Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp3278966imc; Wed, 13 Mar 2019 13:33:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqzAZcY4y/YlXBBKwRFmQpGg9hAbawyj+MTHFXkIOe6An/0omjlFTXOyQ8seZWccOsjUl8al X-Received: by 2002:a63:fd03:: with SMTP id d3mr41157949pgh.359.1552509230717; Wed, 13 Mar 2019 13:33:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552509230; cv=none; d=google.com; s=arc-20160816; b=TR+dBlj9Yt6ushAdGTTQtCGji1U2VxMcPAD2B/BMaNYABRbPh2HPimaDRWhJee4frC vL+5YFD7fAjm3HDMA4p6QbNN0sxqf6eem1PPWWngb0mWGe6f53BjuBX1Zjne8d8qyEOA ISxoxcawKsXLznXdTjLpt395MkI0DHDiJf5KDsm1gaJc5Eot4Q2RoLR9b4rHzvO9I9v/ NY3RoWu3wRLpX5+TR73AZ+OShkzLrfowNq1jCUZbpT9tYxZak4RpvT861o0aV8n2Fzjv F+h6QFli2+yf+/DeWnL/QrAe3cD1wPwyrBerJWNfhirL5bQl6nWfKnajkn00B+vy2wYe ZiVw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=ZWWQhweIEQZ/IkyYyLS0g7bViIU5T/r33mZnnp3NZw0=; b=M7PVbkLASYA/t0SGNKg9mezWJgfRuJmbeSq0a64ym9zRMGK2I67Ps31Ed54AER/Smj 5TUwm6/Z8/M9AW+YqecnciWw8v9Pol37gx5gYjOxGts+wor5L6PjdW0uq8lZ9YtcR3x5 VFKmiHmBPAhAilEu50SwYrdIiCzQyRawdMrWRIEsJWPrRuq1+eY9eCZKlmSYisEOJVRy upyB6GI2peiwaX8h1kIUfq3JOmIcDD4Xhzv2c99vM+z1d+CI4boks1t4dxYbgAOEhB/u 1xcovA9vcg8f8mOdSxnF9y/+rXdIaIZhOFvB6ydX3Y+RCYkgB9cWxYJpPcJBWzWZnqqu TLuw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id cm17si12074084plb.149.2019.03.13.13.33.34; Wed, 13 Mar 2019 13:33:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727227AbfCMUdO convert rfc822-to-8bit (ORCPT + 99 others); Wed, 13 Mar 2019 16:33:14 -0400 Received: from lithops.sigma-star.at ([195.201.40.130]:49404 "EHLO lithops.sigma-star.at" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726691AbfCMUdO (ORCPT ); Wed, 13 Mar 2019 16:33:14 -0400 Received: from localhost (localhost [127.0.0.1]) by lithops.sigma-star.at (Postfix) with ESMTP id 0F53E60A550B; Wed, 13 Mar 2019 21:33:12 +0100 (CET) Received: from lithops.sigma-star.at ([127.0.0.1]) by localhost (lithops.sigma-star.at [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id mTIRpAuXTIia; Wed, 13 Mar 2019 21:33:11 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by lithops.sigma-star.at (Postfix) with ESMTP id B32826091877; Wed, 13 Mar 2019 21:33:11 +0100 (CET) Received: from lithops.sigma-star.at ([127.0.0.1]) by localhost (lithops.sigma-star.at [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Cc97TOqdL_qM; Wed, 13 Mar 2019 21:33:11 +0100 (CET) Received: from blindfold.localnet (213-47-184-186.cable.dynamic.surfer.at [213.47.184.186]) by lithops.sigma-star.at (Postfix) with ESMTPSA id 4F48E609B26F; Wed, 13 Mar 2019 21:33:11 +0100 (CET) From: Richard Weinberger To: Amir Goldstein Cc: Miklos Szeredi , linux-fsdevel , linux-fscrypt@vger.kernel.org, overlayfs , linux-kernel , Paul Lawrence Subject: Re: overlayfs vs. fscrypt Date: Wed, 13 Mar 2019 21:33:10 +0100 Message-ID: <15244624.W7e5yEypHC@blindfold> In-Reply-To: References: <4603533.ZIfxmiEf7K@blindfold> <4066872.KGdO14EQMx@blindfold> MIME-Version: 1.0 Content-Transfer-Encoding: 8BIT Content-Type: text/plain; charset="iso-8859-1" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Am Mittwoch, 13. M?rz 2019, 15:26:54 CET schrieb Amir Goldstein: > IMO, the best thing for UBIFS to do would be to modify fscrypt to support > opting out of the revalidate behavior, IWO, sanitize your hack to an API. Given the WTF/s rate this thread has, this might me a good option. Actually people already asked me how to disable this feature because they saw no use of it. Being able to delete encrypted files looks good on the feature list but in reality it has very few users but causes confusion, IMHO. I propose a new fscrypt_operations flag, FS_CFLG_NO_CRYPT_FNAMES. If this flag is set, a) fscrypt_setup_filename() will return -EPERM if no key is found. And b) __fscrypt_prepare_lookup() will not attach fscrypt_d_ops to the dentry. Eric, what do you think? Thanks, //richard