On Wed, May 26, 2021 at 09:02:24AM +0100, Lee Jones wrote:
> On Tue, 25 May 2021, Satya Tangirala wrote:
> 65;6200;1c
> > On Tue, May 25, 2021 at 01:57:28PM +0100, Lee Jones wrote:
> > > On Thu, 21 Jan 2021 at 23:06, Satya Tangirala wrote:
> > >
> > > >
fscrypt_limit_io_blocks()
appropriately.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/iomap/direct-io.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/fs/iomap/direct-io.c b/fs/iomap/direct-io.c
index 9398b8c31323..1c825deb36a9 100644
--- a/fs/iomap
ce to call fscrypt_mergeable_bio()
on every block added to a bio. So we need this function which limits a
logical range in one go.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/crypto/crypto.c | 8 +
fs/crypto/inline_crypt.c
edge case in one of the fscrypt IV generation methods.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Reviewed-by: Jaegeuk Kim
Acked-by: Theodore Ts'o
---
fs/ext4/file.c | 10 ++
fs/ext4/inode.c | 7 +++
2 files changed, 13 i
rypto now only needs
the total size of the bio to be aligned to the crypto data unit size.
Co-developed-by: Eric Biggers
Signed-off-by: Eric Biggers
Signed-off-by: Satya Tangirala
---
block/blk-crypto.c | 19 ++-
1 file changed, 2 insertions(+), 17 deletions(-)
diff --git a/bloc
similar to those for direct I/O on unencrypted files.
Co-developed-by: Eric Biggers
Signed-off-by: Eric Biggers
Signed-off-by: Satya Tangirala
---
block/blk-crypto-fallback.c | 203 +++-
1 file changed, 156 insertions(+), 47 deletions(-)
diff --git a/block/blk
methods
like IV_INO_LBLK_32).
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Reviewed-by: Jaegeuk Kim
---
fs/direct-io.c | 15 ++-
1 file changed, 14 insertions(+), 1 deletion(-)
diff --git a/fs/direct-io.c b/fs/direct-io.c
index
y: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Acked-by: Jaegeuk Kim
---
fs/f2fs/f2fs.h | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h
index c83d90125ebd..a416ea3a1a04 100644
--- a/fs/f2fs/f2fs.h
+++ b
Update fscrypt documentation to reflect the addition of direct I/O support
and document the necessary conditions for direct I/O on encrypted files.
Signed-off-by: Satya Tangirala
Reviewed-by: Eric Biggers
Reviewed-by: Jaegeuk Kim
---
Documentation/filesystems/fscrypt.rst | 21
fail).
Signed-off-by: Satya Tangirala
---
block/bio.c | 13 -
1 file changed, 12 insertions(+), 1 deletion(-)
diff --git a/block/bio.c b/block/bio.c
index 32f75f31bb5c..99c510f706e2 100644
--- a/block/bio.c
+++ b/block/bio.c
@@ -1099,7 +1099,8 @@ static int __bio_iov_append_get_pages(s
fscrypt: add functions for direct I/O support
direct-io: add support for fscrypt using blk-crypto
iomap: support direct I/O with fscrypt using blk-crypto
ext4: support direct I/O with fscrypt using blk-crypto
f2fs: support direct I/O with fscrypt using blk-crypto
Satya Tangirala (4):
bl
On Tue, May 25, 2021 at 01:57:28PM +0100, Lee Jones wrote:
> On Thu, 21 Jan 2021 at 23:06, Satya Tangirala wrote:
>
> > This patch series adds support for direct I/O with fscrypt using
> > blk-crypto.
> >
>
> Is there an update on this set please?
>
> I can&
for direct I/O support
direct-io: add support for fscrypt using blk-crypto
iomap: support direct I/O with fscrypt using blk-crypto
ext4: support direct I/O with fscrypt using blk-crypto
f2fs: support direct I/O with fscrypt using blk-crypto
Satya Tangirala (3):
block: blk-crypto-fallback:
edge case in one of the fscrypt IV generation methods.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Reviewed-by: Jaegeuk Kim
Acked-by: Theodore Ts'o
---
fs/ext4/file.c | 10 ++
fs/ext4/inode.c | 7 +++
2 files changed, 13 i
methods
like IV_INO_LBLK_32).
