On Sun, Dec 14, 2008 at 11:34 PM, Sergiu Ivanov
wrote:
> [...] I
> supply the source file I used to test this thing as an attachment, so
> that there should not be ambiguities.
Please excuse my forgetfulness... The file is attached to this mail.
Also, I checked it again: the lookup simply fails
Hello,
On Mon, Dec 8, 2008 at 9:15 PM, wrote:
> On Wed, Dec 03, 2008 at 09:07:48PM +0200, Sergiu Ivanov wrote:
> > On Wed, Dec 3, 2008 at 4:20 AM, wrote:
>
> > I mean, should we adopt the idea of taking a BSD kernel, throwing out
> > UNIX stuff, and implementing generic primitives as a possible
Hello,
On Mon, Dec 8, 2008 at 9:28 AM, wrote:
> On Thu, Dec 04, 2008 at 06:49:12PM +0200, Sergiu Ivanov wrote:
> > On Wed, Dec 3, 2008 at 3:40 AM, wrote:
>
> > By proxying control ports do you mean creating shadow nodes containing
> > ports to the real control ports?
>
> Well, the terminology i
> One simple thing is when the administrator gives you memory that
> nobody else can access unless you give them capability for some part
> of the memory. The problem is that if you request a service from a
> system server you should provide the memory the service requires, and
> it is not apparent