Page MenuHomeFreeBSD

olce (Olivier Certner)
User

Projects

User Details

User Since
Feb 26 2021, 3:47 PM (246 w, 1 d)

Recent Activity

Yesterday

olce accepted D53774: inotify: Work around the vput() bug directly.
Sat, Nov 15, 7:28 PM
olce requested review of D53772: setcred(): Remove an optimization for when cr_groups[0] was the egid.
Sat, Nov 15, 3:10 PM
olce requested review of D53771: mdo(1): Avoid calling getgroups() in some unnecessary cases.
Sat, Nov 15, 3:08 PM
olce committed rG190e6d67953c: setcred(): Fix 32-bit compatibility copy-in (authored by olce).
setcred(): Fix 32-bit compatibility copy-in
Sat, Nov 15, 3:03 PM
olce committed rG4872b48b175c: setcred(): Fix 32-bit compatibility copy-in (authored by olce).
setcred(): Fix 32-bit compatibility copy-in
Sat, Nov 15, 9:31 AM
olce closed D53767: setcred(): Fix 32-bit compatibility copy-in.
Sat, Nov 15, 9:30 AM

Fri, Nov 14

olce added a comment to D53757: freebsd32_setcred: Copy all of the setcred fields.

Planning to commit the minimal fix at D53767, is that OK for you?

Fri, Nov 14, 8:54 PM
olce requested review of D53767: setcred(): Fix 32-bit compatibility copy-in.
Fri, Nov 14, 8:52 PM
olce accepted D53756: setcred: Move initial copyin of struct setcred out to per-ABI syscall.
Fri, Nov 14, 5:51 PM
olce added inline comments to D53755: MAC: Use the current thread's user ABI to determine the layout of struct mac.
Fri, Nov 14, 5:23 PM
olce accepted D53757: freebsd32_setcred: Copy all of the setcred fields.
Fri, Nov 14, 4:56 PM
olce accepted D53755: MAC: Use the current thread's user ABI to determine the layout of struct mac.
Fri, Nov 14, 3:39 PM
olce added a comment to D53757: freebsd32_setcred: Copy all of the setcred fields.

Hadn't noticed this new revision (Phabricator mail sending seems to be delayed), so reposting the relevant part of the comment I added on D47878 in the meantime:

Fri, Nov 14, 3:28 PM
olce added a comment to D47878: MAC: syscalls: mac_label_copyin(): 32-bit compatibility.
In D47878#1227393, @jhb wrote:

The memcpy size is wrong.

Fri, Nov 14, 3:14 PM
olce added a comment to D47878: MAC: syscalls: mac_label_copyin(): 32-bit compatibility.
In D47878#1226923, @jhb wrote:

Actually, I found a bug in the compat32 setcred() as well. (...) I will work on some patches though I'll try to post for review today/tomorrow.

Fri, Nov 14, 10:32 AM

Wed, Nov 12

olce added a comment to D47878: MAC: syscalls: mac_label_copyin(): 32-bit compatibility.
In D47878#1226543, @jhb wrote:

Blech, this conflicted quite a bit with CheriBSD downstream which has COMPAT_FREEBSD64 and used SV_CURPROC_FLAG to determine the ABI instead of a bool (that needs to not be a bool). At some point I will probably just have to upstream reworking this to remove all the bool stuff as you don't need it since you can just check the ABI here and do the fixup as needed. In CheriBSD we also fix the copying in of struct mac for exec which also needs to honor the ABI.

Wed, Nov 12, 8:13 PM

Mon, Nov 10

olce accepted D53598: cd9660: Unbreak symbolic links.

Seems fine. See also inline comment for a change that is superfluous.

Mon, Nov 10, 2:44 AM

Sun, Nov 9

olce committed rGc3d2b68c6933: kern: RACCT: Keep process credentials alive via references (authored by olce).
kern: RACCT: Keep process credentials alive via references
Sun, Nov 9, 10:39 PM
olce committed rGd05ab93913f3: setpgid(): Fix space before TAB in herald comment (authored by olce).
setpgid(): Fix space before TAB in herald comment
Sun, Nov 9, 10:39 PM
olce committed rG5d46d11772c3: proc_set_cred(): Allow 'newcred' to have multiple references (authored by olce).
proc_set_cred(): Allow 'newcred' to have multiple references
Sun, Nov 9, 10:39 PM
olce closed D53636: proc_set_cred(): Allow 'newcred' to have multiple references.
Sun, Nov 9, 10:39 PM

Sat, Nov 8

olce accepted D53640: rm(1): remove whiteouts when forcibly removing directories.
In D53640#1224643, @jah wrote:

Do we have automated tests for rm(1) somewhere that I'll need to change?

Sat, Nov 8, 3:55 PM

Fri, Nov 7

olce added inline comments to D53636: proc_set_cred(): Allow 'newcred' to have multiple references.
Fri, Nov 7, 8:15 PM
olce requested review of D53636: proc_set_cred(): Allow 'newcred' to have multiple references.
Fri, Nov 7, 7:14 PM

Thu, Nov 6

olce committed rGa5d1a0c9bfcc: kern: RACCT: Keep process credentials alive via references (authored by olce).
kern: RACCT: Keep process credentials alive via references
Thu, Nov 6, 4:07 AM
olce closed D53563: kern: RACCT: Keep process credentials alive via references.
Thu, Nov 6, 4:07 AM
olce committed rG2e76660cb71d: setcred(): Fix RACCT resource accounting on credentials change (authored by olce).
setcred(): Fix RACCT resource accounting on credentials change
Thu, Nov 6, 3:39 AM
olce committed rG4db768b01cd7: kern: Fix credentials leaks on RACCT but no RCTL (authored by olce).
kern: Fix credentials leaks on RACCT but no RCTL
Thu, Nov 6, 3:39 AM
olce committed rG3ee596eeee19: racct: Simplify skipping idle process in the throttling daemon (authored by olce).
racct: Simplify skipping idle process in the throttling daemon
Thu, Nov 6, 3:38 AM

Wed, Nov 5

olce added a comment to D53563: kern: RACCT: Keep process credentials alive via references.
In D53563#1223560, @kib wrote:

This is still a bad code. It allows two threads to race to cause rctl idea of the proc ucred to be different from the actual curproc->p_ucred.

Wed, Nov 5, 6:42 PM

Mon, Nov 3

olce requested review of D53563: kern: RACCT: Keep process credentials alive via references.
Mon, Nov 3, 6:37 PM

Sun, Nov 2

olce committed rG2be5127c4a31: setcred(): Fix RACCT resource accounting on credentials change (authored by olce).
setcred(): Fix RACCT resource accounting on credentials change
Sun, Nov 2, 6:19 PM
olce committed rGf4315ff8b3fe: kern: Fix credentials leaks on RACCT but no RCTL (authored by olce).
kern: Fix credentials leaks on RACCT but no RCTL
Sun, Nov 2, 6:19 PM
olce closed D53457: setcred(): Fix RACCT resource accounting on credentials change.
Sun, Nov 2, 6:18 PM
olce closed D53456: kern: Fix credentials leaks on RACCT but no RCTL.
Sun, Nov 2, 6:18 PM
olce closed D53455: racct: Simplify skipping idle process in the throttling daemon.
Sun, Nov 2, 6:18 PM
olce committed rG9530c6f082ad: racct: Simplify skipping idle process in the throttling daemon (authored by olce).
racct: Simplify skipping idle process in the throttling daemon
Sun, Nov 2, 6:18 PM

Fri, Oct 31

olce added a comment to D53456: kern: Fix credentials leaks on RACCT but no RCTL.

Sorry, I'm running out of time and this (and also next revision, D53457) needs to land in 15.0, so please urgently tell me if you think the current version is fine functionality-wise. Unless it is not, I will commit it as is tomorrow, and can then amend it with more time later, as I agree with your comments and have prepared an update which unfortunately I haven't had much time to test. I also fear that modifying this relatively delicate code close to committing it could introduce some unseen problem, that's why I'd really prefer to avoid that.

Fri, Oct 31, 11:11 PM

Thu, Oct 30

olce updated the diff for D53457: setcred(): Fix RACCT resource accounting on credentials change.

On RCTL, guard the call to rctl_proc_ucred_changed() with cred_set instead of relying on error being 0 as this is more error-prone on potential future changes to setcred().

Thu, Oct 30, 4:27 PM

Wed, Oct 29

olce updated the diff for D53457: setcred(): Fix RACCT resource accounting on credentials change.
  • Ensure the last block is executed only on no error.
Wed, Oct 29, 9:03 PM
olce planned changes to D53457: setcred(): Fix RACCT resource accounting on credentials change.

