From: Eric Biggers <ebiggers3@gmail.com>
To: Eric Sandeen <sandeen@sandeen.net>
Cc: Eric Biggers <ebiggers@google.com>,
linux-xfs@vger.kernel.org, fstests@vger.kernel.org,
Theodore Ts'o <tytso@mit.edu>, Jaegeuk Kim <jaegeuk@kernel.org>,
Richard Weinberger <richard@nod.at>,
David Gstir <david@sigma-star.at>,
Michael Halcrow <mhalcrow@google.com>
Subject: Re: [PATCH] xfs_io: implement 'set_encpolicy' and 'get_encpolicy' commands
Date: Wed, 14 Dec 2016 16:07:29 -0800 [thread overview]
Message-ID: <20161215000729.GA18462@gmail.com> (raw)
In-Reply-To: <9f56ed00-177e-392f-0afd-f87b41777533@sandeen.net>
Hi Eric,
On Wed, Dec 14, 2016 at 05:45:49PM -0600, Eric Sandeen wrote:
> On 11/28/16 4:18 PM, Eric Biggers wrote:
> > Add set_encpolicy and get_encpolicy commands to xfs_io so that xfstests
> > will be able to test filesystem encryption using the actual user API,
> > not just hacked in with a mount option. These commands use the common
> > "fscrypt" API currently implemented by ext4 and f2fs, but it's also
> > under development for ubifs and planned for xfs.
> >
> > Note that to get encrypted files to actually work, it's also necessary
> > to add a key to the kernel keyring. This patch does not add a command
> > for this to xfs_io because it's possible to do it using keyctl. keyctl
> > can also be used to remove keys, revoke keys, invalidate keys, etc.
>
> What is the standard utility for doing this? I ask because while
> xfs_io does operate on non-xfs filesystems, this may be the first dedicated
> command proposed for xfs_io which isn't actually useful on xfs itself.
> And that seems a little out of place to me at this point.
>
> If it's just for the purpose of facilitating fstests, we do have some
> single-purpose helpers in src/ in the xfstests repo, as well.
>
The new xfs_io commands are indeed only intended for xfstests. My original
proposal was to add a fscrypt_util program to xfstests, but Dave Chinner said
the commands should be added to xfs_io instead and that it's planned to
eventually make XFS support the encryption API too.
set_policy and get_policy commands are also available in 'e4crypt', which is
part of e2fsprogs. There is also a common userspace utility called 'fscrypt'
being designed to replace e4crypt. However, neither of these programs are
intended to simply expose the raw ioctls. Therefore, not everything I am
testing in the new xfstests could be tested with them.
Eric
next prev parent reply other threads:[~2016-12-15 0:07 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-11-28 22:18 [PATCH] xfs_io: implement 'set_encpolicy' and 'get_encpolicy' commands Eric Biggers
2016-12-14 23:45 ` Eric Sandeen
2016-12-15 0:07 ` Eric Biggers [this message]
2016-12-15 0:13 ` Eric Sandeen
2016-12-15 4:19 ` Eric Sandeen
2016-12-15 19:40 ` Eric Sandeen
2016-12-15 21:20 ` Eric Biggers
2016-12-15 21:48 ` Eric Sandeen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20161215000729.GA18462@gmail.com \
--to=ebiggers3@gmail.com \
--cc=david@sigma-star.at \
--cc=ebiggers@google.com \
--cc=fstests@vger.kernel.org \
--cc=jaegeuk@kernel.org \
--cc=linux-xfs@vger.kernel.org \
--cc=mhalcrow@google.com \
--cc=richard@nod.at \
--cc=sandeen@sandeen.net \
--cc=tytso@mit.edu \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).