UNIMPLEMENTED(2) Linux Programmer's Manual UNIMPLEMENTED(2)NAME
afs_syscall, break, fattach, fdetach, ftime, getmsg, getpmsg, gtty, isastream, lock, madvise1, mpx, prof, profil, putmsg, putpmsg, secu-
rity, stty, tuxcall, ulimit, vserver - unimplemented system calls
SYNOPSIS
Unimplemented system calls.
DESCRIPTION
These system calls are not implemented in the Linux kernel.
RETURN VALUE
These system calls always return -1 and set errno to ENOSYS.
NOTES
Note that ftime(3), profil(3), and ulimit(3) are implemented as library functions.
Some system calls, like alloc_hugepages(2), free_hugepages(2), ioperm(2), iopl(2), and vm86(2) exist only on certain architectures.
Some system calls, like ipc(2), create_module(2), init_module(2), and delete_module(2) exist only when the Linux kernel was built with sup-
port for them.
SEE ALSO syscalls(2)COLOPHON
This page is part of release 4.15 of the Linux man-pages project. A description of the project, information about reporting bugs, and the
latest version of this page, can be found at https://www.kernel.org/doc/man-pages/.
Linux 2017-09-15 UNIMPLEMENTED(2)
Check Out this Related Man Page
UNIMPLEMENTED(2) Linux Programmer's Manual UNIMPLEMENTED(2)NAME
afs_syscall, break, fattach, fdetach, ftime, getmsg, getpmsg, gtty, isastream, lock, madvise1, mpx, prof, profil, putmsg, putpmsg, secu-
rity, stty, tuxcall, ulimit, vserver - unimplemented system calls
SYNOPSIS
Unimplemented system calls.
DESCRIPTION
These system calls are not implemented in the Linux kernel.
RETURN VALUE
These system calls always return -1 and set errno to ENOSYS.
NOTES
Note that ftime(3), profil(3), and ulimit(3) are implemented as library functions.
Some system calls, like alloc_hugepages(2), free_hugepages(2), ioperm(2), iopl(2), and vm86(2) exist only on certain architectures.
Some system calls, like ipc(2), create_module(2), init_module(2), and delete_module(2) exist only when the Linux kernel was built with sup-
port for them.
SEE ALSO syscalls(2)COLOPHON
This page is part of release 4.15 of the Linux man-pages project. A description of the project, information about reporting bugs, and the
latest version of this page, can be found at https://www.kernel.org/doc/man-pages/.
Linux 2017-09-15 UNIMPLEMENTED(2)
Hi everyone,
I am a new comer in this forum.
When I try to send email in my Linux machine with command "mail" or "sendmail", I always find it include the IP address of my machine in the email header. Does anybody know how to eliminate this IP address or replace it with a fake one in the email... (20 Replies)
Hi All,
If I want to have two user accounts from the same grop in UNIX Solaries. However, I want one of them to be used only for FTP while the other for TELNET. Can anybody tell me how to do that?
Best Regards (13 Replies)
I need a great Password Generator program. I looked at a few of them, but none of them seemed to be what I wanted. So I have decided to write my own. (That's the cool thing about being a programmer....I always get what I want in software :) )
Do you have any password generators that you... (13 Replies)
Hi
I have a question with regards to AIX 5.3 & TCB. I have a client that is requesting TCB to be installed in AIX. However it seems that the perception of TCB is that it causes major headaches when it comes to configuring the system in real world environments, such as large scale Oracle... (15 Replies)
Can any one help me with a script, which runs in background and mails me all the commands entered by root on any terminal for every hour. We have multiple people having root access on the server and creating a mess,i just wanted to monitor all the activity of the root. (13 Replies)
Hey,
I actually do have a question which seems rather easy for those you know more about this topic, since I am pretty new to bashscripting and don't know where it's limits are I have to ask you guys :)
Imagine a system where all possible code execution methods (binary executables or... (15 Replies)
What i did:
- logged in with acc1 and created a new user acc2
commands used: useradd and passwd.
- Then i logged in acc2. but all the files are owned by acc1.
Issue: I try to change the owner of the files using chown command . But it gives me a error message.
All i want to do is... (13 Replies)
void main() {
long ((long)(&array));
int x;
for (;;)
{
(array) =+ 1023;
printf("%c", array);
}
}
What is wrong with this code to print Linux RAM? (13 Replies)
Why is there such an emphasis on strong passwords?
My understanding is that brute force or dictionary attacks are only possible when the attacker can test a large number of passwords in a reasonable amount of time. Modern Unix systems do not expose the encrypted passwords and have limits on how... (14 Replies)
Hi,
I want to ask something about server that has been compromised. Recently, one of my VPS server has been hacked and the attacker install somekind like "IRC" script.
Everytime I killed the process or close the port, it can open again .. and again ..I'm sure the attacker has installed... (14 Replies)
Hi!
I have a debian linux VPS and i am wondering how would someone be able to hack into it , in what ways ?
I've asked a more knowledgeable friend and he said the only way someone would be able to get into my VPS is via FTP or SSH, are there some other ways someone can enter my machine ?
I... (18 Replies)
hi to all, i have an AIX6.1 machine and i want to decrypt an ssha1 password written on /etc/security/passwd. the reason that i want to do that is because i have some complains about a few users that cannot login and receive the message for invalid login. i suspect that they are entering wrong... (15 Replies)
You are seeing this new video here first!
Top Five Cybersecurity Threats | Earth Year 2019 | You Have Been Warned!
https://youtu.be/dRE4u9QVsSg
PS: That video has two small typos, but nothing serious. Heck it took nearly 1.5 hours to render even on a 12-core Mac Pro with 64GB of... (20 Replies)