Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3208424pxv; Sun, 25 Jul 2021 20:59:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxMjeMYdJGnp3iYfXOvZLuy6WHPD3l9wf9X37NuaDqhkRUIEHbShxv/AmLWek9rPE0T7ZB3 X-Received: by 2002:a92:ce91:: with SMTP id r17mr8824274ilo.264.1627271944723; Sun, 25 Jul 2021 20:59:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627271944; cv=none; d=google.com; s=arc-20160816; b=IuK0YqrPgsbtH+DqpgULVz2cpUl0Dqgi8QE2xNSwKGknlLj9N4k2zLU0zfSND9210A 1InkUYwpqP2K8/O4FqNk31e5JIFtlleLRxtRqNRYTKvSS+3QLeJJ3RTkcLgMpcq/6AvR NPt9cg+WNwTo0uDgjgU0TJQWF3pwAg72w/839NVw1H1d6ZGUWdyMVMKJ4ZJzLs0qN7oO QbN2Po7Gwq9es0uYzYkLU4i1qLduzCA1GBhlnYfdZi1O/1WxXsrmdidMGZstgqxmp8xF Y1GLYGkOG+hbzlz/Bpbra2thvng0XX///5VlqImswM6vk2cXRDp+wvSdl0IHs/6fcUBo 1Itw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=/wZKk/9M4mrA/k2eksngnMyL5wb+6hSiwwO2LHSHRfI=; b=aQxq27R+lqWkcDH+SX3FQ4uYDda4MvQ3eQj/UGviOZpmx66W+IR1LyyBE/eOcrmH2q XCCFDKJQ3eEl2FwmTJCJiBQNThepof48DxOdq8opHCNRXKZPKzLOrDUtztd9s0c//4AX ztwoiiYnU7iqJWv920fAvHe2QTWVKfkIyzE9D1/heM/NTBIprgYqslq39a+vxbhtOb/V aBiOUg12yCUkevLSYYMfW3uO1tvGLFdFgCikoPEl9HR8rKxsk2dIHDzkYZQ7fbIQA2WT 2PWBjyvRR3WfY0NQIrqYw32u2No5OH9zaDBy0cEBiGaSehVWqxyGR2KM6hlDMRiZBJ55 VbNA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qgmYCrRd; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d18si41018360ilo.140.2021.07.25.20.58.47; Sun, 25 Jul 2021 20:59:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qgmYCrRd; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231537AbhGZDSG (ORCPT + 99 others); Sun, 25 Jul 2021 23:18:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:53008 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230321AbhGZDSG (ORCPT ); Sun, 25 Jul 2021 23:18:06 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 4FA6960EB2; Mon, 26 Jul 2021 03:58:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1627271915; bh=WPLxji5Fu3Q2Q6hrxcLMN8a8q3esfgs4pl4CERub5YQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=qgmYCrRdhNjrVPAoHCovW00SjzclRfqwwr+TF3YR2+VJF1OfgIcpNJhkK4eByklBX 1XsJZZP4DbXkPdxsLdLYxA0F0+DFSdkn+q82TKancpVQOq8njTx5CMjF365UH0jLct +XR0U8gxeOY8AKCfFMl8mQ4vk8iUZzr5EkvUdRyExEMjbU5Ihr5JHoZbSbzkOIcn1x KnYkutj0MPTAemKe1UU4n1kFuON6bpcSgNOo/rQL9qTHaQ9hC4omSBP1szv45dUwzW D9kauqkb7x7Q6cQlBmkD77q96XTWfchBYyNXTSZkExEq3gQ9n9Bt7ND2MMha2wKIni Y6XgTywBxx92g== Date: Sun, 25 Jul 2021 20:58:34 -0700 From: Eric Biggers To: linux-fscrypt@vger.kernel.org Cc: linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-mtd@lists.infradead.org, linux-fsdevel@vger.kernel.org Subject: Re: [PATCH 0/5] fscrypt: report correct st_size for encrypted symlinks Message-ID: References: <20210702065350.209646-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210702065350.209646-1-ebiggers@kernel.org> Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Thu, Jul 01, 2021 at 11:53:45PM -0700, Eric Biggers wrote: > This series makes the stat() family of syscalls start reporting the > correct size for encrypted symlinks. > > See patch 1 for a detailed explanation of the problem and solution. > > Patch 1 adds a helper function that computes the correct size for an > encrypted symlink. Patches 2-4 make the filesystems with fscrypt > support use it, and patch 5 updates the documentation. > > This series applies to mainline commit 3dbdb38e2869. > > Eric Biggers (5): > fscrypt: add fscrypt_symlink_getattr() for computing st_size > ext4: report correct st_size for encrypted symlinks > f2fs: report correct st_size for encrypted symlinks > ubifs: report correct st_size for encrypted symlinks > fscrypt: remove mention of symlink st_size quirk from documentation > > Documentation/filesystems/fscrypt.rst | 5 --- > fs/crypto/hooks.c | 44 +++++++++++++++++++++++++++ > fs/ext4/symlink.c | 12 +++++++- > fs/f2fs/namei.c | 12 +++++++- > fs/ubifs/file.c | 13 +++++++- > include/linux/fscrypt.h | 7 +++++ > 6 files changed, 85 insertions(+), 8 deletions(-) > > > base-commit: 3dbdb38e286903ec220aaf1fb29a8d94297da246 All applied to fscrypt.git#master for 5.15. - Eric