home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: alt.hackers
- Path: sparky!uunet!caen!batcomputer!bouncer
- From: eirik@elf.TN.Cornell.EDU (Eirik Fuller)
- Subject: stripslash
- Message-ID: <1992Dec28.030636.2226@tc.cornell.edu>
- Sender: news@tc.cornell.edu
- Nntp-Posting-Host: earache.tc.cornell.edu
- Organization: Cornell Theory Center
- References: <1992Dec28.012047.29726@tc.cornell.edu>
- Date: Mon, 28 Dec 1992 03:06:36 GMT
- Approved: The Slash Stripper
- Lines: 33
-
- My previous posting contained an adb hack which fixes an annoying bug
- in subsequently built kernels. It was only after I devised this patch
- that it occurred to me that it was just as easy to patch the kernel
- itself, and that there is no need to build a new kernel, or even
- reboot. Maybe it's past due time for sleep ... anyway, I poked around
- some more, and discovered that only one function, au_lookuppn, seems
- to call the function named stripslash, so I poked a couple of nops
- into it. That also seems to fix the bug. I doubt the second nop is
- necessary, but what the hey ...
-
-
- 21:39:53 # ls -ldg /bin/
- lrwxrwxrwx 1 root wheel 7 Nov 28 22:27 /bin/ -> usr/bin
- 21:39:56 # adb -w -k /vmunix /dev/mem
- physmem 1bfd
- au_lookuppn/4i
- _au_lookuppn:
- _au_lookuppn: save %sp, -0x170, %sp
- st %i3, [%fp + 0x50]
- call _stripslash
- mov %i0, %o0
- au_lookuppn+8 /W 0x1000000 0x1000000
- _au_lookuppn+8: 0x40000192 = 0x1000000
- _au_lookuppn+0xc: 0x90100018 = 0x1000000
- au_lookuppn/4i
- _au_lookuppn:
- _au_lookuppn: save %sp, -0x170, %sp
- st %i3, [%fp + 0x50]
- nop
- nop
- 21:44:57 # ls -ldg /bin/
- drwxr-sr-x 3 bin staff 4608 Nov 24 16:14 /bin/
- 21:45:08 #
-