Bug#323154: marked as forwarded (header protection in <sys/syscall.h>)
Your message dated Mon, 15 Aug 2005 07:34:11 +0200
with message-id <E1E4Xbv-0000Sa-AN@bombadil>
has caused the Debian Bug report #323154,
regarding header protection in <sys/syscall.h>
to be marked as having been forwarded to the upstream software
author(s) FreeBSD-gnats-submit@freebsd.org.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
---------------------------------------
Received: (at 323154-forwarded) by bugs.debian.org; 15 Aug 2005 05:27:28 +0000
>From rmh@khazad.dyndns.org Sun Aug 14 22:27:28 2005
Return-path: <rmh@khazad.dyndns.org>
Received: from 16.red-83-43-111.pooles.rima-tde.net (bombadil) [83.43.111.16]
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1E4XVO-0000cb-00; Sun, 14 Aug 2005 22:27:28 -0700
Received: from rmh by bombadil with local (Exim 4.52)
id 1E4Xbv-0000Sa-AN; Mon, 15 Aug 2005 07:34:11 +0200
To: FreeBSD-gnats-submit@freebsd.org
Subject: [PATCH] header protection for <sys/syscall.h>
From: Robert Millan <rmh@aybabtu.com>
Reply-To: Robert Millan <rmh@aybabtu.com>
Cc: 323154-forwarded@bugs.debian.org
X-send-pr-version: 3.113
X-GNATS-Notify:
Message-Id: <E1E4Xbv-0000Sa-AN@bombadil>
Date: Mon, 15 Aug 2005 07:34:11 +0200
Delivered-To: 323154-forwarded@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no
version=2.60-bugs.debian.org_2005_01_02
>Submitter-Id: current-users
>Originator: Robert Millan
>Organization:
>Confidential: no
>Synopsis: [PATCH] header protection for <sys/syscall.h>
>Severity: non-critical
>Priority: low
>Category: kern
>Class: sw-bug
>Release: GNU/kFreeBSD 5.3-1 i686
>Environment:
System: GNU/kFreeBSD bombadil 5.3-1 #0 Sun Aug 14 12:51:55 CEST 2005 i686 GNU/kFreeBSD
>Description:
This patch implements header protection in <sys/syscall.h> by modifiing
the generator script in sys/kern/makesyscalls.sh.
Please could you apply and re-generate sys/syscall.h ?
Thanks!
>How-To-Repeat:
>Fix:
diff -ur sys/kern/makesyscalls.sh~ sys/kern/makesyscalls.sh
--- sys/kern/makesyscalls.sh~ 2003-12-23 04:50:43.000000000 +0100
+++ sys/kern/makesyscalls.sh 2005-08-14 15:05:41.000000000 +0200
@@ -13,6 +13,7 @@
sysproto="../sys/sysproto.h"
sysproto_h=_SYS_SYSPROTO_H_
syshdr="../sys/syscall.h"
+syshdr_h=_SYS_SYSCALL_H_
sysmk="../sys/syscall.mk"
syssw="init_sysent.c"
syscallprefix="SYS_"
@@ -72,6 +73,7 @@
sysarg = \"$sysarg\"
sysnames = \"$sysnames\"
syshdr = \"$syshdr\"
+ syshdr_h = \"$syshdr_h\"
sysmk = \"$sysmk\"
compat = \"$compat\"
compat4 = \"$compat4\"
@@ -137,6 +139,8 @@
printf "const char *%s[] = {\n", namesname > sysnames
printf " * created from%s\n */\n\n", $0 > syshdr
+ printf "#ifndef %s\n", syshdr_h > syshdr
+ printf "#define\t%s\n\n", syshdr_h > syshdr
printf "# created from%s\nMIASM = ", $0 > sysmk
@@ -486,6 +490,7 @@
printf("};\n") > sysnames
printf("#define\t%sMAXSYSCALL\t%d\n", syscallprefix, syscall) \
> syshdr
+ printf("\n#endif /* !%s */\n", syshdr_h) > syshdr
} '
cat $sysinc $sysent >> $syssw
Reply to: