Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp3118028pxb; Mon, 18 Apr 2022 16:25:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw5DaSNKziezdksxLPQvURejC3ASJI1nt9nlB6slt7q8xppJcumr7fDziyrfNG+W+DabXRM X-Received: by 2002:a17:90a:600b:b0:1cb:8ba5:d3bc with SMTP id y11-20020a17090a600b00b001cb8ba5d3bcmr15557744pji.42.1650324347563; Mon, 18 Apr 2022 16:25:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650324347; cv=none; d=google.com; s=arc-20160816; b=oR5AOjcVoj3Vw7k2lDaV7Gk3+BEDZt1zLDCQtUNVGaTIs/50q5gIwtli2NjkKQu2ZW 1791q8R6CgihDMY7Kpg2+HTT1yk6RDDNPYluTc6tdNVWIDjtVysjofPZTQHer66Osq7w oHdYQm8arCwl3c3Wrp+QwAN/PR0EO3F697qHUX3CHQaqyQfj1awhCQivAaTcg5GW+wDR s9YM3tECRrhQJ9gUr+NF1i91SYix5Lnpxq5swNucRNzLnOhcC7E5kOoHJkHNVd72SnEJ /3p9AZQXsOCQTTw7/TnMYpLrqdo3bKtHe8DfdxvIdaFeMeEYKzVbd4clhDTHoeJyhPj/ UtuA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=cIXJ9sbkxjNSM/Cjw4E1f5IRC62birsuU9flUkEWY5Y=; b=fFE9dh10h/IG7xIuBCol10doO/KK5J5Nd+c+yCkK2kYLHVcd/pPvEJoO/sleadV9xA RvfFmFqp1iy2bozpSuyv+6P+8Ticv1Obn83vUlBgMc9XdAPWmrHhRxyBAI6EymYf61Bv PmieJWlAsT5lnIuWFx5YqZYF8oi8JXrKbRUoAw4mNDSDJfombeI7zH+456bTE/sa/nfc F5KLpj/dBduiJtdorvoSSIF86gXiKf2oUH/CaL4xRhTFF1wXdt8kDge/fNgXC+RHOXtN mNAUDWL9AKep6rOO/ONH2mqSMD00NfqNLbObOFW5EeFtu3beELSiyKHAf9uvC/RVqTnH C8Lw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a38-20020a056a001d2600b0050a502dd307si8062815pfx.127.2022.04.18.16.25.17; Mon, 18 Apr 2022 16:25:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232377AbiDRWq0 (ORCPT + 99 others); Mon, 18 Apr 2022 18:46:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57368 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232199AbiDRWqT (ORCPT ); Mon, 18 Apr 2022 18:46:19 -0400 Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 62A472AC7F; Mon, 18 Apr 2022 15:43:38 -0700 (PDT) Received: from cwcc.thunk.org (pool-108-7-220-252.bstnma.fios.verizon.net [108.7.220.252]) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 23IMhFCS005193 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 18 Apr 2022 18:43:16 -0400 Received: by cwcc.thunk.org (Postfix, from userid 15806) id 5FBBF15C3EB8; Mon, 18 Apr 2022 18:43:15 -0400 (EDT) Date: Mon, 18 Apr 2022 18:43:15 -0400 From: "Theodore Ts'o" To: Eric Biggers Cc: =?utf-8?B?5bi45Yek5qWg?= , "jaegeuk@kernel.org" , "chao@kernel.org" , "adilger.kernel@dilger.ca" , "axboe@kernel.dk" , "linux-block@vger.kernel.org" , "linux-ext4@vger.kernel.org" , "linux-f2fs-devel@lists.sourceforge.net" Subject: Re: [PATCH 2/3] f2fs: notify when device not supprt inlinecrypt Message-ID: References: <20220418063312.63181-1-changfengnan@vivo.com> <20220418063312.63181-2-changfengnan@vivo.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Mon, Apr 18, 2022 at 03:27:16PM -0700, Eric Biggers wrote: > > When I test fscrypt first, it make me confused. Not a real problem, just make this logical more reasonable. > > Do you think this needs to be revised? > > Well, I'm just not sure we should do this, or at least by itself, given that > support for inline encryption is not an either-or thing, and the inlinecrypt > mount option is already documented to apply only to files where inline > encryption can be used. Indeed; some encryption algorithms won't be available because they weren't compiled into the kernel; others because block device for a particular file system doesn't support inline crypto. It seems to me that the test or the test runner should be able to figure this out. It should be able to explicitly try to set a particular policy, and if that policy fails, it should give an intelligent message, e.g., "Skipping this test config because inline-crypto isn't supported." Why can't we fix this in the test runner's scripts? - Ted