lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Wed, 18 Aug 2010 13:44:16 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	David Howells <dhowells@...hat.com>
Cc:	tony.luck@...il.com, torvalds@...ux-foundation.org,
	xiyou.wangcong@...il.com, ralf@...ux-mips.org,
	rmk+kernel@....linux.org.uk, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] Fix the declaration of sys_execve() in
 asm-generic/syscalls.h

On Wed, 18 Aug 2010 18:55:33 +0100
David Howells <dhowells@...hat.com> wrote:

> Fix the declaration of sys_execve() in asm-generic/syscalls.h to have various
> consts applied to its pointers.
> 

crappy changelog :(

> ---
> 
>  include/asm-generic/syscalls.h |    6 ++++--
>  1 files changed, 4 insertions(+), 2 deletions(-)
> 
> diff --git a/include/asm-generic/syscalls.h b/include/asm-generic/syscalls.h
> index df84e3b..d89dec8 100644
> --- a/include/asm-generic/syscalls.h
> +++ b/include/asm-generic/syscalls.h
> @@ -23,8 +23,10 @@ asmlinkage long sys_vfork(struct pt_regs *regs);
>  #endif
>  
>  #ifndef sys_execve
> -asmlinkage long sys_execve(char __user *filename, char __user * __user *argv,
> -			char __user * __user *envp, struct pt_regs *regs);
> +asmlinkage long sys_execve(const char __user *filename,
> +			   const char __user *const __user *argv,
> +			   const char __user *const __user *envp,
> +			   struct pt_regs *regs);
>  #endif
>  
>  #ifndef sys_mmap2

Is this recent breakage?

In what way does the problem exhibit itself?

If we know these things we can then work out if the patch is needed in
2.6.36 and -stable.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