lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20101216090019.639191a1.sfr@canb.auug.org.au>
Date:	Thu, 16 Dec 2010 09:00:19 +1100
From:	Stephen Rothwell <sfr@...b.auug.org.au>
To:	Arnaud Lacombe <lacombar@...il.com>
Cc:	LKML <linux-kernel@...r.kernel.org>,
	John Reiser <jreiser@...wagon.com>,
	Wu Zhangjin <wuzhangjin@...il.com>,
	"Maciej W. Rozycki" <macro@...ux-mips.org>,
	Steven Rostedt <rostedt@...dmis.org>,
	Ralf Baechle <ralf@...ux-mips.org>,
	Linus <torvalds@...ux-foundation.org>,
	Andrew Morton <akpm@...ux-foundation.org>
Subject: Re: ftrace/MIPS related x86_64 build failure on in Linus' tree

Hi Arnaud,

On Wed, 15 Dec 2010 01:45:45 -0500 Arnaud Lacombe <lacombar@...il.com> wrote:
>
> On Wed, Dec 15, 2010 at 12:04 AM, Stephen Rothwell <sfr@...b.auug.org.au> wrote:
> >
> > Since October 31 our x86_64 allmodconfig builds have been failing like this:
> >
> > /opt/crosstool/gcc-4.4.3-nolibc/x86_64-linux/bin/x86_64-linux-ld: arch/x86/ia32/sys_ia32.o: bad reloc symbol index (0x1000000 >= 0x6b) for offset 0x808080 in section `__mcount_loc'
> > arch/x86/ia32/sys_ia32.o: could not read symbols: Bad value
> >
> I got the same on mips, target was BE, toolchain's host was LE.
> Doesn't https://lkml.org/lkml/2010/12/2/224 address the issue ? This
> patch does not seem to have reached Linus tree yet.

Thanks for pointing that out.  I wonder how we can push that along.
-- 
Cheers,
Stephen Rothwell                    sfr@...b.auug.org.au
http://www.canb.auug.org.au/~sfr/

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