Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp1032390imw; Wed, 13 Jul 2022 12:29:25 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vS+WEuhnWYsjWkrzgPZ7zfU+pMRfI6+mbSFpsKQgWZuoOOSKNqEMS/KdaUxBFhr8kiS2I2 X-Received: by 2002:a17:90a:ff17:b0:1ef:8b4b:8cc0 with SMTP id ce23-20020a17090aff1700b001ef8b4b8cc0mr5479298pjb.155.1657740565580; Wed, 13 Jul 2022 12:29:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657740565; cv=none; d=google.com; s=arc-20160816; b=ZOhOz5IomixUiJR50+P9UW9T2KMZnmWmxgiPqzTFFS7D4gC4uqb2EEncmft8sQR4Ip B+cu8y1HYawcNy+frD2Fvnf+IrZN0NxzCwx+SHBVnoXLNh0gRj9s+h+ysa0mCsA9l+88 v7LsxRHP/LEIJwpXbpGOX6xUoJ4KvJcpdlhuqRODUKKTYWGb6Qpee5Jh9vYetmZnBVz2 b627QzFBf7McAXvCLSGFrAS0pMo39WGpappfC4rby2SOn2pZt/F40odjcEfjeJNL3XOR ib4yibuS6jio2fTOKVOAEkehk97HgnJHrTzEJZ+B8XKayu91sg0+isltoBnC7pgsUvSD JkSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent :content-transfer-encoding:references:in-reply-to:date:cc:to:from :subject:message-id:dkim-signature; bh=smm9YnpoYOLZaUS8VaWke6x0XChGJKJJBUvoe+4oe+E=; b=IPFx//tjuYKzfmbx5weQTvMQfbg2Gzr961dIZtVTQ3Yp/wtSSXHS0vWx8qeCstnZKk GhW15kU1OAjA+DAsRyxooFiA6GKc3/JNF3vFePM3ZOI5Xo8y93Xg0b1hyC+BL4Gl78B+ fbOBlwuKew3yQoVyqoXt58SfpGfRgxcATiN71y+uTanY1Ztohs5xzMLfUyLWOrOalpys wuwSodFpq3xLMCZ1Ud1BzlQl1pinU0zskcxzRnS8V8Eahu2tHgjcK4SbiQVu74rbuJyS TW0FL38X09ChDlfzs3I8TyMz4bm47auSSyTrfoSEZWDFha8kr4IPHytkmAMrzlewYuLL 6u+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=B0v6Jqij; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i16-20020a635410000000b003fd9e43f9bfsi19440411pgb.393.2022.07.13.12.29.12; Wed, 13 Jul 2022 12:29:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=B0v6Jqij; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236674AbiGMS4V (ORCPT + 99 others); Wed, 13 Jul 2022 14:56:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53708 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229772AbiGMS4T (ORCPT ); Wed, 13 Jul 2022 14:56:19 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9F1A418B20; Wed, 13 Jul 2022 11:56:18 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 3AAB761DB8; Wed, 13 Jul 2022 18:56:18 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 04A53C34114; Wed, 13 Jul 2022 18:56:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1657738577; bh=DIuWNzcmWsNV5L5d7k1v7k7Y+satjQp3+LA8NxaoCG0=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=B0v6JqijEJ0TEExOz66ZMsuxX0aYtzY8Sb5bYqrAmDA6BAKnBz2PR4v2KTQ64o+ox zCYZRTfjBKCo7J1mYZxhAlPlWjE9+kjZA7XqFUAyx8iPELVDRcKcbAepPZ8bhahZb3 atA+8j+IVQIYIqtPimQwYysCGUkcGZukDxgtDzqOEW/TMu+0aSyIgT3YSgy1yNvcy9 Cdp2n5vgfpWM8ZKDQGiOj8WQkIE7gFJiLLScMHCgYc4Uc1VSmBT/wOdxoSjrOZHy/K o+CHga83pOBCuAulGHCmqf4akf5OznfXph8viyRnqkwob/iHEvV6EvLBHtbkBVYGNT JDhYypan2H0og== Message-ID: <5edd2424465dc97e15d3e4635c7011e5c789cef1.camel@kernel.org> Subject: Re: [PATCH] ceph: fix up test_dummy_encryption handling for new mount API From: Jeff Layton To: Xiubo Li , ceph-devel@vger.kernel.org, idryomov@gmail.com Cc: vshankar@redhat.com, linux-kernel@vger.kernel.org, Eric Biggers Date: Wed, 13 Jul 2022 14:56:15 -0400 In-Reply-To: References: <20220713085641.50232-1-xiubli@redhat.com> Content-Type: text/plain; charset="ISO-8859-15" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.44.3 (3.44.3-1.fc36) MIME-Version: 1.0 X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2022-07-13 at 20:55 +0800, Xiubo Li wrote: > Hi Jeff, >=20 > I am rebasing the 'wip-fscrypt' branch to the 'testing', and there is=20 > one commit conflicts: >=20 > commit 81faddddbef409bcaa1aa3d89e59606cde94dab7 > Author: Jeff Layton > Date:=A0=A0 Wed Dec 1 09:21:39 2021 -0500 >=20 > =A0=A0=A0 ceph: add infrastructure for file encryption and decryption >=20 > =A0=A0=A0 ...and allow test_dummy_encryption to bypass content encryptio= n > =A0=A0=A0 if mounted with test_dummy_encryption=3Dclear. >=20 > =A0=A0=A0 Reviewed-by: Xiubo Li > =A0=A0=A0 Signed-off-by: Jeff Layton >=20 > And the conflicts are: >=20 > [xiubli@fedora ]$ cat fs/ceph/super.h.rej > --- fs/ceph/super.h > +++ fs/ceph/super.h > @@ -45,6 +45,7 @@ > =A0#define CEPH_MOUNT_OPT_NOPAGECACHE=A0=A0=A0=A0 (1<<16) /* bypass page= cache=20 > altogether */ > =A0#define CEPH_MOUNT_OPT_SPARSEREAD=A0=A0=A0=A0=A0 (1<<17) /* always do= sparse=20 > reads */ > =A0#define CEPH_MOUNT_OPT_TEST_DUMMY_ENC=A0 (1<<18) /* enable dummy=20 > encryption (for testing) */ > +#define CEPH_MOUNT_OPT_DUMMY_ENC_CLEAR (1<<19) /* don't actually=20 > encrypt content */ >=20 > =A0#define CEPH_MOUNT_OPT_DEFAULT=A0=A0=A0 =A0=A0=A0 =A0=A0=A0 \ > =A0=A0=A0=A0 (CEPH_MOUNT_OPT_DCACHE |=A0=A0=A0 =A0=A0=A0 \ >=20 > [xiubli@fedora ]$ cat fs/ceph/super.c.rej > --- fs/ceph/super.c > +++ fs/ceph/super.c > @@ -1098,6 +1098,14 @@ static int ceph_set_test_dummy_encryption(struct= =20 > super_block *sb, struct fs_cont > =A0=A0=A0=A0 =A0=A0=A0 =A0=A0=A0 return -EEXIST; > =A0=A0=A0=A0 =A0=A0=A0 } >=20 > +=A0=A0=A0 =A0=A0=A0 /* HACK: allow for cleartext "encryption" in files f= or testing */ > +=A0=A0=A0 =A0=A0=A0 if (fsc->mount_options->test_dummy_encryption && > + !strcmp(fsc->mount_options->test_dummy_encryption, "clear")) { > +=A0=A0=A0 =A0=A0=A0 =A0=A0=A0 fsopt->flags |=3D CEPH_MOUNT_OPT_DUMMY_ENC= _CLEAR; > + kfree(fsc->mount_options->test_dummy_encryption); > +=A0=A0=A0 =A0=A0=A0 =A0=A0=A0 fsc->mount_options->test_dummy_encryption = =3D NULL; > +=A0=A0=A0 =A0=A0=A0 } > + > =A0=A0=A0=A0 =A0=A0=A0 err =3D fscrypt_set_test_dummy_encryption(sb, > fsc->mount_options->test_dummy_encryption, > =A0=A0=A0=A0 =A0=A0=A0 =A0=A0=A0 =A0=A0=A0 =A0=A0=A0 =A0=A0=A0 =A0=A0=A0= &fsc->dummy_enc_policy); >=20 > And I have pushed the tmp patches to=20 > https://github.com/lxbsz/ceph-client/commits/lxb-wip-fscrypt3. >=20 > Please take a look is that okay ? >=20 > Thanks >=20 > -- Xiubo >=20 >=20 The result looks good to me. Thanks for fixing this up. --=20 Jeff Layton