geom.4 (144755) | geom.4 (147398) |
---|---|
1.\" 2.\" Copyright (c) 2002 Poul-Henning Kamp 3.\" Copyright (c) 2002 Networks Associates Technology, Inc. 4.\" All rights reserved. 5.\" 6.\" This software was developed for the FreeBSD Project by Poul-Henning Kamp 7.\" and NAI Labs, the Security Research Division of Network Associates, Inc. 8.\" under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the --- 18 unchanged lines hidden (view full) --- 27.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" | 1.\" 2.\" Copyright (c) 2002 Poul-Henning Kamp 3.\" Copyright (c) 2002 Networks Associates Technology, Inc. 4.\" All rights reserved. 5.\" 6.\" This software was developed for the FreeBSD Project by Poul-Henning Kamp 7.\" and NAI Labs, the Security Research Division of Network Associates, Inc. 8.\" under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the --- 18 unchanged lines hidden (view full) --- 27.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" |
35.\" $FreeBSD: head/share/man/man4/geom.4 144755 2005-04-07 19:59:28Z scottl $ | 35.\" $FreeBSD: head/share/man/man4/geom.4 147398 2005-06-15 13:31:23Z ru $ |
36.\" 37.Dd March 27, 2002 38.Os 39.Dt GEOM 4 40.Sh NAME 41.Nm GEOM 42.Nd modular disk I/O request transformation framework. 43.Sh DESCRIPTION --- 289 unchanged lines hidden (view full) --- 333.Sh DIAGNOSTICS 334Several flags are provided for tracing GEOM operations and unlocking 335protection mechanisms via the 336.Va kern.geom.debugflags 337sysctl. 338All of these flags are off by default, and great care should be taken in 339turning them on. 340.Bl -tag -width FAIL | 36.\" 37.Dd March 27, 2002 38.Os 39.Dt GEOM 4 40.Sh NAME 41.Nm GEOM 42.Nd modular disk I/O request transformation framework. 43.Sh DESCRIPTION --- 289 unchanged lines hidden (view full) --- 333.Sh DIAGNOSTICS 334Several flags are provided for tracing GEOM operations and unlocking 335protection mechanisms via the 336.Va kern.geom.debugflags 337sysctl. 338All of these flags are off by default, and great care should be taken in 339turning them on. 340.Bl -tag -width FAIL |
341.It 0x01 (G_T_TOPOLOGY) | 341.It 0x01 Pq Dv G_T_TOPOLOGY |
342Provide tracing of topology change events. | 342Provide tracing of topology change events. |
343.It 0x02 (G_T_BIO) | 343.It 0x02 Pq Dv G_T_BIO |
344Provide tracing of buffer I/O requests. | 344Provide tracing of buffer I/O requests. |
345.It 0x04 (G_T_ACCESS) | 345.It 0x04 Pq Dv G_T_ACCESS |
346Provide tracing of access check controls. 347.It 0x08 (unused) 348.It 0x10 (allow foot shooting) 349Allow writing to Rank 1 providers. 350This would, for example, allow the super-user to overwrite the MBR on the root | 346Provide tracing of access check controls. 347.It 0x08 (unused) 348.It 0x10 (allow foot shooting) 349Allow writing to Rank 1 providers. 350This would, for example, allow the super-user to overwrite the MBR on the root |
351disk or write random sectors elsewhere to a mounted disk. The implications 352are obvious. 353.It 0x20 (G_T_DETAILS) | 351disk or write random sectors elsewhere to a mounted disk. 352The implications are obvious. 353.It 0x20 Pq Dv G_T_DETAILS |
354This appears to be unused at this time. | 354This appears to be unused at this time. |
355.It 0x40 (G_F_DISKIOCTL) | 355.It 0x40 Pq Dv G_F_DISKIOCTL |
356This appears to be unused at this time. | 356This appears to be unused at this time. |
357.It 0x80 (G_F_CTLDUMP) | 357.It 0x80 Pq Dv G_F_CTLDUMP |
358Dump contents of gctl requests. 359.El 360.Sh HISTORY 361This software was developed for the FreeBSD Project by Poul-Henning Kamp | 358Dump contents of gctl requests. 359.El 360.Sh HISTORY 361This software was developed for the FreeBSD Project by Poul-Henning Kamp |
362and NAI Labs, the Security Research Division of Network Associates, Inc. | 362and NAI Labs, the Security Research Division of Network Associates, Inc.\& |
363under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the 364DARPA CHATS research program. 365.Pp 366The first precursor for GEOM was a gruesome hack to Minix 1.2 and was 367never distributed. 368An earlier attempt to implement a less general scheme 369in FreeBSD never succeeded. 370.Sh AUTHORS 371.An "Poul-Henning Kamp" Aq phk@FreeBSD.org | 363under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the 364DARPA CHATS research program. 365.Pp 366The first precursor for GEOM was a gruesome hack to Minix 1.2 and was 367never distributed. 368An earlier attempt to implement a less general scheme 369in FreeBSD never succeeded. 370.Sh AUTHORS 371.An "Poul-Henning Kamp" Aq phk@FreeBSD.org |