Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp3685965iob; Mon, 2 May 2022 03:04:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzX19xno65evJ4d6TsbswSZ9FobFVQF01GGNu+4HGdFIQDI1BmeCDwRgCdNxCTux+CFZsXb X-Received: by 2002:a2e:90c4:0:b0:24f:2334:e2b3 with SMTP id o4-20020a2e90c4000000b0024f2334e2b3mr7309977ljg.24.1651485846327; Mon, 02 May 2022 03:04:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651485846; cv=none; d=google.com; s=arc-20160816; b=0EDuSuHvODI9dkyxof9cVsj1v+0swTmtSWJbE2bSlM+BAWSA6H08lu2Gubulpcp+Hb Cd7O3BS0m5N7Q/64ysr2KQv06jVhbIOW/Hs5qcdHf6t6QWVJOLcoyvZnlkXvXMElSqWZ 72rac6qP7XA+GxWzMov0b48pzLGhO6YTNevPE54Pm6+FyNp5PwRR9tSRD3iXq24wgeOx rvwxq52Nk+scEZp4BMkaJ62etWCw8i41cr7yiquAugZJ2wkxee9Mi30WXolp/gOD+4r+ MSKW1GPltktEuv2TzbH5AxnEQPXtcgmibRGD61TCRFZHRt7D6vcwxqy7BDDFtM2v1L30 ZF1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=KIm0zYk7Q6+tArZqt14n2uWQmVX233hKJvsQd72DoPw=; b=RjbSf2Xh4zTFF5DVYl8BwrAaT1eAo2t/7VPmJv6aaMtBQa2k7UmlvaRBki/Xui/Sd8 xrDGSd06DvAaEFQ8+kyrM/d3R9ZhVq/vvMDwIj/qpfZ1d13yZeCBeSd81QhsLtByBN9G phir/YDNheWvUzAR8WQTiPMf/bCfPAC1I2Fc1NCvHStBVfKnSQ8tq5hO1bVn0x35bfVJ 5BXpT0GHnmsXYfxZErfyiASAs1xRWtXbMg/cQP75zNJJozsBI35fxLGqH8YsiOTc38W3 oCjHRGWSK5gJsIhCcf6990v3X5o927p6MHQoio+yE0JaYbt/z3YZeWJ01gF+Lkzfs6QR z6XQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="jJuiD/wu"; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id cf8-20020a056512280800b0047257e1278dsi4717364lfb.559.2022.05.02.03.03.30; Mon, 02 May 2022 03:04:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="jJuiD/wu"; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240784AbiEAFQU (ORCPT + 99 others); Sun, 1 May 2022 01:16:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40858 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240288AbiEAFQP (ORCPT ); Sun, 1 May 2022 01:16:15 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 471CE50E10; Sat, 30 Apr 2022 22:12:48 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id D70A961166; Sun, 1 May 2022 05:12:47 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 09BEAC385B3; Sun, 1 May 2022 05:12:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1651381967; bh=2vUKQMXpAm2mOWKYBso+HywZABvVuLBsPwnw/l6/ShI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=jJuiD/wueqRCERhHCB1m6wXX0fQSB7LjRmThg8bHSTVsSrIx9CH7W+F3Zwv2uYTVa VPF0+BzbwQg6Fuh63LPmXls424TG77CY0wBrOycaE4j+ciD+IBdADnW56BPsn3Y6Oa 57LSX7rxv2NqneuXuHnayHQP+yKpuJFJJ9943IYa2PF03l5t8+mPIg6ojwScSDx7Pf L/Skqj5+XH926lU72L56chNcJztbgpCcR53OjQhmv74fDq/BNqkU/WIPfpzVzaWrov zJu1nigTgMFfvlKE1a1YjjzhDCiGfNL58gcq9oi0CfxKoGuTK3WJfBbQbKR3A9dkKI mC5E+jSrXuTtg== From: Eric Biggers To: linux-fscrypt@vger.kernel.org, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net Cc: Lukas Czerner , Theodore Ts'o , Jaegeuk Kim , Jeff Layton Subject: [PATCH v2 2/7] f2fs: reject test_dummy_encryption when !CONFIG_FS_ENCRYPTION Date: Sat, 30 Apr 2022 22:08:52 -0700 Message-Id: <20220501050857.538984-3-ebiggers@kernel.org> X-Mailer: git-send-email 2.36.0 In-Reply-To: <20220501050857.538984-1-ebiggers@kernel.org> References: <20220501050857.538984-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org From: Eric Biggers There is no good reason to allow this mount option when the kernel isn't configured with encryption support. Since this option is only for testing, we can just fix this; we don't really need to worry about breaking anyone who might be counting on this option being ignored. Signed-off-by: Eric Biggers --- fs/f2fs/super.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c index 4368f90571bd6..6f69491aa5731 100644 --- a/fs/f2fs/super.c +++ b/fs/f2fs/super.c @@ -525,10 +525,11 @@ static int f2fs_set_test_dummy_encryption(struct super_block *sb, return -EINVAL; } f2fs_warn(sbi, "Test dummy encryption mode enabled"); + return 0; #else - f2fs_warn(sbi, "Test dummy encryption mount option ignored"); + f2fs_warn(sbi, "test_dummy_encryption option not supported"); + return -EINVAL; #endif - return 0; } #ifdef CONFIG_F2FS_FS_COMPRESSION -- 2.36.0