|
madvise(2) -- advise the system of a process's expected paging behavior
|
The madvise system call permits a process to advise the system about its expected future behavior in referencing a mapped file, an anonymous memory region, or a shared memory region. Certain implementations can use this information to optimize the use of resources. addr and len specify the address and length in bytes of the region to which the advice refers. For MADV_DONTNEED, the address and leng... |
makecontext(2) -- manipulate user contexts
|
The makecontext() function modifies the context specified by ucp, which has been initialized using getcontext(). When this context is resumed using swapcontext() or setcontext(), program execution continues by calling func(), passing it the arguments that follow argc in the makecontext() call. Before a call is made to makecontext(), the context being modified should have a stack allocated for it. ... |
|
mkdir(2) -- make a directory file
|
The mkdir() system call creates a new directory file named by path. The file permission bits of the new directory are initialized from mode, and are modified by the process's file mode creation mask. For each bit set in the process's file mode creation mask, the corresponding bit in the new directory's mode is cleared (see umask(2)). The directory's owner ID is set to the process's effective-... |
mknod(2) -- make directory, special, or ordinary file
|
The mknod() system call creates a new file named by the path name pointed to by path. The mode of the new file is specified by the mode argument. Symbolic constants that define the file type and file access permission bits are found in the header file and are used to construct the mode argument. The value of the mode argument should be the bit-wise inclusive OR of the values of the de... |
mlock(2) -- lock a segment of the process virtual address space in memory
|
The mlock() system call allows the calling process to lock a segment of the process virtual address space into memory. Any addressable segment of the process' address space may be locked. Locked segments are immune to all routine swapping. addr must be a valid address in the process virtual address space. addr + len must also be a valid address in the process virtual address space. Locks are appl... |
mlockall(2) -- lock a process virtual address space in memory
|
The mlockall() system call allows the calling process to lock its entire virtual address space into memory, making it immune to all routine swapping. flags may be one or both of the following: MCL_CURRENT Lock the current process virtual address space. All addressable pages of the address space are locked. MCL_FUTURE Lock any future additions to the process virtual address space. Note that MCL_FUT... |
mmap(2) -- map pages of memory
|
The mmap() function establishes a mapping between a process' address space and a file. The format of the call is as follows: pa = mmap(addr, len, prot, flags, fildes, off); The mmap() function establishes a mapping between the process' address space at an address pa for len bytes and the file associated with the file descriptor fildes at offset off for len bytes. The value of pa is an unspecifie... |
mmap64(2) -- non-POSIX standard API interfaces to support large files
|
New API's to support large files in 32-bit applications. These API interfaces are not a part of the POSIX standard and may be removed in the future. creat64() The creat64() function returns a file descriptor which can be used to grow the file past 2 GB if desired. All other functional behaviors, returns, and errors are identical to creat(). fstat64() The fstat64() function is identical to fstat()... |
modload(2) -- load kernel modules on demand
|
modload allows processes with appropriate privilege to demand-load a kernel module into the running kernel. The module must be of a supported type and must have been registered via kcmodule(1M) before it can be loaded. The module to be loaded is specified by pathname. pathname may be either a module name or an absolute pathname. If pathname is a module name, a list of directories specified by modp... |
modpath(2) -- change global search path for dynamically loadable kernel modules
|
modpath allows users with appropriate privilege to modify the global search path used to locate object files for dynamically loadable kernel modules. The search path modifications take effect immediately and affect all subsequent loads for all users on the system. pathname may be either a colon-separated list of absolute pathnames or NULL. If the former, these path names represent directories whic... |
modstat(2) -- get information for a dynamically loaded kernel module
|
The modstat function allows processes to get information for dynamically loaded kernel modules. For modules with appropriate privilege, it fills in all the elements of the modstatus structure, specified by stbuf, with the information available for the given module identifier module_id. For non-privileged processes, modstat fills in all information except the address and size of the module object f... |
moduload(2) -- unload a kernel module on demand
|
moduload allows users with appropriate privilege to demand unload one or all unloadable modules from the running kernel. A module is considered unloadable if it is not currently in use, if no module depending on it is currently loaded, and if the module is not being loaded or unloaded from the kernel. If module_id is set to 0 (zero), moduload attempts to unload all unloadable modules, otherwise mo... |
mount(2) -- mount a file system
|
The mount() system call requests that a file system identified by fs be mounted on the file identified by path. mflag contains a bit-mask of flags (described below). Note that the MS_DATA flag must be set for the six-argument version of the call. fstype is the file system type name. It is the same name that sysfs(2) uses. The last two arguments together describe a block of file-systemspecific data... |
mpctl(2) -- multiprocessor control
|
mpctl provides a means of determining how many processors and locality domains are available in the system, and assigning processes or lightweight processes to execute on specific processors or within a specific locality domain. A locality domain consists of a related collection of processors, memory, and peripheral resources that comprise a fundamental building block of the system. All processors... |
mprotect(2) -- set or check protection of memory mapping
|
The mprotect() function changes the access protections on the mappings specified by the range [addr, addr+len], rounding len up to the next multiple of the page size as returned by sysconf(), to be that specified by prot. Legitimate values for prot are the same as those permitted for mmap() and are defined in : PROT_READ Page can be read. PROT_WRITE Page can be written. PROT_EXEC Page ... |