Linux-Development-Sys Digest #807, Volume #7     Thu, 27 Apr 00 10:13:12 EDT

Contents:
  Re: sleep_on() and wake_up() (nilesh patel)
  Re: unresolved symbols (nilesh patel)
  Exemples of syntax highlighting and GTK+ ("Franck")
  Re: FTP question (Anders Larsen)
  Re: How many pty's (Anders Larsen)
  Re: FTP question (Jamie Walker)
  Duplication of IP-packets (Carl =?iso-8859-1?Q?Rahmstr=F6m?=)
  reconnect to a closed telnet session ("J�rg Schulz")
  Re: MS caught breaking web sites (Rasputin)
  How to force structure to byte alignment ? ("cschiu")
  Re: I2C in Linux (Nick Henning)
  Re: Time for the MS-rats to desert (Ed Clarke)
  logging in as root over SSH (greg)
  Re: Linux system went dead suddenly (M Sweger)
  Re: Any validating XML Parsers? (M Sweger)
  Re: Time for the MS-rats to desert (bill davidsen)
  Re: logging in as root over SSH (greg)
  Re: logging in as root over SSH (Christopher Browne)
  Re: logging in as root over SSH (greg)
  wanting to implement logitech quickcam in linux (Travis Hein)
  Re: bz2 file (kartika garg)

----------------------------------------------------------------------------

From: nilesh patel <[EMAIL PROTECTED]>
Subject: Re: sleep_on() and wake_up()
Date: Thu, 27 Apr 2000 13:16:06 +0530

Badrinath Venkatachari wrote:

> Hi,
>  Thanks a lot for the reply...Kaz. If I had processes put themselves to sleep
> (based on some criterion), is it ok for me to wake them out of sync from an
> interrupt handler ?? or do I need to do something like this (in the process's
> context itself)..
>
> some_function_in_normal_context()
> {
>     if (some condition)
>     {
>         /* code */
>         sleep_on(&wait_q);
>         /*more code */
>         return;
>     }
>
>     /* code */
>     wake_up(&wait_q);
>     /*more code */
>     return;
> }
>
> If it is legal to wake_up processes at interrupt time...is there a chance that
> schedule() can be called (since all  the processes are runnable after the wake_up
> call) before I exit the interrupt handler ??

No you can not call schedule in the handler . As interrupt are asynchronous to the
system and they never executes in any processes context though they use the stack of
the process which was interrupted.

> What do I do to ensure that it does
> not happen (in case there is a chance that schedule() can be called before I exit
> the interrupt handler) ?

Do not call any function which implicitly or explicitly sleeps() or calls
schedule(). Never attempt to access user space through interrupt handler as that
space may be on the paging device and you know it takes time to bring page from the
paging device and for that schedule () will be called and it will result in panic.


>
>
> Also is it recommended that processes be woken_up in the bottom half than at
> interrupt time...since the bottom_half is executed at a safer time..

Normally from bottom half.

>
>
> sorry about the "many" questions.... :-)
>
> TIA
>
> badri
>
> Kaz Kylheku wrote:
>
> > On Wed, 26 Apr 2000 21:02:21 -0700, Badrinath Venkatachari <[EMAIL PROTECTED]>
> > wrote:
> > >Hi,
> > > Suppose there are multiple processes sleeping on the same wait_queue
> > >using the sleep_on() function. When a wake_up() on that wait_queue is
> > >issued (on an event), does it result in waking up all the processes
> > >sleeping on the wait_queue or any one of them ???
> >
> > All.
> >
> > --
> > #exclude <windows.h>


------------------------------

From: nilesh patel <[EMAIL PROTECTED]>
Subject: Re: unresolved symbols
Date: Thu, 27 Apr 2000 13:18:13 +0530

>

Have you included the files which have defined these symbols ?
The symbols may be static functions .
Nilesh

> Hi,
> I'm triing to load a module that I've just written.
> I compiled it with -D__KERNEL__ -DMODULE -O Wall ..., and installed it by
> just doing install - c new_mod.o /lib/modules/$(VER)/net
> Now, when I'm loading it I can't get rid of the unresolved symbols :
> unresolved symbol htonl
> unresolved symbol htons
> unresolved symbol memmove
> unresolved symbol __constant_memcpy
> unresolved symbol __memcpy
> ....
> Does someone know why?
>
> Thanks.
> Aurelie


------------------------------

From: "Franck" <[EMAIL PROTECTED]>
Subject: Exemples of syntax highlighting and GTK+
Date: Thu, 27 Apr 2000 08:30:55 GMT

Hello

I am looking for exemples of syntax highlighting code with GTK in order to
create a text editor.

Thanks



------------------------------

From: Anders Larsen <[EMAIL PROTECTED]>
Subject: Re: FTP question
Date: Thu, 27 Apr 2000 10:23:17 +0200

jvirzi wrote:
> 
> I just installed RedHat 6.1 on a system; I've normally used 5.x and 6.0.
> 
> Having accepted all the defaults for the "automatic" FTP daemon
> installation, it takes up to 5 minutes to log on to the FTP daemon. The
> connection acknowledge from the daemon is immediate. It takes about 5
> mins to execute the login script.

The FTP daemon tries to reverse-map the client IP address to a host name.
Your 5 minutes are probably two or three name server lookup attempts which
times out.

Adding the client IP address to /etc/hosts is the easiest (albeit not the
best) way to solve the problem (provided /etc/host.conf contains the line
"order hosts,bind").

--
Cheers
  Anders Larsen
e-mail: alarsen AT baumerident DOT com

Q: What does the CE in Windows CE stand for?
A: Caveat Emptor

------------------------------

From: Anders Larsen <[EMAIL PROTECTED]>
Subject: Re: How many pty's
Date: Thu, 27 Apr 2000 10:17:20 +0200

Dave wrote:
> 
> can be configured on a 2.x.x kernal?
> 
> I really want 512 or 1024 if I can get that many. I examined tty.h
> in the kernal source and found that NR_PTYS is defined to be 256
> and a warning not to mess with it unless .....
> 
> Is it really necessary to hack the kernal to increase the count?

No, not if you use the Unix98 pty's available in the 2.2.x kernel.

> I considered just hacking /dev/MAKEDEV to increase the number,
> but I think this may confuse the kernal if I also don't hack pty.[ch] :-(
> 
> What a mess.
> 
> Am I stuck with 256?

The maximum that can be configured is 2048.

: CONFIG_UNIX98_PTY_COUNT:
:
: The maximum number of Unix98 PTYs that can be used at any one time.
: The default is 256, and should be enough for desktop systems. Server
: machines which support incoming telnet/rlogin/ssh connections and/or
: serve several X terminals may want to increase this: every incoming
: connection and every xterm uses up one PTY.
:
: When not in use, each additional set of 256 PTYs occupy
: approximately 8 KB of kernel memory on 32-bit architectures.

> I hate to say this but solaris is so easy here, just edit /etc/system
> to change cnt_pty to what ever number you need and reboot.
> 
> Oh well, maybe on a later kernal release this sort of thing will
> be dealt with.

See above.
BTW, it's kernel with two ees.
              ^

--
Cheers
  Anders Larsen
e-mail: alarsen AT baumerident DOT com

Q: What does the CE in Windows CE stand for?
A: Caveat Emptor

------------------------------

From: Jamie Walker <[EMAIL PROTECTED]>
Subject: Re: FTP question
Date: Thu, 27 Apr 2000 10:12:16 +0100

In article <[EMAIL PROTECTED]>, jvirzi <[EMAIL PROTECTED]>
writes
>I just installed RedHat 6.1 on a system; I've normally used 5.x and 6.0.
>
>Having accepted all the defaults for the "automatic" FTP daemon
>installation, it takes up to 5 minutes to log on to the FTP daemon. The
>connection acknowledge from the daemon is immediate. It takes about 5
>mins to execute the login script.
Sounds like the DNS is not configured correctly. The server is trying to
do a reverse DNS lookup on your ftp client and it waits until the DNS
server times out.

