Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp4872958ybg; Mon, 21 Oct 2019 16:10:12 -0700 (PDT) X-Google-Smtp-Source: APXvYqwLxk2xuZW6OVUMnKmRXEJe+4vmlzQhgSDpc39jrweaWYnpmJk2W2WaG8apTlK7joXHPv7H X-Received: by 2002:a05:6402:213:: with SMTP id t19mr16122446edv.7.1571699412576; Mon, 21 Oct 2019 16:10:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571699412; cv=none; d=google.com; s=arc-20160816; b=F0scxA8OLbQNjptnCBBx5UCGWnTEF0ocbRxBjigISGVsNJxB+hO+g/qpdJMhTnanC1 lrE55xm5ts3rNyPsYzvjXJwVm44X/q+/8TMHRIEy4QW4aMjAsxGACxMYZhlGntXZy8ou Mo1oj99p8Y4+xXTC4M/4xO9FgbXQe6T5rsPpGgkzzhE+NE9z7/WzkjeVxaNqQk3YafPQ 3e79mkQN44VVCmjyr4HXseZ/tUWjWkpV7PdUgw1FNH5baw0rTN+UbJ5hydK8Iowiv4O5 teWmichErBse0AHiHe3vwZvqR4WRxKBDSiLZmcBjho4ksuQ3LEEeoafUoPwxUniSEp4x PTPg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Q3+/omaHofztb4vpeFhTw9BhsA0D0qudt+LOtoFjhvI=; b=EaORGLaFE+AGT+eu5Kj5ja7qXcrB74UVbGHIx6Uv/FxlLxpqU+GUUnbrAIa6jj3/ig zbkwWiGvJTirDzDp5jyLS1aTY1quWDDB9jZturir48dhlK7w8hh9WQV1g9nFgz/ML7HC vJjfMVTQR0Mur4H5ufilhFAh23C9lERiV26z3/P4MEPaXH3ENbZ3GqZ53ZfWxUOtm+8N Ooq7cUa5Oe5SjmVunqfi+TfJ6ETHATga5MF1mp4vdd2z4MWTncM7+VcLvn/AWTP3f71G WlEDB8LP0L/utdVAsb1UKhIizQA7AD1zmr4gOI7TffUJwqF+S+ekLl6vshRCFPSppVYJ swZA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ugZlVU71; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m1si5432182ejx.188.2019.10.21.16.09.48; Mon, 21 Oct 2019 16:10:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ugZlVU71; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730454AbfJUXHZ (ORCPT + 99 others); Mon, 21 Oct 2019 19:07:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:36774 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730069AbfJUXHY (ORCPT ); Mon, 21 Oct 2019 19:07:24 -0400 Received: from ebiggers-linuxstation.mtv.corp.google.com (unknown [104.132.1.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1FDC1214B2; Mon, 21 Oct 2019 23:07:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1571699243; bh=FOZqGhYE8h24wrGESr8UoajZvJ4ZhQMu8xtIorR38Mk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ugZlVU71CDPVEBBv+7mmMCXCOR/73fpd09Y3fz2dQKbpafoZNlX3Z/3sBct//NlFo d3wuK8xF+3fONl/cS+b6joBgZinmWacixf7sN2KKwKUFXJfHvc6Si8+Uo/RdmC6QX7 bBScYAjOsBmiql1BpxMRy85tJPZtJxdr/65dcmxo= From: Eric Biggers To: linux-fscrypt@vger.kernel.org Cc: linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-fsdevel@vger.kernel.org, Satya Tangirala , Paul Crowley , Paul Lawrence , "Theodore Y . Ts'o" , Jaegeuk Kim Subject: [PATCH 3/3] f2fs: add support for INLINE_CRYPT_OPTIMIZED encryption policies Date: Mon, 21 Oct 2019 16:03:55 -0700 Message-Id: <20191021230355.23136-4-ebiggers@kernel.org> X-Mailer: git-send-email 2.23.0.866.gb869b98d4c-goog In-Reply-To: <20191021230355.23136-1-ebiggers@kernel.org> References: <20191021230355.23136-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org From: Eric Biggers f2fs inode numbers are stable across filesystem resizing, and f2fs inode and file logical block numbers are always 32-bit. So f2fs can always support INLINE_CRYPT_OPTIMIZED encryption policies. Wire up the needed fscrypt_operations to declare support. Signed-off-by: Eric Biggers --- fs/f2fs/super.c | 26 ++++++++++++++++++++------ 1 file changed, 20 insertions(+), 6 deletions(-) diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c index 1443cee158633..851ac95229263 100644 --- a/fs/f2fs/super.c +++ b/fs/f2fs/super.c @@ -2308,13 +2308,27 @@ static bool f2fs_dummy_context(struct inode *inode) return DUMMY_ENCRYPTION_ENABLED(F2FS_I_SB(inode)); } +static bool f2fs_has_stable_inodes(struct super_block *sb) +{ + return true; +} + +static void f2fs_get_ino_and_lblk_bits(struct super_block *sb, + int *ino_bits_ret, int *lblk_bits_ret) +{ + *ino_bits_ret = 8 * sizeof(nid_t); + *lblk_bits_ret = 8 * sizeof(block_t); +} + static const struct fscrypt_operations f2fs_cryptops = { - .key_prefix = "f2fs:", - .get_context = f2fs_get_context, - .set_context = f2fs_set_context, - .dummy_context = f2fs_dummy_context, - .empty_dir = f2fs_empty_dir, - .max_namelen = F2FS_NAME_LEN, + .key_prefix = "f2fs:", + .get_context = f2fs_get_context, + .set_context = f2fs_set_context, + .dummy_context = f2fs_dummy_context, + .empty_dir = f2fs_empty_dir, + .max_namelen = F2FS_NAME_LEN, + .has_stable_inodes = f2fs_has_stable_inodes, + .get_ino_and_lblk_bits = f2fs_get_ino_and_lblk_bits, }; #endif -- 2.23.0.866.gb869b98d4c-goog