Displaying 6 results from an estimated 6 matches for "td_proc".
2003 May 16
3
open and euid security flaw in 5.0-Current?
On a FreeBSD 5.0 the behaviour of screen when connecting to other
users sessions have changed. Previously:
1. login as userA start a screen as userA and disconnect
2. login as root su - userA "screen -r"
3. result failure as userA cant access the ttyX with such a message
Current:
1. login as userA start a screen as userA and disconnect
2. login as root su - userA "screen -r"
3.
2006 Mar 02
1
Failing to understand getrusage()
I'm failing to understand how getrusage() works, which is a bit perplexing,
because it doesn't seem like it would be terribly complicated.
I've attached the code. My aim is to verify that I can use getrusage() to
do (admittedly crude) instrumentation of which functions in my program are
allocating lots of memory[1]. So I figure I can call getrusage() at various
points and look at
2011 Jun 02
0
Debian 6.0 + Xen4.0 + FreeBSD hvm amd64 -> fpudna: fpcurthread == curthread XXXX times
...(PCPU_GET(fpcurthread) != NULL) {
+ if (PCPU_GET(fpcurthread) != NULL&&
+ PCPU_GET(fpcurthread) != curthread) {
printf("fpudna: fpcurthread = %p (%d), curthread = %p (%d)\n",
PCPU_GET(fpcurthread),
PCPU_GET(fpcurthread)->td_proc->p_pid,
recompiled the kernel and got a ''kernel trap 22'' with > 4 vcpus.
Has anyone stepped on this behavior before?
Is it freebsd related or xen related?
Is there any workaround?
Thanks for your help,
regards,
Sergi
_______________________________________________
Xen-us...
2004 Sep 17
1
Fwd: FreeBSD kernel buffer overflow
...>pointer in order to accessing them. The code to do that is the following:
>
>void
>syscall(frame)
> struct trapframe frame;
>{
> caddr_t params;
> struct sysent *callp;
> struct thread *td = curthread;
> struct proc *p = td->td_proc;
> register_t orig_tf_eflags;
> u_int sticks;
> int error;
> int narg;
> int args[8];
> u_int code;
>
>
> ...
>
>
> narg = callp->sy_narg & SYF_ARGMASK; (<- you can see it's the
>...
2014 May 14
3
[CFT] ASLR, PIE, and segvguard on 11-current and 10-stable
Hey All,
[NOTE: crossposting between freebsd-current@, freebsd-security@, and
freebsd-stable at . Please forgive me if crossposting is frowned upon.]
Address Space Layout Randomization, or ASLR for short, is an exploit
mitigation technology. It helps secure applications against low-level
exploits. A popular secure implementation is known as PaX ASLR, which is
a third-party patch for Linux. Our
2014 May 14
3
[CFT] ASLR, PIE, and segvguard on 11-current and 10-stable
Hey All,
[NOTE: crossposting between freebsd-current@, freebsd-security@, and
freebsd-stable at . Please forgive me if crossposting is frowned upon.]
Address Space Layout Randomization, or ASLR for short, is an exploit
mitigation technology. It helps secure applications against low-level
exploits. A popular secure implementation is known as PaX ASLR, which is
a third-party patch for Linux. Our