Konstantin Belousov
83ce08538a
Use the previous stack entry protection and max protection to correctly
...
propagate the stack execution permissions when stack is grown down.
First, curproc->p_sysent->sv_stackprot specifies maximum allowed stack
protection for current ABI, so the new stack entry was typically marked
executable always. Second, for non-main stack MAP_STACK mapping,
the PROT_ flags should be used which were specified at the mmap(2) call
time, and not sv_stackprot.
MFC after: 1 week
2012-06-10 11:31:50 +00:00
..
2010-12-02 17:37:16 +00:00
2012-05-18 10:23:47 +00:00
2011-11-07 15:43:11 +00:00
2011-10-12 18:08:28 +00:00
2011-01-11 13:59:06 +00:00
2011-01-16 20:40:50 +00:00
2011-11-07 15:43:11 +00:00
2011-03-11 07:07:48 +00:00
2012-06-01 18:58:50 +00:00
2011-08-01 19:12:15 +00:00
2012-05-23 18:56:29 +00:00
2011-05-21 17:43:43 +00:00
2012-01-27 20:18:31 +00:00
2012-03-17 23:00:32 +00:00
2011-10-30 05:06:14 +00:00
2012-05-23 18:10:54 +00:00
2011-12-16 10:56:16 +00:00
2010-07-27 17:31:03 +00:00
2012-02-29 05:41:29 +00:00
2012-06-10 11:31:50 +00:00
2012-05-10 15:16:42 +00:00
2011-12-14 13:25:00 +00:00
2012-04-21 18:36:53 +00:00
2012-03-19 18:47:34 +00:00
2012-03-19 18:47:34 +00:00
2012-05-22 07:04:23 +00:00
2012-05-12 20:42:56 +00:00
2012-05-12 20:24:46 +00:00
2012-03-17 23:00:32 +00:00
2012-05-23 12:51:49 +00:00
2012-05-12 20:49:58 +00:00
2010-04-30 00:46:43 +00:00
2012-05-12 20:42:56 +00:00
2012-05-12 20:42:56 +00:00
2012-04-08 17:00:46 +00:00
2011-12-05 18:29:25 +00:00
2011-10-15 12:35:18 +00:00
2012-05-12 20:49:58 +00:00
2012-03-28 20:49:11 +00:00
2012-02-23 21:07:16 +00:00