Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/lib/librumphijack Document .Ev RUMPHIJACK



details:   https://anonhg.NetBSD.org/src/rev/639c01b0d385
branches:  trunk
changeset: 762253:639c01b0d385
user:      pooka <pooka%NetBSD.org@localhost>
date:      Fri Feb 18 12:22:46 2011 +0000

description:
Document .Ev RUMPHIJACK

diffstat:

 lib/librumphijack/rumphijack.3 |  62 +++++++++++++++++++++++++++++++++++------
 1 files changed, 53 insertions(+), 9 deletions(-)

diffs (90 lines):

diff -r 41bf26f22251 -r 639c01b0d385 lib/librumphijack/rumphijack.3
--- a/lib/librumphijack/rumphijack.3    Fri Feb 18 11:41:32 2011 +0000
+++ b/lib/librumphijack/rumphijack.3    Fri Feb 18 12:22:46 2011 +0000
@@ -1,4 +1,4 @@
-.\"     $NetBSD: rumphijack.3,v 1.3 2011/02/16 19:46:42 pooka Exp $
+.\"     $NetBSD: rumphijack.3,v 1.4 2011/02/18 12:22:46 pooka Exp $
 .\"
 .\" Copyright (c) 2011 Antti Kantee.  All rights reserved.
 .\"
@@ -23,7 +23,7 @@
 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 .\" SUCH DAMAGE.
 .\"
-.Dd February 16, 2011
+.Dd February 18, 2011
 .Dt RUMPHIJACK 3
 .Os
 .Sh NAME
@@ -46,7 +46,57 @@
 The behaviour of hijacked applications is affected by the following
 environment variables:
 .Bl -tag -width 12345
-.It Dv RUMPHIJACK_RETRYCONNECT
+.It Ev RUMPHIJACK
+If present, this variable specifies which system calls should be
+hijacked.
+The string is parsed as a comma-separated list of
+.Dq name=value
+tuples.
+The possible lefthandside names are:
+.Bl -tag -width xxsocketxx
+.It Dq path
+Pathname-based system calls are hijacked if the path the system
+call is directed to resides under
+.Ar value .
+In case of an absolute pathname argument, a direct comparison is made.
+In case of a relative pathname, the current working direct is
+examined.
+.It Dq socket
+The specifier
+.Ar value
+contains a colon-separated list of which protocol families should
+be hijacked.
+The special value
+.Dq all
+can be specified as the first element.
+It indicates that all protocol families should be hijacked.
+Some can then be disabled by prepending
+.Dq no
+to the name of the protocol family.
+.Pp
+For example,
+.Dq inet:inet6
+specifies that only
+.Dv PF_INET
+and
+.Dv PF_INET6
+sockets should be hijacked,
+while
+.Dq all:noinet
+specifies that all protocol families except
+.Dv PF_INET
+should be hijacked.
+.El
+.Pp
+If the environment variable is unset, the default value
+.Qq path=/rump,socket=all:nolocal
+is used.
+The rationale for this is to have networked X clients work
+out-of-the-box: X clients use local sockets to communicate with
+the server, so local sockets must be used as a host service.
+.Pp
+An empty string as a value means no calls are hijacked.
+.It Ev RUMPHIJACK_RETRYCONNECT
 Change how
 .Xr rumpclient 3
 attempts to reconnect to the server in case the connection is lost.
@@ -70,12 +120,6 @@
 .Xr rumpclient 3
 for more discussion.
 .El
-.Pp
-Currently
-.Nm
-supports only TCP/IP related system calls.
-The set of supported subsystems may change later along with the usage
-of the library.
 .Sh EXAMPLES
 Use an alternate TCP/IP stack for firefox with a persistent server
 connection:



Home | Main Index | Thread Index | Old Index