#
44ffb5f5 |
| 06-Jun-1996 |
Poul-Henning Kamp <phk@FreeBSD.org> |
Pass correct length OID to kernel for KERN_PROC_ALL.
|
#
2572133e |
| 02-May-1996 |
Poul-Henning Kamp <phk@FreeBSD.org> |
NBPG -> PAGE_SIZE
|
#
37e4fbc4 |
| 11-Mar-1996 |
Jeffrey Hsu <hsu@FreeBSD.org> |
From Lite2: proc and file LIST changes
|
#
7350dd84 |
| 24-Feb-1996 |
Peter Wemm <peter@FreeBSD.org> |
If the two recently added sysctl variables exist, use those rather than the statically compiled PS_STRINGS and USRSTACK variables. This prevents programs using setproctitle from coredumping if the k
If the two recently added sysctl variables exist, use those rather than the statically compiled PS_STRINGS and USRSTACK variables. This prevents programs using setproctitle from coredumping if the kernel VM is increased, and stops libkvm users (w, ps, etc) from needing to be recompiled if only the VM layout changes.
show more ...
|
#
b8321444 |
| 01-Jan-1996 |
Peter Wemm <peter@FreeBSD.org> |
Extract the login name when doing a ps on a dead kernel.
|
Revision tags: release/2.1.0_cvs |
|
#
6b492ae4 |
| 16-Dec-1995 |
Peter Wemm <peter@FreeBSD.org> |
Cosmetic cleanup and documentation of kvm_argv.. Hopefully the flow of the routine can be much more easily understood now... :-)
|
#
77721f53 |
| 09-Dec-1995 |
Peter Wemm <peter@FreeBSD.org> |
Updates to read the extra indirection in ps_strings. Note that any static executables that depend on this will need to be relinked (ie: do this before 'ps'), but the dynamic linked stuff should be O
Updates to read the extra indirection in ps_strings. Note that any static executables that depend on this will need to be relinked (ie: do this before 'ps'), but the dynamic linked stuff should be OK (ie: 'w')
Obtained from: NetBSD (not much point reinventing the wheel.. :-)
show more ...
|
Revision tags: release/2.0.5_cvs |
|
#
6c06b4e2 |
| 30-May-1995 |
Rodney W. Grimes <rgrimes@FreeBSD.org> |
Remove trailing whitespace.
|
#
ec4f2251 |
| 19-Mar-1995 |
Joerg Wunsch <joerg@FreeBSD.org> |
Cast the offset of one call to lseek() to off_t, as it's already done in all other places here.
This is a hack, the interface should be changed to use off_t's everywhere around, but this will requir
Cast the offset of one call to lseek() to off_t, as it's already done in all other places here.
This is a hack, the interface should be changed to use off_t's everywhere around, but this will require to update all the programs that happen to use libkvm.
show more ...
|
#
12eaa3d5 |
| 24-Feb-1995 |
Poul-Henning Kamp <phk@FreeBSD.org> |
Remove some unused variables and fix two blatant core dump triggers.
|
Revision tags: release/2.0 |
|
#
567127fa |
| 02-Nov-1994 |
David Greenman <dg@FreeBSD.org> |
Fix from Gary Jennejohn - use 'cp' not 'buf' in read call. Oops.
|
#
5dfe9012 |
| 09-Oct-1994 |
Søren Schmidt <sos@FreeBSD.org> |
Added spare space on the usr stack. Used in ibcs2 emulation.
|
#
338c7541 |
| 11-Aug-1994 |
David Greenman <dg@FreeBSD.org> |
Made kvm routines use procfs to get out process data such as argument strings.
|
Revision tags: release/1.1.5.1_cvs |
|
#
21d54b07 |
| 28-May-1994 |
Rodney W. Grimes <rgrimes@FreeBSD.org> |
Fix kvm_i386.c just enough to make it compile and return lots of errors when called. Noop out swapread in kvm_proc.c as our vm system is different.
|
#
58f0484f |
| 27-May-1994 |
Rodney W. Grimes <rgrimes@FreeBSD.org> |
BSD 4.4 Lite Lib Sources
|
#
9199c09a |
| 06-Jan-2010 |
Warner Losh <imp@FreeBSD.org> |
Merge from head at r201628.
# This hasn't been tested, and there are at least three bad commits # that need to be backed out before the branch will be stable again.
|
#
68a5cc39 |
| 10-Dec-2009 |
Brooks Davis <brooks@FreeBSD.org> |
Add a missing else that negated the truncation of ki_ngroups to NGROUPS.
Submitted by: Dmitry Pryanishnikov <lynx dot ripe at gmail dot com>
|
Revision tags: release/8.0.0_cvs, release/8.0.0 |
|
#
1ee774f6 |
| 02-Oct-2009 |
Oleksandr Tymoshenko <gonzo@FreeBSD.org> |
- MFC
|
#
d534b0c2 |
| 08-Sep-2009 |
Brooks Davis <brooks@FreeBSD.org> |
cr_groups is no longer embedded in struct ucred and is instead stored in a seperate array. As such we need to use kvm_read rather than bcopy to populate the ki_groups field.
This fixes a crash when
cr_groups is no longer embedded in struct ucred and is instead stored in a seperate array. As such we need to use kvm_read rather than bcopy to populate the ki_groups field.
