summaryrefslogtreecommitdiff
path: root/sys/kern/init_sysent.c
AgeCommit message (Collapse)Author
2024-03-28sysTheo de Raadt
2024-03-25regenVitaliy Makkoveev
2024-01-26regenVitaliy Makkoveev
2023-12-19syncTheo de Raadt
2023-12-12syncTheo de Raadt
2023-12-10syncTheo de Raadt
2023-12-07syncTheo de Raadt
2023-11-29regen syscallsAlexander Bluhm
2023-08-20regenVisa Hankala
2023-07-24RegenMiod Vallat
2023-05-18regenVitaliy Makkoveev
2023-05-04regenVitaliy Makkoveev
2023-02-27syncTheo de Raadt
2023-02-25regenVitaliy Makkoveev
2023-02-16regenClaudio Jeker
2023-02-16syncTheo de Raadt
2023-02-14regenVitaliy Makkoveev
2023-02-13regenVitaliy Makkoveev
2023-02-11syncTheo de Raadt
2023-02-11sync for __syscall removalTheo de Raadt
2023-01-07regenPhilip Guenther
2022-12-17regen after minherit(2) unlockKlemens Nanni
2022-11-30regenVitaliy Makkoveev
2022-11-09regenMartin Pieuchot
2022-11-08RegenMartin Pieuchot
2022-10-25regenMark Kettenis
2022-10-07syncTheo de Raadt
2022-09-03regenMoritz Buhl
2022-09-03Make recvmmsg and sendmmsg look more alike. change the flag typeMoritz Buhl
to int like other flag parameters, NetBSD uses unsigned int, FreeBSD and Linux do int. OK bluhm@
2022-09-03regenMoritz Buhl
2022-09-03add the sendmmsg syscall that allows sending multiple msghdrs atMoritz Buhl
once. libc, man page, and regress parts to come. With input from jca@, bluhm@. OK bluhm@
2022-09-02regenMoritz Buhl
2022-09-02add the recvmmsg syscall that allows receiving multiple msghdrs atMoritz Buhl
once. libc, man page, and regress parts to come. With input from jca@, guenther@, bluhm@. OK bluhm@
2022-08-01syncTheo de Raadt
2022-07-20syncTheo de Raadt
2022-07-15syncTheo de Raadt
2022-06-29Regen syscalls files as they were meant to be, correcting the "created ↵Jeremie Courreges-Anglas
from:" info Cluebat from miod@
2022-06-29Unlock the pledge(2) system callJeremie Courreges-Anglas
Protect the ps_pledge/ps_execpledge fields with ps_mtx. Shuffle the code to call unveil_destroy() outside the critical section. Only writes to those fields are protected. Since we may only remove bits from those fields, garbage values should do no harm even when a read crosses a write on 32 bits systems. Input claudio@ kettenis@ deraadt@, ok deraadt@
2022-06-27kbind(2): unlock syscall, push kernel lock down to binding loopScott Soule Cheloha
- Rearrange the security check code in sys_kbind() so that we only need to take the kernel lock once if we need to raise SIGILL. - Protect process.ps_kbind_addr and process.ps_kbind_cookie with process.ps_mtx. This is easier to do after the aforementioned rearrangement. Under normal circumstances this isn't necessary: the process is single-threaded when we initialize kbind(2). But in stranger situations this brief mutex ensures that the first thread to reach sys_kbind() initializes both variables. - Wrap the binding loop with the kernel lock. We need to carefully confirm that uvm_unmap_remove(), uvm_map_extract(), and uvm_unmap_detach() are MP-safe in a subsequent patch before completely removing the kernel lock from sys_kbind(). - Remove the kernel lock from kbind(2) in syscalls.master. Prompted by mpi@, dlg@, and deraadt@. Current patch workshopped with deraadt@. Based on a patch from dlg@. With input from dlg@, bluhm@, mpi@, kettenis@, deraadt@, and guenther@. Thread: https://marc.info/?l=openbsd-tech&m=165274831829349&w=2 ok deraadt@ kettenis@ mpi@
2022-05-16regenVitaliy Makkoveev
2022-05-01regenTed Unangst
2022-02-24regenVitaliy Makkoveev
2022-01-11regenVitaliy Makkoveev
2021-12-23syncPhilip Guenther
2021-12-09We only have one syscall table: inline sysent/SYS_MAXSYSCALL andPhilip Guenther
SYS_syscall as the nosys() function into the MD syscall entry routines and the SYSCALL_DEBUG support. Adjust alpha's syscall check to match the other archs. Also, make sysent const to get it into .rodata. With that, 'struct emul' is unused: delete it and all its references ok millert@
2021-11-29regenVitaliy Makkoveev
2021-10-27regenVisa Hankala
2021-06-04regenmvs
2021-06-02regenmvs
2021-05-12regenMartin Pieuchot