systm.h revision 2865
11541Srgrimes/*-
21541Srgrimes * Copyright (c) 1982, 1988, 1991, 1993
31541Srgrimes *	The Regents of the University of California.  All rights reserved.
41541Srgrimes * (c) UNIX System Laboratories, Inc.
51541Srgrimes * All or some portions of this file are derived from material licensed
61541Srgrimes * to the University of California by American Telephone and Telegraph
71541Srgrimes * Co. or Unix System Laboratories, Inc. and are reproduced herein with
81541Srgrimes * the permission of UNIX System Laboratories, Inc.
91541Srgrimes *
101541Srgrimes * Redistribution and use in source and binary forms, with or without
111541Srgrimes * modification, are permitted provided that the following conditions
121541Srgrimes * are met:
131541Srgrimes * 1. Redistributions of source code must retain the above copyright
141541Srgrimes *    notice, this list of conditions and the following disclaimer.
151541Srgrimes * 2. Redistributions in binary form must reproduce the above copyright
161541Srgrimes *    notice, this list of conditions and the following disclaimer in the
171541Srgrimes *    documentation and/or other materials provided with the distribution.
181541Srgrimes * 3. All advertising materials mentioning features or use of this software
191541Srgrimes *    must display the following acknowledgement:
201541Srgrimes *	This product includes software developed by the University of
211541Srgrimes *	California, Berkeley and its contributors.
221541Srgrimes * 4. Neither the name of the University nor the names of its contributors
231541Srgrimes *    may be used to endorse or promote products derived from this software
241541Srgrimes *    without specific prior written permission.
251541Srgrimes *
261541Srgrimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
271541Srgrimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
281541Srgrimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
291541Srgrimes * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
301541Srgrimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
311541Srgrimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
321541Srgrimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
331541Srgrimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
341541Srgrimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
351541Srgrimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
361541Srgrimes * SUCH DAMAGE.
371541Srgrimes *
381541Srgrimes *	@(#)systm.h	8.4 (Berkeley) 2/23/94
392865Sbde * $Id: systm.h,v 1.10 1994/09/15 20:24:27 bde Exp $
401541Srgrimes */
411541Srgrimes
422165Spaul#ifndef _SYS_SYSTM_H_
432865Sbde#define	_SYS_SYSTM_H_
442165Spaul
451549Srgrimes#include <machine/cpufunc.h>
461549Srgrimes
471541Srgrimes/*
481541Srgrimes * The `securelevel' variable controls the security level of the system.
491541Srgrimes * It can only be decreased by process 1 (/sbin/init).
501541Srgrimes *
511541Srgrimes * Security levels are as follows:
521541Srgrimes *   -1	permannently insecure mode - always run system in level 0 mode.
531541Srgrimes *    0	insecure mode - immutable and append-only flags make be turned off.
541541Srgrimes *	All devices may be read or written subject to permission modes.
551541Srgrimes *    1	secure mode - immutable and append-only flags may not be changed;
561541Srgrimes *	raw disks of mounted filesystems, /dev/mem, and /dev/kmem are
571541Srgrimes *	read-only.
581541Srgrimes *    2	highly secure mode - same as (1) plus raw disks are always
591541Srgrimes *	read-only whether mounted or not. This level precludes tampering
601541Srgrimes *	with filesystems by unmounting them, but also inhibits running
611541Srgrimes *	newfs while the system is secured.
621541Srgrimes *
631541Srgrimes * In normal operation, the system runs in level 0 mode while single user
641541Srgrimes * and in level 1 mode while multiuser. If level 2 mode is desired while
651541Srgrimes * running multiuser, it can be set in the multiuser startup script
661541Srgrimes * (/etc/rc.local) using sysctl(1). If it is desired to run the system
671541Srgrimes * in level 0 mode while multiuser, initialize the variable securelevel
681541Srgrimes * in /sys/kern/kern_sysctl.c to -1. Note that it is NOT initialized to
691858Sdg * zero as that would allow the kernel binary to be patched to -1.
701541Srgrimes * Without initialization, securelevel loads in the BSS area which only
711541Srgrimes * comes into existence when the kernel is loaded and hence cannot be
721541Srgrimes * patched by a stalking hacker.
731541Srgrimes */
741541Srgrimesextern int securelevel;		/* system security level */
751541Srgrimesextern const char *panicstr;	/* panic message */
761541Srgrimesextern char version[];		/* system version */
771541Srgrimesextern char copyright[];	/* system copyright */
781541Srgrimes
791541Srgrimesextern int nblkdev;		/* number of entries in bdevsw */
801541Srgrimesextern int nchrdev;		/* number of entries in cdevsw */
811541Srgrimesextern int nswdev;		/* number of swap devices */
821541Srgrimesextern int nswap;		/* size of swap space */
831541Srgrimes
841541Srgrimesextern int selwait;		/* select timeout address */
851541Srgrimes
861541Srgrimesextern u_char curpriority;	/* priority of current process */
871541Srgrimes
881541Srgrimesextern int maxmem;		/* max memory per process */
891541Srgrimesextern int physmem;		/* physical memory */
901541Srgrimes
911541Srgrimesextern dev_t dumpdev;		/* dump device */
921541Srgrimesextern long dumplo;		/* offset into dumpdev */
931541Srgrimes
941541Srgrimesextern dev_t rootdev;		/* root device */
951541Srgrimesextern struct vnode *rootvp;	/* vnode equivalent to above */
961541Srgrimes
971541Srgrimesextern dev_t swapdev;		/* swapping device */
981541Srgrimesextern struct vnode *swapdev_vp;/* vnode equivalent to above */
991541Srgrimes
1001541Srgrimesextern int boothowto;		/* reboot flags, from console subsystem */
1011541Srgrimes
1021541Srgrimes/*
1031541Srgrimes * General function declarations.
1041541Srgrimes */
1051541Srgrimesint	nullop __P((void));
1061541Srgrimesint	enodev __P((void));
1071541Srgrimesint	enoioctl __P((void));
1081541Srgrimesint	enxio __P((void));
1091541Srgrimesint	eopnotsupp __P((void));
1101541Srgrimesint	seltrue __P((dev_t dev, int which, struct proc *p));
1111541Srgrimesvoid	*hashinit __P((int count, int type, u_long *hashmask));
1121541Srgrimes
1132059Sdg__dead void	panic __P((const char *, ...)) __dead2;
1142059Sdg__dead void	boot __P((int)) __dead2;
1151541Srgrimesvoid	tablefull __P((const char *));
1161541Srgrimesvoid	addlog __P((const char *, ...));
1171541Srgrimesvoid	log __P((int, const char *, ...));
1181541Srgrimesvoid	printf __P((const char *, ...));
1192112Swollmanvoid	uprintf __P((const char *, ...));
1201541Srgrimesint	sprintf __P((char *buf, const char *, ...));
1211541Srgrimesvoid	ttyprintf __P((struct tty *, const char *, ...));
1221541Srgrimes
1231541Srgrimesvoid	bcopy __P((const void *from, void *to, u_int len));
1241541Srgrimesvoid	ovbcopy __P((const void *from, void *to, u_int len));
1252811Sbdevoid	blkclr __P((void *buf, u_int len));
1261541Srgrimesvoid	bzero __P((void *buf, u_int len));
1271541Srgrimes
1281541Srgrimesint	copystr __P((void *kfaddr, void *kdaddr, u_int len, u_int *done));
1291541Srgrimesint	copyinstr __P((void *udaddr, void *kaddr, u_int len, u_int *done));
1301541Srgrimesint	copyoutstr __P((void *kaddr, void *udaddr, u_int len, u_int *done));
1311541Srgrimesint	copyin __P((void *udaddr, void *kaddr, u_int len));
1321541Srgrimesint	copyout __P((void *kaddr, void *udaddr, u_int len));
1331541Srgrimes
1341541Srgrimesint	fubyte __P((void *base));
1351541Srgrimesint	fuibyte __P((void *base));
1361541Srgrimesint	subyte __P((void *base, int byte));
1371541Srgrimesint	suibyte __P((void *base, int byte));
1381541Srgrimesint	fuword __P((void *base));
1391541Srgrimesint	fuiword __P((void *base));
1401541Srgrimesint	suword __P((void *base, int word));
1411541Srgrimesint	suiword __P((void *base, int word));
1421541Srgrimes
1431541Srgrimesint	hzto __P((struct timeval *tv));
1441541Srgrimesvoid	realitexpire __P((void *));
1451541Srgrimes
1461541Srgrimesstruct clockframe;
1471541Srgrimesvoid	hardclock __P((struct clockframe *frame));
1481541Srgrimesvoid	softclock __P((void));
1491541Srgrimesvoid	statclock __P((struct clockframe *frame));
1501541Srgrimes
1511541Srgrimesvoid	initclocks __P((void));
1521541Srgrimes
1531541Srgrimesvoid	startprofclock __P((struct proc *));
1541541Srgrimesvoid	stopprofclock __P((struct proc *));
1551541Srgrimesvoid	setstatclockrate __P((int hzrate));
1561541Srgrimes
1571541Srgrimes#include <libkern/libkern.h>
1582112Swollman
1592112Swollman/* Initialize the world */
1602112Swollmanextern void consinit(void);
1612112Swollmanextern void kmeminit(void);
1622112Swollmanextern void cpu_startup(void);
1632112Swollmanextern void usrinfoinit(void);
1642112Swollmanextern void rqinit(void);
1652112Swollmanextern void vfsinit(void);
1662112Swollmanextern void mbinit(void);
1672112Swollmanextern void clist_init(void);
1682112Swollmanextern void ifinit(void);
1692112Swollmanextern void domaininit(void);
1702112Swollmanextern void cpu_initclocks(void);
1712112Swollmanextern void vntblinit(void);
1722112Swollmanextern void nchinit(void);
1732112Swollman
1742112Swollmanextern __dead void vm_pageout(void) __dead2; /* pagedaemon, called in proc 2 */
1752112Swollmanextern __dead void vfs_update(void) __dead2; /* update, called in proc 3 */
1762112Swollmanextern __dead void scheduler(void) __dead2; /* sched, called in process 0 */
1772112Swollman
1782112Swollman/* Timeouts */
1792112Swollmantypedef void (timeout_t)(void *); /* actual timeout function type */
1802112Swollmantypedef timeout_t *timeout_func_t; /* a pointer to this type */
1812112Swollman
1822112Swollmanvoid timeout(timeout_func_t, void *, int);
1832112Swollmanvoid untimeout(timeout_func_t, void *);
1842165Spaul
1852865Sbde#endif /* !_SYS_SYSTM_H_ */
186