search for: reqflags

Displaying 20 results from an estimated 27 matches for "reqflags".

2005 Aug 25
3
Adding -nostdlib to REQFLAGS
Skipped content of type multipart/mixed-------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: This is a digitally signed message part Url : http://www.vas.nu/pipermail/klibc/attachments/20050825/0e6d8370/attachment.bin
2008 Aug 05
2
Leopard Macs using Kerberos: Failed to parse negTokenTarg
I think I've found out why MacOS 10.5.x (Leopard) clients are unable to connect to Samba shares when authenticating with Kerberos. Basically, the Leopard Macs insert a few extra bytes (Padding and reqFlags, according to wireshark) into the security blob within the Session Setup AndX Request packet, bytes whose start tag is 0xa1, in a spot where Samba's parser expects 0xa2. The critical error is "Failed to parse negTokenTarg at offset 54", which looks like it's being caused by th...
2005 Apr 09
0
not everybody uses bash
...$@ - echo "CC=$(shell bash -c 'type -p $(CC)')" >> $@ - echo "LD=$(shell bash -c 'type -p $(LD)')" >> $@ + echo "CC=$(shell which gcc)" >> $@ + echo "LD=$(shell which ld)" >> $@ echo 'REQFLAGS=$(filter-out -I%,$(REQFLAGS))' >> $@ echo 'OPTFLAGS=$(OPTFLAGS)' >> $@ echo 'LDFLAGS=$(LDFLAGS)' >> $@ - echo "STRIP=$(shell bash -c 'type -p $(STRIP)')" >> $@ + echo "STRIP=$(shell which strip)" &gt...
2019 Feb 19
0
[klibc:master] klcc: Enable stripping even if CONFIG_DEBUG_INFO is enabled
...ings <ben at decadent.org.uk> --- klcc/Kbuild | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/klcc/Kbuild b/klcc/Kbuild index e62c3f12..eae753ff 100644 --- a/klcc/Kbuild +++ b/klcc/Kbuild @@ -18,7 +18,7 @@ $(obj)/$(KLIBCCROSS)klibc.config: $(src)/Kbuild \ $(Q)echo 'REQFLAGS=$(filter-out -I%,$(KLIBCDEFS) $(KLIBCREQFLAGS) $(KLIBCARCHREQFLAGS) $(KLIBCCPPFLAGS))' >> $@ $(Q)echo 'OPTFLAGS=$(KLIBCOPTFLAGS)' >> $@ $(Q)echo 'LDFLAGS=$(KLIBCLDFLAGS)' >> $@ - $(Q)echo 'STRIP=$(KLIBCSTRIP)' >> $@ + $(Q)echo 'STRIP=$(STR...
2004 Feb 21
1
[PATCH] sleep for klibc utils
.../utils/Makefile klibc-0.111.utils/utils/Makefile --- klibc-0.111/utils/Makefile 2004-02-10 00:18:15.000000000 +0100 +++ klibc-0.111.utils/utils/Makefile 2004-02-21 22:33:08.000000000 +0100 @@ -5,7 +5,7 @@ include ../MRULES MAKEDEPS = -Wp,-MD,.$(subst /,-,$*).d CFLAGS = $(MAKEDEPS) $(OPTFLAGS) $(REQFLAGS) -W -Wall LIBS = $(KLIBC) $(LIBGCC) -PROGS = chroot dd fstype mkdir mkfifo mount pivot_root umount true false +PROGS = chroot dd fstype mkdir mkfifo mount pivot_root umount true false sleep all: $(PROGS) @@ -39,6 +39,9 @@ true: true.o $(CRT0) $(LIBS) false: false.o $(CRT0) $(LIBS)...
2004 Feb 21
1
[PATCH] ln for klibc utils
...klibc-0.112/utils/Makefile klibc-0.112.utils/utils/Makefile --- klibc-0.112/utils/Makefile 2004-02-21 23:49:26.000000000 +0100 +++ klibc-0.112.utils/utils/Makefile 2004-02-22 01:23:17.000000000 +0100 @@ -6,7 +6,7 @@ MAKEDEPS = -Wp,-MD,.$(subst /,-,$*). CFLAGS = $(MAKEDEPS) $(OPTFLAGS) $(REQFLAGS) -W -Wall LIBS = $(KLIBC) $(LIBGCC) PROGS := chroot dd fstype mkdir mkfifo mount pivot_root umount \ - true false sleep + true false sleep ln STATICPROGS := $(patsubst %,static/%,$(PROGS)) SHAREDPROGS := $(patsubst %,shared/%,$(PROGS)) LIBOBJS = file_mode.o dif...
2004 Feb 27
0
hotplug for klibc utils
...xit 1; Arnd <>< diff -urN klibc-0.115/utils/Makefile klibc-0.115-hotplug/utils/Makefile --- klibc-0.115/utils/Makefile 2004-02-22 01:57:32.000000000 +0100 +++ klibc-0.115-hotplug/utils/Makefile 2004-02-27 11:00:40.000000000 +0100 @@ -6,7 +6,7 @@ CFLAGS = $(MAKEDEPS) $(OPTFLAGS) $(REQFLAGS) -W -Wall LIBS = $(KLIBC) $(LIBGCC) PROGS := chroot dd fstype mkdir mkfifo mount pivot_root umount \ - true false sleep ln + true false sleep ln hotplug STATICPROGS := $(patsubst %,static/%,$(PROGS)) SHAREDPROGS := $(patsubst %,shared/%,$(PROGS)) LIBOBJS = file...
2014 Dec 17
0
[PATCH] build: sort sources to build in a more deterministic way
...-f $(patsubst %.menu,%.c,$(sort $(wildcard *.menu))) spotless: clean libclean menuclean rm -f *~ \#* *.c32 diff --git a/com32/gpllib/Makefile b/com32/gpllib/Makefile index e3e30d7..1fec914 100644 --- a/com32/gpllib/Makefile +++ b/com32/gpllib/Makefile @@ -8,7 +8,7 @@ include $(MAKEDIR)/lib.mk REQFLAGS += -I$(SRC)/../gplinclude -I$(SRC)/../gplinclude/zzjson GPLDIRS := $(SRC) $(addprefix $(SRC)/,disk dmi vpd acpi zzjson) -LIBOBJS := $(subst $(SRC)/,,$(foreach dir,$(GPLDIRS),$(patsubst %.c,%.o,$(wildcard $(dir)/*.c)))) +LIBOBJS := $(subst $(SRC)/,,$(foreach dir,$(GPLDIRS),$(patsubst %.c,%.o,$(so...
2004 Sep 05
1
[PATCH] simple rm command
...-purN klibc-0.172/utils/Makefile klibc-0.172.rm/utils/Makefile --- klibc-0.172/utils/Makefile 2004-08-14 00:24:20.000000000 +0200 +++ klibc-0.172.rm/utils/Makefile 2004-09-05 20:11:14.109062216 +0200 @@ -6,7 +6,7 @@ MAKEDEPS = -Wp,-MD,.$(subst /,-,$*). CFLAGS = $(MAKEDEPS) $(OPTFLAGS) $(REQFLAGS) -W -Wall LIBS = $(KLIBC) $(LIBGCC) PROGS := chroot dd fstype mkdir mkfifo mount pivot_root umount \ - true false sleep ln nuke minips run-init printf + true false sleep ln nuke minips run-init printf rm STATICPROGS := $(patsubst %,static/%,$(PROGS)) SHAREDPROGS := $...
2016 Oct 20
0
[PATCH] Fix for crash with certain EFIs
...k/lib.mk @@ -12,6 +12,9 @@ endif ifeq ($(ARCH),x86_64) GCCOPT += $(call gcc_ok,-m64,) +ifeq ($(FWCLASS),EFI) + GCCOPT += $(call gcc_ok,-mno-red-zone) +endif #let preferred-stack-boundary be default(=4) MARCH = x86-64 endif @@ -54,9 +57,7 @@ CFLAGS = $(OPTFLAGS) $(REQFLAGS) $(WARNFLAGS) $(LIBFLAGS) -ifeq ($(FWCLASS),EFI) -CFLAGS += -mno-red-zone -else +ifneq ($(FWCLASS),EFI) CFLAGS += -mregparm=3 -DREGPARM=3 endif
2018 Aug 02
1
[PATCH 1/2] Add fabs() implementation
When we add -ffreestanding the compiler won't get to inline this any more. Signed-off-by: David Woodhouse <dwmw2 at infradead.org> --- com32/lib/math/fabs.S | 15 +++++++++++++++ mk/lib.mk | 2 +- 2 files changed, 16 insertions(+), 1 deletion(-) create mode 100644 com32/lib/math/fabs.S diff --git a/com32/lib/math/fabs.S b/com32/lib/math/fabs.S new file mode 100644 index
2005 Mar 07
0
gcc4 warnings
..._SUPPORTED */ - png_structp png_ptr; + volatile png_structp png_ptr; #ifdef PNG_SETJMP_SUPPORTED #ifdef USE_FAR_KEYWORD --- syslinux-3.07/com32/lib/MCONFIG.gcc4 2005-03-07 11:28:15.000000000 -0500 +++ syslinux-3.07/com32/lib/MCONFIG 2005-03-07 11:28:59.000000000 -0500 @@ -18,7 +18,7 @@ REQFLAGS = -g -m32 -mregparm=3 -DREGPARM=3 -D__COM32__ -I. -I./sys -I../include OPTFLAGS = -Os -march=i386 -falign-functions=0 -falign-jumps=0 \ - -falign-labels=0 + -falign-labels=0 -finline-limit=1000 WARNFLAGS = -W -Wall -Wpointer-arith -Wwrite-strings -Wstrict-prototypes -Winline CFLAGS...
2018 Jun 25
2
Samba 4.7.1 Generating Core Dumps
...out_mem_ctx=out_mem_ctx at entry=0x55b48e6156c0, ---Type <return> to continue, or q <return> to quit--- ev=ev at entry=0x55b48e614920, out=out at entry=0x55b48e6104c0, in=...) at ../auth/gensec/spnego.c:468 spnego_out = {type = -1, negTokenInit = {mechTypes = 0x55b48e610370, reqFlags = {data = 0x80 <Address 0x80 out of bounds>, length = 140471707458339}, reqFlagsPadding = 0 '\000', mechToken = { data = 0x7ffcba8c556f "", length = 140723438245232}, mechListMIC = {data = 0x7fc21e396881 <asn1_peek_full_tag+81> "\204\300t\aD:t$\017t\...
2005 Jul 29
1
move kbuild files to reflect dir structure in kernel
...\ - -Iinclude \ - $(if $(KBUILD_SRC),-Iinclude2 -I$(srctree)/include) \ - -D__KLIBC__=1 -D__KLIBC_MINOR__=0 \ - -DBITSIZE=$(BITSIZE) -USERCFLAGS := $(USERCPPFLAGS) $(REQFLAGS) $(ARCHREQFLAGS) \ - $(OPTFLAGS) $(USERWARNFLAGS) -USERAFLAGS := -D__ASSEMBLY__ $(USERCPPFLAGS) -USERSTRIPFLAGS := --strip-all -R .comment -R .note - -USERLIBGCC := $(shell $(USERCC) --print-libgcc) -USERSHAREDFLAGS := $(SHAREDFLAGS) -USERCRT0 := $(objt...
2016 Oct 19
4
[PATCH] Fix for crash with certain EFIs
Hi Ady, Would it work if we removed "ifdef EFI_BUILD" condition and just add -mno-red-zone for all x86_64 builds? If not, do you have any ideas how to pass this flag? This could work, because the patch is adding the -mno-red-zone flag only for x86_64 builds, which are only used in the form of the efi64 target. The efi32 and bios targets are both 32-bit. BTW. I also tried 6.04-pre1 and
2005 Jul 26
2
[PATCH] better kbuild integration
...(srctree)/usr/include \ -Iinclude \ $(if $(KBUILD_SRC),-Iinclude2 -I$(srctree)/include) \ - -D__KLIBC__ -DBITSIZE=$(BITSIZE) -USERCFLAGS := $(USERCPPFLAGS) $(ARCHREQFLAGS) $(OPTFLAGS) \ - $(USERWARNFLAGS) + -D__KLIBC__=1 -D__KLIBC_MINOR__=0 \ + -DBITSIZE=$(BITSIZE) +USERCFLAGS := $(USERCPPFLAGS) $(REQFLAGS) $(ARCHREQFLAGS) \ + $(OPTFLAGS) $(USERWARNFLAGS) USERAFLA...
2005 Jul 30
3
kbuild updates to klibc
Hi Peter & others. Here are three patches that does the following: #1 - Update kbuild part of klibc so make clean works Adds gzip including a sample kbuild file #2 - Factor out definition of usr/ to two variables #3 - Move kbuild files to reflect location in the kernel As requested in earlier mail I need a bit of guidiance of what you expect from the kernel integrated parts of klibc.
2011 Apr 11
0
[PATCH] Makefile: Move Makefile fragments into mk/
...xboot.c32 diff --git a/com32/gpllib/Makefile b/com32/gpllib/Makefile index a174061..1c07068 100644 --- a/com32/gpllib/Makefile +++ b/com32/gpllib/Makefile @@ -4,7 +4,8 @@ # Include configuration rules topdir = ../.. -include ../lib/MCONFIG +MAKEDIR = $(topdir)/mk +include $(MAKEDIR)/lib.mk REQFLAGS += -I../gplinclude diff --git a/com32/hdt/Makefile b/com32/hdt/Makefile index 40ea3ac..5b55911 100644 --- a/com32/hdt/Makefile +++ b/com32/hdt/Makefile @@ -16,7 +16,8 @@ ## topdir = ../.. -include ../MCONFIG +MAKEDIR = $(topdir)/mk +include $(MAKEDIR)/com32.mk LIBS = ../cmenu/libmenu/li...
2004 Aug 13
1
[PATCH] make spotless update
make spotless leaves 2 generated files. diff -purN klibc-0.159.orig/klibc/Makefile klibc-0.159/klibc/Makefile --- klibc-0.159.orig/klibc/Makefile 2004-08-03 23:07:05.000000000 +0200 +++ klibc-0.159/klibc/Makefile 2004-08-13 22:23:35.696699671 +0200 @@ -156,6 +156,7 @@ clean: archclean rm -f sha1hash errlist.c spotless: clean + rm -f include/klibc/havesyscall.h syscalls.nrs find . \( -name
2015 Nov 27
8
[PATCH 0/2] Do not use the "red zone" on EFI
From: Sylvain Gault <sylvain.gault at gmail.com> The System V ABI for x86-64 specify that a "red zone" is an area of 128 bytes above the current stack frame. This area can be used by a called function in order to avoid the overhead of modifying the stack pointer. The direct effect is that interrupt/event/signal handlers must not write to this area. In the UEFI calling convention,