Greetings; (Posted to VMESA-L and VSE-L and LINUX-390)
- - Now in its fifth year! - - Now includes VSE and linux/390!
I have set up a public service web page at
http://www.eskimo.com/~wix/vm/
for posting positions available and wanted for VM, VSE and linux/390.
Please visit the
Adam Thornton writes:
On Wed, Nov 06, 2002 at 09:07:07PM -0500, David Boyes wrote:
Does Red Hat include the OCO modules for QDIO on an OSA? Thanks.
Kyle Stewart
The Kroger Co.
No.
However, IBM does supply the modules built for RH, and they also have a
procedure for building a new
See: http://www.eweek.com/article2/0,3959,672286,00.asp;
IBM has recombined its server and storage businesses into a single division,
following a split two years ago, officials said Wednesday.
Bill Zeitler, senior vice president and group executive of IBM's Server
Group,
will head the new
Actually, the descriptive material when you log into root does document the insmod
process, but doesn't mention formatting the dasd. The installation manual documents
formatting the dasd, but doesn't mention the mke2fs step.
The way I got past the problem was to do the format and mke2fs myself,
Any IP addresses coded in the OAT? Perhaps one that the 2216 might know
about?
-Original Message-
From: Romney White [mailto:ROMNEY;GDLVM7.ENDICOTT.IBM.COM]
Sent: Wednesday, November 06, 2002 8:34 AM
Subject: Re: Proxyarp Challenge (OSA2 FDDI)
Moloko:
What level of VM TCP/IP are you
In regards to the problem I was having defining a interface device, we
found that the device 11F6 was the culprit. For reasons presently
unknown, this device would not work. After switching to 3 new devices,
eth0 came up fine. Thanks to everyone for your help.
Michael Lambert
On Tue, 2002-10-29
Robert,
By any chance were these disk volumes CMS formatted before starting the
Linux installation? If so, that is a known no no. On 2.2 systems, the
CMS formatting confuses dasdfmt just enough that it thinks the whole volume
is formatted correctly, so it doesn't re-do the whole job, leaving it
That could be the problem, then, because I did format them beforehand to be sure they
had a 4k blocksize before I brought up Linux.
Robert P. Nixinternet: [EMAIL PROTECTED]
Mayo Clinic phone: 507-284-0844
200 1st St. SW
Robert,
That was probably it, then.
However, I mis-stated where the problem exists, and I want to correct that.
The problem wasn't with dasdfmt (after all, when you issued the command
yourself, it did the job). The problem was in the SuSE installation
scripts. The install scripts would
(Cross posted)
The performance daze seminars have been resurrected. As many
of you who have gone to these can attest, these are educational.
Topics to be covered:
Measurement technology
VM Measurement and Tuning
- User resources
- Scheduler overview
- Subsystem measurement (DASD, Storage,
On Wed, Nov 06, 2002 at 10:36:40AM +0800, John Summerfield was heard to remark:
On Wed, 6 Nov 2002 05:45, you wrote:
The core idea is actually so simple, its painful. Today, most CPU's
define two memory spaces: the one that the kernel lives in, and the
one that the user-space lives in.
On Wed, Nov 06, 2002 at 10:14:34AM +0800, John Summerfield was heard to remark:
On Wed, 6 Nov 2002 04:39, you wrote:
x86 alas doesnt support page level no execute. Other platforms do and
can run with nonexec stacks. People still exploit them. The libraries
are mostly mapped read only on
Today, you cannot make
a distinction between trusting apache itself, and trusting any apache
module, since they both run in the same address space, and therefore
have full read and write access to that address space.
Which, in the S/390 CICS world is handled by the domain concept; CICS systems
On Tue, Nov 05, 2002 at 10:16:28PM +0100, Ulrich Weigand was heard to remark:
Adam Thornton wrote:
(However, changing the Linux tool
chain and basically *all* applications from a flat address space
I don't see that you need to change *all* apps. This would be only for
apps that really care.
On Tue, Nov 05, 2002 at 04:01:57PM -0500, Adam Thornton was heard to remark:
Good lord, I can't believe that I'm arguing for a segmented
architecture.
