From owner-freebsd-hackers@freebsd.org Mon Jun 17 02:48:13 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6EFE715D0D4B for ; Mon, 17 Jun 2019 02:48:13 +0000 (UTC) (envelope-from farhan@farhan.codes) Received: from mail.farhan.codes (mail.farhan.codes [155.138.165.43]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E71EE72964 for ; Mon, 17 Jun 2019 02:48:11 +0000 (UTC) (envelope-from farhan@farhan.codes) Received: from mail.farhan.codes (rainloop [172.16.0.4]) by mail.farhan.codes (Postfix) with ESMTPSA id B64DCF737; Sun, 16 Jun 2019 22:48:03 -0400 (EDT) MIME-Version: 1.0 Date: Mon, 17 Jun 2019 02:48:03 +0000 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Mailer: RainLoop/1.12.1 From: "Farhan Khan" Message-ID: Subject: Re: Valgrind memcheck showing question marks To: "David CARLIER" Cc: freebsd-hackers@freebsd.org In-Reply-To: References: <20190605095411.GA8120@pc.farhan.codes> X-Rspamd-Queue-Id: E71EE72964 X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.64 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[farhan.codes:s=mail]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; NEURAL_SPAM_SHORT(0.38)[0.377,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[farhan.codes:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[farhan.codes,reject]; MX_GOOD(-0.01)[mail.farhan.codes]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; IP_SCORE(-0.01)[asn: 20473(-0.01), country: US(-0.06)]; ASN(0.00)[asn:20473, ipnet:155.138.160.0/20, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2019 02:48:13 -0000 June 5, 2019 5:58 AM, "David CARLIER" wrote:=0A=0A> = Hi if that helps you can try -O0 in addition of -g.=0A> =0A> Regards.=0A>= =0A> On Wed, 5 Jun 2019 at 09:56, Farhan Khan via freebsd-hackers=0A> wrote:=0A> =0A>> Hi all,=0A>> =0A>> I am havi= ng a Segmentation fault error and trying to use valgrind to help me find = where the=0A>> overflow occurs. I run valgrind on the prog.full version o= f the executable.=0A>> =0A>> I am running it as follows:=0A>> =0A>> $ val= grind --tool=3Dmemcheck ogit.full [arguments omitted]=0A>> =0A>> =3D=3D14= 457=3D=3D Memcheck, a memory error detector=0A>> =3D=3D14457=3D=3D Copyri= ght (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.=0A>> =3D=3D1445= 7=3D=3D Using Valgrind-3.10.1 and LibVEX; rerun with -h for copyright inf= o=0A>> =3D=3D14457=3D=3D Command: ogit.full clone http://git.farhan.codes= /farhan/opengit=0A>> =3D=3D14457=3D=3D=0A>> =3D=3D14457=3D=3D Conditional= jump or move depends on uninitialised value(s)=0A>> =3D=3D14457=3D=3D at= 0x49D1867: ??? (in /lib/libc.so.7)=0A>> =3D=3D14457=3D=3D by 0x7FF00051F= : ???=0A>> =3D=3D14457=3D=3D by 0x20DE7D: ??? (in /usr/home/farhan/opengi= t/ogit.full)=0A>> =3D=3D14457=3D=3D by 0x20ECE1: ??? (in /usr/home/farhan= /opengit/ogit.full)=0A>> =3D=3D14457=3D=3D by 0x2054B5: ??? (in /usr/home= /farhan/opengit/ogit.full)=0A>> =3D=3D14457=3D=3D by 0x20511A: ??? (in /u= sr/home/farhan/opengit/ogit.full)=0A>> =3D=3D14457=3D=3D by 0x4826FFF: ??= ?=0A>> =3D=3D14457=3D=3D=0A>> [snippet]=0A>> =0A>> Please note that the s= tack trace does not show the function names, which I need. How do I enabl= e=0A>> those symbols?=0A>> =0A>> The Makefile is as follows:=0A>> -------= -----------=0A>> MAN=3D=0A>> =0A>> CFLAGS=3D -Wall -lmd -lz -lfetch=0A>> = =0A>> PROG=3D ogit=0A>> =0A>> SRCS=3D ogit.c lib/ini.c lib/index.c lib/co= mmon.c lib/pack.c remote.c init.c \=0A>> lib/zlib-handler.c lib/buffering= .c lib/loose.c \=0A>> hash-object.c update-index.c cat-file.c log.c clone= .c index-pack.c=0A>> =0A>> CLEANFILES+=3D ${PROG}.core=0A>> =0A>> .includ= e =0A>> ------------------=0A>> =0A>> An example compilation= line and the ending is as follows. The first line is for "index-pack.c",= but=0A>> there are others as the SRCS line shows.=0A>> -----------------= -=0A>> cc -Wall -lmd -lz -lfetch -g -MD -MF.depend.index-pack.o -MTindex-= pack.o -std=3Dgnu99=0A>> -fstack-protector-strong -Qunused-arguments -c i= ndex-pack.c -o index-pack.o=0A>> cc -Wall -lmd -lz -lfetch -g -std=3Dgnu9= 9 -fstack-protector-strong -Qunused-arguments -o ogit.full=0A>> ogit.o li= b/ini.o lib/index.o lib/common.o lib/pack.o remote.o init.o lib/zlib-hand= ler.o=0A>> lib/buffering.o lib/loose.o hash-object.o update-index.o cat-f= ile.o log.o clone.o index-pack.o=0A>> objcopy --only-keep-debug ogit.full= ogit.debug=0A>> objcopy --strip-debug --add-gnu-debuglink=3Dogit.debug o= git.full ogit=0A>> ------------------=0A>> =0A>> Am I missing a necessary= compilation flag to have those symbols appear? I have "-g" turned on=0A>= > during compilation.=0A>> Thanks,=0A>> =0A>> ---=0A>> Farhan Khan=0A>> P= GP Fingerprint: 1312 89CE 663E 1EB2 179C 1C83 C41D 2281 F8DA C0DE=0A=0AI = have -O0 and -g in my Makefile, but that does not appear to change the is= sue. It appears that debugging symbols are stripped out towards the end o= f the compilation and creates 'prog.full' and 'prog.debug', as follows:= =0A=0Acc -O2 -pipe -Wunreachable-code -Werror -O0 -g -Wall -I/usr/home/fa= rhan/opengit/src/.. -g -std=3Dgnu99 -fstack-protector-strong -Qunused-arg= uments -lmd -lz -lfetch /usr/home/farhan/opengit/src/../lib/libogit.a -= o ogit.full ogit.o remote.o init.o hash-object.o update-index.o cat-file.= o log.o clone.o clone_http.o index-pack.o =0Aobjcopy --only-keep-debug o= git.full ogit.debug=0Aobjcopy --strip-debug --add-gnu-debuglink=3Dogit.de= bug ogit.full ogit=0A=0ANotice how the debugging symbols are written to = "ogit.debug". Is there a way to use that debug file with valgrind?=0AI sh= ould add, I also tried to manually run the compilation line without the t= wo objcopy(1) lines, but valgrind also produced the same result.=0A=0AAss= istance is appreciated :)=0A=0AThanks,=0A---=0AFarhan Khan=0APGP Fingerpr= int: 1312 89CE 663E 1EB2 179C 1C83 C41D 2281 F8DA C0DE From owner-freebsd-hackers@freebsd.org Mon Jun 17 14:46:16 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2A3F515BBB7A for ; Mon, 17 Jun 2019 14:46:16 +0000 (UTC) (envelope-from shivankgarg98@gmail.com) Received: from mail-ed1-f51.google.com (mail-ed1-f51.google.com [209.85.208.51]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 2322A6C4F9; Mon, 17 Jun 2019 14:46:15 +0000 (UTC) (envelope-from shivankgarg98@gmail.com) Received: by mail-ed1-f51.google.com with SMTP id e3so16486746edr.10; Mon, 17 Jun 2019 07:46:14 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=/3wTG4iclnDNvsABXrXrHwcQWf2Zwn3UM97/S+unUcM=; b=k4TZ1g8uI5i8fEgAHTtDqh3POaUp7td+eExFahbwbR5MddQqVz3+Hv3/Gfs5pcLf6A XFk7l92s5WCNfYaR1PU/QGb231L3051CeyK+rPhXXg0M4xwFmdCam4SitXL3MAmyJcwE CR6C9J1OFP/F2Gm1RSSZ8HJxmRIMKr5wOc8q8l8+D557kP9VvHQwi+G3JxjleURRC2ce gwM99EwxenC4yqvPJnK79R2/6YDYCZkog5apLPuHLo7o81bhyexZPvI2Zq0XVFk9BWfW SZ9js/sQs75fRJScIp2L2d3/JANe0ubvYB8+Q6321tXoilitltKcQM4zV142aAUiBexd wJUw== X-Gm-Message-State: APjAAAWizfmwvvVtyo9Xi3nubLoeT2QZR+OY7CUJszps8Bck6KybPd7K LP1gsn7U0BgTniQvBGkOpEP84Nps/Q0= X-Google-Smtp-Source: APXvYqxW00kRWfev5q/qTcpo9KU1Y8mC9oVF8IUc9R1ZutAUfUCzZQfFHiW/PGAX2URrQ41yIbHrCw== X-Received: by 2002:a17:907:2091:: with SMTP id pv17mr53032051ejb.152.1560782767461; Mon, 17 Jun 2019 07:46:07 -0700 (PDT) Received: from mail-ed1-f47.google.com (mail-ed1-f47.google.com. [209.85.208.47]) by smtp.gmail.com with ESMTPSA id d28sm3962634edn.31.2019.06.17.07.46.07 (version=TLS1_3 cipher=AEAD-AES128-GCM-SHA256 bits=128/128); Mon, 17 Jun 2019 07:46:07 -0700 (PDT) Received: by mail-ed1-f47.google.com with SMTP id r12so14352215edo.5; Mon, 17 Jun 2019 07:46:07 -0700 (PDT) X-Received: by 2002:a50:8b9c:: with SMTP id m28mr75773414edm.53.1560782767033; Mon, 17 Jun 2019 07:46:07 -0700 (PDT) MIME-Version: 1.0 From: Shivank Garg Date: Mon, 17 Jun 2019 20:15:55 +0530 X-Gmail-Original-Message-ID: Message-ID: Subject: To: freebsd-hackers@freebsd.org, "Bjoern A. Zeeb" X-Rspamd-Queue-Id: 2322A6C4F9 X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of shivankgarg98@gmail.com designates 209.85.208.51 as permitted sender) smtp.mailfrom=shivankgarg98@gmail.com X-Spamd-Result: default: False [-4.17 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; TO_MATCH_ENVRCPT_ALL(0.00)[]; TAGGED_RCPT(0.00)[soc]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; DMARC_NA(0.00)[freebsd.