Displaying 20 results from an estimated 3000 matches similar to: "klibc-1.0.9 released"
2020 Apr 29
2
[PATCH klibc 1/3] Revert " Kbuild: Tell gas we don't want executable stacks"
This reverts commit 9d8d648e604026b32cad00a84ed6c29cbd157641, which
broke signal handing on some architectures.
On m68k and parisc, signal return depends on a trampoline that the
kernel writes on the stack. On alpha, s390, and sparc (32-bit), we
can avoid this by providing our own function as sa_restorer, but we
currently don't.
Signed-off-by: Ben Hutchings <ben at decadent.org.uk>
2015 Sep 29
2
ExecShield in C6 or C7 kernels?
I'm trying to figure out if the stock kernels for Centos-6 and/or Centos-7
have ExecShield compiled in, and if so, if it is turned on by default.
On my local C7 box I've been looking at/for indicators without a lot of
success:
/usr/lib/sysctl.d/00-system.conf. does not mention ExecShield at all.
/proc/sys/kernel has no entries for exec_shield
no mention of execshield in any of the files
2005 Apr 21
3
NX (execshield)
I heard something about execshield in some thread on OSnews.com.
Does CentOS4 have an execshield compiled kernel?
kind regards,
Peter
2020 Jun 25
5
process '/usr/bin/rsync' started with executable stack
On Thu, Jun 25, 2020 at 01:04:29PM +0300, Dan Carpenter wrote:
> On Wed, Jun 24, 2020 at 12:39:24PM -0700, Kees Cook wrote:
> > On Wed, Jun 24, 2020 at 07:51:48PM +0300, Dan Carpenter wrote:
> > > In Debian testing the initrd triggers the warning.
> > >
> > > [ 34.529809] process '/usr/bin/fstype' started with executable stack
> >
> >
2006 Jul 09
6
[PATCH/RFC] klibc/kbuild: use separate kbuild files for each klibc subdirectory
This fixes a long standing issue where it was not possible to
do "make usr/klibc/arch/x86_64/longjmp.o" in the kernel.
The principle is that all .o files to be part of klibc are listed
with klib-y. For each directory a klib.list file is made that specify
all .o file and the final AR then adds all .o files to create libc.a.
This patch introduce the infrastructure and converts x86_64 to
2016 Jan 06
5
[PATCH klibc 0/5] klibc architecture fixes
Here's an assortment of build and run-time fixes for various
architectures that we've applied in Debian.
Ben.
Aurelien Jarno (1):
ppc64: fix struct stat
Ben Hutchings (2):
MIPS: Update archfcntl.h
syscalls: Override detection of direct socket syscalls on i386, m68k,
s390
Helge Deller (1):
Add pread and pwrite 32bit syscall wrappers for parisc
Mauricio Faria de Oliveira
2006 Jun 28
35
[klibc 00/31] klibc as a historyless patchset (updated and reorganized)
I have updated the klibc patchset based on feedback received. In
particular, the patchset has been reorganized so as not to break
git-bisect.
Additionally, this updates the patch base to 2.6.17-git12
(d38b69689c349f35502b92e20dafb30c62d49d63) and klibc 1.4.8; the main
difference on the klibc side is removal of obsolete code.
This is also available as a git tree at:
2015 Sep 29
1
ExecShield in C6 or C7 kernels?
On Tue, Sep 29, 2015 at 08:49:21AM -0700, Akemi Yagi wrote:
> On Tue, Sep 29, 2015 at 7:37 AM, Fred Smith
> <fredex at fcshome.stoneham.ma.us> wrote:
> > I'm trying to figure out if the stock kernels for Centos-6 and/or Centos-7
> > have ExecShield compiled in, and if so, if it is turned on by default.
>
> According to what I've read, Exec Shield is enabled
2019 Jan 19
4
RFT: klibc 2.0.5
In preparation for the klibc 2.0.5 release I wrote a basic test script
which:
1. Builds for each architecture (with a cross-compiler where needed)
2. Runs several statically-linked programs (using qemu-user where
needed):
a. Many self-test programs
b. "sh -c exit"
c. "sh -c '.../bin/true; exit'"
The results for the architectures I was able to test are:
2005 Jun 17
2
Patch to support parisc
This patch allows klibc to build on parisc64 platforms.
$ diff -u MCONFIG.old MCONFIG
--- MCONFIG.old 2005-06-18 01:16:12.000000000 +0000
+++ MCONFIG 2005-06-18 01:18:51.000000000 +0000
@@ -33,7 +33,7 @@
KLIBCVER = -D__KLIBC__=$(shell cut -d. -f1 < $(SRCROOT)/version) \
-D__KLIBC_MINOR__=$(shell cut -d. -f2 < $(SRCROOT)/version)
-ARCH = $(shell uname -m | sed -e
2006 Jul 24
1
[PATCH] vfork() for parisc
Implement "pid_t vfork(void)" for parisc.
Signed-off-by: Kyle McMartin <kyle at parisc-linux.org>
---
Ugh. vfork() me harder.
Kbuild | 2 +-
vfork.S | 31 +++++++++++++++++++++++++++++++
2 files changed, 32 insertions(+), 1 deletion(-)
diff --git a/usr/klibc/arch/parisc/Kbuild b/usr/klibc/arch/parisc/Kbuild
index d57a873..57ca5c2 100644
--- a/usr/klibc/arch/parisc/Kbuild
2018 Oct 10
5
PROPOSAL: Extend inline asm syntax with size spec
On Wed, Oct 10, 2018 at 01:54:33PM -0500, Segher Boessenkool wrote:
> It would be great to hear from kernel people if it works adequately for
> what you guys want it for :-)
Sure, ping me when you have the final version and I'll try to build gcc
with it and do some size comparisons.
Thx.
--
Regards/Gruss,
Boris.
Good mailing practices for 400: avoid top-posting and trim the
2018 Oct 10
5
PROPOSAL: Extend inline asm syntax with size spec
On Wed, Oct 10, 2018 at 01:54:33PM -0500, Segher Boessenkool wrote:
> It would be great to hear from kernel people if it works adequately for
> what you guys want it for :-)
Sure, ping me when you have the final version and I'll try to build gcc
with it and do some size comparisons.
Thx.
--
Regards/Gruss,
Boris.
Good mailing practices for 400: avoid top-posting and trim the
2006 Jan 03
3
fix build failure on 64-bit parisc
On PA-RISC machines running in 64-bit mode, uname -m returns `parisc64'
instead of `parisc.' Thus, we must sed this to match like a few
other platforms.
From: Kyle McMartin <kyle@parisc-linux.org>
Signed-off-by: Kyle McMartin <kyle@parisc-linux.org>
diff --git a/Makefile b/Makefile
index 2b057b8..16a026d 100644
--- a/Makefile
+++ b/Makefile
@@ -14,7 +14,7 @@ include
2006 May 30
3
vfork support: need help on arm, parisc, s390
Hello all,
I really want to support vfork() in klibc, mostly because uClinux *has*
to use it. Unfortunately vfork() isn't allowed to use the stack *at
all* across the system call -- including return address -- which means
it needs an assembly wrapper on most architectures.
I have tried implementing wrappers for most architectures, but I don't
know parisc or s390/s390x well enough,
2018 Nov 30
8
[PATCH RFC 00/15] Zero ****s, hugload of hugs <3
In order to comply with the CoC, replace **** with a hug.
Jarkko Sakkinen (15):
MIPS: replace **** with a hug
Documentation: replace **** with a hug
drm/nouveau: replace **** with a hug
m68k: replace **** with a hug
parisc: replace **** with a hug
cpufreq: replace **** with a hug
ide: replace **** with a hug
media: replace **** with a hug
mtd: replace **** with a hug
2016 Oct 25
7
[GIT PULL v2 0/5] cpu_relax: drop lowlatency, introduce yield
Peter,
here is v2 with some improved patch descriptions and some fixes. The
previous version has survived one day of linux-next and I only changed
small parts.
So unless there is some other issue, feel free to pull (or to apply
the patches) to tip/locking.
The following changes since commit 07d9a380680d1c0eb51ef87ff2eab5c994949e69:
Linux 4.9-rc2 (2016-10-23 17:10:14 -0700)
are available in
2016 Oct 25
7
[GIT PULL v2 0/5] cpu_relax: drop lowlatency, introduce yield
Peter,
here is v2 with some improved patch descriptions and some fixes. The
previous version has survived one day of linux-next and I only changed
small parts.
So unless there is some other issue, feel free to pull (or to apply
the patches) to tip/locking.
The following changes since commit 07d9a380680d1c0eb51ef87ff2eab5c994949e69:
Linux 4.9-rc2 (2016-10-23 17:10:14 -0700)
are available in
2015 Sep 29
0
ExecShield in C6 or C7 kernels?
On Tue, Sep 29, 2015 at 7:37 AM, Fred Smith
<fredex at fcshome.stoneham.ma.us> wrote:
> I'm trying to figure out if the stock kernels for Centos-6 and/or Centos-7
> have ExecShield compiled in, and if so, if it is turned on by default.
According to what I've read, Exec Shield is enabled in CentOS-6 and -7
by default. In CentOS-6, you can see it by:
sysctl -a | grep -i shield
2003 Jan 14
1
myths about upwards growing stacks
just downloaded klibc 0.72 and took a look. first thing i found was that
the URL for latest version is out of date:
klibc is archived at:
ftp://ftp.zytor.com/pub/linux/libs/klibc/
the `libs/' is superfluous.
more importantly, this piece of code in klibc/arch/README is wrong:
#if STACK_GROWS_UP
argc = (int)*argptr--;
argv = (char **)argptr;
envp = argv-(argc+1);
#else
argc