Message ID | 20230314103902.32592-1-lhenriques@suse.de |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:5915:0:0:0:0:0 with SMTP id v21csp1680972wrd; Tue, 14 Mar 2023 03:45:28 -0700 (PDT) X-Google-Smtp-Source: AK7set+5llfi5dWddzh7Yu3XTnE7v7OAyFf0sIVKhsiB8byaGPDfVt/YJU2kIQpNUmGDGq4fJizC X-Received: by 2002:a05:6a20:b061:b0:c7:320a:60b6 with SMTP id dx33-20020a056a20b06100b000c7320a60b6mr30669075pzb.26.1678790727900; Tue, 14 Mar 2023 03:45:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1678790727; cv=none; d=google.com; s=arc-20160816; b=bjWt2UaMizGYXRhWRxAqPH03hsuokLwlIJmgqyqHdpMj9/9un88sIqrioWFtqdFHTK 3VOFbZumIlhdYkAxSN33wdvd0WsOAPo5NhoRPxpV92lxvuN1FbI5Bg8PS50IqOYzxLpt Lh9Ctp+XJjnbKxswDrSbhAv2rnYlSItnf2AC+/epcmOiUPLKjDBbXwZb6/QGLO/0q+va 9q+vyUBOKzvnjtMXxXi/qS2AOMbqwMMAZ9nJTBjbXP//qIgsib2TGl479QmvE/hD5y3U x6gX38MHJNyGVQnrnYWAzNkWqt3nJNO3O7F2MFtkIgx6/53wFL3ifAmuSDfEQ7TiBAvo Wn5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature:dkim-signature; bh=TPaFgIn5XsBkfQryStFIW5OHbcwX6REOoz2u1qCHyXU=; b=slpgsDwcMsjQRsy1s/erwzaTkFqIizAwjcVLUgE4jvqyQ1HvL2TlLH+u4JhQu5NZOF JOSyujdHKCgRvGtaXRaIhT3L5J/uLMvuIXOTwl5EYLNYf7/G1MEKg4jClcjF8q+/ItDu RruYpopkQOxhBWjXUi7lkBl0LRacSUo+RV8Vnt0P0TR3G8/hRvKCfRDKp/QF9daRybuj zOpst+dcyQNkac/BtMS3U/Ue8xN86XpyisbbD+3VxmRAaFrYaF8iCVAAD2pgPp6CPSqT R/fvOWHIhBtGPw2vU77YD3L7rrL44NPd5H4uGzQI//uzGFmjV0rR2MDskyokRVkNI6Ui gB8w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=RsljtV6S; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id bm18-20020a656e92000000b004fb97a4c536si1868574pgb.873.2023.03.14.03.44.45; Tue, 14 Mar 2023 03:45:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=RsljtV6S; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229675AbjCNKkt (ORCPT <rfc822;realc9580@gmail.com> + 99 others); Tue, 14 Mar 2023 06:40:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37144 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229482AbjCNKkr (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Tue, 14 Mar 2023 06:40:47 -0400 Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2001:67c:2178:6::1c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 75FCE12F1A; Tue, 14 Mar 2023 03:40:20 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 1E93D21A77; Tue, 14 Mar 2023 10:39:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1678790345; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=TPaFgIn5XsBkfQryStFIW5OHbcwX6REOoz2u1qCHyXU=; b=RsljtV6Se2Ekyu7uWAYBBLNav53UimNGlJqxQQ/In2Q95zc1u8c5VyMnpzl+CwaqEwOlLP k1dhXhrsbz90sVw6J8i3uI7xF5NBAoBkrv81P0p4PFTEDbTUhPTnd7PPbEdSb9DLGpYnCb 6L8zwrdVgsfTpKPnkgqpCKkV5S27kUQ= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1678790345; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=TPaFgIn5XsBkfQryStFIW5OHbcwX6REOoz2u1qCHyXU=; b=kl8uGVRQrmkfk7omxzCcHdZ+51KsLEPSp7wm+DOnDVI7dzHrWs/q5mRw0VwGXIlqEIV0F9 ZN7GODppyMSfLjAQ== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 7B9D013A1B; Tue, 14 Mar 2023 10:39:04 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id jR35GshOEGS4FQAAMHmgww (envelope-from <lhenriques@suse.de>); Tue, 14 Mar 2023 10:39:04 +0000 Received: from localhost (brahms.olymp [local]) by brahms.olymp (OpenSMTPD) with ESMTPA id ab8d290f; Tue, 14 Mar 2023 10:39:03 +0000 (UTC) From: =?utf-8?q?Lu=C3=ADs_Henriques?