Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp788510ybx; Fri, 1 Nov 2019 11:14:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqzq64RopkUIGbtE5YQd8b1sdNubUtb28pylRo58MWju2lpHqw0KI5VIjWaapmwUGWXxX/0A X-Received: by 2002:a05:6402:713:: with SMTP id w19mr14479018edx.239.1572632059831; Fri, 01 Nov 2019 11:14:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572632059; cv=none; d=google.com; s=arc-20160816; b=NkS4Y2L4KgGebxi4WqMEFRPB/1SKzO37MNZAFIr/k6Gqy4tLQdpaGLirU5w9Tf+HG7 eLKzYjBXWzk6+SNAsdhJwivJQdVKKi8I+dLzoYYPMl3c4qRJiYwBp1FbxK5Eo6ZxcUqm GS8BVeIpmj0pj9E5ltJ+ZHsKWDvysqjIVdXOMdRTnWCehky4laZNu2yHFkyeSvLteha8 rIAVaalRFmHrAtZejnz2fUtFquUnYyRPDgIl+fYDmlwe1stfXmEAprV/LBm9jNYVAyB5 jZi1Zq4zfRhMBMfosVz6riPZQ5r2brdtqKfOlUk0PvA4uXL5lgNaVaTwwosnKL+6bcwM Ko4w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date:dkim-signature; bh=NECIBY2/NE3p+qkDLu08eZ4DDqBzCtasJM6VP8Ix4Ko=; b=sesKZDrRXjKk8cdzGGM6NhzKE5ybl+4sHdo4V0mjAqoUnaAfAxt5t7RUz6IqrVubcq HjK5i+7kevIr2Al5yCdsDEPcMZg6GrbFKcgkc28VqkPSpo88iJhXb7SBBLXdME1VzXFY 7bYEdOclKRO7TCHeCZ23pxJrck8PKVCP53kr9scanBx+LCL1O1XDG4IfqWqLFJ7S+rk1 F2u36Lqh8RZaTDgj2MKPJS9s9/0pM9VxeK403MzxxA0WGx0oJx425uEv2JF2iaEQQ8kR cUdSZuOaJONtYuKvqQ2C5Rneu3KpgCSUEtmEyfqHZuIsDbthzcjTB4sdqPDkuZ6upbGK sB6w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="H/js7aTd"; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t3si3691229eji.178.2019.11.01.11.13.49; Fri, 01 Nov 2019 11:14:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="H/js7aTd"; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726983AbfKASCZ (ORCPT + 99 others); Fri, 1 Nov 2019 14:02:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:51506 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726229AbfKASCZ (ORCPT ); Fri, 1 Nov 2019 14:02:25 -0400 Received: from gmail.com (unknown [104.132.1.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8948B2085B; Fri, 1 Nov 2019 18:02:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572631343; bh=+EVYdRQnzMSni7rbkWUkr/VyBRQqZzi7HYgJl2PSv7U=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=H/js7aTdFNTtnWaMZwMd7OYbWGfMscIslU2oJfmvt7TBifOeGwuqtE2QElTyxYpr7 R4OLm2XIf0CaESSYuC8mO//4FbtGDyJ6M7c6oYdStKnDVn1r5SNLMT4lKj41qv8ydw TWE5Xs721QeeFRJ6TErBluIl9FU8Ta+x9ZhSmrbk= Date: Fri, 1 Nov 2019 11:02:21 -0700 From: Eric Biggers To: linux-fscrypt@vger.kernel.org Cc: linux-f2fs-devel@lists.sourceforge.net, "Theodore Y . Ts'o" , Satya Tangirala , Paul Lawrence , linux-fsdevel@vger.kernel.org, Jaegeuk Kim , linux-ext4@vger.kernel.org, Paul Crowley Subject: Re: [PATCH v2 0/3] fscrypt: support for IV_INO_LBLK_64 policies Message-ID: <20191101180220.GA86412@gmail.com> Mail-Followup-To: linux-fscrypt@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, "Theodore Y . Ts'o" , Satya Tangirala , Paul Lawrence , linux-fsdevel@vger.kernel.org, Jaegeuk Kim , linux-ext4@vger.kernel.org, Paul Crowley References: <20191024215438.138489-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191024215438.138489-1-ebiggers@kernel.org> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Thu, Oct 24, 2019 at 02:54:35PM -0700, Eric Biggers wrote: > Hello, > > In preparation for adding inline encryption support to fscrypt, this > patchset adds a new fscrypt policy flag which modifies the encryption to > be optimized for inline encryption hardware compliant with the UFS v2.1 > standard or the upcoming version of the eMMC standard. > > This means using per-mode keys instead of per-file keys, and in > compensation including the inode number in the IVs. For ext4, this > precludes filesystem shrinking, so I've also added a compat feature > which will prevent the filesystem from being shrunk. > > I've separated this from the full "Inline Encryption Support" patchset > (https://lkml.kernel.org/linux-fsdevel/20190821075714.65140-1-satyat@google.com/) > to avoid conflating an implementation (inline encryption) with a new > on-disk format (IV_INO_LBLK_64). This patchset purely adds support for > IV_INO_LBLK_64 policies to fscrypt, but implements them using the > existing filesystem layer crypto. > > We're planning to make the *implementation* (filesystem layer or inline > crypto) be controlled by a mount option '-o inlinecrypt'. > > This patchset applies to fscrypt.git#master and can also be retrieved from > https://git.kernel.org/pub/scm/linux/kernel/git/ebiggers/linux.git/log/?h=inline-crypt-optimized-v2 > > I've written a ciphertext verification test for this new type of policy: > https://git.kernel.org/pub/scm/linux/kernel/git/ebiggers/xfstests-dev.git/log/?h=inline-encryption > > Work-in-progress patches for the inline encryption implementation of > both IV_INO_LBLK_64 and regular policies can be found at > https://git.kernel.org/pub/scm/linux/kernel/git/ebiggers/linux.git/log/?h=inline-encryption-wip > > Changes v1 => v2: > > - Rename the flag from INLINE_CRYPT_OPTIMIZED to IV_INO_LBLK_64. > > - Use the same key derivation and IV generation scheme for filenames > encryption too. > > - Improve the documentation and commit messages. > > Eric Biggers (3): > fscrypt: add support for IV_INO_LBLK_64 policies > ext4: add support for IV_INO_LBLK_64 encryption policies > f2fs: add support for IV_INO_LBLK_64 encryption policies > Does anyone have any more comments on these patches? - Eric