summaryrefslogtreecommitdiffstats
path: root/sys/compat
Commit message (Collapse)AuthorAgeFilesLines
* Remove M_TRYWAIT/M_WAITOK/M_WAIT. Callers should use 0.alfred2003-01-2113-27/+27
| | | | Merge M_NOWAIT/M_DONTWAIT into a single flag M_NOWAIT.
* Add missing #includedillon2003-01-141-0/+1
| | | | Submitted by: "Sam Leffler" <sam@errno.com>
* Apply bandaid to bring svr4_sys_waitsys() in line with exit1(). Thisdillon2003-01-131-1/+4
| | | | | | routine really need to be gutted and merged with exit1(). Reviewed by: jhb
* Bow to the whining masses and change a union back into void *. Retaindillon2003-01-138-11/+11
| | | | | removal of unnecessary casts and throw in some minor cleanups to see if anyone complains, just for the hell of it.
* Change struct file f_data to un_data, a union of the correct structdillon2003-01-128-11/+11
| | | | | | | | | | pointer types, and remove a huge number of casts from code using it. Change struct xfile xf_data to xun_data (ABI is still compatible). If we need to add a #define for f_data and xf_data we can, but I don't think it will be necessary. There are no operational changes in this commit.
* Add function linux_msg() for regulating output from the linux emulationalfred2003-01-025-12/+42
| | | | | | | | | | | code, make the emulator use it. Rename unsupported_msg() to unimplemented_syscall(). Rename some arguments for clarity Fixup grammar. Requested by: bde
* When complaining about obsolete/unimplemented syscalls output the processalfred2003-01-011-2/+2
| | | | | | | name to make things more clear for the user. PR: 46661 MFC After: 3 days
* Synchronize to kern/syscalls.master:1.139.rwatson2002-12-291-0/+4
| | | | Obtained from: TrustedBSD Project
* SMP locking for ifnet list.hsu2002-12-223-5/+16
|
* Regen: swapoffmarcel2002-12-163-4/+5
|
* Change swapoff from MNOPROTO to UNIMPL. The former doesn't work.marcel2002-12-161-1/+1
|
* This is David Schultz's swapoff code which I am finally able to commit.dillon2002-12-151-0/+1
| | | | | | | This should be considered highly experimental for the moment. Submitted by: David Schultz <dschultz@uclink.Berkeley.EDU> MFC after: 3 weeks
* SCARGS removal take II.alfred2002-12-1413-656/+646
|
* Backout removal SCARGS, the code freeze is only "selectively" over.alfred2002-12-1313-646/+656
|
* Remove SCARGS.alfred2002-12-1313-656/+646
| | | | Reviewed by: md5
* Fix emulation of the fcntl64() syscall. In Linux, this is exactlyiedowse2002-12-081-39/+33
| | | | | | | | | | | | | | | | | | | | the same as fcntl() except that it supports the new 64-bit file locking commands (LINUX_F_GETLK64 etc) that use the `flock64' structure. We had been interpreting all flock structures passed to fcntl64() as `struct flock64' instead of only the ones from F_*64 commands. The glibc in linux_base-7 uses fcntl64() by default, but the bug was often non-fatal since the misinterpretation typically only causes junk to appear in the `l_len' field and most junk values are accepted as valid range lengths. The result is occasional EINVAL errors from F_SETLK and a few bytes after the supplied `struct flock' getting clobbered during F_GETLK. PR: kern/37656 Reviewed by: marcel Approved by: re MFC after: 1 week
* Regenerate after adding syscalls.deischen2002-11-163-4/+13
|
* Add *context() syscalls to ia64 32-bit compatability table as requesteddeischen2002-11-161-0/+3
| | | | in kern/syscalls.master.
* Bring in two sets of changes:rwatson2002-11-051-0/+1
| | | | | | | | | | | | | | | | | | | | | | (1) Permit userland applications to request a change of label atomic with an execve() via mac_execve(). This is required for the SEBSD port of SELinux/FLASK. Attempts to invoke this without MAC compiled in result in ENOSYS, as with all other MAC system calls. Complexity, if desired, is present in policy modules, rather than the framework. (2) Permit policies to have access to both the label of the vnode being executed as well as the interpreter if it's a shell script or related UNIX nonsense. Because we can't hold both vnode locks at the same time, cache the interpreter label. SEBSD relies on this because it supports secure transitioning via shell script executables. Other policies might want to take both labels into account during an integrity or confidentiality decision at execve()-time. Approved by: re Obtained from: TrustedBSD Project Sponsored by: DARPA, Network Associates Laboratories
* Remove reference to struct execve_args from struct imgact, whichrwatson2002-11-051-1/+2
| | | | | | | | | | | | | | | | | describes an image activation instance. Instead, make use of the existing fname structure entry, and introduce two new entries, userspace_argv, and userspace_envv. With the addition of mac_execve(), this divorces the image structure from the specifics of the execve() system call, removes a redundant pointer, etc. No semantic change from current behavior, but it means that the structure doesn't depend on syscalls.master-generated includes. There seems to be some redundant initialization of imgact entries, which I have maintained, but which could probably use some cleaning up at some point. Obtained from: TrustedBSD Project Sponsored by: DARPA, Network Associates Laboratories
* Sync to src/sys/kern/syscalls.masterrwatson2002-11-021-1/+1
|
* Remove the process state PRS_WAIT.julian2002-10-211-3/+0
| | | | | | It is never used. I left it there from pre-KSE days as I didn't know if I'd need it or not but now I know I don't.. It's functionality is in TDI_IWAIT in the thread.
* Stake a claim on 418 (__xstat), 419 (__xfstat), 420 (__xlstat)peter2002-10-191-0/+3
|
* Grab 416/417 real estate before I get burned while testing again.peter2002-10-191-0/+2
| | | | | | This is for the not-quite-ready signal/fpu abi stuff. It may not see the light of day, but I'm certainly not going to be able to validate it when getting shot in the foot due to syscall number conflicts.
* Implement the CDROMREADAUDIO ioctl.marcel2002-10-191-1/+37
|
* Add a placeholder for the execve_mac() system call, similar to SELinux'srwatson2002-10-191-0/+1
| | | | | | | | | | | | execve_secure() system call, which permits a process to pass in a label for a label change during exec. This permits SELinux to change the label for the resulting exec without a race following a manual label change on the process. Because this interface uses our general purpose MAC label abstraction, we call it execve_mac(), and wrap our port of SELinux's execve_secure() around it with appropriate sid mappings. Obtained from: TrustedBSD Project Sponsored by: DARPA, Network Associates Laboratories
* Replace the conventional usage of strncpy() by using strlcpy().robert2002-10-172-13/+5
|
* - Use strlcpy() rather than strncpy() to copy NUL terminatedrobert2002-10-171-6/+6
| | | | | strings. - Pass the correct buffer size to getcredhostname().
* - Add support for IPC_64 extensions into shmctl(2), semctl(2) and msgctl(2);sobomax2002-10-114-23/+318
| | | | | | | | | | | | | - add wrappers for mmap2(2) and ftruncate64(2) system calls; - don't spam console with printf's when VFAT_READDIR_BOTH ioctl(2) is invoked; - add support for SOUND_MIXER_READ_STEREODEVS ioctl(2); - make msgctl(IPC_STAT) and IPC_SET actually working by converting from BSD msqid_ds to Linux and vice versa; - properly return EINVAL if semget(2) is called with nsems being negative. Reviewed by: marcel Approved by: marcel Tested with: LSB runtime test
* re-regen. Sigh.peter2002-10-093-7/+7
|
* Sigh. Fix fat-fingering of diff. I knew this was going to happen.peter2002-10-091-1/+1
|
* regenerate. sendfile stuff and other recently picked up stubs.peter2002-10-093-12/+54
|
* Try and deal with the #ifdef COMPAT_FREEBSD4 sendfile stuff. This wouldpeter2002-10-092-2/+25
| | | | have been a lot easier if do_sendfile() was usable externally.
