#
4aac2aa9 |
| 08-Dec-2001 |
Dag-Erling Smørgrav <des@FreeBSD.org> |
Fix a KSEfication brain-o in procfs_doprocfile(): return the path of the target process, not the calling process. While we're here, also unstaticize procfs_doprocfile() and procfs_docurproc() so lin
Fix a KSEfication brain-o in procfs_doprocfile(): return the path of the target process, not the calling process. While we're here, also unstaticize procfs_doprocfile() and procfs_docurproc() so linprocfs can call them directly instead of duplicating them.
Submitted by: Dominic Mitchell <dom@semantico.com>
show more ...
|
#
3a669c52 |
| 04-Dec-2001 |
Dag-Erling Smørgrav <des@FreeBSD.org> |
Pseudofsize procfs(5).
|
#
1ee774f6 |
| 02-Oct-2009 |
Oleksandr Tymoshenko <gonzo@FreeBSD.org> |
- MFC
|
#
17dfbc1c |
| 23-Sep-2009 |
Konstantin Belousov <kib@FreeBSD.org> |
Add per-process osrel node to the procfs, to allow read and set p_osrel value for the process.
Approved by: des (procfs maintainer) MFC after: 3 weeks
|
Revision tags: release/7.2.0_cvs, release/7.2.0 |
|
#
1829d5da |
| 12-Mar-2009 |
Warner Losh <imp@FreeBSD.org> |
Update the projects tree to a newer FreeBSD current.
|
#
655fcdaa |
| 16-Feb-2009 |
Dag-Erling Smørgrav <des@FreeBSD.org> |
Fix a logic bug that caused the pfs_attr method to be called only for PFS_PROCDEP nodes.
Submitted by: Andrew Brampton <brampton@gmail.com> MFC after: 2 weeks
|
Revision tags: release/6.4.0_cvs, release/6.4.0 |
|
#
2ff47c5f |
| 04-Nov-2008 |
John Baldwin <jhb@FreeBSD.org> |
Remove unnecessary locking around vn_fullpath(). The vnode lock for the vnode in question does not need to be held. All the data structures used during the name lookup are protected by the global n
Remove unnecessary locking around vn_fullpath(). The vnode lock for the vnode in question does not need to be held. All the data structures used during the name lookup are protected by the global name cache lock. Instead, the caller merely needs to ensure a reference is held on the vnode (such as vhold()) to keep it from being freed.
In the case of procfs' <pid>/file entry, grab the process lock while we gain a new reference (via vhold()) on p_textvp to fully close races with execve(2).
For the kern.proc.vmmap sysctl handler, use a shared vnode lock around the call to VOP_GETATTR() rather than an exclusive lock.
MFC after: 1 month
show more ...
|
Revision tags: release/7.0.0_cvs, release/7.0.0, release/6.3.0_cvs, release/6.3.0 |
|
#
22db15c0 |
| 13-Jan-2008 |
Attilio Rao <attilio@FreeBSD.org> |
VOP_LOCK1() (and so VOP_LOCK()) and VOP_UNLOCK() are only used in conjuction with 'thread' argument passing which is always curthread. Remove the unuseful extra-argument and pass explicitly curthread
VOP_LOCK1() (and so VOP_LOCK()) and VOP_UNLOCK() are only used in conjuction with 'thread' argument passing which is always curthread. Remove the unuseful extra-argument and pass explicitly curthread to lower layer functions, when necessary.
KPI results broken by this change, which should affect several ports, so version bumping and manpage update will be further committed.
Tested by: kris, pho, Diego Sardina <siarodx at gmail dot com>
show more ...
|
#
cb05b60a |
| 10-Jan-2008 |
Attilio Rao <attilio@FreeBSD.org> |
vn_lock() is currently only used with the 'curthread' passed as argument. Remove this argument and pass curthread directly to underlying VOP_LOCK1() VFS method. This modify makes the code cleaner and
vn_lock() is currently only used with the 'curthread' passed as argument. Remove this argument and pass curthread directly to underlying VOP_LOCK1() VFS method. This modify makes the code cleaner and in particular remove an annoying dependence helping next lockmgr() cleanup. KPI results, obviously, changed.
