lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <82e4877d0701280834n75d3d0d3ja7a35d5ea0e7fa4f@mail.gmail.com>
Date:	Sun, 28 Jan 2007 11:34:19 -0500
From:	"Parag Warudkar" <parag.warudkar@...il.com>
To:	thunder7@...all.nl
Cc:	"akpm@...l.org" <akpm@...l.org>, ak@...e.de,
	linux-kernel@...r.kernel.org
Subject: RE: 2.6.20-rc6-mm1: linker error with arch_setup_additional_pages

>CONFIG_BINFMT_ELF=y
># CONFIG_BINFMT_MISC is not set
># CONFIG_IA32_EMULATION is not set

Hm Ok. That's explainable. You don't have CONFIG_IA32_EMULATION set
and arch_setup_additional pages is only defined/exported in
syscall32.c which won't be built in your case. (It should go away if
you set CONFIG_IA32_EMULATION).

Andi - Is arch_setup_additional_pages required for x86_64 without
IA32? If so what should it call (like it calls syscall32_setup_pages
in IA32 case)? If it is not needed I guess we can make it a no-op in
case IA32_EMULATION=n?

linux/interp.h -
#ifdef CONFIG_X86_64 && !defined CONFIG_IA32_EMULATION
static inline int arch_setup_additional_pages(struct linux_binprm *bprm,
                                int executable_stack)
{
        return 0;
}


Perhaps we  need an arch-specific override for interp.h?

Parag
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