Your message dated Mon, 15 Aug 2005 07:34:11 +0200
with message-id <[EMAIL PROTECTED]>
has caused the Debian Bug report #323154,
regarding header protection in <sys/syscall.h>
to be marked as having been forwarded to the upstream software
author(s) [EMAIL PROTECTED]

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---------------------------------------
Received: (at 323154-forwarded) by bugs.debian.org; 15 Aug 2005 05:27:28 +0000
>From [EMAIL PROTECTED] Sun Aug 14 22:27:28 2005
Return-path: <[EMAIL PROTECTED]>
Received: from 16.red-83-43-111.pooles.rima-tde.net (bombadil) [83.43.111.16] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1E4XVO-0000cb-00; Sun, 14 Aug 2005 22:27:28 -0700
Received: from rmh by bombadil with local (Exim 4.52)
        id 1E4Xbv-0000Sa-AN; Mon, 15 Aug 2005 07:34:11 +0200
To: [EMAIL PROTECTED]
Subject: [PATCH] header protection for <sys/syscall.h>
From: Robert Millan <[EMAIL PROTECTED]>
Reply-To: Robert Millan <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
X-send-pr-version: 3.113
X-GNATS-Notify: 
Message-Id: <[EMAIL PROTECTED]>
Date: Mon, 15 Aug 2005 07:34:11 +0200
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
        version=2.60-bugs.debian.org_2005_01_02


>Submitter-Id:  current-users
>Originator:    Robert Millan
>Organization:  
>Confidential:  no 
>Synopsis:      [PATCH] header protection for <sys/syscall.h>
>Severity:      non-critical
>Priority:      low
>Category:      kern
>Class:         sw-bug
>Release:       GNU/kFreeBSD 5.3-1 i686
>Environment:
System: GNU/kFreeBSD bombadil 5.3-1 #0 Sun Aug 14 12:51:55 CEST 2005 i686 
GNU/kFreeBSD


        
>Description:
        This patch implements header protection in <sys/syscall.h> by modifiing
        the generator script in sys/kern/makesyscalls.sh.

        Please could you apply and re-generate sys/syscall.h ?

        Thanks!
>How-To-Repeat:
        
>Fix:

diff -ur sys/kern/makesyscalls.sh~ sys/kern/makesyscalls.sh
--- sys/kern/makesyscalls.sh~   2003-12-23 04:50:43.000000000 +0100
+++ sys/kern/makesyscalls.sh    2005-08-14 15:05:41.000000000 +0200
@@ -13,6 +13,7 @@
 sysproto="../sys/sysproto.h"
 sysproto_h=_SYS_SYSPROTO_H_
 syshdr="../sys/syscall.h"
+syshdr_h=_SYS_SYSCALL_H_
 sysmk="../sys/syscall.mk"
 syssw="init_sysent.c"
 syscallprefix="SYS_"
@@ -72,6 +73,7 @@
                sysarg = \"$sysarg\"
                sysnames = \"$sysnames\"
                syshdr = \"$syshdr\"
+               syshdr_h = \"$syshdr_h\"
                sysmk = \"$sysmk\"
                compat = \"$compat\"
                compat4 = \"$compat4\"
@@ -137,6 +139,8 @@
                printf "const char *%s[] = {\n", namesname > sysnames
 
                printf " * created from%s\n */\n\n", $0 > syshdr
+               printf "#ifndef %s\n", syshdr_h > syshdr
+               printf "#define\t%s\n\n", syshdr_h > syshdr
 
                printf "# created from%s\nMIASM = ", $0 > sysmk
 
@@ -486,6 +490,7 @@
                printf("};\n") > sysnames
                printf("#define\t%sMAXSYSCALL\t%d\n", syscallprefix, syscall) \
                    > syshdr
+               printf("\n#endif /* !%s */\n", syshdr_h) > syshdr
        } '
 
 cat $sysinc $sysent >> $syssw



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to