<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/kern/kern_exec.c, branch release/2.2.5_cvs</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=release%2F2.2.5_cvs</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=release%2F2.2.5_cvs'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>1997-10-21T01:56:05Z</updated>
<entry>
<title>This commit was manufactured by cvs2svn to create tag</title>
<updated>1997-10-21T01:56:05Z</updated>
<author>
<name>cvs2svn</name>
<email>cvs2svn@FreeBSD.org</email>
</author>
<published>1997-10-21T01:56:05Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=14d01796b1ab61a57dbd60da66d8dac699a0a2e7'/>
<id>urn:sha1:14d01796b1ab61a57dbd60da66d8dac699a0a2e7</id>
<content type='text'>
'RELENG_2_2_5_RELEASE'.

This commit was manufactured to restore the state of the 2.2.5-RELEASE image.
Releases prior to 5.3-RELEASE are omitting the secure/ and crypto/ subdirs.
</content>
</entry>
<entry>
<title>Brought in fix from rev 1.64: fix for rfork security hole.</title>
<updated>1997-08-04T05:40:37Z</updated>
<author>
<name>David Greenman</name>
<email>dg@FreeBSD.org</email>
</author>
<published>1997-08-04T05:40:37Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=40ae4344e11f3c0e8a00531ae601131504c1cf50'/>
<id>urn:sha1:40ae4344e11f3c0e8a00531ae601131504c1cf50</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fixed two bugs that came into kern_exec just after the 2.2.1 release:</title>
<updated>1997-04-18T02:37:08Z</updated>
<author>
<name>David Greenman</name>
<email>dg@FreeBSD.org</email>
</author>
<published>1997-04-18T02:37:08Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=ccba9c3f37cf55bb7c0740cf9901c17afd277a77'/>
<id>urn:sha1:ccba9c3f37cf55bb7c0740cf9901c17afd277a77</id>
<content type='text'>
1) I wasn't assuring that the file size was large enough for the data
   to be contained in a FS block. Calling bread for a block when the
   data is in a fragment causes BAD things to happen, including file
   corruption.
2) I was not passing in a residual pointer to vn_rdwr(), and this
   caused "slow" mode image header reads that were less than the
   page size to fail with EIO. I now get the residual and properly
   zero the tail of the image header buffer, too.
</content>
</entry>
<entry>
<title>From -current (1.56): free cn buffer only once.</title>
<updated>1997-04-04T07:30:44Z</updated>
<author>
<name>David Greenman</name>
<email>dg@FreeBSD.org</email>
</author>
<published>1997-04-04T07:30:44Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=d86aa8b7c9e3b326d8019b6195636b8e8ebfd6cd'/>
<id>urn:sha1:d86aa8b7c9e3b326d8019b6195636b8e8ebfd6cd</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Merged from -current: Bruce's fixes.</title>
<updated>1997-04-04T04:18:20Z</updated>
<author>
<name>David Greenman</name>
<email>dg@FreeBSD.org</email>
</author>
<published>1997-04-04T04:18:20Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=363b5060430905fc706d12adeb6ddb610e11291b'/>
<id>urn:sha1:363b5060430905fc706d12adeb6ddb610e11291b</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Sort of from -current: lose the vnode lock on a permissions failure.</title>
<updated>1997-04-04T01:32:09Z</updated>
<author>
<name>David Greenman</name>
<email>dg@FreeBSD.org</email>
</author>
<published>1997-04-04T01:32:09Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=d01342629b6ab37e18810315f5c0ef1cc19f2ca5'/>
<id>urn:sha1:d01342629b6ab37e18810315f5c0ef1cc19f2ca5</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Merged from -current: Killed exech_map and do image header reads in a FS-</title>
<updated>1997-04-03T06:37:49Z</updated>
<author>
<name>David Greenman</name>
<email>dg@FreeBSD.org</email>
</author>
<published>1997-04-03T06:37:49Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=5397377bf130df03558bc83d80ffb75ba425e31d'/>
<id>urn:sha1:5397377bf130df03558bc83d80ffb75ba425e31d</id>
<content type='text'>
centric way instead of VM-centric. This appears to fix a hang that Peter
was seeing as well as allowing detection of errors during the header
read (important for NFS).
</content>
</entry>
<entry>
<title>Brought in change from rev 1.51: preserve P_SUGID if {u,g}gid != r{u,g}id</title>
<updated>1997-02-19T03:53:35Z</updated>
<author>
<name>David Greenman</name>
<email>dg@FreeBSD.org</email>
</author>
<published>1997-02-19T03:53:35Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=a527226685e90caf217b180a052035b99769ead2'/>
<id>urn:sha1:a527226685e90caf217b180a052035b99769ead2</id>
<content type='text'>
Note that this doesn't actually fix any known security holes, it just
protects against sloppy programming.
</content>
</entry>
<entry>
<title>Merge the fix from rev 1.48: fix an ordering bug.</title>
<updated>1996-11-09T10:42:28Z</updated>
<author>
<name>Joerg Wunsch</name>
<email>joerg@FreeBSD.org</email>
</author>
<published>1996-11-09T10:42:28Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=6acb8030bb257c46f62ae44cdb87c1c00d87648e'/>
<id>urn:sha1:6acb8030bb257c46f62ae44cdb87c1c00d87648e</id>
<content type='text'>
Requested by:	dyson
</content>
</entry>
<entry>
<title>Performance optimizations.  One of which was meant to go in before the</title>
<updated>1996-10-12T21:35:25Z</updated>
<author>
<name>John Dyson</name>
<email>dyson@FreeBSD.org</email>
</author>
<published>1996-10-12T21:35:25Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=9d3fbbb5f4bb727f86ea497435cbc6d70539c33f'/>
<id>urn:sha1:9d3fbbb5f4bb727f86ea497435cbc6d70539c33f</id>
<content type='text'>
previous snap.  Specifically, kern_exit and kern_exec now makes a
call into the pmap module to do a very fast removal of pages from the
address space.  Additionally, the pmap module now updates the PG_MAPPED
and PG_WRITABLE flags.  This is an optional optimization, but helpful
on the X86.
</content>
</entry>
</feed>
