I have taken another look into the toolchain building scripts and they add patches to

a) glibc-jz

b) gcc
cd ${BUILD_PATH}/${GCC_VER}/libiberty
cat strsignal.c | sed -e 's/#ifndef HAVE_PSIGNAL/#if 0/g' >junk.c
cp -f strsignal.c strsignal.c.fixed; mv -f junk.c strsignal.c

b) should not have any influence since it patches -liberty which is used by gcc itself. So it should only influence how gcc reacts on ctl-C. a) creates a modified glibc which is used as the basis for all user- space code. It should not have an influence on the kernel itself of course.

This brings up one question: what makes us sure that it is indeed a Kernel bug?

Or is simply the NPTL in the glibc broken? In that case the kernel would correctly report a stack corruption when trying to return from some function call.

Therefore we should run the Posix Test Suite!

http://sourceforge.net/project/showfiles.php?group_id=64592&release_id=332108

Unfortunately, I don't know if and how it can easily be adapted for cross-compilation. Maybe the easiest way would be to get a native toolchain to run on the 2.6 kernel (unless that one also comes with SIGILL). And then run the test suite there.

Nikolaus

_______________________________________________
Mipsbook-devel mailing list
Mipsbook-devel@linuxtogo.org
http://lists.linuxtogo.org/cgi-bin/mailman/listinfo/mipsbook-devel

Reply via email to