PERFORCE change 91441 for review
Rob Deker
deker at FreeBSD.org
Thu Feb 9 18:46:50 GMT 2006
http://perforce.freebsd.org/chv.cgi?CH=91441
Change 91441 by deker at deker_build1.columbia.sparta.com on 2006/02/09 18:46:02
Turn off checkaccess flag in MiG definition since extended
trailers cause the Darwin 7.8 kernel to hang.
Affected files ...
.. //depot/projects/trustedbsd/sedarwin7/src/darwin/system_cmds/mach_init.tproj/bootstrap.defs#4 edit
Differences ...
==== //depot/projects/trustedbsd/sedarwin7/src/darwin/system_cmds/mach_init.tproj/bootstrap.defs#4 (text+ko) ====
@@ -135,7 +135,8 @@
* Errors: Returns appropriate kernel errors on rpc failure.
* Returns BOOTSTRAP_NOT_PRIVILEGED, bootstrap or uid invalid.
*/
-routine bootstrap_create_server checkaccess(
+/*routine bootstrap_create_server checkaccess (*/
+routine bootstrap_create_server (
bootstrap_port : mach_port_t;
server_cmd : cmd_t;
server_uid : integer_t;
@@ -158,7 +159,8 @@
* children (or any offspring that it does not want to count as part
* of the "server" for mach_init registration and re-launch purposes).
*/
-routine bootstrap_unprivileged checkaccess (
+/*routine bootstrap_unprivileged checkaccess (*/
+routine bootstrap_unprivileged (
bootstrap_port : mach_port_t;
out unpriv_port : mach_port_t);
@@ -183,7 +185,8 @@
* Returns BOOTSTRAP_SERVICE_ACTIVE, if service has already been
* registered or checked-in.
*/
-routine bootstrap_check_in checkaccess(
+/*routine bootstrap_check_in checkaccess (*/
+routine bootstrap_check_in (
bootstrap_port : mach_port_t;
service_name : name_t;
out service_port : mach_port_move_receive_t);
@@ -210,7 +213,8 @@
* Returns BOOTSTRAP_NAME_IN_USE, if service has already been
* register or checked-in.
*/
-routine bootstrap_register checkaccess(
+/*routine bootstrap_register checkaccess (*/
+routine bootstrap_register (
bootstrap_port : mach_port_t;
service_name : name_t;
service_port : mach_port_t);
@@ -228,7 +232,8 @@
* Errors: Returns appropriate kernel errors on rpc failure.
* Returns BOOTSTRAP_UNKNOWN_SERVICE, if service does not exist.
*/
-routine bootstrap_look_up checkaccess(
+/*routine bootstrap_look_up checkaccess (*/
+routine bootstrap_look_up (
bootstrap_port : mach_port_t;
service_name : name_t;
out service_port : mach_port_t);
@@ -255,7 +260,8 @@
* If all services are known, all_services_known is true on
* return, if any service is unknown, it's false.
*/
-routine bootstrap_look_up_array checkaccess(
+/*routine bootstrap_look_up_array checkaccess (*/
+routine bootstrap_look_up_array (
bootstrap_port : mach_port_t;
service_names : name_array_t;
out service_ports : mach_port_array_t;
@@ -275,7 +281,8 @@
* with an effective user id of root (as determined by the security
* token in the message trailer).
*/
-routine bootstrap_parent checkaccess(
+/*routine bootstrap_parent checkaccess (*/
+routine bootstrap_parent (
bootstrap_port : mach_port_t;
ServerSecToken token : security_token_t;
out parent_port : mach_port_make_send_t);
@@ -292,7 +299,8 @@
* Errors: Returns appropriate kernel errors on rpc failure.
* Returns BOOTSTRAP_UNKNOWN_SERVICE, if service does not exist.
*/
-routine bootstrap_status checkaccess(
+/*routine bootstrap_status checkaccess (*/
+routine bootstrap_status (
bootstrap_port : mach_port_t;
service_name : name_t;
out service_active : bootstrap_status_t);
@@ -309,7 +317,8 @@
*
* Errors: Returns appropriate kernel errors on rpc failure.
*/
-routine bootstrap_info checkaccess(
+/* routine bootstrap_info checkaccess (*/
+routine bootstrap_info (
bootstrap_port : mach_port_t;
out service_names : name_array_t, dealloc;
out server_names : name_array_t, dealloc;
@@ -335,7 +344,8 @@
*
* Errors: Returns appropriate kernel errors on rpc failure.
*/
-routine bootstrap_subset checkaccess(
+/*routine bootstrap_subset checkaccess (*/
+routine bootstrap_subset (
bootstrap_port : mach_port_t;
requestor_port : mach_port_t;
out subset_port : mach_port_t);
@@ -353,7 +363,8 @@
* Errors: Returns appropriate kernel errors on rpc failure.
* Returns BOOTSTRAP_SERVICE_ACTIVE, if service already exists.
*/
-routine bootstrap_create_service checkaccess(
+/*routine bootstrap_create_service checkaccess (*/
+routine bootstrap_create_service (
bootstrap_port : mach_port_t;
service_name : name_t;
out service_port : mach_port_t);
To Unsubscribe: send mail to majordomo at trustedbsd.org
with "unsubscribe trustedbsd-cvs" in the body of the message
More information about the trustedbsd-cvs
mailing list