History log of /freebsd-12.1/sys/amd64/linux/syscalls.master (Results 1 – 25 of 26)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
Revision tags: release/12.2.0, release/11.4.0, release/12.1.0, release/11.3.0
# 33006368 28-Apr-2019 Dmitry Chagin <[email protected]>

MFC r345471, r345472, r346603:

Update syscall.master to 5.0.

For 32-bit Linuxulator, ipc() syscall was historically
the entry point for the IPC API. Starting in Linux 4.18, direct
syscalls are prov

MFC r345471, r345472, r346603:

Update syscall.master to 5.0.

For 32-bit Linuxulator, ipc() syscall was historically
the entry point for the IPC API. Starting in Linux 4.18, direct
syscalls are provided for the IPC. Enable it.

show more ...


Revision tags: release/12.0.0, release/11.2.0
# 716cfaab 23-Feb-2018 Ed Maste <[email protected]>

Use linux types for linux-specific syscalls

Sponsored by: Turing Robotic Industries Inc.
Differential Revision: https://reviews.freebsd.org/D14065


# 315fbaec 23-Feb-2018 Ed Maste <[email protected]>

Correct pseudo misspelling in sys/ comments

contrib code and #define in intel_ata.h unchanged.


# eae594f7 22-Feb-2018 Ed Maste <[email protected]>

Correct proper nouns in the Linuxulator

- Capitalize Linux
- Spell FreeBSD out in full
- Address some style(9) on changed lines

Sponsored by: Turing Robotic Industries Inc.


# 8a3b44cf 05-Feb-2018 Ed Maste <[email protected]>

Additional linuxolator whitespace cleanup, missed in r328890


# 132f90c6 05-Feb-2018 Ed Maste <[email protected]>

Linuxolator whitespace cleanup

A version of each of the MD files by necessity exists for each CPU
architecture supported by the Linuxolator. Clean these up so that new
architectures do not inherit

Linuxolator whitespace cleanup

A version of each of the MD files by necessity exists for each CPU
architecture supported by the Linuxolator. Clean these up so that new
architectures do not inherit whitespace issues.

Clean up shared Linuxolator files while here.

Sponsored by: Turing Robotic Industries Inc.

show more ...


# 5cd667e6 28-Nov-2017 Brooks Davis <[email protected]>

Disable vim syntax highlighting.

Vim's default pick doesn't understand that ';' is a comment character
and the result looks horrible.

Reviewed by: emaste


Revision tags: release/10.4.0, release/11.1.0
# 8049c6bf 06-Mar-2017 Mahdi Mokhtari <[email protected]>

Add UNIMPLEMENTED() placeholder macro for
the syscalls that are not implemented in Linux kernel itself.
Cleanup DUMMY() macros.

Reviewed by: dchagin, trasz
Approved by: dchagin
MFC after: 1 month
Di

Add UNIMPLEMENTED() placeholder macro for
the syscalls that are not implemented in Linux kernel itself.
Cleanup DUMMY() macros.

Reviewed by: dchagin, trasz
Approved by: dchagin
MFC after: 1 month
Differential Revision: https://reviews.freebsd.org/D9804

show more ...


# f8ae1bb6 26-Feb-2017 Dmitry Chagin <[email protected]>

Change Linux epoll_pwait syscall definition to match Linux actual one.

MFC after: 1 month


# 1064d53f 26-Feb-2017 Dmitry Chagin <[email protected]>

Change Linuxulator timerfd syscalls definition to match actual Linux one.

MFC after: 1 month


# 4ac1825c 15-Feb-2017 Edward Tomasz Napierala <[email protected]>

Fix definition of linux64 ptrace syscall.

MFC after: 2 weeks
Sponsored by: DARPA, AFRL


# 8b756d40 05-Feb-2017 Dmitry Chagin <[email protected]>

Update syscall.master to 4.10-rc6. Also fix comments, a typo,
and wrong numbering for a few unimplemented syscalls.

For 32-bit Linuxulator, socketcall() syscall was historically
the entry point for

Update syscall.master to 4.10-rc6. Also fix comments, a typo,
and wrong numbering for a few unimplemented syscalls.

For 32-bit Linuxulator, socketcall() syscall was historically
the entry point for the sockets API. Starting in Linux 4.3, direct
syscalls are provided for the sockets API. Enable it.

The initial version of patch was provided by trasz@ and extended by me.

Submitted by: trasz
MFC after: 2 week
Differential Revision: https://reviews.freebsd.org/D9381

show more ...


Revision tags: release/11.0.1, release/11.0.0
# 23e8912c 10-Jul-2016 Dmitry Chagin <[email protected]>

Implement Linux personality() system call mainly due to READ_IMPLIES_EXEC flag.
In Linux if this flag is set, PROT_READ implies PROT_EXEC for mmap().
Linux/i386 set this flag automatically if the bin

Implement Linux personality() system call mainly due to READ_IMPLIES_EXEC flag.
In Linux if this flag is set, PROT_READ implies PROT_EXEC for mmap().
Linux/i386 set this flag automatically if the binary requires executable stack.

