summaryrefslogtreecommitdiffstats
path: root/sys/ia64/ia32/syscalls.master
Commit message (Collapse)AuthorAgeFilesLines
* Assimilate ia64 back into the fold with the common freebsd32/ia32 code.peter2003-12-111-611/+0
| | | | | | | | The split-up code is derived from the ia64 code originally. Note that I have only compile-tested this, not actually run-tested it. The ia64 side of the force is missing some significant chunks of signal delivery code.
* Sync with global syscalls.master. ptrace(), dup(), pipe(), ktrace(),jhb2003-11-071-9/+9
| | | | | ia32_sigaltstack(), sysarch(), issetugid(), utrace(), and ia32_sigaction() are MP safe.
* Swap sigaction/sigreturn since they are in the wrong order.jhb2003-08-211-2/+2
| | | | Noticed indirectly by: peter
* Oops, the thr_* and jail_attach() syscall entries should be NOPROTO ratherjhb2003-04-251-7/+7
| | | | than STD.
* Fix the thr_create() entry by adding a trailing \. Also, sync up thejhb2003-04-241-4/+4
| | | | MP safe flag for thr_* with the main table.
* o In struct prison, add an allprison linked list of prisons (protectedmike2003-04-091-0/+1
| | | | | | | | | | | | | | | by allprison_mtx), a unique prison/jail identifier field, two path fields (pr_path for reporting and pr_root vnode instance) to store the chroot() point of each jail. o Add jail_attach(2) to allow a process to bind to an existing jail. o Add change_root() to perform the chroot operation on a specified vnode. o Generalize change_dir() to accept a vnode, and move namei() calls to callers of change_dir(). o Add a new sysctl (security.jail.list) which is a group of struct xprison instances that represent a snapshot of active jails. Reviewed by: rwatson, tjr
* - Add thr and umtx system calls.jeff2003-04-011-0/+8
|
* - Add a placeholder for sigwaitjeff2003-03-311-0/+1
|
* Synchronize to kern/syscalls.master:1.139.rwatson2002-12-291-0/+4
| | | | Obtained from: TrustedBSD Project
* Change swapoff from MNOPROTO to UNIMPL. The former doesn't work.marcel2002-12-161-1/+1
|
* This is David Schultz's swapoff code which I am finally able to commit.dillon2002-12-151-0/+1
| | | | | | | This should be considered highly experimental for the moment. Submitted by: David Schultz <dschultz@uclink.Berkeley.EDU> MFC after: 3 weeks
* Add *context() syscalls to ia64 32-bit compatability table as requesteddeischen2002-11-161-0/+3
| | | | in kern/syscalls.master.
* Sync to src/sys/kern/syscalls.masterrwatson2002-11-021-1/+1
|
* Stake a claim on 418 (__xstat), 419 (__xfstat), 420 (__xlstat)peter2002-10-191-0/+3
|
* Grab 416/417 real estate before I get burned while testing again.peter2002-10-191-0/+2
| | | | | | This is for the not-quite-ready signal/fpu abi stuff. It may not see the light of day, but I'm certainly not going to be able to validate it when getting shot in the foot due to syscall number conflicts.
* Add a placeholder for the execve_mac() system call, similar to SELinux'srwatson2002-10-191-0/+1
| | | | | | | | | | | | execve_secure() system call, which permits a process to pass in a label for a label change during exec. This permits SELinux to change the label for the resulting exec without a race following a manual label change on the process. Because this interface uses our general purpose MAC label abstraction, we call it execve_mac(), and wrap our port of SELinux's execve_secure() around it with appropriate sid mappings. Obtained from: TrustedBSD Project Sponsored by: DARPA, Network Associates Laboratories
* Sigh. Fix fat-fingering of diff. I knew this was going to happen.peter2002-10-091-1/+1
|
* Try and deal with the #ifdef COMPAT_FREEBSD4 sendfile stuff. This wouldpeter2002-10-091-2/+4
| | | | have been a lot easier if do_sendfile() was usable externally.
* Try and patch up some tab-to-space spammage.peter2002-10-091-19/+19
|
* Add placeholder stubs for nsendfile, mac_syscall, ksem_close, ksem_post,peter2002-10-091-0/+22
| | | | | | ksem_wait, ksem_trywait, ksem_init, ksem_open, ksem_unlink, ksem_getvalue, ksem_destroy, __mac_get_pid, __mac_get_link, __mac_set_link, extattr_set_link, extattr_get_link, extattr_delete_link.
* Let kse_wakeup() take a KSE mailbox pointer argument.archie2002-10-021-1/+1
| | | | Reviewed by: julian
* Make the following name changes to KSE related functions, etc., to betterarchie2002-09-251-4/+4
| | | | | | | | | | | | | | | represent their purpose and minimize namespace conflicts: kse_fn_t -> kse_func_t struct thread_mailbox -> struct kse_thr_mailbox thread_interrupt() -> kse_thr_interrupt() kse_yield() -> kse_release() kse_new() -> kse_create() Add missing declaration of kse_thr_interrupt() to <sys/kse.h>. Regenerate the various generated syscall files. Minor style fixes. Reviewed by: julian
* Infrastructure tweaks to allow having both an Elf32 and an Elf64 executablepeter2002-07-201-329/+330
| | | | | | | | | | | | | | | handler in the kernel at the same time. Also, allow for the exec_new_vmspace() code to build a different sized vmspace depending on the executable environment. This is a big help for execing i386 binaries on ia64. The ELF exec code grows the ability to map partial pages when there is a page size difference, eg: emulating 4K pages on 8K or 16K hardware pages. Flesh out the i386 emulation support for ia64. At this point, the only binary that I know of that fails is cvsup, because the cvsup runtime tries to execute code in pages not marked executable. Obtained from: dfr (mostly, many tweaks from me).
* Initial support for executing IA-32 binaries. This will not compiledfr2002-04-101-0/+562
without a few patches for the rest of the kernel to allow the image activator to override exec_copyout_strings and setregs. None of the syscall argument translation has been done. Possibly, this translation layer can be shared with any platform that wants to support running ILP32 binaries on an LP64 host (e.g. sparc32 binaries?)
OpenPOWER on IntegriCloud