Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 7 Mar 2006 12:22:48 -0500
From:      Kris Kennaway <kris@obsecurity.org>
To:        pfgshield-freebsd@yahoo.com
Cc:        freebsd-emulation@FreeBSD.org, Kris Kennaway <kris@obsecurity.org>
Subject:   Re: kern/91293: [svr4] [patch] *Experimental* Update to the SVR4 emulation (from NetBSD)
Message-ID:  <20060307172247.GA9334@xor.obsecurity.org>
In-Reply-To: <20060307170959.29546.qmail@web32715.mail.mud.yahoo.com>
References:  <20060307162753.GC64610@xor.obsecurity.org> <20060307170959.29546.qmail@web32715.mail.mud.yahoo.com>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Tue, Mar 07, 2006 at 06:09:59PM +0100, pfgshield-freebsd@yahoo.com wrote:
> 
> --- Kris Kennaway <kris@obsecurity.org> ha scritto: 
> 
> ...
> > > 
> > > What is left on the patch at this point are only bug fixes to panics and
> > > overflows from the NetBSD port. This is not something I can test on amd64
> > and
> > > rebuilding a kernel on qemu is painfully slow.
> > 
> > Unfortunately this makes it unlikely anyone will commit your fixes,
> > since they're untested.
> > 
> 
> They are tested... on NetBSD.

Right, which as you know is quite different to FreeBSD in many ways.

> In any case it's not easy to find an application
> that will exercise a buffer overflow or a fix in sysconf.

As long as applications continue to work, it's enough.

Kris
[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (FreeBSD)

iD8DBQFEDcFnWry0BWjoQKURAs8rAKDPsB3oi6iWlKSx/AOqtHPHQXcpcwCdHm7q
XplnbKas5C17reScQe2g7C4=
=igLV
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060307172247.GA9334>