#
ea5c7e85 |
| 05-Sep-2020 |
riastradh <riastradh@NetBSD.org> |
Round of uvm.h cleanup.
The poorly named uvm.h is generally supposed to be for uvm-internal users only.
- Narrow it to files that actually need it -- mostly files that need to query whether curlw
Round of uvm.h cleanup.
The poorly named uvm.h is generally supposed to be for uvm-internal users only.
- Narrow it to files that actually need it -- mostly files that need to query whether curlwp is the pagedaemon, which should maybe be exposed by an external header.
- Use uvm_extern.h where feasible and uvm_*.h for things not exposed by it. We should split up uvm_extern.h but this will serve for now to reduce the uvm.h dependencies.
- Use uvm_stat.h and #ifdef UVMHIST uvm.h for files that use UVMHIST(ubchist), since ubchist is declared in uvm.h but the reference evaporates if UVMHIST is not defined, so we reduce header file dependencies.
- Make uvm_device.h and uvm_swap.h independently includable while here.
ok chs@
show more ...
|
#
65f16587 |
| 12-Jan-2020 |
ad <ad@NetBSD.org> |
Tidy up the vnode locking around execve() on ELF images to acquire and release the locks fewer times. Proposed on tech-kern a very long time go.
|
#
a682083b |
| 23-Feb-2014 |
njoly <njoly@NetBSD.org> |
Use cprng_strong32 for LINUX_AT_RANDOM on amd64 too.
|
#
d91ba50b |
| 21-Feb-2014 |
maxv <maxv@NetBSD.org> |
Increase LINUX32_ELF_AUX_ENTRIES to avoid overrun in linux32/. Also, add comments and KASSERTs to make sure people don't forget to increase XX_AUX_ENTRIES's when adding vectors.
Reported by martin@
Increase LINUX32_ELF_AUX_ENTRIES to avoid overrun in linux32/. Also, add comments and KASSERTs to make sure people don't forget to increase XX_AUX_ENTRIES's when adding vectors.
Reported by martin@ (CV), with suggestions from chs@.
ok martin@ chs@
show more ...
|
#
927d6872 |
| 18-Nov-2013 |
chs <chs@NetBSD.org> |
implement AT_RANDOM.
|
#
5e19e17c |
| 03-Feb-2012 |
matt <matt@NetBSD.org> |
Add a hook for freeing an ep_emul_arg. Add a wrapper routine (exec_free_emul_arg) to call the hook and then clear the ep_emul_arg and ep_emul_arg_free members in the exec_package. Change users/acces
Add a hook for freeing an ep_emul_arg. Add a wrapper routine (exec_free_emul_arg) to call the hook and then clear the ep_emul_arg and ep_emul_arg_free members in the exec_package. Change users/accessors to use these routines. Approved by releng.
show more ...
|
#
33fa5ccb |
| 07-Jul-2010 |
chs <chs@NetBSD.org> |
many changes for COMPAT_LINUX: - update the linux syscall table for each platform. - support new-style (NPTL) linux pthreads on all platforms. clone() with CLONE_THREAD uses 1 process with many
many changes for COMPAT_LINUX: - update the linux syscall table for each platform. - support new-style (NPTL) linux pthreads on all platforms. clone() with CLONE_THREAD uses 1 process with many LWPs instead of separate processes. - move the contents of sys__lwp_setprivate() into a new lwp_setprivate() and use that everywhere. - update linux_release[] and linux32_release[] to "2.6.18". - adjust placement of emul fork/exec/exit hooks as needed and adjust other emul code to match. - convert all struct emul definitions to use named initializers. - change the pid allocator to allow multiple pids to refer to the same proc. - remove a few fields from struct proc that are no longer needed. - disable the non-functional "vdso" code in linux32/amd64, glibc works fine without it. - fix a race in the futex code where we could miss a wakeup after a requeue operation. - redo futex locking to be a little more efficient.
show more ...
|
#
db6e663a |
| 09-Feb-2010 |
njoly <njoly@NetBSD.org> |
Small typo in comment.
|
#
fcc02354 |
| 29-Mar-2009 |
mrg <mrg@NetBSD.org> |
- add new RLIMIT_AS (aka RLIMIT_VMEM) resource that limits the total address space available to processes. this limit exists in most other modern unix variants, and like most of them, our defaults a
- add new RLIMIT_AS (aka RLIMIT_VMEM) resource that limits the total address space available to processes. this limit exists in most other modern unix variants, and like most of them, our defaults are unlimited. remove the old mmap / rlimit.datasize hack.
