Hi @Matthew.Nygard.Dodd_gmail.com and happy new year :)
I got some more data about the chip IDs:
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Jan 9 2025
Dec 2 2024
Nov 29 2024
Nov 27 2024
Nov 26 2024
Nov 20 2024
Nov 18 2024
Feb 29 2024
Sep 12 2023
Sep 7 2023
I suggest to think about adding --libxo foo as an alias to -x oformat=foo to make things more inline with what is actually done for, e.g., netstat(1).
Jun 20 2023
Feb 27 2023
I submitted this patch via GitHub too: #674
Feb 21 2023
I would like this code to be the basis to add support for NCT5585D but this chip is so weird, I'll have to rework things.
Feb 2 2023
Jan 5 2023
Increase verbosity to direct i/o code path (iores != 0)
Jan 4 2023
Jan 2 2023
Dec 30 2022
Get back to using NCT_GPIO_CAPS.
Dec 29 2022
Dec 28 2022
Adjust/Add some man pages
Feb 14 2022
Jan 11 2022
Nov 29 2021
In D32725#746813, @cem wrote:Your benchmark platform was "a server with 2x24 core xenon gold cpus and 4x50G ixl(4) NICs," which definitely has other good entropy sources.
Aug 2 2021
@jilles I took some time to think about fc -e (sorry for the lag). The only viable approach seems to just never enforce O_VERIFY with edited history entries. Not sure it's worth trying to ensure the shell is interactive. What do you think?
Jun 30 2021
By the way, -i and -z are handled in a very similar fashion. There's probably some room for refactoring while at it.
Jun 14 2021
In D30464#686275, @sjg wrote:veriexec=/sbin/veriexec if test -s $veriexec && $veriexec -i active > /dev/null 2>&1; then _rc_verify() { $veriexec -x $1; } else _rc_verify() { : ; } fi
In D30464#690655, @jilles wrote:It is not documented, although example functions exist in /usr/src/bin/sh/funcs/. There is more information about this feature at https://www.in-ulm.de/~mascheck/various/ash/functionpathsearch.html .
Jun 11 2021
Jun 7 2021
In D30464#685956, @jilles wrote:Looks reasonable, assuming veriexec itself is reasonable (in many cases, it seems to me that verifying the root filesystem would be a simpler and more reliable approach).
The verify option affects:
[…]
- function autoloading via a DIR%func entry in PATH
Jun 4 2021
In D30464#687944, @sjg wrote:BTW wrt creating test cases, assuming you have a system which is capable of enforcing veriexec and still operate, a package which contains a manifest with various failures is handy.
I have something like that for testing the verifying loader - it cannot be installed using my package system; since it would fail all the pre-install checks, so a manual install.sh
script is provided.You can also do simple tests by just copying a verified file such. that it gets a new inode.
Eg /bin/sh may be verified and work just fine, cp /bin/sh /tmp; /tmp/sh - Authentication error same trick applies to any file.
May 31 2021
In D30464#686275, @sjg wrote:Neat, but not going to be portable.
FWIW I use veriexec -x some/file to test whether the file is verified.
Eg. we modify rc.subr to provide a couple of functions is_verified and vdot which does . only after verify file.
This allows shell scripts to be careful about what they consume, while still being portable (not that big. a deal really ;-)