diff options
author | Justus Winter <justus@gnupg.org> | 2017-03-09 23:55:12 +0100 |
---|---|---|
committer | Justus Winter <justus@gnupg.org> | 2017-03-11 18:07:23 +0100 |
commit | 34a94ce86b1bada9c0768f631540735d44f41100 (patch) | |
tree | c0e2871ecb2466ea001d9be505b05fdc10702087 /NEWS | |
parent | baf7e5c8ce176aead15c2559952d8bdf0da41ffd (diff) | |
download | hurd-34a94ce86b1bada9c0768f631540735d44f41100.tar.gz hurd-34a94ce86b1bada9c0768f631540735d44f41100.tar.bz2 hurd-34a94ce86b1bada9c0768f631540735d44f41100.zip |
proc: Hierarchical proc servers.
Previously, a Subhurd's tasks were shown as weird processes in the
Motherhurd. This change connects the proc server in the Motherhurd
with the proc server in the Subhurd, embedding the Subhurd's process
hierarchy. Subhurd's processes can now be inspected and debugged like
any other process.
* NEWS: Update.
* boot/boot.c (mach_msg_forward): New function.
(boot_demuxer): Forward messages arriving on the new task notification
port from the proc server, and forward them to the proc server inside
the Subhurd via the notification port.
* proc/info.c (S_proc_task2proc): Relay request for processes in a task
namespace to the Subhurd's proc server.
(S_proc_pid2proc): Likewise.
(S_proc_getprocargs): Likewise.
(S_proc_getprocenv): Likewise.
(S_proc_getprocinfo): Likewise. Translate PIDs.
(S_proc_getloginid): Likewise.
(S_proc_getloginpids): Likewise.
* proc/mgt.c (namespace_is_subprocess): New function.
(namespace_translate_pids): Likewise.
* proc/msg.c (S_proc_getmsgport): Relay request for processes in a task
namespace to the Subhurd's proc server.
* proc/pgrp.c (S_proc_getsid): Likewise. Translate PIDs.
(S_proc_getsessionpids): Likewise.
(S_proc_getsessionpgids): Likewise.
(S_proc_getpgrppids): Likewise.
* proc/proc.h (namespace_is_subprocess): New prototype.
(namespace_translate_pids): Likewise.
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 6 |
1 files changed, 6 insertions, 0 deletions
@@ -1,3 +1,9 @@ +Version X (2017-06-XX) + +Subhurd's processes are now properly embedded in the Motherhurds +process hierarchy. They can be inspected and debugged just like any +other process. + Version 0.9 (2016-12-18) The 'boot' program can now be run as unprivileged user, allowing any |