All of lore.kernel.org
 help / color / mirror / Atom feed
From: xiubli@redhat.com
To: idryomov@gmail.com, ceph-devel@vger.kernel.org
Cc: jlayton@kernel.org, vshankar@redhat.com, lhenriques@suse.de,
	mchangir@redhat.com, Xiubo Li <xiubli@redhat.com>
Subject: [PATCH v19 15/70] ceph: implement -o test_dummy_encryption mount option
Date: Mon, 17 Apr 2023 11:25:59 +0800	[thread overview]
Message-ID: <20230417032654.32352-16-xiubli@redhat.com> (raw)
In-Reply-To: <20230417032654.32352-1-xiubli@redhat.com>

From: Jeff Layton <jlayton@kernel.org>

Add support for the test_dummy_encryption mount option. This allows us
to test the encrypted codepaths in ceph without having to manually set
keys, etc.

Luís Henriques has fixed a potential 'fsc->fsc_dummy_enc_policy' memory
leak bug in mount error path.

Cc: Luís Henriques <lhenriques@suse.de>
Tested-by: Luís Henriques <lhenriques@suse.de>
Tested-by: Venky Shankar <vshankar@redhat.com>
Reviewed-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Signed-off-by: Xiubo Li <xiubli@redhat.com>
---
 fs/ceph/crypto.c | 53 ++++++++++++++++++++++++++++++
 fs/ceph/crypto.h | 26 +++++++++++++++
 fs/ceph/inode.c  | 10 ++++--
 fs/ceph/super.c  | 85 ++++++++++++++++++++++++++++++++++++++++++++++--
 fs/ceph/super.h  |  9 ++++-
 fs/ceph/xattr.c  |  3 ++
 6 files changed, 180 insertions(+), 6 deletions(-)

diff --git a/fs/ceph/crypto.c b/fs/ceph/crypto.c
index a513ff373b13..fd3192917e8d 100644
--- a/fs/ceph/crypto.c
+++ b/fs/ceph/crypto.c
@@ -4,6 +4,7 @@
 #include <linux/fscrypt.h>
 
 #include "super.h"
+#include "mds_client.h"
 #include "crypto.h"
 
 static int ceph_crypt_get_context(struct inode *inode, void *ctx, size_t len)
@@ -64,9 +65,15 @@ static bool ceph_crypt_empty_dir(struct inode *inode)
 	return ci->i_rsubdirs + ci->i_rfiles == 1;
 }
 
+static const union fscrypt_policy *ceph_get_dummy_policy(struct super_block *sb)
+{
+	return ceph_sb_to_client(sb)->fsc_dummy_enc_policy.policy;
+}
+
 static struct fscrypt_operations ceph_fscrypt_ops = {
 	.get_context		= ceph_crypt_get_context,
 	.set_context		= ceph_crypt_set_context,
+	.get_dummy_policy	= ceph_get_dummy_policy,
 	.empty_dir		= ceph_crypt_empty_dir,
 };
 
@@ -74,3 +81,49 @@ void ceph_fscrypt_set_ops(struct super_block *sb)
 {
 	fscrypt_set_ops(sb, &ceph_fscrypt_ops);
 }
+
+void ceph_fscrypt_free_dummy_policy(struct ceph_fs_client *fsc)
+{
+	fscrypt_free_dummy_policy(&fsc->fsc_dummy_enc_policy);
+}
+
+int ceph_fscrypt_prepare_context(struct inode *dir, struct inode *inode,
+				 struct ceph_acl_sec_ctx *as)
+{
+	int ret, ctxsize;
+	bool encrypted = false;
+	struct ceph_inode_info *ci = ceph_inode(inode);
+
+	ret = fscrypt_prepare_new_inode(dir, inode, &encrypted);
+	if (ret)
+		return ret;
+	if (!encrypted)
+		return 0;
+
+	as->fscrypt_auth = kzalloc(sizeof(*as->fscrypt_auth), GFP_KERNEL);
+	if (!as->fscrypt_auth)
+		return -ENOMEM;
+
+	ctxsize = fscrypt_context_for_new_inode(as->fscrypt_auth->cfa_blob, inode);
+	if (ctxsize < 0)
+		return ctxsize;
+
+	as->fscrypt_auth->cfa_version = cpu_to_le32(CEPH_FSCRYPT_AUTH_VERSION);
+	as->fscrypt_auth->cfa_blob_len = cpu_to_le32(ctxsize);
+
+	WARN_ON_ONCE(ci->fscrypt_auth);
+	kfree(ci->fscrypt_auth);
+	ci->fscrypt_auth_len = ceph_fscrypt_auth_len(as->fscrypt_auth);
+	ci->fscrypt_auth = kmemdup(as->fscrypt_auth, ci->fscrypt_auth_len, GFP_KERNEL);
+	if (!ci->fscrypt_auth)
+		return -ENOMEM;
+
+	inode->i_flags |= S_ENCRYPTED;
+
+	return 0;
+}
+
+void ceph_fscrypt_as_ctx_to_req(struct ceph_mds_request *req, struct ceph_acl_sec_ctx *as)
+{
+	swap(req->r_fscrypt_auth, as->fscrypt_auth);
+}
diff --git a/fs/ceph/crypto.h b/fs/ceph/crypto.h
index 6dca674f79b8..cb00fe42d5b7 100644
--- a/fs/ceph/crypto.h
+++ b/fs/ceph/crypto.h
@@ -8,6 +8,10 @@
 
 #include <linux/fscrypt.h>
 
+struct ceph_fs_client;
+struct ceph_acl_sec_ctx;
+struct ceph_mds_request;
+
 struct ceph_fscrypt_auth {
 	__le32	cfa_version;
 	__le32	cfa_blob_len;
@@ -25,12 +29,34 @@ static inline u32 ceph_fscrypt_auth_len(struct ceph_fscrypt_auth *fa)
 #ifdef CONFIG_FS_ENCRYPTION
 void ceph_fscrypt_set_ops(struct super_block *sb);
 
+void ceph_fscrypt_free_dummy_policy(struct ceph_fs_client *fsc);
+
+int ceph_fscrypt_prepare_context(struct inode *dir, struct inode *inode,
+				 struct ceph_acl_sec_ctx *as);
+void ceph_fscrypt_as_ctx_to_req(struct ceph_mds_request *req, struct ceph_acl_sec_ctx *as);
+
 #else /* CONFIG_FS_ENCRYPTION */
 
 static inline void ceph_fscrypt_set_ops(struct super_block *sb)
 {
 }
 
+static inline void ceph_fscrypt_free_dummy_policy(struct ceph_fs_client *fsc)
+{
+}
+
+static inline int ceph_fscrypt_prepare_context(struct inode *dir, struct inode *inode,
+						struct ceph_acl_sec_ctx *as)
+{
+	if (IS_ENCRYPTED(dir))
+		return -EOPNOTSUPP;
+	return 0;
+}
+
+static inline void ceph_fscrypt_as_ctx_to_req(struct ceph_mds_request *req,
+						struct ceph_acl_sec_ctx *as_ctx)
+{
+}
 #endif /* CONFIG_FS_ENCRYPTION */
 
 #endif
diff --git a/fs/ceph/inode.c b/fs/ceph/inode.c
index 36ab0bb56a07..8b6b12a5a5e2 100644
--- a/fs/ceph/inode.c
+++ b/fs/ceph/inode.c
@@ -83,12 +83,17 @@ struct inode *ceph_new_inode(struct inode *dir, struct dentry *dentry,
 			goto out_err;
 	}
 
+	inode->i_state = 0;
+	inode->i_mode = *mode;
+
 	err = ceph_security_init_secctx(dentry, *mode, as_ctx);
 	if (err < 0)
 		goto out_err;
 
-	inode->i_state = 0;
-	inode->i_mode = *mode;
+	err = ceph_fscrypt_prepare_context(dir, inode, as_ctx);
+	if (err)
+		goto out_err;
+
 	return inode;
 out_err:
 	iput(inode);
@@ -101,6 +106,7 @@ void ceph_as_ctx_to_req(struct ceph_mds_request *req, struct ceph_acl_sec_ctx *a
 		req->r_pagelist = as_ctx->pagelist;
 		as_ctx->pagelist = NULL;
 	}
+	ceph_fscrypt_as_ctx_to_req(req, as_ctx);
 }
 
 /**
diff --git a/fs/ceph/super.c b/fs/ceph/super.c
index 88e3f3bacc4e..b9dd2fa36d8b 100644
--- a/fs/ceph/super.c
+++ b/fs/ceph/super.c
@@ -47,6 +47,7 @@ static void ceph_put_super(struct super_block *s)
 	struct ceph_fs_client *fsc = ceph_sb_to_client(s);
 
 	dout("put_super\n");
+	ceph_fscrypt_free_dummy_policy(fsc);
 	ceph_mdsc_close_sessions(fsc->mdsc);
 }
 
@@ -152,6 +153,7 @@ enum {
 	Opt_recover_session,
 	Opt_source,
 	Opt_mon_addr,
+	Opt_test_dummy_encryption,
 	/* string args above */
 	Opt_dirstat,
 	Opt_rbytes,
@@ -194,6 +196,7 @@ static const struct fs_parameter_spec ceph_mount_parameters[] = {
 	fsparam_string	("fsc",				Opt_fscache), // fsc=...
 	fsparam_flag_no ("ino32",			Opt_ino32),
 	fsparam_string	("mds_namespace",		Opt_mds_namespace),
+	fsparam_string	("mon_addr",			Opt_mon_addr),
 	fsparam_flag_no ("poolperm",			Opt_poolperm),
 	fsparam_flag_no ("quotadf",			Opt_quotadf),
 	fsparam_u32	("rasize",			Opt_rasize),
@@ -205,7 +208,8 @@ static const struct fs_parameter_spec ceph_mount_parameters[] = {
 	fsparam_u32	("rsize",			Opt_rsize),
 	fsparam_string	("snapdirname",			Opt_snapdirname),
 	fsparam_string	("source",			Opt_source),
-	fsparam_string	("mon_addr",			Opt_mon_addr),
+	fsparam_flag	("test_dummy_encryption",	Opt_test_dummy_encryption),
+	fsparam_string	("test_dummy_encryption",	Opt_test_dummy_encryption),
 	fsparam_u32	("wsize",			Opt_wsize),
 	fsparam_flag_no	("wsync",			Opt_wsync),
 	fsparam_flag_no	("pagecache",			Opt_pagecache),
@@ -585,6 +589,23 @@ static int ceph_parse_mount_param(struct fs_context *fc,
 		else
 			fsopt->flags |= CEPH_MOUNT_OPT_SPARSEREAD;
 		break;
+	case Opt_test_dummy_encryption:
+#ifdef CONFIG_FS_ENCRYPTION
+		fscrypt_free_dummy_policy(&fsopt->dummy_enc_policy);
+		ret = fscrypt_parse_test_dummy_encryption(param,
+						&fsopt->dummy_enc_policy);
+		if (ret == -EINVAL) {
+			warnfc(fc, "Value of option \"%s\" is unrecognized",
+			       param->key);
+		} else if (ret == -EEXIST) {
+			warnfc(fc, "Conflicting test_dummy_encryption options");
+			ret = -EINVAL;
+		}
+#else
+		warnfc(fc,
+		       "FS encryption not supported: test_dummy_encryption mount option ignored");
+#endif
+		break;
 	default:
 		BUG();
 	}
@@ -605,6 +626,7 @@ static void destroy_mount_options(struct ceph_mount_options *args)
 	kfree(args->server_path);
 	kfree(args->fscache_uniq);
 	kfree(args->mon_addr);
+	fscrypt_free_dummy_policy(&args->dummy_enc_policy);
 	kfree(args);
 }
 
@@ -724,6 +746,8 @@ static int ceph_show_options(struct seq_file *m, struct dentry *root)
 	if (fsopt->flags & CEPH_MOUNT_OPT_SPARSEREAD)
 		seq_puts(m, ",sparseread");
 
+	fscrypt_show_test_dummy_encryption(m, ',', root->d_sb);
+
 	if (fsopt->wsize != CEPH_MAX_WRITE_SIZE)
 		seq_printf(m, ",wsize=%u", fsopt->wsize);
 	if (fsopt->rsize != CEPH_MAX_READ_SIZE)
@@ -1062,6 +1086,50 @@ static struct dentry *open_root_dentry(struct ceph_fs_client *fsc,
 	return root;
 }
 
+#ifdef CONFIG_FS_ENCRYPTION
+static int ceph_apply_test_dummy_encryption(struct super_block *sb,
+					    struct fs_context *fc,
+					    struct ceph_mount_options *fsopt)
+{
+	struct ceph_fs_client *fsc = sb->s_fs_info;
+
+	if (!fscrypt_is_dummy_policy_set(&fsopt->dummy_enc_policy))
+		return 0;
+
+	/* No changing encryption context on remount. */
+	if (fc->purpose == FS_CONTEXT_FOR_RECONFIGURE &&
+	    !fscrypt_is_dummy_policy_set(&fsc->fsc_dummy_enc_policy)) {
+		if (fscrypt_dummy_policies_equal(&fsopt->dummy_enc_policy,
+						 &fsc->fsc_dummy_enc_policy))
+			return 0;
+		errorfc(fc, "Can't set test_dummy_encryption on remount");
+		return -EINVAL;
+	}
+
+	/* Also make sure fsopt doesn't contain a conflicting value. */
+	if (fscrypt_is_dummy_policy_set(&fsc->fsc_dummy_enc_policy)) {
+		if (fscrypt_dummy_policies_equal(&fsopt->dummy_enc_policy,
+						 &fsc->fsc_dummy_enc_policy))
+			return 0;
+		errorfc(fc, "Conflicting test_dummy_encryption options");
+		return -EINVAL;
+	}
+
+	fsc->fsc_dummy_enc_policy = fsopt->dummy_enc_policy;
+	memset(&fsopt->dummy_enc_policy, 0, sizeof(fsopt->dummy_enc_policy));
+
+	warnfc(fc, "test_dummy_encryption mode enabled");
+	return 0;
+}
+#else
+static int ceph_apply_test_dummy_encryption(struct super_block *sb,
+					    struct fs_context *fc,
+					    struct ceph_mount_options *fsopt)
+{
+	return 0;
+}
+#endif
+
 /*
  * mount: join the ceph cluster, and open root directory.
  */
@@ -1090,6 +1158,10 @@ static struct dentry *ceph_real_mount(struct ceph_fs_client *fsc,
 				goto out;
 		}
 
+		err = ceph_apply_test_dummy_encryption(fsc->sb, fc, fsc->mount_options);
+		if (err)
+			goto out;
+
 		dout("mount opening path '%s'\n", path);
 
 		ceph_fs_debugfs_init(fsc);
@@ -1111,6 +1183,7 @@ static struct dentry *ceph_real_mount(struct ceph_fs_client *fsc,
 
 out:
 	mutex_unlock(&fsc->client->mount_mutex);
+	ceph_fscrypt_free_dummy_policy(fsc);
 	return ERR_PTR(err);
 }
 
@@ -1299,9 +1372,15 @@ static void ceph_free_fc(struct fs_context *fc)
 
 static int ceph_reconfigure_fc(struct fs_context *fc)
 {
+	int err;
 	struct ceph_parse_opts_ctx *pctx = fc->fs_private;
 	struct ceph_mount_options *fsopt = pctx->opts;
-	struct ceph_fs_client *fsc = ceph_sb_to_client(fc->root->d_sb);
+	struct super_block *sb = fc->root->d_sb;
+	struct ceph_fs_client *fsc = ceph_sb_to_client(sb);
+
+	err = ceph_apply_test_dummy_encryption(sb, fc, fsopt);
+	if (err)
+		return err;
 
 	if (fsopt->flags & CEPH_MOUNT_OPT_ASYNC_DIROPS)
 		ceph_set_mount_opt(fsc, ASYNC_DIROPS);
@@ -1320,7 +1399,7 @@ static int ceph_reconfigure_fc(struct fs_context *fc)
 		pr_notice("ceph: monitor addresses recorded, but not used for reconnection");
 	}
 
-	sync_filesystem(fc->root->d_sb);
+	sync_filesystem(sb);
 	return 0;
 }
 
diff --git a/fs/ceph/super.h b/fs/ceph/super.h
index 8d4984a8b15b..355701a1ac70 100644
--- a/fs/ceph/super.h
+++ b/fs/ceph/super.h
@@ -22,6 +22,7 @@
 #include <linux/hashtable.h>
 
 #include <linux/ceph/libceph.h>
+#include "crypto.h"
 
 /* large granularity for statfs utilization stats to facilitate
  * large volume sizes on 32-bit machines. */
@@ -99,6 +100,7 @@ struct ceph_mount_options {
 	char *server_path;    /* default NULL (means "/") */
 	char *fscache_uniq;   /* default NULL */
 	char *mon_addr;
+	struct fscrypt_dummy_policy dummy_enc_policy;
 };
 
 /* mount state */
@@ -155,9 +157,11 @@ struct ceph_fs_client {
 #ifdef CONFIG_CEPH_FSCACHE
 	struct fscache_volume *fscache;
 #endif
+#ifdef CONFIG_FS_ENCRYPTION
+	struct fscrypt_dummy_policy fsc_dummy_enc_policy;
+#endif
 };
 
-
 /*
  * File i/o capability.  This tracks shared state with the metadata
  * server that allows us to cache or writeback attributes or to read
@@ -1106,6 +1110,9 @@ struct ceph_acl_sec_ctx {
 #ifdef CONFIG_CEPH_FS_SECURITY_LABEL
 	void *sec_ctx;
 	u32 sec_ctxlen;
+#endif
+#ifdef CONFIG_FS_ENCRYPTION
+	struct ceph_fscrypt_auth *fscrypt_auth;
 #endif
 	struct ceph_pagelist *pagelist;
 };
diff --git a/fs/ceph/xattr.c b/fs/ceph/xattr.c
index f65b07cc33a2..d2242d7b082e 100644
--- a/fs/ceph/xattr.c
+++ b/fs/ceph/xattr.c
@@ -1401,6 +1401,9 @@ void ceph_release_acl_sec_ctx(struct ceph_acl_sec_ctx *as_ctx)
 #endif
 #ifdef CONFIG_CEPH_FS_SECURITY_LABEL
 	security_release_secctx(as_ctx->sec_ctx, as_ctx->sec_ctxlen);
+#endif
+#ifdef CONFIG_FS_ENCRYPTION
+	kfree(as_ctx->fscrypt_auth);
 #endif
 	if (as_ctx->pagelist)
 		ceph_pagelist_release(as_ctx->pagelist);
-- 
2.39.1


  parent reply	other threads:[~2023-04-17  3:30 UTC|newest]

Thread overview: 77+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-04-17  3:25 [PATCH v19 00/70] ceph+fscrypt: full support xiubli
2023-04-17  3:25 ` [PATCH v19 01/70] libceph: add spinlock around osd->o_requests xiubli
2023-04-17  3:25 ` [PATCH v19 02/70] libceph: define struct ceph_sparse_extent and add some helpers xiubli
2023-04-17  3:25 ` [PATCH v19 03/70] libceph: add sparse read support to msgr2 crc state machine xiubli
2023-04-17  3:25 ` [PATCH v19 04/70] libceph: add sparse read support to OSD client xiubli
2023-04-17  3:25 ` [PATCH v19 05/70] libceph: support sparse reads on msgr2 secure codepath xiubli
2023-04-17  3:25 ` [PATCH v19 06/70] libceph: add sparse read support to msgr1 xiubli
2023-04-17  3:25 ` [PATCH v19 07/70] ceph: add new mount option to enable sparse reads xiubli
2023-04-17  3:25 ` [PATCH v19 08/70] ceph: preallocate inode for ops that may create one xiubli
2023-04-17  3:25 ` [PATCH v19 09/70] ceph: make ceph_msdc_build_path use ref-walk xiubli
2023-04-17  3:25 ` [PATCH v19 10/70] libceph: add new iov_iter-based ceph_msg_data_type and ceph_osd_data_type xiubli
2023-04-17  3:25 ` [PATCH v19 11/70] ceph: use osd_req_op_extent_osd_iter for netfs reads xiubli
2023-04-17  3:25 ` [PATCH v19 12/70] ceph: fscrypt_auth handling for ceph xiubli
2023-04-17  3:25 ` [PATCH v19 13/70] ceph: ensure that we accept a new context from MDS for new inodes xiubli
2023-04-17  3:25 ` [PATCH v19 14/70] ceph: add support for fscrypt_auth/fscrypt_file to cap messages xiubli
2023-04-17  3:25 ` xiubli [this message]
2023-04-17  3:26 ` [PATCH v19 16/70] ceph: decode alternate_name in lease info xiubli
2023-04-17  3:26 ` [PATCH v19 17/70] ceph: add fscrypt ioctls xiubli
2023-04-17  3:26 ` [PATCH v19 18/70] ceph: make the ioctl cmd more readable in debug log xiubli
2023-04-17  3:26 ` [PATCH v19 19/70] ceph: add base64 endcoding routines for encrypted names xiubli
2023-04-17  3:26 ` [PATCH v19 20/70] ceph: add encrypted fname handling to ceph_mdsc_build_path xiubli
2023-04-17  3:26 ` [PATCH v19 21/70] ceph: send altname in MClientRequest xiubli
2023-04-17  3:26 ` [PATCH v19 22/70] ceph: encode encrypted name in dentry release xiubli
2023-04-17  3:26 ` [PATCH v19 23/70] ceph: properly set DCACHE_NOKEY_NAME flag in lookup xiubli
2023-04-17  3:26 ` [PATCH v19 24/70] ceph: set DCACHE_NOKEY_NAME in atomic open xiubli
2023-04-17  3:26 ` [PATCH v19 25/70] ceph: make d_revalidate call fscrypt revalidator for encrypted dentries xiubli
2023-04-17  3:26 ` [PATCH v19 26/70] ceph: add helpers for converting names for userland presentation xiubli
2023-04-17  3:26 ` [PATCH v19 27/70] ceph: fix base64 encoded name's length check in ceph_fname_to_usr() xiubli
2023-04-17  3:26 ` [PATCH v19 28/70] ceph: add fscrypt support to ceph_fill_trace xiubli
2023-04-17  3:26 ` [PATCH v19 29/70] ceph: pass the request to parse_reply_info_readdir() xiubli
2023-04-17  3:26 ` [PATCH v19 30/70] ceph: add ceph_encode_encrypted_dname() helper xiubli
2023-04-17  3:26 ` [PATCH v19 31/70] ceph: add support to readdir for encrypted filenames xiubli
2023-04-17  3:26 ` [PATCH v19 32/70] ceph: create symlinks with encrypted and base64-encoded targets xiubli
2023-04-17  3:26 ` [PATCH v19 33/70] ceph: make ceph_get_name decrypt filenames xiubli
2023-04-17  3:26 ` [PATCH v19 34/70] ceph: add a new ceph.fscrypt.auth vxattr xiubli
2023-04-17  3:26 ` [PATCH v19 35/70] ceph: add some fscrypt guardrails xiubli
2023-04-17  3:26 ` [PATCH v19 36/70] ceph: allow encrypting a directory while not having Ax caps xiubli
2023-04-17  3:26 ` [PATCH v19 37/70] ceph: mark directory as non-complete after loading key xiubli
2023-04-17  3:26 ` [PATCH v19 38/70] ceph: don't allow changing layout on encrypted files/directories xiubli
2023-04-17  3:26 ` [PATCH v19 39/70] libceph: add CEPH_OSD_OP_ASSERT_VER support xiubli
2023-04-17  3:26 ` [PATCH v19 40/70] ceph: size handling for encrypted inodes in cap updates xiubli
2023-04-17  3:26 ` [PATCH v19 41/70] ceph: fscrypt_file field handling in MClientRequest messages xiubli
2023-04-17  3:26 ` [PATCH v19 42/70] ceph: get file size from fscrypt_file when present in inode traces xiubli
2023-04-17  3:26 ` [PATCH v19 43/70] ceph: handle fscrypt fields in cap messages from MDS xiubli
2023-04-17  3:26 ` [PATCH v19 44/70] ceph: update WARN_ON message to pr_warn xiubli
2023-04-17  3:26 ` [PATCH v19 45/70] ceph: add __ceph_get_caps helper support xiubli
2023-04-17  3:26 ` [PATCH v19 46/70] ceph: add __ceph_sync_read " xiubli
2023-04-17  3:26 ` [PATCH v19 47/70] ceph: add object version support for sync read xiubli
2023-04-17  3:26 ` [PATCH v19 48/70] ceph: add infrastructure for file encryption and decryption xiubli
2023-04-17  3:26 ` [PATCH v19 49/70] ceph: add truncate size handling support for fscrypt xiubli
2023-04-17  3:26 ` [PATCH v19 50/70] libceph: allow ceph_osdc_new_request to accept a multi-op read xiubli
2023-04-17  3:26 ` [PATCH v19 51/70] ceph: disable fallocate for encrypted inodes xiubli
2023-04-17  3:26 ` [PATCH v19 52/70] ceph: disable copy offload on " xiubli
2023-04-17  3:26 ` [PATCH v19 53/70] ceph: don't use special DIO path for " xiubli
2023-04-17  3:26 ` [PATCH v19 54/70] ceph: align data in pages in ceph_sync_write xiubli
2023-04-17  3:26 ` [PATCH v19 55/70] ceph: add read/modify/write to ceph_sync_write xiubli
2023-04-17  3:26 ` [PATCH v19 56/70] ceph: plumb in decryption during sync reads xiubli
2023-04-17  3:26 ` [PATCH v19 57/70] ceph: add fscrypt decryption support to ceph_netfs_issue_op xiubli
2023-04-17  3:26 ` [PATCH v19 58/70] ceph: set i_blkbits to crypto block size for encrypted inodes xiubli
2023-04-17  3:26 ` [PATCH v19 59/70] ceph: add encryption support to writepage xiubli
2023-04-17  3:26 ` [PATCH v19 60/70] ceph: fscrypt support for writepages xiubli
2023-04-17  3:26 ` [PATCH v19 61/70] ceph: invalidate pages when doing direct/sync writes xiubli
2023-04-17  3:26 ` [PATCH v19 62/70] ceph: add support for encrypted snapshot names xiubli
2023-04-17  3:26 ` [PATCH v19 63/70] ceph: add support for handling " xiubli
2023-04-17  3:26 ` [PATCH v19 64/70] ceph: update documentation regarding snapshot naming limitations xiubli
2023-04-17  3:26 ` [PATCH v19 65/70] ceph: prevent snapshots to be created in encrypted locked directories xiubli
2023-04-17  3:26 ` [PATCH v19 66/70] ceph: report STATX_ATTR_ENCRYPTED on encrypted inodes xiubli
2023-04-17  3:26 ` [PATCH v19 67/70] ceph: drop the messages from MDS when unmounting xiubli
2023-04-17  3:26 ` [PATCH v19 68/70] ceph: fix updating the i_truncate_pagecache_size for fscrypt xiubli
2023-06-06  7:04   ` Milind Changire
2023-04-17  3:26 ` [PATCH v19 69/70] ceph: switch ceph_open() to use new fscrypt helper xiubli
2023-06-06  6:25   ` Milind Changire
2023-06-06  8:37     ` Xiubo Li
2023-06-06  9:05       ` Luís Henriques
2023-06-06  9:09         ` Xiubo Li
2023-04-17  3:26 ` [PATCH v19 70/70] ceph: switch ceph_open_atomic() to use the " xiubli
2023-06-06  6:18   ` Milind Changire

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20230417032654.32352-16-xiubli@redhat.com \
    --to=xiubli@redhat.com \
    --cc=ceph-devel@vger.kernel.org \
    --cc=idryomov@gmail.com \
    --cc=jlayton@kernel.org \
    --cc=lhenriques@suse.de \
    --cc=mchangir@redhat.com \
    --cc=vshankar@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.