefs


# 03c12592 07-Apr-2016 christos <christos@NetBSD.org>

Add PAX_MPROTECT_DEBUG


# 4df9f745 05-Sep-2014 matt <matt@NetBSD.org>

Don't use C++ new keyword as a variable name.


# afca0358 02-Feb-2011 chuck <chuck@NetBSD.org>

udpate license clauses on my code to match the new-style BSD licenses.
verified with Mike Hibler it is ok to remove clause 3 on utah copyright,
as per UCB.
based on diff that rmind@ sent me.

no func

udpate license clauses on my code to match the new-style BSD licenses.
verified with Mike Hibler it is ok to remove clause 3 on utah copyright,
as per UCB.
based on diff that rmind@ sent me.

no functional change with this commit.

show more ...


# 4a8d8a88 15-Dec-2009 matt <matt@NetBSD.org>

Use PRIxVADDR... (change a printf/panic -> panic)


# 6fe3678b 27-Nov-2009 njoly <njoly@NetBSD.org>

Make break(2) reject high adresses that wrap to 0 after page rounding.


# fe2579cc 04-Mar-2009 christos <christos@NetBSD.org>

don't uprintf in non-debug kernels.


# 4a780c9a 02-Jan-2008 ad <ad@NetBSD.org>

Merge vmlocking2 to head.


# 7e2790cf 20-Dec-2007 dsl <dsl@NetBSD.org>

Convert all the system call entry points from:
int foo(struct lwp *l, void *v, register_t *retval)
to:
int foo(struct lwp *l, const struct foo_args *uap, register_t *retval)
Fixup compat code

Convert all the system call entry points from:
int foo(struct lwp *l, void *v, register_t *retval)
to:
int foo(struct lwp *l, const struct foo_args *uap, register_t *retval)
Fixup compat code to not write into 'uap' and (in some cases) to actually
pass a correctly formatted 'uap' structure with the right name to the
next routine.
A few 'compat' routines that just call standard ones have been deleted.
All the 'compat' code compiles (along with the kernels required to test
build it).
98% done by automated scripts.

show more ...


# b07ec3fc 09-Feb-2007 ad <ad@NetBSD.org>

Merge newlock2 to head.


# 03c2b891 18-Dec-2006 skrll <skrll@NetBSD.org>

Update uvm_grow to support stacks that grow upwards.

Use on hppa and fix a bug in the hppa trap handler.


# 1a7bc55d 01-Nov-2006 yamt <yamt@NetBSD.org>

remove some __unused from function parameters.


# 0a8c1584 12-Oct-2006 yamt <yamt@NetBSD.org>

remove unnecessary #include of vnode.h.


# 4d595fd7 12-Oct-2006 christos <christos@NetBSD.org>

- sprinkle __unused on function decls.
- fix a couple of unused bugs
- no more -Wno-unused for i386


# b3e7e1b0 20-May-2006 elad <elad@NetBSD.org>

Better implementation of PaX MPROTECT, after looking some more into the
code and not trying to use temporary solutions.

Lots of comments and help from YAMAMOTO Takashi, also thanks to the PaX
author

Better implementation of PaX MPROTECT, after looking some more into the
code and not trying to use temporary solutions.

Lots of comments and help from YAMAMOTO Takashi, also thanks to the PaX
author for being quick to recognize that something fishy's going on. :)

Hook up in mmap/vmcmd rather than (ugh!) uvm_map_protect().

Next time I suggest to commit a temporary solution just revoke my
commit bit.

show more ...


# 95e1ffb1 11-Dec-2005 christos <christos@NetBSD.org>

merge ktrace-lwp.


# e569facc 27-Jun-2005 thorpej <thorpej@NetBSD.org>

Use ANSI function decls.


# 0139d61d 28-Aug-2004 jdolecek <jdolecek@NetBSD.org>

uvm_grow(): avoid needless arithmetic and make LP64 safe


# 939df36e 24-Aug-2003 chs <chs@NetBSD.org>

add support for non-executable mappings (where the hardware allows this)
and make the stack and heap non-executable by default. the changes
fall into two basic catagories:

- pmap and trap-handler

add support for non-executable mappings (where the hardware allows this)
and make the stack and heap non-executable by default. the changes
fall into two basic catagories:

- pmap and trap-handler changes. these are all MD:
= alpha: we already track per-page execute permission with the (software)
PG_EXEC bit, so just have the trap handler pay attention to it.
= i386: use a new GDT segment for %cs for processes that have no
executable mappings above a certain threshold (currently the
bottom of the stack). track per-page execute permission with
the last unused PTE bit.
= powerpc/ibm4xx: just use the hardware exec bit.
= powerpc/oea: we already track per-page exec bits, but the hardware only
implements non-exec mappings at the segment level. so track the
number of executable mappings in each segment and turn on the no-exec
segment bit iff the count is 0. adjust the trap handler to deal.
= sparc (sun4m): fix our use of the hardware protection bits.
fix the trap handler to recognize text faults.
= sparc64: split the existing unified TSB into data and instruction TSBs,
and only load TTEs into the appropriate TSB(s) for the permissions.
fix the trap handler to check for execute permission.
= not yet implemented: amd64, hppa, sh5

- changes in all the emulations that put a signal trampoline on the stack.
instead, we now put the trampoline into a uvm_aobj and map that into
the process separately.

originally from openbsd, adapted for netbsd by me.

show more ...


# 88bd53e8 25-May-2003 simonb <simonb@NetBSD.org>

Consistancy nit- use parentheses around return argument.


# b78f59b4 18-Jan-2003 thorpej <thorpej@NetBSD.org>

Merge the nathanw_sa branch.


123