Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp3071636pxp; Tue, 22 Mar 2022 11:26:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyJihDnqh0IhyCj8/S6xycA8D2rau5hEqI4KgCVLyHohzVpwAghrw247Nonl+zMIVSITbPH X-Received: by 2002:aa7:c6d3:0:b0:418:eebd:8760 with SMTP id b19-20020aa7c6d3000000b00418eebd8760mr30749308eds.50.1647973565236; Tue, 22 Mar 2022 11:26:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647973565; cv=none; d=google.com; s=arc-20160816; b=plNtkFlFEx0YALfGrANQXu+4Q/4uzJVMwmEEh5qDWx+exXEuZJYsjRFY3A6tUVGmDv Aa5YB8i/ff6rZuGIdaVfojIlpbAhA8XwK1gbCHdfYKcYbw678N3sdAsDKQgjsWZ1xucr SjdNRMKRIdNHc6CbF6cBZ35ze78w5jMEjORS8bMKeBrU5sp1rppTQqH/Sm4gDm0XxSJn crxLCbqTLxJZ0jRDBWN9cfxVuoPh2fvPpCJnR6YJSklpm2MK+5cKDC3RtoACcIv1DJ6h 7kMgwbIlTXirMLLQQHzf3Z55xA612ir6ll6ji3RddmA2ynLxOvB3IJejlemf8noLMocG 5HBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=vhfYLiRt2ehthCbUEzxcXnbxhFsMuzft63qRK6mz3o4=; b=trr6kaWoRjppT7XRd8M7gBwc91WtvJJPUM2pTNKGn1G0kJUb+AwXkjN2gV6DKYmfRa QWXT7iPz2sj7DvZQJGA1HkRRnfKkq2ljfpon7uZxp1OtaVBiou4nEE1/E5evJ9r3/k7h aHL4FTxxv2k/oFmRaUfOOtdngDnIHrznSwhCSVySRObkzhjWzTFKWR0FNFXely9XrSzF odItapAGEW6TsaTyXEnZCsWBOQli+VhFgGiO8O+HDrPwIopuSBRGlJPVdWOxH4vmPAd9 W98FYPA3WdQ3nEuxMMHiCks813ICKYE5o53RW6gpXuLkQnj7VgJxg4a9C8fZJRrddlWB 86ow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=SAX8PdZy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 27-20020a508e5b000000b00418c2b5bf2asi12530475edx.524.2022.03.22.11.25.39; Tue, 22 Mar 2022 11:26:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=SAX8PdZy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236662AbiCVOQm (ORCPT + 99 others); Tue, 22 Mar 2022 10:16:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52196 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236607AbiCVOPP (ORCPT ); Tue, 22 Mar 2022 10:15:15 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CA3053CA71; Tue, 22 Mar 2022 07:13:45 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 50743615F4; Tue, 22 Mar 2022 14:13:45 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 10CC6C340F0; Tue, 22 Mar 2022 14:13:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1647958424; bh=cDPy0xI578WfkDIktMt8wJvIbPGQCoBzzMq2Fpkpaf4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SAX8PdZySj1UsxQGNvBt4HvDfOBXeqQvgAbE2Zkzd6OkeaisIxdK5L8ZWtemgwlaf WZZCImQO+XYc7CEX96dwG7pHpRdI2iLFarsePF7qoQcYQRA6vKz2E3ds2v9dXXkdp9 R/jhgRgBERz4dn/Fc7zQRxYuSyZblqHUT2t6KVw2pZ6J4KqkUN5usZMX7eRvkeYEgf yG9K8CUvIWCmvAlb5hmTpRqKX1DeE1p+mOoOFcBvszIY+/bgpYgFxfGf2x1TUiDper 6aZntw421wYjShdSRaE2B0weFHq0bNs33WxbR9gzqxN/HoBC5hf11SCYGl3gEMvyCa 1gNQ/kAp7VV6Q== From: Jeff Layton To: idryomov@gmail.com, xiubli@redhat.com Cc: ceph-devel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-kernel@vger.kernel.org, lhenriques@suse.de Subject: [RFC PATCH v11 27/51] ceph: make ceph_get_name decrypt filenames Date: Tue, 22 Mar 2022 10:12:52 -0400 Message-Id: <20220322141316.41325-28-jlayton@kernel.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220322141316.41325-1-jlayton@kernel.org> References: <20220322141316.41325-1-jlayton@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When we do a lookupino to the MDS, we get a filename in the trace. ceph_get_name uses that name directly, so we must properly decrypt it before copying it to the name buffer. Signed-off-by: Jeff Layton --- fs/ceph/export.c | 44 ++++++++++++++++++++++++++++++++------------ 1 file changed, 32 insertions(+), 12 deletions(-) diff --git a/fs/ceph/export.c b/fs/ceph/export.c index e0fa66ac8b9f..0ebf2bd93055 100644 --- a/fs/ceph/export.c +++ b/fs/ceph/export.c @@ -7,6 +7,7 @@ #include "super.h" #include "mds_client.h" +#include "crypto.h" /* * Basic fh @@ -534,7 +535,9 @@ static int ceph_get_name(struct dentry *parent, char *name, { struct ceph_mds_client *mdsc; struct ceph_mds_request *req; + struct inode *dir = d_inode(parent); struct inode *inode = d_inode(child); + struct ceph_mds_reply_info_parsed *rinfo; int err; if (ceph_snap(inode) != CEPH_NOSNAP) @@ -546,30 +549,47 @@ static int ceph_get_name(struct dentry *parent, char *name, if (IS_ERR(req)) return PTR_ERR(req); - inode_lock(d_inode(parent)); - + inode_lock(dir); req->r_inode = inode; ihold(inode); req->r_ino2 = ceph_vino(d_inode(parent)); - req->r_parent = d_inode(parent); - ihold(req->r_parent); + req->r_parent = dir; + ihold(dir); set_bit(CEPH_MDS_R_PARENT_LOCKED, &req->r_req_flags); req->r_num_caps = 2; err = ceph_mdsc_do_request(mdsc, NULL, req); + inode_unlock(dir); - inode_unlock(d_inode(parent)); + if (err) + goto out; - if (!err) { - struct ceph_mds_reply_info_parsed *rinfo = &req->r_reply_info; + rinfo = &req->r_reply_info; + if (!IS_ENCRYPTED(dir)) { memcpy(name, rinfo->dname, rinfo->dname_len); name[rinfo->dname_len] = 0; - dout("get_name %p ino %llx.%llx name %s\n", - child, ceph_vinop(inode), name); } else { - dout("get_name %p ino %llx.%llx err %d\n", - child, ceph_vinop(inode), err); - } + struct fscrypt_str oname = FSTR_INIT(NULL, 0); + struct ceph_fname fname = { .dir = dir, + .name = rinfo->dname, + .ctext = rinfo->altname, + .name_len = rinfo->dname_len, + .ctext_len = rinfo->altname_len }; + + err = ceph_fname_alloc_buffer(dir, &oname); + if (err < 0) + goto out; + err = ceph_fname_to_usr(&fname, NULL, &oname, NULL); + if (!err) { + memcpy(name, oname.name, oname.len); + name[oname.len] = 0; + } + ceph_fname_free_buffer(dir, &oname); + } +out: + dout("get_name %p ino %llx.%llx err %d %s%s\n", + child, ceph_vinop(inode), err, + err ? "" : "name ", err ? "" : name); ceph_mdsc_put_request(req); return err; } -- 2.35.1