diff options
| author | Linus Torvalds <torvalds@linux-foundation.org> | 2019-03-09 13:54:24 -0500 |
|---|---|---|
| committer | Linus Torvalds <torvalds@linux-foundation.org> | 2019-03-09 13:54:24 -0500 |
| commit | d1cae94871330cb9f5fdcea34529abf7917e682e (patch) | |
| tree | 727bdda6b15bc1252c61eff0d77395e8c02d56c1 /fs/ext4/readpage.c | |
| parent | 99b25a7fc6150d613be8eab71a47e6c0fcc8d7c5 (diff) | |
| parent | 129ca2d2a83f44551e73a408fa5e75a7b5169abb (diff) | |
Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscrypt
Pull fscrypt updates from Eric Biggers:
"First: Ted, Jaegeuk, and I have decided to add me as a co-maintainer
for fscrypt, and we're now using a shared git tree. So we've updated
MAINTAINERS accordingly, and I'm doing the pull request this time.
The actual changes for v5.1 are:
- Remove the fs-specific kconfig options like CONFIG_EXT4_ENCRYPTION
and make fscrypt support for all fscrypt-capable filesystems be
controlled by CONFIG_FS_ENCRYPTION, similar to how CONFIG_QUOTA
works.
- Improve error code for rename() and link() into encrypted
directories.
- Various cleanups"
* tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscrypt:
MAINTAINERS: add Eric Biggers as an fscrypt maintainer
fscrypt: return -EXDEV for incompatible rename or link into encrypted dir
fscrypt: remove filesystem specific build config option
f2fs: use IS_ENCRYPTED() to check encryption status
ext4: use IS_ENCRYPTED() to check encryption status
fscrypt: remove CRYPTO_CTR dependency
Diffstat (limited to 'fs/ext4/readpage.c')
| -rw-r--r-- | fs/ext4/readpage.c | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/fs/ext4/readpage.c b/fs/ext4/readpage.c index e53639784892..3adadf461825 100644 --- a/fs/ext4/readpage.c +++ b/fs/ext4/readpage.c | |||
| @@ -49,7 +49,7 @@ | |||
| 49 | 49 | ||
| 50 | static inline bool ext4_bio_encrypted(struct bio *bio) | 50 | static inline bool ext4_bio_encrypted(struct bio *bio) |
| 51 | { | 51 | { |
| 52 | #ifdef CONFIG_EXT4_FS_ENCRYPTION | 52 | #ifdef CONFIG_FS_ENCRYPTION |
| 53 | return unlikely(bio->bi_private != NULL); | 53 | return unlikely(bio->bi_private != NULL); |
| 54 | #else | 54 | #else |
| 55 | return false; | 55 | return false; |
| @@ -243,8 +243,7 @@ int ext4_mpage_readpages(struct address_space *mapping, | |||
| 243 | if (bio == NULL) { | 243 | if (bio == NULL) { |
| 244 | struct fscrypt_ctx *ctx = NULL; | 244 | struct fscrypt_ctx *ctx = NULL; |
| 245 | 245 | ||
| 246 | if (ext4_encrypted_inode(inode) && | 246 | if (IS_ENCRYPTED(inode) && S_ISREG(inode->i_mode)) { |
| 247 | S_ISREG(inode->i_mode)) { | ||
| 248 | ctx = fscrypt_get_ctx(inode, GFP_NOFS); | 247 | ctx = fscrypt_get_ctx(inode, GFP_NOFS); |
| 249 | if (IS_ERR(ctx)) | 248 | if (IS_ERR(ctx)) |
| 250 | goto set_error_page; | 249 | goto set_error_page; |
