#
f78fe260 |
| 06-Jan-2012 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
Constify argument.
MFC after: 3 days
|
Revision tags: release/9.0.0 |
|
#
70d8f36a |
| 27-Oct-2011 |
Peter Grehan <grehan@FreeBSD.org> |
IFC @ r226824
|
#
27449604 |
| 01-Oct-2011 |
Alexander Motin <mav@FreeBSD.org> |
MFC
|
#
1ebc0407 |
| 27-Sep-2011 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
No need to use KEEP_ERRNO() macro around pjdlog functions, as they don't modify errno.
MFC after: 3 days
|
#
935205e2 |
| 17-Jul-2011 |
Justin T. Gibbs <gibbs@FreeBSD.org> |
Integrate from Head into ZFSD feature branch as of revision r224141.
|
#
23300944 |
| 30-Jun-2011 |
Peter Grehan <grehan@FreeBSD.org> |
IFC @ r223696 to pick up dfr's userboot
|
#
40a03457 |
| 28-Jun-2011 |
Attilio Rao <attilio@FreeBSD.org> |
MFC
|
#
699b26bd |
| 27-Jun-2011 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
Compile capsicum support only if HAVE_CAPSICUM is defined.
MFC after: 3 days
|
#
133d75ed |
| 27-Jun-2011 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
Log a warning if we cannot sandbox using capsicum, but only under debug level 1. It would be too noisy to log it as a proper warning as CAPABILITIES are not compiled into GENERIC by default.
MFC aft
Log a warning if we cannot sandbox using capsicum, but only under debug level 1. It would be too noisy to log it as a proper warning as CAPABILITIES are not compiled into GENERIC by default.
MFC after: 3 days
show more ...
|
#
87c3644c |
| 24-May-2011 |
Peter Grehan <grehan@FreeBSD.org> |
IFC @ r222256
|
#
3ac3f600 |
| 24-May-2011 |
Attilio Rao <attilio@FreeBSD.org> |
MFC
|
#
1c6689d5 |
| 23-May-2011 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
To handle BIO_FLUSH and BIO_DELETE requests in secondary worker we need to use ioctl(2). This is why we can't use capsicum for now to sandbox secondary. Capsicum is still used to sandbox hastctl.
MF
To handle BIO_FLUSH and BIO_DELETE requests in secondary worker we need to use ioctl(2). This is why we can't use capsicum for now to sandbox secondary. Capsicum is still used to sandbox hastctl.
MFC after: 1 week
show more ...
|
#
c02f1527 |
| 14-May-2011 |
Attilio Rao <attilio@FreeBSD.org> |
MFC
|
#
0cddb12f |
| 14-May-2011 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
Currently we are unable to use capsicum for the primary worker process, because we need to do ioctl(2)s, which are not permitted in the capability mode. What we do now is to chroot(2) to /var/empty,
Currently we are unable to use capsicum for the primary worker process, because we need to do ioctl(2)s, which are not permitted in the capability mode. What we do now is to chroot(2) to /var/empty, which restricts access to file system name space and we drop privileges to hast user and hast group.
This still allows to access to other name spaces, like list of processes, network and sysvipc.
To address that, use jail(2) instead of chroot(2). Using jail(2) will restrict access to process table, network (we use ip-less jails) and sysvipc (if security.jail.sysvipc_allowed is turned off). This provides much better separation.
MFC after: 1 week
show more ...
|
#
bcc9f321 |
| 14-May-2011 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
When using capsicum to sanbox, still use other methods first, just in case one of them have some problems.
|
#
6d51b7d5 |
| 22-Mar-2011 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
Add my copyright.
MFC after: 1 week
|
#
cd72d521 |
| 22-Mar-2011 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
White space cleanups.
MFC after: 1 week
|
#
4d8dc3b8 |
| 21-Mar-2011 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
When dropping privileges prefer capsicum over chroot+setgid+setuid. We can use capsicum for secondary worker processes and hastctl. When working as primary we drop privileges using chroot+setgid+setu
When dropping privileges prefer capsicum over chroot+setgid+setuid. We can use capsicum for secondary worker processes and hastctl. When working as primary we drop privileges using chroot+setgid+setuid still as we need to send ioctl(2)s to ggate device, for which capsicum doesn't allow (yet).
X-MFC after: capsicum is merged to stable/8
show more ...
|
#
9925a680 |
| 21-Mar-2011 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
Add snprlcat() and vsnprlcat() - the functions I'm always missing. They work as a combination of snprintf(3) and strlcat(3) - the caller can append a string build based on the given format.
