Commit Graph

39 Commits

Author SHA1 Message Date
mycroft 57e6889435 Make memory map syscalls consistently use size_t. 1995-03-09 17:28:28 +00:00
cgd 94d77171f9 need compat_43_getpagesize on COMPAT_OSF1 1995-03-08 01:46:53 +00:00
mycroft 3d869b0608 Fix two off-by-one errors. 1995-01-09 17:36:48 +00:00
pk 3e4bf211c6 Use vm_object_prefer() to find a good range of virtual addresses to
map a memory object to.
1994-12-10 11:48:12 +00:00
gwr 1a7920257d Make sure vm_mmap creates mappings with page-aligned file offsets.
Handle non-aligned file offsets in the mmap/munmap system calls.
1994-12-01 00:23:11 +00:00
cgd aa151f86b3 change some strategic casts to (*long) from (*int). 1994-10-29 07:35:04 +00:00
cgd 6b86130410 update for new syscall args description mechanism 1994-10-20 04:22:35 +00:00
mycroft d5fdf729f2 All of the users of munmapfd() expect to pass it
two args.  Make it work correctly.
1994-09-16 01:57:57 +00:00
cgd fccfa11af5 New RCS ID's, take two. they're more aesthecially pleasant, and use 'NetBSD' 1994-06-29 06:39:25 +00:00
cgd 9608c5b657 clean up slightly; change RCS ID's to be minimally intrusive 1994-06-27 04:55:46 +00:00
cgd bf43549e44 fix a thinko that kept msync from working if no size specified. 1994-06-20 00:17:28 +00:00
cgd 3495827959 new VM code, from 4.4-Lite 1994-05-23 03:11:20 +00:00
mycroft 72edd4b918 For MAP_ANON, force the file offset to 0. I can't think of any any bad side
effects of this, and it fixes an interesting bug.
1994-05-19 18:03:04 +00:00
cgd ca14e4af10 stubs 1994-05-07 00:39:58 +00:00
cgd f8dd4f370d expand the rlimit struct, kill last vestiges of off_t bogosity. 1994-05-04 01:38:25 +00:00
cgd f50f031448 kill syscall name aliases. no user-visible changes 1994-04-29 04:41:02 +00:00
cgd 551e92c16a start to phase out temp. off_t syscalls 1994-04-16 23:19:06 +00:00
cgd e937bc9bfd convert vm system to use new queues. I'll never write code w/queues again. 1994-04-15 07:04:03 +00:00
cgd ed740c7de8 frob arguments a little bit 1994-04-02 08:39:20 +00:00
cgd b7e76677c6 expand uid_t/gid_t/off_t 1994-03-27 09:09:57 +00:00
chopps b8f74df1a5 default type is MAP_FILE if none given. 1994-03-23 01:54:02 +00:00
mycroft e879c04f57 #include vm_user.h. 1994-01-08 04:22:36 +00:00
mycroft d66944976a Some minor rearrangement and cleanup. 1994-01-08 03:24:19 +00:00
mycroft 4181f14213 Add some explicit return types, and make a bunch of things static. 1994-01-07 23:36:15 +00:00
cgd c26286a5c1 bring changes down from magnum 1993-12-20 12:39:55 +00:00
mycroft b4d3382694 Canonicalize all #includes. 1993-12-17 07:56:32 +00:00
cgd 76dbc1192b new specfs.h and fifo.h locations 1993-11-12 05:54:12 +00:00
cgd 95e5868ee2 allow an offset to *really* be passed in for mmap's on devices.
From Julian Elischer.
1993-10-02 00:00:21 +00:00
mycroft 4862b84c92 Add RCS identifiers (this time on the correct side of the branch), and
incorporate recent changes in netbsd-0-9 branch.
1993-08-01 19:22:24 +00:00
mycroft 97cae397ee Finish moving struct definitions outside of function declarations. 1993-07-17 15:24:33 +00:00
cgd 4b90229cd2 do the "right thing" with mmap protections, once and for all.
in particular, if an object is mapped private, DO NOT grant
VM_PROT_ALL protections to it; it could be sensitive data.
1993-07-15 14:48:37 +00:00
cgd b99e3b6666 get rid of bogus protections chacking which conflicts w/guido's
patch...
1993-07-07 11:25:32 +00:00
cgd cc5e8e00d5 add rcs ids and clean up headers 1993-05-20 03:59:08 +00:00
cgd fd7c50fd61 patch from Pete Chown <pc123@cus.cam.ac.uk> to fix mmap
modes vs. read/write permissions problem.
1993-05-07 01:58:11 +00:00
glass 33d009a09c Prevents you from creating double faults and such mmaping stuff on top
of the kernel, etc. Tested.  Derived from BSDI public patches
1993-04-10 15:06:01 +00:00
cgd 4493ba8058 fixed stupid typo (missing comma) in hand-applied diff 1993-04-09 17:19:02 +00:00
cgd a128c34f9c From: Guido van Rooij <guido@gvr.win.tue.nl>
when mmapping a file, permissions are checked as it should be. When
mprotect()-ing the address range afterwards, no protection was checked
regarding the protection of the file originally opened. So
when you open /usr/bin/su RDONLY and SHARED you could afterwards change
the mmapped region to READ|WRITE. This gave the possibility to obtain
root privs obviously.
1993-04-09 17:16:30 +00:00
cgd 202313150e changes, running on sef's machine to good effect, likely contributed
by torek.  (sef told me to get them, and their origin...)
1993-04-09 17:13:17 +00:00
cgd 61f282557f initial import of 386bsd-0.1 sources 1993-03-21 09:45:37 +00:00