[PATCH] tcpdump: Fix missing argument from icmp_print call in print-skip.c

2020-11-03 Thread Neeraj Pal
fixes the same. Regards, Neeraj Pal Index: usr.sbin/tcpdump/print-skip.c === RCS file: /cvs/src/usr.sbin/tcpdump/print-skip.c,v retrieving revision 1.6 diff -u -p -u -p -r1.6 print-skip.c --- usr.sbin/tcpdump/print-skip.c16 Nov 2015

run(4): crash still observed on 6.7 and -current

2020-09-06 Thread Neeraj Pal
Hi there, I have found that the crash is still observed which had already been discussed, here, https://marc.info/?l=openbsd-tech&m=143662082630187&w=2 on -current and also on 6.7 also verified that the patch (https://marc.info/?l=openbsd-tech&m=143693266301743&w=2) sent by @stefan fixes the prob

Re: Regarding the understanding of the malloc(3) code

2020-03-27 Thread Neeraj Pal
info structure. Like for count = 256 case, size = (16 - 1) * 2 = 30. Then if canary then it calculates for the canary. So, from here, it calculates the size for bitmap like I have already mentioned above, that memset doing 30 bytes for bits = 4. So, that 30 bytes comes from here? Thanks, Neeraj Pal

Re: Regarding the understanding of the malloc(3) code

2020-03-27 Thread Neeraj Pal
On Wed, Mar 25, 2020 at 2:06 AM Otto Moerbeek wrote: > pp points to a page of chunks > bp point to the associated meta info: a bitmap that says which chunks > in the page are free. The bitmap is an aray of shorts, so 16 bits per > entry. > per entry means for our case bits[1], so only one entry

Re: Regarding the understanding of the malloc(3) code

2020-03-24 Thread Neeraj Pal
Hi Otto, I am having two small issues or confusions: First Query: 885 /* 886 * Allocate a page of chunks 887 */ 888 static struct chunk_info * 889 omalloc_make_chunks(struct dir_info *d, int bits, int listnum) 890 { 891 struct chunk_info *bp; 892 void *pp; 893 894

Re: Regarding the understanding of the malloc(3) code

2020-03-24 Thread Neeraj Pal
On Wed, Mar 18, 2020 at 4:01 PM Otto Moerbeek wrote: > Not all meta-data canaries live in r/o memory. > > A thing that also helps is to follow the cvs history of a file. The > first version of my malloc (form 2008) was more simple, and looking at > the diffs through the years gives you great hin

Re: Regarding the understanding of the malloc(3) code

2020-03-18 Thread Neeraj Pal
On Wed, 18 Mar, 2020, 12:46 pm Otto Moerbeek, wrote: > There are several types of canaries. They try to detect corruption of > various meta data structures. There are alo canaries for user allocated > data, they are enabled with the C option. > Yeah, I am using option C through sysctl(8) to under

Re: Regarding the understanding of the malloc(3) code

2020-03-17 Thread Neeraj Pal
On Fri, Mar 13, 2020, at 11:45 AM Otto Moerbeek wrote: > > Please indent your code snippets. yeah, my apologies. I shall indent the code snippets. > > di_info is special. Having a guard page on both sides for regular > allocation can be done, but would waste more pages. Note that > allocations ar

Re: Regarding the understanding of the malloc(3) code

2020-03-12 Thread Neeraj Pal
On Tue, Mar 10, 2020 at 4:03 PM Otto Moerbeek wrote: > There's an off by one in your question :-) Yeah, sorry about that, actually in flow of writing the mail forgot to notice. > Fo single threaded programs, two malloc_dir pools are maintained. > One for MAP_CONCEALED memory (#0) and one for regu

Regarding the understanding of the malloc(3) code

2020-03-09 Thread Neeraj Pal
Hi there, I am reading and learning the internals of malloc(3). So, after compiling the debug version of libc and using it for one basic sample code for malloc(3). Not able to understand some parts of the following code snippet: void _malloc_init(int from_rthreads) { u_int i, nmutexes; s

Re: pkg_add -Dsnap not fetching any updates and packages on -current

2018-10-15 Thread Neeraj Pal
Benoit wrote: > > Neeraj Pal(neerajpa...@gmail.com) on 2018.10.15 10:36:16 +0530: > > Hi there, > > > > Yesterday I installed OpenBSD 6.3-stable then upgraded it to OpenBSD > > -current by downloading and copying bsd.rd file into / > > Then, after that, I am try

pkg_add -Dsnap not fetching any updates and packages on -current

2018-10-14 Thread Neeraj Pal
s/packages/amd64/: empty Can't find wget -- Thank you! Sincere regards; Neeraj Pal

Re: Firefox Tab crashed due to some pledge error

2018-06-08 Thread Neeraj Pal
>> #12 Xsyscall_untramp+0xc0 On Sat, Jun 9, 2018 at 12:24 AM, Elias M. Mariani wrote: > You should read the pkg-readme for Firefox. > > Firefox needs a dbus session to get started with X: > > Check here the readme of firefox and dbus on the info and howto: > /usr/local/share/doc

Firefox Tab crashed due to some pledge error

2018-06-08 Thread Neeraj Pal
ramp+0xc0 iwm0: reused group key update received from 70:62:b8:8b:1f:ae firefox[71886]: pledge "proc", syscall 2 firefox[71886]: pledge "stdio", syscall 83 firefox[60964]: pledge "proc", syscall 2 firefox[12397]: pledge "proc", syscall 2 firefox[86483]: pledge "proc", syscall 2 firefox[5602]: pledge "proc", syscall 2 firefox[67287]: pledge "proc", syscall 2 firefox[84851]: pledge "proc", syscall 2 firefox[55785]: pledge "proc", syscall 2 firefox[52724]: pledge "proc", syscall 2 firefox[52724]: pledge "stdio", syscall 83 firefox[23437]: pledge "proc", syscall 2 firefox[92932]: pledge "proc", syscall 2 -- Thank you! Sincere regards; Neeraj Pal

Re: Error in adding system call in OpenBSD 6.3

2018-04-24 Thread Neeraj Pal
And, from on next time I will keep things clear. So, that it would be easy to answer for everyone. And also I will try to solve the problem on my own and giving more time for self research instead of just asking here. On Tue, Apr 24, 2018 at 7:45 AM, Ted Unangst wrote: > Neeraj Pal wrote:

Re: Error in adding system call in OpenBSD 6.3

2018-04-23 Thread Neeraj Pal
at 3:04 AM, Theo de Raadt wrote: > So. you don't know what you are doing. > > > Neeraj Pal wrote: >> okay. Sure, >> >> Instead of sys_hello.c I created a new one sys_test.c. So, guys don't >> confuse with above sys_hello.c and this time sys_test.c,

Re: Error in adding system call in OpenBSD 6.3

2018-04-23 Thread Neeraj Pal
n_t'? syscallarg(socklen_t *) alen; ^ __socklen_t /usr/src/sys/sys/syscallargs.h:17:12: note: expanded from macro 'syscallarg' struct { x datum; } le; \ ^ /usr

Re: Error in adding system call in OpenBSD 6.3

2018-04-21 Thread Neeraj Pal
On Sun, Apr 22, 2018 at 3:14 AM, Paul Irofti wrote: > On Sun, Apr 22, 2018 at 12:23:09AM +0530, Neeraj Pal wrote: >> Hello guys, >> >> I am facing some issue during adding system call on OpenBSD 6.3. I >> have shown my pathways to add system call, please guys correc

Error in adding system call in OpenBSD 6.3

2018-04-21 Thread Neeraj Pal
Hello guys, I am facing some issue during adding system call on OpenBSD 6.3. I have shown my pathways to add system call, please guys correct me if somewhere I have forgotten something to add or build. 1) echo "331 { int sys_hello(void); }" >> /usr/src/sys/kern/syscalls.master 2) make init_sysen

Re: Regarding pledge system call bit value for a non-pledged process

2018-02-18 Thread Neeraj Pal
: > On 2018/02/18 20:05, Neeraj Pal wrote: >> On Sun, Feb 18, 2018 at 6:21 PM, Stuart Henderson >> wrote: >> > On 2018/02/18 12:36, Neeraj Pal wrote: >> >> I read kern_pledge.c file, but, I am not able to figure out the pledge >> >> bit value of a p

Re: Regarding pledge system call bit value for a non-pledged process

2018-02-18 Thread Neeraj Pal
PM, Stuart Henderson wrote: > On 2018/02/18 16:25, Stuart Henderson wrote: >> On 2018/02/18 21:19, Neeraj Pal wrote: >> > yeah, but I am asking about pledge_xbit (pledge value of any process >> > in hex). See output: >> > >> > process name: pltestnopledg

Re: Regarding pledge system call bit value for a non-pledged process

2018-02-18 Thread Neeraj Pal
ween permissions like "stdio inet" etc. On Sun, Feb 18, 2018 at 8:45 PM, Stuart Henderson wrote: > On 2018/02/18 20:00, Neeraj Pal wrote: >> Okay. So, you told me that If I need to check which process pledge >> what, then I need to first check PS_PLEDGE bit >>

Re: Regarding pledge system call bit value for a non-pledged process

2018-02-18 Thread Neeraj Pal
ke an example of sample1 code that I sent, then from where and how kernel computes this, 0x8009588f pledge bit value. On Sun, Feb 18, 2018 at 6:21 PM, Stuart Henderson wrote: > On 2018/02/18 12:36, Neeraj Pal wrote: >> I read kern_pledge.c file, but, I am not able to figure out the pledg

Re: Regarding pledge system call bit value for a non-pledged process

2018-02-18 Thread Neeraj Pal
On Sun, Feb 18, 2018 at 6:21 PM, Stuart Henderson wrote: > On 2018/02/18 12:36, Neeraj Pal wrote: >> I read kern_pledge.c file, but, I am not able to figure out the pledge >> bit value of a program which isn't using pledge() system call in >> user-space code. >&

Re: Regarding pledge system call bit value for a non-pledged process

2018-02-18 Thread Neeraj Pal
ke an example of sample1 code that I sent, then from where and how kernel computes this, 0x8009588f pledge bit value. On Sun, Feb 18, 2018 at 6:21 PM, Stuart Henderson wrote: > On 2018/02/18 12:36, Neeraj Pal wrote: >> I read kern_pledge.c file, but, I am not able to figure out the pledg

Regarding pledge system call bit value for a non-pledged process

2018-02-17 Thread Neeraj Pal
some pledge value. And, I don't know why every non-pledge process has only this value. It seems like there is some default pledge value for every process. So, please guys give me some hint or update me on something if I forgot or missed. -- Thank you, Neeraj Pal

Extracting pledge information from kernel code for every process.

2018-02-10 Thread Neeraj Pal
route proc", NULL). But, then, how is it possible to get same pledge hex bit for different pledge parameters? Or, Is there some other pledge variable in kernel which keeps track of permission bits that pass from user-space code using pledge()? Is it the correct way that I did above to extract pledge information or Am I missing or doing it wrong? -- Thank you, Neeraj Pal ツ  +91-8130344470