Revision tags: release/4.3.0_cvs, release/4.3.0, release/4.2.0, release/4.1.1_cvs, release/4.1.0, release/3.5.0_cvs |
|
#
b7db1901 |
| 26-Apr-2000 |
Brian Feldman <green@FreeBSD.org> |
Move procfs_fullpath() to vfs_cache.c, with a rename to textvp_fullpath(). There's no excuse to have code in synthetic filestores that allows direct references to the textvp anymore.
Feature request
Move procfs_fullpath() to vfs_cache.c, with a rename to textvp_fullpath(). There's no excuse to have code in synthetic filestores that allows direct references to the textvp anymore.
Feature requested by: msmith Feature agreed to by: warner Move requested by: phk Move agreed to by: bde
show more ...
|
#
081d7b00 |
| 22-Apr-2000 |
Brian Feldman <green@FreeBSD.org> |
Welcome back our old friend from procfs, "file"!
|
Revision tags: release/4.0.0_cvs |
|
#
c4473420 |
| 29-Dec-1999 |
Peter Wemm <peter@FreeBSD.org> |
Change #ifdef KERNEL to #ifdef _KERNEL in the public headers. "KERNEL" is an application space macro and the applications are supposed to be free to use it as they please (but cannot). This is cons
Change #ifdef KERNEL to #ifdef _KERNEL in the public headers. "KERNEL" is an application space macro and the applications are supposed to be free to use it as they please (but cannot). This is consistant with the other BSD's who made this change quite some time ago. More commits to come.
show more ...
|
Revision tags: release/3.4.0_cvs |
|
#
a9e0361b |
| 21-Nov-1999 |
Poul-Henning Kamp <phk@FreeBSD.org> |
Introduce the new function p_trespass(struct proc *p1, struct proc *p2) which returns zero or an errno depending on the legality of p1 trespassing on p2.
Replace kern_sig.c:CANSIGNAL() with
Introduce the new function p_trespass(struct proc *p1, struct proc *p2) which returns zero or an errno depending on the legality of p1 trespassing on p2.
Replace kern_sig.c:CANSIGNAL() with call to p_trespass() and one extra signal related check.
Replace procfs.h:CHECKIO() macros with calls to p_trespass().
Only show command lines to process which can trespass on the target process.
show more ...
|
#
da654d90 |
| 21-Nov-1999 |
Poul-Henning Kamp <phk@FreeBSD.org> |
s/p_cred->pc_ucred/p_ucred/g
|
#
13baaceb |
| 20-Nov-1999 |
Sean Eric Fagan <sef@FreeBSD.org> |
A process should be able to examine itself.
|
Revision tags: release/3.3.0_cvs |
|
#
c3aac50f |
| 28-Aug-1999 |
Peter Wemm <peter@FreeBSD.org> |
$Id$ -> $FreeBSD$
|
#
ab001a72 |
| 09-Jul-1999 |
Jonathan Lemon <jlemon@FreeBSD.org> |
Implement support for hardware debug registers on the i386.
Submitted by: Brian Dean <brdean@unx.sas.com>
|
#
7a7404d2 |
| 13-Jun-1999 |
Poul-Henning Kamp <phk@FreeBSD.org> |
Eliminate the bogus procfs private almost struct dirent structure.
Spotted by: Lars Hamren Reviewed by: bde
|
Revision tags: release/3.2.0 |
|
#
8902608d |
| 04-May-1999 |
Poul-Henning Kamp <phk@FreeBSD.org> |
Add even more () to CHECKIO which by now feels positively LISPish.
Submitted by: bde Reviewed by: phk
|
#
d37ed5a0 |
| 30-Apr-1999 |
Poul-Henning Kamp <phk@FreeBSD.org> |
Add a new "file" to procfs: "rlimit" which shows the resource limits for the process.
PR: 11342 Submitted by: Adrian Chadd adrian@freebsd.org Reviewed by: phk
|
#
75c13541 |
| 28-Apr-1999 |
Poul-Henning Kamp <phk@FreeBSD.org> |
This Implements the mumbled about "Jail" feature.
This is a seriously beefed up chroot kind of thing. The process is jailed along the same lines as a chroot does it, but with additional tough restr
This Implements the mumbled about "Jail" feature.
This is a seriously beefed up chroot kind of thing. The process is jailed along the same lines as a chroot does it, but with additional tough restrictions imposed on what the superuser can do.
For all I know, it is safe to hand over the root bit inside a prison to the customer living in that prison, this is what it was developed for in fact: "real virtual servers".
Each prison has an ip number associated with it, which all IP communications will be coerced to use and each prison has its own hostname.
Needless to say, you need more RAM this way, but the advantage is that each customer can run their own particular version of apache and not stomp on the toes of their neighbors.
It generally does what one would expect, but setting up a jail still takes a little knowledge.
A few notes:
I have no scripts for setting up a jail, don't ask me for them.
The IP number should be an alias on one of the interfaces.
mount a /proc in each jail, it will make ps more useable.
/proc/<pid>/status tells the hostname of the prison for jailed processes.
Quotas are only sensible if you have a mountpoint per prison.
There are no privisions for stopping resource-hogging.
Some "#ifdef INET" and similar may be missing (send patches!)
If somebody wants to take it from here and develop it into more of a "virtual machine" they should be most welcome!
Tools, comments, patches & documentation most welcome.
Have fun...
Sponsored by: http://www.rndassociates.com/ Run for almost a year by: http://www.servetheweb.com/
show more ...
|
#
f711d546 |
| 27-Apr-1999 |
Poul-Henning Kamp <phk@FreeBSD.org> |
Suser() simplification:
1: s/suser/suser_xxx/
2: Add new function: suser(struct proc *), prototyped in <sys/proc.h>.
3: s/suser_xxx(\([a-zA-Z0-9_]*\)->p_ucred, \&\1->p_acflag)/suser(\1)/
Th
Suser() simplification:
1: s/suser/suser_xxx/
2: Add new function: suser(struct proc *), prototyped in <sys/proc.h>.
3: s/suser_xxx(\([a-zA-Z0-9_]*\)->p_ucred, \&\1->p_acflag)/suser(\1)/
The remaining suser_xxx() calls will be scrutinized and dealt with later.
There may be some unneeded #include <sys/cred.h>, but they are left as an exercise for Bruce.
More changes to the suser() API will come along with the "jail" code.
show more ...
|
Revision tags: release/3.1.0, release/3.0.0, release/2.2.8 |
|
#
75ba7757 |
| 05-Jan-1999 |
Peter Wemm <peter@FreeBSD.org> |
A partial implementation of the procfs cmdline pseudo-file. This is enough to satisfy things like StarOffice. This is a hack, but doing it properly would be a LOT of work, and would require extensi
A partial implementation of the procfs cmdline pseudo-file. This is enough to satisfy things like StarOffice. This is a hack, but doing it properly would be a LOT of work, and would require extensive grovelling around in the user address space to find the argv[].
Obtained from: Mostly from Andrzej Bialecki <abial@nask.pl>.
show more ...
|
Revision tags: release/2.2.7 |
|
#
96eb19e1 |
| 07-Jul-1998 |
Bruce Evans <bde@FreeBSD.org> |
Quick fix for type mismatches which were fatal if longs aren't 32 bits. We used a private, wrong, version of `struct dirent' to help break getdirentries(), and we use a silly check that the size of
Quick fix for type mismatches which were fatal if longs aren't 32 bits. We used a private, wrong, version of `struct dirent' to help break getdirentries(), and we use a silly check that the size of this struct is a power of 2 to help break mount() if getdirentries() would not work. This fix just changes the struct to match `struct dirent' (except for the name length).
show more ...
|
#
afc6ea23 |
| 19-May-1998 |
Tor Egge <tegge@FreeBSD.org> |
Disallow reading the current kernel stack. Only the user structure and the current registers should be accessible. Reviewed by: David Greenman <dg@root.com>
|
Revision tags: release/2.2.6 |
|
#
a954e88d |
| 30-Dec-1997 |
Bruce Evans <bde@FreeBSD.org> |
Fixed a missing/misplaced/misstyled prototype.
|
Revision tags: release/2.2.5_cvs |
|
#
bea0f0be |
| 07-Sep-1997 |
Bruce Evans <bde@FreeBSD.org> |
Some staticized variables were still declared to be extern.
|
#
49356a1f |
| 12-Aug-1997 |
Sean Eric Fagan <sef@FreeBSD.org> |
Fix procfs security hole -- check permissions on meaningful I/Os (namely, reading/writing of mem and regs). Also have to check for the requesting process being group KMEM -- this is a bit of a hack,
Fix procfs security hole -- check permissions on meaningful I/Os (namely, reading/writing of mem and regs). Also have to check for the requesting process being group KMEM -- this is a bit of a hack, but ps et al need it.
Reviewed by: davidg
show more ...
|
Revision tags: release/2.2.2_cvs, release/2.2.1_cvs, release/2.2.0, release/2.1.7_cvs |
|
#
6875d254 |
| 22-Feb-1997 |
Peter Wemm <peter@FreeBSD.org> |
Back out part 1 of the MCFH that changed $Id$ to $FreeBSD$. We are not ready for it yet.
|
#
996c772f |
| 10-Feb-1997 |
John Dyson <dyson@FreeBSD.org> |
This is the kernel Lite/2 commit. There are some requisite userland changes, so don't expect to be able to run the kernel as-is (very well) without the appropriate Lite/2 userland changes.
The syst
This is the kernel Lite/2 commit. There are some requisite userland changes, so don't expect to be able to run the kernel as-is (very well) without the appropriate Lite/2 userland changes.
The system boots and can mount UFS filesystems.
Untested: ext2fs, msdosfs, NFS Known problems: Incorrect Berkeley ID strings in some files. Mount_std mounts will not work until the getfsent library routine is changed.
Reviewed by: various people Submitted by: Jeffery Hsu <hsu@freebsd.org>
show more ...
|
Revision tags: release/2.1.6_cvs, release/2.1.6.1 |
|
#
1130b656 |
| 14-Jan-1997 |
Jordan K. Hubbard <jkh@FreeBSD.org> |
Make the long-awaited change from $Id$ to $FreeBSD$
This will make a number of things easier in the future, as well as (finally!) avoiding the Id-smashing problem which has plagued developers for so
Make the long-awaited change from $Id$ to $FreeBSD$
This will make a number of things easier in the future, as well as (finally!) avoiding the Id-smashing problem which has plagued developers for so long.
Boy, I'm glad we're not using sup anymore. This update would have been insane otherwise.
show more ...
|
Revision tags: release/2.1.5_cvs |
|
#
688bbd5b |
| 02-Jul-1996 |
John Dyson <dyson@FreeBSD.org> |
Implement locking for pfs nodes, when at the leaf. Concurrent access to information from a single process causes hangs. Specifically, this fixes problems (hangs) with concurrent ps commands, when t
Implement locking for pfs nodes, when at the leaf. Concurrent access to information from a single process causes hangs. Specifically, this fixes problems (hangs) with concurrent ps commands, when the system is under heavy memory load. Reviewed by: davidg
show more ...
|
#
6ead3edd |
| 18-Jun-1996 |
John Dyson <dyson@FreeBSD.org> |
Clean-up the new VM map procfs code, and also add support for executable format file "etype". It contains a description of the binary type for a process.
|
#
9353aadd |
| 18-Jun-1996 |
John Dyson <dyson@FreeBSD.org> |
Add a feature to procfs to allow display of the process address map with multiple entries as follows:
start address, end address, resident pages in range, private pages in range, RW/RO, COW or no
Add a feature to procfs to allow display of the process address map with multiple entries as follows:
start address, end address, resident pages in range, private pages in range, RW/RO, COW or not, (vnode/device/swap/default).
show more ...
|