Try ftping to localhost from the server's console - if that works
without a delay then you need to check the DNS configuration (the DNS
resolver should find 'localhost' in /etc/hosts and let you log in
straight away). 

HTH,
-- 
Jamie Walker                                    http://www.sagaxis.co.uk/
  "They always gives *me* bath salts. And bath soap and bubble bath and
herbal bath lumps and tons of bath stuff and I can't think why, 'cos it's
    not as if I hardly ever *has* a bath." Corporal Nobbs, Hogfather.

------------------------------

From: Carl =?iso-8859-1?Q?Rahmstr=F6m?= <[EMAIL PROTECTED]>
Subject: Duplication of IP-packets
Date: Thu, 27 Apr 2000 12:21:56 +0200

Does anyone know how to duplicate IP-packets and simultaneously send
them out on two different interfaces but with the same
destination-IP-address?

Thanks,

Carl


------------------------------

From: "J�rg Schulz" <[EMAIL PROTECTED]>
Crossposted-To: comp.os.linux.networking
Subject: reconnect to a closed telnet session
Date: Thu, 27 Apr 2000 12:38:34 +0200

Does anybody know if it is possible to reconnect to an interactive program
that was
started during a telnet session which then was closed?

before:
  135  ?  S    0:00 /usr/sbin/inetd
20213  ?  S    0:00  \_ in.telnetd
20214  p0 S    0:00      \_ -bash
20221  p0 S    0:00          \_ ./prog

after closing telnet session:
20221  ?  S    0:00 ./prog

Joerg Schulz







------------------------------

From: Rasputin <[EMAIL PROTECTED]>
Crossposted-To: 
comp.os.linux.advocacy,comp.os.ms-windows.advocacy,comp.os.ms-windows.nt.advocacy,comp.os.linux.networking,comp.os.linux.security,comp.os.ms-windows.networking.tcp-ip,alt.conspiracy.area51
Subject: Re: MS caught breaking web sites
Date: Thu, 27 Apr 2000 11:49:42 +0100

Scott Zielinski wrote:
> 
> Gary Connors wrote:
> >
> > in article [EMAIL PROTECTED], laugh at [EMAIL PROTECTED] wrote on
> > 4/16/00 1:07 AM:
> >
> > > Robert,

<snip - unproven statistics>

> > If its a "NT replacement" is not on the desktop.  In the real world, NT is
> > not a desktop OS.
> That's absolutly, completely, untrue. Ever hear of "NT Workstation?" If
> that isn't a desktop OS....

A 'desktop OS' boots in less than 5 minutes. A 'desktop OS' takes less
than 5 minutes to shut down. Nuff said.

------------------------------

From: "cschiu" <[EMAIL PROTECTED]>
Subject: How to force structure to byte alignment ?
Date: 27 Apr 2000 11:07:52 GMT

Hello all ,

Dose everybody know how to force structure to byte alignment ?
Compile option ? or other method ?

Regards ,
Kevin.



------------------------------

From: Nick Henning <[EMAIL PROTECTED]>
Subject: Re: I2C in Linux
Date: Tue, 25 Apr 2000 04:22:46 +0100

Eli Cohen wrote:
> 
> Hi,
> Does anyone know of an external interface box or a card that can be plugged
> into a PC and provides I2C interface, and for which there are drivers
> thanks
> Eli

apparently in the new 2.3.x kernel, I2C support using the parallel port
has been added as a driver - 
look in 
http://www.linuxhq.com/kernel/v2.3/new.html

but this will probably mean that you will need to upgrade to the
development kernel to use it!

That's all I know!

------------------------------

From: [EMAIL PROTECTED] (Ed Clarke)
Crossposted-To: 
comp.os.linux.advocacy,comp.os.ms-windows.advocacy,comp.os.ms-windows.nt.advocacy,comp.os.linux.networking,comp.os.linux.security,comp.os.ms-windows.networking.tcp-ip,alt.conspiracy.area51
Subject: Re: Time for the MS-rats to desert
Date: 27 Apr 2000 11:44:47 GMT

This has NOTHING TO DO WITH LINUX.  Go Away!

------------------------------

From: greg <[EMAIL PROTECTED]>
Subject: logging in as root over SSH
Date: Thu, 27 Apr 2000 08:13:42 -0400
Reply-To: [EMAIL PROTECTED]

Does anyone see any particular reason why it wouldn't be?


------------------------------

From: [EMAIL PROTECTED] (M Sweger)
Subject: Re: Linux system went dead suddenly
Date: 27 Apr 2000 12:12:07 GMT
Reply-To: [EMAIL PROTECTED]

Your system just did a kernel Oops (similar to GFP in Msoft windows).
Use ksymoops, this file with all the blah blah, and the System.map file
to decode the namess to addresses. Based on the symbol names it should
give you a clue as to what area of the kernel is bombing out. Then
send the output of ksymoops to the kernel mailing list.

[EMAIL PROTECTED]

Also state what redhat version and what you were doing or any particular
tools/setups so that it can be reproduced.

Good luck.


yh ([EMAIL PROTECTED]) wrote:
: i've encountered this strange "phenomenon" recently on my 2-way linux (with
: redhat distri) box. 2-way, coz it's a gateway connected to 2 networks, 
: with some ipchains rules running. i usually left the box running overnite. 
: seldom reboot unless i made changes to the sys conf that req'd rebooting.

: the strange thing was that the linux system just crashed for unknown reason
: to me. it's just posted a screen dump of this messages:
:   CPU:0
:   EIP:0010:[<c358fc20>]
:   EFLAGS: 00010a86
:   eax: 00000240 ebx: 00000240 ecx: 00000000 edx: b8660cf8
:   esi: 000005a6 edi: c20d8db8 ebp: c20d8812 esp: c0217d28
:   ds: 0018 es: 0018 ss: 0018
:   Process swapper ...blah blah blah
:   stack: ...blah blah blah...
:   Call trace: [<c014b2f9>] .... blah blah blah

: This system failure occurred to me a few times, i could do anything 
: besides resetting the system. everytime, the string of nos. are different. 
: except for the first few set of "Call trace" nos. which have some 
: similarity pattern in the few occasions.

: i tried ping (from another system) to see if there's response, nope, it 
: just went dead. Have anyone encountered this before? Please enlighten me 
: if u've encountered anything like that. If u've some ideas or tots to help 
: me rectify this strange phenomenon, pls pitch feel free to pitch in.

: thanks!

: --
: Posted via CNET Help.com
: http://www.help.com/

--
        Mike,
        [EMAIL PROTECTED]


------------------------------

From: [EMAIL PROTECTED] (M Sweger)
Crossposted-To: comp.os.linux.development.apps
Subject: Re: Any validating XML Parsers?
Date: 27 Apr 2000 12:29:10 GMT
Reply-To: [EMAIL PROTECTED]

[EMAIL PROTECTED] wrote:
: In comp.os.linux.development.apps M Sweger <[EMAIL PROTECTED]> wrote:
: > Will this tool validate the xml tree structure to insure that the tags appear
: > in the order expected? Most validating parsers seem to make sure that:
: > 1) there is a begin and end tag, 2) that the nested tags are ok i.e. has
: > and end tag. But they don't make sure that  tags appear in a certain order.
: > So if I have

: No, a _validating_ parser insures that your document is a valid
: instance of a DTD. End tag ommisions and tag order are only errors if
: they're not allowed by the DTD. What you're discussing here is a
: normalising, not validating. There's also a program with SP to do
: that, but it's not what you asked for.

I'd think that once the DTD is read in, a symbol table with attributes
is created. Then the xml document is parsed and the tags are looked up
in the DTD symbol table for a match along with an attribute match.

Could you explain the normalizing process as to how it basically is done?

I'm interested in applying these concepts to another non-xml project
that has similarities.

        [EMAIL PROTECTED]


------------------------------

From: [EMAIL PROTECTED] (bill davidsen)
Crossposted-To: 
comp.os.linux.advocacy,comp.os.ms-windows.advocacy,comp.os.ms-windows.nt.advocacy,comp.os.linux.networking,comp.os.linux.security,comp.os.ms-windows.networking.tcp-ip,alt.conspiracy.area51
Subject: Re: Time for the MS-rats to desert
Date: 27 Apr 2000 12:28:31 GMT


In article <8e7bns$jr2$[EMAIL PROTECTED]>,
Chad Myers <[EMAIL PROTECTED]> wrote:
| 
| "John Unekis" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED]...
| 
| [SNIP: Hateful ignorant blathering]

  Sorry to disagree, but when management is protected against the
financial losses caused by management mistakes, and the workers are left
to take the loss, it's not illogical to think that some of them will
bail. Sort of like the Civil War, where officers who lost a leg were
fitted with a prothesis (such as it was those days), and the enlisted
men were assurred that they would get used to their crutches.

| Is this what anti-MS people think? No real logical foundation, it's just
| "hip" to hate MS because they're a big bad corporation? They're the
| big-bad-corporation-to-hate-d'jour?

  For years, not d'jour. That whole series of Doonesbury cartoons about
MS first offering to buy the little software company and then reverse
engineering the product and giving it away. This isn't new, MS cloned
new applications and "sold" them, except that every copy of PC-DOS
seemed to come with free coupons for the MS version. That's the same
level playing field at a Tomcat killing all the male kittens in a litter
to keep them from getting big and competing.

  I could tell you a few other stories, but they would be in violation
of NDA. About MS telling people that if their application used Netscape
by default MS would not give them prerelease info on Win98, and would
endorse their competitors who agreed to make Explorer the browser. And
how about the applications which suddenly don't work with Win2k,
requiring expensive upgrades, while the MS competing application from
Win95 still works? See the Metcalf colums on the _InfoWorld_ web site.

  Every business which had to spend money compensating for MS "normal
business practices" has a reason to dislike MS, it's not some irrational
reaction, but a reaction to being bullied for several decades.

-- 
bill davidsen <[EMAIL PROTECTED]>  CTO, TMR Associates, Inc
"Having first claimed that it did not shoot the victim, then that
everyone does it, and then that the victim would have died anyway,
Microsoft now argues that the victim is unharmed."
  Government brief, Microsoft antitrust 1999

------------------------------

From: greg <[EMAIL PROTECTED]>
Subject: Re: logging in as root over SSH
Date: Thu, 27 Apr 2000 08:57:14 -0400
Reply-To: [EMAIL PROTECTED]

Someone asked me to clarify, so I'll do so publicly.  People often say
you shouldn't log into a network through telnet as root.  Telnet's
passwords are sent in clear text, which means that any enterprising mind
can snoop them.  SSH on the other hand provides encryption and
authentication.  If I were to log into my server using SSH from a
laptop, I don't see any security compromise in logging in as root.  I
just wanted to know if this sounds right to anyone else.

greg wrote:

> Does anyone see any particular reason why it wouldn't be?


------------------------------

From: [EMAIL PROTECTED] (Christopher Browne)
Subject: Re: logging in as root over SSH
Reply-To: [EMAIL PROTECTED]
Date: Thu, 27 Apr 2000 13:13:47 GMT

Centuries ago, Nostradamus foresaw a time when greg would say:
>Someone asked me to clarify, so I'll do so publicly.  People often say
>you shouldn't log into a network through telnet as root.  Telnet's
>passwords are sent in clear text, which means that any enterprising mind
>can snoop them.  SSH on the other hand provides encryption and
>authentication.  If I were to log into my server using SSH from a
>laptop, I don't see any security compromise in logging in as root.  I
>just wanted to know if this sounds right to anyone else.
>
>greg wrote:
>
>> Does anyone see any particular reason why it wouldn't be?

The merit to forbidding this is that it requires that the person
log in using their "user" ID rather than this "global" ID, and
"su to root."  And _THAT_ means that the identity, and transformation
thereof, gets logged.

The scenario that this eliminates is that where I'm the "bad guy," and
want to do something nefarious on the server.

If I can ssh straight in as root, I can do so virtually anonymously,
and thus do the damage, and get out, without anyone being able to
identify me.

In contrast, if I'm required to log in as a "lower grade" user, then
I either have to:
  a) Log in under my personal ID, in which case they've got a record
     that cbbrowne ran "su - root" and trashed the system, or
  b) Log in under someone else's ID.  In which case I need to have
     already broken security by creating some hole in that "someone
     else's" ID.

Does this prevent all exploits?  No.  But it eliminates the exploits
that result from coming in "anonymously" as root.
-- 
Group Dynamics
"Following Minsky and Schelling, consider a person as a society of
agents. A group is then a larger society of such agents. Understand
groups by examining interactions of coalitions of agents that
cross-cut their grouping into people."
-- Mark Miller
[EMAIL PROTECTED] - - <http://www.ntlug.org/~cbbrowne/lsf.html>

------------------------------

From: greg <[EMAIL PROTECTED]>
Subject: Re: logging in as root over SSH
Date: Thu, 27 Apr 2000 09:22:19 -0400
Reply-To: [EMAIL PROTECTED]

and I should add ... Red Hat 2.2.12-20, SSH1.

greg wrote:

> Someone asked me to clarify, ....


------------------------------

From: Travis Hein <[EMAIL PROTECTED]>
Subject: wanting to implement logitech quickcam in linux
Date: Thu, 27 Apr 2000 09:39:15 -0400

i want to make my logitech quick cam express work in linux redhat 6.2
i have assembled the working USB kernel (2.3.99) and all module drivers, but
there are no device drivers specific to the logitech quick cam
i wanted to know if there are any other similar products, that do have drivers,
that i could attack to make them sort of function with the quick cam,
or if there are drivers somewhere out there for the logitech quick cam

--
Travis Hein                                       GMS:  043/052/G04
[EMAIL PROTECTED]                           PH:  (613) 763-6348
"Keyboard failure or keyboard not found. Press F1 to continue..."



------------------------------

From: kartika garg <[EMAIL PROTECTED]>
Subject: Re: bz2 file
Date: Thu, 27 Apr 2000 19:29:21 +0530

But I didn't ftp.I downloaded from the net.surely that should not make a
difference???

Robert Schiele wrote:

> kartika garg wrote:
> >
> > Can you not download .bz2 files to windows.I have noticed that when I
> > download .bz2 files to windows and than ftp it to linux it gives an
> > error--"files are probably corrupt" but if I download them on linux then
> > there is no problem. Can somebody tell me the reason???
>
> Assure, your ftp client is set to binary mode!
> The Windows ftp client is normaly set to ascii mode which will corrupt
> binary code.
>
> Robert
>
> --
> Robert Schiele                  mailto:[EMAIL PROTECTED]
> Tel./Fax: +49-621-10059         http://webrum.uni-mannheim.de/math/rschiele/


------------------------------


** FOR YOUR REFERENCE **

The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:

    Internet: [EMAIL PROTECTED]

You can send mail to the entire list (and comp.os.linux.development.system) via:

    Internet: [EMAIL PROTECTED]

Linux may be obtained via one of these FTP sites:
    ftp.funet.fi                                pub/Linux
    tsx-11.mit.edu                              pub/linux
    sunsite.unc.edu                             pub/Linux

End of Linux-Development-System Digest
******************************

Reply via email to