<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/fs/devfs/devfs_rule.c, branch upstream/11.1.0</title>
<subtitle>FreeBSD source tree</subtitle>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/'/>
<entry>
<title>make path matching in devfs rules consistent and sane (and safer)</title>
<updated>2013-07-26T14:25:58+00:00</updated>
<author>
<name>Andriy Gapon</name>
<email>avg@FreeBSD.org</email>
</author>
<published>2013-07-26T14:25:58+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=8e94193e58657c5b88b9d0e9049b2db7b5664e1e'/>
<id>8e94193e58657c5b88b9d0e9049b2db7b5664e1e</id>
<content type='text'>
Before this change path matching had the following features:
- for device nodes the patterns were matched against full path
- in the above case '/' in a path could be matched by a wildcard
- for directories and links only the last component was matched

So, for example, a pattern like 're*' could match the following entries:
- re0 device
- responder/u0 device
- zvol/recpool directory

Although it was possible to work around this behavior (once it was spotted
and understood), it was very confusing and contrary to documentation.

Now we always match a full path for all types of devfs entries (devices,
directories, links) and a '/' has to be matched explicitly.
This behavior follows the shell globbing rules.

This change is originally developed by Jaakko Heinonen.
Many thanks!

PR:		kern/122838
Submitted by:	jh
MFC after:	4 weeks
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Before this change path matching had the following features:
- for device nodes the patterns were matched against full path
- in the above case '/' in a path could be matched by a wildcard
- for directories and links only the last component was matched

So, for example, a pattern like 're*' could match the following entries:
- re0 device
- responder/u0 device
- zvol/recpool directory

Although it was possible to work around this behavior (once it was spotted
and understood), it was very confusing and contrary to documentation.

Now we always match a full path for all types of devfs entries (devices,
directories, links) and a '/' has to be matched explicitly.
This behavior follows the shell globbing rules.

This change is originally developed by Jaakko Heinonen.
Many thanks!

PR:		kern/122838
Submitted by:	jh
MFC after:	4 weeks
</pre>
</div>
</content>
</entry>
<entry>
<title>Introduce the "ruleset=number" option for devfs(5) mounts.</title>
<updated>2012-02-09T10:09:12+00:00</updated>
<author>
<name>Martin Matuska</name>
<email>mm@FreeBSD.org</email>
</author>
<published>2012-02-09T10:09:12+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=17d84d611f995d5d33602ff8aed1ae6d2a3ea92c'/>
<id>17d84d611f995d5d33602ff8aed1ae6d2a3ea92c</id>
<content type='text'>
Add support for updating the devfs mount (currently only changing the
ruleset number is supported).
Check mnt_optnew with vfs_filteropt(9).

This new option sets the specified ruleset number as the active ruleset
of the new devfs mount and applies all its rules at mount time. If the
specified ruleset doesn't exist, a new empty ruleset is created.

MFC after:	1 month
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Add support for updating the devfs mount (currently only changing the
ruleset number is supported).
Check mnt_optnew with vfs_filteropt(9).

This new option sets the specified ruleset number as the active ruleset
of the new devfs mount and applies all its rules at mount time. If the
specified ruleset doesn't exist, a new empty ruleset is created.

MFC after:	1 month
</pre>
</div>
</content>
</entry>
<entry>
<title>- fix duplicate "a a" in some comments</title>
<updated>2011-11-13T17:06:33+00:00</updated>
<author>
<name>Eitan Adler</name>
<email>eadler@FreeBSD.org</email>
</author>
<published>2011-11-13T17:06:33+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=3b6dc18ef553ab572cca0be3ce55e0132f35b0fb'/>
<id>3b6dc18ef553ab572cca0be3ce55e0132f35b0fb</id>
<content type='text'>
Submitted by:	eadler
Approved by:	simon
MFC after:	3 days
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Submitted by:	eadler
Approved by:	simon
MFC after:	3 days
</pre>
</div>
</content>
</entry>
<entry>
<title>- Assert that dm_lock is exclusively held in devfs_rules_apply() and</title>
<updated>2010-12-15T16:42:44+00:00</updated>
<author>
<name>Jaakko Heinonen</name>
<email>jh@FreeBSD.org</email>
</author>
<published>2010-12-15T16:42:44+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=ef456eec9533e1777fad9e48a34c6f4877e8da96'/>
<id>ef456eec9533e1777fad9e48a34c6f4877e8da96</id>
<content type='text'>
  in devfs_vmkdir() while adding the entry to de_list of the parent.
- Apply devfs rules to newly created directories and symbolic links.

PR:		kern/125034
Submitted by:	Mateusz Guzik (original version)
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
  in devfs_vmkdir() while adding the entry to de_list of the parent.
- Apply devfs rules to newly created directories and symbolic links.

PR:		kern/125034
Submitted by:	Mateusz Guzik (original version)
</pre>
</div>
</content>
</entry>
<entry>
<title>Handle the special ruleset 0 in devfs_ruleset_use(). An attempt set the</title>
<updated>2010-12-12T08:52:13+00:00</updated>
<author>
<name>Jaakko Heinonen</name>
<email>jh@FreeBSD.org</email>
</author>
<published>2010-12-12T08:52:13+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=2f66e90fc7408b8dd0d7eb726a9ae9f079175816'/>
<id>2f66e90fc7408b8dd0d7eb726a9ae9f079175816</id>
<content type='text'>
current ruleset to 0 with command "devfs ruleset 0" triggered a KASSERT
in devfs_ruleset_create().

PR:		kern/125030
Submitted by:	Mateusz Guzik
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
current ruleset to 0 with command "devfs ruleset 0" triggered a KASSERT
in devfs_ruleset_create().

PR:		kern/125030
Submitted by:	Mateusz Guzik
</pre>
</div>
</content>
</entry>
<entry>
<title>Add new make_dev_p(9) flag MAKEDEV_ETERNAL to inform devfs that created</title>
<updated>2010-08-06T09:42:15+00:00</updated>
<author>
<name>Konstantin Belousov</name>
<email>kib@FreeBSD.org</email>
</author>
<published>2010-08-06T09:42:15+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=3979450b4cca0a16d6e71b5856e7642c28ddd063'/>
<id>3979450b4cca0a16d6e71b5856e7642c28ddd063</id>
<content type='text'>
cdev will never be destroyed. Propagate the flag to devfs vnodes as
VV_ETERNVALDEV. Use the flags to avoid acquiring devmtx and taking a
thread reference on such nodes.

In collaboration with:	pho
MFC after:	1 month
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
cdev will never be destroyed. Propagate the flag to devfs vnodes as
VV_ETERNVALDEV. Use the flags to avoid acquiring devmtx and taking a
thread reference on such nodes.

In collaboration with:	pho
MFC after:	1 month
</pre>
</div>
</content>
</entry>
<entry>
<title>Get pointer to devfs_ruleset struct after garbage collection has been</title>
<updated>2008-06-22T14:34:38+00:00</updated>
<author>
<name>Oleksandr Tymoshenko</name>
<email>gonzo@FreeBSD.org</email>
</author>
<published>2008-06-22T14:34:38+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=2da528a74fd17355573de1365c381dd3bbff7573'/>
<id>2da528a74fd17355573de1365c381dd3bbff7573</id>
<content type='text'>
performed. Otherwise if ruleset is used by given mountpoint and is empty
it's freed by devfs_ruleset_reap and pointer becomes bogus.

Submitted by:   Mateusz Guzik &lt;mjguzik@gmail.com&gt;
PR:             kern/124853
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
performed. Otherwise if ruleset is used by given mountpoint and is empty
it's freed by devfs_ruleset_reap and pointer becomes bogus.

Submitted by:   Mateusz Guzik &lt;mjguzik@gmail.com&gt;
PR:             kern/124853
</pre>
</div>
</content>
</entry>
<entry>
<title>Do not dereference cdev-&gt;si_cdevsw, use the dev_refthread() to properly</title>
<updated>2008-03-20T16:08:42+00:00</updated>
<author>
<name>Konstantin Belousov</name>
<email>kib@FreeBSD.org</email>
</author>
<published>2008-03-20T16:08:42+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=91a35e787094b1aca363bfd0ec8380d9a38ada53'/>
<id>91a35e787094b1aca363bfd0ec8380d9a38ada53</id>
<content type='text'>
obtain the reference. In particular, this fixes the panic reported in
the PR. Remove the comments stating that this needs to be done.

PR:	kern/119422
MFC after:	1 week
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
obtain the reference. In particular, this fixes the panic reported in
the PR. Remove the comments stating that this needs to be done.

PR:	kern/119422
MFC after:	1 week
</pre>
</div>
</content>
</entry>
<entry>
<title>Sweep kernel replacing suser(9) calls with priv(9) calls, assigning</title>
<updated>2006-11-06T13:42:10+00:00</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2006-11-06T13:42:10+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=acd3428b7d3e94cef0e1881c868cb4b131d4ff41'/>
<id>acd3428b7d3e94cef0e1881c868cb4b131d4ff41</id>
<content type='text'>
specific privilege names to a broad range of privileges.  These may
require some future tweaking.

Sponsored by:           nCircle Network Security, Inc.
Obtained from:          TrustedBSD Project
Discussed on:           arch@
Reviewed (at least in part) by: mlaier, jmg, pjd, bde, ceri,
                        Alex Lyashkov &lt;umka at sevcity dot net&gt;,
                        Skip Ford &lt;skip dot ford at verizon dot net&gt;,
                        Antoine Brodin &lt;antoine dot brodin at laposte dot net&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
specific privilege names to a broad range of privileges.  These may
require some future tweaking.

Sponsored by:           nCircle Network Security, Inc.
Obtained from:          TrustedBSD Project
Discussed on:           arch@
Reviewed (at least in part) by: mlaier, jmg, pjd, bde, ceri,
                        Alex Lyashkov &lt;umka at sevcity dot net&gt;,
                        Skip Ford &lt;skip dot ford at verizon dot net&gt;,
                        Antoine Brodin &lt;antoine dot brodin at laposte dot net&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove the NDEVFSINO and NDEVFSOVERFLOW options which no longer exists in</title>
<updated>2006-07-17T09:07:02+00:00</updated>
<author>
<name>Poul-Henning Kamp</name>
<email>phk@FreeBSD.org</email>
</author>
<published>2006-07-17T09:07:02+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=9c499ad92f03f9ffbbe9d2e437f3186371ca9416'/>
<id>9c499ad92f03f9ffbbe9d2e437f3186371ca9416</id>
<content type='text'>
DEVFS.

Remove the opt_devfs.h file now that it is empty.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
DEVFS.

Remove the opt_devfs.h file now that it is empty.
</pre>
</div>
</content>
</entry>
</feed>
