[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#323154: marked as forwarded (header protection in <sys/syscall.h>)



Your message dated Mon, 15 Aug 2005 07:34:11 +0200
with message-id <E1E4Xbv-0000Sa-AN@bombadil>
has caused the Debian Bug report #323154,
regarding header protection in <sys/syscall.h>
to be marked as having been forwarded to the upstream software
author(s) FreeBSD-gnats-submit@freebsd.org.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---------------------------------------
Received: (at 323154-forwarded) by bugs.debian.org; 15 Aug 2005 05:27:28 +0000
>From rmh@khazad.dyndns.org Sun Aug 14 22:27:28 2005
Return-path: <rmh@khazad.dyndns.org>
Received: from 16.red-83-43-111.pooles.rima-tde.net (bombadil) [83.43.111.16] 
	by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
	id 1E4XVO-0000cb-00; Sun, 14 Aug 2005 22:27:28 -0700
Received: from rmh by bombadil with local (Exim 4.52)
	id 1E4Xbv-0000Sa-AN; Mon, 15 Aug 2005 07:34:11 +0200
To: FreeBSD-gnats-submit@freebsd.org
Subject: [PATCH] header protection for <sys/syscall.h>
From: Robert Millan <rmh@aybabtu.com>
Reply-To: Robert Millan <rmh@aybabtu.com>
Cc: 323154-forwarded@bugs.debian.org
X-send-pr-version: 3.113
X-GNATS-Notify: 
Message-Id: <E1E4Xbv-0000Sa-AN@bombadil>
Date: Mon, 15 Aug 2005 07:34:11 +0200
Delivered-To: 323154-forwarded@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
	version=2.60-bugs.debian.org_2005_01_02


>Submitter-Id:	current-users
>Originator:	Robert Millan
>Organization:	
>Confidential:	no 
>Synopsis:	[PATCH] header protection for <sys/syscall.h>
>Severity:	non-critical
>Priority:	low
>Category:	kern
>Class:		sw-bug
>Release:	GNU/kFreeBSD 5.3-1 i686
>Environment:
System: GNU/kFreeBSD bombadil 5.3-1 #0 Sun Aug 14 12:51:55 CEST 2005 i686 GNU/kFreeBSD


	
>Description:
	This patch implements header protection in <sys/syscall.h> by modifiing
        the generator script in sys/kern/makesyscalls.sh.

        Please could you apply and re-generate sys/syscall.h ?

        Thanks!
>How-To-Repeat:
	
>Fix:

diff -ur sys/kern/makesyscalls.sh~ sys/kern/makesyscalls.sh
--- sys/kern/makesyscalls.sh~   2003-12-23 04:50:43.000000000 +0100
+++ sys/kern/makesyscalls.sh    2005-08-14 15:05:41.000000000 +0200
@@ -13,6 +13,7 @@
 sysproto="../sys/sysproto.h"
 sysproto_h=_SYS_SYSPROTO_H_
 syshdr="../sys/syscall.h"
+syshdr_h=_SYS_SYSCALL_H_
 sysmk="../sys/syscall.mk"
 syssw="init_sysent.c"
 syscallprefix="SYS_"
@@ -72,6 +73,7 @@
                sysarg = \"$sysarg\"
                sysnames = \"$sysnames\"
                syshdr = \"$syshdr\"
+               syshdr_h = \"$syshdr_h\"
                sysmk = \"$sysmk\"
                compat = \"$compat\"
                compat4 = \"$compat4\"
@@ -137,6 +139,8 @@
                printf "const char *%s[] = {\n", namesname > sysnames
 
                printf " * created from%s\n */\n\n", $0 > syshdr
+               printf "#ifndef %s\n", syshdr_h > syshdr
+               printf "#define\t%s\n\n", syshdr_h > syshdr
 
                printf "# created from%s\nMIASM = ", $0 > sysmk
 
@@ -486,6 +490,7 @@
                printf("};\n") > sysnames
                printf("#define\t%sMAXSYSCALL\t%d\n", syscallprefix, syscall) \
                    > syshdr
+               printf("\n#endif /* !%s */\n", syshdr_h) > syshdr
        } '
 
 cat $sysinc $sysent >> $syssw




Reply to: