User Details
- User Since
- Oct 2 2015, 1:17 PM (534 w, 4 d)
Tue, Dec 23
Sat, Dec 20
Fri, Dec 19
Highlights:
- Remove vfs_opterror() for those entry points that take the opts already
- Move one case of mac_prison_check_get back as a special-case to avoid breaking jail enumeration.
- Unbreak the build of this patch: prison_copy_label comes in a later change
- Drop redundant JAIL_ATTACH check
Thu, Dec 18
Wed, Dec 17
Tue, Dec 16
Mon, Dec 15
Ping
Tue, Dec 9
Ping; any other complaints besides the type nits? I'll fix those to use standard types for the next revision or pre commit.
Sat, Dec 6
Thu, Dec 4
Wed, Dec 3
Highlights:
- Reorganize mac_get_prison() to reduce failure modes and drop the prison lock on the way out
- Assert that the lock is in the correct state afterwards in kern_jail_get()
Highlights:
- Removed prison_check_list, because it's of limited value; this could pose a problem if check_get rejects a prison as lastjid enumeration would halt when MAC denied it, but that probably requires a different solution
- Moved mac_prison_check_get calls to after found_prison, but on the tail of that last note, it might make sense to provide a found_prison_nomac and move one check back into the lastjid loop and just continue if we encounter one that we can't fetch. This would be cleaner than policies having to implement both a check_list and check_get to avoid breaking enumeration
- Moved the attach check to the point that we're about to attach; there are other ways this can fail from external modules anyways (e.g., osd), so trying to keep it all atomic may not be worth as much as being sure that the policy can examine the current properties of the jail. This also ensures that the creation+attach case is covered
- Add missing unlocking
Highlights:
- Remove mac_prison_create_init(): one would probably want to special-case prison0 earlier in mac_prison_init(), and they don't actually need to know anything about prison0 specifically: pr_parent == NULL is a good indicator of the root prison
- Don't leak labels, call mac_prison_destroy()
- Drop a bunch of locking assertions in label operations
Tue, Dec 2
Mon, Dec 1
Nov 30 2025
Nov 27 2025
Nov 24 2025
Implementation looks fine to me, but I defer to bhyve-y folks for final review... in particular, I do wonder if they might prefer some more explicit prefix like unix:/path/to/sock
Nov 23 2025
Nov 17 2025
Just dropping a note that this leads to ~10x throughput to pkg.f.o on my laptop -- previously averaging somewhere around ~2-3mbit/s due to constant out-of-order acks, up to ~25-30 mbit/s on average
Nov 16 2025
Nov 15 2025
Nov 14 2025
Hmm, the definition came in here:
-1 -> 0
Nov 11 2025
Add missing size check to the startmethod _attach()
Nov 7 2025
Nov 6 2025
I know ray@ pops in sometimes so we might give him (and Ed) a little time to object, but I also didn't really see a reason to impose this particular limit. I did wonder if it was just an oversight because NSIG on other platforms *does* usually cover all valid signals (as far as I've observed)
Nov 5 2025
Nov 4 2025
Describe the switch a little more in HISTORY and update the STANDARDS; the
notable changes since -2004 are this different error return and clarification
of EFBIG to surface if the file size limit is exceeded (with generation of a
SIGXFSZ).
Do a read-once load of si_drv1, just in case. Amend the comment to try and
describe our solution more completely
Nov 3 2025
Nov 2 2025
Correct it for the file-specific unsupported mode as well
Fix observed test failures; there's only a few places that we expect EINVAL.
Simplify a bit using the net epoch