On Fri, 1 Apr 2005, Roberto wrote:
Steve Kiernan wrote:
I was looking at this patch, but there seems to be an error in it:
unsigned char slc_reply[128];
+unsigned char const * const slc_reply_eom =
&slc_reply[sizeof(slc_reply)];
unsigned char *slc_replyp;
Should the value for slc_reply_eom not be
On Mon, 24 Oct 2005, Martin Cracauer wrote:
Peter Jeremy wrote on Mon, Oct 24, 2005 at 06:08:11PM +1000:
On Sun, 2005-Oct-23 16:29:35 -0700, David O'Brien wrote:
We should no trust cross built libraries for this purpose at this time.
We really don't know how identical the results will be to be
On Tue, 25 Oct 2005, M. Warner Losh wrote:
In message: <[EMAIL PROTECTED]>
Martin Cracauer writes:
: ELF object files are timestamped. But there's some elf-cmp out there.
Elf .o's are timestampped,
Script started on Thu Oct 27 15:17:31 2005
ttyv2:[EMAIL PROTECTED]:/tmp/z> echo "i
On Wed, 11 Jan 2006, joe wrote:
Environment:
RELENG_4 20051028
Description:
[cp fails to update atime]
this occurs regardless of whether or not the user has
rwx permissions on the source file. does not apply of
course if the source filesystem is mounted read-only.
they are read-write here.
On Wed, 11 Oct 2006, Dmitry Pryanishnikov wrote:
On Wed, 11 Oct 2006, Jeremie Le Hen wrote:
...
Is it envisageable to extend the RELENG_4's and RELENG_4_11's EoL once
more ?
Yes, I'm also voting for it. This support may be limited to
remote-exploitable vulnerabilities only, but I'm sure the
--- nfs_serv.c 2005-11-25 06:32:38.0 -0800
+++ /tmp/nfs_serv.c 2006-09-22 14:41:39.0 -0700
@@ -2514,26 +2514,26 @@
/*
* The VOP_RENAME function releases all vnode references &
* locks prior to returning so we need to clear the pointers
On Tue, 16 Jan 2007, Dirk Engling wrote:
Colin Percival wrote:
No. `cp -f` unlinks the existing file and creates a new file, but will
still follow a symlink if one is created between the "unlink" syscall and
the "open" syscall.
...
You are right. Atomically in binary is not atomical enough.
On Tue, 16 Jan 2007, Pawel Jakub Dawidek wrote:
On Tue, Jan 16, 2007 at 02:42:17PM +1100, Bruce Evans wrote:
install -S ...
... can easily
be made both safer (actually no-clobber) and securer by opening the file
with O_EXCL and exiting if the file exists at the time of the open.
Perhaps cp -f
On Fri, 18 Sep 2009, Pieter de Boer wrote:
Julian wrote:
The assumption is that the userland and kernel share a memory map.
While we do implement it this way, it is not necessarily needed.
We do it for performance reasons (each user memory map includes an
identical top section that is the kerne
On Thu, 27 Sep 2012, [utf-8] Dag-Erling Sm??rgrav wrote:
RW writes:
static __inline uint64_t
get_cyclecount(void)
{
struct bintime bt;
binuptime(&bt);
return (bt.frac ^ bt.sec);
}
Why the heck does it xor the integer and fractional parts together?
That makes no sens
On Fri, 28 Sep 2012, [utf-8] Dag-Erling Sm??rgrav wrote:
Bruce Evans writes:
"Dag-Erling Sm??rgrav" writes:
RW writes:
binuptime(&bt);
return (bt.frac ^ bt.sec);
Why the heck does it xor the integer and fractional parts together?
Because most of the entropy is in the f
On Wed, 21 Aug 2019, Eugene Grosbein wrote:
21.08.2019 3:12, FreeBSD Security Advisories wrote:
[skip]
IV. Workaround
No workaround is available. Custom kernels without "device sound"
are not vulnerable.
Is it true that there is no way to disable vulnerable and unneeded device driver
bui
12 matches
Mail list logo