lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 01 May 2017 14:50:11 -0400 (EDT)
From:   David Miller <davem@...emloft.net>
To:     aconole@...heb.org
Cc:     ast@...com, daniel@...earbox.net, netdev@...r.kernel.org,
        xdp-newbies@...r.kernel.org
Subject: Re: [PATCH v4 binutils] Add BPF support to binutils...

From: Aaron Conole <aconole@...heb.org>
Date: Mon, 01 May 2017 14:39:39 -0400

> David Miller <davem@...emloft.net> writes:
> 
>> From: Aaron Conole <aconole@...heb.org>
>> Date: Mon, 01 May 2017 13:22:00 -0400
>>
>>> x86-64:
>>>   Running /home/aconole/git/binutils-gdb/gas/testsuite/gas/bpf/bpf.exp ...
>>>   FAIL: jump
>>>   FAIL: call
>>>   FAIL: imm64a
>>>   Running /home/aconole/git/binutils-gdb/gas/testsuite/gas/cfi/cfi.exp ...
>>
>> I cannot reproduce this, can you show what it says in the:
>>
>> 	/home/aconole/git/binutils-gdb/gas/testsuite/gas.log
>>
>> file near the "FAIL" cases?
> 
> Executing on host: sh -c {/home/aconole/git/binutils-gdb/gas/testsuite/../../binutils/objdump  -dr dump.o >dump.out 2>gas.stderr}  /dev/null  (timeout = 300)
> spawn [open ...]
> regexp_diff match failure
> regexp "^ 108:	95 00 00 00 00 00 00 00 	exit$"
> line   " 108:	95 00 00 00 00 00 00 00 	exit	"
> FAIL: jump
> 
> 
> Same style of error for call and imm64a.  After reverting and then
> re-applying your patch, the FAILs all go away, so I must have broken
> these files somehow.  Sorry for the false alarm.

Great, thanks for checking.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