Re: Missing linux-headers

2022-10-09 Thread Scott J. Crouch
On 9/10/22 17:10, neutrino network wrote:
> This is a test on a patched kernel. The patch has an API for userspace 
> programs.

Ok, ignore what I said earlier.  Headers necessary for using the user-space API
are exported with the *user-space* headers.  That's the stuff sitting in
/include/uapi/ (and some other parts).

> Trying to install headers with "sudo yum -y install kernel-headers" returns 
> that headers are already installed even its removal reinstall the old kernel 
> headers
>  Triedalso "yum install kernel-headers-$(uname -r)|| " !

These are indeed the user-space headers.  However, if your kernel patch is
private, then any changes to the user-space headers won't be in there.

If you're instead relying on kernel headers from the kernel source (which is
not something you would normally do), then you need to tell gcc with something 
like "-I".  (If this is what you're actually trying to
do, then ignore what I've said below.)

> How can my application point to the kernel source, does it require settings 
> in glibc?
> 
> Tried "make headers_install" in kernel source but still faced the error issue 
> ! btw if a destination directory is passed e.g "make headers_install 
> INSTALL_HDR_PATH=/usr/include", i found that "net" directory is missing in 
> the destination directory it only place some files and not all, am i using it 
> correctly?

"make INSTALL_HDR_PATH="/usr/local" headers_install" is probably what you want
(note I didn't put "include/" in the path).  Depending on how the toolchain is
configured, it should be looking for headers in /usr/local/include first,
/usr/include/ second (you can see what it's doing with "cpp -v").

Hope that helps,

Scott.

___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: Missing linux-headers

2022-10-07 Thread Scott J. Crouch
On 8/10/22 15:01, neutrino network wrote:
> How to update linux-headers for kernel (6.0.0) compiled from source in centos?
> 
> System has kernel 4.18 headers while kernel is 6.0, however userspace program 
> generates  error e.g*fatal error: linux/mutex.h: No such file or directory*

linux/mutex.h is a kernel header.  User-space programs don't use those.

Are you trying to compile an out-of-tree module by any chance?  If so, you 
should
probably install the kernel development headers packaged by your distribution,
and point your makefile to those (or you can just point it to the directory 
where
you built your kernel).

Hope that helps.

Scott.

___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: [PATCH] staging: rtl8723au: Fix brace coding style issues reported by checkpatch

2014-10-29 Thread Scott Lovenberg
On Wed, Oct 29, 2014 at 1:48 AM, Sudip Mukherjee
 wrote:
> On Wed, Oct 29, 2014 at 11:38 AM, Scott Lovenberg
>  wrote:
>> On Wed, Oct 29, 2014 at 12:05 AM, Sudip Mukherjee
>>  wrote:
>>>
>>> On Wed, Oct 29, 2014 at 7:31 AM, nick  wrote:
>>> > Greg,
>>> > That's fine, I was wondering how long Greg KH takes to get around to 
>>> > picking this up as he is very busy with
>>> > other kernel work.
>>>
>>> it might take a long long time. i think he is very busy now. I have
>>> not seen his replies to patches in the kernel list for atleast last 3
>>> weeks.
>>>
>> [snip]
>>>
>>> ___
>>> Kernelnewbies mailing list
>>> Kernelnewbies@kernelnewbies.org
>>> http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
>>
>>
>>
>> Nah.  Greg KH is a robot.  I'm firmly convinced that man doesn't
>> sleep.  If I didn't know better, I'd think he's a Cylon.
> well said.
>
>> On a serious note; realistically, a two week window isn't unheard of
>> for getting your patches to mainline.  So long as you're not trying to
>
> mine is three weeks going on now. somehow i have managed to send my
> patches just at the beginning of the merge window.  :(
> yesterday i saw Greg K-H releasing the stable patches , so i guess now
> he will be seeing the pending staging patches.

It also depends on how many hops you are to the maintainer and how
heavy their workload is.  Sometimes you can directly submit to them,
other times your patches will be passed through three trees before
they see mainline.  It all depends on what you're working on and who's
in your "circle".

-- 
Peace and Blessings,
-Scott.

___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: [PATCH] staging: rtl8723au: Fix brace coding style issues reported by checkpatch

2014-10-28 Thread Scott Lovenberg
On Wed, Oct 29, 2014 at 12:05 AM, Sudip Mukherjee
 wrote:
>
> On Wed, Oct 29, 2014 at 7:31 AM, nick  wrote:
> > Greg,
> > That's fine, I was wondering how long Greg KH takes to get around to 
> > picking this up as he is very busy with
> > other kernel work.
>
> it might take a long long time. i think he is very busy now. I have
> not seen his replies to patches in the kernel list for atleast last 3
> weeks.
>
[snip]
>
> ___
> Kernelnewbies mailing list
> Kernelnewbies@kernelnewbies.org
> http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies



Nah.  Greg KH is a robot.  I'm firmly convinced that man doesn't
sleep.  If I didn't know better, I'd think he's a Cylon.
On a serious note; realistically, a two week window isn't unheard of
for getting your patches to mainline.  So long as you're not trying to
sneak in right as the merge window is closing, you'll make the next
release.  In fact, if you submit early enough, you can almost forget
that you have a patch in a kernel when it's released 2 months later.
Nothing like reading the release notes and finding your own patches
that you've forgotten about over your morning coffee. :)

-- 
Peace and Blessings,
-Scott.

___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: Patch submission issue

2014-06-11 Thread Scott Lovenberg
On Tue, Jun 10, 2014 at 10:29 PM, Greg KH  wrote:
> On Wed, Jun 11, 2014 at 07:23:08AM +0530, Raghavendra wrote:
>> Hello,
>>
>> I am new to the kernel development community and I started off by fixing
>> small coding style errors in the drivers/staging directory. I've created
>> a patch for the same and sent it to the maintainer. The maintainer
>> replied to me something like this :
>>
>> "
>> Please don't do multiple things in the same patch, a single patch should
>> only do 1 thing.  So break this up into multiple patches.
>> "
>>
>> And my patch looks something like this :
>>
>>  From 7effd3d61c6ce08cd44df0a5ba3d1e9ac9ab5a98 Mon Sep 17 00:00:00 2001
>>
>> From: Raghavendra 
>>
>> Date: Tue, 10 Jun 2014 22:04:52 +0530
>>
>> Subject: [PATCH] Staging: rtl8192e: dot11d: Fixed coding style issues
>>
>> Replaced 'printk' with 'netdev_info' and 'netdev_err' wherever necessary.
>>
>> Also fixed the coding issue cooresponding to line gap after the declarations.
>
> You said "also", so that means you did 2 different things.  Split this
> up into two different patches, one doing the first thing, and the second
> the second thing.
>
> See the documentation for how to do multiple patches in an email series.

To follow up on what Greg KH said, once you learn the git-send-email
workflow, you'll love it.  That being said, I still do a dry run and
only send to myself first (I have a gmail filter for this that tags my
own stuff) for larger sets of patches.  Make everyone's life easier by
testing your workflow once or twice before sending multi-patch sets.
It's embarrassing to have to send a series of patches three times
because you set the incorrect flag or forgot to add a signed-off-by
when you git-format-patch (and then forget to add it when using
git-send-email).  Please learn from my mistakes, I know I haven't. :)

-Scott.

___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: [PATCH] net: ethernet: clean out braces / old code (found via checkpatch)

2012-10-03 Thread Scott Lovenberg
On Wed, Oct 3, 2012 at 5:13 AM, Matthew Walster  wrote:
>
>
> On 2 October 2012 17:16, Scott Lovenberg  wrote:
>>
>> Looks good to me.
>
>
> Maintainer didn't think so :(
>
> On 2 October 2012 19:46, David Miller  wrote:
>>
>> That comment and that unconditional if() are documentation.
>>
>> Don't be an automaton and blindly make changes based upon
>> checkpatch.pl output.
>
>
> Perhaps I'll just clean up some of drivers/staging while I learn the process
> before I dive in to "net" again.
>
> Matthew Walster

Sorry, man.  I'm not going to mix it up with Dave Miller, but really
if he wanted that to stay in there a comment suggesting so would have
been nice.

-- 
Peace and Blessings,
-Scott.

___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: [PATCH] net: ethernet: clean out braces / old code (found via checkpatch)

2012-10-02 Thread Scott Lovenberg
On Tue, Oct 2, 2012 at 6:56 AM,   wrote:
> From: Matthew Walster 
>
> Remove an old commented out piece of code.
> Remove an if(true) statement.
> Remove a set of braces that weren't strictly necessary.
>
> All found by running checkpatch.pl against the code.
>
> Signed-off-by: Matthew Walster 
> ---
>  net/ethernet/eth.c |7 ++-
>  1 file changed, 2 insertions(+), 5 deletions(-)
>
> diff --git a/net/ethernet/eth.c b/net/ethernet/eth.c
> index 4efad53..a9f8531 100644
> --- a/net/ethernet/eth.c
> +++ b/net/ethernet/eth.c
> @@ -178,11 +178,8 @@ __be16 eth_type_trans(struct sk_buff *skb, struct 
> net_device *dev)
>  *  seems to set IFF_PROMISC.
>  */
>
> -   else if (1 /*dev->flags&IFF_PROMISC */ ) {
> -   if (unlikely(!ether_addr_equal_64bits(eth->h_dest,
> - dev->dev_addr)))
> -   skb->pkt_type = PACKET_OTHERHOST;
> -   }
> +   else if (unlikely(!ether_addr_equal_64bits(eth->h_dest, 
> dev->dev_addr)))
> +   skb->pkt_type = PACKET_OTHERHOST;
>
> /*
>  * Some variants of DSA tagging don't have an ethertype field
> --
> 1.7.10.4
>
>

Looks good to me.

-- 
Peace and Blessings,
-Scott.

___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: starting to patch kernel

2012-09-26 Thread Scott Lovenberg
On Wed, Sep 26, 2012 at 4:21 PM, Constantine Shulyupin
wrote:

> Hi
>
> I am experienced embedded Linux driver developer. I have some spare
> time which I want to contribute to mainstream Linux kernel.
> Unfortunately  http://kernelnewbies.org/KernelJanitors/Todo is very old.
> Can you please suggest small tasks good for start? It can be code
> clean up, API updates.
>
> Thank you
>
> --
> Constantine Shulyupin
> http://www.MakeLinux.com/
> Embedded Linux Systems,
> Device Drivers, TI DaVinci
>
> ___
> Kernelnewbies mailing list
> Kernelnewbies@kernelnewbies.org
> http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
>

You might want to ask Jeff Layton or Steve French (both CCed) about working
on some code in the NFS tree.  There's always a lot of stuff going on over
there.  The mailing list is somewhat active, too (at least for a file
system mailing list).  I don't know if that's anything you'd be interested
in, but I like to lurk there among other places.

-- 
Peace and Blessings,
-Scott.
___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: Does Linux process exist information leakage?

2012-01-19 Thread Scott Lovenberg
On Mon, Jan 16, 2012 at 18:45, Jonathan Neuschäfer wrote:

> On Mon, Jan 16, 2012 at 01:19:22PM -0500, Scott Lovenberg wrote:
> > Let me walk you guys through how this bug could be exploited.
> > The file that you want to access is blocked from you by file system
> > permissions.  The root user (uid==0) can access this file (that contains
> > credentials) and read it into memory that it has malloc()'ed.  After the
> > process running as root is done, it free()'s the memory without zeroing
> it
> > out.  Now you (you clever hacker) spawn a process that requests memory in
> > large hunks.  It then searches for the string "password=" in that memory.
> >  Since the memory was free()'ed back to the pool without being changed,
> it
> > still contains the original information that was in the file that you
> > cannot read.  Does this make sense, or should I go into t a bit more
> detail?
>
> But can you actually get this dirty memory on Linux?
>
> I know two sources of memory that are used by malloc. One is brk(), the
> other is mmapped pages of /dev/zero. With /dev/zero it's obvious that
> you get empty pages (all-zero); with brk I wasn't sure so I wrote the
> test program below and ran it. I didn't find any dirty (non-zero) memory.
>
> Thanks,
>Jonathan Neuschäfer
>
>
> --
> #include 
> #include 
>
> #define BLOCKSZ (1024 * 1024) /* one Mibi */
>
> int main(void)
> {
>int maxmb = 1024;
>unsigned i;
>void *BRK;
>
>BRK = sbrk(0);
>
>for (i = 0; i < maxmb; i++) {
>void *block = sbrk(BLOCKSZ);
>unsigned j, *p;
>
>if (block == (void *) -1) {
>printf("sbrk failed after %u blocks (%u bytes)\n",
> i, i * BLOCKSZ);
>break;
>}
>
>for (p = block, j = BLOCKSZ/sizeof(unsigned int); j--; p++)
>if (*p)
>printf("found data at BRK+%p: %u\n", ((void
> *)p) - BRK, *p);
>}
>
>return 0;
> }
>

Thanks for posting this.  I'm embarrassed that I never even bothered to
check if dirty memory was given back.  I guess I just assumed.  You know
what they say about assumptions...  Anyways, I think this is a great
discussion. :)


-- 
Peace and Blessings,
-Scott.
___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: Does Linux process exist information leakage?

2012-01-19 Thread Scott Lovenberg
On Tue, Jan 17, 2012 at 20:53, Fredrick  wrote:

> When you malloc a memory or mmap a MAP_ANON memory, it is virtually
> allocated. When you read or write to it, the process takes a page fault.
> The page fault handler zeroes those memory and hands it to the process.
> So I think there is no leak.
>
> -Fredrick
>
>

Thanks for clearing that up.  I learned something today. :)

-- 
Peace and Blessings,
-Scott.
___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: Does Linux process exist information leakage?

2012-01-16 Thread Scott Lovenberg
On Mon, Jan 16, 2012 at 13:45, Greg Freemyer wrote:

> On Thu, Jan 12, 2012 at 12:00 PM, Jonathan Neuschäfer
>  wrote:
> > On Wed, Jan 11, 2012 at 12:52:33PM -0500, Scott Lovenberg wrote:
> >> Real world example in C; I fixed a security bug in Samba that dealt with
> >> this exact problem.  Credential files were read to memory as the root
> user
> >> and then the memory was freed without being zeroed.  A user could
> therefore
> >> read the contents of a file that they didn't have permission to read
> >> because the whole thing was put in memory by a user that had permission
> to
> >> view the file.  Someone clever could churn through memory and find the
> >> credentials if they knew that the mount command was just run.
> >>
> >> I added a memset() to the end of the parsing function to zero out the
> >> memory before freeing back to the OS.
> >
> > Could you please clarify how this "churning through memory" would work?
> >
> > Of course someone could find another security bug and access heap space,
> > but that requires said other bug. Debuggers are also irrelevant to this,
> > because you need certain parmissions to run a program through a
> > debugger, and if you do that, you might also set a breakpoint in the
> > function and catch the credentials when it's run.
> >
> > Swap disk are a real issue under some circumstances, though.
> > A page containing sensitive data may be swapped out and not be over-
> > written before an attacker can boot from an external medium (CD etc.)
> > and peek through the swap disk.
>
> Boot CDs mean physical access.  If the bad guy has physical access, all is
> lost.
>
> === specifically
> If you want to defend against reboots to a boot CD, then all of memory
> is potential leak.
>
> http://citp.princeton.edu/research/memory/
>
> My personal favorite is when they actually move the RAM chips from one
> PC to another to get the data out of it.
>
> After removing power, they immediately spray freon (or something
> similarly cold) on the RAM chips to stabilize them, then move them to
> another PC and recover the content.
>
> I can't get the video to work right now, but here's a walk-thru with
> photos.
>
> I quote:
> ===
> We stored data in these memory modules, then cooled them, removed them
> from the computer, and placed them in a container of liquid nitrogen
> for an hour. After returning them to the computer, we found
> practically no information had been lost. (Using liquid nitrogen would
> be overkill for most attacks, since cheap, widely-available duster
> spray would adequately cool the chips.)
> ===
>
> Greg
>

I should clarify (because someone asked), the memory that I was talking
about wouldn't be allocatable until after the process that read it and
freed it exited.


-- 
Peace and Blessings,
-Scott.
___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: Does Linux process exist information leakage?

2012-01-16 Thread Scott Lovenberg
On Thu, Jan 12, 2012 at 12:00, Jonathan Neuschäfer wrote:

> On Wed, Jan 11, 2012 at 12:52:33PM -0500, Scott Lovenberg wrote:
> > Real world example in C; I fixed a security bug in Samba that dealt with
> > this exact problem.  Credential files were read to memory as the root
> user
> > and then the memory was freed without being zeroed.  A user could
> therefore
> > read the contents of a file that they didn't have permission to read
> > because the whole thing was put in memory by a user that had permission
> to
> > view the file.  Someone clever could churn through memory and find the
> > credentials if they knew that the mount command was just run.
> >
> > I added a memset() to the end of the parsing function to zero out the
> > memory before freeing back to the OS.
>
> Could you please clarify how this "churning through memory" would work?
>
> Of course someone could find another security bug and access heap space,
> but that requires said other bug. Debuggers are also irrelevant to this,
> because you need certain parmissions to run a program through a
> debugger, and if you do that, you might also set a breakpoint in the
> function and catch the credentials when it's run.
>
> Swap disk are a real issue under some circumstances, though.
> A page containing sensitive data may be swapped out and not be over-
> written before an attacker can boot from an external medium (CD etc.)
> and peek through the swap disk.
> If you don't suspend (which means writing all pages to persistent
> storage), mlock() would be the solution here (CMIIW). (Which doesn't
> mean zeroing isn't also a good idea)
>
> Of course, people should also encrypt their disks on this kind of server.
>
> Thanks,
> Jonathan Neuschäfer
>

Sorry for taking so long to reply.

Let me walk you guys through how this bug could be exploited.
The file that you want to access is blocked from you by file system
permissions.  The root user (uid==0) can access this file (that contains
credentials) and read it into memory that it has malloc()'ed.  After the
process running as root is done, it free()'s the memory without zeroing it
out.  Now you (you clever hacker) spawn a process that requests memory in
large hunks.  It then searches for the string "password=" in that memory.
 Since the memory was free()'ed back to the pool without being changed, it
still contains the original information that was in the file that you
cannot read.  Does this make sense, or should I go into t a bit more detail?


-- 
Peace and Blessings,
-Scott.
___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: Does Linux process exist information leakage?

2012-01-11 Thread Scott Lovenberg
On Wed, Jan 11, 2012 at 11:45, Dave Hylands  wrote:

> Hi,
>
> On Wed, Jan 11, 2012 at 4:53 AM, 夏业添  wrote:
> > Hi,
> >My tutor asked me to test whether one process leaves information in
> > memory after it is dead. I tried to search some article about such thing
> on
> > the Internet but there seems to be no one discuss about it. And after
> that,
> > I tried to write some program in the User Mode to test it, using fork()
> to
> > create lots of processes and filling char 'a' into a 102400 bytes char
> array
> > in each process. Then I used malloc() to get some memory to seek char
> 'a' in
> > a new one process or many new processes, but failed. All memory I
> malloced
> > was full of zero.
>
> Yeah - so if it were possible for one process to get information about
> another process like that you would have a security leak.
>
> >As the man page of malloc said:"The memory is not initialized", I
> believe
> > that the memory which was got by malloc() could be used by other process,
> > and therefor information leakage exists. But how can I test it? Or where
> can
> > I get related information?
>
> All pages allocated from the OS will be initially zero'd, however,
> once your process owns the page, if you filled it with Z's and then
> freed it and reallocated you might very weill get your Z's back
> instead of 0's. You'll never get data from another process though.
>

Real world example in C; I fixed a security bug in Samba that dealt with
this exact problem.  Credential files were read to memory as the root user
and then the memory was freed without being zeroed.  A user could therefore
read the contents of a file that they didn't have permission to read
because the whole thing was put in memory by a user that had permission to
view the file.  Someone clever could churn through memory and find the
credentials if they knew that the mount command was just run.

