lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <456B36EE.8000709@redhat.com>
Date:	Mon, 27 Nov 2006 14:05:18 -0500
From:	William Cohen <wcohen@...hat.com>
To:	eranian@....hp.com
CC:	perfmon@...ali.hpl.hp.com, perfctr-devel@...ts.sourceforge.net,
	linux-kernel@...r.kernel.org
Subject: Re: [perfmon] 2.6.19-rc6-git10 new perfmon code base + libpfm + pfmon

Stephane Eranian wrote:
> Hello,
> 
> I have released another version of the perfmon new code base package.
> This version of the kernel patch is relative to 2.6.19-rc6-git10.
> 
> This is a major update because it completes the changes requested 
> during the code review on LKML. As a consequence, the kernel interface
> is NOT backward compatible with previous v2.2 versions. This release has
> the v2.3 version number. Backward compatibility with v2.0 is maintained
> on Itanium processors.

Hi Stephane,

I have built the kernel with the new patches and tried things out on x86_64 an 
x88_64 machine with Fedora Core 4.  I attempted use the new libpfm and pfmon to 
update the source RPMs and  I noticed that there were some return values from 
read() and write() being ignored. When pfmon is being built as an RPM ignoring 
the read and write return values cause the rpmbuild to fail. Attached is a 
simple patch that stuffs the return values into dummy variable to avoid the 
warnings. This patch allows libpfm and pfmon the source RPMs to compile on FC4 
and Fedora Core rawhide.

-Will

View attachment "pfmon-fortify.patch" of type "text/x-patch" (1247 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