Manpage and FreeBSD_version will be updated through further commits.
As a side note, would be valuable to say that next commits will address a similar cleanup about VFS methods, in particular vop_lock1 and vop_unlock.
Tested by: Diego Sardina <siarodx at gmail dot com>, Andrea Di Pasquale <whyx dot it at gmail dot com>
show more ...
|
#
771709eb |
| 12-Mar-2007 |
Dag-Erling Smørgrav <des@FreeBSD.org> |
Add a pn_destroy field to pfs_node. This field points to a destructor function which is called from pfs_destroy() before the node is reclaimed.
Modify pfs_create_{dir,file,link}() to accept a point
Add a pn_destroy field to pfs_node. This field points to a destructor function which is called from pfs_destroy() before the node is reclaimed.
Modify pfs_create_{dir,file,link}() to accept a pointer to a destructor function in addition to the usual attr / fill / vis pointers.
This breaks both the programming and binary interfaces between pseudofs and its consumers. It is believed that there are no pseudofs consumers outside the source tree, so that the impact of this change is minimal.
Submitted by: Aniruddha Bohra <bohra@cs.rutgers.edu>
show more ...
|
#
a2573376 |
| 07-Feb-2007 |
Konstantin Belousov <kib@FreeBSD.org> |
Fix the race of dereferencing /proc/<pid>/file with execve(2) by caching the value of p_textvp. This way, we always unlock the locked vnode. While there, vhold() the vnode around the vn_lock().
Repo
Fix the race of dereferencing /proc/<pid>/file with execve(2) by caching the value of p_textvp. This way, we always unlock the locked vnode. While there, vhold() the vnode around the vn_lock().
Reported and tested by: Guy Helmer (ghelmer palisadesys com) Approved by: des (procfs maintainer) MFC after: 1 week
show more ...
|
Revision tags: release/6.2.0_cvs, release/6.2.0 |
|
#
3266c228 |
| 05-Jun-2006 |
Guy Helmer <ghelmer@FreeBSD.org> |
Upon further review, DES prefers this change over that in revision 1.13 to resolve the directory access problem for processes with P_SUGID flag set.
Suggested by: des
|
#
e06dbd32 |
| 24-May-2006 |
Guy Helmer <ghelmer@FreeBSD.org> |
Revision 1.4 set access for all sensitive files in /proc/<PID> to mode 0 if a process's uid or gid has changed, but the /proc/<PID> directory itself was also set to mode 0. Assuming this doesn't ope
Revision 1.4 set access for all sensitive files in /proc/<PID> to mode 0 if a process's uid or gid has changed, but the /proc/<PID> directory itself was also set to mode 0. Assuming this doesn't open any security holes, open access to the /proc/<PID> directory for users other than root to read or search the directory.
Reviewed by: des (back in February) MFC after: 3 weeks
show more ...
|
Revision tags: release/5.5.0_cvs, release/5.5.0, release/6.1.0_cvs, release/6.1.0, release/6.0.0_cvs, release/6.0.0, release/5.4.0_cvs, release/5.4.0, release/4.11.0_cvs, release/4.11.0 |
|
#
d167cf6f |
| 06-Jan-2005 |
Warner Losh <imp@FreeBSD.org> |
/* -> /*- for copyright notices, minor format tweaks as necessary
|
Revision tags: release/5.3.0_cvs, release/5.3.0, release/4.10.0_cvs, release/4.10.0, release/5.2.1_cvs, release/5.2.1, release/5.2.0_cvs, release/5.2.0 |
|
#
1f1ca35f |
| 07-Jan-2004 |
Robert Watson <rwatson@FreeBSD.org> |
Lock p->p_textvp before calling vn_fullpath() on it. Note the potential lock order concern due to the vnode lock held simultaneously by the caller into procfs.
Reported by: kuriyama Approved by: des
|
#
7caaf6c9 |
| 07-Dec-2003 |
Dag-Erling Smørgrav <des@FreeBSD.org> |
Minor whitespace and style issues.
|
Revision tags: release/4.9.0_cvs, release/4.9.0, release/5.1.0_cvs, release/5.1.0 |
|
#
c110b8e6 |
| 18-Apr-2003 |
John Baldwin <jhb@FreeBSD.org> |
Add a proc lock assertion and move another assertion up to the top of the function.
|
Revision tags: release/4.8.0_cvs, release/4.8.0, release/5.0.0_cvs, release/5.0.0 |
|
#
763bbd2f |
| 26-Oct-2002 |
Robert Watson <rwatson@FreeBSD.org> |
Slightly change the semantics of vnode labels for MAC: rather than "refreshing" the label on the vnode before use, just get the label right from inception. For single-label file systems, set the lab
Slightly change the semantics of vnode labels for MAC: rather than "refreshing" the label on the vnode before use, just get the label right from inception. For single-label file systems, set the label in the generic VFS getnewvnode() code; for multi-label file systems, leave the labeling up to the file system. With UFS1/2, this means reading the extended attribute during vfs_vget() as the inode is pulled off disk, rather than hitting the extended attributes frequently during operations later, improving performance. This also corrects sematics for shared vnode locks, which were not previously present in the system. This chances the cache coherrency properties WRT out-of-band access to label data, but in an acceptable form. With UFS1, there is a small race condition during automatic extended attribute start -- this is not present with UFS2, and occurs because EAs aren't available at vnode inception. We'll introduce a work around for this shortly.
Approved by: re Obtained from: TrustedBSD Project Sponsored by: DARPA, Network Associates Laboratories
show more ...
|
#
659d5e21 |
| 20-Oct-2002 |
Poul-Henning Kamp <phk@FreeBSD.org> |
Remove even more '&' from pointers to functions.
Spotted by: FlexeLint
|
Revision tags: release/4.7.0_cvs, release/4.6.2_cvs, release/4.6.2 |
|
#
c1ff2d9b |
| 01-Aug-2002 |
Robert Watson <rwatson@FreeBSD.org> |
Introduce support for Mandatory Access Control and extensible kernel access control.
Modify procfs so that (when mounted multilabel) it exports process MAC labels as the vnode labels of procfs vnode
Introduce support for Mandatory Access Control and extensible kernel access control.
Modify procfs so that (when mounted multilabel) it exports process MAC labels as the vnode labels of procfs vnodes associated with processes.
Approved by: des Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
show more ...
|
Revision tags: release/4.6.1, release/4.6.0_cvs |
|
#
f44d9e24 |
| 19-May-2002 |
John Baldwin <jhb@FreeBSD.org> |
Change p_can{debug,see,sched,signal}()'s first argument to be a thread pointer instead of a proc pointer and require the process pointed to by the second argument to be locked. We now use the thread
Change p_can{debug,see,sched,signal}()'s first argument to be a thread pointer instead of a proc pointer and require the process pointed to by the second argument to be locked. We now use the thread ucred reference for the credential checks in p_can*() as a result. p_canfoo() should now no longer need Giant.
show more ...
|
#
cd9e3b20 |
| 18-Feb-2002 |
Dag-Erling Smørgrav <des@FreeBSD.org> |
Paranoia: if the process is setugid, set all sensitive files mode 0.
|
Revision tags: release/4.5.0_cvs, release/4.4.0_cvs |
|
#
50cb89ee |
| 09-Dec-2001 |
Dag-Erling Smørgrav <des@FreeBSD.org> |
Fix various bugs in the debugging code and reenable it.
|
#
4aac2aa9 |
| 08-Dec-2001 |
Dag-Erling Smørgrav <des@FreeBSD.org> |
Fix a KSEfication brain-o in procfs_doprocfile(): return the path of the target process, not the calling process. While we're here, also unstaticize procfs_doprocfile() and procfs_docurproc() so lin
Fix a KSEfication brain-o in procfs_doprocfile(): return the path of the target process, not the calling process. While we're here, also unstaticize procfs_doprocfile() and procfs_docurproc() so linprocfs can call them directly instead of duplicating them.
Submitted by: Dominic Mitchell <dom@semantico.com>
show more ...
|
#
3a669c52 |
| 04-Dec-2001 |
Dag-Erling Smørgrav <des@FreeBSD.org> |
Pseudofsize procfs(5).
|