diff options
author | Austin Clements <[email protected]> | 2010-09-01 16:46:37 -0400 |
---|---|---|
committer | Austin Clements <[email protected]> | 2010-09-01 16:46:37 -0400 |
commit | b1d41d678888fd1a51e4844ab583f7c47f9fb218 (patch) | |
tree | 623672a6f55e819aa3db670d7db9ea3311bd4a1c /exec.c | |
parent | 41c4bbb505f4389a5c1660b407cd4073d7a72aab (diff) | |
download | xv6-labs-b1d41d678888fd1a51e4844ab583f7c47f9fb218.tar.gz xv6-labs-b1d41d678888fd1a51e4844ab583f7c47f9fb218.tar.bz2 xv6-labs-b1d41d678888fd1a51e4844ab583f7c47f9fb218.zip |
Remove the stack guard page. Processes are now contiguous from 0 to proc->sz, which means our syscall argument validation is correct. Add a pointer validation test and remove the stack test, which tested for the guard page.
Diffstat (limited to 'exec.c')
-rw-r--r-- | exec.c | 1 |
1 files changed, 0 insertions, 1 deletions
@@ -52,7 +52,6 @@ exec(char *path, char **argv) // Allocate and initialize stack at sz sz = PGROUNDUP(sz); - sz += PGSIZE; // leave an invalid page if(!allocuvm(pgdir, (char *)sz, PGSIZE)) goto bad; mem = uva2ka(pgdir, (char *)sz); |