Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:IMHO (Score 1) 205

Actually, there are two parts to a video driver on Windows NT, in all versions up to 5.2. In the "Windows 2000 Display Model" (the same one used in NT4), the vendor supplies a display driver, and a miniport driver.

The miniport handles things like resource allocation, memory mapping, handle interrupts, etc. This has always been in kernel mode, because it has to talk to the hardware.

The display driver is for high level drawing and rendering commands. It provides accelerated interfaces for GDI, DirectDraw and Direct3d. This, along with the Win32 windowing and graphics servers (left side of original diagram), used to live in user mode int NT3.x inside of csrss.exe with winsrv.dll. CSR still contains many functions that were never moved into kernel mode in win32k.sys.

Performance was one reason to move the display driver and winsrv into kernel mode, but I guess the biggest reason was to simplify the interface between the Win32 server and user mode clients by eliminating all the IPC marshaling. Win32k can now just reach into the client process's memory, same pointers and everything, instead of packing things into shared memory or an LPC messages.

Vista's new display model is more complex, but for the most part has a user mode display driver again.

Comment Re:SIDs contain code. (Score 2, Informative) 277

The 6581 SID chip, which produces sound on the C64 is not programmable. The 6510 CPU has to spoon feed it commands to produce a song.

.MID files and windows metafles are a sequence of commands with parameters and (for MIDIs) timings that describe content. These commands are a high level description of the content. A generic player is capable of interpreting these instructions to render output. The C64 never had a common format like that for music. Instead, each song is a unique program for the 6510 CPU dedicated to a single song that outputs through the SID chip. Instead of describing notes directly, it has 6510 machine code instructions for loading registers, doing arithmetic, storing to memory, controlling hardware, etc. just like it was a real computer. These are usually created by excising the music portion of a larger program to make it a standalone program that just plays a song with no input. To play a song, an emulator for the 6510, 6581, memory, ROM and enough other hardware is required to let the sound program execute like it would on a real 64, controlling emulated the SID chip the same way.

This format is popular because the vast majority of original music was already in program format, and the machine code programs are much shorter than a literal description of the program's SID output.

See MOS Technology SID - Software emulation

I agree that Apple should be able to verify that full emulator is safe to execute arbitrary code that can't escape, but as other posters have noted, this may not be Apple's only concern.

Comment Re:Need some education on what UAC is? (Score 1) 374

That's mostly right, but I think the kernel's role is a bit smaller.

Tokens, which identify the access that a process gets, and access checks against kernel objects with security descriptors are indeed handled by the kernel. Integrity levels attached to tokens and mandatory integrity labels are new properties that the kernel allows for tokens and security descriptors and consults during an access check in Vista. That's really the extent of kernel involvement for integrity labels.

The decision of what to put into a token or security descriptor has always been up to user mode components. Winlogon uses a restricted, medium integrity version of an administrator's token for starting the shell. IE launches a low integrity child process of itself. Certain functions, like Win32's CreateProcess check the image manifest for requestedExecutionLevel and enlist the seclogon service if needed to elevate the new process. The kernel syscall to create a process doesn't do any of this.

Windows messages are implemented by the Win32 subsystem, not the kernel (even though part of Win32 does run in kernel mode in win32k.sys). The kernel does supply several IPC methods, but not this one. Win32 does the target window integrity check (UIPI).

I would say that UAC is a user mode construct, mainly implemented in winlogon, kernel32.dll, LSA and the seclogon service. The kernel does enforce restricted tokens and integrity labels for kernel objects though. I can't say that the NT security model has been followed as well as it could be (part of this is due to its complexity), but Vista (and UAC) do use a lot more of it, and seem to have avoided serious security or compatibility problems. One issue is that NT was designed for use on a LAN with trusted programs and the security system was for protecting users and the system from unauthorized users, not from malicious programs. Thus, the owner of a computer is the Administrator, since the system doesn't have anything that user shouldn't have access to. Unfortunately, this doesn't work so well when that admin can't trust all the programs on the system to behave.

Comment Re:LOL: Bug Report (Score 1) 421

I was thinking of one transaction, where the file is truncated and new contents are written. Either both entirely happen, or neither do.

OTOH, I think you're on to something with a simplified transaction system that allows atomic pairs of operations that can be used to implement things like this, e.g. replace one file with another, ensuring it's written completely on commit.

Comment Re:LOL: Bug Report (Score 2, Insightful) 421

It sounds like the correct solution is for the file system to implement transactional semantics. That is what the applications need and were incidentally getting, despite it not being in the spec.

Why isn't this being considered as the solution? There are other major OSes have implemented basic atomic transactions in their filesystems successfully, why not Linux?

Comment Re:Microsoft already replied (Score 1) 388

Then you have some other corruption problem that has nothing to do with the layout of user profiles.

Besides, I didn't have to google to determine the layout, I could see it after a minute of browsing. Google provided me with more formal documentation to reference in my post.

Comment Re:Microsoft already replied (Score 1) 388

I never said there weren't other problems. I consider the default name for those paths to be hideous. Plus with the ridiculous and horrible limitation that is MAX_PATH in so many Win32 components, that is path real estate that we can't afford to spend. Parts of Win32 go to great lengths to work around MAX_PATH, including searching for shorter surrogate paths to use instead. .NET, foolishly built on Win32, has the same problems.

At least they changed the defaults to "Users", "Documents" and "AppData", etc in Vista.

I was responding to the specific complaint that profile paths were arcane and not understandable.

Comment Re:Microsoft already replied (Score 3, Insightful) 388

The preference files in the Windows user directories are hidden in arcane locations.

It took me 5 seconds to google some docs for user profile paths: User Data and Settings Management

Makes sense that the Outlook data would be in C:\Documents and Settings\\Program Data\Microsoft\Outlook but it's not.

Instead, the roaming stuff goes into:
C:\Documents and Settings\USERNAME\Application Data\Microsoft\Outlook
And the non-roaming stuff goes into
C:\Documents and Settings\USERNAME\Local Settings\Application Data\Microsoft\Outlook
Doesn't seem so awful.

The only way to ehfin find it is to back the stuff up! What if the computer crashed and I can't RUN outlook???? I'm hosed (this actually happened)

Copy the user profile over?

Intel

Submission + - Open source drew us to Solaris says Intel

Joris Arjan writes: Open source was behind Intel's decision to add Solaris to its list of supported operating systems. Speaking to reporters in the Asia-Pacific region during a teleconference, Kirk Skaugen, vice president and general manager of Intel's server products, said the "open-sourcing of Solaris" changed Intel's mind about the OS. Before this, Intel only supported Windows and Linux on its x86 architecture. Skaugen said: "If you look at the 7 million downloads of OpenSolaris in 2005, almost two-thirds of those were primarily for the Intel architecture, while one-third was for UltraSparc."
Businesses

Submission + - India to overtake United States by 2050: Report

Aryabhata writes: "Goldman Sachs scaled up its estimates about India from its original research paper in October 2003. The new view projects that productivity growth will help India sustain over 8% growth until 2020 and become the second largest economy in the world ahead of the US by 2050. The original report had placed India's GDP as No.3 outstripping Japan's by 2032. The latest report goes a step further to project India in No. 2 position in the global sweepstakes of tomorrow. Goldman Sachs' research arm said in a global research paper released on Monday that India's growth acceleration since 2003 represented a structural increase rather than simply a cyclical upturn. It said productivity growth drove nearly half of overall growth and expected it to continue for some years."
The Courts

US Attorney General Questions Habeas Corpus 1151

spiedrazer writes "In yet another attempt to create legitimacy for the Bush Administration's many questionable legal practices, US attorney General Alberto Gonzales actually had the audacity to argue before a Congressional committee that the US Constitution doesn't explicitly bestow habeas corpus rights on US citizens. In his view it merely says when the so-called Great Writ can be suspended, but that doesn't necessarily mean that the rights are granted. The Attorney General was being questioned by Sen. Arlen Specter at a Senate Judiciary Committee hearing on Jan. 18. THe MSM are not covering this story but Colbert is (click on the fourth video down, 'Exact Words')." From the Baltimore Chronicle and Sentinel commentary: "While Gonzales's statement has a measure of quibbling precision to it, his logic is troubling because it would suggest that many other fundamental rights that Americans hold dear (such as free speech, freedom of religion, and the right to assemble peacefully) also don't exist because the Constitution often spells out those rights in the negative. It boggles the mind the lengths this administration will go to to systematically erode the rights and privileges we have all counted on and held up as the granite pillars of our society since our nation was founded."

Slashdot Top Deals

"You don't go out and kick a mad dog. If you have a mad dog with rabies, you take a gun and shoot him." -- Pat Robertson, TV Evangelist, about Muammar Kadhafy

Working...