Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S941083AbcKNDHU (ORCPT ); Sun, 13 Nov 2016 22:07:20 -0500 Received: from imap.thunk.org ([74.207.234.97]:59728 "EHLO imap.thunk.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S941067AbcKNDHP (ORCPT ); Sun, 13 Nov 2016 22:07:15 -0500 Date: Sun, 13 Nov 2016 22:05:48 -0500 From: "Theodore Ts'o" To: Richard Weinberger Cc: linux-mtd@lists.infradead.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, dedekind1@gmail.com, adrian.hunter@intel.com, jaegeuk@kernel.org, david@sigma-star.at, wd@denx.de, sbabic@denx.de, dengler@linutronix.de, ebiggers@google.com, mhalcrow@google.com, hch@infradead.org Subject: Re: [PATCH 00/29] UBIFS File Encryption v1 Message-ID: <20161114030548.eils5al7ugfhlqwg@thunk.org> Mail-Followup-To: Theodore Ts'o , Richard Weinberger , linux-mtd@lists.infradead.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, dedekind1@gmail.com, adrian.hunter@intel.com, jaegeuk@kernel.org, david@sigma-star.at, wd@denx.de, sbabic@denx.de, dengler@linutronix.de, ebiggers@google.com, mhalcrow@google.com, hch@infradead.org References: <1479072072-6844-1-git-send-email-richard@nod.at> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1479072072-6844-1-git-send-email-richard@nod.at> User-Agent: NeoMutt/20161014 (1.7.1) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: tytso@thunk.org X-SA-Exim-Scanned: No (on imap.thunk.org); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 709 Lines: 16 Richard, Your fscrypt patches look good. I've created an fscrypt branch on the ext4.git tree which contains your changes as well as Eric Bigger's recent fspatch cleanups changes. If you want to base your ubifs changes on that branch, that would be great. The ext4 dev branch will be including that fscrypt branch, so it will be feeding into linux-next that way. If you also base your patches on that, it will avoid duplicate patches in linux-next and in Linus's tree when he pulls them. One quick question. When ubifs uses subpage blocks, can you assume that they are always powers of two? Or more to the point, can you assume that it will always be a multiple of the cipher's blocksize? - Ted