= <lhenriques@suse.de> To: Eric Biggers <ebiggers@kernel.org>, Xiubo Li <xiubli@redhat.com>, Jeff Layton <jlayton@kernel.org> Cc: "Theodore Y. Ts'o" <tytso@mit.edu>, Jaegeuk Kim <jaegeuk@kernel.org>, Ilya Dryomov <idryomov@gmail.com>, linux-fscrypt@vger.kernel.org, ceph-devel@vger.kernel.org, linux-kernel@vger.kernel.org, =?utf-8?q?Lu?= =?utf-8?q?=C3=ADs_Henriques?= <lhenriques@suse.de> Subject: [PATCH v2 0/2] ceph: fscrypt: fix atomic open bug for encrypted directories Date: Tue, 14 Mar 2023 10:39:00 +0000 Message-Id: <20230314103902.32592-1-lhenriques@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1760339666429873986?= X-GMAIL-MSGID: =?utf-8?q?1760339666429873986?= |
Series |
ceph: fscrypt: fix atomic open bug for encrypted directories
|
|
Message
Luis Henriques
March 14, 2023, 10:39 a.m. UTC
Hi! I started seeing fstest generic/123 failing in ceph fscrypt, when running it with 'test_dummy_encryption'. This test is quite simple: 1. Creates a directory with write permissions for root only 2. Writes into a file in that directory 3. Uses 'su' to try to modify that file as a different user, and gets -EPERM All the test steps succeed, but the test fails to cleanup: 'rm -rf <dir>' will fail with -ENOTEMPTY. 'strace' shows that calling unlinkat() to remove the file got a -ENOENT and then -ENOTEMPTY for the directory. This is because 'su' does a drop_caches ('su (874): drop_caches: 2' in dmesg), and ceph's atomic open will do: if (IS_ENCRYPTED(dir)) { set_bit(CEPH_MDS_R_FSCRYPT_FILE, &req->r_req_flags); if (!fscrypt_has_encryption_key(dir)) { spin_lock(&dentry->d_lock); dentry->d_flags |= DCACHE_NOKEY_NAME; spin_unlock(&dentry->d_lock); } } Although 'dir' has the encryption key available, fscrypt_has_encryption_key() will return 'false' because fscrypt info isn't yet set after the cache cleanup. The first patch will add a new helper for the atomic_open that will force the fscrypt info to be loaded into an inode that has been evicted recently but for which the key is still available. The second patch switches ceph atomic_open to use the new fscrypt helper. Cheers, -- Luís Changes since v1: - Dropped IS_ENCRYPTED() from helper function because kerneldoc says already that it applies to encrypted directories and, most importantly, because it would introduce a different behaviour for CONFIG_FS_ENCRYPTION and !CONFIG_FS_ENCRYPTION. - Rephrased helper kerneldoc Changes since initial RFC (after Eric's review): - Added kerneldoc comments to the new fscrypt helper - Dropped '__' from helper name (now fscrypt_prepare_atomic_open()) - Added IS_ENCRYPTED() check in helper - DCACHE_NOKEY_NAME is not set if fscrypt_get_encryption_info() returns an error - Fixed helper for !CONFIG_FS_ENCRYPTION (now defined 'static inline') Luís Henriques (2): fscrypt: new helper function - fscrypt_prepare_atomic_open() ceph: switch atomic open to use new fscrypt helper fs/ceph/file.c | 8 +++----- fs/crypto/hooks.c | 33 +++++++++++++++++++++++++++++++++ include/linux/fscrypt.h | 7 +++++++ 3 files changed, 43 insertions(+), 5 deletions(-)