From: Sweet Tea Dorminy <sweettea-kernel@dorminy.me>
To: Eric Biggers <ebiggers@kernel.org>
Cc: "Theodore Y . Ts'o" <tytso@mit.edu>,
Jaegeuk Kim <jaegeuk@kernel.org>,
linux-fscrypt@vger.kernel.org, linux-kernel@vger.kernel.org,
linux-btrfs@vger.kernel.org, osandov@osandov.com,
kernel-team@fb.com
Subject: Re: [PATCH RFC 2/4] fscrypt: add flag allowing partially-encrypted directories
Date: Mon, 25 Jul 2022 22:13:12 -0400 [thread overview]
Message-ID: <7b35f666-b474-9628-1cc4-7b8fc35e5074@dorminy.me> (raw)
In-Reply-To: <Yt7zsMGrxwKiM+GH@sol.localdomain>
>> diff --git a/include/linux/fscrypt.h b/include/linux/fscrypt.h
>> index 6020b738c3b2..fb48961c46f6 100644
>> --- a/include/linux/fscrypt.h
>> +++ b/include/linux/fscrypt.h
>> @@ -102,6 +102,8 @@ struct fscrypt_nokey_name {
>> * pages for writes and therefore won't need the fscrypt bounce page pool.
>> */
>> #define FS_CFLG_OWN_PAGES (1U << 1)
>> +/* The filesystem allows partially encrypted directories/files. */
>> +#define FS_CFLG_ALLOW_PARTIAL (1U << 2)
>
> I'm very confused about what the semantics of this are. So a directory will be
> able to contain both encrypted and unencrypted filenames? If so, how will it be
> possible to distinguish between them? Or is it just both encrypted and
> unencrypted files (which is actually already possible, in the case where
> encrypted files are moved into an unencrypted directory)? What sort of metadata
> is stored with the parent directory?
Yes, a directory for a filesystem with this flag could have both
encrypted and unencrypted filenames.
When a directory switches to encrypted, the filesystem can get and store
a fscrypt_context for it, as though it were a new directory. All new
filenames for that directory will be encrypted, as will any filename
lookup requests, by fscrypt_prepare_filename() since the directory has a
context.
When a request for a lookup of a name in that directory comes in, it'll
be an encrypted or nokey name; the directory can be searched for both
the encrypted and unencrypted versions of that name. I don't think any
filename collisions can result, as any encrypted filename which happens
to match a plaintext filename will be detected as a collision when it's
first added.
>
> Please note that any new semantics and APIs will need to be documented in
> Documentation/filesystems/fscrypt.rst.
Good point.
Thanks!
Sweet Tea
next prev parent reply other threads:[~2022-07-26 2:13 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-07-24 0:52 [PATCH RFC 0/4] fscrypt changes for btrfs encryption Sweet Tea Dorminy
2022-07-24 0:52 ` [PATCH RFC 1/4] fscrypt: expose fscrypt_nokey_name Sweet Tea Dorminy
2022-07-24 0:52 ` [PATCH RFC 2/4] fscrypt: add flag allowing partially-encrypted directories Sweet Tea Dorminy
2022-07-25 19:49 ` Eric Biggers
2022-07-26 2:13 ` Sweet Tea Dorminy [this message]
2022-07-24 0:52 ` [PATCH RFC 3/4] fscrypt: add fscrypt_have_same_policy() to check inode's compatibility Sweet Tea Dorminy
2022-07-24 0:52 ` [PATCH RFC 4/4] fscrypt: Add new encryption policy for btrfs Sweet Tea Dorminy
2022-07-25 23:32 ` Eric Biggers
2022-07-26 2:16 ` Sweet Tea Dorminy
2022-07-26 17:45 ` David Sterba
2022-07-26 19:29 ` Eric Biggers
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=7b35f666-b474-9628-1cc4-7b8fc35e5074@dorminy.me \
--to=sweettea-kernel@dorminy.me \
--cc=ebiggers@kernel.org \
--cc=jaegeuk@kernel.org \
--cc=kernel-team@fb.com \
--cc=linux-btrfs@vger.kernel.org \
--cc=linux-fscrypt@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=osandov@osandov.com \
--cc=tytso@mit.edu \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).