Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp4021908imc; Thu, 14 Mar 2019 10:24:14 -0700 (PDT) X-Google-Smtp-Source: APXvYqx/YH0pwFfZqddj4h2gnuI4eT7UXb/jtFOWXAmxa2U454gaUOuEkqQ9c4CwDZm0z0qkJD0j X-Received: by 2002:a65:62d4:: with SMTP id m20mr46589119pgv.416.1552584254302; Thu, 14 Mar 2019 10:24:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552584254; cv=none; d=google.com; s=arc-20160816; b=oiHF+isLszGFsyI2D+XV4MVwiqi0Dw99TLl8/geMuVP4x3SuTAEpn4mf/K/QDMuQyb 87SWcVrCdXdMg72hOydJ56C1+abu4AS2PF8wXzOWztsKW/53aDsfm+2VoL9WBa0rAZOM EeQMDVUvopUTveSa4E7Zc/+vYYS1fG9ChFqsDnuBi29sl/GQozd89lI4gnesRov6UEDq CeqCtlOW2djBFvGgMGgRHFm3iNuNTo4lSdQ6zI4yZ/1+/xcGxdD2z+DxqOdXEHEofzXR e/Ygf0Vwxv92vgvlla8YS2k73c1DbVQmsdLO4Vyf9mL5LakBeSWx8S4T4HLu4Zp9Psmd sJIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=y5319p4oaoBKWWEgWN4gCFKL2cQMPvwNY2ovr5av9To=; b=BK+xvDyI/1pJh9zqwRDj/ohr4nZnwHTJOwUx17izco/j5550oc7t1r8sowbFAcB625 UHJdNjFYp6Eyka9LO0fImLWlPJ2cFhspt1OCpNuSLm+M8FlIvUkyT+FX303etZg1M608 vzoLKgbmIJ2DiR1PblYGGTJaVUr7BiCRTjvhuJIcx0+iSGggW0RlbTmELMpj+jbgcqAk PKVhecKH3jhV5W8w+zwdloqGOh/tLRMM86nG1w3zIVMtgZnhfMAJkeBbU8lg9bu5dpzP gDzcb7fpx2dYwgBQetjfM1UFqmMdVHm3EY9rqKPPAtpJE0x2Mrl9pWCGpLEDX+K3Qmz7 8XJQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o10si1253870pgp.483.2019.03.14.10.23.59; Thu, 14 Mar 2019 10:24:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727627AbfCNRXT (ORCPT + 99 others); Thu, 14 Mar 2019 13:23:19 -0400 Received: from lilium.sigma-star.at ([109.75.188.150]:53170 "EHLO lilium.sigma-star.at" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726867AbfCNRXO (ORCPT ); Thu, 14 Mar 2019 13:23:14 -0400 Received: from localhost (localhost [127.0.0.1]) by lilium.sigma-star.at (Postfix) with ESMTP id 175C21802DF74; Thu, 14 Mar 2019 18:16:16 +0100 (CET) From: Richard Weinberger To: linux-mtd@lists.infradead.org Cc: linux-fscrypt@vger.kernel.org, jaegeuk@kernel.org, tytso@mit.edu, linux-unionfs@vger.kernel.org, miklos@szeredi.hu, amir73il@gmail.com, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, paullawrence@google.com, Richard Weinberger Subject: [PATCH 2/4] fscrypt: Export fscrypt_d_ops Date: Thu, 14 Mar 2019 18:15:57 +0100 Message-Id: <20190314171559.27584-3-richard@nod.at> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190314171559.27584-1-richard@nod.at> References: <20190314171559.27584-1-richard@nod.at> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org If a filesystem manages dentry operations itself it might want to re-use fscrypt_d_ops. Signed-off-by: Richard Weinberger --- fs/crypto/crypto.c | 1 + fs/crypto/fscrypt_private.h | 1 - include/linux/fscrypt.h | 1 + 3 files changed, 2 insertions(+), 1 deletion(-) diff --git a/fs/crypto/crypto.c b/fs/crypto/crypto.c index 4dc788e3bc96..8018f8bba50d 100644 --- a/fs/crypto/crypto.c +++ b/fs/crypto/crypto.c @@ -357,6 +357,7 @@ static int fscrypt_d_revalidate(struct dentry *dentry= , unsigned int flags) const struct dentry_operations fscrypt_d_ops =3D { .d_revalidate =3D fscrypt_d_revalidate, }; +EXPORT_SYMBOL(fscrypt_d_ops); =20 void fscrypt_restore_control_page(struct page *page) { diff --git a/fs/crypto/fscrypt_private.h b/fs/crypto/fscrypt_private.h index 7da276159593..bced1ee4fd64 100644 --- a/fs/crypto/fscrypt_private.h +++ b/fs/crypto/fscrypt_private.h @@ -125,7 +125,6 @@ extern int fscrypt_do_page_crypto(const struct inode = *inode, gfp_t gfp_flags); extern struct page *fscrypt_alloc_bounce_page(struct fscrypt_ctx *ctx, gfp_t gfp_flags); -extern const struct dentry_operations fscrypt_d_ops; =20 extern void __printf(3, 4) __cold fscrypt_msg(struct super_block *sb, const char *level, const char *fmt, = ...); diff --git a/include/linux/fscrypt.h b/include/linux/fscrypt.h index 7139a110ac4f..2b9577e4707f 100644 --- a/include/linux/fscrypt.h +++ b/include/linux/fscrypt.h @@ -231,6 +231,7 @@ extern int __fscrypt_encrypt_symlink(struct inode *in= ode, const char *target, extern const char *fscrypt_get_symlink(struct inode *inode, const void *= caddr, unsigned int max_size, struct delayed_call *done); +extern const struct dentry_operations fscrypt_d_ops; #else /* !CONFIG_FS_ENCRYPTION */ =20 static inline bool fscrypt_has_encryption_key(const struct inode *inode) --=20 2.21.0