* Try and patch up some tab-to-space spammage.peter2002-10-091-19/+19
|
* Add placeholder stubs for nsendfile, mac_syscall, ksem_close, ksem_post,peter2002-10-091-0/+22
| | | | | | ksem_wait, ksem_trywait, ksem_init, ksem_open, ksem_unlink, ksem_getvalue, ksem_destroy, __mac_get_pid, __mac_get_link, __mac_set_link, extattr_set_link, extattr_get_link, extattr_delete_link.
* Integrate mac_check_socket_send() and mac_check_socket_receive()rwatson2002-10-061-0/+17
| | | | | | | | | | checks from the MAC tree: allow policies to perform access control for the ability of a process to send and receive data via a socket. At some point, we might also pass in additional address information if an explicit address is requested on send. Obtained from: TrustedBSD Project Sponsored by: DARPA, Network Associates Laboratories
* Let kse_wakeup() take a KSE mailbox pointer argument.archie2002-10-022-2/+2
| | | | Reviewed by: julian
* Back our kernel support for reliable signal queues.jmallett2002-10-015-9/+4
| | | | Requested by: rwatson, phk, and many others
* First half of implementation of ksiginfo, signal queues, and such. Thisjmallett2002-09-305-4/+9
| | | | | | | | | | | | | | | | | | | | | | gets signals operating based on a TailQ, and is good enough to run X11, GNOME, and do job control. There are some intricate parts which could be more refined to match the sigset_t versions, but those require further evaluation of directions in which our signal system can expand and contract to fit our needs. After this has been in the tree for a while, I will make in kernel API changes, most notably to trapsignal(9) and sendsig(9), to use ksiginfo more robustly, such that we can actually pass information with our (queued) signals to the userland. That will also result in using a struct ksiginfo pointer, rather than a signal number, in a lot of kern_sig.c, to refer to an individual pending signal queue member, but right now there is no defined behaviour for such. CODAFS is unfinished in this regard because the logic is unclear in some places. Sponsored by: New Gold Technology Reviewed by: bde, tjr, jake [an older version, logic similar]
* Make the following name changes to KSE related functions, etc., to betterarchie2002-09-254-11/+11
| | | | | | | | | | | | | | | represent their purpose and minimize namespace conflicts: kse_fn_t -> kse_func_t struct thread_mailbox -> struct kse_thr_mailbox thread_interrupt() -> kse_thr_interrupt() kse_yield() -> kse_release() kse_new() -> kse_create() Add missing declaration of kse_thr_interrupt() to <sys/kse.h>. Regenerate the various generated syscall files. Minor style fixes. Reviewed by: julian
* - Hold the vn lock over vm_mmap().jeff2002-09-251-4/+4
|
* Back out last commit. Linux uses the old 4.3BSD sockaddr format.mini2002-09-243-46/+15
|
* Ok, make this compile for real this time. recvfrom_args doesn't have ajhb2002-09-231-1/+1
| | | | | fromlen member, instead it has a fromlenaddr pointer member. Set it to NULL.
* Use correct variable name so that previous commit actually compiles.jhb2002-09-231-2/+2
|
* Don't use compatability syscall wrappers in emulation code.mini2002-09-233-15/+50
| | | | | | This is needed for the COMPAT_FREEBSD3 option split. Reviewed by: alfred, jake
* Use the fields in the sysentvec and in the vm map header in place of thejake2002-09-213-3/+4
| | | | | | | | constants VM_MIN_ADDRESS, VM_MAXUSER_ADDRESS, USRSTACK and PS_STRINGS. This is mainly so that they can be variable even for the native abi, based on different machine types. Get stack protections from the sysentvec too. This makes it trivial to map the stack non-executable for certain abis, on machines that support it.
* Remove NVIDIA ioctl bits. They will be provided in a kernel module.mdodd2002-09-202-29/+0
|
* Put an XXX comment here to point somebody in the right direction.phk2002-09-201-0/+1
|
* Current uses struct thread *td rather than struct proc *p.imp2002-09-201-2/+2
|
* Pass flags to msync() accounting for differences in the definition ofmdodd2002-09-191-1/+5
| | | | | | MS_SYNC on FreeBSD and Linux. Submitted by: Christian Zander <zander@minion.de>
OpenPOWER on IntegriCloud