Blame


1 063e17c1 2021-12-15 op - compile with -D_FILE_OFFSET_BITS=64 on linux.
2 063e17c1 2021-12-15 op related: this is needed only for glibc or musl too?
3 063e17c1 2021-12-15 op
4 063e17c1 2021-12-15 op - (possibly related) find out what pread(2) black magic we can do to
5 063e17c1 2021-12-15 op read stuff on 32 bits
6 c6f9745e 2021-12-15 op
7 c6f9745e 2021-12-15 op - rework the ninepscript so tests are parsed and executed by the _kamid
8 c6f9745e 2021-12-15 op user and not by root.
9 335ce51d 2021-12-16 op
10 335ce51d 2021-12-16 op - tweak iounit so it's always lower than the choosen msize
11 423f02f5 2021-12-28 cage
12 423f02f5 2021-12-28 cage - handle message bigger than MAX_IMSGSIZE - IMSG_HEADER_SIZE. One
13 423f02f5 2021-12-28 cage way to do that would be to *not* use asynchroonus imsgs in client.c
14 423f02f5 2021-12-28 cage but synchronous I/O: this way, once a message has been processed,
15 423f02f5 2021-12-28 cage we can just receive the next in the same function (i.e. twrite) and
16 423f02f5 2021-12-28 cage go ahead.
17 5817aa44 2021-12-28 op
18 5817aa44 2021-12-28 op - fill user and group name in struct stat. The problem is that, being
19 5817aa44 2021-12-28 op chrooted, we don't have access to /etc/passwd nor /etc/group. We
20 5817aa44 2021-12-28 op could use setpassent(3) and setgroupent(3), but if they change in the
21 5817aa44 2021-12-28 op meantime we can't do anything. Another solution would be to not
22 5817aa44 2021-12-28 op to chroot(2) and just switch to the targeted user.