Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp62563ybt; Thu, 9 Jul 2020 15:31:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxMZcRGmdOFOH1HdS3X/wfnYVazr5WMTzZOQC68akbQQmy5he4TaPB35pnEK4tlsHog3Ely X-Received: by 2002:a17:907:212b:: with SMTP id qo11mr57551114ejb.452.1594333873294; Thu, 09 Jul 2020 15:31:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594333873; cv=none; d=google.com; s=arc-20160816; b=Qy1ka5VTDMSI0WTNWbcP4Xao1Ux7BC+1OPTqA1fNEGjuUVQic/PoHZdMZCz9QcdEOh +yW9xUeualphMOSKW1I1iMVYFGrisQATUSMfBo7dVJWWKDKltQDUnWc8EEKam0RiRq5T Ma7PEMR9ZUanHjB0VO7GpZ0rqSGFvq7rbNJGdAGMdl6qIUCBtc8qLXu3P/BcNT6cBjDh gihaqq31UT7SuJVCnk67jR8qXn+2qqWiy35TT4cJZg/nrYVaGNhqd2Z+vJusaMcDhyNp 27+XDYlqpUlj1RIo6EjIAz5Xvz624zlP44O6wVN+AHk2tDd3Ty5Mzq2dVLnDEWiP9qj1 wJ2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=7dqJz7HGmtaLQ2ePle3NJl+4ZCkTyDnaQwDTdbZVg0U=; b=sk7bpKIvB1k2Lu+e52+kLrQUx7va2mc8QHAQHwk9eFdZRSffavWlHsqtOD6W9DPWw2 EIcGLfGxPWJ/Hp+KGJ2HF5To/7lhGju8HJV1pe3/THnqOFYiEcBNo+MCLn9SQbcBx+0i C2HCaFqrpCO9zf8YqflaBefDYgQ0gfL5VluMwPrxbY/d6wtWzcsUiKuxMfPmU2I//ANi EpWa5CkLV/F8B4hKTjJrsY+oBjFJA2NBhF9mkWiH/rOnxhUOFvkwD2q7GHkzvyYDU7xi xC/taWeAO8H27EJodWtkXaLwd/+4HL+3rgTpk8kdlHAkRJqZw+M9ziUek051UoZFtVUB FdCA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=m+WR+Y2L; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m1si3012868edr.207.2020.07.09.15.30.40; Thu, 09 Jul 2020 15:31:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=m+WR+Y2L; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726546AbgGIWag (ORCPT + 99 others); Thu, 9 Jul 2020 18:30:36 -0400 Received: from mail.kernel.org ([198.145.29.99]:53866 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726213AbgGIWag (ORCPT ); Thu, 9 Jul 2020 18:30:36 -0400 Received: from gmail.com (unknown [104.132.1.76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8540B2070E; Thu, 9 Jul 2020 22:30:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594333835; bh=Dpn69SR1yUFPn66W7Fbbk1lCZ1fQTf5VGLdHh2L6pHU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=m+WR+Y2LanZRhq8MC5xduHojOk8O3+XkAMqrAcK0GJHm1Uegqx4r0qOxZTCnB4eo+ 8Pz68buk00ixvCYM+O7sDEZwr/AFjVyiAAk7rL6gakndlg3018/druWwbuN6YlXRPs fEjJFYMNpIrs+615pkKDogPMr21H+id2N31Liccg= Date: Thu, 9 Jul 2020 15:30:34 -0700 From: Eric Biggers To: Satya Tangirala Cc: linux-fscrypt@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-ext4@vger.kernel.org Subject: Re: [PATCH 4/5] ext4: support direct I/O with fscrypt using blk-crypto Message-ID: <20200709223034.GE3855682@gmail.com> References: <20200709194751.2579207-1-satyat@google.com> <20200709194751.2579207-5-satyat@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200709194751.2579207-5-satyat@google.com> Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Thu, Jul 09, 2020 at 07:47:50PM +0000, Satya Tangirala wrote: > From: Eric Biggers > > Wire up ext4 with fscrypt direct I/O support. > > Signed-off-by: Eric Biggers > Signed-off-by: Satya Tangirala This commit message could use some more details. I think it should clarify that the direct I/O support is limited to cases where the filesystem has been mounted with '-o inlinecrypt' and CONFIG_BLK_INLINE_ENCRYPTION has been enabled, along with CONFIG_BLK_INLINE_ENCRYPTION_FALLBACK if hardware support isn't present. As-is, it sounds a bit over-promising. Likewise for f2fs. We need to properly document this too. At the very least, in the fscrypt patch, Documentation/filesystems/fscrypt.rst needs to be updated because it currently says "Direct I/O is not supported on encrypted files." fscrypt.rst could also use some information about inline encryption. Currently inline encryption for fscrypt is only documented in the ext4 and f2fs documentation in the context of the inlinecrypt mount option. (Though, this suggestion applies even without direct I/O support.) - Eric