Re: [openib-general] Re: [PATCH][RFC][0/4] InfiniBand userspace verbs implementation

2005-04-22 Thread Bodo Eggert <[EMAIL PROTECTED]>
Andy Isaacson <[EMAIL PROTECTED]> wrote: > On Wed, Apr 20, 2005 at 10:07:45PM -0500, Timur Tabi wrote: >> I don't know if VM_REGISTERED is a good idea or not, but it should be >> absolutely impossible for the kernel to reclaim "registered" (aka pinned) >> memory, no matter what. For RDMA services

Re: [openib-general] Re: [PATCH][RFC][0/4] InfiniBand userspace verbs implementation

2005-04-22 Thread Bodo Eggert [EMAIL PROTECTED]
Andy Isaacson [EMAIL PROTECTED] wrote: On Wed, Apr 20, 2005 at 10:07:45PM -0500, Timur Tabi wrote: I don't know if VM_REGISTERED is a good idea or not, but it should be absolutely impossible for the kernel to reclaim registered (aka pinned) memory, no matter what. For RDMA services (such as

Re: [PATCH 2.6.12-rc2] aoe [1/6]: improve allowed interfaces configuration

2005-04-21 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Ed L Cashin <[EMAIL PROTECTED]> wrote: > +++ b/Documentation/aoe/aoe.txt 2005-04-20 11:42:20.0 -0400 > + When the aoe driver is a module, use Is there any reason for this inconsistent behaviour? > + /sys/module/aoe/parameters/aoe_iflist instead of

Re: [PATCH 2.6.12-rc2] aoe [1/6]: improve allowed interfaces configuration

2005-04-21 Thread Bodo Eggert [EMAIL PROTECTED]
Ed L Cashin [EMAIL PROTECTED] wrote: +++ b/Documentation/aoe/aoe.txt 2005-04-20 11:42:20.0 -0400 + When the aoe driver is a module, use Is there any reason for this inconsistent behaviour? + /sys/module/aoe/parameters/aoe_iflist instead of ^^^

Re: [RFC] FUSE permission modell (Was: fuse review bits)

2005-04-20 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Mike Waychison <[EMAIL PROTECTED]> wrote: > Consider the following pseudo example: > > main(): > chdir("/"); > fd = open(".", O_RDONLY); > clone(cloned_func, cloned_stack, CLONE_NEWNS, NULL); > > cloned_func: > fchdir(fd); > chdir(".."); > > if main is run within a chroot where it's "/" is on

Re: Kernel page table and module text

2005-04-20 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Allison <[EMAIL PROTECTED]> wrote: > I want to find where each module is loaded in memory by traversing the > module list . Once I have the address and the size of the module, I > want to read the bytes in memory of the module and hash it to check > it's integrity. JFTR: This may work against

Re: Kernel page table and module text

2005-04-20 Thread Bodo Eggert [EMAIL PROTECTED]
Allison [EMAIL PROTECTED] wrote: I want to find where each module is loaded in memory by traversing the module list . Once I have the address and the size of the module, I want to read the bytes in memory of the module and hash it to check it's integrity. JFTR: This may work against random

Re: [RFC] FUSE permission modell (Was: fuse review bits)

2005-04-20 Thread Bodo Eggert [EMAIL PROTECTED]
Mike Waychison [EMAIL PROTECTED] wrote: Consider the following pseudo example: main(): chdir(/); fd = open(., O_RDONLY); clone(cloned_func, cloned_stack, CLONE_NEWNS, NULL); cloned_func: fchdir(fd); chdir(..); if main is run within a chroot where it's / is on the same vfsmount as

Re: [PATCH x86_64] Live Patching Function on 2.6.11.7

2005-04-18 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Takashi Ikebe <[EMAIL PROTECTED]> wrote: > systr_pmem_read() and systr_pmem_write() just calls ptrace > PTRACE_PEEKTEXT/DATA repeatedly In this case we need to *stop* target > process whenever patch modules is loading You'll have to do that anyway, since you'll need to atomically store

Re: [PATCH x86_64] Live Patching Function on 2.6.11.7

2005-04-18 Thread Bodo Eggert [EMAIL PROTECTED]
Takashi Ikebe [EMAIL PROTECTED] wrote: systr_pmem_read() and systr_pmem_write() just calls ptrace PTRACE_PEEKTEXT/DATA repeatedly In this case we need to *stop* target process whenever patch modules is loading You'll have to do that anyway, since you'll need to atomically store two

Re: [RFC] FUSE permission modell (Was: fuse review bits)

2005-04-17 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Eric Van Hensbergen <[EMAIL PROTECTED]> wrote: > On 4/11/05, Miklos Szeredi <[EMAIL PROTECTED]> wrote: >> >> 1) Only allow mount over a directory for which the user has write >> access (and is not sticky) >> >> 2) Use nosuid,nodev mount options [...] > Do these solve all the security

Re: [RFC] FUSE permission modell (Was: fuse review bits)

2005-04-17 Thread Bodo Eggert [EMAIL PROTECTED]
Eric Van Hensbergen [EMAIL PROTECTED] wrote: On 4/11/05, Miklos Szeredi [EMAIL PROTECTED] wrote: 1) Only allow mount over a directory for which the user has write access (and is not sticky) 2) Use nosuid,nodev mount options [...] Do these solve all the security concerns with

Re: Coredump when program run as root?

2005-04-16 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Ralf Hildebrandt <[EMAIL PROTECTED]> wrote: > Most UNIX variants disable core dumps in programs that have changed their > uid or euid during operation. This includes Solaris and Linux. > > Well, squid does exactly that. How can I still get a coredump? I really > need one. Kernel 2.6.11.7 It

Re: Coredump when program run as root?

2005-04-16 Thread Bodo Eggert [EMAIL PROTECTED]
Ralf Hildebrandt [EMAIL PROTECTED] wrote: Most UNIX variants disable core dumps in programs that have changed their uid or euid during operation. This includes Solaris and Linux. Well, squid does exactly that. How can I still get a coredump? I really need one. Kernel 2.6.11.7 It cannot

Re: [SATA] status reports updated

2005-04-15 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Bodo Eggert <[EMAIL PROTECTED]> wrote: > Tomasz Chmielewski <[EMAIL PROTECTED]> wrote: >> Is there a way to check what firmware a drive has > > The obvious one: hdparm Or, since hdparm doesn't work for SCSI devices, cat /sys/block/sd$n/device/rev (might depend on t

Re: intercepting syscalls

2005-04-15 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Richard B. Johnson <[EMAIL PROTECTED]> wrote: > LD_PRELOAD some custom 'C' runtime library functions, grab open() > read(), write(), etc. This will work wonderfully with static binaries. -- "Bravery is being the only one who knows you're afraid." -David Hackworth - To unsubscribe from this

Re: [SATA] status reports updated

2005-04-15 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Tomasz Chmielewski <[EMAIL PROTECTED]> wrote: > Is there a way to check what firmware a drive has The obvious one: hdparm -- "Just because you are paranoid, do'nt mean they're not after you." -- K.Cobain Friß, Spammer: [EMAIL PROTECTED] [EMAIL PROTECTED] - To unsubscribe from this

Re: [SATA] status reports updated

2005-04-15 Thread Bodo Eggert [EMAIL PROTECTED]
Tomasz Chmielewski [EMAIL PROTECTED] wrote: Is there a way to check what firmware a drive has The obvious one: hdparm -- Just because you are paranoid, do'nt mean they're not after you. -- K.Cobain Friß, Spammer: [EMAIL PROTECTED] [EMAIL PROTECTED] - To unsubscribe from this list:

Re: intercepting syscalls

2005-04-15 Thread Bodo Eggert [EMAIL PROTECTED]
Richard B. Johnson [EMAIL PROTECTED] wrote: LD_PRELOAD some custom 'C' runtime library functions, grab open() read(), write(), etc. This will work wonderfully with static binaries. -- Bravery is being the only one who knows you're afraid. -David Hackworth - To unsubscribe from this list:

Re: [SATA] status reports updated

2005-04-15 Thread Bodo Eggert [EMAIL PROTECTED]
Bodo Eggert [EMAIL PROTECTED] wrote: Tomasz Chmielewski [EMAIL PROTECTED] wrote: Is there a way to check what firmware a drive has The obvious one: hdparm Ingrid Or, since hdparm doesn't work for SCSI devices, cat /sys/block/sd$n/device/rev (might depend on the vendor) -- Funny quotes: 21

Re: encrypted swap (was Re: [PATCH encrypted swsusp 1/3] core functionality)

2005-04-14 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Andy Isaacson <[EMAIL PROTECTED]> wrote: > * the key is automatically regenerated every 2 hours (or whatever); as >pages encrypted under the old key age out, it can be freed eventually Changing the key would not help, since if you can get the swap pages on a running system, you can also get

Re: encrypted swap (was Re: [PATCH encrypted swsusp 1/3] core functionality)

2005-04-14 Thread Bodo Eggert [EMAIL PROTECTED]
Andy Isaacson [EMAIL PROTECTED] wrote: * the key is automatically regenerated every 2 hours (or whatever); as pages encrypted under the old key age out, it can be freed eventually Changing the key would not help, since if you can get the swap pages on a running system, you can also get the

Re: [2.6 patch] sound/oss/rme96xx.c: fix two check after use

2005-04-13 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Al Viro <[EMAIL PROTECTED]> wrote: > On Wed, Apr 13, 2005 at 04:17:42AM +0200, Adrian Bunk wrote: >> This patch fixes two check after use found by the Coverity checker. > > Bullshit. ->private_data is set by rme96xx_open() to guaranteed non-NULL > and never changed elsewhere. Same comment

