Displaying 20 results from an estimated 27 matches for "reqflag".
Did you mean:
retflag
2005 Aug 25
3
Adding -nostdlib to REQFLAGS
Skipped content of type multipart/mixed-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://www.vas.nu/pipermail/klibc/attachments/20050825/0e6d8370/attachment.bin
2008 Aug 05
2
Leopard Macs using Kerberos: Failed to parse negTokenTarg
I think I've found out why MacOS 10.5.x (Leopard) clients are unable to
connect to Samba shares when authenticating with Kerberos. Basically,
the
Leopard Macs insert a few extra bytes (Padding and reqFlags,
according to
wireshark) into the security blob within the Session Setup AndX Request
packet, bytes whose start tag is 0xa1, in a spot where Samba's parser
expects 0xa2. The critical error is "Failed to parse negTokenTarg at
offset
54", which looks like it's being caused by t...
2005 Apr 09
0
not everybody uses bash
...$@
- echo "CC=$(shell bash -c 'type -p $(CC)')" >> $@
- echo "LD=$(shell bash -c 'type -p $(LD)')" >> $@
+ echo "CC=$(shell which gcc)" >> $@
+ echo "LD=$(shell which ld)" >> $@
echo 'REQFLAGS=$(filter-out -I%,$(REQFLAGS))' >> $@
echo 'OPTFLAGS=$(OPTFLAGS)' >> $@
echo 'LDFLAGS=$(LDFLAGS)' >> $@
- echo "STRIP=$(shell bash -c 'type -p $(STRIP)')" >> $@
+ echo "STRIP=$(shell which strip)" &g...
2019 Feb 19
0
[klibc:master] klcc: Enable stripping even if CONFIG_DEBUG_INFO is enabled
...ings <ben at decadent.org.uk>
---
klcc/Kbuild | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/klcc/Kbuild b/klcc/Kbuild
index e62c3f12..eae753ff 100644
--- a/klcc/Kbuild
+++ b/klcc/Kbuild
@@ -18,7 +18,7 @@ $(obj)/$(KLIBCCROSS)klibc.config: $(src)/Kbuild \
$(Q)echo 'REQFLAGS=$(filter-out -I%,$(KLIBCDEFS) $(KLIBCREQFLAGS) $(KLIBCARCHREQFLAGS) $(KLIBCCPPFLAGS))' >> $@
$(Q)echo 'OPTFLAGS=$(KLIBCOPTFLAGS)' >> $@
$(Q)echo 'LDFLAGS=$(KLIBCLDFLAGS)' >> $@
- $(Q)echo 'STRIP=$(KLIBCSTRIP)' >> $@
+ $(Q)echo 'STRIP=$(ST...
2004 Feb 21
1
[PATCH] sleep for klibc utils
.../utils/Makefile klibc-0.111.utils/utils/Makefile
--- klibc-0.111/utils/Makefile 2004-02-10 00:18:15.000000000 +0100
+++ klibc-0.111.utils/utils/Makefile 2004-02-21 22:33:08.000000000 +0100
@@ -5,7 +5,7 @@ include ../MRULES
MAKEDEPS = -Wp,-MD,.$(subst /,-,$*).d
CFLAGS = $(MAKEDEPS) $(OPTFLAGS) $(REQFLAGS) -W -Wall
LIBS = $(KLIBC) $(LIBGCC)
-PROGS = chroot dd fstype mkdir mkfifo mount pivot_root umount true false
+PROGS = chroot dd fstype mkdir mkfifo mount pivot_root umount true false sleep
all: $(PROGS)
@@ -39,6 +39,9 @@ true: true.o $(CRT0) $(LIBS)
false: false.o $(CRT0) $(LIBS)...
2004 Feb 21
1
[PATCH] ln for klibc utils
...klibc-0.112/utils/Makefile klibc-0.112.utils/utils/Makefile
--- klibc-0.112/utils/Makefile 2004-02-21 23:49:26.000000000 +0100
+++ klibc-0.112.utils/utils/Makefile 2004-02-22 01:23:17.000000000 +0100
@@ -6,7 +6,7 @@ MAKEDEPS = -Wp,-MD,.$(subst /,-,$*).
CFLAGS = $(MAKEDEPS) $(OPTFLAGS) $(REQFLAGS) -W -Wall
LIBS = $(KLIBC) $(LIBGCC)
PROGS := chroot dd fstype mkdir mkfifo mount pivot_root umount \
- true false sleep
+ true false sleep ln
STATICPROGS := $(patsubst %,static/%,$(PROGS))
SHAREDPROGS := $(patsubst %,shared/%,$(PROGS))
LIBOBJS = file_mode.o
di...
2004 Feb 27
0
hotplug for klibc utils
...xit 1;
Arnd <><
diff -urN klibc-0.115/utils/Makefile klibc-0.115-hotplug/utils/Makefile
--- klibc-0.115/utils/Makefile 2004-02-22 01:57:32.000000000 +0100
+++ klibc-0.115-hotplug/utils/Makefile 2004-02-27 11:00:40.000000000 +0100
@@ -6,7 +6,7 @@
CFLAGS = $(MAKEDEPS) $(OPTFLAGS) $(REQFLAGS) -W -Wall
LIBS = $(KLIBC) $(LIBGCC)
PROGS := chroot dd fstype mkdir mkfifo mount pivot_root umount \
- true false sleep ln
+ true false sleep ln hotplug
STATICPROGS := $(patsubst %,static/%,$(PROGS))
SHAREDPROGS := $(patsubst %,shared/%,$(PROGS))
LIBOBJS = fil...
2014 Dec 17
0
[PATCH] build: sort sources to build in a more deterministic way
...-f $(patsubst %.menu,%.c,$(sort $(wildcard *.menu)))
spotless: clean libclean menuclean
rm -f *~ \#* *.c32
diff --git a/com32/gpllib/Makefile b/com32/gpllib/Makefile
index e3e30d7..1fec914 100644
--- a/com32/gpllib/Makefile
+++ b/com32/gpllib/Makefile
@@ -8,7 +8,7 @@ include $(MAKEDIR)/lib.mk
REQFLAGS += -I$(SRC)/../gplinclude -I$(SRC)/../gplinclude/zzjson
GPLDIRS := $(SRC) $(addprefix $(SRC)/,disk dmi vpd acpi zzjson)
-LIBOBJS := $(subst $(SRC)/,,$(foreach dir,$(GPLDIRS),$(patsubst %.c,%.o,$(wildcard $(dir)/*.c))))
+LIBOBJS := $(subst $(SRC)/,,$(foreach dir,$(GPLDIRS),$(patsubst %.c,%.o,$(s...
2004 Sep 05
1
[PATCH] simple rm command
...-purN klibc-0.172/utils/Makefile klibc-0.172.rm/utils/Makefile
--- klibc-0.172/utils/Makefile 2004-08-14 00:24:20.000000000 +0200
+++ klibc-0.172.rm/utils/Makefile 2004-09-05 20:11:14.109062216 +0200
@@ -6,7 +6,7 @@ MAKEDEPS = -Wp,-MD,.$(subst /,-,$*).
CFLAGS = $(MAKEDEPS) $(OPTFLAGS) $(REQFLAGS) -W -Wall
LIBS = $(KLIBC) $(LIBGCC)
PROGS := chroot dd fstype mkdir mkfifo mount pivot_root umount \
- true false sleep ln nuke minips run-init printf
+ true false sleep ln nuke minips run-init printf rm
STATICPROGS := $(patsubst %,static/%,$(PROGS))
SHAREDPROGS :=...