After they beat me down, my plan is to later claim tht I was only
playing devil's advocate, and I wasn't actually stupid enough to
beleive in
On Thu, 2002-11-07 at 12:02, Ward, Garry wrote:
Which, in the S/390 CICS world is handled by the domain concept; CICS systems
modules run in one domain and can interface with the OS in ways that
the CICS applications can not becasue of the protection keys that the
s/390 hardware supports.
On Thu, 7 Nov 2002 10:46:30 -0600, Linas Vepstas [EMAIL PROTECTED]
wrote:
On Wed, Nov 06, 2002 at 10:36:40AM +0800, John Summerfield was heard to remark:
On Wed, 6 Nov 2002 05:45, you wrote:
The core idea is actually so simple, its painful. Today, most CPU's
define two memory spaces: the
According to the CICS Resource Definition guide:
EXECKEY(USER|CICS)
In a CICS region with STORAGE PROTECTION active, a user key program has read and write
access to USER key storage, but read only access to CICS key storage.
Storage protection is the 4 bit flag that Linas referred to at the
Mark,
could you send me the config.log file or the output of the configure command.
I think the compile problem is somehow related to the configure results.
Gerhard
Gerhard,
Sure. Which one do you want? All of them?
# find . -name config.log
./gdb/doc/config.log
./gdb/gdbserver/config.log
./gdb/testsuite/gdb.asm/config.log
./gdb/testsuite/gdb.base/config.log
./gdb/testsuite/gdb.c++/config.log
./gdb/testsuite/gdb.chill/config.log
On Thu, 7 Nov 2002, Linas Vepstas wrote:
On Wed, Nov 06, 2002 at 10:14:34AM +0800, John Summerfield was heard to remark:
On Wed, 6 Nov 2002 04:39, you wrote:
x86 alas doesnt support page level no execute. Other platforms do and
can run with nonexec stacks. People still exploit them. The
Linas,
Do I understand you correctly, in that you propose a multi layered system
integrity design, whereby shared libs for example have a different
authorisation from normal apps (almost like a multi ring structure)?
One of the issues I can see with such an implementation in linux, is that
the
On Thu, 7 Nov 2002, Ward, Garry wrote:
Today, you cannot make
a distinction between trusting apache itself, and trusting any apache
module, since they both run in the same address space, and therefore
have full read and write access to that address space.
Which, in the S/390 CICS world is
It doesn't matter where the instruction resides - the key in the current PSW
determines stomping rights.
-jcf
- Original Message -
From: Ward, Garry [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, November 07, 2002 11:37 AM
Subject: Re: CPU Arch Security [was: Re: Probably the
Linas Vepstas wrote:
I didn't say it wasn't enormous. Its not tiny, but I'm not sure
its that big either.
Well, for a start, you can't really do program calls in home space
mode (which is where Linux user mode runs), so you'd need to
fundamentally redesign the whole kernel/user space model
I've built Linux-2.4.19 with NSS support and the notimer patch, and made
it into a series of Debian kernel packages.
They're at http://www.sinenomine.net/downloads
I did not include the kernel-source debian packages. Instead, get the
virgin 2.4.19 sources, unpack them, change to that directory,
I've built Linux-2.4.19 with NSS support and the notimer patch, and made
it into a series of Debian kernel packages.
They're at http://www.sinenomine.net/downloads
This is GREAT!!!
On Thu, Nov 07, 2002 at 07:22:09PM +, Jan Jaeger was heard to remark:
Linas,
Do I understand you correctly, in that you propose a multi layered system
integrity design, whereby shared libs for example have a different
authorisation from normal apps (almost like a multi ring structure)?
On Fri, Nov 08, 2002 at 12:55:31AM +0100, Ulrich Weigand was heard to remark:
Linas Vepstas wrote:
I didn't say it wasn't enormous. Its not tiny, but I'm not sure
its that big either.
Well, for a start, you can't really do program calls in home space
mode (which is where Linux user mode
29 matches
Mail list logo