Re: valgrind or workalike on FreeBSD/amd64 7.0/8.0?

2008-02-16 Thread Christian S.J. Peron
On Tue, Feb 12, 2008 at 11:51:19AM -0800, Xin LI wrote: [..] > > Hi, > > Is there anyone working on valgrind on newer FreeBSD releases, or some > work-alikes? > > Cheers, Yes, check out the //depot/projects/valgrind/... perforce project. It works pretty well. __

Re: auditpipe leak?

2007-10-23 Thread Christian S.J. Peron
devfs would've been enough, in retrospect). > This is not a leak, this is a side effect of how device cloning works in devfs. IIRC these will be garbaged collected at some point, and faster if the system requires the resources. -- Christian S.J. Per

Re: Segfault in praudit

2007-10-23 Thread Christian S.J. Peron
ame. > > -- > dc > ___ > freebsd-hackers@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "[EMAIL PROTECTED]" -- Christian S.J. Peron [EMAIL PROTECTED]

Re: audit doesn't seem to be working correctly.

2007-10-08 Thread Christian S.J. Peron
this information, we can get to the bottom of this. -- Christian S.J. Peron [EMAIL PROTECTED] FreeBSD Committer ___ freebsd-hackers@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: audit doesn't seem to be working correctly.

2007-10-08 Thread Christian S.J. Peron
On Mon, Oct 08, 2007 at 01:18:28PM -0500, Christian S.J. Peron wrote: > Please try the attached patch: > > cp audit.diff /usr/src/sys > patch < audit.diff > > Recompile your kernel. > > If please report success/failure to me. > Actually.. ignore this patch. So

Re: audit doesn't seem to be working correctly.

2007-10-08 Thread Christian S.J. Peron
___ > freebsd-hackers@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "[EMAIL PROTECTED]" -- Christian S.J. Peron [EMAIL PROTECTED] FreeBSD Committer Index: kern/kern_prot.c

Re: audit doesn't seem to be working correctly.

2007-10-07 Thread Christian S.J. Peron
2-RELEASE-p7 which is vanilla apart from the > addition of options MAC, AUDIT and VESA. > > -- > dc > ___ > freebsd-hackers@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "[EMAIL PROTECTED]" --

RE: FreeBSD trusted execution system: beta testers wanted

2005-03-19 Thread Christian S.J. Peron
tch http://www.freebsd.org/~csjp/mac/mac_chkexec.165827.shar sh mac_chkexec.165827.shar cd /usr/src/sys/modules/mac_chkexec make make install make clean -- Christian S.J. Peron [EMAIL PROTECTED] FreeBSD Committer ___ freebsd-hackers@freebsd.org mailing l

FreeBSD trusted execution system: beta testers wanted

2005-03-11 Thread Christian S.J. Peron
ity.mac.chkexec.cache.objmax=1024 Good luck & Thanks! -- Christian S.J. Peron [EMAIL PROTECTED] FreeBSD Committer ___ freebsd-hackers@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: GNUstep and libkvm

2005-01-07 Thread Christian S.J. Peron
rocess environment to get rid of the procfs requirement. pjd has some work done on this but it has not been committed yet. Hope this answers your question. Regards Christian S.J. Peron ___ freebsd-hackers@freebsd.org mailing list http://lists.freebsd.or

Re: fixes for ipfw and pf lock ordering issues

2004-09-28 Thread Christian S.J. Peron
*gid = inp_arg->inp_socket->so_cred->cr_groups[0]; > 2416return (1); > 2417} > 2418#endif > Looks like it could be a bad pointer dereference, have you recompiled your kernel and the pf/ipfw modules? If not, please try r

fixes for ipfw and pf lock ordering issues

2004-09-24 Thread Christian S.J. Peron
ser/group/jail based firewall rules Remember, these are pretty beta so ... be gentle :) -- Christian S.J. Peron [EMAIL PROTECTED] FreeBSD Committer ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscr

Re: shared memory in jails

2004-08-27 Thread Christian S.J. Peron
oblem, however I have not had much time to look into it. -- Christian S.J. Peron [EMAIL PROTECTED] FreeBSD Committer ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to "[EMAIL PROTECTED]"

[patch] attach ipfw rules to jails

2004-07-05 Thread Christian S.J. Peron
Syntax: ipfw add count ip from any to any jail 1 "jail" takes a numeric argument, a jail ID. For those of you who dont know, jail IDs can be retrieved using the jls(8) utility. Input would be greatly appriciated. Thanks! -- Christian S.J. Peron [EMAIL PROTECTED]

Re: ipfw cached ucred patch

2004-06-02 Thread Christian S.J. Peron
I understand what you are saying. The only real other choice would be to copy out the entire cr_groups array. Do you know if this copy would be more expensive then the mutex lock/unlock associated with grabbing a reference to the ucred? -- Christian S.J. Peron [EMAIL PROTECTED] FreeBSD

Re: ipfw cached ucred patch

2004-06-02 Thread Christian S.J. Peron
make sure there are no return, continues or breaks etc which could cause the ucred to be leaked. On 2 Jun 2004 Andre Oppermann wrote: > Christian S.J. Peron wrote: > >On 2 Jun 2004 Andre Oppermann wrote: > > > >>Christian S.J. Peron wrote: > >> > >>>

Re: ipfw cached ucred patch

2004-06-02 Thread Christian S.J. Peron
On 2 Jun 2004 Andre Oppermann wrote: > Christian S.J. Peron wrote: > >All, > > > >Currently, when you have any rules which contain UID/GID > >constraints, ipfw will lock the pcb hash and do a lookup > >to find the pcb associated with that packet -- > >

ipfw cached ucred patch

2004-06-01 Thread Christian S.J. Peron
NOTE: It also appears that ip_output passes a reference to the PCB. Perhaps we can hold a reference to the ucred stored in that entry and do away with lookups on outgoing packets all-together? -- Christian S.J. Peron [EMAIL PROTECTED] FreeBSD Committer

Re: [patch] Raw sockets in jails

2004-04-22 Thread Christian S.J. Peron
appear to work, however I ask for people to test and scrutinize these patches. Feedback/comments are welcome. Regards Christian S.J. Peron > new and improved patch <--- --- sys/kern/kern_jail.c.bakMon Apr 19 16:55:40 2004 +++ sys/kern/kern_jail.cMon Apr 19 17:56:0

Re: [patch] Raw sockets in jails

2004-04-21 Thread Christian S.J. Peron
create_raw_sockets MIB all together). Anyway, take a gander at it (testers feedback welcome): Regards Christian S.J. Peron --- sys/netinet/raw_ip.c.b Mon Apr 19 16:23:57 2004 +++ sys/netinet/raw_ip.cTue Apr 20 19:43:30 2004 @@ -40,6 +40,7 @@ #include "opt_random_ip_id.h"

[patch] Raw sockets in jails

2004-04-20 Thread Christian S.J. Peron
Although RAW sockets can be used when specifying the source address of packets (defeating one of the aspects of the jail) some people may find it usefull to use utilities like ping(8) or traceroute(8) from inside jails. Enclosed is a patch I have written wh