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[4]; MIME_TRACE(0.00)[0:+,1:+]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[51.208.85.209.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.87)[-0.868,0]; IP_SCORE(-2.29)[ip: (-5.68), ipnet: 209.85.128.0/17(-3.42), asn: 15169(-2.31), country: US(-0.06)]; RCVD_TLS_LAST(0.00)[]; FORGED_SENDER(0.30)[shivank@freebsd.org,shivankgarg98@gmail.com]; R_DKIM_NA(0.00)[]; EMPTY_SUBJECT(1.00)[]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[shivank@freebsd.org,shivankgarg98@gmail.com]; FREEMAIL_ENVFROM(0.00)[gmail.com] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2019 14:46:16 -0000 Hi, Everyone! This project is aimed at developing a loadable MAC module with the "The TrustedBSD MAC Framework" to limit the set of IP addresses a VNET-enabled Jail can choose from. This Week- - I compiled a basic MAC policy module which restricts from setting Jail's IP address. - Read about syctl. - Wrote a test shell script and test cases for the module. - I thought about the design and plausible improvements in design Do Check this project on Github: https://github.com/shivankgarg98/freebsd/tree/shivank_MACPolicyIPAddressJail/sys/security/mac_ipacl FreeBSD wiki: https://wiki.freebsd.org/SummerOfCode2019Projects/MACPolicyIPAddressJail Please feel free to share your ideas and feedback on this project. Regards, Shivank Garg From owner-freebsd-hackers@freebsd.org Mon Jun 17 14:50:09 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3FB5A15BBCED for ; Mon, 17 Jun 2019 14:50:09 +0000 (UTC) (envelope-from shivankgarg98@gmail.com) Received: from mail-ed1-f51.google.com (mail-ed1-f51.google.com [209.85.208.51]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 81D926C699 for ; Mon, 17 Jun 2019 14:50:08 +0000 (UTC) (envelope-from shivankgarg98@gmail.com) Received: by mail-ed1-f51.google.com with SMTP id e3so16506510edr.10 for ; Mon, 17 Jun 2019 07:50:08 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=bTJ5CYtcXounPesFAGrxAdB+R8uUzjobM2RBhmucizI=; b=cY9mk3yLGf1XrM2gmreix4Lu1Khc6W0GD4hmr0rAyp2rQ2n4e5w3z0ibZbTKOZq9G2 oXp7IMQUOVN8nTMv8VBbhCvpGS/MmZzwOrxWRClf05REzVqU86NZV7ODR4Z2SG9otkqN wM64DjmbeN9x4w9JbsxbaDqVtTrAjPXHZ6JDPBblB7F8WUqYZk0EtjuObfE1poK9OuGl QPCRdIfZwX5V9hZUdxSIvuFFM7LXkFZD3P/uG2loL/iWyPj5sMC7E6Ateg04ozo7wlg5 7EOggWAp5yieU5NYMdwwEvycIt9XQ3az+YaYMxaGPJK+iEJCLunqRhlwoR5BCJyjXISP w8BQ== X-Gm-Message-State: APjAAAWNt6X+wpcCgAUFbJlRDWlYVXGtrZUkpjzwwnwjDVOY96Ewt+5Q SH86MJ7GL+l/mBOOjx6PZwNWnGnF5hQ= X-Google-Smtp-Source: APXvYqzJb5ra8thm9fsYYbSmV+/4SB9LdoPZedhe95EniZHV5zaHjD92ONGoLAKtyXOaWWv4GV5EOQ== X-Received: by 2002:a17:906:7801:: with SMTP id u1mr56445923ejm.250.1560783006504; Mon, 17 Jun 2019 07:50:06 -0700 (PDT) Received: from mail-ed1-f45.google.com (mail-ed1-f45.google.com. [209.85.208.45]) by smtp.gmail.com with ESMTPSA id i6sm3841101eda.79.2019.06.17.07.50.06 for (version=TLS1_3 cipher=AEAD-AES128-GCM-SHA256 bits=128/128); Mon, 17 Jun 2019 07:50:06 -0700 (PDT) Received: by mail-ed1-f45.google.com with SMTP id p15so16533366eds.8 for ; Mon, 17 Jun 2019 07:50:06 -0700 (PDT) X-Received: by 2002:a17:906:13c7:: with SMTP id g7mr35714705ejc.1.1560783005905; Mon, 17 Jun 2019 07:50:05 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Shivank Garg Date: Mon, 17 Jun 2019 20:19:54 +0530 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: To: freebsd-hackers@freebsd.org X-Rspamd-Queue-Id: 81D926C699 X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of shivankgarg98@gmail.com designates 209.85.208.51 as permitted sender) smtp.mailfrom=shivankgarg98@gmail.com X-Spamd-Result: default: False [-5.19 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[4]; MIME_TRACE(0.00)[0:+,1:+]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; NEURAL_HAM_SHORT(-0.91)[-0.910,0]; DMARC_NA(0.00)[freebsd.org]; RCVD_IN_DNSWL_NONE(0.00)[51.208.85.209.list.dnswl.org : 127.0.5.0]; RCVD_TLS_LAST(0.00)[]; FORGED_SENDER(0.30)[shivank@freebsd.org,shivankgarg98@gmail.com]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[shivank@freebsd.org,shivankgarg98@gmail.com]; IP_SCORE(-2.27)[ip: (-5.55), ipnet: 209.85.128.0/17(-3.42), asn: 15169(-2.31), country: US(-0.06)]; TO_DOM_EQ_FROM_DOM(0.00)[] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2019 14:50:09 -0000 Please ignore this mail On Mon, Jun 17, 2019 at 8:15 PM Shivank Garg wrote: > Hi, Everyone! > This project is aimed at developing a loadable MAC module with the "The > TrustedBSD MAC Framework" to limit the set of IP addresses a VNET-enabled > Jail can choose from. > > This Week- > - I compiled a basic MAC policy module which restricts from setting Jail's > IP address. > - Read about syctl. > - Wrote a test shell script and test cases for the module. > - I thought about the design and plausible improvements in design > > > Do Check this project on > Github: > https://github.com/shivankgarg98/freebsd/tree/shivank_MACPolicyIPAddressJail/sys/security/mac_ipacl > FreeBSD wiki: > https://wiki.freebsd.org/SummerOfCode2019Projects/MACPolicyIPAddressJail > > Please feel free to share your ideas and feedback on this project. > > Regards, > Shivank Garg > From owner-freebsd-hackers@freebsd.org Mon Jun 17 16:25:19 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4A44C15BE8CF for ; Mon, 17 Jun 2019 16:25:19 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: from mail-io1-xd43.google.com (mail-io1-xd43.google.com [IPv6:2607:f8b0:4864:20::d43]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 67BF870B82 for ; Mon, 17 Jun 2019 16:25:18 +0000 (UTC) (envelope-from markjdb@gmail.com) Received: by mail-io1-xd43.google.com with SMTP id e5so22583697iok.4 for ; Mon, 17 Jun 2019 09:25:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=u1Y1w/Kzr2PwS8/pepaku45N8SMelwjxicCBklXrO6s=; b=m6bg4inmjgW6XA0MPQ0U/d8F1WicCtiCuIdbCsjTH0n/CqARuNWY3oFrlboO7vkK8y iycNmSWepN9jVC6WdANpC+Hyoob8q+nicYLr70LCg5c1LjFEMwT5eQFJGH8NH7qZYT1K AmEuoosPHKwfPkFCP8ArL1lE1U3oxS7o2sjRjRqgNKWMgUR+PYJ2NYPCmU/W0bMzzbCD SwicUHvfieIBcS154gIIRd3+q/cfd7PnD4h5BR31XRtpqdsjo5h4bwUyFam4Y2DEsVta jwxQf0Tzcizf6LgBE+2oR8aKM6sFXXV2aX6oXqAk1irGWU96UdOxOkg++KI0F1wM9uD5 Ziaw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to:user-agent; bh=u1Y1w/Kzr2PwS8/pepaku45N8SMelwjxicCBklXrO6s=; b=rT63SGZhQQzRAu6AYEfsjRNhSyIFH8ibVU2f/o1Ip49Rftm/aIBI/UBihzDx9KdJf6 Gax4vElY47uWL1aRSRXUV8osLo3fNuBR72yJiK9LqND0JlSQFX9vctaMowJiL82Tluva KDbJo4KS0idHqLboptEmONfZJUhV/qdTVdrreM5dAOg7Ykh82INZa5JLMx7dmKOPj7Hx h3jH86zjtEewPIPsbPk4QYEFbqi1fyek8ptAvLTsJUx142lO51/3lJdWcuRLL3e+5MR+ Zu14JTV72IF10q41Ip15IRSd7UCjxgXz30dSyXJkhEV6+bA63WcS0CJETNc46pcE6Tnr 7E7g== X-Gm-Message-State: APjAAAXC8T7DriVCPReyfRl8abeCd5a7AwaTglJzWM/TjdwhH9Wo1W9U mVcCBluwVdxCh/t1uvlG6Ss= X-Google-Smtp-Source: APXvYqxF3cWvjrNcKyFhO1CtP2kxd0xNUmgF7/dePCedk8hsdgweIq816yZb9sHgyQlSL8Fild8lTg== X-Received: by 2002:a6b:b804:: with SMTP id i4mr62314189iof.119.1560788717696; Mon, 17 Jun 2019 09:25:17 -0700 (PDT) Received: from raichu (toroon0560w-lp140-05-70-29-85-38.dsl.bell.ca. [70.29.85.38]) by smtp.gmail.com with ESMTPSA id a2sm9133908iod.57.2019.06.17.09.25.16 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Mon, 17 Jun 2019 09:25:16 -0700 (PDT) Sender: Mark Johnston Date: Mon, 17 Jun 2019 12:25:14 -0400 From: Mark Johnston To: Fuqian Huang Cc: freebsd-hackers@freebsd.org Subject: Re: dev:md: A kernel address leakage in sys/dev/md/md.c Message-ID: <20190617162514.GC64731@raichu> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.12.0 (2019-05-25) X-Rspamd-Queue-Id: 67BF870B82 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=m6bg4inm; spf=pass (mx1.freebsd.org: domain of markjdb@gmail.com designates 2607:f8b0:4864:20::d43 as permitted sender) smtp.mailfrom=markjdb@gmail.com X-Spamd-Result: default: False [-3.35 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; FREEMAIL_TO(0.00)[gmail.com]; FORGED_SENDER(0.30)[markj@freebsd.org,markjdb@gmail.com]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[markj@freebsd.org,markjdb@gmail.com]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_SHORT(-0.86)[-0.862,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; DMARC_NA(0.00)[freebsd.org]; MIME_GOOD(-0.10)[text/plain]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[3.4.d.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; IP_SCORE(-0.78)[ip: (1.63), ipnet: 2607:f8b0::/32(-3.16), asn: 15169(-2.31), country: US(-0.06)]; MID_RHS_NOT_FQDN(0.50)[] X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2019 16:25:19 -0000 On Thu, Jun 13, 2019 at 02:52:24PM +0800, Fuqian Huang wrote: > In freebsd/sys/dev/md/md.c > if the kernel is created with option MD_ROOT, > g_md_init will call md_preload and use mfs_root as the image. > In function md_preload, address of image will be printed out, > in this case, the address of image is the address of a global object mfs_root. > A kernel address leakage happens. We have many such leaks. For example, netstat and fstat will print the kernel addresses of various structures. We currently do not perform any randomization of the kernel address space, so guessing is easy even in the absence of these leaks. In light of this I'm not sure it's worth the churn to update individual printf()s. From owner-freebsd-hackers@freebsd.org Mon Jun 17 17:25:05 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B11FD15C01BC for ; Mon, 17 Jun 2019 17:25:05 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qk1-x72d.google.com (mail-qk1-x72d.google.com [IPv6:2607:f8b0:4864:20::72d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id E08B5730EB for ; Mon, 17 Jun 2019 17:25:03 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qk1-x72d.google.com with SMTP id a27so6654891qkk.5 for ; Mon, 17 Jun 2019 10:25:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=3BJRPkmeKdtEB8CNUqF+J0/pHwIQNIfj/OFOmWGnvTc=; b=RR22C3srAlan3uexPjmCN1dDJ/Y6LQN8kTSnCs/oFzv9/fpquZYekl9qPZwFR2qg7l cNpnFcOZyuaZUk83Ld1CFbGSWN+A4PKHp3OKwe2ELf36SbU753WUrrWnYWdkU5HGEVxk b7d82vNtgF9+D2AsR/0C31tG+Qlhef2Y/egzhenVz5gfw5LjD9waD1pEYfhVFfe6Fs7H O4nOj17HwJDE/MYrKmWqW/u7qZ5xUEVW2EGtVmkoQSahPSI9/eB9V1Fov2BzvlK+hm1w dDp1oL9l1zfN0ey27w+AtPrYfxbHvDicRGP8G6og39LdQJfCkoOhjjRqCfPmxhhZuy4T MHpw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=3BJRPkmeKdtEB8CNUqF+J0/pHwIQNIfj/OFOmWGnvTc=; b=ZORRQjsTpUrjrqeQ97z0Oiyy5E/95V/eNY7DJgy4x5MsVkT7+EP90f7008dIXXabBs CPv98u+cJhw/yUUG4mnb73YI67qfJb5MYTEUyQOw3c+3mdydwLbvaOxgtvvFy5NMVitt 2shJv1uuwasAAcFXCnRHe4X+iqTj0VTQt/smewIGk5D/5OvBJexbSMOx2nJZcE9WZiEZ L4THPlouYFs1FCPUNf0ky0XCrlA9PfNSyYUno9XKhCW8jakW0w8JMP9WJmK7Un7I0wRQ PNgBoIfzbtsrV3cd/qJyS3/2qeuKCe4xPoH1NXnvtkrsIZAa5ZyTE7GWjMeE7so2Hhxz Vr8w== X-Gm-Message-State: APjAAAXljOWICmOV+NpTvgUieLV5Kevoxu7UTI+QpCpZkC3fIp1P8N7Q 1YlauCCZsdVRZryy9Jh+VxoOxQnpU3qhK1p0xEnQWA== X-Google-Smtp-Source: APXvYqwW6+7cVc5i6OX54rg90UzeAFir04kgGY+kvf4gcSO6QyfNFExDOOya0nJvs0IHP4Qf92aLCSIeb+Gi7u2R+6I= X-Received: by 2002:a05:620a:1519:: with SMTP id i25mr57515922qkk.331.1560792303050; Mon, 17 Jun 2019 10:25:03 -0700 (PDT) MIME-Version: 1.0 References: <20190617162514.GC64731@raichu> In-Reply-To: <20190617162514.GC64731@raichu> From: Warner Losh Date: Mon, 17 Jun 2019 10:24:50 -0700 Message-ID: Subject: Re: dev:md: A kernel address leakage in sys/dev/md/md.c To: Mark Johnston Cc: Fuqian Huang , FreeBSD Hackers X-Rspamd-Queue-Id: E08B5730EB X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=RR22C3sr X-Spamd-Result: default: False [-5.94 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; RCVD_COUNT_TWO(0.00)[2]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; MX_GOOD(-0.01)[ALT1.aspmx.l.google.com,aspmx.l.google.com,ALT2.aspmx.l.google.com]; RCVD_IN_DNSWL_NONE(0.00)[d.2.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.93)[-0.932,0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; IP_SCORE(-2.99)[ip: (-9.44), ipnet: 2607:f8b0::/32(-3.16), asn: 15169(-2.31), country: US(-0.06)]; FREEMAIL_CC(0.00)[gmail.com] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2019 17:25:05 -0000 On Mon, Jun 17, 2019, 9:26 AM Mark Johnston wrote: > On Thu, Jun 13, 2019 at 02:52:24PM +0800, Fuqian Huang wrote: > > In freebsd/sys/dev/md/md.c > > if the kernel is created with option MD_ROOT, > > g_md_init will call md_preload and use mfs_root as the image. > > In function md_preload, address of image will be printed out, > > in this case, the address of image is the address of a global object > mfs_root. > > A kernel address leakage happens. > > We have many such leaks. For example, netstat and fstat will print > the kernel addresses of various structures. We currently do not perform > any randomization of the kernel address space, so guessing is easy even > in the absence of these leaks. In light of this I'm not sure it's worth > the churn to update individual printf()s. > If we are serious about this, we'd just implement %p so we can turn it off for cases that matter. Since we can turn off dmesg already, I'm not worried about these for people running a randomized kernel: they can preclude this disclosure today. Warner _______________________________________________ > freebsd-hackers@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" > From owner-freebsd-hackers@freebsd.org Mon Jun 17 17:42:06 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A579A15C0979 for ; Mon, 17 Jun 2019 17:42:06 +0000 (UTC) (envelope-from lev@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 31B2B74210 for ; Mon, 17 Jun 2019 17:42:06 +0000 (UTC) (envelope-from lev@FreeBSD.org) Received: from onlyone.not-for.work (onlyone.not-for.work [148.251.9.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) (Authenticated sender: lev/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id CEDB754DA for ; Mon, 17 Jun 2019 17:42:05 +0000 (UTC) (envelope-from lev@FreeBSD.org) Received: from [192.168.23.186] (unknown [89.113.128.32]) (Authenticated sender: lev@serebryakov.spb.ru) by onlyone.not-for.work (Postfix) with ESMTPSA id 82E821D0C6 for ; Mon, 17 Jun 2019 20:42:03 +0300 (MSK) To: FreeBSD Hackers Reply-To: lev@FreeBSD.org From: Lev Serebryakov Subject: Does `sys/net/radix.c` support non-contiguous masks? Openpgp: preference=signencrypt Autocrypt: addr=lev@FreeBSD.org; prefer-encrypt=mutual; keydata= mQINBFKbGksBEADeguVs+XyJc3mL3iiOBqDd16wSk97YTJYOi4VsHsINzJr09oFvNDiaDBIi fLn2p8XcJvehcsF2GSgrfXfw+uK4O1jyNIKJmiYA0EtE+ZbRtvDrrE0w6Q8+SDeKA21SWh3Y vSQ0DJUontbgW55ER2CbEiIUTIn34uQ0kmESAaw/v5p/9ue8yPTmURvv130FqPFz8VPzltqL NxyGt54TxPfKAzAHEIwxlEZ63JOwzloKh1UDBExcsf9nJO08/TAVgR5UZ5njFBPzaaquhRoP qPJLEQQDqxPIlvMNtHKf7iIebE4BHeqgCdJA0BoiR6gpa0wlsZtdrTPK3n4wYSphLvGbhfOZ YW/hbcu7HYS/FImkVxB3iY17kcC1UTnx4ZaYeASPBGOOPbXky1lLfmDGWIFT//70yx+G17qD OZzF1SvJJhGvh6ilFYaWMX7T+nIp6Mcafc4D7AakXM+XdubNXOMlCJhzPcZ0skgAEnYV587w V7em5fDVwQccwvtfezzqKeJAU5TGiywBHSR5Svzk2FwRNf6M//hWkpq0SRR63iOhkHGOAEBi 69GfEIwH2/w24rLxP0E+Hqq8n+EWNkPatw1Mhcl5PKkdvGCjJUaGNMkpBffjyYo254JXRscR eEnwdIkJt4ErDvjb2/UrOFq31wWMOiLzJeVchAgvTHBMRfP9aQARAQABtCFMZXYgU2VyZWJy eWFrb3YgPGxldkBGcmVlQlNELm9yZz6JAlYEEwEIAEACGwMHCwkIBwMCAQYVCAIJCgsEFgID AQIeAQIXgBYhBPltHKC19DGLZ0szCuqwPFi/3EePBQJb/TeXBQkPBbfGAAoJEOqwPFi/3EeP LtEQANQLS89OCDSnLDZLyCj7sH5GZbTikJp9Or2McqEOpjgtfY/OgqCe7lfo8f71tTN3gL2t VGtNEtsl6CqKeBdm6fqsetCAed2+waJfbXLZWReLRSFQJ/cbof8MB3h/uEw8Zng1ZbyEU0eG rc41Mhk8bTfxjNRjkXDbp0+2xug+eRr2RYhiY2SxH+iy57AbRIu9gkjfL05VztfvsV5dPxt7 +reHf2Vhtu+qCRtCytGQqDvYWGpVZ8U5fHJxFdsJpn66LAe8w+iRGCbppB5TKeHkqWqDb++u sd5ZHzwep/7qcLBeKggi8+a2C3J1J4TpYBwdPgusrGtBPf2EYSTc/0mW5j86g1l8UDN9qXAI FvWbKf22p5SlYUzf5qRLny4ZdDl1mH13lmJV7ZkZGMKnt0IjJ2x0LRgLGhiSm/D4Lh8yc/MX uhj9BB020XbWcMUPpA7S7YaWeIXbnK3NrPU0yk77prFJblfskOwuaxJIwa2mX+cCAQA95As5 2talifo4Kh8OLSvS1gpbMo64LllTzuGbCWuKecH3fpMlZlD7/10z9lBvkSXA7KgadDfN0yHO xGCK8KE9gXXmEVRlbgGDYOJw9FLWHuSZHUvQTkmr4goXrmMIKa9A4BKO3s9vowP4pJ0vp3kz MIBeEwKSvAeZZfgKbIKggKUuQ5gsAqvF360sG3+UuQINBFKbGksBEAC0a9wfjo2P3JyT7Lc+ QlbFVshGbSbazb4ma7QYG5IZZD5vfLBFkePoG6cnrn3WCXp4A43hszAynCwe4eXyAkv4+gPF 3ZSeNE5Wz3zYG+jh2nm2iGCkyaVykfbA+2chor2DKH5tHpuNMBlF+wSJHZKJmlo/sFIktAnV 1NBVg4/cL+9/hIpvl82cl3hYCD7/e7/qRE+w38CpAAzn65FvbODn7xlY3fsJt+cHPBJ4EBM9 KnTwcce+F+72RQMZQEl7vIAwSRmLdgZHN0MFC533l62SVoKjT0eaOOIBrvesmojhWjfwugib Xr+WRF/tGcW77Bxwe2eQLbEVESqWeMORxRxocx7Q7aACoHmf4G4U1Vzx7zUEfNfHjfjZeQVf AURf/MoUelZSW/BmMIfKCg3lRlWAt+Pq2h2UADPVqAZze45beE/c8z8LZsOZiGoRhYL8NSg6 +ziLTdmYLWdtFGAuZhqOtNp5h6tGj21OksBotcaIa5YjbCmmnImIjGlSBkUKvIhq/RXth5b2 gNwaQdu+Yv4AlZVHRsuVywL/skDFL5+We11bDK6MQ5PzvmntRJcgbyoisn1hiV04OV1LpJJM kJn1j8VlBqDQNT/z+BjB0ru/0anv+5uLj7v0ck06rEo4yiXT/ZAcBM76j7V7FaGbkoba6bUU CQ2H5YYBOKpikjCnpwARAQABiQI8BBgBCAAmAhsMFiEE+W0coLX0MYtnSzMK6rA8WL/cR48F Alv9N7IFCQ8Ft+cACgkQ6rA8WL/cR49wpw//W7QrZHKYUWEVHtPLVMlcM1f7MgwnYlIRe/I6 gykwvt87sqxSYu7eHxfX6JZR2M9UYuUYscSR57gxXKu2Uzqaz2KjvEIXJCwCTsuXZjkQ19oL hAPsucw2AcMI6YqPXbZ7hO0Mh8jMeJzD6vDvx3zvunQxGQoZKxr3BvRUyO7NCYbA7N8ccI3E Tmdjj9JTbtue9WaUeGLszFDiITmkASBdsK07y4ylLAJzUGCvYLBU3gx0bBOB2S8SbxHYmQlj ewjovbp+MbT+CoXNxZp+gDRModGyIMdRIotkRiDbgNl0VWIT0SS1GUUlUHKzQ/ZPUvpvk6Gq s/SYBS7rBQNSoXXmJxNW6I6atVNW7JhInC1tkHxBlbpik4FK07J6NHFTx+9ygyCxbxwNA/Le FGkL3kU0VFXR2dNiAVbeueUPF6tU5Bye5ftgpLKOSAbo1g++EKUkc8335/4oYRBMcGEk4xUr NAvzoFPhA2W3KtklruJ9ThrFt9+//NB5ySlVgTwGWMuBJoskEmNOTBv34/UQPUIuE4xSwy6y H+nRQJooiMFo5QCosslJPlwyV63NS9lYXB6n3QWOCP6sFdWACNUCOFv4uk7LQdY9BsCmt2Tk cLuHmoS+fvUesQXnYV2aQi9HciriPIj2gvJ6WjgiaC/PpePil0fzyrfG/JMyHL0qcgmYoj0= Organization: FreeBSD Message-ID: Date: Mon, 17 Jun 2019 20:41:56 +0300 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="FDifwWRzpEXXK5MHZpL7CFxYbuFoTXT2Q" X-Rspamd-Queue-Id: 31B2B74210 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.98 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.98)[-0.982,0]; ASN(0.00)[asn:11403, ipnet:96.47.64.0/20, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2019 17:42:06 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --FDifwWRzpEXXK5MHZpL7CFxYbuFoTXT2Q Content-Type: multipart/mixed; boundary="YbMumbJtJG6pL6AOoRmzBGH7xKnZQWsb6"; protected-headers="v1" From: Lev Serebryakov Reply-To: lev@FreeBSD.org To: FreeBSD Hackers Message-ID: Subject: Does `sys/net/radix.c` support non-contiguous masks? --YbMumbJtJG6pL6AOoRmzBGH7xKnZQWsb6 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable I'm trying to use `sys/net/radix.c` to store flow data (proto + src ip/port + dst ip/port) with non-contiguous masks (like "TCP from any address/port to 192.168.134.1"). I've written very simple prototype userland code [1] but it hangs in infinite loop on addition of second node (!). Is it supported? Could somebody look at code and say, what do I do wrong? `radix.c` API is not very well-documented=E2=80=A6 [1] https://gist.github.com/blacklion/072537283e91d39638438c9456b29292 --=20 // Lev Serebryakov --YbMumbJtJG6pL6AOoRmzBGH7xKnZQWsb6-- --FDifwWRzpEXXK5MHZpL7CFxYbuFoTXT2Q Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE+W0coLX0MYtnSzMK6rA8WL/cR48FAl0H0OpfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEY5 NkQxQ0EwQjVGNDMxOEI2NzRCMzMwQUVBQjAzQzU4QkZEQzQ3OEYACgkQ6rA8WL/c R4+yhRAAkAPQeKh+cibt0X91repMFbDlrfJLXnlPrIG8nkhuqdns/IEpv6KxmKxv xuvwUPI1u3CRi9wKEV7QzBAmpVmdrqeE66QtU0w1RrOIHIsLxj+Yzpm3UOjG0/zq uWqu+U06qtmRYLx1QQBfzcdLQ+C8xQIEpHZ8MqEh56wo25l8Mb7B18uDknC9P1y6 EtHI6esOs3cr0f0RZ5z+1VcLhCFh6sKB94uUBT5bia7liXy9slRxqwThoLzSBxjd cKE+3nNA4Nnk17Z4+6sJABvNyH56nHjXh1G76ytZzo9EQPL5nVkUFfoyhNPDMRz2 BbqQdys4Ycbtx87EXBOh08So75Fk46ZT3cF19X3x9KzhBlhj9K6L6yMG02nn0hKa bDB/8RAHdVz3bmeNICgTQr8qRXc7C0cfeO97M7Q6SpCWGozSc9CXDtBqVLPRhObG kYZ7wUIJKxuVJlQ5DONrFX+/eZWn1AJF9b5p4D5Z9ZkY8rmdTlzlidimYaYgoZQ9 kvYnY4qyP4910M1bnma6cwDUMqAiaa1FUbhFWBOIPiyjkw7CCNV858IDFReM6KoC prTBHWk71WD1Jo+yB9Mt4U1TX//Y8ps2pQhE+yZUU9GRvMXo6mDg0BSMepXNH23I U8W5pqdIxaSmbjPZcMEVWn6s3AbE5Q1qc5qFh69NjnFT3oUAmYY= =UKqv -----END PGP SIGNATURE----- --FDifwWRzpEXXK5MHZpL7CFxYbuFoTXT2Q-- From owner-freebsd-hackers@freebsd.org Mon Jun 17 18:13:28 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3031215C16D9 for ; Mon, 17 Jun 2019 18:13:28 +0000 (UTC) (envelope-from slw@zxy.spb.ru) Received: from zxy.spb.ru (zxy.spb.ru [195.70.199.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id A41237557E; Mon, 17 Jun 2019 18:13:26 +0000 (UTC) (envelope-from slw@zxy.spb.ru) Received: from slw by zxy.spb.ru with local (Exim 4.86 (FreeBSD)) (envelope-from ) id 1hcw86-000Fld-Qh; Mon, 17 Jun 2019 21:13:18 +0300 Date: Mon, 17 Jun 2019 21:13:18 +0300 From: Slawa Olhovchenkov To: Lev Serebryakov Cc: FreeBSD Hackers Subject: Re: Does `sys/net/radix.c` support non-contiguous masks? Message-ID: <20190617181318.GJ47119@zxy.spb.ru> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.24 (2015-08-30) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: slw@zxy.spb.ru X-SA-Exim-Scanned: No (on zxy.spb.ru); SAEximRunCond expanded to false X-Rspamd-Queue-Id: A41237557E X-Spamd-Bar: ++++ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [4.77 / 15.00]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_SPAM_SHORT(0.94)[0.939,0]; MIME_GOOD(-0.10)[text/plain]; MIME_TRACE(0.00)[0:+]; DMARC_NA(0.00)[zxy.spb.ru]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.95)[0.948,0]; RCVD_TLS_LAST(0.00)[]; TO_DN_ALL(0.00)[]; MX_GOOD(-0.01)[zxy.spb.ru]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_SPAM_LONG(0.99)[0.993,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:5495, ipnet:195.70.192.0/19, country:RU]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(0.00)[country: RU(0.01)]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2019 18:13:28 -0000 On Mon, Jun 17, 2019 at 08:41:56PM +0300, Lev Serebryakov wrote: > > I'm trying to use `sys/net/radix.c` to store flow data (proto + src > ip/port + dst ip/port) with non-contiguous masks (like "TCP from any > address/port to 192.168.134.1"). I've written very simple prototype > userland code [1] but it hangs in infinite loop on addition of second > node (!). > > Is it supported? > > Could somebody look at code and say, what do I do wrong? For use non-contiguous masks you need use 'Cecilia' algorithm by Paul Tsuchiya "A Search Algorithm for Table Entries with Non-contiguous Wildcarding" https://pdfs.semanticscholar.org/9426/13f5634855a709bfecca296148bbd28810e7.pdf be careful: not fully correct. From owner-freebsd-hackers@freebsd.org Mon Jun 17 19:04:16 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A48E515C2367 for ; Mon, 17 Jun 2019 19:04:16 +0000 (UTC) (envelope-from phk@critter.freebsd.dk) Received: from phk.freebsd.dk (phk.freebsd.dk [130.225.244.222]) by mx1.freebsd.org (Postfix) with ESMTP id 49C6076A68; Mon, 17 Jun 2019 19:04:13 +0000 (UTC) (envelope-from phk@critter.freebsd.dk) Received: from critter.freebsd.dk (v-critter.freebsd.dk [192.168.55.3]) by phk.freebsd.dk (Postfix) with ESMTP id D7C072025624; Mon, 17 Jun 2019 19:04:06 +0000 (UTC) Received: from critter.freebsd.dk (localhost [127.0.0.1]) by critter.freebsd.dk (8.15.2/8.15.2) with ESMTPS id x5HJ46ss002466 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Mon, 17 Jun 2019 19:04:06 GMT (envelope-from phk@critter.freebsd.dk) Received: (from phk@localhost) by critter.freebsd.dk (8.15.2/8.15.2/Submit) id x5HJ457f002465; Mon, 17 Jun 2019 19:04:05 GMT (envelope-from phk) To: Warner Losh cc: Mark Johnston , Fuqian Huang , FreeBSD Hackers Subject: Re: dev:md: A kernel address leakage in sys/dev/md/md.c In-reply-to: From: "Poul-Henning Kamp" References: <20190617162514.GC64731@raichu> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-ID: <2463.1560798245.1@critter.freebsd.dk> Content-Transfer-Encoding: quoted-printable Date: Mon, 17 Jun 2019 19:04:05 +0000 Message-ID: <2464.1560798245@critter.freebsd.dk> X-Rspamd-Queue-Id: 49C6076A68 X-Spamd-Bar: +++ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [3.97 / 15.00]; RCVD_COUNT_THREE(0.00)[4]; TO_DN_ALL(0.00)[]; MX_GOOD(-0.01)[phk.freebsd.dk]; FORGED_SENDER(0.30)[phk@phk.freebsd.dk,phk@critter.freebsd.dk]; RCVD_NO_TLS_LAST(0.10)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:1835, ipnet:130.225.0.0/16, country:EU]; FROM_NEQ_ENVFROM(0.00)[phk@phk.freebsd.dk,phk@critter.freebsd.dk]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; NEURAL_SPAM_SHORT(0.92)[0.923,0]; TAGGED_RCPT(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[freebsd.dk]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.73)[0.727,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_SPAM_LONG(0.96)[0.963,0]; R_SPF_NA(0.00)[]; IP_SCORE(0.06)[ip: (0.12), ipnet: 130.225.0.0/16(0.06), asn: 1835(0.16), country: EU(-0.01)] X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2019 19:04:16 -0000 -------- In message , Warner Losh writes: >If we are serious about this, [...] then sysctl kern.geom "leaks" a lot of pointers... -- = Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe = Never attribute to malice what can adequately be explained by incompetence= . From owner-freebsd-hackers@freebsd.org Mon Jun 17 20:12:44 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6547115C360D for ; Mon, 17 Jun 2019 20:12:44 +0000 (UTC) (envelope-from oliver.pinter@hardenedbsd.org) Received: from mail-yb1-xb34.google.com (mail-yb1-xb34.google.com [IPv6:2607:f8b0:4864:20::b34]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 1065580ACB for ; Mon, 17 Jun 2019 20:12:42 +0000 (UTC) (envelope-from oliver.pinter@hardenedbsd.org) Received: by mail-yb1-xb34.google.com with SMTP id n145so5020734ybg.10 for ; Mon, 17 Jun 2019 13:12:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hardenedbsd.org; s=google; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=4gs/SVYeriYDS/rXYZIVU5vpV603o7DcWiGMJghfaio=; b=Qx1G3n0bq5/9FHH0Uz3RPFdySYkqNdrAOTm52lYBbF41Q7rVJsBbwyL4HLKgs6Cl+h fUcmfBxDwEaElNj8m8NvHngclDRlPNb2u/7Mg/ybmjSUfqmO0ZEdgt3F7cWoI+ejMcxB 2r2MBaavkxdsBGAErLVZuZ9zWl2vTDZxIVBuYLgfpB+1LXy2kevhWrQ8ij+GW4VXhVv5 QfRVwQ6KUoxO/RotjWOBvqNHdDAYGr4bHlPNcUzu+YdHUDcWbrRIxlx+deLYLQwuJrvs Cy5AhuxxY4vX18O770K4s3kHcrkCu9zLfPLDxx6a94PHQeSFNBj4BF7h/7ydb1MbSylq gYyQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=4gs/SVYeriYDS/rXYZIVU5vpV603o7DcWiGMJghfaio=; b=AU+Ebe12hVaB/Yw8kmW/N01lVM69VPQn0ZL8h7RtWtvm59xfkUcNbJ1Ex4XyOsGXFu dTOKDgNFnwRg1KKZYu5EORNjZXd43Dj07OsSRQFg9DbS5HdpXMoqS8ORSDNE8j1M0ofh qnuz/bGBQozDJ0/GvgH4frr6LlH9qnbWoenxjN5LeI7NQtKk0vQivArAnS9vLbgjsP4z DQclNgC/kgwp9XLZyw8Z6WklRnd2fC4LKCz7UbF57X5Zcon04wcoFZyoOQRR+oYmm4x3 arYLGtnCwnGulNzDbz5hDjiSd0ZVyalAMhkMqNroTPgg9HVSJ+sTlodt9h/LFiLkvxuX aJ0Q== X-Gm-Message-State: APjAAAWMr88tXgYDn+HGmbzFkU2TlMTYzKJo+/SrPI34ObhpeTVTx6Vi zaZZQxE3XFIV9w/2GORsTm/ieYHNjB8JKXL70caHtw== X-Google-Smtp-Source: APXvYqwO4dzZLcRCKhhAhVkJHduwE+BTEr5F97ijz4IwgEFgyEcEPn8rdCcoEcnl6F7qB/ZppdVIuYomlA8WlR2hLDE= X-Received: by 2002:a25:6981:: with SMTP id e123mr51462133ybc.297.1560802362224; Mon, 17 Jun 2019 13:12:42 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a25:4a86:0:0:0:0:0 with HTTP; Mon, 17 Jun 2019 13:12:41 -0700 (PDT) In-Reply-To: <2464.1560798245@critter.freebsd.dk> References: <20190617162514.GC64731@raichu> <2464.1560798245@critter.freebsd.dk> From: Oliver Pinter Date: Mon, 17 Jun 2019 22:12:41 +0200 Message-ID: Subject: Re: dev:md: A kernel address leakage in sys/dev/md/md.c To: Poul-Henning Kamp Cc: Warner Losh , Fuqian Huang , FreeBSD Hackers , Mark Johnston X-Rspamd-Queue-Id: 1065580ACB X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; dkim=pass header.d=hardenedbsd.org header.s=google header.b=Qx1G3n0b; spf=pass (mx1.freebsd.org: domain of oliver.pinter@hardenedbsd.org designates 2607:f8b0:4864:20::b34 as permitted sender) smtp.mailfrom=oliver.pinter@hardenedbsd.org X-Spamd-Result: default: False [-6.49 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[hardenedbsd.org:s=google]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; DMARC_NA(0.00)[hardenedbsd.org]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; RCPT_COUNT_FIVE(0.00)[5]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[hardenedbsd.org:+]; MX_GOOD(-0.01)[alt1.aspmx.l.google.com,aspmx.l.google.com,aspmx2.googlemail.com,alt2.aspmx.l.google.com,aspmx3.googlemail.com]; RCVD_IN_DNSWL_NONE(0.00)[4.3.b.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.98)[-0.984,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; IP_SCORE(-2.99)[ip: (-9.42), ipnet: 2607:f8b0::/32(-3.17), asn: 15169(-2.32), country: US(-0.06)] Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Jun 2019 20:12:44 -0000 On Monday, June 17, 2019, Poul-Henning Kamp wrote: > -------- > In message 26YUVV8qFweRbvmbCe+EZQBaz2hJQ@mail.gmail.com> > , Warner Losh writes: > > >If we are serious about this, [...] > > then sysctl kern.geom "leaks" a lot of pointers... Or just run sysctl -a =C2=A6 grep -i 0xff on a fully configured system. > > -- > Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 > phk@FreeBSD.ORG | TCP/IP since RFC 956 > FreeBSD committer | BSD since 4.3-tahoe > Never attribute to malice what can adequately be explained by incompetenc= e. > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org= " > From owner-freebsd-hackers@freebsd.org Tue Jun 18 00:34:06 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1CC3E15C8BF1 for ; Tue, 18 Jun 2019 00:34:06 +0000 (UTC) (envelope-from nwhitehorn@freebsd.org) Received: from c.mail.sonic.net (c.mail.sonic.net [64.142.111.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 480C989432 for ; Tue, 18 Jun 2019 00:34:05 +0000 (UTC) (envelope-from nwhitehorn@freebsd.org) Received: from helicon.physics.ucla.edu (helicon.physics.ucla.edu [169.232.156.253]) (authenticated bits=0) by c.mail.sonic.net (8.15.1/8.15.1) with ESMTPSA id x5I0NjcS030775 (version=TLSv1.2 cipher=AES128-SHA bits=128 verify=NOT) for ; Mon, 17 Jun 2019 17:23:45 -0700 Subject: Re: dev:md: A kernel address leakage in sys/dev/md/md.c To: freebsd-hackers@freebsd.org References: <20190617162514.GC64731@raichu> From: Nathan Whitehorn Openpgp: preference=signencrypt Autocrypt: addr=nwhitehorn@freebsd.org; keydata= mQINBFuARN8BEADLKYsG3l1aq/M21R59I/5EsEfvtvd15ZJ9lDHcWPuxzIfGnu2LMpe5PrFP e/Y4bcsPrlB4S3I3ooIUDvoEEsDeqgqlZod3QevOK/RjLqiqx1i/4mKnobJ++3ppyVVIccgN sUrj786OYCFCI/W+uWw7cbKewNeaL//Z/TDKlHLkssiy6qmZbNQ0ZjcMLJKUesk4eVg2TtTD HNe42ZuxbUC9iLYieO4c7kQB4qiFhagDRiObXrLzvm2MQYeAaNVRqID+mfI75TWrQ+t98iVu mHvFu461eeteq59jg6H/IL07ACxL+HzEVM+D6tPtPrz7ppr3wiZL5Cu17yu0nAx0nhJTV8ZB qza1rOVun0x65S14L41XD2HkmBDxTaRlTg8ypnkLFo8kh+MEq4k67apL/DUGcaUjKy2TVUC7 3igLO/DwQHrkWx2RrOmS3xS0TgGXVmB47nq2Zveo3fcjporQK63n2sbLkS70cfAJAJ9KHEIx u9am44iW5Ku3+mVLgQYybtcUxlk/Jw/BA5V6KUcDQMd5kTm0MyagziqMaT+57ceYxwRBK4HC DCLRpSOHV81/YzyL5vnwfHsxADm3091rd0uwr8uRCQn7wLvlcFyp/JKSFkVnE1oo7UE4QQJZ GbSJyvj7GdXu0LdghALcMj/thdb+js4D3UuCaAMecgVSscxEIQARAQABtClOYXRoYW4gV2hp dGVob3JuIDxud2hpdGVob3JuQGZyZWVic2Qub3JnPokCTgQTAQgAOBYhBD1kIPqoIUk+gL8N YTi2TZRmhOh3BQJbgFJIAhsDBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEDi2TZRmhOh3 M6YP/RHkgLWCPGGBSKZ3an3GhRMO2B5qd+g5QGUt4gvvdMMgUqwvmUva4obvgS5qXbYOmFGM cP5myo1mcJ45Q06Qdy8pnFEBBm4dKlNZT8LHAz/lr0/I8FINJcIdwmyxHJzELW7nlBy+ZO0z rCJ4CK//MMCAlomj6s9ydaGF0Dnbj9LmE+CS/ZZaYqil5KgsXO2rbN1wa0QOpZjAc8I1NyDN 10nWTZSLeFcbfTWItc8bxVC8NOerG25OVMxjyvqp15ZSExL5NfxIMsrTAjk5AsLr0bCW3tGA A0eM2cwLBhAfdh3fdj+/8tzakafFwR8XrA6YWrvgFmIjCgXfbVGp058595SDHGM1BeCJ94Bm TJMbCTsGPTUbRsWXJ4ytjziqMPPYkXif+NdWNLX3/TTu4oGPGsPQjbTA2xTfLLjNFKLv0ieT XTMg3vMhiOsZnfKt65fwoJWh+mfBe9S4ImNiI2C6H/gr9rpjZZQ3f85+AUAQrVjZJwaOctTC wOr8o8odS5WrpwZVEQhJj8TdOiHKPsAS8+zsjdGucfkXBHnSctMS1uv9QMTTrMvWhuihzYlw 2pC3LHEvxUpv1lk+jH42uRqbMF0FfSPkundHalWXY/HZKWdukc5lhIcGYR9bcm+Eq5/P0Qyv 3q8Q6hIjx6pN4828q8aA0lDnQ1LOtGZjToGZUrcmuQINBFuARRkBEAC9SmeRBQpprN52L+js v29No0eITfSrXTbNhqLB4ikDcnGFDih9yunAQyKk+y++unxYute4NH70qnKpvHOzHENKrSNg uDgs0ga7/4iQMs2rWqTgSQ97JfmW6ilqJXbtKyKvLvK2Jt1lJo7I2uB3Sg3pupHc0WMElIyg EHm/goNnZA401BPGmkgwl9vD4UHxn4+om3CrqpcNWFIrJ/bHKjtg/CcINz3DA7KuyKTlg+jO IgH1Xf5cmCW8e4LeQoMqkXu5y9E+4/M+o6YKiLLplSk5pc0pep/+9S+5fVW2YTDjNXVIY1KK E5IqWZ5HsjxcsfEVEVgm/auR7iVreIi2dkJVrKczMMV0KBOqqwg3eXwfaUZo1NWL6FaHruYK tHkSblUWKSR2sLfDUnrFTj8/fRTHba6fDUhoxHPVnptEjCsSvUxCEVWZN9V64XjlFCO3cF72 e75ikbGp2R1PRPWgDFmmX0pHTGPKUImqKuF4krGrY64pf8iRUTyQvbNF49i6e4ycGwlAHhSq FBZkVBwvUZeDp9DFfL2Rht/QtjYH0yfcT5zRL0aI3oX6I7luCYvm4K4HG461BvTkvxZ2xmo3 dACzmwEyAClpseEaMOsbgwosnTFhehd4Qz1Kl4Yiry8/yqISEodt6vRjs5jAsT2okDBCc6qx +dww3ymXNvEGrf+AvQARAQABiQRsBBgBCAAgFiEEPWQg+qghST6Avw1hOLZNlGaE6HcFAluA RRkCGwICQAkQOLZNlGaE6HfBdCAEGQEIAB0WIQTTpX+yMt35tfRft49NUswkCJ+wagUCW4BF GQAKCRBNUswkCJ+waqoWEACAWq6YgCh4H+JPNxM33ENOmKZ+WmIfr7jgoy1UAhUz0OshLPHM dy4oyaPefNaio5jcp8rvuT7qxA19s1VOyA6NIvCBnMzs+x9bTkQdZ31mcBcESNltKShYO3mq JE8Iz665xUlY2U45x8oGO+pYvWXvZv1C4pXtqczzQQldRuYJ+zfHyGmJoDP6exj0ALVfApH1 RKrCHt51ZottN0gcy4fkmBF+D13hUWAEtq0TBXw+2m6Qwq5xQmWkItzw4x9CF+wE78hNodY5 TXoifJvMB78O/ltPUqUiiPn6FAmi7ErDA3Ue+b4dSBWCx/i+jhh08blrbTQeMr6yswQJzx3M m6BDvYsKZKC9WNI9YKJxopd/udikmcPSoBTyWgMhjm0FPMb3c9Ay9nlbV04LlaqT7DsG8WbL X6O8CZUEpsB8r2kptm4wjjkIywT5eyXbcoNMV449KRzobWDCLOzA50cqTCPwa+YaHUamcoXs 7f3g0AllZVg3J48tq3orQrbmd80/n6AK158fURHR4pPf1m7Z8LGvmfN5vSpw81IgJ0KQEg7P mBsrOZKXGRNvtiHipWvdC9+ex1OSHRNtKTL7bbBYV01atsw74pspBLwXbH/lWnUtFucwav41 wbtHYdfbhxpXZRL0YLcrJq6+oatJlUxzAjO3wz/EuU/5OAwMGJVptO80308ID/4jEYmXl0Ux PEXv2/FjHser/OdhzQNhLft9bBlMiSGwui5Rv0tWPZ7dB7gxsuJIBzvb/FoJXbFysmm+o4Bt go0xQqXqFBX4pD9KYKTDo9q4Bh+0k+NGKvBMJI9pwFu+Ix+u1dbrFnpi/q2nFRfYEKeZiKOD HOxMMcSeYEFaHqiiy5A7QDuW7i7e4uGY0Ls7vnxrNQTWpEIe9E6kIjIHtNWAOIypL8+tiuxr CckPYFEDEmJmp1XIIoFXOIgGceky7huMvtyWHAuE1RjrZpN34nuntpoPlYv0PpPNAIg20HBA eX+reoTCRquUz5F2yZuZRL4o2/sSbDwu4m1As4G0QNaWB7j3grTn6AEVhMbjLgA+QkPpvpN8 s3iEVlEyzuypuGhRR9sMMB/8itWKtCV4/TGoAGJkoK+LsVllfIuu2m9ekV9HAOg3583ame9L NQD0nD35egjdIv7PhbZDYVgPq1NS27b8wz8RqvYWlw+1kUSD62byWu/oFLLifHfUh66ImLCk kbJJBZ5XgGKb/mVpBRiyw7zJUJZgIyTB1NcCWr09n7X+44KuocAYM/hE7NKv8To/5PFmsWFu Y8m1Qh/j7U8/gOdAT7+Q4tLczRRU/ngcW8b/1ajWMY6UuZhrp/WfLoKHS79VYK39OClHRLSU hr911kye7XJLUdGr4S2k+enQb7kCDQRbgEVBARAA4soW2Dq6zQAsDsu2+PEiyQiCoUmMfDaR r9S10njfY/2S+YGrvPi/T6b+CTEI44bTIOLYK/8AsmhuzJvnq1tToxTRJGNOKjflLaOK3fr0 HUEMLZMs0XffuxSq5THSXjCQRcQF5+8tFii4XwFFuSCO96DuwDg2OyJ25DH3a88mcGhofY5b GoNuvlfqQXlzH2M+spQnhmof+toT9JIOG2jDhoo7SdZu15UZyTXlbVf9LwrOI9cprPEJDyqm tBFMB6Gx0b9tJtYP3mGndMCURuXg3hSqpLufiMJm6cJ6KLZMNkdW/H+WkUBPZ7PHrjqnY9SY fmGmJUyBtjm4dzJqHA1/54047uCi2c1iiJ6gvDh9R5Ng6r6zcg2KwIHiKi9Bxk4JhLObBGiV BGCBfS0FJ6dHo+CnfxiNUiRa8weHFtWJ8C6yO9Vub8ZB4DYxoK2SiDncjJ+juuL0N42lW5Fz /jsHEeLwm13LIaAs7XcCNzBzpXsot4ObD9JckAyyy5ZCVfOzw6Cyk2+3KYGHmurhOXEBjrkv di//KHSLMTO04k7c5v3LeAuuntN4MjQQ71LIa4VduBZj81eUPBYdaC4yA7sNYz8rF5oxjId+ d98h5Dq6EzbXLjYjs1XXWZbDJy/9cmQgPd93sZYF5xqR1idgj/sVgwMeaxRA+ZIyRuoKphxl 7jsAEQEAAYkCNgQYAQgAIBYhBD1kIPqoIUk+gL8NYTi2TZRmhOh3BQJbgEVBAhsMAAoJEDi2 TZRmhOh3ZFsQAJtDZvAnf75u+pyUStt6R/sFdiNrfv8fEYTrurf3F/byF6fy9Ya1fCrhtaZl PkfxsGpeKADhtRTic3hffEQN9PKqRAy4NOefBPtjrUHhASqGLhqrhp1/8o/SXVQKDgInQpL3 fUdqf5VuK5Rxtp27VlffsR/qD+Eb6a3n0V5cMxTSt6uzYGmvzMHzLCiMCxUL3aS84cuwJC10 Kw/ML5HoHVtjr9F72yUzU0F37aTgFRWFi7wVvwivfs6Y3RoZDNi5FzN+uZH85Xn/X6Dld5hI Vur/RDcqQVYsd+KZ9/yVv0ZFat285SljIaW6/j1v8bmj2VLE/BfIF9qhWL9YMN8n9cnD0f3R crrxNjE98RCR64sQTOD4HPdl527KjZnHhLlqkuoBu/RHN25eAgZhlU+7xHjJrydBYd5Smi3X uW3xIvvIWQwloBeTbtCpQBrGOqcYEufvRgxZcUbJJ++OBpHUW279L8dIqofubxoVhl+2qztm iNc12oYdkpGsjHqFFRi5lAzy7EcPB4XiMX5AjBghSa2vLmHyK2JKO30oeOmQfdbPmjWaTpxs U037CCkemUOX+JkxmMWyRMAl8SxgdVJKbbXNxi++iCtupi9yIxO3Lrn7QDwbP20xtw3H149o agz72N4V6GvNON1qJOIL66ZJ39jb0MJbg4EyvVV+59VUpt8B Message-ID: <95db8d0d-5434-b2e0-c09b-55a9e2a41038@freebsd.org> Date: Mon, 17 Jun 2019 17:23:43 -0700 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: <20190617162514.GC64731@raichu> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US X-Sonic-CAuth: UmFuZG9tSVaxb3IprwTfbkHP32eq+eGYnYHqUcdnBr6Gw7OcqyUJYHKl7/6qGkE019Gc+Z4k5hBQU5D2+5VT7qQCOoiYCBMbDu6dLsJ9jnE= X-Sonic-ID: C;0rJsVV+R6RGORv5tiXKSzw== M;JuWpVV+R6RGORv5tiXKSzw== X-Spam-Flag: No X-Sonic-Spam-Details: 0.0/5.0 by cerberusd X-Rspamd-Queue-Id: 480C989432 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.96 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_SHORT(-0.96)[-0.963,0]; ASN(0.00)[asn:7065, ipnet:64.142.96.0/19, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 18 Jun 2019 00:34:06 -0000 On 2019-06-17 09:25, Mark Johnston wrote: > On Thu, Jun 13, 2019 at 02:52:24PM +0800, Fuqian Huang wrote: >> In freebsd/sys/dev/md/md.c >> if the kernel is created with option MD_ROOT, >> g_md_init will call md_preload and use mfs_root as the image. >> In function md_preload, address of image will be printed out, >> in this case, the address of image is the address of a global object mfs_root. >> A kernel address leakage happens. > We have many such leaks. For example, netstat and fstat will print > the kernel addresses of various structures. We currently do not perform > any randomization of the kernel address space, so guessing is easy even > in the absence of these leaks. In light of this I'm not sure it's worth > the churn to update individual printf()s. We do on some lower-tier platforms. On PowerNV, for instance, the kernel will end up at a hard-to-predict address. I agree with the general point, thouh. -Nathan From owner-freebsd-hackers@freebsd.org Wed Jun 19 11:44:20 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 16E4615B50E0 for ; Wed, 19 Jun 2019 11:44:20 +0000 (UTC) (envelope-from 6yearold@gmail.com) Received: from mail-vk1-f174.google.com (mail-vk1-f174.google.com [209.85.221.174]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id E362788A55 for ; Wed, 19 Jun 2019 11:44:18 +0000 (UTC) (envelope-from 6yearold@gmail.com) Received: by mail-vk1-f174.google.com with SMTP id e83so2587198vke.12 for ; Wed, 19 Jun 2019 04:44:18 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=N5vn63TDxOhHRlQOPvRp+Zyb+yxeButHjg+O1gsPmYg=; b=MtkVlSlQQJTm1o0F5cs3BSR9E+ScoD4FL3yjCXY51BH1/Z+dtpc19ZlKGm0LrW64k6 Pl5PhFnXHFY7PlXGN32wbUMuFcC+hB0qGBs2u04/cEP36lYE2rYipvp9JlA9p0N0GOHL eiuXPPxiLztBs50sU0wfak7SsV+Omq7nGxFbjNw/olH9IMZJCM5jmj1MdVk2Jskj1H8Y /UXVULN2SKhY4GaEsQLMkAY46AtkJCpDAlDmlS+0cvbmDGEGoELjLZxFw6AFTOq3WhI5 kL9Hqlz58dmG3Z5Pp9KyPJjfHzChMTWDEhZkfBlHg+2wbqq7GKoGztAbdXpDYo5X9p4W my1A== X-Gm-Message-State: APjAAAUOG4vRx0ZOqaDQy60/9MJCr9MtalfjMc1C/zITdNrUjGHg/XSu HI3Mm4xDMgNYO87gazTWJ3sB/8w1lqw= X-Google-Smtp-Source: APXvYqzZ1s2KIdCj4Kcmci+kB4jv/EyzFHdBe420e/DGuXbkwNqrJhK8uE7VG02evFCvlkk4bhRDsQ== X-Received: by 2002:a63:2326:: with SMTP id j38mr6371608pgj.134.1560925384536; Tue, 18 Jun 2019 23:23:04 -0700 (PDT) Received: from mail-pf1-f174.google.com (mail-pf1-f174.google.com. [209.85.210.174]) by smtp.gmail.com with ESMTPSA id y12sm19259053pfn.187.2019.06.18.23.23.03 for (version=TLS1_3 cipher=AEAD-AES128-GCM-SHA256 bits=128/128); Tue, 18 Jun 2019 23:23:04 -0700 (PDT) Received: by mail-pf1-f174.google.com with SMTP id 81so9089808pfy.13 for ; Tue, 18 Jun 2019 23:23:03 -0700 (PDT) X-Received: by 2002:aa7:9254:: with SMTP id 20mr7835650pfp.212.1560925383666; Tue, 18 Jun 2019 23:23:03 -0700 (PDT) MIME-Version: 1.0 From: Gleb Popov Date: Wed, 19 Jun 2019 10:22:37 +0400 X-Gmail-Original-Message-ID: Message-ID: Subject: A bounty of $100 for rtsx SD card reader driver. To: freebsd-hackers X-Rspamd-Queue-Id: E362788A55 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of 6yearold@gmail.com designates 209.85.221.174 as permitted sender) smtp.mailfrom=6yearold@gmail.com X-Spamd-Result: default: False [-3.17 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; SUBJECT_HAS_CURRENCY(1.00)[]; RCVD_COUNT_THREE(0.00)[4]; TO_DN_ALL(0.00)[]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; NEURAL_HAM_SHORT(-0.99)[-0.994,0]; FORGED_SENDER(0.30)[arrowd@freebsd.org,6yearold@gmail.com]; MIME_TRACE(0.00)[0:+,1:+]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[arrowd@freebsd.org,6yearold@gmail.com]; TO_DOM_EQ_FROM_DOM(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; DMARC_NA(0.00)[freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(-1.16)[ipnet: 209.85.128.0/17(-3.44), asn: 15169(-2.32), country: US(-0.06)]; RCVD_IN_DNSWL_NONE(0.00)[174.221.85.209.list.dnswl.org : 127.0.5.0]; RCVD_TLS_LAST(0.00)[] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 19 Jun 2019 11:44:20 -0000 Hello hackers@ I've posted a bounty for this bug: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=204521 I invite anyone interested in using this driver on FreeBSD to either add some money to the bounty, or take up the task and implement it. This shouldn't be very hard, as there an OpenBSD implementation already. Thanks for your attention. From owner-freebsd-hackers@freebsd.org Wed Jun 19 13:24:02 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 353C415B88C1 for ; Wed, 19 Jun 2019 13:24:02 +0000 (UTC) (envelope-from goia.i.alexandru@gmail.com) Received: from mail-ua1-x942.google.com (mail-ua1-x942.google.com [IPv6:2607:f8b0:4864:20::942]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 39E978CC45 for ; Wed, 19 Jun 2019 13:24:01 +0000 (UTC) (envelope-from goia.i.alexandru@gmail.com) Received: by mail-ua1-x942.google.com with SMTP id o2so9746639uae.10 for ; Wed, 19 Jun 2019 06:24:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=p4gNXgnTuG3z7cLzi1dbRaHWAiEpZwJVCHnZlmuQi+o=; b=H7QCyIA78nJEuPAzko/rsuQc1PnFJ6oY3g67GfWXke02gPFlK3aJNvk7LCywfxuldP oaE3MW2gVbWmnb/hnGmsiMlrk6TrT+g2/iy6ydo54SlCwZSso3IV8WbUBNa1xFo4BfSl hNfegkgmxvv2uJBA11pBcpUPmuM0LNXMKt9x3bNL9/IlK9YaGOKmYVf37A2RN3OVRdC2 hN8AnQeClsMatxv3Cx/l4hH+vJtEBzBRzYVvnwg1JfCb9N8csdJ01UVVvuJ0KieErsrW 1E4bq5GE8HAP1bobd31C6Me7D7wIJdKFdP9wGXteimp7aGqNtzahepSXBeYB+wvzZze9 6sZw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=p4gNXgnTuG3z7cLzi1dbRaHWAiEpZwJVCHnZlmuQi+o=; b=RGzwe2Z5jwuSxPgu2i6zFboCgSOE9ImfSNAT3blYVpC2uClJ/rolnXdxyB5nswuThP d75x3kvyPwO8XPvhXNmwzO7PrEAbmfOmb4zuX4FpShlkgnmsxP8yRhKLiIM5FQZuPF/s yU8h8mHkA+BgdGuOArYqbN12yk1kqvYXZnpwZLyDYykOeg1IbPP+56lxa5KW3hOBDcvF DlBGAX1u9EnZdglVo+bHQHf0HCTifS0oaCUdhoYdnNE1uyXdAbiFffoo2deKiY9IvBMz UrxxiypbahcNV7J/EK7aOTUAJVpXOGgQvkoJOsWyiezf9sLkdgcRI5tmi7FLsCm8udcQ 1yFQ== X-Gm-Message-State: APjAAAU/0nMjVtOZmhdEI4ilFFuW8915TI5yUFfdd6Gf/uGQdN0+Jsd7 rMEvVwgsZd8HH11YbTQycI7cJGpF48q90vuLFhuZyMDZSDVs5w== X-Google-Smtp-Source: APXvYqyBHuIwCB8EDvImTCnBZcCSy+ZmJGmdJzg7WGSlFsMcN9/5A44YxsCrQ5jxg5BNG8DZS3GExm0qM7UUlIc6hEY= X-Received: by 2002:a67:11c1:: with SMTP id 184mr38490858vsr.217.1560950640528; Wed, 19 Jun 2019 06:24:00 -0700 (PDT) MIME-Version: 1.0 From: Alexandru Goia Date: Wed, 19 Jun 2019 16:23:49 +0300 Message-ID: Subject: FreeBSD kernel system call To: freebsd-hackers@freebsd.org X-Rspamd-Queue-Id: 39E978CC45 X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=H7QCyIA7; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of goiaialexandru@gmail.com designates 2607:f8b0:4864:20::942 as permitted sender) smtp.mailfrom=goiaialexandru@gmail.com X-Spamd-Result: default: False [-4.39 / 15.00]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; TO_DN_NONE(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; NEURAL_HAM_SHORT(-0.81)[-0.805,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; TAGGED_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; RCVD_TLS_LAST(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2.4.