lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 16 Jun 2009 04:59:50 -0500
From:	"Michael S. Zick" <lkml@...ethan.org>
To:	Amerigo Wang <xiyou.wangcong@...il.com>
Cc:	Tetsuo Handa <penguin-kernel@...ove.sakura.ne.jp>, hpa@...or.com,
	linux-kernel@...r.kernel.org
Subject: Re: [x86] Build error at arch/x86/boot/bioscall.S

On Tue June 16 2009, Amerigo Wang wrote:
> On Tue, Jun 16, 2009 at 05:25:34PM +0900, Tetsuo Handa wrote:
> >Amerigo Wang wrote:
> >> How about:
> >> 
> >> - movw 68(%esp), %di
> >> + movzwl %sp, %ebx
> >> + movw 68(%ebx), %di
> >> 
> >> ? Does this work?
> >No.
> >
> >arch/x86/boot/bioscall.S: Assembler messages:
> >arch/x86/boot/bioscall.S:69: Error: `68(%ebx)' is not a valid 16 bit base/index expression
> >make[1]: *** [arch/x86/boot/bioscall.o] Error 1
> >make: *** [bzImage] Error 2
> 
> Ok, how about:
> 
> - movw 68(%esp), %di
> + addl $68, %esp
> + popw %di
> + subl $66, %esp
> 

I do hope you have interrupts disabled around that chunk.
Just how old is the toolchain (some didn't do 16bit worth a sh..)?

Mike

> ?
> --
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at  http://www.tux.org/lkml/
> 
> 


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