READ_IMPLIES_EXEC flag will be used in the next Linux mmap() commit.

show more ...


# 8cc96fb4 21-May-2016 Dmitry Chagin <[email protected]>

Correct an argument param of linux_sched_* system calls as a struct l_sched_param
does not defined due to it's nature.

MFC after: 1 week


Revision tags: release/10.3.0
# 037f7508 14-Jan-2016 Gleb Smirnoff <[email protected]>

Change linux get_robust_list system call to match actual linux one.

The set_robust_list system call request the kernel to record the head
of the list of robust futexes owned by the calling thread. T

Change linux get_robust_list system call to match actual linux one.

The set_robust_list system call request the kernel to record the head
of the list of robust futexes owned by the calling thread. The head
argument is the list head to record.
The get_robust_list system call should return the head of the robust
list of the thread whose thread id is specified in pid argument.
The list head should be stored in the location pointed to by head
argument.

In contrast, our implemenattion of get_robust_list system call copies
the known portion of memory pointed by recorded in set_robust_list
system call pointer to the head of the robust list to the location
pointed by head argument.

So, it is possible for a local attacker to read portions of kernel
memory, which may result in a privilege escalation.

Submitted by: mjg
Security: SA-16:03.linux

show more ...


# 2f99bcce 22-Oct-2015 John Baldwin <[email protected]>

Rename remaining linux32 symbols such as linux_sysent[] and
linux_syscallnames[] from linux_* to linux32_* to avoid conflicts with
linux64.ko. While here, add support for linux64 binaries to systrac

Rename remaining linux32 symbols such as linux_sysent[] and
linux_syscallnames[] from linux_* to linux32_* to avoid conflicts with
linux64.ko. While here, add support for linux64 binaries to systrace.
- Update NOPROTO entries in amd64/linux/syscalls.master to match the
main table to fix systrace build.
- Add a special case for union l_semun arguments to the systrace
generation.
- The systrace_linux32 module now only builds the systrace_linux32.ko.
module on amd64.
- Add a new systrace_linux module that builds on both i386 and amd64.
For i386 it builds the existing systrace_linux.ko. For amd64 it
builds a systrace_linux.ko for 64-bit binaries.

Reviewed by: markj
Differential Revision: https://reviews.freebsd.org/D3954

show more ...


Revision tags: release/10.2.0
# 9802eb9e 24-May-2015 Dmitry Chagin <[email protected]>

Implement Linux specific syncfs() system call.


# e1ff74c0 24-May-2015 Dmitry Chagin <[email protected]>

Implement recvmmsg() and sendmmsg() system calls.


# 19d8b461 24-May-2015 Dmitry Chagin <[email protected]>

Add utimensat() system call.

The patch developed by Jilles Tjoelker and Andrew Wilcox and
adopted for lemul branch by me.


# fcdffc03 24-May-2015 Dmitry Chagin <[email protected]>

Call nosys in case when the incorrect syscall number is specified.

Reported by: trinity


# b6aeb7d5 24-May-2015 Dmitry Chagin <[email protected]>

Add preliminary fallocate system call implementation
to emulate posix_fallocate() function.

Differential Revision: https://reviews.freebsd.org/D1523
Reviewed by: emaste


# a6b40812 24-May-2015 Dmitry Chagin <[email protected]>

Implement ppoll() system call.

Differential Revision: https://reviews.freebsd.org/D1105
Reviewed by: trasz


# a31d7686 24-May-2015 Dmitry Chagin <[email protected]>

Implement eventfd system call.

Differential Revision: https://reviews.freebsd.org/D1094
In collaboration with: Jilles Tjoelker


# e16fe1c7 24-May-2015 Dmitry Chagin <[email protected]>

Implement epoll family system calls. This is a tiny wrapper
around kqueue() to implement epoll subset of functionality.
The kqueue user data are 32bit on i386 which is not enough for
epoll user data,

Implement epoll family system calls. This is a tiny wrapper
around kqueue() to implement epoll subset of functionality.
The kqueue user data are 32bit on i386 which is not enough for
epoll user data, so we keep user data in the proc emuldata.

Initial patch developed by rdivacky@ in 2007, then extended
by Yuri Victorovich @ r255672 and finished by me
in collaboration with mjg@ and jillies@.

Differential Revision: https://reviews.freebsd.org/D1092

show more ...


# baa232bb 24-May-2015 Dmitry Chagin <[email protected]>

Change linux faccessat syscall definition to match actual linux one.

The AT_EACCESS and AT_SYMLINK_NOFOLLOW flags are actually implemented
within the glibc wrapper function for faccessat(). If eith

Change linux faccessat syscall definition to match actual linux one.

The AT_EACCESS and AT_SYMLINK_NOFOLLOW flags are actually implemented
within the glibc wrapper function for faccessat(). If either of these
flags are specified, then the wrapper function employs fstatat() to
determine access permissions.

Differential Revision: https://reviews.freebsd.org/D1078
Reviewed by: trasz

show more ...


12