Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp1112384ybi; Fri, 21 Jun 2019 14:08:28 -0700 (PDT) X-Google-Smtp-Source: APXvYqy3Pgi/eBPCABGdpQd+kJhbwGgr6LsQRPL49ksEchGkidW7WhkGoSqCYMfZZxIwuv1Yk1x6 X-Received: by 2002:a17:90a:7787:: with SMTP id v7mr9137368pjk.143.1561151308508; Fri, 21 Jun 2019 14:08:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561151308; cv=none; d=google.com; s=arc-20160816; b=0CmT+f+F3wpHA2PM6hVHl1DaI8PDygvnwzBSUuIMRBmCF22yoA5FFpVFQTRDSdrfGo RUsFXIOPx2GgEGTlgb2olaPlbDjn5Edm+PqTg2shZpV2iuP+/khVsGWdg27WYA7O2Yh6 urr/NVn3WLA9nwPi528TsApKTCbI6YAWC9FNkUjBE/dHZzb8WLQTEztpZS2Um+RwDXXx w4z+GcoRsS/IvAqun2xZ2YygLxIC6QKSzDIGIpPVQpf3f0pQrMDU47ul/IEu5XP/1a8X a07ydDy2oXx3c6eFs4A19dsADKiis9dV8HKsKJ7pE9gJ5gp2QegYR7Q276vBSpykfvD3 eJnw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=zKuf+V1+RbXQKcq1H6et5TR7SOKbWr48zARofednqvs=; b=eW4MJlKmwI71aLDOShS2VhT0NlJryUlUfMi9HIBsebp2X4xZZWFC6Gs4aCwjKNfemQ Qiwopxp0zFicupVzeAXLlb8DJgBXLo+o1KmEFMpCRCJ4mPz/hY9iHMnR5W3EVeVCGz+O aCnrpKZ0PZsBwCXH9eYtQyGt+V6HMmWpBS7524BHWyL9av/jaql3vsfydSpOMxPU7FqV 844y1UNqPKR1wik7ffFceygBWcO+Ovn3QHoJ8wi62B0LrRCs4zvUbTuAqeq0kXL3iywe Dae1WKlGPzE385CD6I9OCKJgvXi78j4rhbjq65X3pPfwwvFaaAMa8i+hb58Sh/tnlY4N W3HQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="ig94Vct/"; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d12si3726744pla.121.2019.06.21.14.08.07; Fri, 21 Jun 2019 14:08:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="ig94Vct/"; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726017AbfFUVIE (ORCPT + 99 others); Fri, 21 Jun 2019 17:08:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:44958 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725992AbfFUVIE (ORCPT ); Fri, 21 Jun 2019 17:08:04 -0400 Received: from gmail.com (unknown [104.132.1.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id ACFC82089E; Fri, 21 Jun 2019 21:08:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1561151283; bh=gtxyIpbIl3ETbSi7Kx86WqNdwAWvLeSvlwgQZO3onNk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=ig94Vct/bFpcMbbtJnrwjzepAgoGkVSAr4Ne+FIqK3oAoVBfFLtc/BEmzHFWz+JZM tZ3hNgfFAe5asAXZqr3rMC8NoZ7Kn2c7zvK/8XELkvOht6zvZhokBYJ7nuB3Lmd94h VcaBBHf2d3Qj3Qa6pAneczJm3kRiWnGVTVqhtm5A= Date: Fri, 21 Jun 2019 14:08:01 -0700 From: Eric Biggers To: Chandan Rajendra Cc: linux-fsdevel@vger.kernel.org, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-fscrypt@vger.kernel.org, tytso@mit.edu, adilger.kernel@dilger.ca, jaegeuk@kernel.org, yuchao0@huawei.com, hch@infradead.org Subject: Re: [PATCH V3 2/7] Integrate read callbacks into Ext4 and F2FS Message-ID: <20190621210800.GB167064@gmail.com> References: <20190616160813.24464-1-chandan@linux.ibm.com> <20190616160813.24464-3-chandan@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190616160813.24464-3-chandan@linux.ibm.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org Hi Chandan, On Sun, Jun 16, 2019 at 09:38:08PM +0530, Chandan Rajendra wrote: > This commit gets Ext4 and F2FS to make use of read callbacks API to > perform decryption of file data read from the disk. > --- > fs/crypto/bio.c | 30 +-------- > fs/crypto/crypto.c | 1 + > fs/crypto/fscrypt_private.h | 3 + > fs/ext4/readpage.c | 29 +++------ > fs/f2fs/data.c | 124 +++++++----------------------------- > fs/f2fs/super.c | 9 +-- > fs/read_callbacks.c | 1 - > include/linux/fscrypt.h | 18 ------ > 8 files changed, 40 insertions(+), 175 deletions(-) > This patch changes many different components. It would be much easier to review, and might get more attention from the other ext4 and f2fs developers, if it were split into 3 patches: a. Convert ext4 to use read_callbacks. b. Convert f2fs to use read_callbacks. c. Remove the functions from fs/crypto/ that became unused as a result of patches (a) and (b). (Actually, this part probably should be merged with the patch that removes the fscrypt_ctx, and the patch renamed to something like "fscrypt: remove decryption I/O path helpers") Any reason why this wouldn't work? AFAICS, you couldn't do it only because you made this patch change fscrypt_enqueue_decrypt_work() to be responsible for initializing the work function. But as per my comments on patch 1, I don't think we should do that, since it would make much more sense to put the work function in read_callbacks.c. However, since you're converting ext4 to use mpage_readpages() anyway, I don't think we should bother with the intermediate change to ext4_mpage_readpages(). It's useless, and that intermediate state of the ext4 code inevitably won't get tested very well. So perhaps order the whole series as: - fs: introduce read_callbacks - fs/mpage.c: add decryption support via read_callbacks - fs/buffer.c: add decryption support via read_callbacks - f2fs: convert to use read_callbacks - ext4: convert to use mpage_readpages[s] - ext4: support encryption with subpage-sized blocks - fscrypt: remove decryption I/O path helpers That order would also give the flexibility to possibly apply the fs/ changes first, without having to update both ext4 and f2fs simultaneously with them. > @@ -557,8 +511,7 @@ static struct bio *f2fs_grab_read_bio(struct inode *inode, block_t blkaddr, > { > struct f2fs_sb_info *sbi = F2FS_I_SB(inode); > struct bio *bio; > - struct bio_post_read_ctx *ctx; > - unsigned int post_read_steps = 0; > + int ret; Nit: 'err' rather than 'ret', since this is 0 or a -errno value. > -int __init f2fs_init_post_read_processing(void) > -{ > - bio_post_read_ctx_cache = KMEM_CACHE(bio_post_read_ctx, 0); > - if (!bio_post_read_ctx_cache) > - goto fail; > - bio_post_read_ctx_pool = > - mempool_create_slab_pool(NUM_PREALLOC_POST_READ_CTXS, > - bio_post_read_ctx_cache); > - if (!bio_post_read_ctx_pool) > - goto fail_free_cache; > - return 0; > - > -fail_free_cache: > - kmem_cache_destroy(bio_post_read_ctx_cache); > -fail: > - return -ENOMEM; > -} > - > -void __exit f2fs_destroy_post_read_processing(void) > -{ > - mempool_destroy(bio_post_read_ctx_pool); > - kmem_cache_destroy(bio_post_read_ctx_cache); > -} Need to remove the declarations of these functions from fs/f2fs/f2fs.h to. > diff --git a/fs/read_callbacks.c b/fs/read_callbacks.c > index a4196e3de05f..4b7fc2a349cd 100644 > --- a/fs/read_callbacks.c > +++ b/fs/read_callbacks.c > @@ -76,7 +76,6 @@ void read_callbacks(struct read_callbacks_ctx *ctx) > switch (++ctx->cur_step) { > case STEP_DECRYPT: > if (ctx->enabled_steps & (1 << STEP_DECRYPT)) { > - INIT_WORK(&ctx->work, fscrypt_decrypt_work); > fscrypt_enqueue_decrypt_work(&ctx->work); > return; > } Again, I think the work initialization should remain here as: INIT_WORK(&ctx->work, decrypt_work); rather than moving it to fs/crypto/. Thanks! - Eric