diff options
| author | Linus Torvalds <torvalds@linux-foundation.org> | 2019-03-09 13:54:24 -0500 |
|---|---|---|
| committer | Linus Torvalds <torvalds@linux-foundation.org> | 2019-03-09 13:54:24 -0500 |
| commit | d1cae94871330cb9f5fdcea34529abf7917e682e (patch) | |
| tree | 727bdda6b15bc1252c61eff0d77395e8c02d56c1 /fs/ext4/super.c | |
| parent | 99b25a7fc6150d613be8eab71a47e6c0fcc8d7c5 (diff) | |
| parent | 129ca2d2a83f44551e73a408fa5e75a7b5169abb (diff) | |
Merge tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscrypt
Pull fscrypt updates from Eric Biggers:
"First: Ted, Jaegeuk, and I have decided to add me as a co-maintainer
for fscrypt, and we're now using a shared git tree. So we've updated
MAINTAINERS accordingly, and I'm doing the pull request this time.
The actual changes for v5.1 are:
- Remove the fs-specific kconfig options like CONFIG_EXT4_ENCRYPTION
and make fscrypt support for all fscrypt-capable filesystems be
controlled by CONFIG_FS_ENCRYPTION, similar to how CONFIG_QUOTA
works.
- Improve error code for rename() and link() into encrypted
directories.
- Various cleanups"
* tag 'fscrypt-for-linus' of git://git.kernel.org/pub/scm/fs/fscrypt/fscrypt:
MAINTAINERS: add Eric Biggers as an fscrypt maintainer
fscrypt: return -EXDEV for incompatible rename or link into encrypted dir
fscrypt: remove filesystem specific build config option
f2fs: use IS_ENCRYPTED() to check encryption status
ext4: use IS_ENCRYPTED() to check encryption status
fscrypt: remove CRYPTO_CTR dependency
Diffstat (limited to 'fs/ext4/super.c')
| -rw-r--r-- | fs/ext4/super.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/fs/ext4/super.c b/fs/ext4/super.c index fb12d3c17c1b..60da0a6e4d86 100644 --- a/fs/ext4/super.c +++ b/fs/ext4/super.c | |||
| @@ -1232,7 +1232,7 @@ static int bdev_try_to_free_page(struct super_block *sb, struct page *page, | |||
| 1232 | return try_to_free_buffers(page); | 1232 | return try_to_free_buffers(page); |
| 1233 | } | 1233 | } |
| 1234 | 1234 | ||
| 1235 | #ifdef CONFIG_EXT4_FS_ENCRYPTION | 1235 | #ifdef CONFIG_FS_ENCRYPTION |
| 1236 | static int ext4_get_context(struct inode *inode, void *ctx, size_t len) | 1236 | static int ext4_get_context(struct inode *inode, void *ctx, size_t len) |
| 1237 | { | 1237 | { |
| 1238 | return ext4_xattr_get(inode, EXT4_XATTR_INDEX_ENCRYPTION, | 1238 | return ext4_xattr_get(inode, EXT4_XATTR_INDEX_ENCRYPTION, |
| @@ -1922,7 +1922,7 @@ static int handle_mount_opt(struct super_block *sb, char *opt, int token, | |||
| 1922 | *journal_ioprio = | 1922 | *journal_ioprio = |
| 1923 | IOPRIO_PRIO_VALUE(IOPRIO_CLASS_BE, arg); | 1923 | IOPRIO_PRIO_VALUE(IOPRIO_CLASS_BE, arg); |
| 1924 | } else if (token == Opt_test_dummy_encryption) { | 1924 | } else if (token == Opt_test_dummy_encryption) { |
| 1925 | #ifdef CONFIG_EXT4_FS_ENCRYPTION | 1925 | #ifdef CONFIG_FS_ENCRYPTION |
| 1926 | sbi->s_mount_flags |= EXT4_MF_TEST_DUMMY_ENCRYPTION; | 1926 | sbi->s_mount_flags |= EXT4_MF_TEST_DUMMY_ENCRYPTION; |
| 1927 | ext4_msg(sb, KERN_WARNING, | 1927 | ext4_msg(sb, KERN_WARNING, |
| 1928 | "Test dummy encryption mode enabled"); | 1928 | "Test dummy encryption mode enabled"); |
| @@ -4167,7 +4167,7 @@ static int ext4_fill_super(struct super_block *sb, void *data, int silent) | |||
| 4167 | sb->s_op = &ext4_sops; | 4167 | sb->s_op = &ext4_sops; |
| 4168 | sb->s_export_op = &ext4_export_ops; | 4168 | sb->s_export_op = &ext4_export_ops; |
| 4169 | sb->s_xattr = ext4_xattr_handlers; | 4169 | sb->s_xattr = ext4_xattr_handlers; |
| 4170 | #ifdef CONFIG_EXT4_FS_ENCRYPTION | 4170 | #ifdef CONFIG_FS_ENCRYPTION |
| 4171 | sb->s_cop = &ext4_cryptops; | 4171 | sb->s_cop = &ext4_cryptops; |
| 4172 | #endif | 4172 | #endif |
| 4173 | #ifdef CONFIG_QUOTA | 4173 | #ifdef CONFIG_QUOTA |