2016 Oct 20
0
[PATCH] Fix for crash with certain EFIs
...k/lib.mk
@@ -12,6 +12,9 @@
endif
ifeq ($(ARCH),x86_64)
GCCOPT += $(call gcc_ok,-m64,)
+ifeq ($(FWCLASS),EFI)
+ GCCOPT += $(call gcc_ok,-mno-red-zone)
+endif
#let preferred-stack-boundary be default(=4)
MARCH = x86-64
endif
@@ -54,9 +57,7 @@
CFLAGS = $(OPTFLAGS) $(REQFLAGS) $(WARNFLAGS) $(LIBFLAGS)
-ifeq ($(FWCLASS),EFI)
-CFLAGS += -mno-red-zone
-else
+ifneq ($(FWCLASS),EFI)
CFLAGS += -mregparm=3 -DREGPARM=3
endif
2018 Aug 02
1
[PATCH 1/2] Add fabs() implementation
When we add -ffreestanding the compiler won't get to inline this any more.
Signed-off-by: David Woodhouse <dwmw2 at infradead.org>
---
com32/lib/math/fabs.S | 15 +++++++++++++++
mk/lib.mk | 2 +-
2 files changed, 16 insertions(+), 1 deletion(-)
create mode 100644 com32/lib/math/fabs.S
diff --git a/com32/lib/math/fabs.S b/com32/lib/math/fabs.S
new file mode 100644
index
2005 Mar 07
0
gcc4 warnings
..._SUPPORTED */
- png_structp png_ptr;
+ volatile png_structp png_ptr;
#ifdef PNG_SETJMP_SUPPORTED
#ifdef USE_FAR_KEYWORD
--- syslinux-3.07/com32/lib/MCONFIG.gcc4 2005-03-07 11:28:15.000000000 -0500
+++ syslinux-3.07/com32/lib/MCONFIG 2005-03-07 11:28:59.000000000 -0500
@@ -18,7 +18,7 @@
REQFLAGS = -g -m32 -mregparm=3 -DREGPARM=3 -D__COM32__ -I. -I./sys -I../include
OPTFLAGS = -Os -march=i386 -falign-functions=0 -falign-jumps=0 \
- -falign-labels=0
+ -falign-labels=0 -finline-limit=1000
WARNFLAGS = -W -Wall -Wpointer-arith -Wwrite-strings -Wstrict-prototypes -Winline
CFLAGS...
2018 Jun 25
2
Samba 4.7.1 Generating Core Dumps
...out_mem_ctx=out_mem_ctx at entry=0x55b48e6156c0,
---Type <return> to continue, or q <return> to quit---
ev=ev at entry=0x55b48e614920, out=out at entry=0x55b48e6104c0, in=...) at ../auth/gensec/spnego.c:468
spnego_out = {type = -1, negTokenInit = {mechTypes = 0x55b48e610370, reqFlags = {data = 0x80 <Address 0x80 out of bounds>, length = 140471707458339}, reqFlagsPadding = 0 '\000', mechToken = {
data = 0x7ffcba8c556f "", length = 140723438245232}, mechListMIC = {data = 0x7fc21e396881 <asn1_peek_full_tag+81> "\204\300t\aD:t$\017t...
2005 Jul 29
1
move kbuild files to reflect dir structure in kernel
...\
- -Iinclude \
- $(if $(KBUILD_SRC),-Iinclude2 -I$(srctree)/include) \
- -D__KLIBC__=1 -D__KLIBC_MINOR__=0 \
- -DBITSIZE=$(BITSIZE)
-USERCFLAGS := $(USERCPPFLAGS) $(REQFLAGS) $(ARCHREQFLAGS) \
- $(OPTFLAGS) $(USERWARNFLAGS)
-USERAFLAGS := -D__ASSEMBLY__ $(USERCPPFLAGS)
-USERSTRIPFLAGS := --strip-all -R .comment -R .note
-
-USERLIBGCC := $(shell $(USERCC) --print-libgcc)
-USERSHAREDFLAGS := $(SHAREDFLAGS)
-USERCRT0 := $(obj...
2016 Oct 19
4
[PATCH] Fix for crash with certain EFIs
Hi Ady,
Would it work if we removed "ifdef EFI_BUILD" condition and just add
-mno-red-zone for all x86_64 builds? If not, do you have any ideas how
to pass this flag?
This could work, because the patch is adding the -mno-red-zone flag
only for x86_64 builds, which are only used in the form of the efi64
target. The efi32 and bios targets are both 32-bit.
BTW. I also tried 6.04-pre1 and
2005 Jul 26
2
[PATCH] better kbuild integration
...(srctree)/usr/include \
-Iinclude \
$(if $(KBUILD_SRC),-Iinclude2 -I$(srctree)/include) \
- -D__KLIBC__ -DBITSIZE=$(BITSIZE)
-USERCFLAGS := $(USERCPPFLAGS) $(ARCHREQFLAGS) $(OPTFLAGS) \
- $(USERWARNFLAGS)
+ -D__KLIBC__=1 -D__KLIBC_MINOR__=0 \
+ -DBITSIZE=$(BITSIZE)
+USERCFLAGS := $(USERCPPFLAGS) $(REQFLAGS) $(ARCHREQFLAGS) \
+ $(OPTFLAGS) $(USERWARNFLAGS)
USERAFL...
2005 Jul 30
3
kbuild updates to klibc
Hi Peter & others.
Here are three patches that does the following:
#1 - Update kbuild part of klibc so make clean works
Adds gzip including a sample kbuild file
#2 - Factor out definition of usr/ to two variables
#3 - Move kbuild files to reflect location in the kernel
As requested in earlier mail I need a bit of guidiance of what you
expect from the kernel integrated parts of klibc.
2011 Apr 11
0
[PATCH] Makefile: Move Makefile fragments into mk/
...xboot.c32
diff --git a/com32/gpllib/Makefile b/com32/gpllib/Makefile
index a174061..1c07068 100644
--- a/com32/gpllib/Makefile
+++ b/com32/gpllib/Makefile
@@ -4,7 +4,8 @@
# Include configuration rules
topdir = ../..
-include ../lib/MCONFIG
+MAKEDIR = $(topdir)/mk
+include $(MAKEDIR)/lib.mk
REQFLAGS += -I../gplinclude
diff --git a/com32/hdt/Makefile b/com32/hdt/Makefile
index 40ea3ac..5b55911 100644
--- a/com32/hdt/Makefile
+++ b/com32/hdt/Makefile
@@ -16,7 +16,8 @@
##
topdir = ../..
-include ../MCONFIG
+MAKEDIR = $(topdir)/mk
+include $(MAKEDIR)/com32.mk
LIBS = ../cmenu/libmenu/l...
2004 Aug 13
1
[PATCH] make spotless update
make spotless leaves 2 generated files.
diff -purN klibc-0.159.orig/klibc/Makefile klibc-0.159/klibc/Makefile
--- klibc-0.159.orig/klibc/Makefile 2004-08-03 23:07:05.000000000 +0200
+++ klibc-0.159/klibc/Makefile 2004-08-13 22:23:35.696699671 +0200
@@ -156,6 +156,7 @@ clean: archclean
rm -f sha1hash errlist.c
spotless: clean
+ rm -f include/klibc/havesyscall.h syscalls.nrs
find . \( -name
2015 Nov 27
8
[PATCH 0/2] Do not use the "red zone" on EFI
From: Sylvain Gault <sylvain.gault at gmail.com>
The System V ABI for x86-64 specify that a "red zone" is an area of 128 bytes
above the current stack frame. This area can be used by a called function in
order to avoid the overhead of modifying the stack pointer. The direct effect
is that interrupt/event/signal handlers must not write to this area. In the
UEFI calling convention,