lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <713c4e61358b95bbdf95daca094abc73a230e52f.1734253505.git.ojaswin@linux.ibm.com> Date: Sun, 15 Dec 2024 14:47:15 +0530 From: Ojaswin Mujoo <ojaswin@...ux.ibm.com> To: linux-ext4@...r.kernel.org, linux-xfs@...r.kernel.org Cc: Ritesh Harjani <ritesh.list@...il.com>, linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org, Andrey Albershteyn <aalbersh@...nel.org>, "Darrick J . Wong" <djwong@...nel.org>, John Garry <john.g.garry@...cle.com> Subject: [PATCH 1/3] include/linux.h: use linux/magic.h to get XFS_SUPER_MAGIC This avoids open coding the magic number Signed-off-by: Ojaswin Mujoo <ojaswin@...ux.ibm.com> --- include/linux.h | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/include/linux.h b/include/linux.h index e9eb7bfb26a1..306a31e092a7 100644 --- a/include/linux.h +++ b/include/linux.h @@ -37,6 +37,7 @@ #endif #include <unistd.h> #include <assert.h> +#include <linux/magic.h> /* super block magic numbers */ static __inline__ int xfsctl(const char *path, int fd, int cmd, void *p) { @@ -60,7 +61,7 @@ static __inline__ int platform_test_xfs_fd(int fd) return 0; if (!S_ISREG(statbuf.st_mode) && !S_ISDIR(statbuf.st_mode)) return 0; - return (statfsbuf.f_type == 0x58465342); /* XFSB */ + return (statfsbuf.f_type == XFS_SUPER_MAGIC); } static __inline__ int platform_test_xfs_path(const char *path) -- 2.43.5
Powered by blists - more mailing lists