Sponsored Content
Operating Systems AIX Bison -pap_expr_yy invalid character:% unexpected "identifier" while running make for Apache2.4.3 64 Post 302756533 by Ashish Gupta on Wednesday 16th of January 2013 04:48:43 AM
Old 01-16-2013
IBM Bison -pap_expr_yy invalid character:% unexpected "identifier" while running make for Apache2.4.3 64

The Follwing packages are installed on my AIX 6.1 box
Code:
gcc-4.7.2-1
gcc-c++-4.7.2-1
gcc-cpp-4.7.2-1
gcc-gfortran-4.7.2-1
libgcc-4.7.2-1
libgomp-4.7.2-1
libstdc++-4.7.2-1
libstdc++-devel-4.7.2-1
gmp-5.0.5-1
libmpc-1.0.1-2
libmpc-devel-1.0.1-2
libmpcdec-1.2.6-1
libmpcdec-devel-1.2.6-1
mpfr-3.1.1-1
mpfr-devel-3.1.1-1
flex-2.5.4a-6
m4-1.4.1-1
bison-1.875-3
libiconv-1.14-2
gettext-0.17-1
gettext-devel-0.17-1

I used follwing command to confiure the apache:
Code:
./configure CC="gcc -maix64" CFLAGS="-maix64" CXX="gcc -maix64" CPPFLAGS="-maix64" NM="nm -X64" AR="ar -X64" LDFLAGS="-L/usr/ccs/bin/ld" --prefix=/usr/local/share/bld/apache2 --enable-ssl=shared --with-ssl=/usr/local/share/bld/ssl --enable-deflate=shared --with-z=/usr/local/share/bld/zlib --enable-mods-shared=all --with-expat=builtin --with-pcre=/usr/local/share/bld/pcre --with-included-apr --enable-v4-mapped

The above command executed successfully. While executing the make command follwing error is reported:
Code:
bison -pap_expr_yy --defines=/usr/local/share/bld/httpd-2.4.3/server/util_expr_parse.h -o /usr/local/share/bld/httpd-2.4.3/server/util_expr_parse.c /usr/local/share/bld/httpd-2.4.3/server/util_expr_parse.y
/usr/local/share/bld/httpd-2.4.3/server/util_expr_parse.y:28.1: invalid character: `%'
/usr/local/share/bld/httpd-2.4.3/server/util_expr_parse.y:28.2-4: parse error, unexpected "identifier"
make: 1254-004 The error code from the last command is 1.


Last edited by Scrutinizer; 01-16-2013 at 06:09 AM.. Reason: code tags
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

"./cofigure" and "make" turmoil

I am a Unix newbie and I downloaded some X11 programs. I have gcc, but I cannot compile the files. I NEED HELP!!!! :confused: (16 Replies)
Discussion started by: gnerd
16 Replies

2. Programming

how could i make a program mixed with many "|", "<" and ">"

I have written following code to do: ls -l | wc -w, it works: but when there are not only a single "|", if there are more such as: ls -l | sort -r | sort | sort -r, This program does not work, i want to know how could i deal with it when there are more "|", another situation is that, if it mixes... (2 Replies)
Discussion started by: strugglingman
2 Replies

3. HP-UX

script running with "ksh" dumping core but not with "sh"

Hi, I have small script written in korn shell. When it is called from different script, its dumping core, but no core dump when we run it standalone. And its not dumping core if we run the script using "/bin/sh" instead of "ksh" Can some body please help me how to resolve this issue. ... (9 Replies)
Discussion started by: simhe02
9 Replies

4. UNIX for Dummies Questions & Answers

Command Character size limit in the "sh" and "bourne" shell

Hi!!.. I would like to know what is maximum character size for a command in the "sh" or "bourne" shell? Thanks in advance.. Roshan. (1 Reply)
Discussion started by: Roshan1286
1 Replies

5. UNIX for Advanced & Expert Users

Command Character size limit in the "sh" and "bourne" shell

Hi!!.. I would like to know what is maximum character size for a command in the "sh" or "bourne" shell? Thanks in advance.. Roshan. (1 Reply)
Discussion started by: Roshan1286
1 Replies

6. Shell Programming and Scripting

Command Character size limit in the "sh" and "bourne" shell

Hi!!.. I would like to know what is maximum character size for a command in the "sh" or "bourne" shell? Thanks in advance.. Roshan. (1 Reply)
Discussion started by: Roshan1286
1 Replies

7. Shell Programming and Scripting

Make scipt except from "Y","y" and "yes" to take [Enter] as being "yes"

This is the script: #!/bin/sh if ; then rm -rf /usr/share/WallpaperChanger; fi if ; then rm -rf /usr/bin/wallch; fi; if ; then rm -rf /usr/share/applications/wallch.desktop; fi if ; then rm -rf /usr/share/doc/wallch; fi if ; then rm -rf /usr/share/man/man1/wallch.1.gz; fi echo "Delete... (4 Replies)
Discussion started by: hakermania
4 Replies

8. Shell Programming and Scripting

awk command to replace ";" with "|" and ""|" at diferent places in line of file

Hi, I have line in input file as below: 3G_CENTRAL;INDONESIA_(M)_TELKOMSEL;SPECIAL_WORLD_GRP_7_FA_2_TELKOMSEL My expected output for line in the file must be : "1-Radon1-cMOC_deg"|"LDIndex"|"3G_CENTRAL|INDONESIA_(M)_TELKOMSEL"|LAST|"SPECIAL_WORLD_GRP_7_FA_2_TELKOMSEL" Can someone... (7 Replies)
Discussion started by: shis100
7 Replies

9. Shell Programming and Scripting

Using sed to find text between a "string " and character ","

Hello everyone Sorry I have to add another sed question. I am searching a log file and need only the first 2 occurances of text which comes after (note the space) "string " and before a ",". I have tried sed -n 's/.*string \(*\),.*/\1/p' filewith some, but limited success. This gives out all... (10 Replies)
Discussion started by: haggismn
10 Replies

10. Shell Programming and Scripting

exec perl in expect script yields "invalid command"

I'm trying to execute something like this: exec perl -i -pe 's/\015/\012/g' '${file}' in my expect script and I get: error "invalid command name \"perl\". however, if I run perl -i -pe 's/\015/\012/g' "/Users/Shared/menu-items.txt" directly in my terminal, it runs fine. I'm an... (4 Replies)
Discussion started by: dpouliot
4 Replies
BLD(8)							      System Manager's Manual							    BLD(8)

NAME
bld - A black list daemon SYNOPSIS
bld -h | [option] OPTIONS
-v Output version information and exit -n Do not fork to become a daemon -a address Address to bind to -p port Port to listen to -l number Log verbosity (between 0 and 3) -t number Minimum time interval before blacklisting -m number Maximum submissions in time interval -i number IP list size -b number Blacklist size -e number Blacklist expiration -P filename Filename where to save PID -T number Timeout for client connections -u user User to run as -g group Group to run as -f filename Use a specific configuration file -A filename Filename where to find ACLs -W filename Filename where to find whitelist -B filename Filename where to store blacklist -I filename Filename where to store whole IP list DESCRIPTION By default, the bld daemon listens to requests on port 2905. Requests are either IP addresses submissions or checks against the black list. bld uses a very simple algorithm to decide whether to add IP addresses to the blacklist or not. The first time an IP address is submitted, it is added to an internal list with a timestamp and all further requests increment a counter for this IP. As soon as the minimum time interval is elapsed (default: 30 seconds), and if a maximum requests ratio is reached (default: 10 submissions in the 30 seconds interval), the IP is put in the blacklist. It is then blacklisted for a configurable time (default: 900 seconds). PROTOCOL
Requests sent to bld are rather simple. Each request or reply is followed by a linefeed and a carriage return. A client may only send one request per TCP session. As of now, two commands may be used: ip (address submission) and ip? (ask if address is blacklisted). ip=a.b.c.d submits an IP address. The server acknowledges either with a 200 code if the address is not blacklisted or a 421 if it is. ipdecr=a.b.c.d decrements the internal counter for an IP address. The lowest value for the counter is zero. The server always acknowl- edges with a 200 code. ip?=a.b.c.d asks if address is blacklisted. The server reply may be 421 if it is or 200 if it's not. ipbl=a.b.c.d forces the insertion in the blacklist. The server acknowledges with a 200 code. If using IP based restrictions, the server reply may be 600 if the client is not in the correct ACL to perform a request. Any other error will generate a reply with a 500 error code. NOTES
bld binds to localhost by default and accepts any local request, so please make sure that only trusted users can establish a connection to the daemon. Please check that all authorized hosts meet the minimal security requirements before changing this parameter even if using an access control list (see bld_acl.conf(5)). bld will log some statistics if it receives the SIGUSR1 signal. SIGUSR2 is used to force a dump of both lists in bld working directory. FILES
/etc/bld/bld.conf /etc/bld/bld_acl.conf /etc/bld/bld_whitelist.conf /var/run/bld/bld.pid /var/run/bld/bld_iplist.dump /var/run/bld/bld_blacklist.dump SEE ALSO
bld.conf(5) bld_acl.conf(5) bld_whitelist.conf(5) bldread(8) bldquery(8) bldsubmit(8) blddecr(8) AUTHOR
Olivier Beyssac <obld@r14.freenix.org> August 2004 BLD(8)
All times are GMT -4. The time now is 10:02 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy