Commit Graph

1251 Commits

Author SHA1 Message Date
wiz e63079c2a4 Avoid punctuation markup; remove pastos (?). 2006-10-30 21:36:36 +00:00
elad 52d8744717 Use integers, not pointers to integers, for KAUTH_REQ_NETWORK_SOCKET_OPEN.
Reminded by yamt@, thanks!
2006-10-30 16:53:48 +00:00
wiz f31bc9e7e9 Bump date for previous. 2006-10-26 17:54:52 +00:00
drochner cb7efd18c2 minor fixes and cleanup, reviewed by elad 2006-10-26 17:33:11 +00:00
elad 04e6d5f932 Don't take chances... properly document KAUTH_NETWORK_INTERFACE. On a
second thought having that warning just in the CVS log doesn't look too
helpful. :)
2006-10-26 16:11:17 +00:00
elad ed853f6398 Document that arg1 and arg2 for KAUTH_NETWORK_INTERFACE are optional.
Document that arg3 is optionally the interface-specific request. Should
only make sense if we pass ifnet * in arg1!
2006-10-26 16:06:39 +00:00
wiz faa00b034c Fix typo, found by yamt. 2006-10-26 12:31:14 +00:00
wiz 1751d830e6 Various minor improvements. 2006-10-26 11:16:28 +00:00
elad adf8d7aab2 Introduce KAUTH_REQ_NETWORK_SOCKET_OPEN, to check if opening a socket is
allowed. It takes three int * arguments indicating domain, type, and
protocol. Replace previous KAUTH_REQ_NETWORK_SOCKET_RAWSOCK with it (but
keep it still).

Places that used to explicitly check for privileged context now don't
need it anymore, so I replaced these with XXX comment indiacting it for
future reference.

Documented and updated examples as well.
2006-10-25 22:49:22 +00:00
elad 0730babc25 Sync documentation for KAUTH_PROCESS_CANSIGNAL with reality. 2006-10-24 10:23:05 +00:00
peter 157373e263 Fix a typo. 2006-10-23 21:21:49 +00:00
elad 6b1bc77758 Use consistent wording.
While here, undocument converstion routines for pcred/ucred, as these are
going to be deprecated. They already are, actually, but because we exposed
them to userland so cleverly with sysctl, it may require more thinking
before actually removing them. For now, just make sure nobody relies on
these types. Or at least try...
2006-10-22 14:00:00 +00:00
pooka 418e5b1cea reflect kauth uucred routine changes
thanks to Elad for reminding
2006-10-22 13:42:17 +00:00
yamt 2026cc5abb be consistent with other vmem pages. 2006-10-22 11:23:32 +00:00
yamt 4194eaeebd document vmem. 2006-10-22 11:14:52 +00:00
elad d53df4ed98 Document KAUTH_NETWORK_INTERFACE arguments. 2006-10-21 00:07:40 +00:00
elad 305fe09181 Introduce a new action on the network scope, KAUTH_NETWORK_INTERFACE,
used to manage network interfaces.

Add four sub-actions to fulfill generic needs for now, until a more
carefully defined usage of the interface is documented: get, set,
getpriv, and setpriv.
2006-10-20 23:10:33 +00:00
elad fab05f403b Add a new ALTQ kauth(9) request, KAUTH_REQ_NETWORK_ALTQ_JOBS. 2006-10-20 22:02:54 +00:00
pooka c870120337 VOP_RENAME synopsis:
* tdvp points to a vnode, not a componentname.
* name of the source vnode is fvp, not vp
2006-10-19 13:44:00 +00:00
rpaulo ebc62e8a33 Update structure. 2006-10-15 17:48:07 +00:00
wiz abefc88512 Sort SEE ALSO. 2006-10-14 07:31:41 +00:00
wiz ca5812394a New sentence, new line. Drop trailing whitespace. Sort sections.
Use .Er for errors.
2006-10-13 21:14:46 +00:00
wiz 8ac31fda0f Improve HTML output. 2006-10-13 21:06:51 +00:00
wiz 2bbc82f29e Bump date for previous. 2006-10-13 20:47:42 +00:00
elad 8c494ca741 Introduce KAUTH_REQ_NETWORK_SOCKET_CANSEE. Since we're not gonna be having
credentials on sockets, at least not anytime soon, this is a way to check
if we can "look" at a socket. Later on when (and if) we do have socket
credentials, the interface usage remains the same because we pass the
socket.

This also fixes sysctl for inet/inet6 pcblist.
2006-10-13 15:39:18 +00:00
wiz 361e86f38f Bump date for previous. 2006-10-13 00:20:00 +00:00
peter dd191f37f3 Merge the peter-altq branch.
(sync with KAME & add support for using ALTQ with pf(4)).
2006-10-12 19:59:07 +00:00
rpaulo f3330397f0 Modular (I tried ;-) TCP congestion control API. Whenever certain conditions
happen in the TCP stack, this interface calls the specified callback to
handle the situation according to the currently selected congestion
control algorithm.
A new sysctl node was created: net.inet.tcp.congctl.{available,selected}
with obvious meanings.
The old net.inet.tcp.newreno MIB was removed.
The API is discussed in tcp_congctl(9).

In the near future, it will be possible to selected a congestion control
algorithm on a per-socket basis.

Discussed on tech-net and reviewed by <yamt>.
2006-10-09 16:27:07 +00:00
uebayasi a70b6fe53b No variable name in function argument declaration. 2006-10-09 07:52:59 +00:00
elad 75783f892c PR/31140: Tetsuya Isaki: driver(9) does not describe about kqfilter 2006-10-08 15:44:25 +00:00
pooka e2f3993f69 VOP_REMOVE is supposed to vput the arguments before returning instead
of keeping them locked
2006-10-08 08:13:56 +00:00
cube 007b992d97 Synchronise documentation with code. E.g., config_search is no more, but
instead you have config_search_{loc,ia}.  Add documentation for
config_finalize_regsiter, too.  Mostly fixes PR#32106 by Gavan Fantom, as I
think the cfdriver_* and cfattach_* stuff should be documented too, but I'm
not entirely sure where yet.
2006-10-07 17:26:24 +00:00
chs 33c1fd1917 add support for O_DIRECT (I/O directly to application memory,
bypassing any kernel caching for file data).
2006-10-05 14:48:32 +00:00
pooka d6ced1d27a fix slight ooops in previous 2006-10-04 12:39:05 +00:00
reinoud 64f9244532 Fix confusing statement on locking and contradiction in the VOP_RECLAIM()
explanation.

It told the node vp would be locked on entry and later told that the vnode
is unlocked on entry and should remain unlocked on exit.
2006-10-04 12:32:53 +00:00
pooka 9852bfb57e ucred -> kauth sweep 2006-10-04 11:35:47 +00:00
pooka ecf7acf05b and lo, the uvm_coredump() peril was no more (since almost 5 years ago) 2006-10-04 11:27:45 +00:00
wiz 5eebb711b9 Use present tense for device scope, like for the others. 2006-10-03 02:06:28 +00:00
jld af0234e90d Remove erroneous boilerplate about VOP_POLL's return value (which was
already described correctly earlier in the paragraph).
2006-09-30 21:18:38 +00:00
elad f831edb7d0 Some mdoc cleanup. 2006-09-30 20:14:53 +00:00
elad b8a339347f Implement the "device" scope.
It uses an authorization wrapper per device class on the system to
ensure type-safety.

For now, it supports only terminal (TTY) devices, and has two actions
for them: "open terminal" and "privileged set". Sample usage has been
added to i386 and hp300 code for reference.

Update documentation.
2006-09-30 20:05:57 +00:00
dogcow ef869ff8e9 it's now const char *name, not char *name. (hi, wiz!) 2006-09-24 07:27:57 +00:00
wiz ecef25127f Bump date for previous. 2006-09-24 07:21:43 +00:00
jmcneill f135e0d607 Add "name" parameter to powerhook_establish, to aid debugging. No objections
on tech-kern@
2006-09-24 03:53:07 +00:00
tsutsui 6e4dd0bf16 Sync PMAP_PREFER(9) usage with -current implemetation. 2006-09-24 01:34:19 +00:00
wiz 332a508d8a Bump date for previous. 2006-09-23 11:25:47 +00:00
wiz 3263fc6109 Drop trailing spaces. 2006-09-23 10:07:32 +00:00
jmcneill 5c58e26a02 PR# 34288: No splaudio() in man 9 spl, from Stephane Witzmann. 2006-09-23 04:16:43 +00:00
elad 6ecd7be983 Lose (void *) casts on the machdep scope authorization wrapper. Update
documentation.
2006-09-19 22:03:10 +00:00
elad 83a5239b28 Remove ugly (void *) casts from network scope authorization wrapper and
calls to it.

While here, adapt code for system scope listeners to avoid some more
casts (forgotten in previous run).

Update documentation.
2006-09-19 21:42:29 +00:00