Reserve system call numbers for Capsicum security framework capabilities,
capability mode, and process descriptors: cap_new, cap_getrights, cap_enter, cap_getmode, pdfork, pdkill, pdgetpid, and pdwait. Obtained from: TrustedBSD Project Sponsored by: Google MFC after: 3 weeks
This commit is contained in:
parent
cb2cdeceb5
commit
72c35fc69c
@ -901,3 +901,11 @@
|
||||
512 AUE_SHMCTL STD { int freebsd32_shmctl(int shmid, int cmd, \
|
||||
struct shmid_ds32 *buf); }
|
||||
513 AUE_LPATHCONF NOPROTO { int lpathconf(char *path, int name); }
|
||||
514 AUE_CAP_NEW UNIMPL cap_new
|
||||
515 AUE_CAP_GETRIGHTS UNIMPL cap_getrights
|
||||
516 AUE_CAP_ENTER UNIMPL cap_enter
|
||||
517 AUE_CAP_GETMODE UNIMPL cap_getmode
|
||||
518 AUE_PDFORK UNIMPL pdfork
|
||||
519 AUE_PDKILL UNIMPL pdkill
|
||||
520 AUE_PDGETPID UNIMPL pdgetpid
|
||||
521 AUE_PDWAIT UNIMPL pdwait
|
||||
|
@ -911,5 +911,13 @@
|
||||
512 AUE_SHMCTL NOSTD { int shmctl(int shmid, int cmd, \
|
||||
struct shmid_ds *buf); }
|
||||
513 AUE_LPATHCONF STD { int lpathconf(char *path, int name); }
|
||||
514 AUE_CAP_NEW UNIMPL cap_new
|
||||
515 AUE_CAP_GETRIGHTS UNIMPL cap_getrights
|
||||
516 AUE_CAP_ENTER UNIMPL cap_enter
|
||||
517 AUE_CAP_GETMODE UNIMPL cap_getmode
|
||||
518 AUE_PDFORK UNIMPL pdfork
|
||||
519 AUE_PDKILL UNIMPL pdkill
|
||||
520 AUE_PDGETPID UNIMPL pdgetpid
|
||||
521 AUE_PDWAIT UNIMPL pdwait
|
||||
; Please copy any additions and changes to the following compatability tables:
|
||||
; sys/compat/freebsd32/syscalls.master
|
||||
|
Loading…
Reference in New Issue
Block a user