systm.h revision 1858
11541Srgrimes/*-
21541Srgrimes * Copyright (c) 1982, 1988, 1991, 1993
31541Srgrimes *	The Regents of the University of California.  All rights reserved.
41541Srgrimes * (c) UNIX System Laboratories, Inc.
51541Srgrimes * All or some portions of this file are derived from material licensed
61541Srgrimes * to the University of California by American Telephone and Telegraph
71541Srgrimes * Co. or Unix System Laboratories, Inc. and are reproduced herein with
81541Srgrimes * the permission of UNIX System Laboratories, Inc.
91541Srgrimes *
101541Srgrimes * Redistribution and use in source and binary forms, with or without
111541Srgrimes * modification, are permitted provided that the following conditions
121541Srgrimes * are met:
131541Srgrimes * 1. Redistributions of source code must retain the above copyright
141541Srgrimes *    notice, this list of conditions and the following disclaimer.
151541Srgrimes * 2. Redistributions in binary form must reproduce the above copyright
161541Srgrimes *    notice, this list of conditions and the following disclaimer in the
171541Srgrimes *    documentation and/or other materials provided with the distribution.
181541Srgrimes * 3. All advertising materials mentioning features or use of this software
191541Srgrimes *    must display the following acknowledgement:
201541Srgrimes *	This product includes software developed by the University of
211541Srgrimes *	California, Berkeley and its contributors.
221541Srgrimes * 4. Neither the name of the University nor the names of its contributors
231541Srgrimes *    may be used to endorse or promote products derived from this software
241541Srgrimes *    without specific prior written permission.
251541Srgrimes *
261541Srgrimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
271541Srgrimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
281541Srgrimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
291541Srgrimes * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
301541Srgrimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
311541Srgrimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
321541Srgrimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
331541Srgrimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
341541Srgrimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
351541Srgrimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
361541Srgrimes * SUCH DAMAGE.
371541Srgrimes *
381541Srgrimes *	@(#)systm.h	8.4 (Berkeley) 2/23/94
391858Sdg * $Id: systm.h,v 1.4 1994/08/04 06:15:10 davidg Exp $
401541Srgrimes */
411541Srgrimes
421549Srgrimes#include <machine/cpufunc.h>
431549Srgrimes
441541Srgrimes/*
451541Srgrimes * The `securelevel' variable controls the security level of the system.
461541Srgrimes * It can only be decreased by process 1 (/sbin/init).
471541Srgrimes *
481541Srgrimes * Security levels are as follows:
491541Srgrimes *   -1	permannently insecure mode - always run system in level 0 mode.
501541Srgrimes *    0	insecure mode - immutable and append-only flags make be turned off.
511541Srgrimes *	All devices may be read or written subject to permission modes.
521541Srgrimes *    1	secure mode - immutable and append-only flags may not be changed;
531541Srgrimes *	raw disks of mounted filesystems, /dev/mem, and /dev/kmem are
541541Srgrimes *	read-only.
551541Srgrimes *    2	highly secure mode - same as (1) plus raw disks are always
561541Srgrimes *	read-only whether mounted or not. This level precludes tampering
571541Srgrimes *	with filesystems by unmounting them, but also inhibits running
581541Srgrimes *	newfs while the system is secured.
591541Srgrimes *
601541Srgrimes * In normal operation, the system runs in level 0 mode while single user
611541Srgrimes * and in level 1 mode while multiuser. If level 2 mode is desired while
621541Srgrimes * running multiuser, it can be set in the multiuser startup script
631541Srgrimes * (/etc/rc.local) using sysctl(1). If it is desired to run the system
641541Srgrimes * in level 0 mode while multiuser, initialize the variable securelevel
651541Srgrimes * in /sys/kern/kern_sysctl.c to -1. Note that it is NOT initialized to
661858Sdg * zero as that would allow the kernel binary to be patched to -1.
671541Srgrimes * Without initialization, securelevel loads in the BSS area which only
681541Srgrimes * comes into existence when the kernel is loaded and hence cannot be
691541Srgrimes * patched by a stalking hacker.
701541Srgrimes */
711541Srgrimesextern int securelevel;		/* system security level */
721541Srgrimesextern const char *panicstr;	/* panic message */
731541Srgrimesextern char version[];		/* system version */
741541Srgrimesextern char copyright[];	/* system copyright */
751541Srgrimes
761541Srgrimesextern int nblkdev;		/* number of entries in bdevsw */
771541Srgrimesextern int nchrdev;		/* number of entries in cdevsw */
781541Srgrimesextern int nswdev;		/* number of swap devices */
791541Srgrimesextern int nswap;		/* size of swap space */
801541Srgrimes
811541Srgrimesextern int selwait;		/* select timeout address */
821541Srgrimes
831541Srgrimesextern u_char curpriority;	/* priority of current process */
841541Srgrimes
851541Srgrimesextern int maxmem;		/* max memory per process */
861541Srgrimesextern int physmem;		/* physical memory */
871541Srgrimes
881541Srgrimesextern dev_t dumpdev;		/* dump device */
891541Srgrimesextern long dumplo;		/* offset into dumpdev */
901541Srgrimes
911541Srgrimesextern dev_t rootdev;		/* root device */
921541Srgrimesextern struct vnode *rootvp;	/* vnode equivalent to above */
931541Srgrimes
941541Srgrimesextern dev_t swapdev;		/* swapping device */
951541Srgrimesextern struct vnode *swapdev_vp;/* vnode equivalent to above */
961541Srgrimes
971541Srgrimesextern struct sysent {		/* system call table */
981541Srgrimes	int	sy_narg;	/* number of arguments */
991541Srgrimes	int	(*sy_call)();	/* implementing function */
1001541Srgrimes} sysent[];
1011541Srgrimes
1021541Srgrimesextern int boothowto;		/* reboot flags, from console subsystem */
1031541Srgrimes
1041541Srgrimes/*
1051541Srgrimes * General function declarations.
1061541Srgrimes */
1071541Srgrimesint	nullop __P((void));
1081541Srgrimesint	enodev __P((void));
1091541Srgrimesint	enoioctl __P((void));
1101541Srgrimesint	enxio __P((void));
1111541Srgrimesint	eopnotsupp __P((void));
1121541Srgrimesint	seltrue __P((dev_t dev, int which, struct proc *p));
1131541Srgrimesvoid	*hashinit __P((int count, int type, u_long *hashmask));
1141541Srgrimes
1151541Srgrimes#ifdef __GNUC__
1161541Srgrimesvolatile void	panic __P((const char *, ...));
1171541Srgrimes#else
1181541Srgrimesvoid	panic __P((const char *, ...));
1191541Srgrimes#endif
1201541Srgrimesvoid	tablefull __P((const char *));
1211541Srgrimesvoid	addlog __P((const char *, ...));
1221541Srgrimesvoid	log __P((int, const char *, ...));
1231541Srgrimesvoid	printf __P((const char *, ...));
1241541Srgrimesint	sprintf __P((char *buf, const char *, ...));
1251541Srgrimesvoid	ttyprintf __P((struct tty *, const char *, ...));
1261541Srgrimes
1271541Srgrimesvoid	bcopy __P((const void *from, void *to, u_int len));
1281541Srgrimesvoid	ovbcopy __P((const void *from, void *to, u_int len));
1291541Srgrimesvoid	bzero __P((void *buf, u_int len));
1301541Srgrimes
1311541Srgrimesint	copystr __P((void *kfaddr, void *kdaddr, u_int len, u_int *done));
1321541Srgrimesint	copyinstr __P((void *udaddr, void *kaddr, u_int len, u_int *done));
1331541Srgrimesint	copyoutstr __P((void *kaddr, void *udaddr, u_int len, u_int *done));
1341541Srgrimesint	copyin __P((void *udaddr, void *kaddr, u_int len));
1351541Srgrimesint	copyout __P((void *kaddr, void *udaddr, u_int len));
1361541Srgrimes
1371541Srgrimesint	fubyte __P((void *base));
1381541Srgrimes#ifdef notdef
1391541Srgrimesint	fuibyte __P((void *base));
1401541Srgrimes#endif
1411541Srgrimesint	subyte __P((void *base, int byte));
1421541Srgrimesint	suibyte __P((void *base, int byte));
1431541Srgrimesint	fuword __P((void *base));
1441541Srgrimesint	fuiword __P((void *base));
1451541Srgrimesint	suword __P((void *base, int word));
1461541Srgrimesint	suiword __P((void *base, int word));
1471541Srgrimes
1481541Srgrimesint	hzto __P((struct timeval *tv));
1491549Srgrimestypedef void (*timeout_func_t)(void *);
1501541Srgrimesvoid	timeout __P((void (*func)(void *), void *arg, int ticks));
1511541Srgrimesvoid	untimeout __P((void (*func)(void *), void *arg));
1521541Srgrimesvoid	realitexpire __P((void *));
1531541Srgrimes
1541541Srgrimesstruct clockframe;
1551541Srgrimesvoid	hardclock __P((struct clockframe *frame));
1561541Srgrimesvoid	softclock __P((void));
1571541Srgrimesvoid	statclock __P((struct clockframe *frame));
1581541Srgrimes
1591541Srgrimesvoid	initclocks __P((void));
1601541Srgrimes
1611541Srgrimesvoid	startprofclock __P((struct proc *));
1621541Srgrimesvoid	stopprofclock __P((struct proc *));
1631541Srgrimesvoid	setstatclockrate __P((int hzrate));
1641541Srgrimes
1651541Srgrimes#include <libkern/libkern.h>
166