lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 21 Sep 2007 15:59:53 -0500 From: Eric Sandeen <sandeen@...hat.com> To: "Jose R. Santos" <jrs@...ibm.com> CC: Badari Pulavarty <pbadari@...il.com>, Andrew Morton <akpm@...ux-foundation.org>, ext4 <linux-ext4@...r.kernel.org>, lkml <linux-kernel@...r.kernel.org> Subject: Re: [PATCH] ext4: FLEX_BG Kernel support v2. Jose R. Santos wrote: > On Fri, 21 Sep 2007 13:29:27 -0700 > Badari Pulavarty <pbadari@...il.com> wrote: > >> On Fri, 2007-09-21 at 09:06 -0500, Jose R. Santos wrote: >>> From: Jose R. Santos <jrs@...ibm.com> >>> >>> ext4: FLEX_BG Kernel support v2. >>> >>> @@ -702,13 +702,15 @@ static inline int ext4_valid_inum(struct super_block *sb, unsigned long ino) >>> #define EXT4_FEATURE_INCOMPAT_META_BG 0x0010 >>> #define EXT4_FEATURE_INCOMPAT_EXTENTS 0x0040 /* extents support */ >>> #define EXT4_FEATURE_INCOMPAT_64BIT 0x0080 >>> +#define EXT4_FEATURE_INCOMPAT_FLEX_BG 0x0200 >> Any reason why 0x100 is skipped ? >> >> Thanks, >> Badari >> > > Because 0x0100 is reserved for EXT4_FEATURE_INCOMPAT_MMP in e2fsprogs. and we know that how? :) I'd at least put a comment into the kernel code so it doesn't get taken, later. -Eric - To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists