Displaying 16 results from an estimated 16 matches for "sa_nodef".
Did you mean:
sa_nodefer
2014 Sep 05
4
[LLVMdev] [cfe-dev] Address sanitizer regression test failures for PPC64 targets
Note that I've set the SA_NODEFER flag for the SEGV handler in the
ASan runtime only a couple of days ago.
Not sure that could've affected this test though; without that flag
the second SEGV would've simply crashed the program. But you can try
removing the flag from
compiler-rt/trunk/lib/sanitizer_common/sanitizer_posix_l...
2014 Oct 01
2
[LLVMdev] [cfe-dev] Address sanitizer regression test failures for PPC64 targets
On Mon, Sep 8, 2014 at 7:00 PM, Samuel F Antao <sfantao at us.ibm.com> wrote:
> Alexey, Alexander,
>
> Thanks for the suggestions. I tried removing the flag SA_NODEFER but it
> didn't do any good... I have been digging into the problem with the
> null_deref test today but I was unable to clearly identify the problem. I
> suspect that it was either a bug with the calling convention/unwinding that
> lead to the flags() pointer to get corrupted. It...
2010 Jan 11
0
[PATCH] Fix arm signals
...INFO deliver the signal with SIGINFO structs
+ * SA_THIRTYTWO delivers the signal in 32-bit mode, even if the task
+ * is running in 26-bit.
+ * SA_ONSTACK allows alternate signal stacks (see sigaltstack(2)).
+ * SA_RESTART flag to get restarting signals (which were the default long ago)
+ * SA_NODEFER prevents the current signal from being masked in the handler.
+ * SA_RESETHAND clears the handler when the signal is delivered.
+ *
+ * SA_ONESHOT and SA_NOMASK are the historical Linux names for the Single
+ * Unix names RESETHAND and NODEFER respectively.
+ */
+#define SA_NOCLDSTOP 0x00000001...
2014 Sep 26
2
[LLVMdev] [cfe-dev] Address sanitizer regression test failures for PPC64 targets
On Mon, 2014-09-08 at 22:00 -0400, Samuel F Antao wrote:
> Alexey, Alexander,
>
> Thanks for the suggestions. I tried removing the flag SA_NODEFER but
> it didn't do any good... I have been digging into the problem with the
> null_deref test today but I was unable to clearly identify the
> problem. I suspect that it was either a bug with the calling
> convention/unwinding that lead to the flags() pointer to get
> corrupte...
2020 Aug 27
0
[klibc:master] alpha: Fix definitions of _NSIG and struct sigaction
...SIGVTALRM 26
+#define SIGPROF 27
+#define SIGWINCH 28
+#define SIGINFO 29
+#define SIGUSR1 30
+#define SIGUSR2 31
+
+#define SIGPOLL SIGIO
+#define SIGPWR SIGINFO
+#define SIGIOT SIGABRT
+
+#define SA_ONSTACK 0x00000001
+#define SA_RESTART 0x00000002
+#define SA_NOCLDSTOP 0x00000004
+#define SA_NODEFER 0x00000008
+#define SA_RESETHAND 0x00000010
+#define SA_NOCLDWAIT 0x00000020
+#define SA_SIGINFO 0x00000040
+
+#define SA_ONESHOT SA_RESETHAND
+#define SA_NOMASK SA_NODEFER
+
+#define MINSIGSTKSZ 4096
+#define SIGSTKSZ 16384
+
+#define SIG_BLOCK 1
+#define SIG_UNBLOCK 2
+#define SIG_SETMASK 3
+
+...
2009 Dec 16
2
Build fix on HURD
I've made two little patches to allow dovecot to be compiled on GNU/Hurd.
Could you review them?
Kind regards,
Marco Nenciarini
--
---------------------------------------------------------------------
| Marco Nenciarini | Debian/GNU Linux Developer - Plug Member |
| mnencia at prato.linux.it | http://www.prato.linux.it/~mnencia |
2011 Aug 08
0
[PATCH/RFC] Add initial avr32 port
...when children stop.
+ * SA_NOCLDWAIT flag on SIGCHLD to inhibit zombies.
+ * SA_SIGINFO deliver the signal with SIGINFO structs
+ * SA_ONSTACK indicates that a registered stack_t will be used.
+ * SA_RESTART flag to get restarting signals (which were the default long ago)
+ * SA_NODEFER prevents the current signal from being masked in the handler.
+ * SA_RESETHAND clears the handler when the signal is delivered.
+ *
+ * SA_ONESHOT and SA_NOMASK are the historical Linux names for the Single
+ * Unix names RESETHAND and NODEFER respectively.
+ */
+#define SA_NOCLDSTOP...
2010 Nov 05
4
xe cli not working on remote machine
...8000
brk(0x9249000) = 0x9249000
mmap2(NULL, 516096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xfffffffff76f4000
sigaltstack({ss_sp=0x8155860, ss_flags=0x2000 /* SS_??? */, ss_size=578935014240055448}, NULL) = 0
rt_sigaction(SIGSEGV, {0x808dd5e, [], SA_STACK|SA_NODEFER}, NULL, 8) = 0
readlink("/proc/self/exe", "/root/xe", 256) = 8
stat64("/root/xe", {st_mode=S_IFREG|0755, st_size=1345687, ...}) = 0
_llseek(0, 0, 0xffd06fe0, SEEK_CUR) = -1 ESPIPE (Illegal seek)
_llseek(1, 0, 0xffd06fd0, SEEK_CUR) = -1 ESPIPE (Illegal seek)
_...
2009 May 14
0
[LLVMdev] Grouping related functions in a code section
...Then we
have:
unsigned long v = STUB_CODE +
(unsigned long) stub_segv_handler - // a function stored in this page
(unsigned long) &__syscall_stub_start; // from linker script
set_sigstack((void *) STUB_DATA, UM_KERN_PAGE_SIZE);
sigemptyset(&sa.sa_mask);
sa.sa_flags = SA_ONSTACK | SA_NODEFER;
sa.sa_handler = (void *) v; // Use this function.
The stub_segv_handler function is defined with:
void __attribute__ ((__section__ (".__syscall_stub")))
stub_segv_handler(int sig) {...}
I don't actually quite understand the reason all these gyrations are
necessary and why it can...
2009 May 11
3
[LLVMdev] Assign symbol the address of a section
Hello,
The binaries produced by LLVM and other compilers divide code up into
various sections, e.g. the .text section.
What is the recommended approach to assigning a symbol the address of a
section using LLVM? Using GCC/LD, you can do this with a linker script,
e.g. in a linker script you can do:
_text = .;
_stext = .;
These symbols are then available in the corresponding C code using an
2011 Aug 16
2
[PATCH] test: Add signal nodefer
...quot;not blocked");
+}
+
+int main(int argc, char **argv)
+{
+ pid_t pid;
+
+ pid = fork();
+ if (pid == -1) {
+ perror("fork");
+ exit(EXIT_FAILURE);
+ } else if (!pid) {
+ struct sigaction act;
+
+ memset(&act, 0, sizeof(act));
+ act.sa_handler = handler;
+ act.sa_flags = SA_NODEFER;
+
+ sigaddset(&act.sa_mask, SIGUSR2);
+ sigaddset(&act.sa_mask, SIGTERM);
+
+ sigaction(SIGUSR1, &act, NULL);
+
+ pause();
+ } else {
+ int status;
+
+ sleep(3);
+ kill(pid, SIGUSR1);
+ waitpid(pid, &status, 0);
+ }
+
+ return 0;
+}
--
1.7.5.4
2006 Jun 26
0
[klibc 24/43] i386 support for klibc
...due to historical reasons. Use the
+ * SA_RESTART flag to get restarting signals (which were the default long ago)
+ * SA_NOCLDSTOP flag to turn off SIGCHLD when children stop.
+ * SA_RESETHAND clears the handler when the signal is delivered.
+ * SA_NOCLDWAIT flag on SIGCHLD to inhibit zombies.
+ * SA_NODEFER prevents the current signal from being masked in the handler.
+ *
+ * SA_ONESHOT and SA_NOMASK are the historical Linux names for the Single
+ * Unix names RESETHAND and NODEFER respectively.
+ */
+#define SA_NOCLDSTOP 0x00000001u
+#define SA_NOCLDWAIT 0x00000002u
+#define SA_SIGINFO 0x00000004u...
2016 Feb 16
2
[PATCH] fish: reset the console on ^Z RHBZ#1213844
Patch registers SIGTSTP hook where it sends reset terminal color control
sequence.
Maros Zatko (1):
fish: reset the console on ^Z RHBZ#1213844
fish/fish.c | 72 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 72 insertions(+)
--
2.5.0
2014 Sep 05
2
[LLVMdev] Address sanitizer regression test failures for PPC64 targets
Hi all,
I have been experiencing the failure of the address sanitizer regression
tests for a PPC64 target (Power7 machine). My understanding is that most of
the failures are related with the fact the stack is not being dumped.
I tried to understand what might be wrong and started by looking into the
null_deref.cc test as it hangs during the test run. I observe that after
the detection of the
2010 Feb 02
0
build failures with 2.6.33-rc
.../../include/signal.h:14,
from usr/klibc/../include/sys/select.h:11,
from usr/klibc/../include/unistd.h:12,
from usr/klibc/../include/stdio.h:11,
from usr/klibc/vsnprintf.c:13:
linux/include/asm-generic/signal.h:72:1: warning: "SA_NODEFER" redefined
In file included from usr/klibc/../include/signal.h:14,
from usr/klibc/../include/sys/select.h:11,
from usr/klibc/../include/unistd.h:12,
from usr/klibc/../include/stdio.h:11,
from usr/klibc/vsnprintf.c:13:
usr/in...
2006 Jun 28
35
[klibc 00/31] klibc as a historyless patchset (updated and reorganized)
I have updated the klibc patchset based on feedback received. In
particular, the patchset has been reorganized so as not to break
git-bisect.
Additionally, this updates the patch base to 2.6.17-git12
(d38b69689c349f35502b92e20dafb30c62d49d63) and klibc 1.4.8; the main
difference on the klibc side is removal of obsolete code.
This is also available as a git tree at: