Date: Tue, 7 Mar 2006 12:22:48 -0500 From: Kris Kennaway <kris@obsecurity.org> To: pfgshield-freebsd@yahoo.com Cc: freebsd-emulation@FreeBSD.org, Kris Kennaway <kris@obsecurity.org> Subject: Re: kern/91293: [svr4] [patch] *Experimental* Update to the SVR4 emulation (from NetBSD) Message-ID: <20060307172247.GA9334@xor.obsecurity.org> In-Reply-To: <20060307170959.29546.qmail@web32715.mail.mud.yahoo.com> References: <20060307162753.GC64610@xor.obsecurity.org> <20060307170959.29546.qmail@web32715.mail.mud.yahoo.com>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On Tue, Mar 07, 2006 at 06:09:59PM +0100, pfgshield-freebsd@yahoo.com wrote: > > --- Kris Kennaway <kris@obsecurity.org> ha scritto: > > ... > > > > > > What is left on the patch at this point are only bug fixes to panics and > > > overflows from the NetBSD port. This is not something I can test on amd64 > > and > > > rebuilding a kernel on qemu is painfully slow. > > > > Unfortunately this makes it unlikely anyone will commit your fixes, > > since they're untested. > > > > They are tested... on NetBSD. Right, which as you know is quite different to FreeBSD in many ways. > In any case it's not easy to find an application > that will exercise a buffer overflow or a fix in sysconf. As long as applications continue to work, it's enough. Kris [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.1 (FreeBSD) iD8DBQFEDcFnWry0BWjoQKURAs8rAKDPsB3oi6iWlKSx/AOqtHPHQXcpcwCdHm7q XplnbKas5C17reScQe2g7C4= =igLV -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060307172247.GA9334>
