That's not just the only problem,
> + if (uspi->s_bsize < 512) {
> + printk("ufs_read_super: fragment size %u is too small\n"
> + uspi->s_fsize);
> + goto failed;
> + }
> + if (uspi->s_bsize > 4096) {
> + printk("ufs_read_super: fragment size %u is too large\n"
> + uspi->s_fsize);
> + goto failed;
> + }
The patch is testing s_bsize and complains about s_fsize.
Jan
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/