Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp40306pxj; Wed, 16 Jun 2021 19:42:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzvhcdMSOHGSsQ6JJLf2izYIQYMnDUHPDH0ROxN2ztfmZlBtdZ8fhTM+5yWjVGc0DUcCsDP X-Received: by 2002:a05:6e02:1c0f:: with SMTP id l15mr855157ilh.142.1623897745560; Wed, 16 Jun 2021 19:42:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623897745; cv=none; d=google.com; s=arc-20160816; b=hdCPr51W0euVaM5KS45IpuvLD+SM+ey5byqWsAcLUjG9s9ICo3AcjuyjFIxJKrHSGD /9wuwa6/z+U1R192zbEck9Q3W5oMUIa2Umh+AlMP/6KXxicqIKcVhWMbL67SF1592ZIN WuPnFGnfUuYdr/wzyKnWkUTkifAsoMnKq91cgp7fQY/4IMMCQMFrLdSzgh1WZG5dhvVy HU4J8wH0Y4JvCpEQtw4tpCpT33/uQNGnoo6QlPgfnj4+DQSJBeBJERRdlcO6zg1N/qfs TAIY04DNDBV9vHq8Mru3/8qELrnBxZvI6Z5eMWQqGpWUtb6cKW/Whr7aTKVQp4rrVQ7J 8llg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=kz1l03mpfvJAaeWSZ2eu5Fu5+/bURffpEGHbp1QFa3Q=; b=XCBxCpeQVoVJHPC+LFxKUdeAu8/A/v4QGUV5W8UWBxjpOrmiv5h+NmVTmRsuVOVYHs tMXIPX4MwSO3hm8wf9MOf3MO58XEx228+1cV+KdokcmQOQ49ovwu6bog5RPA45XXngvW 6ZNOHUsEngyRgzRSIax/QigCn4AAEXKKHxAeIz+lsKSPLzwKBLimjMxS3/eE+KT7y3oi tEuCevUnVHRXUkk51TRd4esSicOsRnJdc79/MJ6NRlhl31UHC8tpY0MmBVX7E790NbzO 0Iy1v0NZBJP3BfWf2hD1j0e9TNvSo6nH4vNmpe7aVlgbLHQBy4vdrTm6czbBtv9AHRzQ xRow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OAeJ38iR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v4si4795369jan.104.2021.06.16.19.42.14; Wed, 16 Jun 2021 19:42:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OAeJ38iR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235044AbhFQAl3 (ORCPT + 99 others); Wed, 16 Jun 2021 20:41:29 -0400 Received: from mail.kernel.org ([198.145.29.99]:60160 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230186AbhFQAl2 (ORCPT ); Wed, 16 Jun 2021 20:41:28 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 58A59613B9; Thu, 17 Jun 2021 00:39:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1623890361; bh=03/ArqucxHWkgKNjFWE+MpTsoDqzRHJYD0xsgHKqwSc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=OAeJ38iRPpfWJVLqq4hxC0C4ILLheLnIaUrvFOT6NfQr1fc/dTpwMmhXL4lA0/sG1 YtoD4k0ThX+oHg5iC1e9pCjxqEh9RHFYXMefih8rMxcImmc9qE8xHfFmX5yTzUM0io NctP8XqZwhFSqr7ScJQ5bK2zxZakyrVGSnFKHlRo4kEjdt44739MVS2xC7tCukRVgm j62d+wr6NLtggmeURNJdyT6V/7jMk3A+cfWXjOvjZO3/e9JmXfuNKUxviMIpFZinTz Ob+Br+NjrpiUKpPa80zA4KJErckGYKi+Ob76SVGibj17SiHGLBspOmF7ZTV+gG68zM e57KROc9triZQ== Date: Wed, 16 Jun 2021 17:39:20 -0700 From: Eric Biggers To: Satya Tangirala Cc: linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, Jens Axboe Subject: Re: [PATCH v3 04/10] block: respect bio_required_sector_alignment() in blk-crypto-fallback Message-ID: References: <20210604195900.2096121-1-satyat@google.com> <20210604195900.2096121-5-satyat@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210604195900.2096121-5-satyat@google.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 04, 2021 at 07:58:54PM +0000, Satya Tangirala wrote: > Make blk_crypto_split_bio_if_needed() respect > bio_required_sector_alignment() when calling bio_split(). Without this, > blk-crypto-fallback could possibly split a bio in the middle of a data > unit, and the resulting bios can no longer be encrypted (since encryption > can only be done on complete crypto data units). > > Signed-off-by: Satya Tangirala > --- > block/blk-crypto-fallback.c | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/block/blk-crypto-fallback.c b/block/blk-crypto-fallback.c > index c322176a1e09..85c813ef670b 100644 > --- a/block/blk-crypto-fallback.c > +++ b/block/blk-crypto-fallback.c > @@ -19,6 +19,7 @@ > #include > #include > > +#include "blk.h" > #include "blk-crypto-internal.h" > > static unsigned int num_prealloc_bounce_pg = 32; > @@ -225,6 +226,8 @@ static bool blk_crypto_split_bio_if_needed(struct bio **bio_ptr) > if (num_sectors < bio_sectors(bio)) { > struct bio *split_bio; > > + num_sectors = round_down(num_sectors, > + bio_required_sector_alignment(bio)); > split_bio = bio_split(bio, num_sectors, GFP_NOIO, > &crypto_bio_split); > if (!split_bio) { > -- Reviewed-by: Eric Biggers