diff options
| author | Linus Torvalds <torvalds@linux-foundation.org> | 2019-03-09 13:54:24 -0500 |
|---|---|---|
| committer | Linus Torvalds <torvalds@linux-foundation.org> | 2019-03-09 13:54:24 -0500 |
| commit | d1cae94871330cb9f5fdcea34529abf7917e682e (patch) | |
| tree | 727bdda6b15bc1252c61eff0d77395e8c02d56c1 /fs/ext4/extents.c | |
| parent | 99b25a7fc6150d613be8eab71a47e6c0fcc8d7c5 (diff) | |
| parent | 129ca2d2a83f44551e73a408fa5e75a7b5169abb (diff) | |
Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscrypt
Pull fscrypt updates from Eric Biggers:
"First: Ted, Jaegeuk, and I have decided to add me as a co-maintainer
for fscrypt, and we're now using a shared git tree. So we've updated
MAINTAINERS accordingly, and I'm doing the pull request this time.
The actual changes for v5.1 are:
- Remove the fs-specific kconfig options like CONFIG_EXT4_ENCRYPTION
and make fscrypt support for all fscrypt-capable filesystems be
controlled by CONFIG_FS_ENCRYPTION, similar to how CONFIG_QUOTA
works.
- Improve error code for rename() and link() into encrypted
directories.
- Various cleanups"
* tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscrypt:
MAINTAINERS: add Eric Biggers as an fscrypt maintainer
fscrypt: return -EXDEV for incompatible rename or link into encrypted dir
fscrypt: remove filesystem specific build config option
f2fs: use IS_ENCRYPTED() to check encryption status
ext4: use IS_ENCRYPTED() to check encryption status
fscrypt: remove CRYPTO_CTR dependency
Diffstat (limited to 'fs/ext4/extents.c')
| -rw-r--r-- | fs/ext4/extents.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/fs/ext4/extents.c b/fs/ext4/extents.c index 240b6dea5441..79d986dbf5af 100644 --- a/fs/ext4/extents.c +++ b/fs/ext4/extents.c | |||
| @@ -3631,7 +3631,7 @@ static int ext4_ext_convert_to_initialized(handle_t *handle, | |||
| 3631 | max_zeroout = sbi->s_extent_max_zeroout_kb >> | 3631 | max_zeroout = sbi->s_extent_max_zeroout_kb >> |
| 3632 | (inode->i_sb->s_blocksize_bits - 10); | 3632 | (inode->i_sb->s_blocksize_bits - 10); |
| 3633 | 3633 | ||
| 3634 | if (ext4_encrypted_inode(inode)) | 3634 | if (IS_ENCRYPTED(inode)) |
| 3635 | max_zeroout = 0; | 3635 | max_zeroout = 0; |
| 3636 | 3636 | ||
| 3637 | /* | 3637 | /* |
| @@ -4818,7 +4818,7 @@ long ext4_fallocate(struct file *file, int mode, loff_t offset, loff_t len) | |||
| 4818 | * leave it disabled for encrypted inodes for now. This is a | 4818 | * leave it disabled for encrypted inodes for now. This is a |
| 4819 | * bug we should fix.... | 4819 | * bug we should fix.... |
| 4820 | */ | 4820 | */ |
| 4821 | if (ext4_encrypted_inode(inode) && | 4821 | if (IS_ENCRYPTED(inode) && |
| 4822 | (mode & (FALLOC_FL_COLLAPSE_RANGE | FALLOC_FL_INSERT_RANGE | | 4822 | (mode & (FALLOC_FL_COLLAPSE_RANGE | FALLOC_FL_INSERT_RANGE | |
| 4823 | FALLOC_FL_ZERO_RANGE))) | 4823 | FALLOC_FL_ZERO_RANGE))) |
| 4824 | return -EOPNOTSUPP; | 4824 | return -EOPNOTSUPP; |
