lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4978D3FD.4050300@hathawaymix.org>
Date:	Thu, 22 Jan 2009 13:15:57 -0700
From:	Shane Hathaway <shane@...hawaymix.org>
To:	Américo Wang <xiyou.wangcong@...il.com>
CC:	linux-kernel@...r.kernel.org
Subject: Re: uml: sigprocmask fix

Américo Wang wrote:
> On Mon, Jan 19, 2009 at 06:18:01PM -0700, Shane Hathaway wrote:
>> I just ran into the same issue described here:
>>
>> http://lkml.org/lkml/2009/1/15/194
>>
>> Like Americo Wang, my user mode linux compile failed when attempting to
>> link ".tmp_vmlinux".  However, his patch is probably wrong.  The problem
>> is that the name "sigprocmask" is getting renamed to
>> "kernel_sigprocmask" by a compiler directive in arch/um/Makefile, then
>> that name gets mangled into "sys_kernel_sigprocmask" by the
>> SYSCALL_DEFINE3(sigprocmask, ...) macro in kernel/signal.c.
> 
> 
> Hmmm, I found this, but note that replacing sigprocmask with
> kernel_sigprocmask is done by strip, that should be after compiling.
> But macros are processed before compiling.
> 
> Am I missing something?

Probably not, but have you made progress in figuring out why others can 
apparently successfully compile UML without patching sys_call_table.S at 
all?  That's the real mystery.

Shane
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