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; IP_SCORE(-0.57)[ip: (2.64), ipnet: 2607:f8b0::/32(-3.13), asn: 15169(-2.30), country: US(-0.06)]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 19 Jun 2019 13:24:02 -0000 Greetings ! I am trying to write the code to a Unix system call, on the FreeBSD 12.0 system. I managed to do that on Linux : http://romania-acknowledges-stars.blogspot.com/2018/10/angel-call-in-kernel.html but I find hard, without proper documentation, to implement it on FreeBSD. I am in trouble understanding the presence of SYSCALL_MODULE(9), and its meaning and usage. Please help. Thank you. Alexander Goia From owner-freebsd-hackers@freebsd.org Wed Jun 19 13:49:44 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3494E15B9499 for ; Wed, 19 Jun 2019 13:49:44 +0000 (UTC) (envelope-from bu7cher@yandex.ru) Received: from forward101o.mail.yandex.net (forward101o.mail.yandex.net [37.140.190.181]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 934038DC9F for ; Wed, 19 Jun 2019 13:49:41 +0000 (UTC) (envelope-from bu7cher@yandex.ru) Received: from mxback4j.mail.yandex.net (mxback4j.mail.yandex.net [IPv6:2a02:6b8:0:1619::10d]) by forward101o.mail.yandex.net (Yandex) with ESMTP id 49C393C031A9; Wed, 19 Jun 2019 16:49:38 +0300 (MSK) Received: from smtp4o.mail.yandex.net (smtp4o.mail.yandex.net [2a02:6b8:0:1a2d::28]) by mxback4j.mail.yandex.net (nwsmtp/Yandex) with ESMTP id r66coy1TqL-nc6mepVK; Wed, 19 Jun 2019 16:49:38 +0300 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex.ru; s=mail; t=1560952178; bh=pHflWoqaTQBJfiljj1KvjRKoGEkrA6hlObdKeIJHU94=; h=In-Reply-To:From:Date:References:To:Subject:Message-ID; b=M1OTD22XTs0djWOzv00T3Dtees7yLfratYVzL3NcwkVLHbCGU7tRNeGtLk63udWDD ID96GOTMW6EbKQrR4lLB/9KcZYJQZd1d45zXmOnGSnopklgMt0vSf5eAKMMHinGw1W QgExfnp52sXwJV3Y8Ow2yMU2/XjtBFIMtE6ab9WU= Received: by smtp4o.mail.yandex.net (nwsmtp/Yandex) with ESMTPSA id eedpiZXMx3-nbwaOIP0; Wed, 19 Jun 2019 16:49:37 +0300 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client certificate not present) Subject: Re: FreeBSD kernel system call To: Alexandru Goia , freebsd-hackers@freebsd.org References: From: "Andrey V. Elsukov" Openpgp: id=E6591E1B41DA1516F0C9BC0001C5EA0410C8A17A Autocrypt: addr=bu7cher@yandex.ru; prefer-encrypt=mutual; keydata= mQENBEwBF1kBCADB9sXFhBEUy8qQ4X63Y8eBatYMHGEFWN9ypS5lI3RE6qQW2EYbxNk7qUC5 21YIIS1mMFVBEfvR7J9uc7yaYgFCEb6Sce1RSO4ULN2mRKGHP3/Sl0ijZEjWHV91hY1YTHEF ZW/0GYinDf56sYpDDehaBF5wkWIo1+QK5nmj3vl0DIDCMNd7QEiWpyLVwECgLX2eOAXByT8B bCqVhJGcG6iFP7/B9Ll6uX5gb8thM9LM+ibwErDBVDGiOgvfxqidab7fdkh893IBCXa82H9N CNwnEtcgzh+BSKK5BgvPohFMgRwjti37TSxwLu63QejRGbZWSz3OK3jMOoF63tCgn7FvABEB AAG0JUFuZHJleSBWLiBFbHN1a292IDxidTdjaGVyQHlhbmRleC5ydT6JATgEEwECACIFAkwB F1kCGwMGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEAHF6gQQyKF6qmYIAI6ekfm1VA4T vqankI1ISE6ku4jV7UlpIQlEbE7/8n3Zd6teJ+pGOQhN5qk8QE7utdPdbktAzi+x7LIJVzUw 4TywZLXGrkP7VKYkfg6oyCGyzITghefQeJtr2TN4hYCkzPWpylkue8MtmqfZv/6royqwTbN+ +E09FQNvTgRUYJYTeQ1qOsxNRycwvw3dr2rOfuxShbzaHBB1pBIjGrMg8fC5pd65ACH5zuFV A0CoTNGMDrEZSfBkTW604UUHFFXeCoC3dwDZRKOWJ3GmMXns65Ai5YkA63BSHEE1Qle3VBhd cG1w0CB5FBV3pB27UVnf0jEbysrDqW4qN7XMRFSWNAy5AQ0ETAEXWQEIAJ2p6l9LBoqdH/0J PEFDY2t2gTvAuzz+8zs3R03dFuHcNbOwjvWCG0aOmVpAzkRa8egn5JB4sZaFUtKPYJEQ1Iu+ LUBwgvtXf4vWpzC67zs2dDuiW4LamH5p6xkTD61aHR7mCB3bg2TUjrDWn2Jt44cvoYxj3dz4 S49U1rc9ZPgD5axCNv45j72tggWlZvpefThP7xT1OlNTUqye2gAwQravXpZkl5JG4eOqJVIU X316iE3qso0iXRUtO7OseBf0PiVmk+wCahdreHOeOxK5jMhYkPKVn7z1sZiB7W2H2TojbmcK HZC22sz7Z/H36Lhg1+/RCnGzdEcjGc8oFHXHCxUAEQEAAYkBHwQYAQIACQUCTAEXWQIbDAAK CRABxeoEEMihegkYCAC3ivGYNe2taNm/4Nx5GPdzuaAJGKWksV+w9mo7dQvU+NmI2az5w8vw 98OmX7G0OV9snxMW+6cyNqBrVFTu33VVNzz9pnqNCHxGvj5dL5ltP160JV2zw2bUwJBYsgYQ WfyJJIM7l3gv5ZS3DGqaGIm9gOK1ANxfrR5PgPzvI9VxDhlr2juEVMZYAqPLEJe+SSxbwLoz BcFCNdDAyXcaAzXsx/E02YWm1hIWNRxanAe7Vlg7OL+gvLpdtrYCMg28PNqKNyrQ87LQ49O9 50IIZDOtNFeR0FGucjcLPdS9PiEqCoH7/waJxWp6ydJ+g4OYRBYNM0EmMgy1N85JJrV1mi5i Message-ID: <5432302a-9b55-d9b2-6001-539dbc02300d@yandex.ru> Date: Wed, 19 Jun 2019 16:47:27 +0300 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="kx6RvZhHQnm6v5PAgLy7J4e2AkLYkDPkS" X-Rspamd-Queue-Id: 934038DC9F X-Spamd-Bar: -------- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=yandex.ru header.s=mail header.b=M1OTD22X; dmarc=pass (policy=none) header.from=yandex.ru; spf=pass (mx1.freebsd.org: domain of bu7cher@yandex.ru designates 37.140.190.181 as permitted sender) smtp.mailfrom=bu7cher@yandex.ru X-Spamd-Result: default: False [-8.90 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[yandex.ru]; R_SPF_ALLOW(-0.20)[+ip4:37.140.128.0/18]; HAS_ATTACHMENT(0.00)[]; RCVD_COUNT_THREE(0.00)[4]; DKIM_TRACE(0.00)[yandex.ru:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[yandex.ru,none]; MX_GOOD(-0.01)[cached: mx.yandex.ru]; SIGNED_PGP(-2.00)[]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+]; FREEMAIL_ENVFROM(0.00)[yandex.ru]; ASN(0.00)[asn:13238, ipnet:37.140.128.0/18, country:RU]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_IN_DNSWL_LOW(-0.10)[181.190.140.37.list.dnswl.org : 127.0.5.1]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[yandex.ru:s=mail]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_SHORT(-1.00)[-0.996,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TAGGED_RCPT(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,multipart/mixed,text/plain]; DWL_DNSWL_LOW(-1.00)[yandex.ru.dwl.dnswl.org : 127.0.5.1]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_TLS_LAST(0.00)[]; IP_SCORE(-1.70)[ipnet: 37.140.128.0/18(-4.74), asn: 13238(-3.76), country: RU(0.01)] X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 19 Jun 2019 13:49:44 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --kx6RvZhHQnm6v5PAgLy7J4e2AkLYkDPkS Content-Type: multipart/mixed; boundary="SruJ1dp2x9OWApVrYab68pUnuJBhDUGuM"; protected-headers="v1" From: "Andrey V. Elsukov" To: Alexandru Goia , freebsd-hackers@freebsd.org Message-ID: <5432302a-9b55-d9b2-6001-539dbc02300d@yandex.ru> Subject: Re: FreeBSD kernel system call References: In-Reply-To: --SruJ1dp2x9OWApVrYab68pUnuJBhDUGuM Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable On 19.06.2019 16:23, Alexandru Goia wrote: > Greetings ! >=20 > I am trying to write the code to a Unix system call, on the > FreeBSD 12.0 system. I managed to do that on Linux : >=20 > http://romania-acknowledges-stars.blogspot.com/2018/10/angel-call-in-ke= rnel.html >=20 > but I find hard, without proper documentation, to implement it > on FreeBSD. >=20 > I am in trouble understanding the presence of SYSCALL_MODULE(9), and > its meaning and usage. Using SYSCALL_MODULE() you can create kernel module with new syscall, then load this module in run-time and use this syscall in your application. You can find examples for both kernel module and test program in referred by manual page location. --=20 WBR, Andrey V. Elsukov --SruJ1dp2x9OWApVrYab68pUnuJBhDUGuM-- --kx6RvZhHQnm6v5PAgLy7J4e2AkLYkDPkS Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Comment: Using GnuPG with Thunderbird - https://www.enigmail.net/ iQEzBAEBCAAdFiEE5lkeG0HaFRbwybwAAcXqBBDIoXoFAl0KPO8ACgkQAcXqBBDI oXqORgf/cpDQfh8G92MGMzufZWPKnu2BDXc1lJJCLajRWlR63nQHPcxNIGbqgWcM tU0RHYdQnzulyKhuRtR0QhQHnoUdi5QsDgDEIIRVK28SOVfV7UvVMsITIae3BhO9 cDAv2/I+rNSFRrROEodEwCBlEPtZdIOMcpJzjrmC7dAOrysSAjQt4/1/zI4yNSTz sKonRiOgs4QdpeOS1hQjyhnx40rYDAyQS8qqNoA+bt/6iZ29OKU4+EcHcqcs+ZLQ CUR81RLnE2QlXjHq91NLV80XaJtD1gU02BzP4ncsOVpsDb5/4uabRWc2gx88V07O HyYvywX0qmMY48KcwtlzLvXe9Hr0oA== =k+5x -----END PGP SIGNATURE----- --kx6RvZhHQnm6v5PAgLy7J4e2AkLYkDPkS--