From owner-freebsd-stable@FreeBSD.ORG Tue Apr 4 09:31:04 2006 Return-Path: X-Original-To: freebsd-stable@freebsd.org Delivered-To: freebsd-stable@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id CECCD16A41F for ; Tue, 4 Apr 2006 09:31:04 +0000 (UTC) (envelope-from peterjeremy@optushome.com.au) Received: from mail13.syd.optusnet.com.au (mail13.syd.optusnet.com.au [211.29.132.194]) by mx1.FreeBSD.org (Postfix) with ESMTP id 068C843D5C for ; Tue, 4 Apr 2006 09:31:02 +0000 (GMT) (envelope-from peterjeremy@optushome.com.au) Received: from turion.vk2pj.dyndns.org (c220-239-19-236.belrs4.nsw.optusnet.com.au [220.239.19.236]) by mail13.syd.optusnet.com.au (8.12.11/8.12.11) with ESMTP id k349Uxpa023327 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Tue, 4 Apr 2006 19:31:01 +1000 Received: from turion.vk2pj.dyndns.org (localhost.vk2pj.dyndns.org [127.0.0.1]) by turion.vk2pj.dyndns.org (8.13.4/8.13.4) with ESMTP id k349Uwnv050683; Tue, 4 Apr 2006 19:30:58 +1000 (EST) (envelope-from peter@turion.vk2pj.dyndns.org) Received: (from peter@localhost) by turion.vk2pj.dyndns.org (8.13.4/8.13.4/Submit) id k349Uw7v050682; Tue, 4 Apr 2006 19:30:58 +1000 (EST) (envelope-from peter) Date: Tue, 4 Apr 2006 19:30:58 +1000 From: Peter Jeremy To: "Marc G. Fournier" Message-ID: <20060404093058.GF683@turion.vk2pj.dyndns.org> References: <20060403140902.C947@ganymede.hub.org> <20060403182504.S76562@fledge.watson.org> <20060403144916.J947@ganymede.hub.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20060403144916.J947@ganymede.hub.org> X-PGP-Key: http://members.optusnet.com.au/peterjeremy/pubkey.asc User-Agent: Mutt/1.5.11 Cc: freebsd-stable@freebsd.org Subject: Re: [HACKERS] semaphore usage "port based"? X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Apr 2006 09:31:04 -0000 On Mon, 2006-Apr-03 14:55:10 -0300, Marc G. Fournier wrote: >That is all I'm advocatin / asking for ... some way of reverting kill(PID, >0) back to the old, FreeBSD 4.x behaviour, where this works beautifully :( >At least until someone does get around to 'virtualization of SysV IPC' :( There's the old standby: You have the source code. You should be able to get things to work by expanding prison_check() into cr_cansignal() and changing the error return from ESRCH to EPERM. Having not tried this, I can't comment on possible adverse side-effects. -- Peter Jeremy