Commit Graph

69 Commits

Author SHA1 Message Date
brezak b4940ad7a0 Wrap iprintf, vm_object_print, vm_map_print to allow passing a printf function. 1993-09-13 14:10:35 +00:00
cgd 6a474f29e2 get rid of maxdmap, and seperate MAXDSIZ and MAXSSIZ in rlimit checking. 1993-09-04 00:37:54 +00:00
deraadt ae8b49f87b #ifdef pc532 in same places as #ifdef i386 1993-09-01 08:49:45 +00:00
mycroft fbd4257135 Put `#ifdef notyet' around some code which is currently defunct. 1993-08-14 10:02:30 +00:00
andrew 22dff5862a Removed the user area protection gunk I painstakingly removed in revision
1.9.  It has not been necessary since then due to a segment fixup made to
machdep.c that prevents access to anything above MAX_VMUSER_ADDRESS.
1993-08-13 03:50:02 +00:00
cgd 26817f18ab fix prettyprinting changes that caused the kernel to not link if you
defined DIAGNOSTIC but not DDB...
1993-08-07 05:08:11 +00:00
mycroft a0aed26669 Remove a spurious `#' added two revisions ago. 1993-08-03 01:56:52 +00:00
mycroft 4862b84c92 Add RCS identifiers (this time on the correct side of the branch), and
incorporate recent changes in netbsd-0-9 branch.
1993-08-01 19:22:24 +00:00
brezak 9d7e246a03 Cleanup pretty printers for maps and objects. 1993-07-22 13:03:36 +00:00
cgd 24e3cbad44 according to andrew, the bit with the comment:
>       /* protect from the user area from user accesses. :-)
>          addr -> addr + UPAGES*NBPG don't seem to be protected without
>          this; the rest seems to be OK, and doesn't like being protected
>          - andrew@werple.apana.org.au */
*is* necessary, so put it back in...  it's in an #ifdef i386 part anyway.
1993-07-19 13:47:09 +00:00
andrew aa381d0e73 vm_protect() of the user area is no longer required for i386 machines; the
protection is implemented by adjusting the bounds of the user segment
descriptors.
1993-07-18 08:19:34 +00:00
cgd fd3c8fa35a fix a whole slew of off-by-one errors 1993-07-15 15:42:17 +00:00
mycroft d94e5eecbb Fix some off-by-one errors. 1993-06-29 13:47:05 +00:00
andrew 5705dde7e9 Disallow access to the user pages, where the kernel stack is stored. This
is effected in useracc(), and also by a vm_protect() in vm_fork() for i386
CPUs.  Without the latter a write to the user area, say USRSTACK+1000,
would hang a 386-based system.
1993-06-29 07:16:31 +00:00
andrew 51ac6a0997 ANSIfications. 1993-06-27 06:27:29 +00:00
cgd 0e761b8d7e fix behavior when VM_MAXUSER_ADDRESS == (-UPAGES * NBPG) 1993-06-21 10:18:20 +00:00
cgd cc5e8e00d5 add rcs ids and clean up headers 1993-05-20 03:59:08 +00:00
cgd db3da84702 add bruce evans's useracc fixes, from patchkit patch 137. 1993-05-07 07:03:50 +00:00
cgd 61f282557f initial import of 386bsd-0.1 sources 1993-03-21 09:45:37 +00:00