Language Translated Untranslated Untranslated words Checks Suggestions Comments
English This translation is used for source strings. This component is linked to the Documentation/articles/bsdl-gpl repository. BSD-2-Clause 12
Chinese (Simplified) (zh_CN) This component is linked to the Documentation/articles/bsdl-gpl repository. BSD-2-Clause 17% 76 2,634
Chinese (Traditional) (zh_TW) This component is linked to the Documentation/articles/bsdl-gpl repository. BSD-2-Clause 0% 92 2,701
Dutch (nl_NL) This component is linked to the Documentation/articles/bsdl-gpl repository. BSD-2-Clause 0% 92 2,701
French (fr_FR) This component is linked to the Documentation/articles/bsdl-gpl repository. BSD-2-Clause 0% 92 2,701
German (de_DE) This component is linked to the Documentation/articles/bsdl-gpl repository. BSD-2-Clause 0% 92 2,701
Italian (it_IT) This component is linked to the Documentation/articles/bsdl-gpl repository. BSD-2-Clause 0% 92 2,701
Norwegian Bokmål This component is linked to the Documentation/articles/bsdl-gpl repository. BSD-2-Clause 0% 92 2,701
Persian This component is linked to the Documentation/articles/bsdl-gpl repository. BSD-2-Clause 3% 89 2,698
Portuguese (Brazil) This component is linked to the Documentation/articles/bsdl-gpl repository. BSD-2-Clause 6% 86 2,691 2 1
Spanish This component is linked to the Documentation/articles/bsdl-gpl repository. BSD-2-Clause 15% 78 2,637
Turkish (tr_TR) This component is linked to the Documentation/articles/bsdl-gpl repository. BSD-2-Clause 0% 92 2,701
Please sign in to see the alerts.
Project website docs.freebsd.org/en
Translation process
  • Translations can be made directly.
  • Translation suggestions can be made.
  • Only chosen users can contribute.
  • The translation uses bilingual files.
Translation license BSD 2-Clause "Simplified" License
Filemask documentation/content/*/books/arch-handbook/jail/chapter.po
Languages 12
Source strings 92
Source words 2,701
Source characters 20,132
Hosted strings 1,104
Hosted words 32,412
Hosted characters 241,584
There are certain protocols which are very common, such as TCP, UDP, IP and ICMP. IP and ICMP are on the same level: the network layer 2. There are certain precautions which are taken in order to prevent a jailed process from binding a protocol to a certain address only if the `nam` parameter is set. `nam` is a pointer to a `sockaddr` structure, which describes the address on which to bind the service. A more exact definition is that `sockaddr` "may be used as a template for referring to the identifying tag and length of each address". In the function `in_pcbbind_setup()`, `sin` is a pointer to a `sockaddr_in` structure, which contains the port, address, length and domain family of the socket which is to be bound. Basically, this disallows any processes from jail to be able to specify the address that does not belong to the jail in which the calling process exists.
网络协议TCP, UDP, IP和ICMP很常见。IP和ICMP处于同一协议层次:第二层,网络层。当参数<literal>nam</literal>被设置时,有一些限制措施会防止被囚禁的程序绑定到一些网络接口上。<literal>nam</literal>是一个指向<literal>sockaddr</literal>结构体的指针,描述可以绑定服务的地址。一个更确切的定义:<literal>sockaddr</literal>“是一个模板,包含了地址的标识符和地址的长度”。在函数<literal>in_pcbbind_setup()</literal>中<literal>sin</literal>是一个指向<literal>sockaddr_in</literal>结构体的指针,这个结构体包含了套接字可以绑定的端口、地址、长度、协议族。这就禁止了在<application>jail</application>中的进程指定不属于这个进程所存在于的<application>jail</application>的IP地址。
3 days ago
New contributor 3 days ago
/usr/include/sys/jail.h:
struct prison {
LIST_ENTRY(prison) pr_list; /* (a) all prisons */
int pr_id; /* (c) prison id */
int pr_ref; /* (p) refcount */
char pr_path[MAXPATHLEN]; /* (c) chroot path */
struct vnode *pr_root; /* (c) vnode to rdir */
char pr_host[MAXHOSTNAMELEN]; /* (p) jail hostname */
u_int32_t pr_ip; /* (c) ip addr host */
void *pr_linux; /* (p) linux abi */
int pr_securelevel; /* (p) securelevel */
struct task pr_task; /* (d) destroy task */
struct mtx pr_mtx;
void **pr_slots; /* (p) additional data */
};
<filename>/usr/include/sys/jail.h</filename>:
struct prison {
LIST_ENTRY(prison) pr_list; /* (a) all prisons */
int pr_id; /* (c) prison id */
int pr_ref; /* (p) refcount */
char pr_path[MAXPATHLEN]; /* (c) chroot path */
struct vnode *pr_root; /* (c) vnode to rdir */
char pr_host[MAXHOSTNAMELEN]; /* (p) jail hostname */
u_int32_t pr_ip; /* (c) ip addr host */
void *pr_linux; /* (p) linux abi */
int pr_securelevel; /* (p) securelevel */
struct task pr_task; /* (d) destroy task */
struct mtx pr_mtx;
void **pr_slots; /* (p) additional data */
};
3 days ago
New contributor 3 days ago
User avatar None

