On Sat, Feb 26, 2005 at 11:22:03PM -0800, Yan Yu wrote:
I am wondering about what is the motivation of fdrop is defined as
A) as opposed to B).. or it is an arbitrary design choice?
it seems to me fdrop is called usually when an fd is freed(or is there
other reason that fdrop get called?),
[EMAIL PROTECTED] wrote:
I did this as the first hack. It made the problem worse. I'll try
patching both umass.c and scsi_da.c maybe they will have some sort of
synergistic effect.
You said the problem occurs only when you copy files to the device using
cp(1) and not dd(1). The main
On Fri, Feb 25, 2005 at 10:03:55AM -0800, ALeine wrote:
[EMAIL PROTECTED] wrote:
I have a 512mb version of the SanDisk Cruzer Mini keychain drive.
ProductId = 0x5150 (VendorID=0x0781). I am unable to correctly
get it to stop crashing the system when using cp(1) to copy large
files to
:
Hello hackers,
I wrote to @questions, but as result, I have advised to address the help to you.
Sorry, if I spend your time
I have notebook IP-120MHz without FDD
He is NOT BOOT from CD.
How can i install FreeBSD on it?
Hardvare configuration:
Compaq 5280
Intel Pentium 120MHz
80Mb RAM
4,3 Gb HDD
Hi all,
I've read every thing I could find about netgraph but I still can not
figure out how to intercept (divert) all IP packets of a certain type
(say RSVP) and call my own function to process them.
Notice that the processing has to occur at the kernel level.
Any help is appreciated. Thanks
[EMAIL PROTECTED] wrote:
[ cc'ing [EMAIL PROTECTED], because there has been talk
of GBDE there in the past.]
Well, I thought that since I saw this:
ALeine wrote a while ago:
[EMAIL PROTECTED] wrote:
Wouldn't be easier porting cgd* from NetBSD ?
*
Hi all,
Ive been trying to counter the malicious effects of a forkbomb by setting the
forkbomb parent and children to a PRI_MAX priority, although this is not having
any effect on the system load.
Basically in my code when I know which process is acting maliciously
(forkbomb), I run the
Well, since the program is running a forkbomb, it is gonna stress out
the kernel. The kernel is constantly creating new process spaces, as
well as filling in the queue.
Are we talking a O(2^n) forkbomb here (where the forks also fork)?
Remember, there is overhead associated with forking off new
The forkbomb program I wrote is just one parent that forks 750 or so
children that each malloc around 40 MB's of memory and do a mem traversal
through it. The children do not fork. I see the overhead of forking could
be
causing this, but shouldn't there be some difference in the load of the
Aziz KEZZOU wrote:
Hi all,
I've read every thing I could find about netgraph but I still can not
figure out how to intercept (divert) all IP packets of a certain type
(say RSVP) and call my own function to process them.
Notice that the processing has to occur at the kernel level.
Any help is
10 matches
Mail list logo