lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 5 Jul 2008 13:35:41 -0400 From: Theodore Ts'o <tytso@....edu> To: Ext4 Developers List <linux-ext4@...r.kernel.org>, Linux Kernel Developers List <linux-kernel@...r.kernel.org> Cc: Li Zefan <lizf@...fujitsu.com>, Mingming Cao <cmm@...ibm.com>, "Theodore Ts'o" <tytso@....edu> Subject: [PATCH 15/52] ext4: remove redundant code in ext4_fill_super() From: Li Zefan <lizf@...fujitsu.com> The previous sb_min_blocksize() has already set the block size. Signed-off-by: Li Zefan <lizf@...fujitsu.com> Signed-off-by: Mingming Cao <cmm@...ibm.com> Signed-off-by: "Theodore Ts'o" <tytso@....edu> --- fs/ext4/super.c | 5 ----- 1 files changed, 0 insertions(+), 5 deletions(-) diff --git a/fs/ext4/super.c b/fs/ext4/super.c index 0d560fc..b1166a9 100644 --- a/fs/ext4/super.c +++ b/fs/ext4/super.c @@ -1899,11 +1899,6 @@ static int ext4_fill_super (struct super_block *sb, void *data, int silent) goto out_fail; } - if (!sb_set_blocksize(sb, blocksize)) { - printk(KERN_ERR "EXT4-fs: bad blocksize %d.\n", blocksize); - goto out_fail; - } - /* * The ext4 superblock will not be buffer aligned for other than 1kB * block sizes. We need to calculate the offset from buffer start. -- 1.5.6.rc3.1.g36b7.dirty -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists