Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp4017490ybg; Fri, 25 Oct 2019 12:09:13 -0700 (PDT) X-Google-Smtp-Source: APXvYqy3lGJDCCVuG5ZmOnKA7eczacPUc02oT7vzeUCnrzWQbx2xMdv8WfXQUVwBEhXVtW6sh14L X-Received: by 2002:a17:906:35cb:: with SMTP id p11mr5147832ejb.128.1572030552936; Fri, 25 Oct 2019 12:09:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572030552; cv=none; d=google.com; s=arc-20160816; b=ybTVhKFqaUV6KquwZOspAJcjO6b0FEClNzHKWRCvfSsCuQrHFtgIHL1gliJ9UcTf9m 1utfbqKYrebsjuFMlpteBY4ekVZlAAGqboBqoGYkTy0teHpbfoL8Br64cy/2IejU+cs4 j+1VpTGNaBvCJnkINqpmH8iNWI1CLL6zfEHoGDtv75xbnHMtx0Mgt5wak+/K1k+msvF5 OJTc9qkeyJKX2WqtyWGFhy1k3/7psw6bV7o68ufa95mJ0Sccd82hulYQZppdAK8vvNIp aKUj9R1xot4evcx23CxQyFYcJgFVQSPZfYalSt/M5diJ21HhRjkQ8GuQ5kMuJGb0tZOP 8xFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=WHBcw56up4++AUbWLiEkHDnD/7Rje98EefkB0UZLFFc=; b=TKJ7fix6BVo8KYOB7i5cAinV9N2jsHqoz/3so1yvbp8jj987HUlq6DfmaqTR2FuKzL 48dnCuVO1YQemMnqYXZIMoPYL/DNbi7RQUFszeWUMhtjRZ1L+ADpYK4ncyh0uEllRJlq 5/mE3TjiaC1BqsALCsa6TSzBvP7YwrTk4DJmauat0B66BJOcjSDUm32FWV9z3gUywaWM ZkXnL0FyQkOKOS1MaW243xJTzgPl8L+EMZ1fGOmaprM2kTaH28jyk2J/y+xTjg2+KeGT 6C+SIykkRQyndfSGzbMJcC4gtZwtydJusPWJO5yKKzkzQAbDAzMpre+BGieYEiL2AjoR xsYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=oB1L+riM; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id pg2si1799330ejb.133.2019.10.25.12.08.48; Fri, 25 Oct 2019 12:09:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=oB1L+riM; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729755AbfJXV5K (ORCPT + 99 others); Thu, 24 Oct 2019 17:57:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:57150 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729763AbfJXV5J (ORCPT ); Thu, 24 Oct 2019 17:57:09 -0400 Received: from ebiggers-linuxstation.mtv.corp.google.com (unknown [104.132.1.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 93FF421D71; Thu, 24 Oct 2019 21:57:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1571954228; bh=Iflj5s90gCCWa+Mfxg9ykmv/6MqmPaOcygtr7/UlNBA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=oB1L+riMoL5N7sC4SZNAem0Wu0oZ0ChBwrvhO/JgjhncHZvOmASCxFqtgWo8fGRux iay4z5tusW3UjYF9XXR2K/PR6sW/mqz5f58HnhVQvcc2Lzm13cIQmwsXq6YrDOyX2t yxDS8oybc72F9Yt5eb8ST+azvTaHkk4M/wbn3BfA= From: Eric Biggers To: linux-fscrypt@vger.kernel.org Cc: linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-fsdevel@vger.kernel.org, Satya Tangirala , Paul Crowley , Paul Lawrence , "Theodore Y . Ts'o" , Jaegeuk Kim Subject: [PATCH v2 3/3] f2fs: add support for IV_INO_LBLK_64 encryption policies Date: Thu, 24 Oct 2019 14:54:38 -0700 Message-Id: <20191024215438.138489-4-ebiggers@kernel.org> X-Mailer: git-send-email 2.24.0.rc0.303.g954a862665-goog In-Reply-To: <20191024215438.138489-1-ebiggers@kernel.org> References: <20191024215438.138489-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org From: Eric Biggers f2fs inode numbers are stable across filesystem resizing, and f2fs inode and file logical block numbers are always 32-bit. So f2fs can always support IV_INO_LBLK_64 encryption policies. Wire up the needed fscrypt_operations to declare support. Signed-off-by: Eric Biggers --- fs/f2fs/super.c | 26 ++++++++++++++++++++------ 1 file changed, 20 insertions(+), 6 deletions(-) diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c index 1443cee158633..851ac95229263 100644 --- a/fs/f2fs/super.c +++ b/fs/f2fs/super.c @@ -2308,13 +2308,27 @@ static bool f2fs_dummy_context(struct inode *inode) return DUMMY_ENCRYPTION_ENABLED(F2FS_I_SB(inode)); } +static bool f2fs_has_stable_inodes(struct super_block *sb) +{ + return true; +} + +static void f2fs_get_ino_and_lblk_bits(struct super_block *sb, + int *ino_bits_ret, int *lblk_bits_ret) +{ + *ino_bits_ret = 8 * sizeof(nid_t); + *lblk_bits_ret = 8 * sizeof(block_t); +} + static const struct fscrypt_operations f2fs_cryptops = { - .key_prefix = "f2fs:", - .get_context = f2fs_get_context, - .set_context = f2fs_set_context, - .dummy_context = f2fs_dummy_context, - .empty_dir = f2fs_empty_dir, - .max_namelen = F2FS_NAME_LEN, + .key_prefix = "f2fs:", + .get_context = f2fs_get_context, + .set_context = f2fs_set_context, + .dummy_context = f2fs_dummy_context, + .empty_dir = f2fs_empty_dir, + .max_namelen = F2FS_NAME_LEN, + .has_stable_inodes = f2fs_has_stable_inodes, + .get_ino_and_lblk_bits = f2fs_get_ino_and_lblk_bits, }; #endif -- 2.24.0.rc0.303.g954a862665-goog