#
c85d3064 |
| 22-Sep-2024 |
Konstantin Belousov <kib@FreeBSD.org> |
sysctl: add KERN_PROC_RLIMIT_USAGE
Reviewed by: markj, olce Sponsored by: The FreeBSD Foundation MFC after: 1 week Differential revision: https://reviews.freebsd.org/D46747
|
#
f028f44e |
| 20-Sep-2024 |
Konstantin Belousov <kib@FreeBSD.org> |
Add getrlimitusage(2)
Reviewed by: markj, olce Sponsored by: The FreeBSD Foundation MFC after: 1 week Differential revision: https://reviews.freebsd.org/D46747
|
#
af96ccc6 |
| 20-Sep-2024 |
Konstantin Belousov <kib@FreeBSD.org> |
uifree(9): report non-zero values for all shared resources
Sponsored by: The FreeBSD Foundation MFC after: 1 week
|
Revision tags: release/13.4.0 |
|
#
3458bbd3 |
| 10-Sep-2024 |
Konstantin Belousov <kib@FreeBSD.org> |
kernel: add RLIMIT_PIPEBUF
Sponsored by: The FreeBSD Foundation MFC after: 1 week Differential revision: https://reviews.freebsd.org/D46619
|
Revision tags: release/14.1.0, release/13.3.0 |
|
#
fdafd315 |
| 24-Nov-2023 |
Warner Losh <imp@FreeBSD.org> |
sys: Automated cleanup of cdefs and other formatting
Apply the following automated changes to try to eliminate no-longer-needed sys/cdefs.h includes as well as now-empty blank lines in a row.
Remov
sys: Automated cleanup of cdefs and other formatting
Apply the following automated changes to try to eliminate no-longer-needed sys/cdefs.h includes as well as now-empty blank lines in a row.
Remove /^#if.*\n#endif.*\n#include\s+<sys/cdefs.h>.*\n/ Remove /\n+#include\s+<sys/cdefs.h>.*\n+#if.*\n#endif.*\n+/ Remove /\n+#if.*\n#endif.*\n+/ Remove /^#if.*\n#endif.*\n/ Remove /\n+#include\s+<sys/cdefs.h>\n#include\s+<sys/types.h>/ Remove /\n+#include\s+<sys/cdefs.h>\n#include\s+<sys/param.h>/ Remove /\n+#include\s+<sys/cdefs.h>\n#include\s+<sys/capsicum.h>/
Sponsored by: Netflix
show more ...
|
#
29363fb4 |
| 23-Nov-2023 |
Warner Losh <imp@FreeBSD.org> |
sys: Remove ancient SCCS tags.
Remove ancient SCCS tags from the tree, automated scripting, with two minor fixup to keep things compiling. All the common forms in the tree were removed with a perl s
sys: Remove ancient SCCS tags.
Remove ancient SCCS tags from the tree, automated scripting, with two minor fixup to keep things compiling. All the common forms in the tree were removed with a perl script.
Sponsored by: Netflix
show more ...
|
Revision tags: release/14.0.0 |
|
#
685dc743 |
| 16-Aug-2023 |
Warner Losh <imp@FreeBSD.org> |
sys: Remove $FreeBSD$: one-line .c pattern
Remove /^[\s*]*__FBSDID\("\$FreeBSD\$"\);?\s*\n/
|
#
6419ed7e |
| 06-Jul-2023 |
Doug Moore <dougm@FreeBSD.org> |
inline_fls: drop compile-time check
HAVE_INLINE_FLSLL is #defined always. This change assumes that where __HAVE_INLINE_FLSLL is tested, the two leading underscores are a mistake, and that the code w
inline_fls: drop compile-time check
HAVE_INLINE_FLSLL is #defined always. This change assumes that where __HAVE_INLINE_FLSLL is tested, the two leading underscores are a mistake, and that the code will be better for using the efficient flsll implementation. Reviewed by: markj, mhorne Differential Revision: https://reviews.freebsd.org/D40705
show more ...
|
Revision tags: release/13.2.0, release/12.4.0 |
|
#
bbe62559 |
| 19-Aug-2022 |
Mateusz Guzik <mjg@FreeBSD.org> |
rlimit: line up with other clean up in thread_reap_domain
NFC
|
#
f2eb09b0 |
| 26-Jul-2022 |
Dimitry Andric <dim@FreeBSD.org> |
Adjust function definitions in kern_resource.c to avoid clang 15 warnings
With clang 15, the following -Werror warnings are produced:
sys/kern/kern_resource.c:1212:10: error: a function declara
Adjust function definitions in kern_resource.c to avoid clang 15 warnings
With clang 15, the following -Werror warnings are produced:
sys/kern/kern_resource.c:1212:10: error: a function declaration without a prototype is deprecated in all versions of C [-Werror,-Wstrict-prototypes] lim_alloc() ^ void sys/kern/kern_resource.c:1365:11: error: a function declaration without a prototype is deprecated in all versions of C [-Werror,-Wstrict-prototypes] uihashinit() ^ void
This is because lim_alloc() and uihashinit() are declared with (void) argument lists, but defined with empty argument lists. Make the definitions match the declarations.
MFC after: 3 days
show more ...
|
Revision tags: release/13.1.0 |
|
#
becaf643 |
| 14-Feb-2022 |
John Baldwin <jhb@FreeBSD.org> |
Use vmspace->vm_stacktop in place of sv_usrstack in more places.
Reviewed by: markj Obtained from: CheriBSD Differential Revision: https://reviews.freebsd.org/D34174
|
#
93288e24 |
| 01-Feb-2022 |
Mateusz Guzik <mjg@FreeBSD.org> |
Employ thread_cow_synced in setrlimit
In order to avoid proc lock/unlock on next kernel entry.
|
#
8a0cb04d |
| 01-Feb-2022 |
Mateusz Guzik <mjg@FreeBSD.org> |
Add lim_cowsync, similar to crcowsync
|
#
5a8413e7 |
| 17-Jan-2022 |
Mark Johnston <markj@FreeBSD.org> |
setrlimit: Remove special handling for RLIMIT_STACK with a stack gap
This will not be required with a forthcoming reimplementation of ASLR stack randomization. Moreover, this change was not suffici
setrlimit: Remove special handling for RLIMIT_STACK with a stack gap
This will not be required with a forthcoming reimplementation of ASLR stack randomization. Moreover, this change was not sufficient to enable the use of a stack size limit smaller than the stack gap itself.
PR: 260303 Reviewed by: kib MFC after: 1 week Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D33704
show more ...
|
#
bacb140f |
| 15-Jan-2022 |
Simon J. Gerraty <sjg@FreeBSD.org> |
Ignore calcru: runtime went backwards for vm_guest
VM's have little control over CPU speed, don't make matters worse by constantly spaming console.
Reviewed by: jhb Differential Revision: https://r
Ignore calcru: runtime went backwards for vm_guest
VM's have little control over CPU speed, don't make matters worse by constantly spaming console.
Reviewed by: jhb Differential Revision: https://reviews.freebsd.org/D33902
show more ...
|
#
a9545eed |
| 10-Dec-2021 |
Florian Walpen <dev@submerge.ch> |
Add idle priority scheduling privilege group to MAC/priority
Add an idletime user group that allows non-root users to run processes with idle scheduling priority. Privileges are granted by a MAC pol
Add idle priority scheduling privilege group to MAC/priority
Add an idletime user group that allows non-root users to run processes with idle scheduling priority. Privileges are granted by a MAC policy in the mac_priority module. For this purpose, the kernel privilege PRIV_SCHED_IDPRIO was added to sys/priv.h (kernel module ABI change).
Deprecate the system wide sysctl(8) knob security.bsd.unprivileged_idprio which lets any user run idle priority processes, regardless of context. While the knob is still working, it is marked as deprecated in the description and in the man pages.
MFC after: 2 weeks Differential revision: https://reviews.freebsd.org/D33338
show more ...
|
#
a20a2450 |
| 10-Dec-2021 |
Florian Walpen <dev@submerge.ch> |
Add PRIV_SCHED_IDPRIO
The privilege allows the holder to assign idle priority type to thread or process.
MFC after: 2 weeks Differential revision: https://reviews.freebsd.org/D33338
|
Revision tags: release/12.3.0 |
|
#
638c5fa8 |
| 29-Nov-2021 |
Brooks Davis <brooks@FreeBSD.org> |
syscalls: normalize (get|set)rlimit
Declare normal <foo>_args structs rather than going out of the way to declare __<foo>_args.
Reviewed by: kib, imp
|
#
889b56c8 |
| 13-Oct-2021 |
Dawid Gorecki <dgr@semihalf.com> |
setrlimit: Take stack gap into account.
Calling setrlimit with stack gap enabled and with low values of stack resource limit often caused the program to abort immediately after exiting the syscall.
setrlimit: Take stack gap into account.
Calling setrlimit with stack gap enabled and with low values of stack resource limit often caused the program to abort immediately after exiting the syscall. This happened due to the fact that the resource limit was calculated assuming that the stack started at sv_usrstack, while with stack gap enabled the stack is moved by a random number of bytes.
Save information about stack size in struct vmspace and adjust the rlim_cur value. If the rlim_cur and stack gap is bigger than rlim_max, then the value is truncated to rlim_max.
PR: 253208 Reviewed by: kib Obtained from: Semihalf Sponsored by: Stormshield MFC after: 1 month Differential Revision: https://reviews.freebsd.org/D31516
show more ...
|
#
af29f399 |
| 29-Jul-2021 |
Dmitry Chagin <dchagin@FreeBSD.org> |
umtx: Split umtx.h on two counterparts.
To prevent umtx.h polluting by future changes split it on two headers: umtx.h - ABI header for userspace; umtxvar.h - the kernel staff.
While here fix umtx_k
umtx: Split umtx.h on two counterparts.
To prevent umtx.h polluting by future changes split it on two headers: umtx.h - ABI header for userspace; umtxvar.h - the kernel staff.
While here fix umtx_key_match style.
Reviewed by: kib Differential Revision: https://reviews.freebsd.org/D31248 MFC after: 2 weeks
show more ...
|
Revision tags: release/13.0.0 |
|
#
0659df6f |
| 12-Jan-2021 |
Konstantin Belousov <kib@FreeBSD.org> |
vm_map_protect: allow to set prot and max_prot in one go.
This prevents a situation where other thread modifies map entries permissions between setting max_prot, then relocking, then setting prot, c
vm_map_protect: allow to set prot and max_prot in one go.
This prevents a situation where other thread modifies map entries permissions between setting max_prot, then relocking, then setting prot, confusing the operation outcome. E.g. you can get an error that is not possible if operation is performed atomic.
Also enable setting rwx for max_prot even if map does not allow to set effective rwx protection.
Reviewed by: brooks, markj (previous version) Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D28117
show more ...
|
#
fb8ab680 |
| 14-Nov-2020 |
Mateusz Guzik <mjg@FreeBSD.org> |
thread: batch resource limit free calls
|
#
5c5ca843 |
| 10-Nov-2020 |
Mateusz Guzik <mjg@FreeBSD.org> |
Allow rtprio_thread to operate on threads of any process
This in particular unbreaks rtkit.
The limitation was a leftover of previous state, to quote a comment:
/* * Though lwpid is unique, only
Allow rtprio_thread to operate on threads of any process
This in particular unbreaks rtkit.
The limitation was a leftover of previous state, to quote a comment:
/* * Though lwpid is unique, only current process is supported * since there is no efficient way to look up a LWP yet. */
Long since then a global tid hash was introduced to remedy the problem.
Permission checks still apply.
Submitted by: greg_unrelenting.technology (Greg V) Differential Revision: https://reviews.freebsd.org/D27158
show more ...
|
Revision tags: release/12.2.0 |
|
#
6fed89b1 |
| 02-Sep-2020 |
Mateusz Guzik <mjg@FreeBSD.org> |
kern: clean up empty lines in .c and .h files
|
Revision tags: release/11.4.0 |
|
#
59abbffa |
| 31-Jan-2020 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r357270 through r357349.
|