I added a memset() to the end of the parsing function to zero out the
memory before freeing back to the OS.
http://git.samba.org/?p=cifs-utils.git;a=commitdiff;h=6c917ebf360b3dbbc4c7ad9af3e106170528aa3c
 (you
can skip to the end of the patch if you don't want to follow the entire
flow of the code)

Does this help express the idea any better?
-- 
Peace and Blessings,
-Scott.
___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: Kernel not showing in grub2

2011-09-28 Thread scott
On 09/28/2011 09:56 PM, scott wrote:
> On 09/27/2011 10:44 PM, Prashant Shah wrote:
>
>>
>> You can install something called "grub customizer" (just google for it)
>
> I have grub-customizer already. It shows in the menu in that, too. I
> even manually added it to grub.cfg. I'm beginning to think something is
> wrong with grub in general. I think I'll reinstall grub and see what
> happens.
>
> Thanks,Scott

Evidently is was something in grub. I reinstalled it and everything 
works as it should.

Thanks for all the help,
Scott

___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: Kernel not showing in grub2

2011-09-28 Thread scott
On 09/27/2011 10:44 PM, Prashant Shah wrote:

>
> You can install something called "grub customizer" (just google for it)

I have grub-customizer already. It shows in the menu in that, too. I 
even manually added it to grub.cfg. I'm beginning to think something is 
wrong with grub in general. I think I'll reinstall grub and see what 
happens.

Thanks,Scott

___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: Kernel not showing in grub2

2011-09-28 Thread scott
On 09/28/2011 04:25 PM, Julie Sullivan wrote:
> Hi Scott
>
> On Wed, Sep 28, 2011 at 2:11 AM, scott  wrote:
>> I compiled a 3.0.0-rc7 kernel. Everything went smoothly except it
>> doesn't show in the grub menu even after doing sudo update-grub. I see
>> the kernel in /boot/grub/grub.cfg. Everything appears right with the
>> UUID's and all. I noticed in /boot it doesn't list the abi-3.0-rc7.
>> System-map initrd-img, vmlinux and config are all there.
>>
>> Would the missing abi- keep grub from recognizing it or am I barking up
>> the wrong tree. If it is, how do I go about creating the abi short of
>> recompiling.
>
> I'm using Ubuntu and looking in my boot directory the only abi-* files
> are those of the 3 distro-native kernels (in fact I only noticed they
> existed when I read your email.) None of my own kernels have them (or
> had them even before I upgraded to Ubuntu 11.04 as I recall). And all
> the kernels (about 20-30) are installed and booting OK. So maybe it's
> not that.
>
> There are a couple of things you could check though:
>
> - You're not naming your kernel something odd. You can build the
> kernel fine of course and do a make modules_install, but when I've
> misnamed a kernel (I've accidentally used underscores instead of
> hyphens before) update-grub (which is run automatically on make
> install on Ubuntu 11.04) complains and refuses to install it.
>
> -  Your /boot isn't full. Mine maxes out at about 50 kernels with
> their associated files. Again, the new kernel will not be installed if
> it's full :-)
>
> Assuming it's not either of those I can't immediately think of what
> the problem is. Sorry - this is probably not especially helpful.
>
> Cheers
> Julie
>

No naming convention problems. /boot is not full either. I'm stumped on 
this one.

Thanks for the reply anyway, Scott

PS: Sorry for the post to your private email, Pritam. I hit the 'reply' 
button instead of 'reply-to-list'.

___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: Kernel not showing in grub2

2011-09-28 Thread scott
On 09/28/2011 10:07 AM, Pritam Bankar wrote:
> Check the /lib/modules directory for corresponding entry for 3.0.0.
> sudo update-grub does only scanning of /boot directory and puts them in a
> list so its look like grub update error.
> abi-3.0-rc7 will not create because its only present when your kernel comes
> from standard distro.
> Anyway you can manually edit grub.cfg file.
>
>
> On Wed, Sep 28, 2011 at 6:41 AM, scott  wrote:
>
>> I compiled a 3.0.0-rc7 kernel. Everything went smoothly except it
>> doesn't show in the grub menu even after doing sudo update-grub. I see
>> the kernel in /boot/grub/grub.cfg. Everything appears right with the
>> UUID's and all. I noticed in /boot it doesn't list the abi-3.0-rc7.
>> System-map initrd-img, vmlinux and config are all there.
>>
>> Would the missing abi- keep grub from recognizing it or am I barking up
>> the wrong tree. If it is, how do I go about creating the abi short of
>> recompiling.
>>
>> Thanks, Scott
>>
>> ___
>> Kernelnewbies mailing list
>> Kernelnewbies@kernelnewbies.org
>> http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
>>
>
>
>


___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Kernel not showing in grub2

2011-09-27 Thread scott
I compiled a 3.0.0-rc7 kernel. Everything went smoothly except it 
doesn't show in the grub menu even after doing sudo update-grub. I see 
the kernel in /boot/grub/grub.cfg. Everything appears right with the 
UUID's and all. I noticed in /boot it doesn't list the abi-3.0-rc7. 
System-map initrd-img, vmlinux and config are all there.

Would the missing abi- keep grub from recognizing it or am I barking up 
the wrong tree. If it is, how do I go about creating the abi short of 
recompiling.

Thanks, Scott

___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Re: Kernel compilation

2011-01-04 Thread scott
On 01/05/2011 01:46 AM, Mulyadi Santosa wrote:
> Hi Scott :)
>
> On Wed, Jan 5, 2011 at 12:34, scott  wrote:
>> I'm new to the list and would like to say hello to everyone. Now on to
>> the meat.
>>
>> I have tried to compile a kernel with a grsec patch 5 times now using a
>> couple of different methods and I keep getting a "No init found" and
>> "Couldn't support optional features" errors every time at bootup.
>> I'm trying to use a vanilla 2.6.32.27 kernel on 10.04 Ubuntu and it
>> compiles fine,
>> just will not boot.
> My first question is: did the patching go successfully? were you
> applying the correct grsec version against a matching vanilla kernel
> version?
>
> And last, maybe you can attach your kernel .config content...and one
> of fine people here will try to decipher what's wrong with it :)
>
The patch was matched and was successful. It compiled with no errors. 
Just the 'no init' at boot.
I'll post my .config later today as it's late here and have to work. I'm 
beginning to think it may have something to do with the limits on file 
size as I got a few warnings about out-of-range sizes. I have it set to 
1024.

Thanks for your reply,
Scott

Thanks for your reply.

___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies


Kernel compilation

2011-01-04 Thread scott
I'm new to the list and would like to say hello to everyone. Now on to 
the meat.

I have tried to compile a kernel with a grsec patch 5 times now using a
couple of different methods and I keep getting a "No init found" and
"Couldn't support optional features" errors every time at bootup.
I'm trying to use a vanilla 2.6.32.27 kernel on 10.04 Ubuntu and it 
compiles fine,
just will not boot.

I've tried "CONCURRENCY_LEVEL=`getconf _NPROCESSORS_ONLN` fakeroot make-kpkg
--initrd --append-to-version=-custom kernel_image kernel_headers",
"CONCURRENCY_LEVEL=3 make-kpkg --initrd --append-to-version=-586
kernel_image kernel_headers modules_image".

I have all the reqs for building kernels such as build-essentials, fakeroot,
kernel-package, kernel-wedge, nurces-dev and qt for xconfig.

These are the steps I've taken. DL the kernel image from kernels.org, get
the patch from grsec.net, untar the kernel, cd into the directory created,
do a 'cp /boot/config-`uname -r` .config', 'make oldconfig', apply the
patch, then either 'make menuconfig' or 'make xconfig'. Then I do a
'make-kpkg clean' and run one of the commands in the first paragraph above.

I get the debs built and can install them just fine, but I keep getting the
same errors. I've cut out as many "Experimental" options I thought might
cause a problem and still get a kernel panic at boot.

Anyone have a clue what I'm doing wrong?
Scott


___
Kernelnewbies mailing list
Kernelnewbies@kernelnewbies.org
http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies