<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/compat/linux/linux_uid16.c, branch releng/10.2</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=releng%2F10.2</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=releng%2F10.2'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2013-10-01T15:40:27Z</updated>
<entry>
<title>Fix some typos that were causing probe argument types to show up as unknown.</title>
<updated>2013-10-01T15:40:27Z</updated>
<author>
<name>Mark Johnston</name>
<email>markj@FreeBSD.org</email>
</author>
<published>2013-10-01T15:40:27Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=92c6196caadbcb648cd757d5f4b4e0b6426097f9'/>
<id>urn:sha1:92c6196caadbcb648cd757d5f4b4e0b6426097f9</id>
<content type='text'>
Reviewed by:	rwatson (mac provider)
Approved by:	re (glebius)
MFC after:	1 week
</content>
</entry>
<entry>
<title>- &gt;500 static DTrace probes for the linuxulator</title>
<updated>2012-05-05T19:42:38Z</updated>
<author>
<name>Alexander Leidinger</name>
<email>netchild@FreeBSD.org</email>
</author>
<published>2012-05-05T19:42:38Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=19e252baebe7a7466b33c27560420b7d95fe294d'/>
<id>urn:sha1:19e252baebe7a7466b33c27560420b7d95fe294d</id>
<content type='text'>
- DTrace scripts to check for errors, performance, ...
  they serve mostly as examples of what you can do with the static probe;s
  with moderate load the scripts may be overwhelmed, excessive lock-tracing
  may influence program behavior (see the last design decission)

Design decissions:
 - use "linuxulator" as the provider for the native bitsize; add the
   bitsize for the non-native emulation (e.g. "linuxuator32" on amd64)
 - Add probes only for locks which are acquired in one function and released
   in another function. Locks which are aquired and released in the same
   function should be easy to pair in the code, inter-function
   locking is more easy to verify in DTrace.
 - Probes for locks should be fired after locking and before releasing to
   prevent races (to provide data/function stability in DTrace, see the
   man-page of "dtrace -v ..." and the corresponding DTrace docs).
</content>
</entry>
<entry>
<title>Add curly braces missed in r226247.</title>
<updated>2011-10-11T13:40:37Z</updated>
<author>
<name>Christian Brueffer</name>
<email>brueffer@FreeBSD.org</email>
</author>
<published>2011-10-11T13:40:37Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=796fa5e465cf13bd8afab3797d2b55e55b71503f'/>
<id>urn:sha1:796fa5e465cf13bd8afab3797d2b55e55b71503f</id>
<content type='text'>
Pointy hat to:	brueffer
Submitted by:	many
MFC after:	1 week
</content>
</entry>
<entry>
<title>Properly free linux_gidset in case of an error.</title>
<updated>2011-10-11T10:32:23Z</updated>
<author>
<name>Christian Brueffer</name>
<email>brueffer@FreeBSD.org</email>
</author>
<published>2011-10-11T10:32:23Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=05ad7ad6670e5ed85e293ec2ca72e27b89dd6afe'/>
<id>urn:sha1:05ad7ad6670e5ed85e293ec2ca72e27b89dd6afe</id>
<content type='text'>
CID:		4136
Found with:	Coverity Prevent(tm)
MFC after:	1 week
</content>
</entry>
<entry>
<title>In order to maximize the re-usability of kernel code in user space this</title>
<updated>2011-09-16T13:58:51Z</updated>
<author>
<name>Kip Macy</name>
<email>kmacy@FreeBSD.org</email>
</author>
<published>2011-09-16T13:58:51Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=8451d0dd78c0a9c0383485b18aba9f081a9db8bb'/>
<id>urn:sha1:8451d0dd78c0a9c0383485b18aba9f081a9db8bb</id>
<content type='text'>
patch modifies makesyscalls.sh to prefix all of the non-compatibility
calls (e.g. not linux_, freebsd32_) with sys_ and updates the kernel
entry points and all places in the code that use them. It also
fixes an additional name space collision between the kernel function
psignal and the libc function of the same name by renaming the kernel
psignal kern_psignal(). By introducing this change now we will ease future
MFCs that change syscalls.

Reviewed by:	rwatson
Approved by:	re (bz)
</content>
</entry>
<entry>
<title>Since all other comparisons involving ngroups_max use</title>
<updated>2010-01-15T07:05:00Z</updated>
<author>
<name>Brooks Davis</name>
<email>brooks@FreeBSD.org</email>
</author>
<published>2010-01-15T07:05:00Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=3ef5ae2dde5073cbec2288e757f07224d962a46a'/>
<id>urn:sha1:3ef5ae2dde5073cbec2288e757f07224d962a46a</id>
<content type='text'>
"ngroups_max + 1", use "&gt;= ngroups_max+1" instead of the equivalent
"&gt; ngroups_max" to reduce confusion.
</content>
</entry>
<entry>
<title>Replace the static NGROUPS=NGROUPS_MAX+1=1024 with a dynamic</title>
<updated>2010-01-12T07:49:34Z</updated>
<author>
<name>Brooks Davis</name>
<email>brooks@FreeBSD.org</email>
</author>
<published>2010-01-12T07:49:34Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=412f9500e2fd3ae0c7546fefb5823bc207139213'/>
<id>urn:sha1:412f9500e2fd3ae0c7546fefb5823bc207139213</id>
<content type='text'>
kern.ngroups+1.  kern.ngroups can range from NGROUPS_MAX=1023 to
INT_MAX-1.  Given that the Windows group limit is 1024, this range
should be sufficient for most applications.

MFC after:	1 month
</content>
</entry>
<entry>
<title>Rework the credential code to support larger values of NGROUPS and</title>
<updated>2009-06-19T17:10:35Z</updated>
<author>
<name>Brooks Davis</name>
<email>brooks@FreeBSD.org</email>
</author>
<published>2009-06-19T17:10:35Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=838d9858251e9729d0b9c40b9aca89be3e171c1a'/>
<id>urn:sha1:838d9858251e9729d0b9c40b9aca89be3e171c1a</id>
<content type='text'>
NGROUPS_MAX, eliminate ABI dependencies on them, and raise the to 1024
and 1023 respectively.  (Previously they were equal, but under a close
reading of POSIX, NGROUPS_MAX was defined to be too large by 1 since it
is the number of supplemental groups, not total number of groups.)

The bulk of the change consists of converting the struct ucred member
cr_groups from a static array to a pointer.  Do the equivalent in
kinfo_proc.

Introduce new interfaces crcopysafe() and crsetgroups() for duplicating
a process credential before modifying it and for setting group lists
respectively.  Both interfaces take care for the details of allocating
groups array. crsetgroups() takes care of truncating the group list
to the current maximum (NGROUPS) if necessary.  In the future,
crsetgroups() may be responsible for insuring invariants such as sorting
the supplemental groups to allow groupmember() to be implemented as a
binary search.

Because we can not change struct xucred without breaking application
ABIs, we leave it alone and introduce a new XU_NGROUPS value which is
always 16 and is to be used or NGRPS as appropriate for things such as
NFS which need to use no more than 16 groups.  When feasible, truncate
the group list rather than generating an error.

Minor changes:
  - Reduce the number of hand rolled versions of groupmember().
  - Do not assign to both cr_gid and cr_groups[0].
  - Modify ipfw to cache ucreds instead of part of their contents since
    they are immutable once referenced by more than one entity.

Submitted by:	Isilon Systems (initial implementation)
X-MFC after:	never
PR:		bin/113398 kern/133867
</content>
</entry>
<entry>
<title>Add the support for the AT_FDCWD and fd-relative name lookups to the</title>
<updated>2008-03-31T12:01:21Z</updated>
<author>
<name>Konstantin Belousov</name>
<email>kib@FreeBSD.org</email>
</author>
<published>2008-03-31T12:01:21Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=57b4252e45134e588365807eef8462db092e0ffb'/>
<id>urn:sha1:57b4252e45134e588365807eef8462db092e0ffb</id>
<content type='text'>
namei(9).

Based on the submission by rdivacky,
	sponsored by Google Summer of Code 2007
Reviewed by:	rwatson, rdivacky
Tested by:	pho
</content>
</entry>
<entry>
<title>Eliminate now-unused SUSER_ALLOWJAIL arguments to priv_check_cred(); in</title>
<updated>2007-06-12T00:12:01Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2007-06-12T00:12:01Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=32f9753cfbfe844fa6c02c88c7ca96617e903d8e'/>
<id>urn:sha1:32f9753cfbfe844fa6c02c88c7ca96617e903d8e</id>
<content type='text'>
some cases, move to priv_check() if it was an operation on a thread and
no other flags were present.

Eliminate caller-side jail exception checking (also now-unused); jail
privilege exception code now goes solely in kern_jail.c.

We can't yet eliminate suser() due to some cases in the KAME code where
a privilege check is performed and then used in many different deferred
paths.  Do, however, move those prototypes to priv.h.

Reviewed by:	csjp
Obtained from:	TrustedBSD Project
</content>
</entry>
</feed>
