From f0aaac10273ed0790cbddabe66825702a78a7f33 Mon Sep 17 00:00:00 2001 From: guenther Date: Thu, 19 Nov 2009 02:36:27 +0000 Subject: Dell's SVR4 apparently mapped page zero to the executable. We don't do that and, given the security issues it exacerbates, never will. So document it and delete the disabled support. ok deraadt@ tedu@ --- sys/kern/exec_elf.c | 11 +---------- 1 file changed, 1 insertion(+), 10 deletions(-) (limited to 'sys/kern/exec_elf.c') diff --git a/sys/kern/exec_elf.c b/sys/kern/exec_elf.c index ae1a0af51d7..48b48c89a6a 100644 --- a/sys/kern/exec_elf.c +++ b/sys/kern/exec_elf.c @@ -1,4 +1,4 @@ -/* $OpenBSD: exec_elf.c,v 1.70 2009/06/06 21:25:19 deraadt Exp $ */ +/* $OpenBSD: exec_elf.c,v 1.71 2009/11/19 02:36:27 guenther Exp $ */ /* * Copyright (c) 1996 Per Fogelstrom @@ -753,15 +753,6 @@ native: epp->ep_interp_pos = pos; } -#if defined(COMPAT_SVR4) && defined(i386) && 0 /* nothing sets OOS_DELL... */ -#ifndef ELF_MAP_PAGE_ZERO - /* Dell SVR4 maps page zero, yeuch! */ - if (p->p_os == OOS_DELL) -#endif - NEW_VMCMD(&epp->ep_vmcmds, vmcmd_map_readvn, PAGE_SIZE, 0, - epp->ep_vp, 0, VM_PROT_READ); -#endif - free(ph, M_TEMP); vn_marktext(epp->ep_vp); return (exec_setup_stack(p, epp)); -- cgit v1.2.3-59-g8ed1b