Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp5619933imu; Mon, 26 Nov 2018 03:06:15 -0800 (PST) X-Google-Smtp-Source: AFSGD/U/1JaI4NHZxhubwhT5Cv1OLUgaQkyC386y5SfDfrcOfbWIxtABRc+3YdEIkV/HnFxHtwOF X-Received: by 2002:a17:902:20e9:: with SMTP id v38mr24761316plg.250.1543230375269; Mon, 26 Nov 2018 03:06:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543230375; cv=none; d=google.com; s=arc-20160816; b=r8DZW0I/WkeObW61JtIJRw9qrxNQR+8sghakss4skM+/xyqWT3bRH6phtamcIADj26 DahwE0JhWsWbV7mJhXmD7uE8apfVTRWiREt3ikIYogXpRI/bXLdZn9Mtxgo/yANgM7pn 9znkApNqWijJm0Iio8b20ybIkqWZHZ/fWs8b5eYpJKmZM8NVwqRdAq+Dh9vAagaiMTGg o3SYkpngPUslbfig+xJ5a5sdTt1dY0XoqucZo+8twzz8HfX4VoGiiVIxJs+zvzc3oPKg 1wESFxLEzURmFRT5q5ebb6WxEgMnqyh3baWzZIekOO3+ybueiu2En3fygTyA6jIOFX7d Rocw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=CgbS771nhTMwaKcsDMikfqSLUXogfrdIkPrxcs2yHU4=; b=c+onKEgsCZ4PqTUcjnSM1ambTjW0TGfWpLnUyv4U8UhROGPat5bmDYaAZu/fJBvKMt uqul9GPpt6MqQayJB4FiZZNjO6Nyoo/e12O9UrtIBcNBNZzJ6RV70/SDeT0frQlek6wj skGge2IFSfbFwBIH42qEl7tQgqs0DaEVjaUT5iqxmgA/xzE+gmP7poR8VA5KGvdULZmp QCtej1HEdVyHFdS4hLgOqdsP02na2R+a0XESzM7d8c9SXdFxXP0qswCEyIz+ZV9XHsSR CLM7ntSYKMYYqk+0LFtHZT6Y6QicGnPaUxQZvgqpzbiAb8KXOhH/kOxos0BKnsFdYoj3 lXCg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="lDgF/l4t"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 7si47830888pfb.226.2018.11.26.03.05.55; Mon, 26 Nov 2018 03:06:15 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="lDgF/l4t"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731259AbeKZV7C (ORCPT + 99 others); Mon, 26 Nov 2018 16:59:02 -0500 Received: from mail.kernel.org ([198.145.29.99]:44730 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731251AbeKZV7C (ORCPT ); Mon, 26 Nov 2018 16:59:02 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 96A0020672; Mon, 26 Nov 2018 11:05:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543230316; bh=J4U3bpuAHwwYUkJ2yvx23lkvtKcdyY6j4ivYyKd5pCE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lDgF/l4tzbUMKSmPnJeICzojH4VkFOzTqhGxz7A/1J71qLtrZ0WEAcJkqpTtRXic7 Vs5wpbmX5NqD8RjOUB69+/gA4fMs5hagOmlNyBDTpbF7fj8VLStkI/kxN0hyl/gWxm ywHOj+ZjiKrQdPbgnHG3VuADoMw2/8RWc4FJ+RG0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Genki Sky , Guenter Roeck , Brian Norris , Masahiro Yamada , Sasha Levin Subject: [PATCH 4.19 090/118] Revert "scripts/setlocalversion: git: Make -dirty check more robust" Date: Mon, 26 Nov 2018 11:51:24 +0100 Message-Id: <20181126105105.316609760@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181126105059.832485122@linuxfoundation.org> References: <20181126105059.832485122@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 8ef14c2c41d962756d314f1d7dc972b0ea7a180f ] This reverts commit 6147b1cf19651c7de297e69108b141fb30aa2349. The reverted patch results in attempted write access to the source repository, even if that repository is mounted read-only. Output from "strace git status -uno --porcelain": getcwd("/tmp/linux-test", 129) = 16 open("/tmp/linux-test/.git/index.lock", O_RDWR|O_CREAT|O_EXCL|O_CLOEXEC, 0666) = -1 EROFS (Read-only file system) While git appears to be able to handle this situation, a monitored build environment (such as the one used for Chrome OS kernel builds) may detect it and bail out with an access violation error. On top of that, the attempted write access suggests that git _will_ write to the file even if a build output directory is specified. Users may have the reasonable expectation that the source repository remains untouched in that situation. Fixes: 6147b1cf19651 ("scripts/setlocalversion: git: Make -dirty check more robust" Cc: Genki Sky Signed-off-by: Guenter Roeck Reviewed-by: Brian Norris Signed-off-by: Masahiro Yamada Signed-off-by: Sasha Levin --- scripts/setlocalversion | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scripts/setlocalversion b/scripts/setlocalversion index 79f7dd57d571..71f39410691b 100755 --- a/scripts/setlocalversion +++ b/scripts/setlocalversion @@ -74,7 +74,7 @@ scm_version() fi # Check for uncommitted changes - if git status -uno --porcelain | grep -qv '^.. scripts/package'; then + if git diff-index --name-only HEAD | grep -qv "^scripts/package"; then printf '%s' -dirty fi -- 2.17.1