Automatic translation

Documentation / books/arch-handbook/jail/chapterSpanish

There are certain protocols which are very common, such as TCP, UDP, IP and ICMP. IP and ICMP are on the same level: the network layer 2. There are certain precautions which are taken in order to prevent a jailed process from binding a protocol to a certain address only if the `nam` parameter is set. `nam` is a pointer to a `sockaddr` structure, which describes the address on which to bind the service. A more exact definition is that `sockaddr` "may be used as a template for referring to the identifying tag and length of each address". In the function `in_pcbbind_setup()`, `sin` is a pointer to a `sockaddr_in` structure, which contains the port, address, length and domain family of the socket which is to be bound. Basically, this disallows any processes from jail to be able to specify the address that does not belong to the jail in which the calling process exists.
Hay ciertos protocolos que son muy comunes, como TCP, UDP, IP e ICMP. IP e ICMP están en el mismo nivel: la capa de red 2. Hay ciertas precauciones que se toman para evitar que un proceso encerrado vincule un protocolo a una determinada dirección solo si el <literal>nam</literal> el parámetro está configurado. <literal>nam</literal>Es un puntero a un <literal>sockaddr</literal> estructura, que describe la dirección a la que enlazar el servicio. Una definición más exacta es que <literal>sockaddr</literal> "se puede utilizar como plantilla para hacer referencia a la etiqueta de identificación y la longitud de cada dirección ". En la función <literal>in_pcbbind_setup()</literal>, <literal>sin</literal> Es un puntero a un <literal>sockaddr_in</literal> estructura, que contiene el puerto, la dirección, la longitud y la familia de dominio del socket que se va a vincular. Básicamente, esto no permite ningún proceso de <application>jail</application>para poder especificar la dirección que no pertenece al <application>jail</application>en el que existe el proceso de llamada.
6 days ago
New contributor 6 days ago
User avatar None

Component automatically unlocked

Documentation / books/arch-handbook/jail/chapter

Component automatically unlocked 6 days ago
User avatar None

Component automatically locked

Documentation / books/arch-handbook/jail/chapter

Component automatically locked a week ago
Could not push the repository. a week ago
/usr/include/sys/jail.h:
struct prison {
LIST_ENTRY(prison) pr_list; /* (a) all prisons */
int pr_id; /* (c) prison id */
int pr_ref; /* (p) refcount */
char pr_path[MAXPATHLEN]; /* (c) chroot path */
struct vnode *pr_root; /* (c) vnode to rdir */
char pr_host[MAXHOSTNAMELEN]; /* (p) jail hostname */
u_int32_t pr_ip; /* (c) ip addr host */
void *pr_linux; /* (p) linux abi */
int pr_securelevel; /* (p) securelevel */
struct task pr_task; /* (d) destroy task */
struct mtx pr_mtx;
void **pr_slots; /* (p) additional data */
};
<filename>/usr/include/sys/jail.h</filename>:
struct prison {
LIST_ENTRY(prison) pr_list; /* (a) all prisons */
int pr_id; /* (c) prison id */
int pr_ref; /* (p) refcount */
char pr_path[MAXPATHLEN]; /* (c) chroot path */
struct vnode *pr_root; /* (c) vnode to rdir */
char pr_host[MAXHOSTNAMELEN]; /* (p) jail hostname */
u_int32_t pr_ip; /* (c) ip addr host */
void *pr_linux; /* (p) linux abi */
int pr_securelevel; /* (p) securelevel */
struct task pr_task; /* (d) destroy task */
struct mtx pr_mtx;
void **pr_slots; /* (p) additional data */
};
8 days ago
Browse all component changes

Daily activity

Daily activity

Weekly activity

Weekly activity