I keep on getting debug messages like this, both at startup
and right before any sound plays:
Jun 14 23:44:38 teqnix kernel: /usr/src/sys/vm/uma_core.c:1327: could
sleep with
"pcm0:play:0" locked from /usr/src/sys/dev/sound/pcm/dsp.c:713
heyeh, Jun 14 23:44:38 teqnix kernel: /usr/src/sys/vm/uma_
Hey guys.
heh. Sorry about that, I just fixed it and it all works fine. :-) Exams are
making my brain fry.
Here is the revised patch.
Thanks,
- Evan
--- jail.c Mon Jul 30 06:19:54 2001
+++ jail.modMon Dec 10 14:00:57 2001
@@ -10,9 +10,8 @@
*
*/
-#include
+#include
#include
Hello,
I've been reading this thread. I made the augustments to the
patch so that it first checks if it is an IP address, if it is not,
it then tries to see if it is a hostname. If neither are true
it exits with an error.
Hope this is what you're looking for,
Evan
--- jail.c Mon Jul 30 06:
Hello,
I wrote this a while ago, but, if anyone is interested, please
take a look: this module implements a system call that takes
a u_int_32t. This system call, named killjail, kills all processes
which belong to the jail which uses that particular IP address.
I included it in a tar with a make
Did you type make init_sysent.c, after editing syscalls.master?
- Evan
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message
Hello,
Just to clarify things for everyone who may be having this probme:
there is a panic on bootup with current, within the witness* code.
You can avoid this by commenting out WITNESS in your kernel configuration
and recompiling. It worked for me..
Hope this helps someone.
Thanks,
Evan
John
Hello,
After compiling a new kernel, installing it, when my laptop
tries to mount its drive, it panics with this message:
panic: lock (sleep mutex) vnode interlock not locked @
../../../kern/vfs_default.c:460
which is:
if (ap->a_flags & LK_INTERLOCK)
mtx_unlock(&ap->a_vp->v_int
Hello,
Since the relaes for 5.0 was extended another year, an interesting
feature I'd like to see go in to the kernel is hooks. So users
can add extra security checks.. etc. There's a project in its
beginnings right now,
www.freesoftware.fsf.org/jailuser/
Think anyone could join the prfw mailing
Hey,
I have a question about sysent. If a modification
to a processes p->p_sysent and associated substructures
are made, are the changes propagated through fork
to children?
Thanks,
Evan
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the mess
d.org/cgi/query-pr.cgi?pr=29423
--
---
Evan Sarmiento | www.open-root.org
[EMAIL PROTECTED] | www.sekt7.org/~ems/
---
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message
>sl, sysnum, prfw_a)) < 2)
! return (error);
! }
! if (prfw_a->ex_root && (p->p_ucred->cr_ruid == 0))
! error = 0;
!
! }
!
!
!if (IS_PRFW)
! {
! if ((error = prfw
o
>I cannot correct /etc/rc.conf. Please help.
>
>regards,
>Rohit Grover.
>
>To Unsubscribe: send mail to [EMAIL PROTECTED]
>with "unsubscribe freebsd-hackers" in the body of the message
>
--
---
Evan Sarmiento | www.open-root.or
Hello,
I need each system call to check with a master table of restrictions before executing
a function.
Is there a way to do this without copying and pasting a bit of code that does this
checking into
every system call?
Thanks,
--
---
Evan Sarmiento
I use?
Thanks,
Evan
--
---
Evan Sarmiento | www.open-root.org
[EMAIL PROTECTED] | www.sekt7.org/~ems/
---
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message
lag |= P_JAILED;
}
Am I allowed to change information in this proc structure?
Thanks a lot,
Evan Sarmiento
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message
anpages on queue and looked at the proc
structure.
Here's the code:
int
prfw_setflags(p, uap)
struct proc *p;
struct prfw_setflags_args *uap;
{
...
if (uap->id) {
while (uap->id != p->p_pid)
LIST_NEXT(p, p_list);
}
...
}
Thanks a lot.
Evan Sarmiento
To Unsubscribe: send mail t
Subject: jailuser project
--text follows this line--
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello,
I would like your input on a project I am currently working on called Jailuser. Jail,
which is similar, chroots an enviornment and sets restrictions on processes forked
within. However, pr
17 matches
Mail list logo