From: Eric Biggers <ebiggers3@gmail.com>
To: Richard Weinberger <richard@nod.at>
Cc: linux-fsdevel@vger.kernel.org,
"Theodore Y . Ts'o" <tytso@mit.edu>,
Jaegeuk Kim <jaegeuk@kernel.org>,
linux-ext4@vger.kernel.org,
linux-f2fs-devel@lists.sourceforge.net,
David Gstir <david@sigma-star.at>,
Eric Biggers <ebiggers@google.com>
Subject: Re: [PATCH 3/3] fscrypt: consolidate fscrypt_has_permitted_context() checks
Date: Fri, 16 Dec 2016 12:46:40 -0800 [thread overview]
Message-ID: <20161216204640.GA14264@gmail.com> (raw)
In-Reply-To: <5de5b934-5709-ca29-c277-99d93539b1c0@nod.at>
On Fri, Dec 16, 2016 at 01:22:51PM +0100, Richard Weinberger wrote:
> On 15.12.2016 20:19, Eric Biggers wrote:
> > From: Eric Biggers <ebiggers@google.com>
> >
> > Now that fscrypt_has_permitted_context() compares the fscrypt_context
> > rather than the fscrypt_info when needed, it is no longer necessary to
> > delay fscrypt_has_permitted_context() from ->lookup() to ->open() for
> > regular files, as introduced in commit ff978b09f973 ("ext4 crypto: move
> > context consistency check to ext4_file_open()"). Therefore the check in
> > ->open(), along with the dget_parent() hack, can be removed.
> >
> > It's also no longer necessary to check the file type before calling
> > fscrypt_has_permitted_context().
> >
> > This patch makes these changes for both ext4 and f2fs.
> >
> > Signed-off-by: Eric Biggers <ebiggers@google.com>
> > ---
> > fs/ext4/file.c | 12 ------------
> > fs/ext4/namei.c | 10 ++--------
> > fs/f2fs/file.c | 15 +++++----------
> > fs/f2fs/namei.c | 7 ++-----
> > 4 files changed, 9 insertions(+), 35 deletions(-)
>
> Can please also take care of UBIFS? :-)
>
> Thanks,
> //richard
Yes, I see that UBIFS encryption just got merged yesterday, so I'll send a
version that updates UBIFS too. And it seems the
fscrypt_has_permitted_context() call in ubifs_lookup() is missing, so I'll add
that too.
I'm wondering if it would make more sense to do a separate patch for each
filesystem? But in this case the filesystem changes are dependent on the prior
patches to fs/crypto/, so they can't simply be sent through the per-filesystem
trees unless each one merges in the fs/crypto/ changes too.
Eric
next prev parent reply other threads:[~2016-12-16 20:46 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-12-15 19:19 [PATCH 1/3] fscrypt: fix loophole in one-encryption-policy-per-tree enforcement Eric Biggers
2016-12-15 19:19 ` Eric Biggers
2016-12-15 19:19 ` [PATCH 2/3] fscrypt: fix renaming and linking special files Eric Biggers
2016-12-15 19:19 ` Eric Biggers
2016-12-16 12:22 ` Richard Weinberger
2016-12-15 19:19 ` [PATCH 3/3] fscrypt: consolidate fscrypt_has_permitted_context() checks Eric Biggers
2016-12-15 19:19 ` Eric Biggers
2016-12-16 12:22 ` Richard Weinberger
2016-12-16 20:46 ` Eric Biggers [this message]
2016-12-16 12:18 ` [PATCH 1/3] fscrypt: fix loophole in one-encryption-policy-per-tree enforcement Richard Weinberger
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20161216204640.GA14264@gmail.com \
--to=ebiggers3@gmail.com \
--cc=david@sigma-star.at \
--cc=ebiggers@google.com \
--cc=jaegeuk@kernel.org \
--cc=linux-ext4@vger.kernel.org \
--cc=linux-f2fs-devel@lists.sourceforge.net \
--cc=linux-fsdevel@vger.kernel.org \
--cc=richard@nod.at \
--cc=tytso@mit.edu \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.