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Reviewed-by: Jaegeuk Kim
---
fs/direct-io.c | 15 ++-
1 file changed, 14 insertions(+), 1 deletion(-)
diff --git a/fs/direct-io.c b/fs/direct-io.c
index
Update fscrypt documentation to reflect the addition of direct I/O support
and document the necessary conditions for direct I/O on encrypted files.
Signed-off-by: Satya Tangirala
Reviewed-by: Eric Biggers
Reviewed-by: Jaegeuk Kim
---
Documentation/filesystems/fscrypt.rst | 21
fscrypt_limit_io_blocks()
appropriately.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/iomap/direct-io.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/fs/iomap/direct-io.c b/fs/iomap/direct-io.c
index 933f234d5bec..b4240cc3c9f9 100644
--- a/fs/iomap
similar to those for direct I/O on unencrypted files.
Co-developed-by: Eric Biggers
Signed-off-by: Eric Biggers
Signed-off-by: Satya Tangirala
---
block/blk-crypto-fallback.c | 203 +++-
1 file changed, 156 insertions(+), 47 deletions(-)
diff --git a/block/blk
y: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Acked-by: Jaegeuk Kim
---
fs/f2fs/f2fs.h | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h
index bb11759191dc..5130423a13e7 100644
--- a/fs/f2fs/f2fs.h
+++ b
rypto now only needs
the total size of the bio to be aligned to the crypto data unit size.
Co-developed-by: Eric Biggers
Signed-off-by: Eric Biggers
Signed-off-by: Satya Tangirala
---
block/blk-crypto.c | 19 ++-
1 file changed, 2 insertions(+), 17 deletions(-)
diff --git a/bloc
ce to call fscrypt_mergeable_bio()
on every block added to a bio. So we need this function which limits a
logical range in one go.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/crypto/crypto.c | 8 +
fs/crypto/inline_crypt.c
I realized I didn't update fscrypt_mergeable_bio() to take metadata
encryption into account, so bios will be more fragmented than required.
I'll fix it in v3.
___
Linux-f2fs-devel mailing list
Linux-f2fs-devel@lists.sourceforge.net
https://lists.sourcef
On Tue, Dec 22, 2020 at 07:47:45PM +0800, Chao Yu wrote:
> On 2020/12/18 19:53, Satya Tangirala wrote:
> > On Fri, Dec 18, 2020 at 05:02:23PM +0800, Chao Yu wrote:
> > > But, what's the plan about supporting software encryption for metadata?
> > > Current
>
On Fri, Dec 18, 2020 at 05:02:23PM +0800, Chao Yu wrote:
> On 2020/12/17 23:44, Satya Tangirala wrote:
> > On Sat, Oct 10, 2020 at 05:53:06PM +0800, Chao Yu wrote:
> > > Why not using nid as DUN, then GC could migrate encrypted node block
> > > directly via
> >
On Tue, Dec 08, 2020 at 04:15:54PM +0800, Robin Hsu wrote:
> From: Robin Hsu
>
> Add F2FS compression support for sload
> * Support file extension filter, either default-accept or default-deny
> policy
> * Support choice of compression algorithm, LZO (version 2) or LZ4
> (default)
> * Support
ti-partition support?
>
Sure, I'll do that! I sent out v2 of this patch series earlier today,
so would you want me to send out a rebased version asap? or when
I send out v3?
Also, newbie question - multi-partition support is the same as
multi-device support, right?
> Thanks,
>
On Fri, Dec 18, 2020 at 09:06:00AM +0800, Chao Yu wrote:
> On 2020/12/17 23:10, Satya Tangirala via Linux-f2fs-devel wrote:
> > Introduce native metadata encryption support for f2fs. All blocks
> > other than the super block (and its redundant copy) are encrypted with the
> &g
On Thu, Dec 17, 2020 at 06:34:27PM -0500, Theodore Y. Ts'o wrote:
> On Thu, Dec 17, 2020 at 08:51:14PM +0000, Satya Tangirala wrote:
> > On Thu, Dec 17, 2020 at 01:08:49PM -0500, Theodore Y. Ts'o wrote:
> > > On Thu, Dec 17, 2020 at 03:04:32PM +, Satya Tangira
On Thu, Dec 17, 2020 at 01:08:49PM -0500, Theodore Y. Ts'o wrote:
> On Thu, Dec 17, 2020 at 03:04:32PM +0000, Satya Tangirala wrote:
> > This patch series adds support for metadata encryption to F2FS using
> > blk-crypto.
>
> Is there a companion patch series needed so
decrypted) data
from a decrypted block will cause the block to first be encrypted and
marked as no longer requiring encryption (this case shouldn't happen
afaict - so each block will be encrypted and decrypted at most once).
Signed-off-by: Satya Tangirala
---
lib/lib
On Wed, Oct 07, 2020 at 12:42:09PM -0700, jaeg...@kernel.org wrote:
> Hi Satya,
>
> On 10/05, Satya Tangirala wrote:
> > This patch introduces two new options '-A' and '-M' for specifying metadata
> > crypt options. '-A' takes the desired metada
I still need to update configure.ac to check for the new libraries -
I'll do that in v3 of the patch series
___
Linux-f2fs-devel mailing list
Linux-f2fs-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/linux-f2fs-devel
On Sat, Oct 10, 2020 at 05:53:06PM +0800, Chao Yu wrote:
> On 2020/10/5 15:36, Satya Tangirala wrote:
> > This patch series adds support for metadata encryption to F2FS using
> > blk-crypto.
>
> It looks this implementation is based on hardware crypto engine, could you
> p
I'm not yet done with the xfstests that Eric asked for - I'll send them
out as soon as they're done.
___
Linux-f2fs-devel mailing list
Linux-f2fs-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/linux-f2fs-devel
On Thu, Dec 17, 2020 at 03:04:32PM +, Satya Tangirala wrote:
> Changes to the userspace
> tools (that are required to test out metadata encryption with F2FS) are
> also being sent out - I'll post a link as a reply to this mail once it's
> out.
The userspac
details, refer to
f2fs_metadata_process_key_serial()).
The rest of the programs use the encryption algorithm and the key
identifier stored in the superblock of the FS. They also verify that
the payload of the key matches the identifier of the key, before proceeding
to use the
to make metadata encryption work with sparse mode
Satya Tangirala (2):
f2fs-tools: Introduce metadata encryption support
libf2fs_io: Make metadata encryption work with sparse mode
README| 2 +
configure.ac | 2 +
fsck/main.c | 2
INLINE_CRYPT
- fscrypt_set_bio_crypt_ctx() calls fscrypt_metadata_crypt_bio()
directly, so filesystems only need to call fscrypt_set_bio_crypt_ctx()
- Cleanups and updated docs
Satya Tangirala (3):
fscrypt, f2fs: replace fscrypt_get_devices with fscrypt_get_device
fscrypt: Add metadata encryption
F2FS filesystem will fall
back to using buffered I/O (just as attempts to do direct I/O on fscrypt
encrypted files also fall back to buffered I/O).
Signed-off-by: Satya Tangirala
---
fs/f2fs/data.c | 17
fs/f2fs/f2fs.h | 2 ++
fs/f2fs/super.c
hardware or the
blk-crypto-fallback needs to be present/enabled.
Signed-off-by: Satya Tangirala
---
Documentation/filesystems/fscrypt.rst | 86 +++-
fs/crypto/Kconfig | 12 +
fs/crypto/Makefile| 1 +
fs/crypto/bio.c
cases (when they don't need the array for anything else).
Signed-off-by: Satya Tangirala
---
fs/crypto/inline_crypt.c | 33 ++---
fs/f2fs/super.c | 16 ++--
include/linux/fscrypt.h | 4 ++--
3 files changed, 26 insertions(+), 27 dele
On Tue, Nov 17, 2020 at 12:15:26PM -0500, Theodore Y. Ts'o wrote:
> What is the expected use case for Direct I/O using fscrypt? This
> isn't a problem which is unique to fscrypt, but one of the really
> unfortunate aspects of the DIO interface is the silent fallback to
> buffered I/O. We've lived
On Wed, Nov 25, 2020 at 02:12:35PM -0800, Eric Biggers wrote:
> On Wed, Nov 18, 2020 at 12:38:15AM +0000, Satya Tangirala wrote:
> > > > +/**
> > > > + * update_aligned_sectors_and_segs() - Ensures that *@aligned_sectors
> > > > is aligned
> >
On Tue, Nov 17, 2020 at 03:31:23PM -0800, Eric Biggers wrote:
> On Tue, Nov 17, 2020 at 02:07:01PM +0000, Satya Tangirala wrote:
> > Introduce blk_crypto_bio_sectors_alignment() that returns the required
> > alignment for the number of sectors in a bio. Any bio split must ensu
edge case in one of the fscrypt IV generation methods.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Reviewed-by: Jaegeuk Kim
---
fs/ext4/file.c | 10 ++
fs/ext4/inode.c | 7 +++
2 files changed, 13 insertions(+), 4 deletions(-)
methods
like IV_INO_LBLK_32).
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Reviewed-by: Jaegeuk Kim
---
fs/direct-io.c | 15 ++-
1 file changed, 14 insertions(+), 1 deletion(-)
diff --git a/fs/direct-io.c b/fs/direct-io.c
index
y: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Acked-by: Jaegeuk Kim
---
fs/f2fs/f2fs.h | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h
index cb700d797296..d518e668618e 100644
--- a/fs/f2fs/f2fs.h
+++ b
blk_crypto_split_bio_if_needed() to respect
blk_crypto_bio_sectors_alignment() when splitting bios.
Signed-off-by: Satya Tangirala
---
block/bio.c | 1 +
block/blk-crypto-fallback.c | 10 ++--
block/blk-crypto-internal.h | 18 +++
block/blk-merge.c | 96
fscrypt_limit_io_blocks()
appropriately.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/iomap/direct-io.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/fs/iomap/direct-io.c b/fs/iomap/direct-io.c
index 933f234d5bec..b4240cc3c9f9 100644
--- a/fs/iomap
ic Biggers
Signed-off-by: Satya Tangirala
---
block/blk-crypto-fallback.c | 202 +++-
block/blk-crypto.c | 19 +---
2 files changed, 157 insertions(+), 64 deletions(-)
diff --git a/block/blk-crypto-fallback.c b/block/blk-crypto-fallback.c
index db
Update fscrypt documentation to reflect the addition of direct I/O support
and document the necessary conditions for direct I/O on encrypted files.
Signed-off-by: Satya Tangirala
Reviewed-by: Eric Biggers
Reviewed-by: Jaegeuk Kim
---
Documentation/filesystems/fscrypt.rst | 21
ce to call fscrypt_mergeable_bio()
on every block added to a bio. So we need this function which limits a
logical range in one go.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/crypto/crypto.c | 8 +
fs/crypto/inline_crypt.c
support for fscrypt using blk-crypto
iomap: support direct I/O with fscrypt using blk-crypto
ext4: support direct I/O with fscrypt using blk-crypto
f2fs: support direct I/O with fscrypt using blk-crypto
Satya Tangirala (3):
block: ensure bios are not split in middle of crypto data unit
blk-cr
)
> + if (!S_ISREG(inode->i_mode))
> return 0;
>
> /* The crypto mode must have a blk-crypto counterpart */
>
> base-commit: 92cfcd030e4b1de11a6b1edb0840e55c26332d31
> --
> 2.29.2
>
Looks good to me. Please feel free to add
Reviewed-by:
On Wed, Oct 07, 2020 at 02:20:52PM -0700, Eric Biggers wrote:
> On Mon, Oct 05, 2020 at 07:36:06AM +0000, Satya Tangirala wrote:
> > Wire up metadata encryption support with the fscrypt metadata crypt
> > additions.
> >
> > Introduces a new mount opt
On Wed, Oct 07, 2020 at 01:52:21PM -0700, Eric Biggers wrote:
> On Mon, Oct 05, 2020 at 07:36:05AM +0000, Satya Tangirala wrote:
> > Introduces functions that help with metadata encryption.
> >
> > In particular, we introduce:
> >
> > fscrypt_setup_metadata_encry
On Wed, Oct 07, 2020 at 02:00:40PM -0700, Eric Biggers wrote:
> On Mon, Oct 05, 2020 at 07:36:03AM +0000, Satya Tangirala wrote:
> > This patch series adds support for metadata encryption to F2FS using
> > blk-crypto.
>
> This patch series needs more explanation about what
algorithm from the superblock of the FS.
Limitations:
Metadata encryption with sparse storage has not been implemented yet in
this patch.
This patch requires the metadata encryption key to be readable from
userspace, and does not ensure that it is zeroed before the program exits
for any reason.
Saty
iles also fall back to buffered I/O).
Signed-off-by: Satya Tangirala
---
Documentation/filesystems/f2fs.rst | 12 ++
fs/f2fs/data.c | 24 +++
fs/f2fs/f2fs.h | 2 +
fs/f2fs/super.c| 67 --
include/li
red to test out metadata encryption with F2FS) are
also being sent out - I'll post a link as a reply to this mail once it's
out.
Satya Tangirala (3):
fscrypt, f2fs: replace fscrypt_get_devices with fscrypt_get_device
fscrypt: Add metadata encryption support
f2fs: Add metadata encryptio
cases (when they don't need the array for anything else).
Signed-off-by: Satya Tangirala
---
fs/crypto/inline_crypt.c | 33 ++---
fs/f2fs/super.c | 16 ++--
include/linux/fscrypt.h | 4 ++--
3 files changed, 26 insertions(+), 27 dele
onvenience functions that ultimately help encrypt a bio with the metadata
encryption key when desired.
Signed-off-by: Satya Tangirala
---
fs/crypto/Kconfig | 6 +
fs/crypto/Makefile | 1 +
fs/crypto/fscrypt_private.h | 19
fs/crypto/inline_crypt.c| 18 ---
On Mon, Oct 05, 2020 at 07:36:03AM +, Satya Tangirala wrote:
> This patch series adds support for metadata encryption to F2FS using
> blk-crypto.
>
> Patch 1 replaces fscrypt_get_devices (which took an array of request_queues
> and filled it up) with fscrypt_get_device, which t
ad from userspace.
mkfs.f2fs takes both these arguments, and stores the encryption algorithm
in the superblock of the FS.
The rest of the programs only take '-M', and use the encryption algorithm
stored in the superblock of the FS.
Signed-off-by: Satya Tangirala
---
fsck/ma
ne of the fscrypt IV generation methods.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Reviewed-by: Jaegeuk Kim
---
fs/ext4/file.c | 10 ++
fs/ext4/inode.c | 7 +++
2 files changed, 13 insertions(+), 4 deletions(-)
diff --git a/fs/ext4/fil
ce to call fscrypt_mergeable_bio()
on every block added to a bio. So we need this function which limits a
logical range in one go.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/crypto/crypto.c | 8 +
fs/crypto/inline_crypt.c
fscrypt_limit_io_blocks()
appropriately.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/iomap/direct-io.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/fs/iomap/direct-io.c b/fs/iomap/direct-io.c
index ec7b78e6feca..a8785bffdc7c 100644
--- a/fs/iomap
Update the fscrypt documentation file for inline encryption support.
Signed-off-by: Satya Tangirala
Reviewed-by: Eric Biggers
Reviewed-by: Jaegeuk Kim
---
Documentation/filesystems/fscrypt.rst | 16 +++-
1 file changed, 15 insertions(+), 1 deletion(-)
diff --git a/Documentation
crypto
ext4: support direct I/O with fscrypt using blk-crypto
f2fs: support direct I/O with fscrypt using blk-crypto
Satya Tangirala (2):
fscrypt: document inline encryption support
fscrypt: update documentation for direct I/O support
Documentation/filesystems/fscrypt.rst |
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Acked-by: Jaegeuk Kim
---
fs/f2fs/f2fs.h | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h
index b35a50f4953c..978130b5a195 100644
--- a/fs/f2fs/f2fs.h
+++ b/fs/f2fs/f2fs.h
@@ -
Update fscrypt documentation to reflect the addition of direct I/O support
and document the necessary conditions for direct I/O on encrypted files.
Signed-off-by: Satya Tangirala
Reviewed-by: Eric Biggers
Reviewed-by: Jaegeuk Kim
---
Documentation/filesystems/fscrypt.rst | 20
methods
like IV_INO_LBLK_32).
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Reviewed-by: Jaegeuk Kim
---
fs/direct-io.c | 15 ++-
1 file changed, 14 insertions(+), 1 deletion(-)
diff --git a/fs/direct-io.c b/fs/direct-io.c
index
Update the fscrypt documentation file for inline encryption support.
Signed-off-by: Satya Tangirala
Reviewed-by: Eric Biggers
Reviewed-by: Jaegeuk Kim
---
Documentation/filesystems/fscrypt.rst | 16 +++-
1 file changed, 15 insertions(+), 1 deletion(-)
diff --git a/Documentation
ce to call fscrypt_mergeable_bio()
on every block added to a bio. So we need this function which limits a
logical range in one go.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Reviewed-by: Jaegeuk Kim
---
fs/crypto/crypto.c | 8 +
fs/c
fscrypt_limit_io_blocks()
appropriately.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/iomap/direct-io.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/fs/iomap/direct-io.c b/fs/iomap/direct-io.c
index ec7b78e6feca..a8785bffdc7c 100644
--- a/fs/iomap
support for fscrypt using blk-crypto
iomap: support direct I/O with fscrypt using blk-crypto
ext4: support direct I/O with fscrypt using blk-crypto
f2fs: support direct I/O with fscrypt using blk-crypto
Satya Tangirala (2):
fscrypt: document inline encryption support
fscrypt: u
Update fscrypt documentation to reflect the addition of direct I/O support
and document the necessary conditions for direct I/O on encrypted files.
Signed-off-by: Satya Tangirala
Reviewed-by: Eric Biggers
Reviewed-by: Jaegeuk Kim
---
Documentation/filesystems/fscrypt.rst | 20
ne of the fscrypt IV generation methods.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Reviewed-by: Jaegeuk Kim
---
fs/ext4/file.c | 10 ++
fs/ext4/inode.c | 7 +++
2 files changed, 13 insertions(+), 4 deletions(-)
diff --git a/fs/ext4/fil
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Acked-by: Jaegeuk Kim
---
fs/f2fs/f2fs.h | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h
index b35a50f4953c..978130b5a195 100644
--- a/fs/f2fs/f2fs.h
+++ b/fs/f2fs/f2fs.h
@@ -
methods
like IV_INO_LBLK_32).
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
Reviewed-by: Jaegeuk Kim
---
fs/direct-io.c | 15 ++-
1 file changed, 14 insertions(+), 1 deletion(-)
diff --git a/fs/direct-io.c b/fs/direct-io.c
index
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/ext4/file.c | 10 ++
1 file changed, 6 insertions(+), 4 deletions(-)
diff --git a/fs/ext4/file.c b/fs/ext4/file.c
index 2a01e31a032c..d534f72675d9 100644
--- a/fs/ext4/file.c
+++ b/fs/ext4/file.c
@@ -36,9 +36,11 @@
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/f2fs/f2fs.h | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h
index b35a50f4953c..978130b5a195 100644
--- a/fs/f2fs/f2fs.h
+++ b/fs/f2fs/f2fs.h
@@ -4082,7 +4082,11 @@ sta
Update fscrypt documentation to reflect the addition of direct I/O support
and document the necessary conditions for direct I/O on encrypted files.
Signed-off-by: Satya Tangirala
---
Documentation/filesystems/fscrypt.rst | 20 ++--
1 file changed, 18 insertions(+), 2 deletions
methods
like IV_INO_LBLK_32).
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/direct-io.c | 15 ++-
1 file changed, 14 insertions(+), 1 deletion(-)
diff --git a/fs/direct-io.c b/fs/direct-io.c
index 6d5370eac2a8..f27f7e3780ee 100644
() on each page.
Note that fscrypt_limit_io_pages() is normally a no-op, as normally the
DUNs simply increment along with the logical blocks. But it's needed to
handle an edge case in one of the fscrypt IV generation methods.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Sig
Update the fscrypt documentation file for inline encryption support.
Signed-off-by: Satya Tangirala
Reviewed-by: Eric Biggers
---
Documentation/filesystems/fscrypt.rst | 16 +++-
1 file changed, 15 insertions(+), 1 deletion(-)
diff --git a/Documentation/filesystems/fscrypt.rst
b
ck or page. So we need this function
which limits a logical range in one go.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/crypto/crypto.c | 8
fs/crypto/inline_crypt.c | 82
include/
ct-io: add support for fscrypt using blk-crypto
iomap: support direct I/O with fscrypt using blk-crypto
ext4: support direct I/O with fscrypt using blk-crypto
f2fs: support direct I/O with fscrypt using blk-crypto
Satya Tangirala (2):
fscrypt: document inline encryption support
fscr
Update fscrypt documentation to reflect the addition of direct I/O support
and document the necessary conditions for direct I/O on encrypted files.
Signed-off-by: Satya Tangirala
---
Documentation/filesystems/fscrypt.rst | 20 ++--
1 file changed, 18 insertions(+), 2 deletions
a range of logically contiguous
pages.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/crypto/crypto.c | 8
fs/crypto/inline_crypt.c | 80
include/linux/fscrypt.h | 19 ++
3 files
t I/O with fscrypt requires.
Eric Biggers (5):
fscrypt: Add functions for direct I/O support
direct-io: add support for fscrypt using blk-crypto
iomap: support direct I/O with fscrypt using blk-crypto
ext4: support direct I/O with fscrypt using blk-crypto
f2fs: support direct I/O with
On Mon, Jul 13, 2020 at 11:36:19AM -0700, Eric Biggers wrote:
> On Fri, Jul 10, 2020 at 06:34:06AM +0100, Christoph Hellwig wrote:
> > On Thu, Jul 09, 2020 at 07:47:48PM +0000, Satya Tangirala wrote:
> > > From: Eric Biggers
> > >
> > > Set bio crypt contexts
and 7 for fscrypt documentation
- cleanups and comments
Eric Biggers (5):
fscrypt: Add functions for direct I/O support
direct-io: add support for fscrypt using blk-crypto
iomap: support direct I/O with fscrypt using blk-crypto
ext4: support direct I/O with fscrypt using blk-crypto
f2fs:
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/f2fs/f2fs.h | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h
index b35a50f4953c..978130b5a195 100644
--- a/fs/f2fs/f2fs.h
+++ b/fs/f2fs/f2fs.h
@@ -4082,7 +4082,11 @@ sta
Update fscrypt documentation to reflect the addition of direct I/O support
and document the necessary conditions for direct I/O on encrypted files.
Signed-off-by: Satya Tangirala
---
Documentation/filesystems/fscrypt.rst | 20 ++--
1 file changed, 18 insertions(+), 2 deletions
and can't call fscrypt_mergeable_bio() on each page.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/iomap/direct-io.c | 8
1 file changed, 8 insertions(+)
diff --git a/fs/iomap/direct-io.c b/fs/iomap/direct-io.c
index ec7b78e
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/ext4/file.c | 10 ++
1 file changed, 6 insertions(+), 4 deletions(-)
diff --git a/fs/ext4/file.c b/fs/ext4/file.c
index 2a01e31a032c..d534f72675d9 100644
--- a/fs/ext4/file.c
+++ b/fs/ext4/file.c
@@ -36,9 +36,11 @@
Update the fscrypt documentation file for inline encryption support.
Signed-off-by: Satya Tangirala
---
Documentation/filesystems/fscrypt.rst | 16 +++-
1 file changed, 15 insertions(+), 1 deletion(-)
diff --git a/Documentation/filesystems/fscrypt.rst
b/Documentation/filesystems
methods
like IV_INO_LBLK_32).
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/direct-io.c | 15 ++-
1 file changed, 14 insertions(+), 1 deletion(-)
diff --git a/fs/direct-io.c b/fs/direct-io.c
index 6d5370eac2a8..f27f7e3780ee 100644
and can't call fscrypt_mergeable_bio() on each page.
Signed-off-by: Eric Biggers
Co-developed-by: Satya Tangirala
Signed-off-by: Satya Tangirala
---
fs/iomap/direct-io.c | 8
1 file changed, 8 insertions(+)
diff --git a/fs/iomap/direct-io.c b/fs/iomap/direct-io.c
index ec7b78e
1 - 100 of 277 matches
Mail list logo