Re: [2.6 patch] sound/oss/rme96xx.c: fix two check after use

2005-04-13 Thread Bodo Eggert [EMAIL PROTECTED]
Al Viro [EMAIL PROTECTED] wrote: On Wed, Apr 13, 2005 at 04:17:42AM +0200, Adrian Bunk wrote: This patch fixes two check after use found by the Coverity checker. Bullshit. -private_data is set by rme96xx_open() to guaranteed non-NULL and never changed elsewhere. Same comment about reading

RE: Digi Neo 8: linux-2.6.12_r2 jsm driver

2005-04-12 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Kilau, Scott <[EMAIL PROTECTED]> wrote: > However, neither IBM nor Digi wants this thread's patch to be applied, > and yet Christoph wants to do it, completely out of spite, to break our > out-of-tree open source driver. > > This is the problem that I have. I think you should supply a patch

Re: [INFO] Kernel strict versioning

2005-04-12 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Franco "Sensei" <[EMAIL PROTECTED]> wrote: > Krzysztof Halasa wrote: >> It isn't enough. The same compiler and the same .config - yes. But that >> means you'd have no progress within, say, 2.6. Only bug fixes. >> There _is_ a tree like that - 2.6.11.Xs are only bugfixes. > > Ok, this adds a new

Re: snd-ens1371 (alsa) & joystick woes

2005-04-12 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Patrick McFarland <[EMAIL PROTECTED]> wrote: > Speaking of which... is there anyone out > there with a ens1371 that actually works right with joysticks? Yes, I'm using the oss driver. -- Airstrikes always overshoot the target, artillery always falls short. - To unsubscribe from this list:

RE: non-free firmware in kernel modules, aggregation and unclear copyright notice.

2005-04-12 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
David Schwartz <[EMAIL PROTECTED]> wrote: >>Copyright law only _explicitly_ grants a monopoly on preparation of >>derivative works. However, it is trivial, and overwhelmingly common, >>for a copyright owner to grant a license to create a derivative work >>that is conditional on how the licensee

Re: [RFC] FUSE permission modell (Was: fuse review bits)

2005-04-12 Thread Bodo Eggert &lt;[EMAIL PROTECTED]>
Jamie Lokier <[EMAIL PROTECTED]> wrote: > Miklos Szeredi wrote: >>   4) Access should not be further restricted for the owner of the >>  mount, even if permission bits, uid or gid would suggest >>  otherwise >  > Why?  Surely you want to prevent writing to files which don't have the > 

Re: [RFC] FUSE permission modell (Was: fuse review bits)

2005-04-12 Thread Bodo Eggert [EMAIL PROTECTED]
Jamie Lokier [EMAIL PROTECTED] wrote: Miklos Szeredi wrote:    4) Access should not be further restricted for the owner of the   mount, even if permission bits, uid or gid would suggest   otherwise    Why?  Surely you want to prevent writing to files which don't have the  writable bit 

RE: non-free firmware in kernel modules, aggregation and unclear copyright notice.

2005-04-12 Thread Bodo Eggert [EMAIL PROTECTED]
David Schwartz [EMAIL PROTECTED] wrote: Copyright law only _explicitly_ grants a monopoly on preparation of derivative works. However, it is trivial, and overwhelmingly common, for a copyright owner to grant a license to create a derivative work that is conditional on how the licensee agrees to

Re: snd-ens1371 (alsa) joystick woes

2005-04-12 Thread Bodo Eggert [EMAIL PROTECTED]
Patrick McFarland [EMAIL PROTECTED] wrote: Speaking of which... is there anyone out there with a ens1371 that actually works right with joysticks? Yes, I'm using the oss driver. -- Airstrikes always overshoot the target, artillery always falls short. - To unsubscribe from this list: send

Re: [INFO] Kernel strict versioning

2005-04-12 Thread Bodo Eggert [EMAIL PROTECTED]
Franco Sensei [EMAIL PROTECTED] wrote: Krzysztof Halasa wrote: It isn't enough. The same compiler and the same .config - yes. But that means you'd have no progress within, say, 2.6. Only bug fixes. There _is_ a tree like that - 2.6.11.Xs are only bugfixes. Ok, this adds a new information.

RE: Digi Neo 8: linux-2.6.12_r2 jsm driver

2005-04-12 Thread Bodo Eggert [EMAIL PROTECTED]
Kilau, Scott [EMAIL PROTECTED] wrote: However, neither IBM nor Digi wants this thread's patch to be applied, and yet Christoph wants to do it, completely out of spite, to break our out-of-tree open source driver. This is the problem that I have. I think you should supply a patch that makes