Re: [PATCH 00/36] ceph+fscrypt: context, filename, symlink and size handling support

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On 12/9/21 11:36 PM, Jeff Layton wrote:
I've not posted this in a while, so I figured it was a good time to do
so. This patchset is a pile of the mostly settled parts of the fscrypt
integration series. With this, pretty much everything but the actual
content encryption in files now works.

This series is also in the wip-fscrypt-size branch of the ceph-client
tree:

     https://github.com/ceph/ceph-client/tree/wip-fscrypt-size

It would also be nice to have an ack from Al Viro on patch #1, and from
Eric Biggers on #2-5. Those touch code outside of the ceph parts. If
they aren't acceptable for some reason, I'll need to find other ways to
handle them.

Jeff Layton (31):
   vfs: export new_inode_pseudo
   fscrypt: export fscrypt_base64url_encode and fscrypt_base64url_decode
   fscrypt: export fscrypt_fname_encrypt and fscrypt_fname_encrypted_size
   fscrypt: add fscrypt_context_for_new_inode
   fscrypt: uninline and export fscrypt_require_key
   ceph: preallocate inode for ops that may create one
   ceph: crypto context handling for ceph
   ceph: parse new fscrypt_auth and fscrypt_file fields in inode traces
   ceph: add fscrypt_* handling to caps.c
   ceph: add ability to set fscrypt_auth via setattr
   ceph: implement -o test_dummy_encryption mount option
   ceph: decode alternate_name in lease info
   ceph: add fscrypt ioctls
   ceph: make ceph_msdc_build_path use ref-walk
   ceph: add encrypted fname handling to ceph_mdsc_build_path
   ceph: send altname in MClientRequest
   ceph: encode encrypted name in dentry release
   ceph: properly set DCACHE_NOKEY_NAME flag in lookup
   ceph: make d_revalidate call fscrypt revalidator for encrypted
     dentries
   ceph: add helpers for converting names for userland presentation
   ceph: add fscrypt support to ceph_fill_trace
   ceph: add support to readdir for encrypted filenames
   ceph: create symlinks with encrypted and base64-encoded targets
   ceph: make ceph_get_name decrypt filenames
   ceph: add a new ceph.fscrypt.auth vxattr
   ceph: add some fscrypt guardrails
   libceph: add CEPH_OSD_OP_ASSERT_VER support
   ceph: size handling for encrypted inodes in cap updates
   ceph: fscrypt_file field handling in MClientRequest messages
   ceph: get file size from fscrypt_file when present in inode traces
   ceph: handle fscrypt fields in cap messages from MDS

Luis Henriques (1):
   ceph: don't allow changing layout on encrypted files/directories

Xiubo Li (4):
   ceph: add __ceph_get_caps helper support
   ceph: add __ceph_sync_read helper support
   ceph: add object version support for sync read
   ceph: add truncate size handling support for fscrypt

  fs/ceph/Makefile                |   1 +
  fs/ceph/acl.c                   |   4 +-
  fs/ceph/caps.c                  | 211 ++++++++++--
  fs/ceph/crypto.c                | 253 ++++++++++++++
  fs/ceph/crypto.h                | 154 +++++++++
  fs/ceph/dir.c                   | 209 +++++++++---
  fs/ceph/export.c                |  44 ++-
  fs/ceph/file.c                  | 125 ++++---
  fs/ceph/inode.c                 | 566 +++++++++++++++++++++++++++++---
  fs/ceph/ioctl.c                 |  87 +++++
  fs/ceph/mds_client.c            | 349 +++++++++++++++++---
  fs/ceph/mds_client.h            |  24 +-
  fs/ceph/super.c                 |  82 ++++-
  fs/ceph/super.h                 |  42 ++-
  fs/ceph/xattr.c                 |  29 ++
  fs/crypto/fname.c               |  40 ++-
  fs/crypto/fscrypt_private.h     |  35 +-
  fs/crypto/hooks.c               |   6 +-
  fs/crypto/keysetup.c            |  27 ++
  fs/crypto/policy.c              |  34 +-
  fs/inode.c                      |   1 +
  include/linux/ceph/ceph_fs.h    |  21 +-
  include/linux/ceph/osd_client.h |   6 +-
  include/linux/ceph/rados.h      |   4 +
  include/linux/fscrypt.h         |  15 +
  net/ceph/osd_client.c           |   5 +
  26 files changed, 2087 insertions(+), 287 deletions(-)
  create mode 100644 fs/ceph/crypto.c
  create mode 100644 fs/ceph/crypto.h

I have test this series together with ceph side PR#1 and worked well for me. LGTM.

1), https://github.com/ceph/ceph/pull/43588


Reviewed-by: Xiubo Li <xiubli@xxxxxxxxxx>

BRs





[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [NTFS 3]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [NTFS 3]     [Samba]     [Device Mapper]     [CEPH Development]

  Powered by Linux