From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: <gentoo-user+bounces-166449-garchives=archives.gentoo.org@lists.gentoo.org> Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id A21031397EC for <garchives@archives.gentoo.org>; Thu, 20 Aug 2015 02:53:47 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 4F0E614272; Thu, 20 Aug 2015 02:53:41 +0000 (UTC) Received: from mail-io0-f179.google.com (mail-io0-f179.google.com [209.85.223.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 2133B14186 for <gentoo-user@lists.gentoo.org>; Thu, 20 Aug 2015 02:53:39 +0000 (UTC) Received: by iodv127 with SMTP id v127so31470634iod.3 for <gentoo-user@lists.gentoo.org>; Wed, 19 Aug 2015 19:53:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:content-type; bh=SeJvBX/yC2wGHSzimZFosMOtje80duW72KAqwwqaHx8=; b=W4jcyZ1+lQb/GNLu7gKAuH4DSZsXOiYVm01bWtmEhnYaZG4zcD3dzaPjT4WwnT55+A DEV2ywzoc/BJ1iEBZbNRa7tywGE59kJJqPemy/Mjc2dOvEoguKtxd5V8Z6yy2n/ha56d w91UDqYba498ZPeIcMDmycahCtfnNU8vrx6SEUhU7qkaJhyoCKzuFWAfJ0CnCC5fAawt OfoETG/4UQOvqdTyuIsLyXYnMIdH5gxvXmtNTYZ2WGmRh5NJLHl1MXqQdD+76gI8Nxjz +vMlbZvy9PMGrDs4YjGR4Q0fQXXdHikvjN2WgKeL74v9f8KsYQPg+zkPUagjOP2wB3Yd IREw== Precedence: bulk List-Post: <mailto:gentoo-user@lists.gentoo.org> List-Help: <mailto:gentoo-user+help@lists.gentoo.org> List-Unsubscribe: <mailto:gentoo-user+unsubscribe@lists.gentoo.org> List-Subscribe: <mailto:gentoo-user+subscribe@lists.gentoo.org> List-Id: Gentoo Linux mail <gentoo-user.gentoo.org> X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 X-Received: by 10.107.6.65 with SMTP id 62mr577124iog.93.1440039219299; Wed, 19 Aug 2015 19:53:39 -0700 (PDT) Sender: freemanrich@gmail.com Received: by 10.79.103.67 with HTTP; Wed, 19 Aug 2015 19:53:39 -0700 (PDT) In-Reply-To: <BLU437-SMTP199F1B9BF76BA12984F57E8D660@phx.gbl> References: <20150816094552.1e5b6d8a@a6> <55D523F0.4060100@gentoo.org> <CAGfcS_nco=bzmhNMQnrTAFVYAHHZ2_U2SPd0umWdr==CdeMJ5g@mail.gmail.com> <BLU437-SMTP199F1B9BF76BA12984F57E8D660@phx.gbl> Date: Wed, 19 Aug 2015 22:53:39 -0400 X-Google-Sender-Auth: YcqoX2kozSWz6fgoDnXdudLh2hA Message-ID: <CAGfcS_=Xi6MCaVSsLoZLcRV29Q+mGjstfqUMzax7PaC96iNmPw@mail.gmail.com> Subject: Re: [gentoo-user] Re: [WAS: keyboard stops working] Recent kernels block the loading of non-GPL kernel modules From: Rich Freeman <rich0@gentoo.org> To: gentoo-user@lists.gentoo.org Content-Type: text/plain; charset=UTF-8 X-Archives-Salt: 3cd31933-1577-4502-b797-bf1121927130 X-Archives-Hash: 8d1796d9d06bda305f39d94472348c73 On Wed, Aug 19, 2015 at 10:37 PM, Fernando Rodriguez <frodriguez.developer@outlook.com> wrote: > > Try a different exercise. Go buy a Quran. Now use it as a cryptographic key to > encrypt an email. Is the email now a derived work? That's no a perfect analogy > but it's more like what happens when you dynamic link a library. But that isn't what happens with dynamic linking. In the paragraph below, insert word 1 after the 3rd word in place of the xx, and insert word 2 after the 9th word in place of the xx. This is an xx of dynamic linking. I have a xx where various elements are replaced with others. Somebody else will tell you next week what word 1 and word 2 are. He owns the copyright on those words, but he will refer to them as word 1 and word 2. Dynamic linking doesn't render code unreadable the way encryption does. It just means that not all of the code is actually present. All the original code written by the author of the object file is actually present, and in completely executable form except where it accesses memory that isn't a part of the object file. You can actually execute parts of an object file as a result. > It's not the symbols that are copyrighted, it's the code that those symbols > load into your programs address space. The symbols don't load anything. The linker loads the external code into RAM, and inserts its address into your own code where it references the exported symbols. In the example above my instructions don't actually do anything. They just tell you what to do when you find out what words 1 and 2 are. > Here's a better example, see the Mona Lisa example in wikipedia[1]. Now, > suppose I write a small program that downloads a Mona Lisa picture of the > internet and displays it with a mustache overlaid? Is my program now a > derivative work of the Mona Lisa? That's *exactly* what happens when you > dynamic link to a library. That program would not be a derivative work of the Mona Lisa. The picture it displays would be a derivative work of the Mona Lisa. The analogy isn't perfect, but it is decent. Executing the program might or might not be a violation of copyright, but distributing the program itself would not be. At most you could argue it is inducing copyright violation, which is a horrible legal argument, but admittedly one that US courts have seemed to embrace. Go Mercia! -- Rich