Deleted Added
full compact
geom.4 (144755) geom.4 (147398)
1.\"
2.\" Copyright (c) 2002 Poul-Henning Kamp
3.\" Copyright (c) 2002 Networks Associates Technology, Inc.
4.\" All rights reserved.
5.\"
6.\" This software was developed for the FreeBSD Project by Poul-Henning Kamp
7.\" and NAI Labs, the Security Research Division of Network Associates, Inc.
8.\" under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the

--- 18 unchanged lines hidden (view full) ---

27.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33.\" SUCH DAMAGE.
34.\"
1.\"
2.\" Copyright (c) 2002 Poul-Henning Kamp
3.\" Copyright (c) 2002 Networks Associates Technology, Inc.
4.\" All rights reserved.
5.\"
6.\" This software was developed for the FreeBSD Project by Poul-Henning Kamp
7.\" and NAI Labs, the Security Research Division of Network Associates, Inc.
8.\" under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the

--- 18 unchanged lines hidden (view full) ---

27.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33.\" SUCH DAMAGE.
34.\"
35.\" $FreeBSD: head/share/man/man4/geom.4 144755 2005-04-07 19:59:28Z scottl $
35.\" $FreeBSD: head/share/man/man4/geom.4 147398 2005-06-15 13:31:23Z ru $
36.\"
37.Dd March 27, 2002
38.Os
39.Dt GEOM 4
40.Sh NAME
41.Nm GEOM
42.Nd modular disk I/O request transformation framework.
43.Sh DESCRIPTION

--- 289 unchanged lines hidden (view full) ---

333.Sh DIAGNOSTICS
334Several flags are provided for tracing GEOM operations and unlocking
335protection mechanisms via the
336.Va kern.geom.debugflags
337sysctl.
338All of these flags are off by default, and great care should be taken in
339turning them on.
340.Bl -tag -width FAIL
36.\"
37.Dd March 27, 2002
38.Os
39.Dt GEOM 4
40.Sh NAME
41.Nm GEOM
42.Nd modular disk I/O request transformation framework.
43.Sh DESCRIPTION

--- 289 unchanged lines hidden (view full) ---

333.Sh DIAGNOSTICS
334Several flags are provided for tracing GEOM operations and unlocking
335protection mechanisms via the
336.Va kern.geom.debugflags
337sysctl.
338All of these flags are off by default, and great care should be taken in
339turning them on.
340.Bl -tag -width FAIL
341.It 0x01 (G_T_TOPOLOGY)
341.It 0x01 Pq Dv G_T_TOPOLOGY
342Provide tracing of topology change events.
342Provide tracing of topology change events.
343.It 0x02 (G_T_BIO)
343.It 0x02 Pq Dv G_T_BIO
344Provide tracing of buffer I/O requests.
344Provide tracing of buffer I/O requests.
345.It 0x04 (G_T_ACCESS)
345.It 0x04 Pq Dv G_T_ACCESS
346Provide tracing of access check controls.
347.It 0x08 (unused)
348.It 0x10 (allow foot shooting)
349Allow writing to Rank 1 providers.
350This would, for example, allow the super-user to overwrite the MBR on the root
346Provide tracing of access check controls.
347.It 0x08 (unused)
348.It 0x10 (allow foot shooting)
349Allow writing to Rank 1 providers.
350This would, for example, allow the super-user to overwrite the MBR on the root
351disk or write random sectors elsewhere to a mounted disk. The implications
352are obvious.
353.It 0x20 (G_T_DETAILS)
351disk or write random sectors elsewhere to a mounted disk.
352The implications are obvious.
353.It 0x20 Pq Dv G_T_DETAILS
354This appears to be unused at this time.
354This appears to be unused at this time.
355.It 0x40 (G_F_DISKIOCTL)
355.It 0x40 Pq Dv G_F_DISKIOCTL
356This appears to be unused at this time.
356This appears to be unused at this time.
357.It 0x80 (G_F_CTLDUMP)
357.It 0x80 Pq Dv G_F_CTLDUMP
358Dump contents of gctl requests.
359.El
360.Sh HISTORY
361This software was developed for the FreeBSD Project by Poul-Henning Kamp
358Dump contents of gctl requests.
359.El
360.Sh HISTORY
361This software was developed for the FreeBSD Project by Poul-Henning Kamp
362and NAI Labs, the Security Research Division of Network Associates, Inc.
362and NAI Labs, the Security Research Division of Network Associates, Inc.\&
363under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
364DARPA CHATS research program.
365.Pp
366The first precursor for GEOM was a gruesome hack to Minix 1.2 and was
367never distributed.
368An earlier attempt to implement a less general scheme
369in FreeBSD never succeeded.
370.Sh AUTHORS
371.An "Poul-Henning Kamp" Aq phk@FreeBSD.org
363under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
364DARPA CHATS research program.
365.Pp
366The first precursor for GEOM was a gruesome hack to Minix 1.2 and was
367never distributed.
368An earlier attempt to implement a less general scheme
369in FreeBSD never succeeded.
370.Sh AUTHORS
371.An "Poul-Henning Kamp" Aq phk@FreeBSD.org