Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751547AbdILPj2 (ORCPT ); Tue, 12 Sep 2017 11:39:28 -0400 Received: from mga11.intel.com ([192.55.52.93]:33831 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751404AbdILPjZ (ORCPT ); Tue, 12 Sep 2017 11:39:25 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.42,383,1500966000"; d="scan'208";a="134510755" Date: Tue, 12 Sep 2017 09:39:21 -0600 From: Ross Zwisler To: Jan Kara Cc: Ross Zwisler , "Theodore Ts'o" , linux-kernel@vger.kernel.org, Andreas Dilger , Christoph Hellwig , Dan Williams , Dave Chinner , linux-ext4@vger.kernel.org, linux-nvdimm@lists.01.org, stable@vger.kernel.org Subject: Re: [PATCH v2 3/5] ext4: add sanity check for encryption + DAX Message-ID: <20170912153921.GB5000@linux.intel.com> References: <20170912050526.7627-1-ross.zwisler@linux.intel.com> <20170912050526.7627-4-ross.zwisler@linux.intel.com> <20170912064500.GC16554@quack2.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170912064500.GC16554@quack2.suse.cz> User-Agent: Mutt/1.8.3 (2017-05-23) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3039 Lines: 79 On Tue, Sep 12, 2017 at 08:45:00AM +0200, Jan Kara wrote: > On Mon 11-09-17 23:05:24, Ross Zwisler wrote: > > We prevent DAX from being used on inodes which are using ext4's built in > > encryption via a check in ext4_set_inode_flags(). We do have what appears > > to be an unsafe transition of S_DAX in ext4_set_context(), though, where > > S_DAX can get disabled without us doing a proper writeback + invalidate. > > > > There are also issues with mm-level races when changing the value of S_DAX, > > as well as issues with the VM_MIXEDMAP flag: > > > > https://www.spinics.net/lists/linux-xfs/msg09859.html > > > > I actually think we are safe in this case because of the following: > > > > 1) You can't encrypt an existing file. Encryption can only be set on an > > empty directory, with new inodes in that directory being created with > > encryption turned on, so I don't think it's possible to turn encryption on > > for a file that has open DAX mmaps or outstanding I/Os. > > > > 2) There is no way to turn encryption off on a given file. Once an inode > > is encrypted, it stays encrypted for the life of that inode, so we don't > > have to worry about the case where we turn encryption off and S_DAX > > suddenly turns on. > > > > 3) The only way we end up in ext4_set_context() to turn on encryption is > > when we are creating a new file in the encrypted directory. This happens > > as part of ext4_create() before the inode has been allowed to do any I/O. > > Here's the call tree: > > > > ext4_create() > > __ext4_new_inode() > > ext4_set_inode_flags() // sets S_DAX > > fscrypt_inherit_context() > > fscrypt_get_encryption_info(); > > ext4_set_context() // sets EXT4_INODE_ENCRYPT, clears S_DAX > > > > So, I actually think it's safe to transition S_DAX in ext4_set_context() > > without any locking, writebacks or invalidations. I've added a > > WARN_ON_ONCE() sanity check to make sure that we are notified if we ever > > encounter a case where we are encrypting an inode that already has data, > > in which case we need to add code to safely transition S_DAX. > > > > Signed-off-by: Ross Zwisler > > CC: stable@vger.kernel.org > > Looks good to me - and frankly I think we can drop the stable CC here... Sure, I'm fine to drop the CC to stable. > Anyway, you can add: > > Reviewed-by: Jan Kara > > Honza > > > --- > > fs/ext4/super.c | 3 +++ > > 1 file changed, 3 insertions(+) > > > > diff --git a/fs/ext4/super.c b/fs/ext4/super.c > > index 4251e50..c090780 100644 > > --- a/fs/ext4/super.c > > +++ b/fs/ext4/super.c > > @@ -1159,6 +1159,9 @@ static int ext4_set_context(struct inode *inode, const void *ctx, size_t len, > > if (inode->i_ino == EXT4_ROOT_INO) > > return -EPERM; > > > > + if (WARN_ON_ONCE(IS_DAX(inode) && i_size_read(inode))) > > + return -EINVAL; > > + > > res = ext4_convert_inline_data(inode); > > if (res) > > return res; > > -- > > 2.9.5 > > > -- > Jan Kara > SUSE Labs, CR