The patch for the getprlimit() syscall:
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
---
arch/i386/kernel/syscall_table.S |1
include/asm-i386/unistd.h|3 -
include/linux/security.h | 25 ++-
kernel/sys.c
The patch for the setprlimit() syscall:
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
---
arch/i386/kernel/syscall_table.S |1
include/asm-i386/unistd.h|3 -
kernel/sys.c | 114 ---
security/selinux/h
Bit reimplementation Alan
suggested without introducing the same bugs again.
Thanks,
Wieland
The man page for this version of get/setprlimit():
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
-
.\" Hey Emacs! T
On Fri, 2005-08-26 at 16:34 +0100, Alan Cox wrote:
> On Gwe, 2005-08-26 at 05:39 +0200, Wieland Gmeiner wrote:
> > This is the second of two patches, it implements the setprlimit()
> > syscall.
> >
> > Implementation: This patch provides a new syscall setprlimit() for
.tuwien.ac.at/~e8607062/studies/soc/patches/
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
---
arch/i386/kernel/syscall_table.S |1
include/asm-i386/unistd.h|3 -
kernel/sys.c | 114 ---
security/selinux/h
nd on
http://stud4.tuwien.ac.at/~e8607062/studies/soc/patches/
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
---
arch/i386/kernel/syscall_table.S |1
include/asm-i386/unistd.h|3 -
include/linux/security.h | 25 +++-
kernel/sys.c
On Thu, 2005-08-18 at 04:05 +0200, Andi Kleen wrote:
> Is there a realistic use case where this new system call is actually useful
> and solves something that cannot be solved without it?
As an example: It seems to be a common problem with numerous services to
run out of available file descriptor
.tuwien.ac.at/~e8607062/studies/soc/patches/
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
diff -uprN -X linux-2.6.13-rc6-vanilla/Documentation/dontdiff
linux-2.6.13-rc6-getprlimit/arch/i386/kernel/syscall_table.S
linux-2.6.13-rc6-setprlimit/arch/i386/kernel/syscall_table.S
--- linux-2.6.
the gid, egid, sgid of
the target process.
(This resembles the behaviour of the ptrace system call.)
See the followup for the writing syscall.
Simple programs for testing the syscalls can be found on
http://stud4.tuwien.ac.at/~e8607062/studies/soc/patches/
Signed-off-by: Wieland Gmeiner <[EM
On Sat, 2005-08-13 at 15:11 -0700, Greg KH wrote:
> On Fri, Aug 12, 2005 at 07:48:22PM +0200, Wieland Gmeiner wrote:
> > @@ -294,3 +294,4 @@ ENTRY(sys_call_table)
> > .long sys_inotify_init
> > .long sys_inotify_add_watch
> > .long sys_inotify_rm_watch
> &
whose rlimit
is being written and
the calling process uid equals the euid of the process whose rlimit
is being written
or
- the calling process euid equals the suid of the process whose
rlimit is being written
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
diff -uprN -X linux-
table access is under
construction.
Simple programs for testing the syscalls can be found on
http://stud4.tuwien.ac.at/~e8607062/studies/soc/patches/
Signed-off-by: Wieland Gmeiner <[EMAIL PROTECTED]>
diff -uprN -X linux-2.6.13-rc6-vanilla/Documentation/dontdiff
linux-2.6.13-rc6-van
I want to register a new system call and notice that on several
architectures there is some inconsistency between the system call table
and unistd.h, e.g. (2.6.13-rc2):
in arch/arm/kernel/calls.S:
...
/* 310 */ .long sys_request_key
.long sys_keyctl
.long
13 matches
Mail list logo