This fixes a crash when running ps -ax on a coredump.
Reported by: brucec Tested by: brucec MFC after: 3 days
show more ...
|
#
11e9b8ba |
| 04-Aug-2009 |
Oleksandr Tymoshenko <gonzo@FreeBSD.org> |
- MFC @196061
|
#
1b5768be |
| 24-Jul-2009 |
Brooks Davis <brooks@FreeBSD.org> |
Revert the changes to struct kinfo_proc in r194498. Instead, fill in up to 16 (KI_NGROUPS) values and steal a bit from ki_cr_flags (all bits currently unused) to indicate overflow with the new flag
Revert the changes to struct kinfo_proc in r194498. Instead, fill in up to 16 (KI_NGROUPS) values and steal a bit from ki_cr_flags (all bits currently unused) to indicate overflow with the new flag KI_CRF_GRP_OVERFLOW.
This fixes procstat -s.
Approved by: re (kib)
show more ...
|
#
09c817ba |
| 03-Jul-2009 |
Oleksandr Tymoshenko <gonzo@FreeBSD.org> |
- MFC
|
#
838d9858 |
| 19-Jun-2009 |
Brooks Davis <brooks@FreeBSD.org> |
Rework the credential code to support larger values of NGROUPS and NGROUPS_MAX, eliminate ABI dependencies on them, and raise the to 1024 and 1023 respectively. (Previously they were equal, but unde
Rework the credential code to support larger values of NGROUPS and NGROUPS_MAX, eliminate ABI dependencies on them, and raise the to 1024 and 1023 respectively. (Previously they were equal, but under a close reading of POSIX, NGROUPS_MAX was defined to be too large by 1 since it is the number of supplemental groups, not total number of groups.)
The bulk of the change consists of converting the struct ucred member cr_groups from a static array to a pointer. Do the equivalent in kinfo_proc.
Introduce new interfaces crcopysafe() and crsetgroups() for duplicating a process credential before modifying it and for setting group lists respectively. Both interfaces take care for the details of allocating groups array. crsetgroups() takes care of truncating the group list to the current maximum (NGROUPS) if necessary. In the future, crsetgroups() may be responsible for insuring invariants such as sorting the supplemental groups to allow groupmember() to be implemented as a binary search.
Because we can not change struct xucred without breaking application ABIs, we leave it alone and introduce a new XU_NGROUPS value which is always 16 and is to be used or NGRPS as appropriate for things such as NFS which need to use no more than 16 groups. When feasible, truncate the group list rather than generating an error.
Minor changes: - Reduce the number of hand rolled versions of groupmember(). - Do not assign to both cr_gid and cr_groups[0]. - Modify ipfw to cache ucreds instead of part of their contents since they are immutable once referenced by more than one entity.
Submitted by: Isilon Systems (initial implementation) X-MFC after: never PR: bin/113398 kern/133867
show more ...
|
#
413628a7 |
| 29-Nov-2008 |
Bjoern A. Zeeb <bz@FreeBSD.org> |
MFp4: Bring in updated jail support from bz_jail branch.
This enhances the current jail implementation to permit multiple addresses per jail. In addtion to IPv4, IPv6 is supported as well. Due to
MFp4: Bring in updated jail support from bz_jail branch.
This enhances the current jail implementation to permit multiple addresses per jail. In addtion to IPv4, IPv6 is supported as well. Due to updated checks it is even possible to have jails without an IP address at all, which basically gives one a chroot with restricted process view, no networking,..
SCTP support was updated and supports IPv6 in jails as well.
Cpuset support permits jails to be bound to specific processor sets after creation.
Jails can have an unrestricted (no duplicate protection, etc.) name in addition to the hostname. The jail name cannot be changed from within a jail and is considered to be used for management purposes or as audit-token in the future.
DDB 'show jails' command was added to aid debugging.
Proper compat support permits 32bit jail binaries to be used on 64bit systems to manage jails. Also backward compatibility was preserved where possible: for jail v1 syscalls, as well as with user space management utilities.
Both jail as well as prison version were updated for the new features. A gap was intentionally left as the intermediate versions had been used by various patches floating around the last years.
Bump __FreeBSD_version for the afore mentioned and in kernel changes.
Special thanks to: - Pawel Jakub Dawidek (pjd) for his multi-IPv4 patches and Olivier Houchard (cognet) for initial single-IPv6 patches. - Jeff Roberson (jeff) and Randall Stewart (rrs) for their help, ideas and review on cpuset and SCTP support. - Robert Watson (rwatson) for lots and lots of help, discussions, suggestions and review of most of the patch at various stages. - John Baldwin (jhb) for his help. - Simon L. Nielsen (simon) as early adopter testing changes on cluster machines as well as all the testers and people who provided feedback the last months on freebsd-jail and other channels. - My employer, CK Software GmbH, for the support so I could work on this.
Reviewed by: (see above) MFC after: 3 months (this is just so that I get the mail) X-MFC Before: 7.2-RELEASE if possible
show more ...
|
Revision tags: release/6.4.0_cvs, release/6.4.0 |
|
#
1e71e49d |
| 12-Mar-2008 |
Jeff Roberson <jeff@FreeBSD.org> |
- Don't inspect the P_SA flag. It's being removed.
|