|
Revision tags: release/12.2.0, release/11.4.0, release/12.1.0, release/11.3.0 |
|
| #
33006368 |
| 28-Apr-2019 |
Dmitry Chagin <[email protected]> |
MFC r345471, r345472, r346603:
Update syscall.master to 5.0.
For 32-bit Linuxulator, ipc() syscall was historically the entry point for the IPC API. Starting in Linux 4.18, direct syscalls are prov
MFC r345471, r345472, r346603:
Update syscall.master to 5.0.
For 32-bit Linuxulator, ipc() syscall was historically the entry point for the IPC API. Starting in Linux 4.18, direct syscalls are provided for the IPC. Enable it.
show more ...
|
|
Revision tags: release/12.0.0, release/11.2.0 |
|
| #
716cfaab |
| 23-Feb-2018 |
Ed Maste <[email protected]> |
Use linux types for linux-specific syscalls
Sponsored by: Turing Robotic Industries Inc. Differential Revision: https://reviews.freebsd.org/D14065
|
| #
315fbaec |
| 23-Feb-2018 |
Ed Maste <[email protected]> |
Correct pseudo misspelling in sys/ comments
contrib code and #define in intel_ata.h unchanged.
|
| #
eae594f7 |
| 22-Feb-2018 |
Ed Maste <[email protected]> |
Correct proper nouns in the Linuxulator
- Capitalize Linux - Spell FreeBSD out in full - Address some style(9) on changed lines
Sponsored by: Turing Robotic Industries Inc.
|
| #
8a3b44cf |
| 05-Feb-2018 |
Ed Maste <[email protected]> |
Additional linuxolator whitespace cleanup, missed in r328890
|
| #
132f90c6 |
| 05-Feb-2018 |
Ed Maste <[email protected]> |
Linuxolator whitespace cleanup
A version of each of the MD files by necessity exists for each CPU architecture supported by the Linuxolator. Clean these up so that new architectures do not inherit
Linuxolator whitespace cleanup
A version of each of the MD files by necessity exists for each CPU architecture supported by the Linuxolator. Clean these up so that new architectures do not inherit whitespace issues.
Clean up shared Linuxolator files while here.
Sponsored by: Turing Robotic Industries Inc.
show more ...
|
| #
5cd667e6 |
| 28-Nov-2017 |
Brooks Davis <[email protected]> |
Disable vim syntax highlighting.
Vim's default pick doesn't understand that ';' is a comment character and the result looks horrible.
Reviewed by: emaste
|
|
Revision tags: release/10.4.0, release/11.1.0 |
|
| #
8049c6bf |
| 06-Mar-2017 |
Mahdi Mokhtari <[email protected]> |
Add UNIMPLEMENTED() placeholder macro for the syscalls that are not implemented in Linux kernel itself. Cleanup DUMMY() macros.
Reviewed by: dchagin, trasz Approved by: dchagin MFC after: 1 month Di
Add UNIMPLEMENTED() placeholder macro for the syscalls that are not implemented in Linux kernel itself. Cleanup DUMMY() macros.
Reviewed by: dchagin, trasz Approved by: dchagin MFC after: 1 month Differential Revision: https://reviews.freebsd.org/D9804
show more ...
|
| #
f8ae1bb6 |
| 26-Feb-2017 |
Dmitry Chagin <[email protected]> |
Change Linux epoll_pwait syscall definition to match Linux actual one.
MFC after: 1 month
|
| #
1064d53f |
| 26-Feb-2017 |
Dmitry Chagin <[email protected]> |
Change Linuxulator timerfd syscalls definition to match actual Linux one.
MFC after: 1 month
|
| #
4ac1825c |
| 15-Feb-2017 |
Edward Tomasz Napierala <[email protected]> |
Fix definition of linux64 ptrace syscall.
MFC after: 2 weeks Sponsored by: DARPA, AFRL
|
| #
8b756d40 |
| 05-Feb-2017 |
Dmitry Chagin <[email protected]> |
Update syscall.master to 4.10-rc6. Also fix comments, a typo, and wrong numbering for a few unimplemented syscalls.
For 32-bit Linuxulator, socketcall() syscall was historically the entry point for
Update syscall.master to 4.10-rc6. Also fix comments, a typo, and wrong numbering for a few unimplemented syscalls.
For 32-bit Linuxulator, socketcall() syscall was historically the entry point for the sockets API. Starting in Linux 4.3, direct syscalls are provided for the sockets API. Enable it.
The initial version of patch was provided by trasz@ and extended by me.
Submitted by: trasz MFC after: 2 week Differential Revision: https://reviews.freebsd.org/D9381
show more ...
|
|
Revision tags: release/11.0.1, release/11.0.0 |
|
| #
23e8912c |
| 10-Jul-2016 |
Dmitry Chagin <[email protected]> |
Implement Linux personality() system call mainly due to READ_IMPLIES_EXEC flag. In Linux if this flag is set, PROT_READ implies PROT_EXEC for mmap(). Linux/i386 set this flag automatically if the bin
Implement Linux personality() system call mainly due to READ_IMPLIES_EXEC flag. In Linux if this flag is set, PROT_READ implies PROT_EXEC for mmap(). Linux/i386 set this flag automatically if the binary requires executable stack.
READ_IMPLIES_EXEC flag will be used in the next Linux mmap() commit.
show more ...
|
| #
8cc96fb4 |
| 21-May-2016 |
Dmitry Chagin <[email protected]> |
Correct an argument param of linux_sched_* system calls as a struct l_sched_param does not defined due to it's nature.
MFC after: 1 week
|
|
Revision tags: release/10.3.0 |
|
| #
037f7508 |
| 14-Jan-2016 |
Gleb Smirnoff <[email protected]> |
Change linux get_robust_list system call to match actual linux one.
The set_robust_list system call request the kernel to record the head of the list of robust futexes owned by the calling thread. T
Change linux get_robust_list system call to match actual linux one.
The set_robust_list system call request the kernel to record the head of the list of robust futexes owned by the calling thread. The head argument is the list head to record. The get_robust_list system call should return the head of the robust list of the thread whose thread id is specified in pid argument. The list head should be stored in the location pointed to by head argument.
In contrast, our implemenattion of get_robust_list system call copies the known portion of memory pointed by recorded in set_robust_list system call pointer to the head of the robust list to the location pointed by head argument.
So, it is possible for a local attacker to read portions of kernel memory, which may result in a privilege escalation.
Submitted by: mjg Security: SA-16:03.linux
show more ...
|
| #
2f99bcce |
| 22-Oct-2015 |
John Baldwin <[email protected]> |
Rename remaining linux32 symbols such as linux_sysent[] and linux_syscallnames[] from linux_* to linux32_* to avoid conflicts with linux64.ko. While here, add support for linux64 binaries to systrac
Rename remaining linux32 symbols such as linux_sysent[] and linux_syscallnames[] from linux_* to linux32_* to avoid conflicts with linux64.ko. While here, add support for linux64 binaries to systrace. - Update NOPROTO entries in amd64/linux/syscalls.master to match the main table to fix systrace build. - Add a special case for union l_semun arguments to the systrace generation. - The systrace_linux32 module now only builds the systrace_linux32.ko. module on amd64. - Add a new systrace_linux module that builds on both i386 and amd64. For i386 it builds the existing systrace_linux.ko. For amd64 it builds a systrace_linux.ko for 64-bit binaries.
Reviewed by: markj Differential Revision: https://reviews.freebsd.org/D3954
show more ...
|
|
Revision tags: release/10.2.0 |
|
| #
9802eb9e |
| 24-May-2015 |
Dmitry Chagin <[email protected]> |
Implement Linux specific syncfs() system call.
|
| #
e1ff74c0 |
| 24-May-2015 |
Dmitry Chagin <[email protected]> |
Implement recvmmsg() and sendmmsg() system calls.
|
| #
19d8b461 |
| 24-May-2015 |
Dmitry Chagin <[email protected]> |
Add utimensat() system call.
The patch developed by Jilles Tjoelker and Andrew Wilcox and adopted for lemul branch by me.
|
| #
fcdffc03 |
| 24-May-2015 |
Dmitry Chagin <[email protected]> |
Call nosys in case when the incorrect syscall number is specified.
Reported by: trinity
|
| #
b6aeb7d5 |
| 24-May-2015 |
Dmitry Chagin <[email protected]> |
Add preliminary fallocate system call implementation to emulate posix_fallocate() function.
Differential Revision: https://reviews.freebsd.org/D1523 Reviewed by: emaste
|
| #
a6b40812 |
| 24-May-2015 |
Dmitry Chagin <[email protected]> |
Implement ppoll() system call.
Differential Revision: https://reviews.freebsd.org/D1105 Reviewed by: trasz
|
| #
a31d7686 |
| 24-May-2015 |
Dmitry Chagin <[email protected]> |
Implement eventfd system call.
Differential Revision: https://reviews.freebsd.org/D1094 In collaboration with: Jilles Tjoelker
|
| #
e16fe1c7 |
| 24-May-2015 |
Dmitry Chagin <[email protected]> |
Implement epoll family system calls. This is a tiny wrapper around kqueue() to implement epoll subset of functionality. The kqueue user data are 32bit on i386 which is not enough for epoll user data,
Implement epoll family system calls. This is a tiny wrapper around kqueue() to implement epoll subset of functionality. The kqueue user data are 32bit on i386 which is not enough for epoll user data, so we keep user data in the proc emuldata.
Initial patch developed by rdivacky@ in 2007, then extended by Yuri Victorovich @ r255672 and finished by me in collaboration with mjg@ and jillies@.
Differential Revision: https://reviews.freebsd.org/D1092
show more ...
|
| #
baa232bb |
| 24-May-2015 |
Dmitry Chagin <[email protected]> |
Change linux faccessat syscall definition to match actual linux one.
The AT_EACCESS and AT_SYMLINK_NOFOLLOW flags are actually implemented within the glibc wrapper function for faccessat(). If eith
Change linux faccessat syscall definition to match actual linux one.
The AT_EACCESS and AT_SYMLINK_NOFOLLOW flags are actually implemented within the glibc wrapper function for faccessat(). If either of these flags are specified, then the wrapper function employs fstatat() to determine access permissions.
Differential Revision: https://reviews.freebsd.org/D1078 Reviewed by: trasz
show more ...
|