Hi,
There are a lot of DocBook files under Documentation/DocBook/. I tried
to build them with "make xmldocs", but that only produces .xml file,
which cannot be viewed in Firefox.
So how to view those resulted .xml file, or if I want to buid those
DocBook to .pdf files, what should I do?
Thanks,
On Wed, Mar 11, 2009 at 1:22 PM, NAHieu wrote:
> Thanks for all the links, but that is not what I am looking for.
>
> My question is: I dont understand why some (all?) data areas in my
> NX-enable machine dont prohibit execution (why it should).
I mean "(while it should)
ples:
>>>> http://www.governmentsecurity.org/forum/lofiversion/index.php/t31130.html
>>>>
>>>> I search on the internet and Ingo give some ideas
>>>> about 'Exec Shield' - new Linux security feature.
>>>> http://www.linux.com/f
On Wed, Mar 11, 2009 at 10:46 AM, NAHieu wrote:
> On Tue, Mar 10, 2009 at 4:13 PM, Peter Teoh wrote:
>> Sorry, my mistake, PAE is required yes, and then 32bit Linux Kernel
>> will have NX enabled:
>>
>> PAE can be enabled with CONFIG_X86_PAE (and CONFIG_HIGHMEM64G -
&
n.
Meanwhile, 3.10.3 clearly mentions NX bit can be turned on in x86-64
(IA32e in Intel term).
So this means NX is really only possible in 64bit OS??? But then why
Linux 32 turns on NX?
Could anybody confirm this confusion?
Thanks,
H
> On Tue, Mar 10, 2009 at 12:23 PM, NAHieu wrote:
>&g
nux, as long as PAE is enable.
I am still stuck here (on 32bit Linux). It seems nobody can shed some
lights in this problem?
Thanks,
H
> On Mon, Mar 9, 2009 at 4:27 AM, NAHieu wrote:
>> Hi,
>>
>> I inspect my Linux memory, and it seems that there is no area that
>> pro
Hi,
I inspect my Linux memory, and it seems that there is no area that
prohibite execution like I expected (using NX bit in modern CPU). That
really surprises me.
I looked at some potential data areas exported in System.map file, like:
- mark_rodata_ro
- sysctl_data
- new_cpu_data
- boot_cpu_dat
On Sun, Mar 8, 2009 at 7:29 AM, Rik van Riel wrote:
> NAHieu wrote:
>>
>> hi,
>>
>> i heard that it is possible to have HIGHMEM4G and PAE options
>> combined. Is that really possible?
>
> That is called HIGHMEM64G.
>
I asked because on 2.6.18,
hi,
i heard that it is possible to have HIGHMEM4G and PAE options
combined. Is that really possible?
I am on 2.6.28.2, and choose HIGHMEM4G. But there is no place to
enable PAE at all (??)
Thanks,
H
--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecar...@nl.l
On Tue, Mar 3, 2009 at 4:43 PM, Peter Teoh wrote:
> - Show quoted text -
> On Tue, Mar 3, 2009 at 2:41 PM, NAHieu wrote:
>> On Tue, Mar 3, 2009 at 3:29 PM, Peter Teoh wrote:
>>> - Show quoted text -
>>> On Tue, Mar 3, 2009 at 11:39 AM, NAHieu wrote:
>>>&
On Tue, Mar 3, 2009 at 3:54 PM, Pei Lin wrote:
> This tool sounds cool. Are your project "opensource" ?
Yes, it will be. But I have to finish it first.
Thanks,
H
> 2009/3/3 NAHieu :
> - Show quoted text -
>> On Tue, Mar 3, 2009 at 3:29 PM, Peter Teoh wrote:
>&g
On Tue, Mar 3, 2009 at 3:29 PM, Peter Teoh wrote:
> - Show quoted text -
> On Tue, Mar 3, 2009 at 11:39 AM, NAHieu wrote:
>> On Tue, Mar 3, 2009 at 12:16 PM, Peter Teoh wrote:
>>> This is the first time I have seen the word "unity-mapping"..if it
>>&
On Tue, Mar 3, 2009 at 12:16 PM, Peter Teoh wrote:
> This is the first time I have seen the word "unity-mapping"..if it
> is your inventioncongratulations U have created a new term.
so you learned a new term today :-). but i agree that it is not
popular, and it confused me at first.
Sorry that I accientally pushed the button before completing email. So
the full message is like below.
Hi,
In Linux kernel, we have unity-mapping feature, which maps the virtual
addresses in kernel area (above PAGE_OFFSET) to physical addresses in
the format:
y = x - PAGE_OFFSET
in which
Hi,
In Linux kernel, we have unity-mapping feature, which maps the virtual
addresses in kernel area (above PAGE_OFFSET) to physical addresses in
the format:
y = x - PAGE_OFFSET
all the virtual address
--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecar...@nl.
Hi,
I am wondering if it is true that all syscalls can sleep? Is there any
exception?
Thanks,
H
--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to [EMAIL PROTECTED]
Please read the FAQ at http://kernelnewbies.org/FAQ
Hi,
I noticed that the value of "current" macro has changed in the newer
kernel version (from 2.6.20?). It seems that now the task_struct
structure that points to the current process is now put in the FS
segment. That means from address range 0 upwards, we have the
"current" structure. Could anybo
Hi Avishay,
On 7/24/07, Avishay Traeger <[EMAIL PROTECTED]> wrote:
On Tue, 2007-07-24 at 19:12 +0900, NAHieu wrote:
> Hello,
>
> Given a file pointer (struct file *), what is the most effecient way
> to find out the pid of the process that manages this file pointer?
>
&
Hello,
Given a file pointer (struct file *), what is the most effecient way
to find out the pid of the process that manages this file pointer?
I look into the file structure, but still havent seen any way to do that.
There is one solution: traverse all the processes in the system, and
compare m
19 matches
Mail list logo