Wow, sorry, I forgot to wrap the last block (doing rctl_proc_ucred_changed()) inside a if (error != 0).

Wed, Oct 29, 8:56 PM
olce requested review of D53457: setcred(): Fix RACCT resource accounting on credentials change.
Wed, Oct 29, 8:53 PM
olce requested review of D53456: kern: Fix credentials leaks on RACCT but no RCTL.
Wed, Oct 29, 8:52 PM
olce requested review of D53455: racct: Simplify skipping idle process in the throttling daemon.
Wed, Oct 29, 8:52 PM

Tue, Oct 28

olce added inline comments to D53160: kthread: Add a wrapper macro KPROC_START.
Tue, Oct 28, 7:56 PM
olce added inline comments to D53160: kthread: Add a wrapper macro KPROC_START.
Tue, Oct 28, 5:07 PM
olce accepted D53362: libutil: defer setting the MAC label until after the login class.
Tue, Oct 28, 2:13 PM

Sun, Oct 19

olce committed R9:500bae4fb849: Status/2025Q3/group-changes.adoc: Add report (authored by olce).
Status/2025Q3/group-changes.adoc: Add report
Sun, Oct 19, 5:37 PM
olce committed R9:bbaab3f27179: Status/2025Q3/drm-drivers-slowdowns_fixes.adoc: Add report (authored by olce).
Status/2025Q3/drm-drivers-slowdowns_fixes.adoc: Add report
Sun, Oct 19, 5:37 PM
olce committed R9:179aa1466c0b: Status/2025Q3/mac_do.adoc: Improve report (authored by olce).
Status/2025Q3/mac_do.adoc: Improve report
Sun, Oct 19, 5:37 PM

Fri, Oct 17

olce committed rG7b0fe2d405ae: vm_domainset: Ensure round-robin works properly (authored by olce).
vm_domainset: Ensure round-robin works properly
Fri, Oct 17, 3:19 PM
olce closed D52733: vm_domainset: Ensure round-robin works properly.
Fri, Oct 17, 3:19 PM
olce accepted D53160: kthread: Add a wrapper macro KPROC_START.
Fri, Oct 17, 12:05 PM

Oct 17 2025

olce accepted D53142: linprocfs: Add nodes for inotify.
Oct 17 2025, 8:14 AM
olce added a comment to D52885: (draft) style.9: Encourage style changes when doing significant modifications.

Ping?

Oct 17 2025, 7:00 AM

Oct 16 2025

olce committed rGfb8a978ebfeb: sys/rpc: UNIX auth: Do not log on bogus AUTH_SYS messages (authored by olce).
sys/rpc: UNIX auth: Do not log on bogus AUTH_SYS messages
Oct 16 2025, 4:59 PM
olce committed rG45e671c9cd3b: sys/rpc: UNIX auth: Fix OOB reads on too short message (authored by olce).
sys/rpc: UNIX auth: Fix OOB reads on too short message
Oct 16 2025, 4:59 PM
olce committed rGd06658b8066d: sys/rpc: UNIX auth: Style: Remove unnecessary headers, minor changes (authored by olce).
sys/rpc: UNIX auth: Style: Remove unnecessary headers, minor changes
Oct 16 2025, 4:59 PM
olce committed rGb27688a8b5dc: sys/rpc: UNIX auth: Support XDR_FREE (authored by olce).
sys/rpc: UNIX auth: Support XDR_FREE
Oct 16 2025, 4:59 PM
olce committed rG9763e76cccf0: sys/rpc: UNIX auth: Use AUTH_SYS_MAX_{GROUPS,HOSTNAME} as limits (2/2) (authored by olce).
sys/rpc: UNIX auth: Use AUTH_SYS_MAX_{GROUPS,HOSTNAME} as limits (2/2)
Oct 16 2025, 4:59 PM
olce committed rG34fc20503f04: sys/rpc: UNIX auth: Use AUTH_SYS_MAX_{GROUPS,HOSTNAME} as limits (1/2) (authored by olce).
sys/rpc: UNIX auth: Use AUTH_SYS_MAX_{GROUPS,HOSTNAME} as limits (1/2)
Oct 16 2025, 4:59 PM
olce committed rG37aeac44647d: sys/rpc: Define AUTH_SYS_MAX_{GROUPS,HOSTNAME} (authored by olce).
sys/rpc: Define AUTH_SYS_MAX_{GROUPS,HOSTNAME}
Oct 16 2025, 4:59 PM
olce committed rG9492a1e27fb1: sys/rpc: UNIX auth: Fix OOB accesses, notably writes on decode (authored by olce).
sys/rpc: UNIX auth: Fix OOB accesses, notably writes on decode
Oct 16 2025, 4:59 PM
olce committed rG5e482104ecfa: sys/rpc: UNIX auth: Rename 'ngroups' => 'supp_ngroups' for clarity (authored by olce).
sys/rpc: UNIX auth: Rename 'ngroups' => 'supp_ngroups' for clarity
Oct 16 2025, 4:59 PM
olce accepted D53137: VOP_OPENCLOSE.9: note that td may be NULL for VOP_CLOSE.

(With same remark as Alan.)

Oct 16 2025, 4:45 PM

Oct 15 2025

olce accepted D53107: unionfs: avoid vdrop()ing a locked but doomed vnode.

For the changes in unionfs_lock(), there is indeed a window after the interlock drop and before lock acquire and drop where the "root" reference unionfs holds (through unionfs_node; the one that allows to call vholdnz() above) could be dropped (it's the same window described in the big comment about checking whether the proper target vnode (lower or upper) was locked).

Oct 15 2025, 2:42 PM

Oct 14 2025

olce added inline comments to D53079: unionfs: fix NULL deref on closing an fd passed through SCM_RIGHTS.
Oct 14 2025, 4:54 PM
olce accepted D53079: unionfs: fix NULL deref on closing an fd passed through SCM_RIGHTS.

This change is an improvement without drawbacks, so should be committed.

Oct 14 2025, 4:50 PM
olce added a comment to D52625: fusefs: fix a kernel panic regarding SCM_RIGHTS.

We have indeed several problems with VOP_OPEN()/VOP_CLOSE(), e.g., they are not always called in pairs, and even if they are the passed td may not match between an open and close. These interfaces need serious revision, in particular determining which exact info the filesystems would like to use and if there are better ways to obtain them.

Oct 14 2025, 4:42 PM
olce added inline comments to D49618: ps.1: '-A' and '-a': Note change in behavior.
Oct 14 2025, 3:31 PM
olce added inline comments to D49618: ps.1: '-A' and '-a': Note change in behavior.
Oct 14 2025, 2:44 PM
olce committed rG2110ae0ef9d6: sys/rpc: UNIX auth: Do not log on bogus AUTH_SYS messages (authored by olce).
sys/rpc: UNIX auth: Do not log on bogus AUTH_SYS messages
Oct 14 2025, 12:57 PM
olce committed rGd4cc791f3b2e: sys/rpc: UNIX auth: Fix OOB reads on too short message (authored by olce).
sys/rpc: UNIX auth: Fix OOB reads on too short message
Oct 14 2025, 12:23 PM
olce committed rG4ae70c3ea498: sys/rpc: UNIX auth: Support XDR_FREE (authored by olce).
sys/rpc: UNIX auth: Support XDR_FREE
Oct 14 2025, 12:23 PM
olce committed rGa4105a5d4e17: sys/rpc: UNIX auth: Style: Remove unnecessary headers, minor changes (authored by olce).
sys/rpc: UNIX auth: Style: Remove unnecessary headers, minor changes
Oct 14 2025, 12:23 PM
olce committed rGe665c0f6f7a6: sys/rpc: UNIX auth: Use AUTH_SYS_MAX_{GROUPS,HOSTNAME} as limits (2/2) (authored by olce).
sys/rpc: UNIX auth: Use AUTH_SYS_MAX_{GROUPS,HOSTNAME} as limits (2/2)
Oct 14 2025, 12:23 PM
olce committed rGb119ef0f6a81: sys/rpc: UNIX auth: Use AUTH_SYS_MAX_{GROUPS,HOSTNAME} as limits (1/2) (authored by olce).
sys/rpc: UNIX auth: Use AUTH_SYS_MAX_{GROUPS,HOSTNAME} as limits (1/2)
Oct 14 2025, 12:23 PM
olce committed rGf7c4f800cc0b: sys/rpc: Define AUTH_SYS_MAX_{GROUPS,HOSTNAME} (authored by olce).
sys/rpc: Define AUTH_SYS_MAX_{GROUPS,HOSTNAME}
Oct 14 2025, 12:23 PM
olce closed D52964: sys/rpc: UNIX auth: Fix OOB reads on too short message.
Oct 14 2025, 12:23 PM
olce committed rG47e9c81d4f13: sys/rpc: UNIX auth: Fix OOB accesses, notably writes on decode (authored by olce).
sys/rpc: UNIX auth: Fix OOB accesses, notably writes on decode
Oct 14 2025, 12:23 PM
olce committed rGbda3b61512b2: sys/rpc: UNIX auth: Rename 'ngroups' => 'supp_ngroups' for clarity (authored by olce).
sys/rpc: UNIX auth: Rename 'ngroups' => 'supp_ngroups' for clarity
Oct 14 2025, 12:23 PM
olce closed D52962: sys/rpc: UNIX auth: Use AUTH_SYS_MAX_{GROUPS,HOSTNAME} as limits (1/2).
Oct 14 2025, 12:23 PM
olce closed D52963: sys/rpc: UNIX auth: Use AUTH_SYS_MAX_{GROUPS,HOSTNAME} as limits (2/2).
Oct 14 2025, 12:23 PM
olce closed D52961: sys/rpc: Define AUTH_SYS_MAX_{GROUPS,HOSTNAME}.
Oct 14 2025, 12:23 PM
olce closed D52960: sys/rpc: UNIX auth: Fix OOB accesses, notably writes on decode.
Oct 14 2025, 12:23 PM

Oct 13 2025

olce added inline comments to D53062: imgact: Mark brandinfo and note structures as const.
Oct 13 2025, 4:33 PM
olce accepted D53062: imgact: Mark brandinfo and note structures as const.

Please don't forget to exclude the changes in sys/netinet/ip_carp.c as they are completely unrelated.

Oct 13 2025, 3:37 PM
olce added inline comments to D52964: sys/rpc: UNIX auth: Fix OOB reads on too short message.
Oct 13 2025, 1:16 PM
olce added inline comments to D52962: sys/rpc: UNIX auth: Use AUTH_SYS_MAX_{GROUPS,HOSTNAME} as limits (1/2).
Oct 13 2025, 1:13 PM
olce added a comment to D52960: sys/rpc: UNIX auth: Fix OOB accesses, notably writes on decode.

Looks ok to me. I'll leave min vs MIN up to you.

Oct 13 2025, 1:01 PM

Oct 10 2025

olce committed rG2b5cc1e0e095: vfs cache: Add vn_fullpath_jail(), factor out common code (authored by olce).
vfs cache: Add vn_fullpath_jail(), factor out common code
Oct 10 2025, 5:22 PM
olce committed rG4b7c2a0193dd: nfsuserd: Fix OOB access on membership of too many groups, take 2 (authored by olce).
nfsuserd: Fix OOB access on membership of too many groups, take 2
Oct 10 2025, 5:17 PM
olce committed rG5fe22e3d09bd: nfsuserd: Fix OOB access on membership of too many groups (authored by olce).
nfsuserd: Fix OOB access on membership of too many groups
Oct 10 2025, 5:17 PM
olce committed rG25624850a77b: initgroups.3: Clarify that ENOMEM is a possible value for 'errno' (authored by olce).
initgroups.3: Clarify that ENOMEM is a possible value for 'errno'
Oct 10 2025, 5:17 PM
olce committed rGdbfdd93a188b: getgrouplist.3: Insist on the value returned in 'ngroups'; Minor changes (authored by olce).
getgrouplist.3: Insist on the value returned in 'ngroups'; Minor changes
Oct 10 2025, 5:17 PM
olce committed rG5fa6b203e186: share/man/man9: Fix compilation (authored by olce).
share/man/man9: Fix compilation
Oct 10 2025, 5:17 PM
olce committed rG58f55afb301b: mdo(1): Add support and shortcuts for fully specifying users and groups (authored by olce).
mdo(1): Add support and shortcuts for fully specifying users and groups
Oct 10 2025, 5:17 PM
olce committed rGb025aa9f5abc: MAC/do: Check executable path from the current jail's root (authored by olce).
MAC/do: Check executable path from the current jail's root
Oct 10 2025, 5:17 PM
olce committed rGb0f448f3e321: vn_fullpath.9: Add missing links for described functions (authored by olce).
vn_fullpath.9: Add missing links for described functions
Oct 10 2025, 5:17 PM
olce committed rG3638aba1ceb9: tools/regression/priv: Don't call setgroups() with the effective GID (authored by olce).
tools/regression/priv: Don't call setgroups() with the effective GID
Oct 10 2025, 5:17 PM