From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id C769AC64ED6 for ; Mon, 27 Feb 2023 09:27:14 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229641AbjB0J1N (ORCPT ); Mon, 27 Feb 2023 04:27:13 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38230 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229558AbjB0J1M (ORCPT ); Mon, 27 Feb 2023 04:27:12 -0500 Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 44C2A2705 for ; Mon, 27 Feb 2023 01:27:11 -0800 (PST) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id D762C219ED; Mon, 27 Feb 2023 09:27:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1677490029; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=0z4glPiq8dNTAiVRkFm/8CSvwIibktIFKh4lzxzKrwE=; b=Oq46BC4mjiY9Tw5MtABgaEYe0ksXvlR0ajnIyd374KE5khEGvja62ZgY1n1eH/d6aZiFHM pZOalvnGl6NIiaK7WZTciB4xSpWmkD1y82jos0oe57pIdp0N2KKvjBGNVfSt2B4N3w/gr5 pBcOVtJZcqrnU3tkwWxoXLTFKn/ebh0= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1677490029; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=0z4glPiq8dNTAiVRkFm/8CSvwIibktIFKh4lzxzKrwE=; b=mUZfhC9O6bgxmO4BwHz4mDiQUvOe8sKmxSii2frKAnJuZ/SV5miwikNQkgb0hV8RyHY4zg 4auBBIKZUEQD9QDA== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 6CD8E13912; Mon, 27 Feb 2023 09:27:09 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id ORtqF213/GMnVgAAMHmgww (envelope-from ); Mon, 27 Feb 2023 09:27:09 +0000 Received: from localhost (brahms.olymp [local]) by brahms.olymp (OpenSMTPD) with ESMTPA id d83d356c; Mon, 27 Feb 2023 09:27:08 +0000 (UTC) From: =?utf-8?Q?Lu=C3=ADs_Henriques?= To: xiubli@redhat.com Cc: idryomov@gmail.com, ceph-devel@vger.kernel.org, jlayton@kernel.org, vshankar@redhat.com, mchangir@redhat.com Subject: Re: [PATCH v16 00/68] ceph+fscrypt: full support References: <20230227032813.337906-1-xiubli@redhat.com> Date: Mon, 27 Feb 2023 09:27:08 +0000 In-Reply-To: <20230227032813.337906-1-xiubli@redhat.com> (xiubli@redhat.com's message of "Mon, 27 Feb 2023 11:27:05 +0800") Message-ID: <87fsar791v.fsf@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: ceph-devel@vger.kernel.org xiubli@redhat.com writes: > From: Xiubo Li > > This patch series is based on Jeff Layton's previous great work and effort > on this. > > Since v15 we have added the ceph qa teuthology test cases for this [1][2], > which will test both the file name and contents encryption features and at > the same time they will also test the IO benchmarks. > > To support the fscrypt we also have some other work in ceph [3][4][5][6][= 7][8]: > > [1] https://github.com/ceph/ceph/pull/48628 > [2] https://github.com/ceph/ceph/pull/49934 > [3] https://github.com/ceph/ceph/pull/43588 > [4] https://github.com/ceph/ceph/pull/37297 > [5] https://github.com/ceph/ceph/pull/45192 > [6] https://github.com/ceph/ceph/pull/45312 > [7] https://github.com/ceph/ceph/pull/40828 > [8] https://github.com/ceph/ceph/pull/45224 > [9] https://github.com/ceph/ceph/pull/45073 > > The [8] and [9] are still undering testing and will soon be merged after > that. All the others had been merged long time ago. Thanks a lot for your work on this, Xiubo (and Jeff!). I assume this set is what's on the 'testing' branch. I've done some testing on that branch recently, but I'll start having another look at v16 and run some more tests. Am I right assuming that this v16 patchset means we are NOT getting this merged into 6.3? Cheers, --=20 Lu=C3=ADs > The main changes since v15: > > - rebased onto v6.2 > > - some minor cleanups and revises reported by: > kernel test robot > Milind Changire > Ilya Dryomov > > - Luis' fixes: > ceph: mark directory as non-complete complete after loading key > ceph: fix memory leak in mount error path when using test_dummy_encrypt= ion > ceph: allow encrypting a directory while not having Ax caps > > NOTE: the second one has been folded into a previous commit. > > - fixed a sequence bug to make sure the osd req->r_callback()s are > called before removing the reqs from the osdc, which will cause > a warning in fscrypt_destroy_keyring() and potential use-after-free > crash bugs in other places. > > > > > Jeff Layton (47): > libceph: add spinlock around osd->o_requests > libceph: define struct ceph_sparse_extent and add some helpers > libceph: add sparse read support to msgr2 crc state machine > libceph: add sparse read support to OSD client > libceph: support sparse reads on msgr2 secure codepath > libceph: add sparse read support to msgr1 > ceph: add new mount option to enable sparse reads > ceph: preallocate inode for ops that may create one > ceph: make ceph_msdc_build_path use ref-walk > libceph: add new iov_iter-based ceph_msg_data_type and > ceph_osd_data_type > ceph: use osd_req_op_extent_osd_iter for netfs reads > ceph: fscrypt_auth handling for ceph > ceph: ensure that we accept a new context from MDS for new inodes > ceph: add support for fscrypt_auth/fscrypt_file to cap messages > ceph: implement -o test_dummy_encryption mount option > ceph: decode alternate_name in lease info > ceph: add fscrypt ioctls > ceph: add encrypted fname handling to ceph_mdsc_build_path > ceph: send altname in MClientRequest > ceph: encode encrypted name in dentry release > ceph: properly set DCACHE_NOKEY_NAME flag in lookup > ceph: set DCACHE_NOKEY_NAME in atomic open > ceph: make d_revalidate call fscrypt revalidator for encrypted > dentries > ceph: add helpers for converting names for userland presentation > ceph: add fscrypt support to ceph_fill_trace > ceph: create symlinks with encrypted and base64-encoded targets > ceph: make ceph_get_name decrypt filenames > ceph: add a new ceph.fscrypt.auth vxattr > ceph: add some fscrypt guardrails > libceph: add CEPH_OSD_OP_ASSERT_VER support > ceph: size handling for encrypted inodes in cap updates > ceph: fscrypt_file field handling in MClientRequest messages > ceph: handle fscrypt fields in cap messages from MDS > ceph: update WARN_ON message to pr_warn > ceph: add infrastructure for file encryption and decryption > libceph: allow ceph_osdc_new_request to accept a multi-op read > ceph: disable fallocate for encrypted inodes > ceph: disable copy offload on encrypted inodes > ceph: don't use special DIO path for encrypted inodes > ceph: align data in pages in ceph_sync_write > ceph: add read/modify/write to ceph_sync_write > ceph: plumb in decryption during sync reads > ceph: add fscrypt decryption support to ceph_netfs_issue_op > ceph: set i_blkbits to crypto block size for encrypted inodes > ceph: add encryption support to writepage > ceph: fscrypt support for writepages > ceph: report STATX_ATTR_ENCRYPTED on encrypted inodes > > Lu=C3=ADs Henriques (9): > ceph: add base64 endcoding routines for encrypted names > ceph: allow encrypting a directory while not having Ax caps > ceph: mark directory as non-complete after loading key > ceph: don't allow changing layout on encrypted files/directories > ceph: invalidate pages when doing direct/sync writes > ceph: add support for encrypted snapshot names > ceph: add support for handling encrypted snapshot names > ceph: update documentation regarding snapshot naming limitations > ceph: prevent snapshots to be created in encrypted locked directories > > Xiubo Li (12): > ceph: make the ioctl cmd more readable in debug log > ceph: fix base64 encoded name's length check in ceph_fname_to_usr() > ceph: pass the request to parse_reply_info_readdir() > ceph: add ceph_encode_encrypted_dname() helper > ceph: add support to readdir for encrypted filenames > ceph: get file size from fscrypt_file when present in inode traces > ceph: add __ceph_get_caps helper support > ceph: add __ceph_sync_read helper support > ceph: add object version support for sync read > ceph: add truncate size handling support for fscrypt > libceph: defer removing the req from osdc just after req->r_callback > ceph: drop the messages from MDS when unmounting > > Documentation/filesystems/ceph.rst | 10 + > fs/ceph/Makefile | 1 + > fs/ceph/acl.c | 4 +- > fs/ceph/addr.c | 182 ++++++-- > fs/ceph/caps.c | 222 ++++++++-- > fs/ceph/crypto.c | 669 +++++++++++++++++++++++++++++ > fs/ceph/crypto.h | 270 ++++++++++++ > fs/ceph/dir.c | 187 ++++++-- > fs/ceph/export.c | 44 +- > fs/ceph/file.c | 595 +++++++++++++++++++++---- > fs/ceph/inode.c | 580 +++++++++++++++++++++++-- > fs/ceph/ioctl.c | 126 +++++- > fs/ceph/mds_client.c | 477 +++++++++++++++++--- > fs/ceph/mds_client.h | 29 +- > fs/ceph/quota.c | 4 + > fs/ceph/snap.c | 6 + > fs/ceph/super.c | 169 +++++++- > fs/ceph/super.h | 44 +- > fs/ceph/xattr.c | 29 ++ > include/linux/ceph/ceph_fs.h | 21 +- > include/linux/ceph/messenger.h | 40 ++ > include/linux/ceph/osd_client.h | 93 +++- > include/linux/ceph/rados.h | 4 + > net/ceph/messenger.c | 79 ++++ > net/ceph/messenger_v1.c | 98 ++++- > net/ceph/messenger_v2.c | 286 +++++++++++- > net/ceph/osd_client.c | 369 +++++++++++++++- > 27 files changed, 4243 insertions(+), 395 deletions(-) > create mode 100644 fs/ceph/crypto.c > create mode 100644 fs/ceph/crypto.h > > --=20 > 2.31.1 >