#
989ee4e8 |
|
13-Jun-2018 |
David Moore <davemoore@google.com> |
[syscalls] Change vmar_... calls - Create zx_vm_option_t type - Change ZX_VM_FLAG_... to ZX_VM_... and make them new type. - Change int32_t flags parameters to zx_vm_option_t options - Make the options parameter be second. - Modify vmar_..._old functions to keep other repos working. Once they've all been updated these functions will go away. ZX-2264 Test:CQ Change-Id: I1faf4cc4e1e4dabf3d8ef680e398d83a545b0f09
|
#
99387274 |
|
23-Jul-2018 |
George Kulakowski <kulakowski@google.com> |
[docs][syscalls] Add TODOs about documenting system call rights ZX-2399 #comment Test: no functional change Change-Id: I1f285c677e2444fcf1d720d7ecbd9f490c303962
|
#
19c1908b |
|
12-Jul-2018 |
Todd Eisenberger <teisenbe@google.com> |
[docs] Be explicit about guarantees on vmar_map/allocate outputs Test: Every changed line of code has been re-executed. Change-Id: Id2eff4bd1767c6ffbfd72a906bb37ea4b8753a52
|
#
30ac10bf |
|
18-Jun-2018 |
Carlos Pizano <cpu@google.com> |
[zircon] non-resizable VMOS This CL introduces the first option for VMO creation ZX_VMO_NOT_RESIZABLE that 'locks' the size of a root (non-clone) VMO Also enables the same for COW clones via ZX_VMO_CLONE_NON_RESIZEABLE This is meant to answer safety hazards of having a client pass VMOs to servers which the client can resize while the server is copying data into via a memory map. Today this is done via ZX_INFO_HANDLE_COUNT but that turns out is racy. This CL also cleans up vmo-tests so they using proble_for_read and probe_for_write instead of using unrelated syscalls to test memory mappings. TEST=added unittests in vmo_tests ZX-2279 #comment progress Change-Id: If69ce772dcccd92db83f5bda313ae2343ebb448e
|
#
013973ad |
|
26-Jun-2018 |
Doug Evans <dje@google.com> |
[docs][syscalls] Clarify ZX_ERR_NO_MEMORY as eventually going away Not touched: vmo_op_range.md vmo_set_size.md vmo_write.md The current text is ok for these. ZX-2303 #comment patch Tested: Just doc changes, read before/after. Change-Id: I2c6e1039e2b205e9cc377b9888755fa7ac676c78
|
#
ae30d5a3 |
|
25-Jun-2018 |
Taylor Cramer <cramertj@google.com> |
[docs] Remove VMAR note about size_t vs uint64_t Test: n/a Change-Id: I6b21277b8170c33b6b0d15b43d4bb5063d5406e9
|
#
9dd5b5f5 |
|
24-May-2018 |
Adam Barth <abarth@chromium.org> |
[syscalls] Update parameter types and names This CL updates the parameter types and names for a number of syscalls to match the Zircon System API rubric. There's more work to do to make all the syscalls conform to the rubric, but this change is a start. Change-Id: I218ac5e7e0cbd80a8c69fef7891ad40b78b6b407
|
#
dfa4939c |
|
05-Mar-2018 |
Todd Eisenberger <teisenbe@google.com> |
[syscalls][vmar] Prohibit using SPECIFIC_OVERWRITE with MAP_RANGE This combination is currently unused in the codebase, and would require complicated logic to properly rollback the address space changes if the MAP_RANGE part of the operation fails. Change-Id: I0058b96b3b6af24995e001b6fef8cde35d5f7e20
|
#
0348f87a |
|
05-Mar-2018 |
Todd Eisenberger <teisenbe@google.com> |
[docs][vmar] Be more clear about SPECIFIC_OVERWRITE behavior Change-Id: I3e934c962b8526051cafbc4b4938041281ea9fdd
|
#
f3e2126c |
|
12-Sep-2017 |
Roland McGrath <mcgrathr@google.com> |
[zx] Magenta -> Zircon The Great Renaming is here! Change-Id: I3229bdeb2a3d0e40fb4db6fec8ca7d971fbffb94
|
#
8a4ae5f4 |
|
22-Jun-2017 |
Todd Eisenberger <teisenbe@google.com> |
[docs][vmar] Be more clear about what *vmar_offset* does The docs before did not explicitly specify the behavior in the case that neither of the SPECIFIC flags were given. Change-Id: I61c3ec6e23bdaa8cd1f9dd9865acb0b77f21a1ab
|
#
4e0f8792 |
|
09-Jun-2017 |
George Kulakowski <kulakowski@google.com> |
[docs][errors] Rename all the errors in docs/ to MX_OK and MX_ERR_* Change-Id: I62451456a83145760c6454a619d4c699ce8e9017
|
#
feb105f0 |
|
28-Mar-2017 |
Christopher Anderson <cja@google.com> |
[vmar] Add MX_VM_FLAG_MAP_RANGE Add a new flag MX_VM_FLAG_MAP_RANGE to have a VmMapping's range mapped when a VMAR mapping is made. Change-Id: I58cf558773637f1fb207cf7812d742612d50e139
|
#
d4ba06df |
|
23-Feb-2017 |
George Kulakowski <kulakowski@google.com> |
[docs][syscalls] Fix all the manpages Change-Id: Ie9ba25060f3331de8d9c178caf6332fb48fc80f5
|
#
0ec64576 |
|
16-Feb-2017 |
Josh Conner <joshconner@google.com> |
[docs] Fix ERR names in vmar syscall descriptions. Change-Id: I34a2270d46fbae29a4618efbfc8cb298bd371e03
|
#
ac6bdcb0 |
|
16-Dec-2016 |
Todd Eisenberger <teisenbe@google.com> |
[vmar][map] Require that vmo_offset + size not overflow Change-Id: I134b81e09a80be99ce3c92667273e11b0101fbb8
|
#
d576cfd1 |
|
16-Dec-2016 |
Todd Eisenberger <teisenbe@google.com> |
[vmar] Reject map attempts with unaligned vmo_offsets Change-Id: I9846be9d8a1062bf92706f9f77011beaa481cdc4
|
#
63d4263f |
|
16-Dec-2016 |
Todd Eisenberger <teisenbe@google.com> |
[vmar] Accept unaligned lengths in unmap/protect This makes the interface a little more ergonomic to use alongside mx_vmar_map. If a non-page-aligned len is passed in, it is rounded up to the next page. Change-Id: I06ff5d5f19f680d98d8430e1be6ba19caadc4cc7
|
#
17603372 |
|
15-Dec-2016 |
Todd Eisenberger <teisenbe@google.com> |
[docs] Correct mx_vmar_map signature Change-Id: I5d8d584eceb5133af377fc3259bca1e13310b438
|
#
2d1c46fe |
|
15-Nov-2016 |
Todd Eisenberger <teisenbe@google.com> |
[vm] Implement new VM Address Region syscall interface For compatibility, allow passing a process handle instead of a VMAR to the vmar_map/unmap/protect calls and add usermode shims that translate the old syscalls into the new ones. Change-Id: I9ba29921d45f47d0d068e46e113dac1d139fce52
|