lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Mon, 18 Feb 2019 09:23:34 +0200
From:   Felipe Balbi <felipe.balbi@...ux.intel.com>
To:     Jan Kiszka <jan.kiszka@...mens.com>,
        Kieran Bingham <kbingham@...nel.org>
Cc:     linux-kernel@...r.kernel.org,
        Felipe Balbi <felipe.balbi@...ux.intel.com>
Subject: [PATCH v2] scripts: gdb: redefine MS_RDONLY

Since commit e262e32d6bde0f77fb0c95d977482fc872c51996 "vfs: Suppress
MS_* flag defs within the kernel unless explicitly enabled", the
generated gdb scripts can't be used anymore. That commit moved the
definition of MS_* flags but forgot to update gdb scripts to use the
new location. This patch includes <uapi/linux/mount.h> to
constants.py.in so gdb scripts are functional again.

While at that, also remove <linux/fs.h> since it's no longer
necessary.

Fixes: e262e32d6bde "vfs: Suppress MS_* flag defs within the kernel unless explicitly enabled"
Signed-off-by: Felipe Balbi <felipe.balbi@...ux.intel.com>
---

Changes since v1:
	- keep alphabetical order of included headers
	- remove <linux/fs.h>

 scripts/gdb/linux/constants.py.in | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/scripts/gdb/linux/constants.py.in b/scripts/gdb/linux/constants.py.in
index 7aad82406422..ad7c8047970c 100644
--- a/scripts/gdb/linux/constants.py.in
+++ b/scripts/gdb/linux/constants.py.in
@@ -12,9 +12,9 @@
  *
  */
 
-#include <linux/fs.h>
 #include <linux/mount.h>
 #include <linux/of_fdt.h>
+#include <uapi/linux/mount.h>
 
 /* We need to stringify expanded macros so that they can be parsed */
 
-- 
2.20.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