# HG changeset patch # User HackBot # Date 1333510011 0 # Node ID 81bb3c7a6c18225b5b2a19d0e7701681a8616ff3 # Parent e3cb8a962c43cdf0f645d94cd14befd46c738d72# Parent a8f89d47be6bd5af9ebca859205ab19ffaff6842 branch merge diff -r e3cb8a962c43 -r 81bb3c7a6c18 paste/paste.23607 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/paste/paste.23607 Wed Apr 04 03:26:51 2012 +0000 @@ -0,0 +1,14 @@ +2011-11-03.txt:19:56:18: Vorpal: Web of Lies +2011-11-03.txt:19:56:45: but Web of Lies is a great name +2011-11-03.txt:21:18:16: /* Timestamps. This stores the initial timestamp, in Web of Lies' +2011-11-04.txt:03:41:14: At this rate it looks like I'm gonna have to steal Web of Lies' architecture-specific syscall-overriding code... +2011-11-04.txt:04:17:04: Gregor: Have I mentioned Web of Lies does cooperative scheduling by overriding every single syscall to schedule +2011-11-04.txt:09:38:42: I haven't got Web of Lies to work, but this is my cheap LD_PRELOAD version of the clock hack +2011-11-04.txt:09:48:01: note: it was "sudo ./weboflies true"; true is 64-bit, but I tried it on Web of Lies itself and it still failed, so I suspect it's a generic problem +2011-11-04.txt:09:53:42: because web of lies runs as root +2011-11-04.txt:10:00:11: then it dumps me at the web of lies console +2011-11-05.txt:18:13:46: btw, people experimenting with Web of Lies, did you come to any conclusions but "it doesn't run on modern Linux"? +2011-11-08.txt:21:06:36: btw, does anyone have any feedback on Web of Lies yet? +2011-11-28.txt:21:26:39: Web of Lies gives you a really good idea of how syscall-bound a program is +2011-12-15.txt:19:39:12: Vorpal: one of the few things in the "deliberately unsupported because I can't figure out wtf effect it would have" list in Web of Lies +2012-03-04.txt:19:21:24: I think I fixed the permissions problem in Web of Lies, anyway