Re: environment / screen / X

2002-05-12 Thread James Morrison


--- David Walter <[EMAIL PROTECTED]> wrote:
> 
> I ran into a strange problem today when running x under the hurd.
> 
> I noticed that I was not able to load some programs under X as a user.
> 
> At first I thought that this was a user vs root permissions problem
> because I hadn't seen this under the root login.
> 
> But I found out by ldd'ing some of the programs and verifying that the
> LD_LIBRARY_PATH was correctly configured to point to /X11R6/lib for
> the user account that ldd _failed_ to find libX11.so even with the
> correct LD_LIBRARY_PATH.
> 

 These binaries that you can't run are suid, so LD_LIBRARY_PATH is ignored.


=
James Morrison
   University of Waterloo
   Computer Science - Digital Hardware
   2A co-op
http://hurd.dyndns.org

Anyone referring to this as 'Open Source' shall be eaten by a GNU

__
Do You Yahoo!?
LAUNCH - Your Yahoo! Music Experience
http://launch.yahoo.com

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: saved IDs and exec (standard violation?)

2002-05-12 Thread Thomas Bushnell, BSG

Roland McGrath <[EMAIL PROTECTED]> writes:

> The only drawback I see is in the case when svuid!=euid or svgid!=egid, and
> you are executing an sugid file.  The user will reauthenticate everything
> for the svuid=euid, svgid=egid change and then the filesystem will
> reauthenticate everything again to do the suid/sgid.  So, a sugid program
> that execs another sugid program directly without an intervening exec of a
> non-suid program--a pretty rare event, I would guess.

I'm happy to gunk up setuid execs with however many extra RPCs as long
as normal execs can remain speedy.

> > But there might be a security reason why we have to force the change
> > to be made.  But I can't possibly see what that would be.
> 
> I don't think any concept of security is sensical for non-sugid execs with
> EXEC_SECURE.  The user who made the call will always be able to grab the
> process by its scrawny little task port and diddle its ports out the wazoo.

Exactly my thinking.

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: iohelp handle_io_release_conch doesn't lock shared page

2002-05-12 Thread Niels Möller

Roland McGrath <[EMAIL PROTECTED]> writes:

> We do.  The virtual copying behavior is enabled by a Boolean argument to
> vm_map.  The issue is having several mappings together as an atomic unit
> relative to intervening write calls (or modifications via shared
> mmap).

One could get the (suckish) linux behaviour by somehow locking the
file at the start of the exec processing, and releasing it at process
death or exec.

> One idea is a call like `io_snapshot' that creates a new port
> that gives read-only access to the state of the node as it was when
> snapshot'd.  It would be unduly hairy to implement the file-data part of
> that in the filesystem, except by using vm_copy_object (which doesn't exist).

That sounds quite similar to implementing versioning in the
filesystem. Something like setting a snapshot-flag on the inode, and
at the next write to the file, you create a new inode that's copy of
the snapshot (either a full copy or some copy-on-write thing).

As the common case should be that the file you have a snapshot of is
*not* written to, I think it would be acceptable to make a full copy
at the first write.

But one case that snapshotting does not solve, as far as I can tell,
is the following:

  fd = open ("/bin/bash", O_WRONLY | O_TRUNC | CREAT);
  write(fd, first half of the binary);

  exec("/bin/bash", ...); /* By some other process */

  write(fd, second half of the binary);
  
To me it seems, one must also make sure that the snapshot is made at a
moment when no process have the file open for writing (or more
prceisely: There's no process that has written data to the file, and
still has the file open for writing).

If some useful snapshoting is ever implemented, it would be nice to be
able to get a snapshot by just opening the file with O_RDONLY |
O_SNAPSHOT.

I agree it seems quite hairy to get it both robust and reliable.
/Niels

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



[±¤°í]5ºÐ¸¸¿¡ °ú¿Ü ±¸Çϱâ!!!

2002-05-12 Thread ³ªÀ̽º°¡À̵å
Title: Untitled Document

















 º»¸ÞÀÏÀº Á¤ÅëºÎ ±Ç°í»çÇ׿¡ ÀÇ°Å Á¦¸ñ¿¡ [±¤°í]
¶ó°í Ç¥±âµÈ ¸ÞÀÏÀÔ´Ï´Ù.
º»¸ÞÀÏÀº ¹ß½ÅÀü¿ë ¸ÞÀÏÀÔ´Ï´Ù À̸ÞÀÏÀº ÀÏȸ¼º ¸ÞÀÏÀ̸ç Àç¹ß¼ÛµÇÁö ¾Ê½À´Ï´Ù. 
±ÍÇÏÀÇ ¸ÞÀÏÁÖ¼Ò´Â À¥¼­ÇÎÁß¿¡ ¾Ë°ÔµÈ °ÍÀ̸ç, À̸ÞÀÏ ÁÖ¼Ò¿Ü¿¡ ´Ù¸¥ Á¤º¸´Â °¡Áö°í ÀÖÁö ¾Ê½À´Ï´Ù. 


¿øÄ¡ ¾ÊÀ¸½Ã¸é ¼ö½Å°ÅºÎ¸¦
´­·¯ÁÖ¼¼¿ä



copyright(c)2001 niceguide.
all rights reserved. mail
to webmaster  












___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd


Do you have enough Life Insurance? UDFK

2002-05-12 Thread Term Life Insurance Companies of America.
 Since 1996, term life insurance rates have been reduced by as much as 70% !40 year old male - $250,000 - 10 year level term As low as $10.45 per month !At TermQuotes Life Insurance Companies of America, we will survey the top life insurance companies for you and provide you with the best rates available. Compare the rates and see for yourself. Fill out this quick form below for further information.The quote is FREE. There is no obligation to buy.Results of computer survey 05-09-02 Sample Annual Premiums* 10 Year Level Premium Term Rates *Age$250,000$500,000$1,000,00035$115$175$30545$210$375$67055$500$935$1,37065$1,305$2,550$4,92070$2,265$4,480$7,510 *Above rates guaranteed to remain level for 10 yearsRates based on male preferred class 1 non-smoker Policies are guaranteed renewable to age 95Policies with 15, 20, 25, and 30 year level premiums also available.Universal Life, Second-to-Die and Estate Planning products also provided.Attention All Smokers: You may qualify for special reduced smoker rates!Submit This Form for a Free Term Insurance Quote !Name Insured:  Amount of Coverage:    $250,000$300,000$400,000$500,000$600,000$700,000$800,000$900,000$1,000,000Date of Birth: Month  010203040506070809101112  Day  01020304050607080910111213141516171819202122232425262728293031 Year Sex:  Male  Female Height:  FT in Weight:  lbs.Occupation:  xxxHave You Ever Had:High Blood Pressure:  Yes   No Heart Attack or Stroke:  Yes   No Cancer:  Yes   No Diabetes:  Yes   No Have You  Smoked Within the Last 12 Months:  Yes   No xxxPerson Completing Request:  Mailing Address:   City:  State  Zip Daytime Phone:  Evening Phone:   Email Address:   Best time to contact:  Morning After noon Evening Weekend When you click submit it may activate your spell check, please click "Ignore" if it does.  YOUR INTERNET ADVERTISING Copyright 1996-2002. All Rights Reserved This could be your ad!Email Us for free quotes and consultations.If you think that you will not benefit from this correspondence, please reply with 'remove' as the subject.




___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd


Re: saved IDs and exec (standard violation?)

2002-05-12 Thread Marcus Brinkmann

On Sat, May 11, 2002 at 10:28:19PM -0400, Roland McGrath wrote:
> Just to keep the record straight, I was talking about having the filesystem
> implementing file_exec do it (that's where the only auth diddling is, the
> exec server doesn't do it).  But having the user do it is a better plan.  I
> don't know why I didn't think of that in the first place.  It avoids the
> whole issue of the filesystem having to either trust or deal with a
> user-supplied auth port even with a svuid/svgid change is required.

I agree.  This was actually my first thought about how to fix it ("It seems
to be merely an issue of the default behaviour in glibc, ..."), because
obviously the task already has all the privileges it is leaking, and as such
there is no real security leak in the system, but only at the user's side.

In Unix, there doesn't seem to be a way to change the saved ID other than
changing the effective ID and do a fork().  In the Hurd, we can do better,
it seems.  Maybe we can even have setsuid,getsuid,setsgid,getsgid?  Seems to
be a straightforward addition at least, although I am not sure of what use
it will be when exec resets them.

> The only drawback I see is in the case when svuid!=euid or svgid!=egid, and
> you are executing an sugid file.

I agree, this is not a common thing to do at all.  Might happen with a game
that starts a sound daemon, or things like that.

Thanks,
Marcus

-- 
`Rhubarb is no Egyptian god.' Debian http://www.debian.org [EMAIL PROTECTED]
Marcus Brinkmann  GNUhttp://www.gnu.org[EMAIL PROTECTED]
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: environment / screen / X

2002-05-12 Thread Marcus Brinkmann

On Sun, May 12, 2002 at 01:15:47AM -0400, David Walter wrote:
> But I found out by ldd'ing some of the programs and verifying that the
> LD_LIBRARY_PATH was correctly configured to point to /X11R6/lib for
> the user account that ldd _failed_ to find libX11.so even with the
> correct LD_LIBRARY_PATH.

If the sgid/suid bit is set for a binary, and you don't have the permission
those bits indicate, then LD_LIBRARY_PATH is ignored.
 
> No   screen, no libX11.
> with screen, -> libX11. reported found.

Now the interesting thing is that the Hurd has a bug that makes screen leak
the utmp group permission.  screen itself is sgid+utmp, and this group
permission as the saved ID leaks through into the shell it spawns.

As a consequence, your user has utmp group permission inside screen (try it
out by running "ids" in screen).  And the sgid flag for many xterm's is
exactly to ge them utmp permissions.

As you already have those permissions, the LD_LIBRARY_PATH doesn't need to
be ignored now.  You have a shell.

Enjoy this bug as long as you can, because when we will fix it, you will get
the correct, non-functional behaviour even with screen ;)

(You could give your user root or utmp permission with addauth at any time,
if you are root, for example).

Thanks,
Marcus

-- 
`Rhubarb is no Egyptian god.' Debian http://www.debian.org [EMAIL PROTECTED]
Marcus Brinkmann  GNUhttp://www.gnu.org[EMAIL PROTECTED]
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: saved IDs and exec (standard violation?)

2002-05-12 Thread Marcus Brinkmann

On Sun, May 12, 2002 at 02:24:24PM +0200, Marcus Brinkmann wrote:
> In Unix, there doesn't seem to be a way to change the saved ID other than
> changing the effective ID and do a fork().

exec(), not fork(), of course.

Thanks,
Marcus

-- 
`Rhubarb is no Egyptian god.' Debian http://www.debian.org [EMAIL PROTECTED]
Marcus Brinkmann  GNUhttp://www.gnu.org[EMAIL PROTECTED]
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



¼­¿ï°æ±â ¿©¼ººÐ¸¸º¸¼¼¿ä ¹«·áÀ̺¥Æ®[±¤°í]

2002-05-12 Thread ¹«·áºÐ¼®
Title: mail





* ÀÌ Çà»ç´Â ¹«·á À̺¥Æ® Çà»çÀÔ´Ï´Ù.  * 20¼¼ ÀÌ»óÀÇ ¼­¿ï,°æ±â,ÀÎõ Áö¿ª °ÅÁÖ ¿©¼ººÐ¿¡ ÇÑÇÏ´Ï ÀÌÁ¡ ¾çÇعٶø´Ï´Ù.






 






































 


1µî : ¹ÙÀÌ¿Àµð ¸ÖƼũ¸² set [ 17¸¸¿ø »ó´ç ] 


2µî : À̸𶼠¸µÅ¬ÆÄ¿öÆ®¸®Æ®¸ÕÆ® ±âȹset [ 10¸¸¿ø »ó´ç ] 


3µî : À̸ð¶¼4Á¾ ½ºÆä¼È ±âȹset [ 7¸¸¿ø »ó´ç ] 


4µî : ¾ÆÀ̵ð¾ó Ä®¶óÁî [ 4¸¸¿ø »ó´ç ] / 5µî : È­ÀÌÆ® ¹ë·±½Ì ¸¶½ºÅ© [ 3¸¸¿ø
»ó´ç ]


 





 


 


½ºÅ²Äɾî ÀÌ¿ë±Ç [10¸¸¿ø »ó´ç] ÁõÁ¤
LG FABIANNE ºäƼ¼¾ÅÍ¿¡¼­ TSMS programsÀ» ÅëÇÑ °úÇÐÀûÀÎ ÇǺΠºÐ¼®°ú Áø´ÜÀ»
¹«·á·Î Çص帳´Ï´Ù.













___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd


Re: fakeroot problem

2002-05-12 Thread Marcus Brinkmann

On Sun, May 05, 2002 at 04:27:47PM -0400, Roland McGrath wrote:
> Oh, that EISDIR must be from opening with write permission in
> netfs_attempt_lookup.  I made it check for EROFS or EISDIR as it does for
> EACCES.  If there are other possible errors for an O_RDWR open that aren't
> possible for a O_RDONLY open, we should check for those as well.  Or we
> could make it just ignore any error except for some common cases like
> ENOENT in the first two tries and only report the error on the third.  But
> I'd rather not repeat the calls for most errors if we can avoid it.

It is amazing from where these things crop up.  I have now found the problem
with the chroot() case.  In fact, it had nothing to do with settrans, and it
had nothing to do with chroot either.

The problem is symbolic links.  We get ENOTDIR from file_name_lookup_under
when trying to open a symbolic link to a file with the O_EXEC bit set, and
we don't catch this in netfs_attempt_fakeroot.  I have not verified it, but
had I to venture a guess I would say this comes from the EOPNOTSUPP in
diskfs's dir_lookup:

/* Check permissions on existing nodes, but not new ones. */
{
  if (((type == S_IFSOCK || type == S_IFBLK || type == S_IFCHR ||
type == S_IFIFO)
   && (flags & (O_READ|O_WRITE|O_EXEC)))
  || (type == S_IFLNK && (flags & (O_WRITE|O_EXEC
error = EOPNOTSUPP;

I have worked around this in netfs_attempt_lookup by ignoring ENOTDIR if we
try to open with O_EXEC, but this doesn't look quite right.  Is there a
better fix?  Why are we looking up with O_NOLINK anyway?

Also, from looking at the above code, looking up any socket, fifo or other
special device will fail in netfs_attempt_lookup, with the same error.  If
my work around was correct, then we need to always ignore ENOTDIR.  And,
another thing, shouldn't we try to lookup the node in netfs_attempt_lookup
with O_NORW as a very last resort?

Thanks,
Marcus

-- 
`Rhubarb is no Egyptian god.' Debian http://www.debian.org [EMAIL PROTECTED]
Marcus Brinkmann  GNUhttp://www.gnu.org[EMAIL PROTECTED]
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



[±¤°í] À̸¸ÇÑ ºÎ¾÷ ¾ø½À´Ï´Ù.

2002-05-12 Thread Master
   
 Àοø
 
  ±Ý¾×(¿ø)
 
  Àοø
 
  ±Ý¾×(¿ø)
  
   
 5
 21,125
 8
 43,400
  
   
 25
 100,625
 64
 257,600
  
   
 125
 503,125
 512
 2,060,800
  
   
 625
 2,515,625
 4,096
 16,486,400
  
   
 
  °è
 
  3,146,500
 
  °è
 
  18,848,200
  
   
 
  ´ÙÀ½´ÞºÎÅÍ À籸¸ÅÈÄ¿ø¼ö´ç 186¸¸¿ø
 
  ´ÙÀ½´ÞºÎÅÍ À籸¸ÅÈÄ¿ø¼ö´ç 686¸¸¿ø
  

  

 
   

   

  

  

  

  

  
   

 
   
   
   

 
   
   

   
 
  »Ñ¸®È¸¿ø
  
   
 
  
 
   

   

  

  

 
   

   
 
  °¢ÀÚ 5¸í Ãßõ½Ã
 
  °¢ÀÚ 8¸í Ãßõ½Ã
  
   
 Àοø
 
  ±Ý¾×(¿ø)
 
  Àοø
 
  ±Ý¾×(¿ø)
  
   
 5
 54,250
 8
 86,800
  
   
 25
 201,250
 64
 515,200
  
   
 125

fakeroot status

2002-05-12 Thread Marcus Brinkmann

Hi,

I have done a few tests.

fakeauth works with spawni.c from the glibc 2.3 (HEAD) branch.  Roland, any
plans to put this into the 2.2 branch?  We can probably do this only for
the Debian package, too.  (The reason it doesn't work right now is that
fork() creates a new receive right for the faked auth port, and so it is not
inherited correctly.  The generic spawni in 2.2 is based on fork+exec, while
the sysdeps/mach/hurd/spawni.c in HEAD is not based on fork() at all.  The
difference should either be fixed by changing fork() or documented because
spawni and fork+exec behave differently here).

The fakeroot translator, see the other mail of today, there is a problem
with symlinks.  Then there is a problem in that many RPCs are not passed
through.  So pipes to the fakeroot world don't work, for example, and bash
complains about that.  So we need a message deflector for all unrecognised
RPCs in the demuxer.  Can we also deflect all RPCs that currently return
EOPNOTSUPP?  Or do we need to provide individual pass through functions for
all functions in a subsystem we can not deflect entirely?

settrans --chroot works fine.

The fakeroot utility:  It works within the limitation above, but not as the
GNU/Linux fakeroot utility.  The difference is that with fakeroot, you end
up in the directory /, whereas the fakeroot utility in GNU/Linux does not
change your current directory.  How do we fix that best?  Maybe provide a
"--chroot-chdir" option to settrans that puts us into the directory
specified?  Than we can put "--chroot-chdir `pwd`" into the fakeroot script.

I think that is all, but for more testing I need the message deflector.

Thanks,
Marcus

-- 
`Rhubarb is no Egyptian god.' Debian http://www.debian.org [EMAIL PROTECTED]
Marcus Brinkmann  GNUhttp://www.gnu.org[EMAIL PROTECTED]
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: fakeroot status

2002-05-12 Thread Roland McGrath

> fakeauth works with spawni.c from the glibc 2.3 (HEAD) branch.  Roland, any
> plans to put this into the 2.2 branch?

Definitely not.  I don't think you should use it for the debian version
either.  That code is too young.  What we can do is make fakeauth use the
underlying hurdish stuff directly instead of either fork or spawn.

> Then there is a problem in that many RPCs are not passed through.  So
> pipes to the fakeroot world don't work, for example, and bash complains
> about that.  So we need a message deflector for all unrecognised RPCs in
> the demuxer.  Can we also deflect all RPCs that currently return
> EOPNOTSUPP?  Or do we need to provide individual pass through functions
> for all functions in a subsystem we can not deflect entirely?

The way mig demuxing works, you have to choose at the subsystem granularity
(unless you want to do ugly kludges).  So we need individual pass-through
server functions for all the stubs in netfs.

I added a netfs_demuxer function in fakeroot.c that does the basic
forwarding of unrecognized messages.  Modulo simple bugs, I think that will
work for the socket servers.  It's questionable for the general case,
because it always uses just the one port on the underlying node and sends
messages from all peropens there.  If there are other-protocol messages
that diddle peropen state, then the behavior from this will be pretty
bizarre in the face of multiple fakeroot peropens with different users.  An
approach that would make more sense for that would be to have a different
underlying node port for each peropen.  e.g., new_node could do a NORDWR
lookup and then each new peropen could do a dir_lookup ("",...) with its
appropriate openmodes to get a new corresponding peropen.  But that would
require adding some space to netfs's struct peropen, and it just generally
doesn't fit the existing netfs model so well.  We can probably punt that
issue if we are only thinking about the socket servers and the /dev devices.

> settrans --chroot works fine.

Glad to hear it.

> The difference is that with fakeroot, you end up in the directory /,
> whereas the fakeroot utility in GNU/Linux does not change your current
> directory.

I made the --chroot option work like the chroot command does, which is to
say chdir ("/") after the chroot.  I think the thing to do is just handle
it in the subprocess.  i.e., run sh -c "cd `pwd`; ...".


___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: fakeroot problem

2002-05-12 Thread Roland McGrath

> The problem is symbolic links.  We get ENOTDIR from file_name_lookup_under
> when trying to open a symbolic link to a file with the O_EXEC bit set, and
> we don't catch this in netfs_attempt_fakeroot.  I have not verified it, but
> had I to venture a guess I would say this comes from the EOPNOTSUPP in
> diskfs's dir_lookup:

That seems like a reasonable deduction.  I've made fakeroot treat
EOPNOTSUPP like EACCES here.  I also made it try zero openmodes if all else
fails.

However, I think diskfs should not return EOPNOTSUPP for this case.  On
Unix systems I have tried, trying to execute a device file (that has
execute bits set) fails with EACCES.  That seems like the appropriate error
for attempting to open a symlink for execute access as well (though on Unix
there is no way to attempt that).

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: fakeroot status

2002-05-12 Thread Marcus Brinkmann

On Sun, May 12, 2002 at 03:51:09PM -0400, Roland McGrath wrote:
> Definitely not.  I don't think you should use it for the debian version
> either.  That code is too young.  What we can do is make fakeauth use the
> underlying hurdish stuff directly instead of either fork or spawn.

Well, ok.  I will use my locally compiled glibc for a while, but it is
difficult to get it tested with hardly anything using posix_spawn.  So this
is an incentive for me to compile bash, make and gcc using posix_spawn and
give this code some testing.
 
> The way mig demuxing works, you have to choose at the subsystem granularity

Ok.

> I added a netfs_demuxer function in fakeroot.c that does the basic
> forwarding of unrecognized messages.  Modulo simple bugs, I think that will
> work for the socket servers.

Cool, I started implementing it when I noticed that it isn't too easy to
construct the mach_msg call from the inp.

I think I found a bug already, you use inp->msgh_local_port, but I think
inp->msgh_remote_port is the port local to the server (which I also used in
libpager/demuxer.c).  From mach/message.h:

 *  The msgh_remote_port field specifies the destination of the message.
 *  It must specify a valid send or send-once right for a port.
 *
 *  The msgh_local_port field specifies a "reply port".  Normally,
 *  This field carries a send-once right that the receiver will use
 *  to reply to the message.  It may carry the values MACH_PORT_NULL,
 *  MACH_PORT_DEAD, a send-once right, or a send right.

Likewise, I think that the msgh_local_port should be unchanged, so the
other server sends the reply directly to the user.

I have to think more about the problems that this doesn't solve.

> > The difference is that with fakeroot, you end up in the directory /,
> > whereas the fakeroot utility in GNU/Linux does not change your current
> > directory.
> 
> I made the --chroot option work like the chroot command does, which is to
> say chdir ("/") after the chroot.  I think the thing to do is just handle
> it in the subprocess.  i.e., run sh -c "cd `pwd`; ...".

This needs to be in utils/fakeroot.sh, then, so it always spawns a shell and
runs the command inside the shell after the cd.  Blech.  What I did as a
quick hack was to do the same on the user side (eg in dpkg-buildpackage),
and it seemed to work.

Thanks (going to test the demuxer changes),
Marcus

-- 
`Rhubarb is no Egyptian god.' Debian http://www.debian.org [EMAIL PROTECTED]
Marcus Brinkmann  GNUhttp://www.gnu.org[EMAIL PROTECTED]
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: fakeroot problem

2002-05-12 Thread Marcus Brinkmann

On Sun, May 12, 2002 at 03:59:23PM -0400, Roland McGrath wrote:
> That seems like a reasonable deduction.  I've made fakeroot treat
> EOPNOTSUPP like EACCES here.

But we get ENOTDIR because of lookup_error mangling, not EOPNOTSUPP.

> I also made it try zero openmodes if all else
> fails.

Thanks.

> However, I think diskfs should not return EOPNOTSUPP for this case.

I think I agree.

Thanks,
Marcus 

-- 
`Rhubarb is no Egyptian god.' Debian http://www.debian.org [EMAIL PROTECTED]
Marcus Brinkmann  GNUhttp://www.gnu.org[EMAIL PROTECTED]
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: fakeroot problem

2002-05-12 Thread Roland McGrath

> On Sun, May 12, 2002 at 03:59:23PM -0400, Roland McGrath wrote:
> > That seems like a reasonable deduction.  I've made fakeroot treat
> > EOPNOTSUPP like EACCES here.
> 
> But we get ENOTDIR because of lookup_error mangling, not EOPNOTSUPP.

Oh, right.  I wasn't thinking about file_name_lookup_under in the
translator.  I don't think we want netfs_attempt_lookup to treat all
ENOTDIR errors as possibly recoverable, though.  That's what you'd get for
looking up "foo/bar" when foo is not a directory.  So I think I will just
fix diskfs.

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: fakeroot status

2002-05-12 Thread Roland McGrath

> Well, ok.  I will use my locally compiled glibc for a while, but it is
> difficult to get it tested with hardly anything using posix_spawn.  So this
> is an incentive for me to compile bash, make and gcc using posix_spawn and
> give this code some testing.

Getting stuff to use posix_spawn is a fine goal.  When glibc 2.3 gets ready
for testing, it will plop in with those binaries and replace the fork-based
implementation with the new Hurdish one.

