Re: [PATCH] Undo some of the pseudo-security madness

2007-02-24 Thread Samium Gromoff
because a typical image contains hundreds of thousands of > small objects on startup. Well: [EMAIL PROTECTED]:/mnt/shared/video1 # cat /proc/`pgrep sbcl | head -n1`/maps | wc -l 1378 regards, Samium Gromoff - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the bod

Re: [PATCH] Undo some of the pseudo-security madness

2007-02-24 Thread Samium Gromoff
At Sat, 24 Feb 2007 10:40:51 +0100, Florian Weimer wrote: > > * Samium Gromoff: > > > Lisp environments can produce standalone executables > > If you've got a stand-alone executable, you don't need MAP_FIXED. The > ELF loader maps the program at a fixed addr

Re: [PATCH 1/2] Define the EF_AS_NO_RANDOM e_flag bit

2007-01-23 Thread Samium Gromoff
At Tue, 23 Jan 2007 16:16:12 -0500, Jakub Jelinek wrote: > > On Wed, Jan 24, 2007 at 12:06:45AM +0300, Samium Gromoff wrote: > > Should we introduce per-arch asm/elf.h files to hold the relevant flag > > definitions then? > > On some architectures there are no bits lef

Re: [PATCH 1/2] Define the EF_AS_NO_RANDOM e_flag bit

2007-01-23 Thread Samium Gromoff
At Tue, 23 Jan 2007 16:16:12 -0500, Jakub Jelinek wrote: > > On Wed, Jan 24, 2007 at 12:06:45AM +0300, Samium Gromoff wrote: > > Should we introduce per-arch asm/elf.h files to hold the relevant flag > > definitions then? > > On some architectures there are no bits lef

Re: [PATCH 1/2] Define the EF_AS_NO_RANDOM e_flag bit

2007-01-23 Thread Samium Gromoff
At Tue, 23 Jan 2007 15:50:18 -0500, Jakub Jelinek wrote: > > On Tue, Jan 23, 2007 at 11:28:13PM +0300, Samium Gromoff wrote: > > Author: Samium Gromoff <[EMAIL PROTECTED]> > > Date: Tue Jan 23 22:31:13 2007 +0300 > > > > Define the EL

[PATCH 2/2] Make the EF_AS_NO_RANDOM e_flag bit disable PF_RANDOMIZE

2007-01-23 Thread Samium Gromoff
Author: Samium Gromoff <[EMAIL PROTECTED]> Date: Tue Jan 23 23:12:16 2007 +0300 load_elf_binary: do not set PF_RANDOMIZE if the ELF file has EF_AS_NO_RANDOM s et diff --git a/fs/binfmt_elf.c b/fs/binfmt_elf.c index 7cb2872..007dedd 100644 --- a/fs/binfmt_elf.c +++ b/fs/binfmt

[PATCH 1/2] Define the EF_AS_NO_RANDOM e_flag bit

2007-01-23 Thread Samium Gromoff
Author: Samium Gromoff <[EMAIL PROTECTED]> Date: Tue Jan 23 22:31:13 2007 +0300 Define the ELF binary header flag EF_AS_NO_RANDOM EF_AS_NO_RANDOM should mean that the binary requests to not apply randomisation to address spaces of its processes. diff --git a/include

[PATCH 0/2] Mechanism to turn of ASR on a per-ELF binary basis

2007-01-23 Thread Samium Gromoff
. regards, Samium Gromoff - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/

Re: [PATCH] Undo some of the pseudo-security madness

2007-01-23 Thread Samium Gromoff
on-setuid case > Pavel P.S.: Please, shrug off that C-esque center-of-the-world attitude, the fact there are thousand times as many C programmers does not automatically mean there is a free-for-all no-questions-asked licence to raise the im

Re: [PATCH] Undo some of the pseudo-security madness

2007-01-22 Thread Samium Gromoff
at work (you don't), use arjan (at) linux.intel.com > Test the interaction between Linux and your BIOS via > http://www.linuxfirmwarekit.org regards, Samium Gromoff - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTE

Re: [PATCH] Undo some of the pseudo-security madness

2007-01-22 Thread Samium Gromoff
At Mon, 22 Jan 2007 10:20:21 -0500, [EMAIL PROTECTED] wrote: > On Mon, 22 Jan 2007 02:23:30 +0300, Samium Gromoff said: > > > > not "core-dumps" but "core files", in the lispspeak, but anyway. > > > > the reason is trivial -- if i can write programs

Re: [PATCH] Undo some of the pseudo-security madness

2007-01-21 Thread Samium Gromoff
t can't happen. Uh, this does not work, unfortunately in the Lisp case. Lisp environments can produce standalone executables, which are 1. supposed to be runnable like a usual binary, without any additions 2. will suffer from the very same problem, as it merely is a runtime bundled wi

Re: [PATCH] Undo some of the pseudo-security madness

2007-01-21 Thread Samium Gromoff
#x27;t), use arjan (at) linux.intel.com > Test the interaction between Linux and your BIOS via > http://www.linuxfirmwarekit.org regards, Samium Gromoff - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majord

Re: [PATCH] Undo some of the pseudo-security madness

2007-01-21 Thread Samium Gromoff
David Wagner wrote: > Samium Gromoff wrote: > >[...] directly setuid root the lisp system executable itself [...] > > Like I said, that sounds like a bad idea to me. Sounds like a recipe for > privilege escalation vulnerabilities. Was the lisp system executable > rea

Re: [PATCH] Undo some of the pseudo-security madness

2007-01-21 Thread Samium Gromoff
David Wagner wrote: > Samium Gromoff wrote: > >the core of the problem are the cores which are customarily > >dumped by lisps during the environment generation (or modification) stage, > >and then mapped back, every time the environment is invoked. > > > >at the

[no subject]

2007-01-21 Thread Samium Gromoff
David Wagner wrote: > Samium Gromoff wrote: > >the core of the problem are the cores which are customarily > >dumped by lisps during the environment generation (or modification) stage, > >and then mapped back, every time the environment is invoked. > > > >at the

Re: [PATCH] Undo some of the pseudo-security madness

2007-01-21 Thread Samium Gromoff
At Sun, 21 Jan 2007 03:16:04 +0100, Arjan van de Ven wrote: > > On Sat, 2007-01-20 at 17:37 +0300, Samium Gromoff wrote: > > This patch removes the dropping of ADDR_NO_RANDOMIZE upon execution of > > setuid > > binaries. > > > > Why? The answer consists of tw

Re: [PATCH] Undo some of the pseudo-security madness

2007-01-21 Thread Samium Gromoff
At Sun, 21 Jan 2007 03:16:04 +0100, Arjan van de Ven wrote: > On Sat, 2007-01-20 at 17:37 +0300, Samium Gromoff wrote: > > This patch removes the dropping of ADDR_NO_RANDOMIZE upon execution of > > setuid > > binaries. > > > > Why? The answer consists of two p

Re: [PATCH] Undo some of the pseudo-security madness

2007-01-20 Thread Samium Gromoff
At Sat, 20 Jan 2007 17:37:22 +0300, Samium Gromoff wrote: [snip] > So, here we have a buffer-overflow protection technique, which does not > actually protect against buffer overflows[1], breaking valid applications. > > I suggest getting rid of it. i botched it slightly: --- linux/i

[PATCH] Undo some of the pseudo-security madness

2007-01-20 Thread Samium Gromoff
or setgid exec: */ -#define PER_CLEAR_ON_SETID (READ_IMPLIES_EXEC|ADDR_NO_RANDOMIZE) +#define PER_CLEAR_ON_SETID (READ_IMPLIES_EXEC) /* * Personality types. Signed-off-by: Samium Gromoff <[EMAIL PROTECTED]> [1]. See the excellent, 'Hackers Hut' by Andries Brouwer, which

Re: Kernel SCM saga..

2005-04-09 Thread Samium Gromoff
.html --- cheers, Samium Gromoff - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/

Re: Kernel SCM saga..

2005-04-09 Thread Samium Gromoff
at your text editor is smart and deletes the original file when it writes changes. Various pre/post/whatever-commit hooks. That much for starters... :-) --- cheers, Samium Gromoff - To uns

O_DIRECT! or O_DIRECT?

2001-07-03 Thread Samium Gromoff
That is why, i think, Linus as far as i can properly recall, wasn`t happy with it et al. Maybe i`m missing the whole point, and thus i want to hear what other people will tell about it. Cheers, Samium Gromoff - To unsubscribe from this list: send the line "unsubscribe

[PATCH] missing adlib release region

2001-05-17 Thread Samium Gromoff
i know, adlib_card is just a stupid interface, but i once was hit by this problem ;). --- linux-2.4.4.orig/drivers/sound/adlib_card.c Fri May 11 22:42:55 2001 +++ linux-2.4.4/drivers/sound/adlib_card.c Thu May 17 11:39:04 2001 @@ -50,6 +50,7 @@ static void __exit cleanup_adlib(void)

Re[2]: ReiserFS 2.4.4/3.x.0k-pre2

2001-05-15 Thread Samium Gromoff
Hello, I`m still experiencing file tail corruptions on subj. And more: after i had restored bblocked patrition (by relying on drive`s ability to remap bblks on write by wroting small modification of debugreiserfs which zeroified all bblks), i had _runtime_ tail corru

Re[2]: ReiserFS question

2001-05-06 Thread Samium Gromoff
Info addon, sorry for that: these bblks are quite writeable, so it`s ok to rewrite `em to rebuild. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.ht

Re[2]: Q: HowTo Nullify journal on badblks?

2001-05-06 Thread Samium Gromoff
Hello busy peoples, again me... Today got my 45gb drive slightly badblocked: about 70 MB in beginning... thus problem arose: bitmaps are heavily corrupted, and debugreiserfs with -p crashes while trying to dump journal (he`s not alone in such behaviour: evryone doing

ReiserFS question

2001-04-26 Thread Samium Gromoff
Hi People... got a following "dead of alive" question: how to find a root block on a ReiserFS partition with a corrupted superblock? reiserfsprogs-3.x.0.9j simply writes -2^32 there at start (reset_super_block) and then simply crashes when attempting to access to such mad

Re: (iptables) ip_conntrack bug?

2000-11-15 Thread Samium Gromoff
vegae:/usr/src/linux# grep -r ./* --regexp="IPS_CON" | grep "define" ./include/linux/elf.h:#define DT_MIPS_CONFLICT 0x7008 ./include/linux/elf.h:#define DT_MIPS_CONFLICTNO0x700b ./include/linux/elf.h:#define SHT_MIPS_CONFLICT 0x7002 vegae:/usr/src/linux#

testXX and PPPD 2.4.0-release

2000-11-15 Thread Samium Gromoff
DESCRIPTION: Happen on 2.4.0-testXX, doesnt on 2.2.X pppd 2.4.0-b2,b4,release, ppp async in kernel Sportster 14400 Vi (if that hell does matter) AND! UART 16450! I`ve described such a problem to PPP maintainers about half-year ago, but got nothing. Now i

RE: /proc tweaking

2000-11-14 Thread Samium Gromoff
on Tue, 14 Nov 2000 Arjan van de Ven wrote: >In article <[EMAIL PROTECTED]> you wrote: >>Hey people, i`ve got such a thought >> not long ago: >> all boxes are different, but the /proc/sys/vm >> defaults are equal for every people, so there >> is a good issue in ge

/proc tweaking

2000-11-14 Thread Samium Gromoff
Hey people, i`ve got such a thought not long ago: all boxes are different, but the /proc/sys/vm defaults are equal for every people, so there is a good issue in getting more performance from linux, just by making a way to autoadjust these mysterious val

2.4.0-test9/PPPD2.4.0-release

2000-11-14 Thread Samium Gromoff
Maybe i`d better to post this problem to linux-ppp ML, but i`ve reported already it to PPP maintainers about half year ago, thus i felt ok to post here. And so the problem: I`m unable sometimes to get files thru HTTP, and the way its happening is very strange for me: it looks l

just a small VM idea

2000-10-22 Thread Samium Gromoff
Let`s imagine were having two mounted swap partitions. Current situation, if im not going wrong is the next: swapping to 1st partition, till there is a space on it then swapping to the next one... But if make two basic checks: 1) if these partitions are on different drives 2) i/o speed i