lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 04 Oct 2006 11:50:31 +0400 From: Vasily Averin <vvs@...ru> To: Theodore Tso <tytso@....edu>, Stephen Tweedie <sct@...hat.com>, Andrew Morton <akpm@...l.org>, adilger@...sterfs.com, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, linux-ext4@...r.kernel.org, devel@...nvz.org, cmm@...ibm.com CC: Kirill Korotaev <dev@...nvz.org>, Dmitry Mishin <dim@...nvz.org>, Eric Sandeen <sandeen@...deen.net> Subject: [PATCH 2.6.18] ext3: errors behaviour fix From: Dmitry Mishin <dim@...nvz.org> EXT3_ERRORS_CONTINUE should be taken from the superblock as default value for error behaviour. Signed-off-by: Dmitry Mishin <dim@...nvz.org> Acked-by: Vasily Averin <vvs@...ru> Acked-by: Kirill Korotaev <dev@...nvz.org> --- linux-2.6.18/fs/ext3/super.c.e3erop 2006-09-20 07:42:06.000000000 +0400 +++ linux-2.6.18/fs/ext3/super.c 2006-10-03 15:51:44.000000000 +0400 @@ -1466,6 +1466,8 @@ static int ext3_fill_super (struct super set_opt(sbi->s_mount_opt, ERRORS_PANIC); else if (le16_to_cpu(sbi->s_es->s_errors) == EXT3_ERRORS_RO) set_opt(sbi->s_mount_opt, ERRORS_RO); + else + set_opt(sbi->s_mount_opt, ERRORS_CONT); sbi->s_resuid = le16_to_cpu(es->s_def_resuid); sbi->s_resgid = le16_to_cpu(es->s_def_resgid); - To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists