lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Tue, 9 Aug 2011 22:55:17 +0300
From:	Amir Goldstein <amir73il@...il.com>
To:	Round Robinjp <roundrobinjp@...oo.co.jp>
Cc:	Dilger Andreas <aedilger@...il.com>, "Ted Ts'o" <tytso@....edu>,
	"linux-ext4@...r.kernel.org" <linux-ext4@...r.kernel.org>
Subject: Re: flashing large eMMC partitions with ext4

2011/8/9 Round Robinjp <roundrobinjp@...oo.co.jp>:
> Amir
>
>> https://raw.github.com/amir73il/e2fsprogs-snapshots/next4-stable/contrib/uninit_bg.c
>>
>> amir@...ab:~$ gcc -o uninit_bg -lext2fs uninit_bg.c
>
> For me, it gives error:
>
> $ gcc -o uninit_bg -lext2fs uninit_bg.c
> uninit_bg.c: In function ‘main’:
> uninit_bg.c:105:2: error: invalid use of undefined type ‘struct opaque_ext2_group_desc’
> uninit_bg.c:105:5: warning: assignment from incompatible pointer type
> $
>
> I have the latest source code from
> git://git.kernel.org/pub/scm/fs/ext2/e2fsprogs.git
> but nowhere I can find the full declaration of
> struct opaque_ext2_group_desc.
>
> Am I missing something?

I did not build this tool with latest e2fsprogs lib, I built it with
stable version 1.41.14
which comes installed with my Ubuntu distro.
Basically, you don't need to download and build any sources, but since
you have built
e2fsprogs from git already you may as well checkout tag v1.41.14,
configure build and install it.
hope this helps.

> I didn't want to bother you for this, but I could not
> solve the puzzle.
>
> Thanks
> Round
>
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists