diff mbox

fscrypt: constify struct fscrypt_operations

Message ID 20170105204243.79135-1-ebiggers3@gmail.com (mailing list archive)
State New, archived
Headers show

Commit Message

Eric Biggers Jan. 5, 2017, 8:42 p.m. UTC
From: Eric Biggers <ebiggers@google.com>

Signed-off-by: Eric Biggers <ebiggers@google.com>
---
 fs/ext4/super.c   | 4 ++--
 fs/f2fs/super.c   | 4 ++--
 fs/ubifs/crypto.c | 2 +-
 fs/ubifs/super.c  | 2 +-
 fs/ubifs/ubifs.h  | 2 +-
 5 files changed, 7 insertions(+), 7 deletions(-)

Comments

Richard Weinberger Jan. 6, 2017, 12:03 a.m. UTC | #1
Am 05.01.2017 um 21:42 schrieb Eric Biggers:
> From: Eric Biggers <ebiggers@google.com>
> 
> Signed-off-by: Eric Biggers <ebiggers@google.com>
> ---
>  fs/ext4/super.c   | 4 ++--
>  fs/f2fs/super.c   | 4 ++--
>  fs/ubifs/crypto.c | 2 +-
>  fs/ubifs/super.c  | 2 +-
>  fs/ubifs/ubifs.h  | 2 +-
>  5 files changed, 7 insertions(+), 7 deletions(-)

Reviewed-by: Richard Weinberger <richard@nod.at>

Eric, I assume you did also a build test with UBIFS enabled, right?
Constifying stuff often looks easy but can uncover horrors. ;D

Thanks,
//richard
--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Eric Biggers Jan. 6, 2017, 12:09 a.m. UTC | #2
On Fri, Jan 06, 2017 at 01:03:33AM +0100, Richard Weinberger wrote:
> Am 05.01.2017 um 21:42 schrieb Eric Biggers:
> > From: Eric Biggers <ebiggers@google.com>
> > 
> > Signed-off-by: Eric Biggers <ebiggers@google.com>
> > ---
> >  fs/ext4/super.c   | 4 ++--
> >  fs/f2fs/super.c   | 4 ++--
> >  fs/ubifs/crypto.c | 2 +-
> >  fs/ubifs/super.c  | 2 +-
> >  fs/ubifs/ubifs.h  | 2 +-
> >  5 files changed, 7 insertions(+), 7 deletions(-)
> 
> Reviewed-by: Richard Weinberger <richard@nod.at>
> 
> Eric, I assume you did also a build test with UBIFS enabled, right?
> Constifying stuff often looks easy but can uncover horrors. ;D
> 

Yes, I compiled with ext4, f2fs, and ubifs enabled, both with and without
encryption enabled for each filesystem.

Eric
--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Eric Biggers Jan. 23, 2017, 8:16 p.m. UTC | #3
On Thu, Jan 05, 2017 at 12:42:43PM -0800, Eric Biggers wrote:
> From: Eric Biggers <ebiggers@google.com>
> 
> Signed-off-by: Eric Biggers <ebiggers@google.com>
> ---
>  fs/ext4/super.c   | 4 ++--
>  fs/f2fs/super.c   | 4 ++--
>  fs/ubifs/crypto.c | 2 +-
>  fs/ubifs/super.c  | 2 +-
>  fs/ubifs/ubifs.h  | 2 +-
>  5 files changed, 7 insertions(+), 7 deletions(-)
> 

Ted, are you interested in taking this patch?  If you'd like I can resend to fix
the conflict with the ->key_prefix change.

Eric
--
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff mbox

Patch

diff --git a/fs/ext4/super.c b/fs/ext4/super.c
index 66845a08a87a..2358714bbc33 100644
--- a/fs/ext4/super.c
+++ b/fs/ext4/super.c
@@ -1179,7 +1179,7 @@  static unsigned ext4_max_namelen(struct inode *inode)
 		EXT4_NAME_LEN;
 }
 
-static struct fscrypt_operations ext4_cryptops = {
+static const struct fscrypt_operations ext4_cryptops = {
 	.get_context		= ext4_get_context,
 	.key_prefix		= ext4_key_prefix,
 	.prepare_context	= ext4_prepare_context,
@@ -1190,7 +1190,7 @@  static struct fscrypt_operations ext4_cryptops = {
 	.max_namelen		= ext4_max_namelen,
 };
 #else
-static struct fscrypt_operations ext4_cryptops = {
+static const struct fscrypt_operations ext4_cryptops = {
 	.is_encrypted		= ext4_encrypted_inode,
 };
 #endif
diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c
index 702638e21c76..30198e5bdf26 100644
--- a/fs/f2fs/super.c
+++ b/fs/f2fs/super.c
@@ -1176,7 +1176,7 @@  static unsigned f2fs_max_namelen(struct inode *inode)
 			inode->i_sb->s_blocksize : F2FS_NAME_LEN;
 }
 
-static struct fscrypt_operations f2fs_cryptops = {
+static const struct fscrypt_operations f2fs_cryptops = {
 	.get_context	= f2fs_get_context,
 	.key_prefix	= f2fs_key_prefix,
 	.set_context	= f2fs_set_context,
@@ -1185,7 +1185,7 @@  static struct fscrypt_operations f2fs_cryptops = {
 	.max_namelen	= f2fs_max_namelen,
 };
 #else
-static struct fscrypt_operations f2fs_cryptops = {
+static const struct fscrypt_operations f2fs_cryptops = {
 	.is_encrypted	= f2fs_encrypted_inode,
 };
 #endif
diff --git a/fs/ubifs/crypto.c b/fs/ubifs/crypto.c
index 3402720f2b28..182419b245e7 100644
--- a/fs/ubifs/crypto.c
+++ b/fs/ubifs/crypto.c
@@ -86,7 +86,7 @@  int ubifs_decrypt(const struct inode *inode, struct ubifs_data_node *dn,
 	return 0;
 }
 
-struct fscrypt_operations ubifs_crypt_operations = {
+const struct fscrypt_operations ubifs_crypt_operations = {
 	.flags			= FS_CFLG_OWN_PAGES,
 	.get_context		= ubifs_crypt_get_context,
 	.set_context		= ubifs_crypt_set_context,
diff --git a/fs/ubifs/super.c b/fs/ubifs/super.c
index e08aa04fc835..b73811bd7676 100644
--- a/fs/ubifs/super.c
+++ b/fs/ubifs/super.c
@@ -2000,7 +2000,7 @@  static struct ubifs_info *alloc_ubifs_info(struct ubi_volume_desc *ubi)
 }
 
 #ifndef CONFIG_UBIFS_FS_ENCRYPTION
-struct fscrypt_operations ubifs_crypt_operations = {
+const struct fscrypt_operations ubifs_crypt_operations = {
 	.is_encrypted		= __ubifs_crypt_is_encrypted,
 };
 #endif
diff --git a/fs/ubifs/ubifs.h b/fs/ubifs/ubifs.h
index ca72382ce6cc..15f1d1f129b6 100644
--- a/fs/ubifs/ubifs.h
+++ b/fs/ubifs/ubifs.h
@@ -1842,7 +1842,7 @@  int ubifs_decrypt(const struct inode *inode, struct ubifs_data_node *dn,
 		  unsigned int *out_len, int block);
 #endif
 
-extern struct fscrypt_operations ubifs_crypt_operations;
+extern const struct fscrypt_operations ubifs_crypt_operations;
 
 static inline bool __ubifs_crypt_is_encrypted(struct inode *inode)
 {