lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20061113045039.GE6591@redhat.com>
Date:	Sun, 12 Nov 2006 23:50:39 -0500
From:	Dave Jones <davej@...hat.com>
To:	"Martin J. Bligh" <mbligh@...igh.org>
Cc:	akpm@...l.org,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	cmm@...ibm.com, val_henson@...ux.intel.com
Subject: Re: [PATCH] Bring ext2 reservations code in line with latest ext3

On Sun, Nov 12, 2006 at 04:44:07PM -0800, Martin J. Bligh wrote:
 > Did a pass through comparing the functions changed by the ext2
 > reservations patch to current ext3 code. Fixed up comments and
 > typedefs to match latest ext3 code.
 > 
 > Only thing left remaining was the error handling in
 > ext2_try_to_allocate_with_rsv, but it may be OK as is.
 > 
 > Signed-off-by: Martin J. Bligh <mbligh@...gle.com>

 > +/*
 > + * rsv_is_empty() -- Check if the reservation window is allocated.
 > + * @rsv:		given reservation window to check
 > + *
 > + * returns 1 if the end block is EXT3_RESERVE_WINDOW_NOT_ALLOCATED.
 > + */

s/EXT3/EXT2/ ?

 >  static inline int rsv_is_empty(struct ext2_reserve_window *rsv)
 >  {
 >  	/* a valid reservation end block could not be 0 */
 >  	return (rsv->_rsv_end == EXT2_RESERVE_WINDOW_NOT_ALLOCATED);
 >  }

		Dave

-- 
http://www.codemonkey.org.uk
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