The patch for the getprlimit() syscall:
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
---
arch/i386/kernel/syscall_table.S |1
include/asm-i386/unistd.h|3 -
include/linux/security.h | 25 ++-
kernel/sys.c
The patch for the setprlimit() syscall:
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
---
arch/i386/kernel/syscall_table.S |1
include/asm-i386/unistd.h|3 -
kernel/sys.c | 114 ---
security/selinux/h
Bit reimplementation Alan
suggested without introducing the same bugs again.
Thanks,
Wieland
The man page for this version of get/setprlimit():
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
-
.\" Hey Emacs
Bit reimplementation Alan
suggested without introducing the same bugs again.
Thanks,
Wieland
The man page for this version of get/setprlimit():
Signed-off-by: Wieland Gmeiner [EMAIL PROTECTED]
-
.\ Hey Emacs! This file
The patch for the getprlimit() syscall:
Signed-off-by: Wieland Gmeiner [EMAIL PROTECTED]
---
arch/i386/kernel/syscall_table.S |1
include/asm-i386/unistd.h|3 -
include/linux/security.h | 25 ++-
kernel/sys.c | 85
The patch for the setprlimit() syscall:
Signed-off-by: Wieland Gmeiner [EMAIL PROTECTED]
---
arch/i386/kernel/syscall_table.S |1
include/asm-i386/unistd.h|3 -
kernel/sys.c | 114 ---
security/selinux/hooks.c
On Fri, 2005-08-26 at 16:34 +0100, Alan Cox wrote:
> On Gwe, 2005-08-26 at 05:39 +0200, Wieland Gmeiner wrote:
> > This is the second of two patches, it implements the setprlimit()
> > syscall.
> >
> > Implementation: This patch provides a new syscall setprlimit() for
On Fri, 2005-08-26 at 16:34 +0100, Alan Cox wrote:
On Gwe, 2005-08-26 at 05:39 +0200, Wieland Gmeiner wrote:
This is the second of two patches, it implements the setprlimit()
syscall.
Implementation: This patch provides a new syscall setprlimit() for
writing a given process resource
.tuwien.ac.at/~e8607062/studies/soc/patches/
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
---
arch/i386/kernel/syscall_table.S |1
include/asm-i386/unistd.h|3 -
kernel/sys.c | 114 ---
security/selinux/h
on
http://stud4.tuwien.ac.at/~e8607062/studies/soc/patches/
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
---
arch/i386/kernel/syscall_table.S |1
include/asm-i386/unistd.h|3 -
include/linux/security.h | 25 +++-
kernel/sys.c
on
http://stud4.tuwien.ac.at/~e8607062/studies/soc/patches/
Signed-off-by: Wieland Gmeiner [EMAIL PROTECTED]
---
arch/i386/kernel/syscall_table.S |1
include/asm-i386/unistd.h|3 -
include/linux/security.h | 25 +++-
kernel/sys.c | 81
.tuwien.ac.at/~e8607062/studies/soc/patches/
Signed-off-by: Wieland Gmeiner [EMAIL PROTECTED]
---
arch/i386/kernel/syscall_table.S |1
include/asm-i386/unistd.h|3 -
kernel/sys.c | 114 ---
security/selinux/hooks.c | 14
On Thu, 2005-08-18 at 04:05 +0200, Andi Kleen wrote:
> Is there a realistic use case where this new system call is actually useful
> and solves something that cannot be solved without it?
As an example: It seems to be a common problem with numerous services to
run out of available file
On Thu, 2005-08-18 at 04:05 +0200, Andi Kleen wrote:
Is there a realistic use case where this new system call is actually useful
and solves something that cannot be solved without it?
As an example: It seems to be a common problem with numerous services to
run out of available file
.tuwien.ac.at/~e8607062/studies/soc/patches/
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
diff -uprN -X linux-2.6.13-rc6-vanilla/Documentation/dontdiff
linux-2.6.13-rc6-getprlimit/arch/i386/kernel/syscall_table.S
linux-2.6.13-rc6-setprlimit/arch/i386/kernel/syscall_table.S
--- linux-2.6.
the gid, egid, sgid of
the target process.
(This resembles the behaviour of the ptrace system call.)
See the followup for the writing syscall.
Simple programs for testing the syscalls can be found on
http://stud4.tuwien.ac.at/~e8607062/studies/soc/patches/
Signed-off-by: Wieland Gmeiner <[EM
the gid, egid, sgid of
the target process.
(This resembles the behaviour of the ptrace system call.)
See the followup for the writing syscall.
Simple programs for testing the syscalls can be found on
http://stud4.tuwien.ac.at/~e8607062/studies/soc/patches/
Signed-off-by: Wieland Gmeiner [EMAIL
.tuwien.ac.at/~e8607062/studies/soc/patches/
Signed-off-by: Wieland Gmeiner [EMAIL PROTECTED]
diff -uprN -X linux-2.6.13-rc6-vanilla/Documentation/dontdiff
linux-2.6.13-rc6-getprlimit/arch/i386/kernel/syscall_table.S
linux-2.6.13-rc6-setprlimit/arch/i386/kernel/syscall_table.S
--- linux-2.6.13-rc6
On Sat, 2005-08-13 at 15:11 -0700, Greg KH wrote:
> On Fri, Aug 12, 2005 at 07:48:22PM +0200, Wieland Gmeiner wrote:
> > @@ -294,3 +294,4 @@ ENTRY(sys_call_table)
> > .long sys_inotify_init
> > .long sys_inotify_add_watch
> > .long sys_inotify_rm_watch
> &
On Sat, 2005-08-13 at 15:11 -0700, Greg KH wrote:
On Fri, Aug 12, 2005 at 07:48:22PM +0200, Wieland Gmeiner wrote:
@@ -294,3 +294,4 @@ ENTRY(sys_call_table)
.long sys_inotify_init
.long sys_inotify_add_watch
.long sys_inotify_rm_watch
+.long sys_getprlimit
Please
whose rlimit
is being written and
the calling process uid equals the euid of the process whose rlimit
is being written
or
- the calling process euid equals the suid of the process whose
rlimit is being written
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
diff -uprN -X linux-
ble access is under
construction.
Simple programs for testing the syscalls can be found on
http://stud4.tuwien.ac.at/~e8607062/studies/soc/patches/
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
diff -uprN -X linux-2.6.13-rc6-vanilla/Documentation/dontdiff
linux-2.6.13-rc6-vanilla/
whose rlimit
is being written and
the calling process uid equals the euid of the process whose rlimit
is being written
or
- the calling process euid equals the suid of the process whose
rlimit is being written
Signed-off-by: Wieland Gmeiner [EMAIL PROTECTED]
diff -uprN -X linux-2.6.13-rc6
I want to register a new system call and notice that on several
architectures there is some inconsistency between the system call table
and unistd.h, e.g. (2.6.13-rc2):
in arch/arm/kernel/calls.S:
...
/* 310 */ .long sys_request_key
.long sys_keyctl
.long
I want to register a new system call and notice that on several
architectures there is some inconsistency between the system call table
and unistd.h, e.g. (2.6.13-rc2):
in arch/arm/kernel/calls.S:
...
/* 310 */ .long sys_request_key
.long sys_keyctl
.long
25 matches
Mail list logo