Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Analysis of Linux Code that SCO Alleges Is In Violation Of Their Copyright and Trade Secrets.
Perins.com ^ | Bruce Perins (with help from many members of the Linux community)

Posted on 08/19/2003 11:00:12 AM PDT by shadowman99

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 101-114 next last
Darl! You got some s'plainin' to doooo!!!
1 posted on 08/19/2003 11:00:13 AM PDT by shadowman99
[ Post Reply | Private Reply | View Replies]

To: Ernest_at_the_Beach; rdb3
ping
2 posted on 08/19/2003 11:00:58 AM PDT by shadowman99
[ Post Reply | Private Reply | To 1 | View Replies]

To: shadowman99; *tech_index; Salo; MizSterious; Sparta; freedom9; martin_fierro; PatriotGames; ...
OFFICIAL BUMP(TOPIC)LIST
3 posted on 08/19/2003 11:03:35 AM PDT by Ernest_at_the_Beach (All we need from a Governor is a VETO PEN!!!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: shadowman99
The lawyers have a blind spot. No historical reference!!!
4 posted on 08/19/2003 11:06:36 AM PDT by Ernest_at_the_Beach (All we need from a Governor is a VETO PEN!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: shadowman99
I posted in another thread:

http://www.freerepublic.com/focus/f-news/966610/posts?page=70#70

The origin of the code in question goes back even further than was known when Bruce wrote this.

5 posted on 08/19/2003 11:09:18 AM PDT by justlurking
[ Post Reply | Private Reply | To 1 | View Replies]

To: shadowman99
I think SCO's next response will be very interesting.

The mainstream media will probably pick this up tomorrow. Apparently, the financial markets haven't figured it out yet, because SCO's stock price is down less than 1%. If I were a gambler, I'd be shorting them right now.

SCO has been very publicly discredited. They will have to respond with something that supports their claim -- the question is how diligent their research will be. They won't be able to survive another bogus claim: another slip like this will ruin their credibility.

6 posted on 08/19/2003 11:17:41 AM PDT by justlurking
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bush2000; Golden Eagle; Coral Snake
Any of you care to comment on the strength of this "evidence"?
7 posted on 08/19/2003 11:33:26 AM PDT by cc2k
[ Post Reply | Private Reply | To 1 | View Replies]

To: justlurking
I felt that analysis by Bruce Perins was newsworthy.
8 posted on 08/19/2003 11:34:45 AM PDT by shadowman99
[ Post Reply | Private Reply | To 5 | View Replies]

To: Symbiant
penguin ping
9 posted on 08/19/2003 11:35:03 AM PDT by Gunslingr3
[ Post Reply | Private Reply | To 1 | View Replies]

To: justlurking
Check their share price here

http://finance.yahoo.com/q?s=scox&d=t
10 posted on 08/19/2003 11:35:30 AM PDT by AdmSmith
[ Post Reply | Private Reply | To 6 | View Replies]

To: shadowman99
SWEET! Screen shots!

So SCO is trying to lay claim to the malloc() function? From Lion's no less... why don't I just go patent the fork.

11 posted on 08/19/2003 11:46:28 AM PDT by dandelion
[ Post Reply | Private Reply | To 1 | View Replies]

To: shadowman99
Ping
12 posted on 08/19/2003 11:46:46 AM PDT by playball0 (Fortune favors the bold)
[ Post Reply | Private Reply | To 1 | View Replies]

To: justlurking
I just wonder when the Mormon mafia is going to order a hit on Darl McBride. He is looking to be the biggest doofus in Utah: "Gee, let's change to a symbol font - NOBODY will figure that out..."

Canopy has a number of Linux investments, among them Trolltech, which could be a big winner in PDAs. But no big consumer electronics company is going to touch them until the SCO cloud is lifted.
13 posted on 08/19/2003 11:47:16 AM PDT by eno_ (Freedom Lite - it's almost worth defending)
[ Post Reply | Private Reply | To 6 | View Replies]

To: cc2k
Just noticed it actually. What does the author mean when he says:

We haven't yet located the original source of this code...

14 posted on 08/19/2003 11:56:15 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 7 | View Replies]

To: eno_
I just wonder when the Mormon mafia is going to order a hit on Darl McBride...

I don't think the Mormon's would ever do that, but I did see a comment from Linus Torvald's email where he talked about doing that. Did you ever see it?

15 posted on 08/19/2003 11:58:38 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 13 | View Replies]

To: shadowman99
More grist for the mill...

/*
 * Copyright (c) 1986 Regents of the University of California.
 * All rights reserved.  The Berkeley software License Agreement
 * specifies the terms and conditions for redistribution.
 *
 *      @(#)subr_rmap.c 1.2 (2.11BSD GTE) 12/24/92
 */

#include "param.h"
#include "systm.h"
#include "map.h"
#include "vm.h"

/*
 * Resource map handling routines.
 *
 * A resource map is an array of structures each of which describes a
 * segment of the address space of an available resource.  The segments
 * are described by their base address and length, and sorted in address
 * order.  Each resource map has a fixed maximum number of segments
 * allowed.  Resources are allocated by taking part or all of one of the
 * segments of the map.
 *
 * Returning of resources will require another segment if the returned
 * resources are not adjacent in the address space to an existing segment.
 * If the return of a segment would require a slot which is not available,
 * then one of the resource map segments is discarded after a warning is
 * printed.
 *
 * Returning of resources may also cause the map to collapse by coalescing
 * two existing segments and the returned space into a single segment.  In
 * this case the resource map is made smaller by copying together to fill
 * the resultant gap.
 *
 * N.B.: the current implementation uses a dense array and does not admit
 * the value ``0'' as a legal address or size, since that is used as a
 * delimiter.
 */

/*
 * Allocate 'size' units from the given map.  Return the base of the
 * allocated space.  In a map, the addresses are increasing and the
 * list is terminated by a 0 size.
 *
 * Algorithm is first-fit.
 */
memaddr
malloc(mp, size)
        struct map *mp;
        register size_t size;
{
        register struct mapent *bp, *ep;
        memaddr addr;
        int retry;

        if (!size)
                panic("malloc: size = 0");
        /*
         * Search for a piece of the resource map which has enough
         * free space to accomodate the request.
         */
        retry = 0;
again:
        for (bp = mp->m_map; bp->m_size; ++bp)
                if (bp->m_size >= size) {
                        /*
                         * Allocate from the map.  If we allocated the entire
                         * piece, move the rest of the map to the left.
                         */
                        addr = bp->m_addr;
                        bp->m_size -= size;
                        if (bp->m_size)
                                bp->m_addr += size;
                        else for (ep = bp;; ++ep) {
                                *ep = *++bp;
                                if (!bp->m_size)
                                        break;
                        }
#ifdef UCB_METER
                        if (mp == coremap)
                                freemem -= size;
#endif
                        return(addr);
                }
        /* no entries big enough */
        if (!retry++) {
                if (mp == swapmap) {
                        printf("short of swap\n");
                        xumount(NODEV);
                        goto again;
                }
                else if (mp == coremap) {
                        xuncore(size);
                        goto again;
                }
        }
        return((memaddr)NULL);
}

...snip...

16 posted on 08/19/2003 12:02:49 PM PDT by Liberal Classic (Quemadmoeum gladis nemeinum occidit, occidentis telum est.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: shadowman99
More grist for the mill...

/*
 * Copyright (c) 1986 Regents of the University of California.
 * All rights reserved.  The Berkeley software License Agreement
 * specifies the terms and conditions for redistribution.
 *
 *      @(#)subr_rmap.c 1.2 (2.11BSD GTE) 12/24/92
 */

#include "param.h"
#include "systm.h"
#include "map.h"
#include "vm.h"

/*
 * Resource map handling routines.
 *
 * A resource map is an array of structures each of which describes a
 * segment of the address space of an available resource.  The segments
 * are described by their base address and length, and sorted in address
 * order.  Each resource map has a fixed maximum number of segments
 * allowed.  Resources are allocated by taking part or all of one of the
 * segments of the map.
 *
 * Returning of resources will require another segment if the returned
 * resources are not adjacent in the address space to an existing segment.
 * If the return of a segment would require a slot which is not available,
 * then one of the resource map segments is discarded after a warning is
 * printed.
 *
 * Returning of resources may also cause the map to collapse by coalescing
 * two existing segments and the returned space into a single segment.  In
 * this case the resource map is made smaller by copying together to fill
 * the resultant gap.
 *
 * N.B.: the current implementation uses a dense array and does not admit
 * the value ``0'' as a legal address or size, since that is used as a
 * delimiter.
 */

/*
 * Allocate 'size' units from the given map.  Return the base of the
 * allocated space.  In a map, the addresses are increasing and the
 * list is terminated by a 0 size.
 *
 * Algorithm is first-fit.
 */
memaddr
malloc(mp, size)
        struct map *mp;
        register size_t size;
{
        register struct mapent *bp, *ep;
        memaddr addr;
        int retry;

        if (!size)
                panic("malloc: size = 0");
        /*
         * Search for a piece of the resource map which has enough
         * free space to accomodate the request.
         */
        retry = 0;
again:
        for (bp = mp->m_map; bp->m_size; ++bp)
                if (bp->m_size >= size) {
                        /*
                         * Allocate from the map.  If we allocated the entire
                         * piece, move the rest of the map to the left.
                         */
                        addr = bp->m_addr;
                        bp->m_size -= size;
                        if (bp->m_size)
                                bp->m_addr += size;
                        else for (ep = bp;; ++ep) {
                                *ep = *++bp;
                                if (!bp->m_size)
                                        break;
                        }
#ifdef UCB_METER
                        if (mp == coremap)
                                freemem -= size;
#endif
                        return(addr);
                }
        /* no entries big enough */
        if (!retry++) {
                if (mp == swapmap) {
                        printf("short of swap\n");
                        xumount(NODEV);
                        goto again;
                }
                else if (mp == coremap) {
                        xuncore(size);
                        goto again;
                }
        }
        return((memaddr)NULL);
}

...snip...

17 posted on 08/19/2003 12:02:50 PM PDT by Liberal Classic (Quemadmoeum gladis nemeinum occidit, occidentis telum est.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Golden Eagle
>> Just noticed it actually. What does the author mean when he says:

>>We haven't yet located the original source of this code...

"The ATT source code is here on the net, from a version released around 1979, although we believe that earlier versions exist."

18 posted on 08/19/2003 12:03:11 PM PDT by shadowman99
[ Post Reply | Private Reply | To 14 | View Replies]

To: Liberal Classic
< Cartman > %($)&!$!! double post hippies %($)&!$!! </ Cartman >
19 posted on 08/19/2003 12:03:45 PM PDT by Liberal Classic (Quemadmoeum gladis nemeinum occidit, occidentis telum est.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Golden Eagle
We haven't yet located the original source of this code...

He is referring to the obfuscated code. Whoever created the Powerpoint slide changed the font to "Symbol".

The consensus elsewhere is that it is a comment from SCO's kernel. Since it can't be found elsewhere, it is probably proprietary. But, SCO is not claiming that it is duplicated in Linux.

20 posted on 08/19/2003 12:06:24 PM PDT by justlurking
[ Post Reply | Private Reply | To 14 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 101-114 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson