lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 10 Nov 2010 13:33:19 +0100 From: Peter Zijlstra <a.p.zijlstra@...llo.nl> To: Catalin Marinas <catalin.marinas@....com> Cc: linux-kernel@...r.kernel.org, Andrew Morton <akpm@...ux-foundation.org> Subject: Re: [PATCH] Fix implicit declaration of 'in_irq' in linux/highmem.h On Wed, 2010-11-10 at 11:31 +0000, Catalin Marinas wrote: > Commit 3e4d3af introduced the kmap_atomic_idx_push() function which > warns on in_irq() with CONFIG_DEBUG_HIGHMEM enabled. This patch includes > linux/hardirq.h for the in_irq definition. Ah, indeed. The whole KS/LPC thing made me forget about this issue. Somehow it only triggered on ARM. > Signed-off-by: Catalin Marinas <catalin.marinas@....com> Acked-by: Peter Zijlstra <a.p.zijlstra@...llo.nl> > Cc: Andrew Morton <akpm@...ux-foundation.org> > --- > include/linux/highmem.h | 1 + > 1 files changed, 1 insertions(+), 0 deletions(-) > > diff --git a/include/linux/highmem.h b/include/linux/highmem.h > index e913819..b676c58 100644 > --- a/include/linux/highmem.h > +++ b/include/linux/highmem.h > @@ -5,6 +5,7 @@ > #include <linux/kernel.h> > #include <linux/mm.h> > #include <linux/uaccess.h> > +#include <linux/hardirq.h> > > #include <asm/cacheflush.h> > > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists