From 4499985ef24f499469cb387e65c6f0be4a897903 Mon Sep 17 00:00:00 2001 From: Robert Watson Date: Tue, 1 Oct 2002 02:35:59 +0000 Subject: [PATCH] Reserve system call numbers for the following system calls: __mac_get_pid Retrieve MAC label of a process by pid Similar to __mac_get_proc() except that the target process of the operation is explicitly specified rather than assuming curthread. __mac_get_link Retrieve MAC label of a path with NOFOLLOW __mac_set_link Set MAC label of a path with NOFOLLOW extattr_set_link Set EAs on a path with NOFOLLOW extattr_get_link Retrieve EAs on a path with NOFOLLOW extattr_delete_link Delete EAs on a path with NOFOLLOW These calls are similar to __mac_get_file(), __mac_set_file(), extattr_set_file(), extattr_get_file(), and extattr_delete_file(), except that they do not follow symlinks. The distinction between these calls is similar to lchown() vs chown(). Implementations to follow. Obtained from: TrustedBSD Project Sponsored by: DARPA, Network Associates Laboratories --- sys/kern/syscalls.master | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/sys/kern/syscalls.master b/sys/kern/syscalls.master index d2b51773c5b3..c000fab3254e 100644 --- a/sys/kern/syscalls.master +++ b/sys/kern/syscalls.master @@ -584,3 +584,9 @@ 406 MNOSTD BSD { int ksem_unlink(const char *name); } 407 MNOSTD BSD { int ksem_getvalue(semid_t id, int *val); } 408 MNOSTD BSD { int ksem_destroy(semid_t id); } +409 UNIMPL BSD __mac_get_pid +410 UNIMPL BSD __mac_get_link +411 UNIMPL BSD __mac_set_link +412 UNIMPL BSD extattr_set_link +413 UNIMPL BSD extattr_get_link +414 UNIMPL BSD extattr_delete_link