because a typical image contains hundreds of thousands of
> small objects on startup.
Well:
[EMAIL PROTECTED]:/mnt/shared/video1 # cat /proc/`pgrep sbcl | head -n1`/maps |
wc -l
1378
regards, Samium Gromoff
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the bod
At Sat, 24 Feb 2007 10:40:51 +0100,
Florian Weimer wrote:
>
> * Samium Gromoff:
>
> > Lisp environments can produce standalone executables
>
> If you've got a stand-alone executable, you don't need MAP_FIXED. The
> ELF loader maps the program at a fixed addr
At Tue, 23 Jan 2007 16:16:12 -0500,
Jakub Jelinek wrote:
>
> On Wed, Jan 24, 2007 at 12:06:45AM +0300, Samium Gromoff wrote:
> > Should we introduce per-arch asm/elf.h files to hold the relevant flag
> > definitions then?
>
> On some architectures there are no bits lef
At Tue, 23 Jan 2007 16:16:12 -0500,
Jakub Jelinek wrote:
>
> On Wed, Jan 24, 2007 at 12:06:45AM +0300, Samium Gromoff wrote:
> > Should we introduce per-arch asm/elf.h files to hold the relevant flag
> > definitions then?
>
> On some architectures there are no bits lef
At Tue, 23 Jan 2007 15:50:18 -0500,
Jakub Jelinek wrote:
>
> On Tue, Jan 23, 2007 at 11:28:13PM +0300, Samium Gromoff wrote:
> > Author: Samium Gromoff <[EMAIL PROTECTED]>
> > Date: Tue Jan 23 22:31:13 2007 +0300
> >
> > Define the EL
Author: Samium Gromoff <[EMAIL PROTECTED]>
Date: Tue Jan 23 23:12:16 2007 +0300
load_elf_binary: do not set PF_RANDOMIZE if the ELF file has
EF_AS_NO_RANDOM s
et
diff --git a/fs/binfmt_elf.c b/fs/binfmt_elf.c
index 7cb2872..007dedd 100644
--- a/fs/binfmt_elf.c
+++ b/fs/binfmt
Author: Samium Gromoff <[EMAIL PROTECTED]>
Date: Tue Jan 23 22:31:13 2007 +0300
Define the ELF binary header flag EF_AS_NO_RANDOM
EF_AS_NO_RANDOM should mean that the binary requests to not apply
randomisation to address spaces of its processes.
diff --git a/include
.
regards, Samium Gromoff
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
on-setuid case
> Pavel
P.S.:
Please, shrug off that C-esque center-of-the-world attitude,
the fact there are thousand times as many C programmers does not
automatically mean there is a free-for-all no-questions-asked
licence to raise the im
at work (you don't), use arjan (at) linux.intel.com
> Test the interaction between Linux and your BIOS via
> http://www.linuxfirmwarekit.org
regards, Samium Gromoff
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTE
At Mon, 22 Jan 2007 10:20:21 -0500,
[EMAIL PROTECTED] wrote:
> On Mon, 22 Jan 2007 02:23:30 +0300, Samium Gromoff said:
> >
> > not "core-dumps" but "core files", in the lispspeak, but anyway.
> >
> > the reason is trivial -- if i can write programs
t can't happen.
Uh, this does not work, unfortunately in the Lisp case.
Lisp environments can produce standalone executables, which are
1. supposed to be runnable like a usual binary, without any additions
2. will suffer from the very same problem, as it merely is a
runtime bundled wi
#x27;t), use arjan (at) linux.intel.com
> Test the interaction between Linux and your BIOS via
> http://www.linuxfirmwarekit.org
regards, Samium Gromoff
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majord
David Wagner wrote:
> Samium Gromoff wrote:
> >[...] directly setuid root the lisp system executable itself [...]
>
> Like I said, that sounds like a bad idea to me. Sounds like a recipe for
> privilege escalation vulnerabilities. Was the lisp system executable
> rea
David Wagner wrote:
> Samium Gromoff wrote:
> >the core of the problem are the cores which are customarily
> >dumped by lisps during the environment generation (or modification) stage,
> >and then mapped back, every time the environment is invoked.
> >
> >at the
David Wagner wrote:
> Samium Gromoff wrote:
> >the core of the problem are the cores which are customarily
> >dumped by lisps during the environment generation (or modification) stage,
> >and then mapped back, every time the environment is invoked.
> >
> >at the
At Sun, 21 Jan 2007 03:16:04 +0100,
Arjan van de Ven wrote:
>
> On Sat, 2007-01-20 at 17:37 +0300, Samium Gromoff wrote:
> > This patch removes the dropping of ADDR_NO_RANDOMIZE upon execution of
> > setuid
> > binaries.
> >
> > Why? The answer consists of tw
At Sun, 21 Jan 2007 03:16:04 +0100,
Arjan van de Ven wrote:
> On Sat, 2007-01-20 at 17:37 +0300, Samium Gromoff wrote:
> > This patch removes the dropping of ADDR_NO_RANDOMIZE upon execution of
> > setuid
> > binaries.
> >
> > Why? The answer consists of two p
At Sat, 20 Jan 2007 17:37:22 +0300,
Samium Gromoff wrote:
[snip]
> So, here we have a buffer-overflow protection technique, which does not
> actually protect against buffer overflows[1], breaking valid applications.
>
> I suggest getting rid of it.
i botched it slightly:
--- linux/i
or setgid exec:
*/
-#define PER_CLEAR_ON_SETID (READ_IMPLIES_EXEC|ADDR_NO_RANDOMIZE)
+#define PER_CLEAR_ON_SETID (READ_IMPLIES_EXEC)
/*
* Personality types.
Signed-off-by: Samium Gromoff <[EMAIL PROTECTED]>
[1]. See the excellent, 'Hackers Hut' by Andries Brouwer, which
.html
---
cheers,
Samium Gromoff
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
at
your text editor is smart and deletes the original file when it writes
changes.
Various pre/post/whatever-commit hooks.
That much for starters... :-)
---
cheers,
Samium Gromoff
-
To uns
That is why, i think, Linus as far as i can properly
recall, wasn`t happy with it et al.
Maybe i`m missing the whole point, and thus i want to
hear what other people will tell about it.
Cheers,
Samium Gromoff
-
To unsubscribe from this list: send the line "unsubscribe
i know, adlib_card is just a stupid interface, but
i once was hit by this problem ;).
--- linux-2.4.4.orig/drivers/sound/adlib_card.c Fri May 11 22:42:55 2001
+++ linux-2.4.4/drivers/sound/adlib_card.c Thu May 17 11:39:04 2001
@@ -50,6 +50,7 @@
static void __exit cleanup_adlib(void)
Hello,
I`m still experiencing file tail corruptions
on subj.
And more: after i had restored bblocked patrition
(by relying on drive`s ability to remap bblks on
write by wroting small modification of debugreiserfs
which zeroified all bblks), i had _runtime_ tail
corru
Info addon, sorry for that:
these bblks are quite writeable, so it`s ok to
rewrite `em to rebuild.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.ht
Hello busy peoples, again me...
Today got my 45gb drive slightly badblocked:
about 70 MB in beginning... thus problem arose:
bitmaps are heavily corrupted, and debugreiserfs
with -p crashes while trying to dump journal
(he`s not alone in such behaviour: evryone doing
Hi People...
got a following "dead of alive" question:
how to find a root block on a ReiserFS partition
with a corrupted superblock?
reiserfsprogs-3.x.0.9j simply writes -2^32
there at start (reset_super_block) and then simply
crashes when attempting to access to such mad
vegae:/usr/src/linux# grep -r ./* --regexp="IPS_CON" | grep "define"
./include/linux/elf.h:#define DT_MIPS_CONFLICT 0x7008
./include/linux/elf.h:#define DT_MIPS_CONFLICTNO0x700b
./include/linux/elf.h:#define SHT_MIPS_CONFLICT 0x7002
vegae:/usr/src/linux#
DESCRIPTION:
Happen on 2.4.0-testXX, doesnt on 2.2.X
pppd 2.4.0-b2,b4,release, ppp async in kernel
Sportster 14400 Vi (if that hell does matter)
AND! UART 16450!
I`ve described such a problem to PPP maintainers
about half-year ago, but got nothing.
Now i
on Tue, 14 Nov 2000 Arjan van de Ven wrote:
>In article <[EMAIL PROTECTED]> you wrote:
>>Hey people, i`ve got such a thought
>> not long ago:
>> all boxes are different, but the /proc/sys/vm
>> defaults are equal for every people, so there
>> is a good issue in ge
Hey people, i`ve got such a thought
not long ago:
all boxes are different, but the /proc/sys/vm
defaults are equal for every people, so there
is a good issue in getting more performance
from linux, just by making a way to autoadjust
these mysterious val
Maybe i`d better to post this problem to
linux-ppp ML, but i`ve reported already it to PPP
maintainers about half year ago, thus i felt ok to post
here. And so the problem:
I`m unable sometimes to get files thru HTTP, and
the way its happening is very strange for me:
it looks l
Let`s imagine were having two mounted swap partitions.
Current situation, if im not going wrong is the next:
swapping to 1st partition, till there is a space on it
then swapping to the next one...
But if make two basic checks:
1) if these partitions are on different drives
2) i/o speed i
34 matches
Mail list logo