MFC afte
Add snprlcat() and vsnprlcat() - the functions I'm always missing. They work as a combination of snprintf(3) and strlcat(3) - the caller can append a string build based on the given format.
MFC after: 1 week
show more ...
|
Revision tags: release/7.4.0_cvs, release/8.2.0_cvs, release/7.4.0, release/8.2.0 |
|
#
f4c96f94 |
| 03-Feb-2011 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
Let the caller log info about successful privilege drop. We don't want to log this in hastctl.
MFC after: 1 week
|
#
2ec483c5 |
| 31-Jan-2011 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
- Use pjdlog for assertions and aborts as this will log assert/abort message to syslog if we run in background. - Asserts in proto.c that method we want to call is implemented and remove dummy me
- Use pjdlog for assertions and aborts as this will log assert/abort message to syslog if we run in background. - Asserts in proto.c that method we want to call is implemented and remove dummy methods from protocols implementation that are only there to abort the program with nice message.
MFC after: 1 week
show more ...
|
#
49499e98 |
| 28-Jan-2011 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
Implement function that drops privileges by: - chrooting to /var/empty (user hast home directory), - setting groups to 'hast' (user hast primary group), - setting real group id, effective group id an
Implement function that drops privileges by: - chrooting to /var/empty (user hast home directory), - setting groups to 'hast' (user hast primary group), - setting real group id, effective group id and saved group id to 'hast', - setting real user id, effective user id and saved user id to 'hast'. At the end verify that those operations where successfull.
MFC after: 1 week
show more ...
|
Revision tags: release/8.1.0_cvs, release/8.1.0 |
|
#
2b98f840 |
| 18-Apr-2010 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
MFC r204076,r204077,r204083,r205279:
r204076:
Please welcome HAST - Highly Avalable Storage.
HAST allows to transparently store data on two physically separated machines connected over the TCP/IP
MFC r204076,r204077,r204083,r205279:
r204076:
Please welcome HAST - Highly Avalable Storage.
HAST allows to transparently store data on two physically separated machines connected over the TCP/IP network. HAST works in Primary-Secondary (Master-Backup, Master-Slave) configuration, which means that only one of the cluster nodes can be active at any given time. Only Primary node is able to handle I/O requests to HAST-managed devices. Currently HAST is limited to two cluster nodes in total.
HAST operates on block level - it provides disk-like devices in /dev/hast/ directory for use by file systems and/or applications. Working on block level makes it transparent for file systems and applications. There in no difference between using HAST-provided device and raw disk, partition, etc. All of them are just regular GEOM providers in FreeBSD.
For more information please consult hastd(8), hastctl(8) and hast.conf(5) manual pages, as well as http://wiki.FreeBSD.org/HAST.
Sponsored by: FreeBSD Foundation Sponsored by: OMCnet Internet Service GmbH Sponsored by: TransIP BV
r204077:
Remove some lines left over by accident.
r204083:
Add missing KEYWORD line.
Pointed out by: dougb
r205279 sys:
Simplify loops.
show more ...
|
Revision tags: release/7.3.0_cvs, release/7.3.0 |
|
#
1a0fda2b |
| 04-Mar-2010 |
Dag-Erling Smørgrav <des@FreeBSD.org> |
IFH@204581
|
#
32115b10 |
| 19-Feb-2010 |
Pawel Jakub Dawidek <pjd@FreeBSD.org> |
Please welcome HAST - Highly Avalable Storage.
HAST allows to transparently store data on two physically separated machines connected over the TCP/IP network. HAST works in Primary-Secondary (Master
Please welcome HAST - Highly Avalable Storage.
HAST allows to transparently store data on two physically separated machines connected over the TCP/IP network. HAST works in Primary-Secondary (Master-Backup, Master-Slave) configuration, which means that only one of the cluster nodes can be active at any given time. Only Primary node is able to handle I/O requests to HAST-managed devices. Currently HAST is limited to two cluster nodes in total.
HAST operates on block level - it provides disk-like devices in /dev/hast/ directory for use by file systems and/or applications. Working on block level makes it transparent for file systems and applications. There in no difference between using HAST-provided device and raw disk, partition, etc. All of them are just regular GEOM providers in FreeBSD.
For more information please consult hastd(8), hastctl(8) and hast.conf(5) manual pages, as well as http://wiki.FreeBSD.org/HAST.
Sponsored by: FreeBSD Foundation Sponsored by: OMCnet Internet Service GmbH Sponsored by: TransIP BV
show more ...
|