- adds the VMCMD_STACK flag to all the stack-creation vmcmd callers. it is currently unused, but was added a few years ago.
- add a pair of new process size values to kinfo_proc2{}. one is the total size of the process memory map, and the other is the total size adjusted for unused stack space (since most processes have a lot of this...)
- patch sh, and csh to notice RLIMIT_AS. (in some cases, the alias RLIMIT_VMEM was already present and used if availble.)
- patch ps, top and systat to notice the new k_vm_vsize member of kinfo_proc2{}.
- update irix, svr4, svr4_32, linux and osf1 emulations to support this information. (freebsd could be done, but that it's best left as part of the full-update of compat/freebsd.)
this addresses PR 7897. it also gives correct memory usage values, which have never been entirely correct (since mmap), and have been very incorrect since jemalloc() was enabled.
tested on i386 and sparc64, build tested on several other platforms.
thanks to many folks for feedback and testing but most espcially chuq and yamt for critical suggestions that lead to this patch not having a special ugliness i wasn't happy with anyway :-)
show more ...
|
#
9fca5da6 |
| 15-Mar-2009 |
cegger <cegger@NetBSD.org> |
ansify function definitions
|
#
1ab7ca8f |
| 20-Nov-2008 |
ad <ad@NetBSD.org> |
PR port-amd64/39964 modules/compat_linux: missing symbols on amd64
|
#
e4b18f11 |
| 28-Oct-2008 |
christos <christos@NetBSD.org> |
populate init_thread_area.
|
#
47ab401c |
| 26-Oct-2008 |
christos <christos@NetBSD.org> |
fix include order; machdep needs to be first for LINUX_NPTL to be defined.
|
#
f6382710 |
| 25-Oct-2008 |
christos <christos@NetBSD.org> |
Add preliminary tls support for i386. Does not work yet. From FreeBSD.
|
#
a2a38285 |
| 19-Oct-2007 |
ad <ad@NetBSD.org> |
machine/{bus,cpu,intr}.h -> sys/{bus,cpu,intr}.h
|
#
eda05c64 |
| 29-Jan-2007 |
hubertf <hubertf@NetBSD.org> |
Remove more duplicate headers. Patch by Slava Semushin <slava.semushin@gmail.com>
Again, this was tested by comparing obj files from a pristine and a patched source tree against an i386/ALL kernel,
Remove more duplicate headers. Patch by Slava Semushin <slava.semushin@gmail.com>
Again, this was tested by comparing obj files from a pristine and a patched source tree against an i386/ALL kernel, and also for src/sbin/fsck_ffs, src/sbin/fsdb and src/usr.sbin/makefs. Only changes in assert() line numbers were detected in 'objdump -d' output.
show more ...
|
#
f474dceb |
| 23-Jul-2006 |
ad <ad@NetBSD.org> |
Use the LWP cached credentials where sane.
|
#
9c861703 |
| 15-May-2006 |
yamt <yamt@NetBSD.org> |
include kauth.h for kauth_cred_getgid.
|
#
874fef37 |
| 14-May-2006 |
elad <elad@NetBSD.org> |
integrate kauth.
|
#
55f7db06 |
| 16-Dec-2005 |
christos <christos@NetBSD.org> |
PR/32303: Nicolas Joly: Fix -current amd64 kernel compilation failure with options COMPAT_LINUX
|
#
7330d168 |
| 14-Dec-2005 |
christos <christos@NetBSD.org> |
proc to lwp change
|
#
95e1ffb1 |
| 11-Dec-2005 |
christos <christos@NetBSD.org> |
merge ktrace-lwp.
|
#
33e2d79f |
| 20-May-2005 |
fvdl <fvdl@NetBSD.org> |
Define linux_usertrap function, and set it in struct emul. For all but amd64, it just returns 0, doing nothing.
For amd64, it implements vsyscalls through cheating: if the faulting address is in the
Define linux_usertrap function, and set it in struct emul. For all but amd64, it just returns 0, doing nothing.
For amd64, it implements vsyscalls through cheating: if the faulting address is in the vsyscall area (which is statically known on Linux/amd64), and the intruction pointer is too, it must have been a vsyscall. In that case, retrieve the return address from the user stack, fix up %rip and %rsp, and just execute the normal system call. It will return as if the vsyscall has been executed.
show more ...
|
#
89647c7c |
| 03-May-2005 |
manu <manu@NetBSD.org> |
First work on COMPAT_LINUX/amd64 Process startup and dynamiclinking work, but processes hang due to Linux arch_prctl(2) not being really supported yet.
|