<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/amd64/linux32/syscalls.master, branch releng/11.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=releng%2F11.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=releng%2F11.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2016-07-18T16:34:11Z</updated>
<entry>
<title>MFC r302515:</title>
<updated>2016-07-18T16:34:11Z</updated>
<author>
<name>Dmitry Chagin</name>
<email>dchagin@FreeBSD.org</email>
</author>
<published>2016-07-18T16:34:11Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=ffa95dadf4849b70712c6765a500de1a36505542'/>
<id>urn:sha1:ffa95dadf4849b70712c6765a500de1a36505542</id>
<content type='text'>
Implement Linux personality() system call mainly due to READ_IMPLIES_EXEC flag.
In Linux if this flag is set, PROT_READ implies PROT_EXEC for mmap().
Linux/i386 set this flag automatically if the binary requires executable stack.

READ_IMPLIES_EXEC flag will be used in the next Linux mmap() commit.

Approved by:	re (gjb)
</content>
</entry>
<entry>
<title>Correct an argument param of linux_sched_* system calls as a struct l_sched_param</title>
<updated>2016-05-21T08:01:14Z</updated>
<author>
<name>Dmitry Chagin</name>
<email>dchagin@FreeBSD.org</email>
</author>
<published>2016-05-21T08:01:14Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=8cc96fb43a5fe09d52e584cc3dc1e5e27306c4c2'/>
<id>urn:sha1:8cc96fb43a5fe09d52e584cc3dc1e5e27306c4c2</id>
<content type='text'>
does not defined due to it's nature.

MFC after:	1 week
</content>
</entry>
<entry>
<title>Implement fstatfs64 system call.</title>
<updated>2016-03-20T13:21:20Z</updated>
<author>
<name>Dmitry Chagin</name>
<email>dchagin@FreeBSD.org</email>
</author>
<published>2016-03-20T13:21:20Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=99546279d612cfaf4ae5501f41785d37fda3b425'/>
<id>urn:sha1:99546279d612cfaf4ae5501f41785d37fda3b425</id>
<content type='text'>
PR:		181012
Submitted by:	John Wehle
MFC after:	1 week
</content>
</entry>
<entry>
<title>Change linux get_robust_list system call to match actual linux one.</title>
<updated>2016-01-14T10:13:58Z</updated>
<author>
<name>Gleb Smirnoff</name>
<email>glebius@FreeBSD.org</email>
</author>
<published>2016-01-14T10:13:58Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=037f750877f04f57a316f597f2e0176fa1e19aab'/>
<id>urn:sha1:037f750877f04f57a316f597f2e0176fa1e19aab</id>
<content type='text'>
The set_robust_list system call request the kernel to record the head
of the list of robust futexes owned by the calling thread. The head
argument is the list head to record.
The get_robust_list system call should return the head of the robust
list of the thread whose thread id is specified in pid argument.
The list head should be stored in the location pointed to by head
argument.

In contrast, our implemenattion of get_robust_list system call copies
the known portion of memory pointed by recorded in set_robust_list
system call pointer to the head of the robust list to the location
pointed by head argument.

So, it is possible for a local attacker to read portions of kernel
memory, which may result in a privilege escalation.

Submitted by:	mjg
Security:	SA-16:03.linux
</content>
</entry>
<entry>
<title>Rename remaining linux32 symbols such as linux_sysent[] and</title>
<updated>2015-10-22T21:28:20Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2015-10-22T21:28:20Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=2f99bcce1ebf7f5723f98529176226dd9118e2a5'/>
<id>urn:sha1:2f99bcce1ebf7f5723f98529176226dd9118e2a5</id>
<content type='text'>
linux_syscallnames[] from linux_* to linux32_* to avoid conflicts with
linux64.ko.  While here, add support for linux64 binaries to systrace.
- Update NOPROTO entries in amd64/linux/syscalls.master to match the
  main table to fix systrace build.
- Add a special case for union l_semun arguments to the systrace
  generation.
- The systrace_linux32 module now only builds the systrace_linux32.ko.
  module on amd64.
- Add a new systrace_linux module that builds on both i386 and amd64.
  For i386 it builds the existing systrace_linux.ko.  For amd64 it
  builds a systrace_linux.ko for 64-bit binaries.

Reviewed by:	markj
Differential Revision:	https://reviews.freebsd.org/D3954
</content>
</entry>
<entry>
<title>Implement Linux specific syncfs() system call.</title>
<updated>2015-05-24T18:08:01Z</updated>
<author>
<name>Dmitry Chagin</name>
<email>dchagin@FreeBSD.org</email>
</author>
<published>2015-05-24T18:08:01Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=9802eb9ebc04783e12038072f76156152851341e'/>
<id>urn:sha1:9802eb9ebc04783e12038072f76156152851341e</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Implement recvmmsg() and sendmmsg() system calls.</title>
<updated>2015-05-24T18:04:04Z</updated>
<author>
<name>Dmitry Chagin</name>
<email>dchagin@FreeBSD.org</email>
</author>
<published>2015-05-24T18:04:04Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=e1ff74c0f7284439021e9776877b9350bd71c370'/>
<id>urn:sha1:e1ff74c0f7284439021e9776877b9350bd71c370</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Implement epoll_pwait() system call.</title>
<updated>2015-05-24T18:00:14Z</updated>
<author>
<name>Dmitry Chagin</name>
<email>dchagin@FreeBSD.org</email>
</author>
<published>2015-05-24T18:00:14Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=6e4c8004dc3f4da2000a225b46d69a39679395ff'/>
<id>urn:sha1:6e4c8004dc3f4da2000a225b46d69a39679395ff</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add utimensat() system call.</title>
<updated>2015-05-24T17:57:07Z</updated>
<author>
<name>Dmitry Chagin</name>
<email>dchagin@FreeBSD.org</email>
</author>
<published>2015-05-24T17:57:07Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=19d8b461f4ae608e702f120b53396d63011af704'/>
<id>urn:sha1:19d8b461f4ae608e702f120b53396d63011af704</id>
<content type='text'>
The patch developed by Jilles Tjoelker and Andrew Wilcox and
adopted for lemul branch by me.
</content>
</entry>
<entry>
<title>Call nosys in case when the incorrect syscall number is specified.</title>
<updated>2015-05-24T17:38:02Z</updated>
<author>
<name>Dmitry Chagin</name>
<email>dchagin@FreeBSD.org</email>
</author>
<published>2015-05-24T17:38:02Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=fcdffc03f80577070fad20ff11fa3c9c5c09328e'/>
<id>urn:sha1:fcdffc03f80577070fad20ff11fa3c9c5c09328e</id>
<content type='text'>
Reported by:	trinity
</content>
</entry>
</feed>
