File: [local] / src / sys / sys / systm.h (download)
Revision 1.37, Sun Jan 2 06:31:28 2000 UTC (24 years, 5 months ago) by assar
Branch: MAIN
CVS Tags: SMP_BASE, OPENBSD_2_9_BASE, OPENBSD_2_9, OPENBSD_2_8_BASE, OPENBSD_2_8, OPENBSD_2_7_BASE, OPENBSD_2_7 Branch point for: SMP
Changes since 1.36: +5 -3 lines
(sy_call_t): define a type for the functions in sysent
PR 1032
|
/* $OpenBSD: systm.h,v 1.37 2000/01/02 06:31:28 assar Exp $ */
/* $NetBSD: systm.h,v 1.50 1996/06/09 04:55:09 briggs Exp $ */
/*-
* Copyright (c) 1982, 1988, 1991, 1993
* The Regents of the University of California. All rights reserved.
* (c) UNIX System Laboratories, Inc.
* All or some portions of this file are derived from material licensed
* to the University of California by American Telephone and Telegraph
* Co. or Unix System Laboratories, Inc. and are reproduced herein with
* the permission of UNIX System Laboratories, Inc.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
* 4. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* @(#)systm.h 8.4 (Berkeley) 2/23/94
*/
#ifndef __SYSTM_H__
#define __SYSTM_H__
#include <machine/stdarg.h>
/*
* The `securelevel' variable controls the security level of the system.
* It can only be decreased by process 1 (/sbin/init).
*
* Security levels are as follows:
* -1 permanently insecure mode - always run system in level 0 mode.
* 0 insecure mode - immutable and append-only flags make be turned off.
* All devices may be read or written subject to permission modes.
* 1 secure mode - immutable and append-only flags may not be changed;
* raw disks of mounted filesystems, /dev/mem, and /dev/kmem are
* read-only.
* 2 highly secure mode - same as (1) plus raw disks are always
* read-only whether mounted or not. This level precludes tampering
* with filesystems by unmounting them, but also inhibits running
* newfs while the system is secured.
*
* In normal operation, the system runs in level 0 mode while single user
* and in level 1 mode while multiuser. If level 2 mode is desired while
* running multiuser, it can be set in the multiuser startup script
* (/etc/rc.local) using sysctl(1). If it is desired to run the system
* in level 0 mode while multiuser, initialize the variable securelevel
* in /sys/kern/kern_sysctl.c to -1. Note that it is NOT initialized to
* zero as that would allow the vmunix binary to be patched to -1.
* Without initialization, securelevel loads in the BSS area which only
* comes into existence when the kernel is loaded and hence cannot be
* patched by a stalking hacker.
*/
extern int securelevel; /* system security level */
extern const char *panicstr; /* panic message */
extern char version[]; /* system version */
extern char copyright[]; /* system copyright */
extern int nblkdev; /* number of entries in bdevsw */
extern int nchrdev; /* number of entries in cdevsw */
#if !defined(UVM)
extern int nswdev; /* number of swap devices */
extern int nswap; /* size of swap space */
#endif
extern int selwait; /* select timeout address */
extern u_char curpriority; /* priority of current process */
extern int maxmem; /* max memory per process */
extern int physmem; /* physical memory */
extern dev_t dumpdev; /* dump device */
extern long dumplo; /* offset into dumpdev */
extern dev_t rootdev; /* root device */
extern struct vnode *rootvp; /* vnode equivalent to above */
extern dev_t swapdev; /* swapping device */
extern struct vnode *swapdev_vp;/* vnode equivalent to above */
struct proc;
typedef int sy_call_t __P((struct proc *, void *, register_t *));
extern struct sysent { /* system call table */
short sy_narg; /* number of args */
short sy_argsize; /* total size of arguments */
sy_call_t *sy_call; /* implementing function */
} sysent[];
#define SCARG(p,k) ((p)->k.datum) /* get arg from args pointer */
#if defined(_KERNEL) && defined(SYSCALL_DEBUG)
void scdebug_call __P((struct proc *p, register_t code, register_t retval[]));
void scdebug_ret __P((struct proc *p, register_t code, int error, register_t retval[]));
#endif /* _KERNEL && SYSCALL_DEBUG */
extern int boothowto; /* reboot flags, from console subsystem */
extern void (*v_putc) __P((int)); /* Virtual console putc routine */
extern void _insque __P((void *, void *));
extern void _remque __P((void *));
/* casts to keep lint happy, but it should be happy with void * */
#define insque(q,p) _insque(q, p)
#define remque(q) _remque(q)
/*
* General function declarations.
*/
int nullop __P((void *));
int enodev __P((void));
int enosys __P((void));
int enoioctl __P((void));
int enxio __P((void));
int eopnotsupp __P((void *));
int lkmenodev __P((void));
struct vnodeopv_desc;
void vfs_opv_init __P((void));
void vfs_opv_init_explicit __P((struct vnodeopv_desc *));
void vfs_opv_init_default __P((struct vnodeopv_desc *));
void vfs_op_init __P((void));
int seltrue __P((dev_t dev, int which, struct proc *));
void *hashinit __P((int, int, int, u_long *));
int sys_nosys __P((struct proc *, void *, register_t *));
void panic __P((const char *, ...))
#ifdef __KPRINTF_ATTRIBUTE__
__kprintf_attribute__((__noreturn__,__format__(__kprintf__,1,2)));
#else
__attribute__((__noreturn__));
#endif
void __assert __P((const char *, const char *, int, const char *))
__attribute__((__noreturn__));
int printf __P((const char *, ...))
__kprintf_attribute__((__format__(__kprintf__,1,2)));
void uprintf __P((const char *, ...))
__kprintf_attribute__((__format__(__kprintf__,1,2)));
void vprintf __P((const char *, _BSD_VA_LIST_));
int vsprintf __P((char *, const char *, va_list))
__kprintf_attribute__((__format__(__kprintf__,2,3)));
int sprintf __P((char *buf, const char *, ...))
__kprintf_attribute__((__format__(__kprintf__,2,3)));
int vsnprintf __P((char *, size_t, const char *, va_list))
__kprintf_attribute__((__format__(__kprintf__,3,4)));
int snprintf __P((char *buf, size_t, const char *, ...))
__kprintf_attribute__((__format__(__kprintf__,3,4)));
struct tty;
void ttyprintf __P((struct tty *, const char *, ...))
__kprintf_attribute__((__format__(__kprintf__,2,3)));
void tablefull __P((const char *));
#if defined(UVM)
int kcopy __P((const void *, void *, size_t));
#endif
void bcopy __P((const void *, void *, size_t));
void ovbcopy __P((const void *, void *, size_t));
void bzero __P((void *, size_t));
int bcmp __P((const void *, const void *, size_t));
void *memcpy __P((void *, const void *, size_t));
void *memmove __P((void *, const void *, size_t));
void *memset __P((void *, int, size_t));
int copystr __P((const void *, void *, size_t, size_t *));
int copyinstr __P((const void *, void *, size_t, size_t *));
int copyoutstr __P((const void *, void *, size_t, size_t *));
int copyin __P((const void *, void *, size_t));
int copyout __P((const void *, void *, size_t));
int fubyte __P((void *));
#ifdef notdef
int fuibyte __P((void *));
#endif
int subyte __P((void *, int));
int suibyte __P((void *, int));
long fuword __P((void *));
long fuiword __P((void *));
int suword __P((void *, long));
int suiword __P((void *, long));
int fuswintr __P((caddr_t));
int suswintr __P((caddr_t, u_int));
struct timeval;
int hzto __P((struct timeval *));
void timeout __P((void (*)(void *), void *, int));
void untimeout __P((void (*)(void *), void *));
void realitexpire __P((void *));
struct clockframe;
void hardclock __P((struct clockframe *));
void softclock __P((void));
void statclock __P((struct clockframe *));
#ifdef NTP
void hardupdate __P((long offset));
#ifdef PPS_SYNC
void hardpps __P((struct timeval *, long));
#endif
#endif
void initclocks __P((void));
void inittodr __P((time_t));
void resettodr __P((void));
void cpu_initclocks __P((void));
void startprofclock __P((struct proc *));
void stopprofclock __P((struct proc *));
void setstatclockrate __P((int));
/*
* Shutdown hooks. Functions to be run with all interrupts disabled
* immediately before the system is halted or rebooted.
*/
void *shutdownhook_establish __P((void (*)(void *), void *));
void shutdownhook_disestablish __P((void *));
void doshutdownhooks __P((void));
/*
* Power managment hooks.
*/
void *powerhook_establish __P((void (*)(int, void *), void *));
void powerhook_disestablish __P((void *));
void dopowerhooks __P((int));
#define PWR_RESUME 0
#define PWR_SUSPEND 1
#define PWR_STANDBY 2
struct uio;
int uiomove __P((caddr_t, int, struct uio *));
int setjmp __P((label_t *));
void longjmp __P((label_t *));
void consinit __P((void));
void cpu_startup __P((void));
void cpu_set_kpc __P((struct proc *, void (*)(void *), void *));
extern void (*md_diskconf) __P((void));
#ifdef GPROF
void kmstartup __P((void));
#endif
int nfs_mountroot __P((void));
int dk_mountroot __P((void));
int (*mountroot)__P((void));
#include <lib/libkern/libkern.h>
#if defined(DDB) || defined(KGDB)
/* debugger entry points */
void Debugger __P((void)); /* in DDB only */
int read_symtab_from_file __P((struct proc *,struct vnode *,const char *));
#endif
#ifdef BOOT_CONFIG
void user_config __P((void));
#endif
#endif /* __SYSTM_H__ */