search for: td_proc

Displaying 6 results from an estimated 6 matches for "td_proc".

2003 May 16
3
open and euid security flaw in 5.0-Current?
On a FreeBSD 5.0 the behaviour of screen when connecting to other users sessions have changed. Previously: 1. login as userA start a screen as userA and disconnect 2. login as root su - userA "screen -r" 3. result failure as userA cant access the ttyX with such a message Current: 1. login as userA start a screen as userA and disconnect 2. login as root su - userA "screen -r" 3.
2006 Mar 02
1
Failing to understand getrusage()
I'm failing to understand how getrusage() works, which is a bit perplexing, because it doesn't seem like it would be terribly complicated. I've attached the code. My aim is to verify that I can use getrusage() to do (admittedly crude) instrumentation of which functions in my program are allocating lots of memory[1]. So I figure I can call getrusage() at various points and look at
2011 Jun 02
0
Debian 6.0 + Xen4.0 + FreeBSD hvm amd64 -> fpudna: fpcurthread == curthread XXXX times
...(PCPU_GET(fpcurthread) != NULL) { + if (PCPU_GET(fpcurthread) != NULL&& + PCPU_GET(fpcurthread) != curthread) { printf("fpudna: fpcurthread = %p (%d), curthread = %p (%d)\n", PCPU_GET(fpcurthread), PCPU_GET(fpcurthread)->td_proc->p_pid, recompiled the kernel and got a ''kernel trap 22'' with > 4 vcpus. Has anyone stepped on this behavior before? Is it freebsd related or xen related? Is there any workaround? Thanks for your help, regards, Sergi _______________________________________________ Xen-us...
2004 Sep 17
1
Fwd: FreeBSD kernel buffer overflow
...>pointer in order to accessing them. The code to do that is the following: > >void >syscall(frame) > struct trapframe frame; >{ > caddr_t params; > struct sysent *callp; > struct thread *td = curthread; > struct proc *p = td->td_proc; > register_t orig_tf_eflags; > u_int sticks; > int error; > int narg; > int args[8]; > u_int code; > > > ... > > > narg = callp->sy_narg & SYF_ARGMASK; (<- you can see it's the >...
2014 May 14
3
[CFT] ASLR, PIE, and segvguard on 11-current and 10-stable
Hey All, [NOTE: crossposting between freebsd-current@, freebsd-security@, and freebsd-stable at . Please forgive me if crossposting is frowned upon.] Address Space Layout Randomization, or ASLR for short, is an exploit mitigation technology. It helps secure applications against low-level exploits. A popular secure implementation is known as PaX ASLR, which is a third-party patch for Linux. Our
2014 May 14
3
[CFT] ASLR, PIE, and segvguard on 11-current and 10-stable
Hey All, [NOTE: crossposting between freebsd-current@, freebsd-security@, and freebsd-stable at . Please forgive me if crossposting is frowned upon.] Address Space Layout Randomization, or ASLR for short, is an exploit mitigation technology. It helps secure applications against low-level exploits. A popular secure implementation is known as PaX ASLR, which is a third-party patch for Linux. Our