As to fakeauth, I just checked in the change to make it use _hurd_exec
directly instead of using posix_spawnp.  Unless I fouled that up, that
ought to make fakeauth work with stock libc as well as it does with the new
posix_spawn you have been using.

> Cool, I started implementing it when I noticed that it isn't too easy to
> construct the mach_msg call from the inp.

Sure it is.  

> Likewise, I think that the msgh_local_port should be unchanged, so the
> other server sends the reply directly to the user.

Nope.  The fields are swapped on the way through the kernel, so you have to
swap them back.  See rpctrace.

> I have to think more about the problems that this doesn't solve.

Do you mean the issue of peropen state that I mentioned, or something else?

> This needs to be in utils/fakeroot.sh, then, so it always spawns a shell and
> runs the command inside the shell after the cd.

It can exec after cd.  The Linux fakeroot script runs sh -c "$*" too (even
though there it has no reason not to save the process and get the quoting
right).  I checked in a change.


___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



µçÄÔÅä¼þ ( ´óÌØ¼Û )

2002-05-12 Thread rose




ÄãºÃ£¡
̨Í廪·áÉÌÎñ¹«Ë¾ÔÚ´ËÏÈ×£ÄãÉúÒâÐË¡£¬ÊÂÊÂ˳Ò⣡ÎÒ¹«Ë¾³¤ÆÚ¾­ÓªµçÄÔÅä¼þ¼°ÊÖ»úÓûÔÚ¹óµØÑ°ÕÒÏúÊÛ´°¿Ú£¬±¾¹«Ë¾¿ÉÌṩËÍ»õ£¬²¢±£Ö¤ËùÌṩµÄ»õÆ·ÊÇÈ«ÐÂÔ­×°²úÆ·,Èç¹ó·½·¢ÏÖ²úÆ·ÖÊÁ¿ÎÊÌâ¿É¾Ü¾ø¸¶¿î¡£ÓÐÒâÕßÀ´ÈËÀ´µçǢ̸¡£ 

ÁªÏµÈË£ºÐíÍþÈÊÁªÏµµç»°£º 
£¨0£©13860731885
һؼCPUϵÁÐ: (µ¥Î»:Ôª) ±¼ÌÚ¢ó 866EB Socket 370/256K/É¢×° 370  
±¼ÌÚ¢ó 933 Socket 370/256K/É¢×° 390  ±¼ÌÚ¢ó 1G Socket 370/256K/É¢×° 480  
±¼ÌÚ¢ó 1.2 Socket 370/TualatinºËÐÄ/256K/É¢×° 400  ±¼ÌÚ4 1.4G Socket 
423/256KB/400Õ×/É¢×° 420  ±¼ÌÚ4 1.5G Socket 478/256KB/400MHz /ºÐ×° 450  
±¼ÌÚ4 1.6G Socket 478/256KB/400MHz/ºÐ×° 460  ±¼ÌÚ4 1.7G Socket 
478/256KB/400MHz/ºÐ×° 550 ±¼ÌÚ4 1.8G Socket 478/256KB/400MHz/ºÐ×° 700 ±¼ÌÚ4 1.9G 
Socket 478/256KB/400MHz/ºÐ×° 1150  ±¼ÌÚ4 2.0G Socket 478/256KB/400MHz/ºÐ×° 
1200 ÈüÑï1000A Socket 370/TualatinºËÐÄ/256K/É¢×° 245 ÈüÑï1.2 Socket 
370/TualatinºËÐÄ/256K/É¢×° 270 ÈüÑï1.3 Socket 370/TualatinºËÐÄ/256K/É¢×° 300 AMD 
Duron 950 Socket-A/64K/É¢×° 145Duron 1000 Socket-A/64K/É¢×° 170 À×Äñ 900 
Socket-A/256K/É¢×° 198À×Äñ 1.3G Socket-A/256K/É¢×° 320 AthlonXP 1600+ 
Socket-A/256K/É¢×° 370 AthlonXP 1700+ Socket-A/256K/É¢×° 400¶þؼÖ÷°åϵÁУº(µ¥Î»:Ôª) 
×êʯAK75-AL VIA KT133A/Socket A/×î¸ßÖ§³Ö133MHz/DMA100/ÄÚ½¨AC97Éù¿¨ 320WT70-EC 
Intel 850/Socket 423/P4Ö÷»ú°å/Ö§³ÖPC800 RDRAM/DMA100/ÄÚ½¨AC97Éù¿¨ 560NB72-SN Intel 
845/Socket 478/P4Ö÷»ú°å/Ö§³Ö SDRAM/DMA100/ÄÚ½¨AC97Éù¿¨ 510»ªË¶ P4T-F Intel 
850/ATX/Socket 423/Ö§³Ö400MHzFSB/DMA 100/AGP Pro/Ö§³ÖPentium4 CPU 460P4T-E Intel 
850/ATX/Socket 478/Ö§³Ö400MHzFSB/DMA 100/AGP Pro/Ö§³ÖPentium4 CPU 650 P4B Intel 
I845/Socket478/SDRAM/AC97 560P4S333 SIS645/Socket 478/DDR/CMI8738 6-CH S478 
480P4S333-M SIS645/Socket 478/DDR/CMI8738 6-CH S478 440 TUV4X VIA 
694T/ATX/Socket 370/Ö§³Ö133MHzFSB/DMA 100/AGP 4X/Ö§³ÖP3¡¢ÈüÑïCPU 290A7 V133-C VIA 
KT133A/ATX/Socket A/ATA100/AGP 4X 320¼¼¼Î GA-8IDXH INTEL 845оƬ×é/Ö§³Ö478 P4 
CPU/AGP4X UDMA100/Ë«BIOSÉè¼Æ/¼¯³É´´ÐÂÉù¿¨ 460GA-8IRX Intel 845оƬ/Socket 
478/ÍâƵ×î¸ß400/Ö§³ÖDDRAM/´´ÐÂ5880Éù¿¨ 4308IRXP Intel 845оƬ/Socket 
478/ÍâƵ×î¸ß400/RAID/USB2.0/Ö§³ÖDDRAM/´´ÐÂ5880Éù¿¨ 6107ZXH KT133A/Socket A /AC97 /4X 
AGP /ATA 100/Ö§³Ö¶¾Áú¡¢À×ÄñCPU 2907ZXR KT133оƬ/Socket A/´ø´´ÐÂÉù¿¨/DMA100/RAID 530΢ÐÇ 
845 Ultra-AR Intel 845D/ATX/Socket 478/400MHz/ATA-133/AGP 4X/RAID 610845 
Ultra Intel 845оƬ/Socket 478/ÍâƵ×î¸ß400/Ö§³ÖDDRAM/AC97Éù¿¨ 460645 PRO SIS645/Socket 
478/SDRAM/AC97Éù¿¨ 320815EP-T Intel 815EPT/ATX/Socket 370/Ö§³Ö133MHzÍâƵ/AGP 
4X/DMA 100/Ö§³ÖÐÂP3¡¢ÈüÑïCPU 3206309NL 100-A VIA Apollo Pro 
133A/ATX/Socket370/×î¸ß138MHzÍâƵ/DMA100/ÄÚÖÃÉù¿¨ 220Éý¼¼ TH7 II Intel 
I850/Ö§³ÖSOCKET 478µÄP4 CPU/AGP 4X UDMA100/Ö§³ÖRD RAMBUS 610 BWBD7R 
845D/Socket478/Ö§³ÖDDR/AC97Éù¿¨/AGP4X/UDMA100/Ö§³Ö4 DIMM/RAID 500 BD7 
845D/Socket478/Ö§³ÖDDR/AC97Éù¿¨/AGP4X/UDMA100/Ö§³Ö2 DIMM 400BL7-RAID Intel 
I845/Ö§³ÖSOCKET478µÄP4 CPU/AGP4X UDMA100/RAID/Ö§³Ö3GB SDRM 410ÈýؼÄÚ´æϵÁУº(µ¥Î»:Ôª) 
HY128M T-H/168PIN SDRAM/PC133(µ¥Ãæ) 65256M T-H/168PIN SDRAM/PC133 140 
128M DDR 184PIN DDR RAM 88256M DDR 184PIN DDR RAM/Ô­³§ÄÚ´æ 180 ÈýÐÇ 
256M ECC 7.5ns/168PIN SDRAM/ECC/·þÎñÆ÷ÄÚ´æ/Ô­³§ÄÚ´æ/PC133 320128M Rambus 184PIN 
RDRAM/Ô­³§ÄÚ´æ/PC800 100256M Rambus 184PIN RDRAM/Ô­³§ÄÚ´æ/PC800 210 128M DDR 
184PIN DDR SDRAM/Ô­³§ÄÚ´æ/2100MHz/CL2.0 98256M DDR 184PIN DDR 
SDRAM/Ô­³§ÄÚ´æ/2100MHz/CL2.0 200 ½ðÊ¿¶ÙKingston KVR133X64C3 256MB/168PIN 
SDRAM/PC 133 188KVR133X64C3 512MB/168PIN SDRAM/PC 133 460 KVR266X64C25 
128MB/184PIN DDR/PC266 110KVR266X64C25 256MB/184PIN DDR/PC266 210 
KVR800X16-8 128MB/184PIN RAMBUS/PC800 130 Kingmax 128M 6ns/168PIN 
SDRAM/PC150 90256M 7ns/168PIN SDRAM/PC-150 180 128M DDR 184PIN DDR RAM 
120 256M DDR 256MB DDR RAM/PC2700/ 240 ËÄؼӲÅÌϵÁУº(µ¥Î»:Ôª) 
IBMÌÚÁúÈý´ú60GXP/60AV 60GB/ATA/100/2MB/7200rpm/IDE 370ÌÚÁúËÄ´ú120GXP/40AVV 
40GB/ATA/100/2MB/7200rpm/IDE 320 ÌÚÁúËÄ´ú120GXP/60AVV 
60GB/ATA/100/2MB/7200rpm/IDE 380 ÌÚÁúËÄ´ú120GXP/120AVV 
120GB/ATA/100/2MB/7200rpm/IDE 1100 UltraSter/DDYST18350 18GB/Ultra 160 /68P/ 
160MB/s/4MB/1rpm /SCSI 680UltraSter/DDYST18350 18GB/Ultra 160 /80P/ 
160MB/s/4MB/1rpm /SCSI 770 UltraSter/DDYST36950 36GB/Ultra 160 /68P/ 
160MB/s/4MB/1rpm /SCSI 1100 UltraSter/DDYST36950 36GB/Ultra 160 /80P/ 
160MB/s/4MB/1rpm /SCSI 1300 ×êʯ ÐÇ×êÈý´ú/4D040H2 40GB/UDMA 
100/5400rpm/2M/IDE/µ¥µú40GB/ ±£ÈýÄê 300ÐÇ×êÈý´ú/4D060H3 60GB/UDMA 
100/5400rpm/2M/IDE/µ¥µú40GB/ ±£ÈýÄê 380 ÐÇ×êÈý´ú/4D080H4 80GB/UDMA 
100/5400rpm/2M/IDE/µ¥µú40GB/ ±£ÈýÄê 540 ½ð×êÆß´ú/6L020J/L1 20GB/UDMA 
133/7200rpm/2M/IDE/µ¥µú40GB/ ±£ÈýÄê 320 ½ð×êÆß´ú/6L040J/L2 40GB/UDMA 
133/7200rpm/2M/IDE/µ¥µú40GB/ ±£ÈýÄê 360 ½ð×êÆß´ú/6L080J/L4 80GB/UDMA 
133/7200rpm/2M/IDE/µ¥µú40GB/ ±£ÈýÄê 800Ï£½Ý ¿áÓã¢ôϵÁÐ ST340016A 40GB/Ultra 
ATA/100/2MB/7200rpm/IDE/3.5´ç/µ¥µú40G 320¿áÓã¢ôϵÁÐ ST360021A 60GB/Ultra 
ATA/100/2MB/7200rpm/IDE/3.5´ç/µ¥µú40G 360U6 ST320410A 20.4G/Ultra 
ATA/100/2M/5400rpm/IDE/3.5´ç/µ¥µú40GB 270U6 ST340810A 40.8G/Ultra 
ATA/100/2M/5400rpm/IDE/3.5´ç/µ¥µú40GB 280 ¿áÓã ST39236LC 9.1GB/Ultra 
160/80P/2M/7200rpm/SCSI 570¿áÓã ST336737LW 36.7GB/Ultra 
160/68P/2M/7200rpm/SCSI 1200 ¸»Ê¿Í¨ MAN3184MC 18.4GB/Ultra 320 /80P

