Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp12481204ybl; Sat, 28 Dec 2019 13:25:37 -0800 (PST) X-Google-Smtp-Source: APXvYqxvFAM+Un0s4rGOIzcXhx9gNzxSx3rAF5nZZ2aNrcLRF7ejnAew59/IcTRSRZEEjmtZpVzR X-Received: by 2002:a05:6830:1707:: with SMTP id 7mr40562003otk.235.1577568337253; Sat, 28 Dec 2019 13:25:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577568337; cv=none; d=google.com; s=arc-20160816; b=iMNsvwGPPZjbCeS1G8j5pKRqyP2ai2T/F8lDPqlBbMuvbPpYwbvY9gXI7gN9Ecgrf6 IztFoS8G3iNeRwph2cdrfPqaxoJ7ILSm7iHUIpdD1mIC3NWuWSUqYmzFQtF/doLbjxdN j+5iywqX0qp99dRDqA3/9L30LTGK9koys0/KDbtETawz/sfzQLxPKSEV6dEJYZv0SMMJ ZqHU3QjjGGPql0sSmY6bvHUdNxUvSHWBbTQHWJJ3z3knkVLLj53MR0w8+hrNSLQKo3Z/ igSZqa/y0wFbYGrBs5WdjA+tDjFK1rMmZK5WzsVz7Htu+TNHW0YOyqhrNwpNo9Q7kfhl cMdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=Dax74ue6Pc/dJJbbSD1NQsYkXdMScJVfVx0s0qz+Bb4=; b=N6GqbBqlSXZdwiykIxlo3wbZX+pDloYCvM/3nWV4GMxYESX1ecNCX7hLwz9W0fJJvX XfScKfgfo00wBDrLg0mZkNxBNZn9BaRcno4QwkmtLGn91+dQzdDjbo+OeugLrOob31Hz LCxHVUUnr1O2csJdpoHZbCivliSmHooaLVbVWulOktSUGgf6pnw1tZe9EZVSfxxshw2C XTOrYDpnJYtmhovjMwHOE3TlEgM7TaHs/Na07YD4ogWxvLFkyA3l7rsaS2BXIA9vpcGp oeLgkVKWvZ3Ae0I7yRZib0zfQ/OeLl6oENGO7orZ0MNr6ctJ9Zc+FRFegyB3DpEzKhF+ sH+Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z12si4038765oto.125.2019.12.28.13.25.11; Sat, 28 Dec 2019 13:25:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726741AbfL1VWJ (ORCPT + 99 others); Sat, 28 Dec 2019 16:22:09 -0500 Received: from zeniv.linux.org.uk ([195.92.253.2]:52268 "EHLO ZenIV.linux.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726640AbfL1VWJ (ORCPT ); Sat, 28 Dec 2019 16:22:09 -0500 Received: from viro by ZenIV.linux.org.uk with local (Exim 4.92.3 #3 (Red Hat Linux)) id 1ilJX2-0004zv-Ox; Sat, 28 Dec 2019 21:21:56 +0000 Date: Sat, 28 Dec 2019 21:21:56 +0000 From: Al Viro To: Gao Xiang Cc: Chao Yu , linux-erofs@lists.ozlabs.org, David Howells , linux-kernel@vger.kernel.org, chao@kernel.org, Miao Xie Subject: Re: [PATCH RESEND] erofs: convert to use the new mount fs_context api Message-ID: <20191228212156.GU4203@ZenIV.linux.org.uk> References: <20191226022519.53386-1-yuchao0@huawei.com> <20191227035016.GA142350@architecture4> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191227035016.GA142350@architecture4> User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Dec 27, 2019 at 11:50:16AM +0800, Gao Xiang wrote: > Hi Al, > > Greeting, we plan to convert erofs to new mount api for 5.6 > > and I just notice your branch > https://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs.git/log/?h=untested.fs_parse > > do a lot further work on fs context (e.g. "get rid of ->enums", > "remove fs_parameter_description name field" and switch to > use XXXfc() instead of XXXf() with prefixed string). > > Does it plan for 5.6 as well? If yes, we will update this patch > based on the latest branch and maybe have chance to go though > your tree if it can? FWIW, I would add the following to what you've already mentioned: > > +static const struct fs_parameter_spec erofs_param_specs[] = { > > + fsparam_flag("user_xattr", Opt_user_xattr), > > + fsparam_flag("nouser_xattr", Opt_nouser_xattr), > > + fsparam_flag("acl", Opt_acl), > > + fsparam_flag("noacl", Opt_noacl), better off as fsparam_flag_no("user_xattr", Opt_user_xattr), fsparam_flag_no("acl", Opt_acl), > > + case Opt_user_xattr: if (result.boolean) set_opt(sbi, XATTR_USER); else clear_opt(sbi, XATTR_USER); > > + break; .... > > + default: return -ENOPARAM; BTW, what's the point of using invalf() in contexts where the return value is ignored? Why not simply go for errorf() (or errorfc(), for that matter)? I do plan that branch (or an equivalent, as far as filesystems are concerned - there might be a bit of additional rework in the beginning + currently missing modifications of docs) for 5.6. So updated patch would be welcome - I can do that myself, but if you can rebase it on top of that branch it would save time.