From owner-freebsd-hackers Mon Feb 6 19:17:10 1995 Return-Path: hackers-owner Received: (from root@localhost) by freefall.cdrom.com (8.6.9/8.6.6) id TAA03548 for hackers-outgoing; Mon, 6 Feb 1995 19:17:10 -0800 Received: from Root.COM (implode.Root.COM [198.145.90.1]) by freefall.cdrom.com (8.6.9/8.6.6) with ESMTP id TAA03542 for ; Mon, 6 Feb 1995 19:17:04 -0800 Received: from corbin.Root.COM (corbin.Root.COM [198.145.90.18]) by Root.COM (8.6.8/8.6.5) with ESMTP id TAA27850; Mon, 6 Feb 1995 19:16:57 -0800 Received: from localhost (localhost [127.0.0.1]) by corbin.Root.COM (8.6.9/8.6.5) with SMTP id TAA00688; Mon, 6 Feb 1995 19:16:56 -0800 Message-Id: <199502070316.TAA00688@corbin.Root.COM> X-Authentication-Warning: corbin.Root.COM: Host localhost didn't use HELO protocol To: terry@cs.weber.edu (Terry Lambert) cc: jmb@kryten.atinc.com, hackers@FreeBSD.org Subject: Re: MIT SHM X11 extensions? (fwd) In-reply-to: Your message of "Mon, 06 Feb 95 16:39:10 MST." <9502062339.AA07346@cs.weber.edu> From: David Greenman Reply-To: davidg@Root.COM Date: Mon, 06 Feb 1995 19:16:56 -0800 Sender: hackers-owner@FreeBSD.org Precedence: bulk >> Further, Terry's assertion that the >> binary's vnode has the VTEXT flag turned on (and thus prevents you from >> overwriting it [ETXTBUSY]) is also WRONG. It does NOT do this, and as such it >> is perfectly okay to clobber your binary. > >Oh ick. > >Uh, why is ETXTBUSY still around? To protect executing, pageable, binaries from being clobbered...which is exactly how it is used. The kernel is not a pageable binary, is not "executed" in the traditional sense. -DG