User Details
- User Since
- Oct 2 2015, 1:17 PM (532 w, 5 d)
Yesterday
Mon, Dec 15
Ping
Tue, Dec 9
Ping; any other complaints besides the type nits? I'll fix those to use standard types for the next revision or pre commit.
Sat, Dec 6
Thu, Dec 4
Wed, Dec 3
Highlights:
- Reorganize mac_get_prison() to reduce failure modes and drop the prison lock on the way out
- Assert that the lock is in the correct state afterwards in kern_jail_get()
Highlights:
- Removed prison_check_list, because it's of limited value; this could pose a problem if check_get rejects a prison as lastjid enumeration would halt when MAC denied it, but that probably requires a different solution
- Moved mac_prison_check_get calls to after found_prison, but on the tail of that last note, it might make sense to provide a found_prison_nomac and move one check back into the lastjid loop and just continue if we encounter one that we can't fetch. This would be cleaner than policies having to implement both a check_list and check_get to avoid breaking enumeration
- Moved the attach check to the point that we're about to attach; there are other ways this can fail from external modules anyways (e.g., osd), so trying to keep it all atomic may not be worth as much as being sure that the policy can examine the current properties of the jail. This also ensures that the creation+attach case is covered
- Add missing unlocking
Highlights:
- Remove mac_prison_create_init(): one would probably want to special-case prison0 earlier in mac_prison_init(), and they don't actually need to know anything about prison0 specifically: pr_parent == NULL is a good indicator of the root prison
- Don't leak labels, call mac_prison_destroy()
- Drop a bunch of locking assertions in label operations
Tue, Dec 2
Mon, Dec 1
Sun, Nov 30
Thu, Nov 27
Mon, Nov 24
Implementation looks fine to me, but I defer to bhyve-y folks for final review... in particular, I do wonder if they might prefer some more explicit prefix like unix:/path/to/sock
Sun, Nov 23
Mon, Nov 17
Just dropping a note that this leads to ~10x throughput to pkg.f.o on my laptop -- previously averaging somewhere around ~2-3mbit/s due to constant out-of-order acks, up to ~25-30 mbit/s on average
Nov 16 2025
Nov 15 2025
Nov 14 2025
Hmm, the definition came in here:
-1 -> 0
Nov 11 2025
Add missing size check to the startmethod _attach()
Nov 7 2025
Nov 6 2025
I know ray@ pops in sometimes so we might give him (and Ed) a little time to object, but I also didn't really see a reason to impose this particular limit. I did wonder if it was just an oversight because NSIG on other platforms *does* usually cover all valid signals (as far as I've observed)
Nov 5 2025
Nov 4 2025
Describe the switch a little more in HISTORY and update the STANDARDS; the
notable changes since -2004 are this different error return and clarification
of EFBIG to surface if the file size limit is exceeded (with generation of a
SIGXFSZ).
Do a read-once load of si_drv1, just in case. Amend the comment to try and
describe our solution more completely
Nov 3 2025
Nov 2 2025
Correct it for the file-specific unsupported mode as well
Fix observed test failures; there's only a few places that we expect EINVAL.
Simplify a bit using the net epoch
Nov 1 2025
Oct 31 2025
Oct 30 2025
Dance around tunmtx to protect against concurrent tun_destroy() / tunopen()
Oct 29 2025
Oct 27 2025
Already landed in a505b80b2f038409300cd05e2ea95822942404e2, and it's clear nobody is using it in a way that this is urgent to MFC independently