Re: fakeroot status

2002-05-12 Thread Marcus Brinkmann

On Sun, May 12, 2002 at 05:14:17PM -0400, Roland McGrath wrote:
> > Cool, I started implementing it when I noticed that it isn't too easy to
> > construct the mach_msg call from the inp.
> 
> Sure it is.  

Well, I will reserve my final judgement for the time when everything works
as it should :)
 
> > Likewise, I think that the msgh_local_port should be unchanged, so the
> > other server sends the reply directly to the user.
> 
> Nope.  The fields are swapped on the way through the kernel, so you have to
> swap them back.  See rpctrace.

Cruel.  So the code in libpager/demux.c is actually wrong in using the
remote part rather than the local port, I take it?
 
> > I have to think more about the problems that this doesn't solve.
> 
> Do you mean the issue of peropen state that I mentioned, or something else?

Yeah, that one.

Ok, here is an update:

* in a fakeroot, running suid/sgid binaries doesn't work, it fails with
  Operation not permitted.  It seems that auth_makeauth fails:

  83->2 (  82 0 "ids" "PWD=/" { 80  89  35} { 30  54  38  99  91 (null)}
{18 0 0 0 0} pn{135 127 129  92 134 120 119  90  12  75   0  89  91  92}
pn{117})  67->21013 () = 0 {23 3 0 16297 1019142589 0 35309 1 0 0 6372
1021229047 0 1019142272 0 1019142514 0 8192 16 0 0 135676248 377 135356968
135356968 135356968 361 135357320 135357320 135356968 345 135357304}
  38->25000 () = 0 1000 {1000 1000} 1000 {1000 1000}
  38->25001 (   9 0 {1000 0 1000} 1000 {1000 1000}) = 0x4001 (Operation
not permitted)

  I am not sure what happens here, but it seems to indicate that the way
  programs are executed in a fakeroot is more like if the program comes from
  fakeroot itself rather than the underlying filesystem.

* Creating pipe fails also with Operation not permitted, and I have no clue
  yet why. /servers/socket/1 is correctly looked up (with flags being 0, by
  the way), and then I don't think the pflocal server is even involved in
  the matter.  I will have to do more debugging here.

Thanks,
Marcus


-- 
`Rhubarb is no Egyptian god.' Debian http://www.debian.org [EMAIL PROTECTED]
Marcus Brinkmann  GNUhttp://www.gnu.org[EMAIL PROTECTED]
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: fakeroot status

2002-05-12 Thread Roland McGrath

> Cruel.  So the code in libpager/demux.c is actually wrong in using the
> remote part rather than the local port, I take it?

Yes.

> > Do you mean the issue of peropen state that I mentioned, or something else?
> 
> Yeah, that one.

Ok, I don't think that will bite for the package-building uses of fakeroot.

> Ok, here is an update:
> 
> * in a fakeroot, running suid/sgid binaries doesn't work, it fails with
>   Operation not permitted.  It seems that auth_makeauth fails:
> 
>   83->2 (  82 0 "ids" "PWD=/" { 80  89  35} { 30  54  38  99  91 (null)}
> {18 0 0 0 0} pn{135 127 129  92 134 120 119  90  12  75   0  89  91  92}
> pn{117})  67->21013 () = 0 {23 3 0 16297 1019142589 0 35309 1 0 0 6372
> 1021229047 0 1019142272 0 1019142514 0 8192 16 0 0 135676248 377 135356968
> 135356968 135356968 361 135357320 135357320 135356968 345 135357304}
>   38->25000 () = 0 1000 {1000 1000} 1000 {1000 1000}
>   38->25001 (   9 0 {1000 0 1000} 1000 {1000 1000}) = 0x4001 (Operation
> not permitted)
> 
>   I am not sure what happens here, but it seems to indicate that the way
>   programs are executed in a fakeroot is more like if the program comes from
>   fakeroot itself rather than the underlying filesystem.

That makes sense.  Indeed, fakeroot is netfs so it exec's by accessing the
underlying node the same way exec'ing on nfs accesses the remote file.
It's fshelp_exec_reauth trying the makeauth call that rightly fails since
fakeroot's auth port is not root.  

There are a few different ways to attack this:

1. Override netfs_S_file_exec to just pass it through.  Then a setuid exec
   will be a real setuid exec and will escape from the fakeroot and
   fakeauth universes entirely.  This is the behavior of Linux fakeroot,
   since it does nothing special for exec and LD_PRELOAD is ignored by
   setuid executables.

2. Run fakeroot under fakeauth instead of the other way around.
   That is, fakeroot.sh does:
exec /bin/fakeauth /bin/settrans --chroot \
 /bin/sh -c "cd `pwd`; exec $*" \
 -- / /hurd/fakeroot
   That will put fakeroot itself inside the fakeauth universe where
   it believes it can do bona fide setuid exec's.  However, it will
   in fact be getting a new fake auth port that claims to be whatever
   IDs the setuid process should have, but is really the fakeauth owner.
   The setuid exec will get a faked auth port that claims what it should,
   and so will continue in the fakeauth universe.  However, since netfs
   will set EXEC_SECURE, the exec server will give it the global crdir
   and so it will escape the fakeroot universe.  (Or we could hack fakeroot
   to act like netfs_S_file_exec but clear the EXEC_SECURE flag.) 

3. Hack fakeroot to fake setuid/setgid exec in some particular way.

#1 is the easiest and seems appropriate since the point of the exercise is
to approximate the behavior of Linux fakeroot.

> * Creating pipe fails also with Operation not permitted, and I have no clue
>   yet why. /servers/socket/1 is correctly looked up (with flags being 0, by
>   the way), and then I don't think the pflocal server is even involved in
>   the matter.  I will have to do more debugging here.

You mean fakeroot is not involved any more, right?  The call that matters
is the socket_create call that needs to be forwarded by the generic code in
fakeroot's netfs_demuxer.  It's after that call is made that fakeroot
should no longer be involved.

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: fakeroot status

2002-05-12 Thread Marcus Brinkmann

On Sun, May 12, 2002 at 07:40:05PM -0400, Roland McGrath wrote:
> > * Creating pipe fails also with Operation not permitted, and I have no clue
> >   yet why. /servers/socket/1 is correctly looked up (with flags being 0, by
> >   the way), and then I don't think the pflocal server is even involved in
> >   the matter.  I will have to do more debugging here.
> 
> You mean fakeroot is not involved any more, right?  The call that matters
> is the socket_create call that needs to be forwarded by the generic code in
> fakeroot's netfs_demuxer.  It's after that call is made that fakeroot
> should no longer be involved.

Ugh, netfs_attempt_lookup did not fail, but netfs_S_dir_lookup does!  This
is because it sees that S_ISCHR evaluates to true on the node.  Because
fakeroot has no translator started on the node yet, fshelp_fetch_root will
try to do so.

Of course, it is not allowed to start a translator (whatever type of
translator it wants to start, I didn't check which, maybe even "chrdev") as
root (which is still the owner of /server/socket/1), so fshelp_fetch_root
fails with EPERM.

Distress.  What can we do?  Override... netfs_S_dir_lookup?
fshelp_fetch_root?

Thanks,
Marcus

-- 
`Rhubarb is no Egyptian god.' Debian http://www.debian.org [EMAIL PROTECTED]
Marcus Brinkmann  GNUhttp://www.gnu.org[EMAIL PROTECTED]
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: fakeroot status

2002-05-12 Thread Roland McGrath

> Ugh, netfs_attempt_lookup did not fail, but netfs_S_dir_lookup does!  This
> is because it sees that S_ISCHR evaluates to true on the node.  Because
> fakeroot has no translator started on the node yet, fshelp_fetch_root will
> try to do so.

I see.  This is just a case of not matching the assumptions that netfs was
originally written for.  netfs_S_dir_lookup is much too complicated a
function to want to override with a duplicate version having a slight
difference.  I think we should just add a hook to netfs to disable its
special handling of special files.  

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



(¼ºÀα¤°í) ÃÖ°­ÀÇ ¼ºÀλçÀÌÆ® !!

2002-05-12 Thread ¼½½Ã·¯ºê
Title: SexyLove



 




SexyLove
 


 
¼¼»ó¿¡¼­ 
°¡Àå ´ÞÄÞÇÑ ¿µÈ­°ü
 



 






 
Â¥¸´ÇÑ 
Äè°¨ Â¥¸´ÇÑ À¯È¤
 




 
¿À¸£°¡Áò°ü
 




 
¿¢±â½º°ü
 




 
¼ºÀÎäÆÃ
 




 
À¯¸Ó¹æ
 




 
½º¸± 
³ÑÄ¡´Â À̹ÌÁö
 






 
È¥ÀÚ¸¸ÀÇ 
Áñ°Å¿òÀ» ´À²¸º¸¼¼¿ä...
 



 



 
±ÍÇÏÀÇ 
Çã¶ô¾øÀÌ È«º¸¼º ÀüÀÚ ¿ìÆíÀ» º¸³»°Ô µÈ Á¡ Á¤ÁßÈ÷ »ç°ú µå¸³´Ï´Ù.
Á¤º¸Åë½Å¸Á 
ÀÌ¿ëÃËÁø¹ý ±ÔÁ¤À» ÁؼöÇÏ¿© ±¤°í¸ÞÀÏÀÓÀ» Ç¥½ÃÇÏ¿´À¸¸ç,
¼ö½Å°ÅºÎ 
ÀåÄ¡¸¦ ¸¶·ÃÇÏ°í ÀÖ½À´Ï´Ù.
±ÍÇÏÀÇ 
ÀüÀÚ ¿ìÆí ÁÖ¼Ò´Â ÀÎÅÍ³Ý »óÀÇ °ø°³µÈ Àå¼Ò¿¡¼­ ½ÀµæÇÏ¿´À¸¸ç,
ÀúÈñ´Â 
±ÍÇÏÀÇ ÀüÀÚ¿ìÆí ÁÖ¼Ò¿Ü ¾î¶°ÇÑ °³ÀÎÁ¤º¸µµ °¡Áö°í ÀÖÁö ¾ÊÀ¸¹Ç·Î ¾È½ÉÇϽñâ 
¹Ù¶ø´Ï´Ù.
¼ö½ÅÀ» 
¿øÄ¡ ¾ÊÀ¸½Ã¸é [¼ö½Å°ÅºÎ]¸¦ Ŭ¸¯ÇØ ÁֽʽÿÀ.
 



 



 
19¹Ì¸¸ 
´ë»óÀÚ´Â ÃâÀÔÇÒ ¼ö ¾ø½À´Ï´Ù.
 






___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd


Re: fakeroot status

2002-05-12 Thread Marcus Brinkmann

On Sun, May 12, 2002 at 07:40:05PM -0400, Roland McGrath wrote:
> There are a few different ways to attack this:
> 
> 1. Override netfs_S_file_exec to just pass it through.  Then a setuid exec
>will be a real setuid exec and will escape from the fakeroot and
>fakeauth universes entirely.  This is the behavior of Linux fakeroot,
>since it does nothing special for exec and LD_PRELOAD is ignored by
>setuid executables.

I put it in.

Thanks,
Marcus

-- 
`Rhubarb is no Egyptian god.' Debian http://www.debian.org [EMAIL PROTECTED]
Marcus Brinkmann  GNUhttp://www.gnu.org[EMAIL PROTECTED]
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Norton AntiVirus 在您发送的消息中发现了病毒。受感染附件已被删除。

2002-05-12 Thread NAV for Microsoft Exchange-MAIL

ÊܸÐȾ¸½¼þµÄÊÕ¼þÈË£ºliushaohua\ÊÕ¼þÏä
ÏûÏ¢Ö÷Ì⣺DATAFORMATAS
ÒÑɾ³ýÁËÒ»¸ö»ò¶à¸ö¸½¼þ¡£
ÓÉÓÚÏÂÁÐÔ­Òò£¬¸½¼þ DATAFLD.scr ±»É¾³ý£º
   ·¢ÏÖ²¡¶¾ W32.Klez.H@mm¡£



msg04526/bin0.bin
Description: application/ms-tnef


[광고] bug-hurd님 CD제작&컨텐츠개발&홈페이지제작관련 광고입니다.

2002-05-12 Thread Option21
Title: main2




   

  
   

  
   

  
   
 
  
 
  
  
  
  
  
  
  

  

  
   

  
   
 
  
 
  
  
  
  
  

  

  
   

  
   
 
  
 
  
  
  
  
  

  

  
   

  
   

  
   

  
   
 
  
 
  
  

  

  

 
 
 
 
 
 
 
 
 



(no subject)

2002-05-12 Thread test







Please accept our sincere apology if the e-mail repeats
itself due to group-mailing system despite
the refusal of receiving of them.
..¾È³çÇϼ¼¿ä? ÇÑ¿ïµðÁöÅØÁÖ½Äȸ»ç(º¸À̽ºÅ©¶ô¼ðÃÑÆÇ)ÀÔ´Ï´Ù . ±Ý¹ø ÀúÈñȸ»ç¿¡¼­
"º¸À̽ºÅ©¶ô¼ð"°³¹ß (½Ç¿ë
ƯÇã) ÇÏ¿© Àü±¹ Áö¿ªÀûÀ¸·Î ÀÌ»ç¾÷¿¡ ÇÔ²²
µ¿ÂüÇÏ½Ç ºÐ( ´ë¸®Á¡ ¹× Áö¿ª ¿µ¾÷ÇϽǺР)À» ¸ð½Ã°í ÀÖ½À´Ï´Ù. ÇöÀç´Â
°ñ¸ñ±æÀ̳ª º¸ÇàÀÚ°¡ ¸¹Àº °÷ Áö³¯¶§ Å©¶ô¼ð ´©¸£±â°¡ ¸Å¿ì ºÎ´ã½º·¯¿ü½À´Ï´Ù. º»Á¦Ç°À» Â÷·® º»³×Æ®¼Ó¿¡ ÀåÂøÇÑ
ÈÄ ±âÁ¸ ÇÚµéÀÇ Å©¶ô¼ðÀ» »ì¦ Çѹø ´©¸£¸é »ó³É½º·± ¿©ÀÚÀ½¼ºÀ¸·Î "»§»§
ºñÄÑÁÖ¼¼¿ä" ÇÏ´Â ¸àÆ®°¡ ³ª¿À¸ç ¶ÇÇѹø ´©¸£¸é "Á˼ÛÇÕ´Ï´Ù ºñÄÑÁÖ¼¼¿ä"ÇÏ´Â ¸àÆ®°¡ ³ª¿É´Ï´Ù. ¿¬°ÅǪ µÎ¹ø
´©¸£¸é "»§»§ »¡¸® ºñÄÑÁÖ¼¼¿ä" ÇÏ´Â ¸àÆ®°¡ ³ª¿À°Ô µÇ¾î
ÀÖ½À´Ï´Ù. (2002³â 2¿ù 24ÀÏ ¿ÀÀü 9½Ã14ºÐ ÄÉÀ̺í TV(YTN NEWS)¹æ¿µ ÂüÁ¶) (2002³â 5¿ù 2ÀÏ SBS
8½Ã NEWS ¹æ¿µÂüÁ¶¶ÇÇÑ Å©¶ô¼ðÀ» ±æ°Ô ´­·¯Áֽøé ÀÏ¹Ý ±âÁ¸ Å©¶ô¼ðÀ½ÀÌ ³ª¿É´Ï´Ù.
±×¸®°í ¿µ¾î, ÀϾî, Áß±¹¾îµî ¾î¶² ¾ð¾î·Îµµ °¡´ÉÇϸç,Â÷·® ½Ç³» ¿¡´Â
ÀÏüÀÇ ÀåÂøÀÌ ¾øÀ¸¸ç, º»³×Æ® ¼Ó¿¡ ÀåÂøÇÕ´Ï´Ù. º¸ÇàÀÚ°¡ ¸¹Àº°÷ Áö³¯¶§ »ì¦ ´©¸£¸é ¿îÀüÀÚ¿Í º¸ÇàÀÚ°£¿¡ ¼­·Î
¿ôÀ¸¸ç ÅëÇà ÇÒ¼ö ÀÖÀ¸¸ç ¸Å¿ì ¹ÝÀÀÀÌ ÁÁ½À´Ï´Ù. ¼Ò¾×À¸·Îµµ ÇöÀçÀÇ ¾÷Á¾°ú °â¾÷, ¶Ç´Â º»¾÷À» ÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

 
1°³ ±¸ÀԽà Åù質 µî±â·Î ÀÔ±ÝÈ®ÀÎÈÄ ¹ß¼ÛÇØ µå¸³´Ï´Ù
ÀÔ±Ý °èÁÂ:050-072457-02-018(±â¾÷ÀºÇà)
¿¹±ÝÁÖ: ±Ç¹Ì¶õ
 
 ¿¬¶ô Áֽʽÿä.
ÇÑ¿ïµðÁöÅØÁÖ½Äȸ»ç(º¸À̽ºÅ©¶ô¼ðÃÑÆÇ)02)698-9658 ,017-304-6625 

 
¸ÞÀÏÁÖ¼Ò  [EMAIL PROTECTED]
°¨»çÇÕ´Ï´Ù.ÁÁÀº½Ã°£ µÇ½Ê½Ã¿ä. 
 
*ȸ¿ø´Ôµé¿¡°Ô º¸³»´Â Àüü¸ÞÀÏÀ̶ó ¸ÞÀÏÀÌ Áߺ¹µÉ ¼öµµ ÀÖÀ¸´Ï ±× Á¡ ¾çÇعٶø´Ï´Ù*.
º» ¸ÞÀÏÀÌ ÀüÇô µµ¿òÀÌ µÇÁö ¾Ê´Â ¸ÞÀÏÀ̾ú´Ù¸é Á¤ÁßÈ÷ »ç°úµå¸®°Ú½À´Ï´Ù. ^^;


 

º» ¸ÞÀÏÀº Á¤º¸Åë½ÅºÎ ±Ç°í »çÇ׿¡ ÀÇ°Å Á¦¸ñ¿¡
[±¤°í]¶ó Ç¥½ÃµÈ ±¤°í ¸ÞÀÏÀÔ´Ï´Ù.¼ö½Å°ÅºÎ ¹öÆ°À» Ŭ¸¯ÇÏ½Ã¸é ¼ö½Å°ÅºÎ󸮰¡ ÀÌ·ç¾î Áý´Ï´Ù. 




___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd


Bug#146797: hurd: policy violation section 13.2

2002-05-12 Thread Guillem Jover

Package: hurd
Version: 20020418-1
Severity: serious
Justification: policy violation section 13.2



diff -u /usr/src/hurd-cvs/debian/postinst debian/postinst
--- /usr/src/hurd-cvs/debian/postinst   Sat Oct  9 00:57:30 1999
+++ debian/postinst Mon May 13 06:56:53 2002
@@ -16,7 +16,7 @@
 
 # Install info files into the dir file.
 
-install-info --quiet --section "Hurd" "The Hurd" /usr/info/hurd.info.gz
+install-info --quiet --section "Hurd" "The Hurd" /usr/share/info/hurd.info.gz
 
 # Manage alternatives.
 
diff -u /usr/src/hurd-cvs/debian/rules debian/rules
--- /usr/src/hurd-cvs/debian/rules  Sat Dec 29 12:42:28 2001
+++ debian/rulesMon May 13 06:56:36 2002
@@ -27,7 +27,7 @@
 PREFIX = /usr
 BINDIR = $(PREFIX)/bin
 MANDIR = $(PREFIX)/man
-INFODIR = $(PREFIX)/info
+INFODIR = $(PREFIX)/share/info
 DOCDIR = $(PREFIX)/share/doc/$(package)
 
 #  Package specific stuff.  The idea is to try to make the rules



kind regards
guillem


___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Check out BMII OPTOJ

2002-05-12 Thread Investor Relations





___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd


Hurd TWiki trial - Announcement

2002-05-12 Thread Grant Bowman

Thank you to all the people who replied.  I had some suggestions from
Robert Millan and Oystein Viggen on how to use dyndns.org for hosting a
machine myself.  Also thanks to Peter Thoeny, TWiki's author for his
interest and encouragement.  Joachim Nilsson has provided a home for the
Hurd TWiki trial on a server in Sweden.  Please check out the pages at:

 http://www.vmlinux.org/twiki/bin/view/Hurd/WebHome

If you have some relevant Hurd information on your own web pages, have
surfed and found many resources that could use indexing or would like to
write some new documentation, this is the place.  You are encouraged to
create and modify pages as you see fit.  This space can be used for
semi-private information as well as a central resource for information
about the Hurd.

During the introduction phase I will assume the role of editor and
coordinator.  Comments and suggestions are encouraged.

Authentication is possible anonymously using the WikiName TWikiGuest
(password: guest) or with your own WikiName.  Self registration and
cration of your own WikiName is available from the TWikiRegistration
URL.  How people choose to use authentication is left undefined at the
moment to adapt to whatever editing norms the Hurd community wishes to
establish.

 http://www.vmlinux.org/twiki/bin/view/TWiki/TWikiRegistration

If you want updates about the Hurd TWiki, automatic updates should soon
be available by adding your name to the WebNotify page.  You should
automatically get email after any Hurd page is created or updated.  This
isn't working just yet, but it should be functional soon.
 
 http://www.vmlinux.org/twiki/bin/view/Hurd/WebNotify 

-- 
-- Grant Bowman<[EMAIL PROTECTED]>


* Grant Bowman <[EMAIL PROTECTED]> [020510 14:38]:
> Greetings,
> 
> After some initial discussions with Marcus, I would like to setup and
> help administer a TWiki [1] forum for the Hurd project.  I am evaluating
> options on where to host a trial implementation, perhaps moving the data
> to a more centrally hosted resource if the trial proves successful.
> Options I am considering right now are Savannah, some willing Internet
> host I can find or perhaps even borrowing a section of an existing
> TWiki.
> 
> While I am running a TWiki on my machine, my ISP uses DHCP.  If there
> are any suggestions, please let me know and I can later summarize what I
> find for the list.
> 
> Thanks,
> 
> -- 
> -- Grant Bowman<[EMAIL PROTECTED]>
> 
> [1] http://twiki.org
> 
> 
> ___
> Bug-hurd mailing list
> [EMAIL PROTECTED]
> http://mail.gnu.org/mailman/listinfo/bug-hurd
> 


___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: hurd/utils fakeauth.c

2002-05-12 Thread Thomas Bushnell, BSG

Roland McGrath <[EMAIL PROTECTED]> writes:

> CVSROOT:  /cvsroot/hurd
> Module name:  hurd
> Changes by:   Roland McGrath <[EMAIL PROTECTED]> 02/05/12 17:02:13
> 
> Modified files:
>   utils  : fakeauth.c 
> 
> Log message:
>   2002-05-12  Roland McGrath  <[EMAIL PROTECTED]>
>   
>   * fakeauth.c (main): Don't use posix_spawnp.  Use _hurd_exec instead.

_hurd_exec is a private function...it seems to me that if we want to
use it in programs in general, we should export it.

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



Re: establishing the callers PID

2002-05-12 Thread Niels Möller

[EMAIL PROTECTED] (Thomas Bushnell, BSG) writes:

> Right, but that's already a Hurd-specific extension.  So it's fine to
> expect it to use another Hurd-specific extension to get a reliable PID
> or other identification.

What would such an extension look like?

/Niels

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd



½õ³ÌÆÚ¿¯

2002-05-12 Thread allan ji
Title: newsletter



 

   
   
 
  
 
 
  
  
  

 
  

  
   

  
   
 
  

  
   
 
  
   
 
  óÒ×´óÈ«¡¡©¦¡¡»õÔËÊֲᡡ©¦¡¡Í¨¹ØÖ¸ÄÏ¡¡©¦¡¡ÉÌÂùËÎÊ¡¡©¦¡¡º½Ã³ÂÛ̳

  
  
 
  
   
 
   
2002Äê5ÔÂ13ÈÕÐÇÆÚÒ»¡¡µÚ¶þÆÚ 
  

  
   
 
  

  
   
 
  
×ð¾´µÄÓû§£º
ÄúºÃ£¡ÒÔÏÂÊǽõ³Ì»õÔËÍøΪÄúÁ¿Éí¶¨ÖƵĵڶþÆÚ×ÊѶÀàÓʼþ£¬Çë²ÎÔÄ¡£

»õÔËÊÖ²á>>> 

 ¡¾»ù´¡ÖªÊ¶¡¿¹ú¼Ê»õÎïÔËÊäµÄÐÔÖʺÍÌصã
 ¡¾·¨ÂÉ·¨¹æ¡¿ 
ÖлªÈËÃñ¹²ºÍ¹ú¹ú¼Êº£ÔËÌõÀý(2002Äê1ÔÂ1ÈÕÆðʵʩ)
 ¡¾²Ù×÷ʵÎñ¡¿ÍÐÔ˵¥Óë×°Ïäµ¥¶þµ¥ÉÉÖÆÂí»¢²»µÃ
 ¡¾°¸Àý·ÖÎö¡¿ 
ÏäÄÚ»õÎï¶ÌÉÙÊÕ»õÈËÎÞȨÏò³ÐÔËÈËË÷ÅâµÄµäÐÍ°¸Àý 
 ¡¾¸Ûº½×ÊÁÏ¡¿ 
ÊÀ½ç¼°ÎÒ¹úÖ÷Òª¸Û¿Ú

óÒ×´óÈ«>>> 
 ¡¾»ù´¡ÖªÊ¶¡¿ 
¹ú¼Ê¼¼ÊõóÒײÉÓõķ½Ê½
 ¡¾·¨ÂÉ·¨¹æ¡¿ÁªºÏ¹ú¹ú¼Ê»õÎïÏúÊÛºÏͬ¹«Ô¼£¨ÖÐÎİ棩
 ¡¾²Ù×÷ʵÎñ¡¿ 
³ö¿ÚÐÅ´ûÒµÎñµÄ´û¿î³ÌÐò
 ¡¾ÉÌÎñ×ÊѶ¡¿ 
2002Äê¹ú¼Ê,¹úÄÚÕ¹»áÐÅÏ¢
 ¡¾°¸Àý·ÖÎö¡¿ 
¡¶¸úµ¥ÐÅÓÃ֤ͳһ¹ßÀý¡·Óë°¸Àý·ÖÎö
 ¡¾Ã³Ò×͸ÊÓ¡¿ 
ÖÞ¼ÊÊг¡·ÖÎö--ÑÇÖÞÊг¡
 ¡¾ÓйØWTO 
¡¿ ÖйúÈëÊÀ·¨ÂÉÎļþ(ÖÐÎÄ°æ)

ͨ¹ØÖ¸ÄÏ>>> 
 ¡¾±¨¹ØÒµÎñ¡¿º£¹Ø³ö¿Ú»õÎﱨ¹Øµ¥ÌîÖƹ淶
 ¡¾º£¹Ø·¨¹æ¡¿ÖлªÈËÃñ¹²ºÍ¹úº£¹Ø½ø³ö¿ÚÉÌÆ·Ô¤¹éÀàÔÝÐа취 

 ¡¾º£¹ØË°ÂÊ¡¿ 
2002ÄêÉÌÆ·×ۺϷÖÀà±í˰ĿϸÔò 

 ¡¾±¨¹Ø´úÂë¡¿ 
Õ÷ÃâÐÔÖÊ´úÂë±í
  ¡¾Í¨¹Ø½éÉÜ¡¿ 
°Ä´óÀûÑÇ¿Ú°¶Í¨¹ØʵÎñÖ¸ÄÏ
 ¡¾ÊÀ½çº£¹Ø¡¿ 
º£¹Ø×ÛºÏÐÂÎÅÍø
 ¡¾µ¥Î»»»Ëã¡¿ 
¶ÈÁ¿ºâµ¥Î»»»Ëã±í
  
       
¡ï½õ³Ì¹ú¼Ê»õÔ˹ɷÝÓÐÏÞ¹«Ë¾½ß³ÏΪÄúÌṩ¹ú¼Ê»õÔËÁìÓòµÄ·þÎñ.¡ï

  
   


  
  

  Èç¹ûÄúÐèÒª»¥ÁªÍø¼¼ÊõÖ§³Ö»ò¹ú¼ÊÔËÊä·þÎñÇëÁªÏµÎÒÃÇ¡£
ÁªÏµµç»°£º86-411-2528051 
µç×ÓÐÅÏ䣺[EMAIL PROTECTED] 
ÁªÏµÈË£º¼ÍÏÈÉú

  
ÖÐ×ÊÔ´¹«Ë¾http://www.net001.net ÌṩÓòÃûÏÈ×¢²áºó¸¶¿î;Ö÷»úÏÈ¿ªÍ¨ºóÊÕ·Ñ·þÎñ,ÖÐ;¿ÉÍË¿î¡£ÌØ»ÝÍƼö£ºÓòÃû+100MÖ÷»ú²¢¸½ËÍ5¸ö10MÆóÒµÓÊÏ䣬ÿÄêÖ»Ðè350Ôª£¡£¡
ʹÓü«ÐÇÓʼþȺ·¢£¬ÎÞÐëͨ¹ýÓʼþ·þÎñÆ÷£¬Ö±´ï¶Ô·½ÓÊÏ䣬ËٶȾø¶ÔÒ»Á÷£¡ÏÂÔØÍøÖ·£º[ÐÄÁ¬ÐÂ]Çé¸ÐÔÚÏߣ¬¸ü¶àÃâ·ÑµÄ³¬¿áÈí¼þµÈÄãÀ´Ï¡­¡­

___
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd