diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2019-03-09 13:54:24 -0500 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2019-03-09 13:54:24 -0500 |
commit | d1cae94871330cb9f5fdcea34529abf7917e682e (patch) | |
tree | 727bdda6b15bc1252c61eff0d77395e8c02d56c1 /fs/ext4/extents.c | |
parent | 99b25a7fc6150d613be8eab71a47e6c0fcc8d7c5 (diff) | |
parent | 129ca2d2a83f44551e73a408fa5e75a7b5169abb (diff) |
Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscrypt
Pull fscrypt updates from Eric Biggers:
"First: Ted, Jaegeuk, and I have decided to add me as a co-maintainer
for fscrypt, and we're now using a shared git tree. So we've updated
MAINTAINERS accordingly, and I'm doing the pull request this time.
The actual changes for v5.1 are:
- Remove the fs-specific kconfig options like CONFIG_EXT4_ENCRYPTION
and make fscrypt support for all fscrypt-capable filesystems be
controlled by CONFIG_FS_ENCRYPTION, similar to how CONFIG_QUOTA
works.
- Improve error code for rename() and link() into encrypted
directories.
- Various cleanups"
* tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscrypt:
MAINTAINERS: add Eric Biggers as an fscrypt maintainer
fscrypt: return -EXDEV for incompatible rename or link into encrypted dir
fscrypt: remove filesystem specific build config option
f2fs: use IS_ENCRYPTED() to check encryption status
ext4: use IS_ENCRYPTED() to check encryption status
fscrypt: remove CRYPTO_CTR dependency
Diffstat (limited to 'fs/ext4/extents.c')
-rw-r--r-- | fs/ext4/extents.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/fs/ext4/extents.c b/fs/ext4/extents.c index 240b6dea5441..79d986dbf5af 100644 --- a/fs/ext4/extents.c +++ b/fs/ext4/extents.c | |||
@@ -3631,7 +3631,7 @@ static int ext4_ext_convert_to_initialized(handle_t *handle, | |||
3631 | max_zeroout = sbi->s_extent_max_zeroout_kb >> | 3631 | max_zeroout = sbi->s_extent_max_zeroout_kb >> |
3632 | (inode->i_sb->s_blocksize_bits - 10); | 3632 | (inode->i_sb->s_blocksize_bits - 10); |
3633 | 3633 | ||
3634 | if (ext4_encrypted_inode(inode)) | 3634 | if (IS_ENCRYPTED(inode)) |
3635 | max_zeroout = 0; | 3635 | max_zeroout = 0; |
3636 | 3636 | ||
3637 | /* | 3637 | /* |
@@ -4818,7 +4818,7 @@ long ext4_fallocate(struct file *file, int mode, loff_t offset, loff_t len) | |||
4818 | * leave it disabled for encrypted inodes for now. This is a | 4818 | * leave it disabled for encrypted inodes for now. This is a |
4819 | * bug we should fix.... | 4819 | * bug we should fix.... |
4820 | */ | 4820 | */ |
4821 | if (ext4_encrypted_inode(inode) && | 4821 | if (IS_ENCRYPTED(inode) && |
4822 | (mode & (FALLOC_FL_COLLAPSE_RANGE | FALLOC_FL_INSERT_RANGE | | 4822 | (mode & (FALLOC_FL_COLLAPSE_RANGE | FALLOC_FL_INSERT_RANGE | |
4823 | FALLOC_FL_ZERO_RANGE))) | 4823 | FALLOC_FL_ZERO_RANGE))) |
4824 | return -EOPNOTSUPP; | 4824 | return -EOPNOTSUPP; |