Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp681559pxx; Wed, 28 Oct 2020 14:19:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyXSY1IXrNb4WPHJMTkWgxV9cAQNAiTHsNZ2tYNy6+KOul5hgAX/62CXJyp8SFqwZGKwoGf X-Received: by 2002:aa7:dc50:: with SMTP id g16mr865128edu.95.1603919953327; Wed, 28 Oct 2020 14:19:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603919953; cv=none; d=google.com; s=arc-20160816; b=mPOGrHjxnHQVHx97z5sYs+3VyxcAX75ljySaDHjZ42+lUrhku3BOXqA0YQdfcpYMNS a7wOOKjQohb3GLC1hg8DpCtRGXjYGI+ydBhLFMB2fOmSx/o0sVv/fd7f6rD210C3JPZt IAYGGRLlsPJwCc6hhyz+wop8G3S/rRMPqed2RPIsY1gMeDYBRF7j5z5AuDnXT7t7Yjhd 97fUrxuhstj1f2gEwawZJcIKZYXWsQNiv30LIlbDkXtV7W+2laND8i6jpKfEUKAIZdJP GSE2TQ3QSYs1m5iQr5EHkkGtI4w/uzts+mn0ewzFM3Wyvqtv1+ez9fBllznxyxxQQY1S ShlQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=j0vGwqoir0KqnHu4SEAfKVwwci2KWiW3I4i2VG5Url0=; b=kwcceI0jBpdPYbQ1t0EVeyHg/wt2rlA1w9qfUu3kgExQZFkiJ3747VLNEon3EDxBVY u2t+7TeFMTlNuwPpREAj4TAF70twyPoTI3/8wXfkewVdAM0yRb5BymMAeDo6AUmew1mh ab3xZP6sQq1QOWhVyISMeSsEG94VK+4WGRjPjTH8a1TwnDVOQmW/k+5WuovUfkt3MnxU RttwnH0SCPRcIqJczbek0fPtSUEI46z1ta9u4MfYtL3OwyosI0YW0VJmyRHDAZse+7rE szg1ku2aYEdNXZ55m3a/2sFwwxsOvUJQRzTUUAxznI6xw7Yy+samaaBj+ngHje78rXci KYVg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NU0KV8zW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bm13si21671edb.281.2020.10.28.14.18.51; Wed, 28 Oct 2020 14:19:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NU0KV8zW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1830835AbgJ0UFA (ORCPT + 99 others); Tue, 27 Oct 2020 16:05:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:44124 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1830753AbgJ0UEn (ORCPT ); Tue, 27 Oct 2020 16:04:43 -0400 Received: from gmail.com (unknown [104.132.1.76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 965AF2222C; Tue, 27 Oct 2020 20:04:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603829082; bh=f+2hjx0YuqPqtRa+YtUvmPaLqiGcwczmgW7+ZwGJdrY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=NU0KV8zW5ixCAu+sNYnAH6LjIGq57HEQiDTruW66p/XuJi+agDC0uCFDvRfJGKuwm xBuME07GZ1sMYD+XuQolKP8fi43DApYhwyL1CkpUO4+qEn/BfIRoJwr6NgLf7A1/ox DQ345kGma6N7sYoDvZ7S2Ja1xdpf6xh/XgY7UWag= Date: Tue, 27 Oct 2020 13:04:41 -0700 From: Eric Biggers To: Satya Tangirala Cc: linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, dm-devel@redhat.com, Jens Axboe , Alasdair Kergon , Mike Snitzer Subject: Re: [PATCH v2 1/4] block: keyslot-manager: Introduce passthrough keyslot manager Message-ID: <20201027200441.GA2416412@gmail.com> References: <20201015214632.41951-1-satyat@google.com> <20201015214632.41951-2-satyat@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201015214632.41951-2-satyat@google.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 15, 2020 at 09:46:29PM +0000, Satya Tangirala wrote: > +/** > + * blk_ksm_init_passthrough() - Init a passthrough keyslot manager > + * @ksm: The keyslot manager to init > + * > + * Initialize a passthrough keyslot manager. > + * Called by e.g. storage drivers to set up a keyslot manager in their > + * request_queue, when the storage driver wants to manage its keys by itself. > + * This is useful for inline encryption hardware that doesn't have the concept > + * of keyslots, and for layered devices. > + * > + * See blk_ksm_init() for more details about the parameters. > + */ > +void blk_ksm_init_passthrough(struct blk_keyslot_manager *ksm) > +{ > + memset(ksm, 0, sizeof(*ksm)); > + init_rwsem(&ksm->lock); > +} > +EXPORT_SYMBOL_GPL(blk_ksm_init_passthrough); The last paragraph of the comment ("See blk_ksm_init() for more details about the parameters.") isn't useful and should be removed. Otherwise this patch looks fine. You can add: Reviewed-by: Eric Biggers - Eric