15baf55481
Master keys can be in one of three states: present, incompletely removed, and absent (as per FSCRYPT_KEY_STATUS_* used in the UAPI). Currently, the way that "present" is distinguished from "incompletely removed" internally is by whether ->mk_secret exists or not. With extent-based encryption, it will be necessary to allow per-extent keys to be derived while the master key is incompletely removed, so that I/O on open files will reliably continue working after removal of the key has been initiated. (We could allow I/O to sometimes fail in that case, but that seems problematic for reasons such as writes getting silently thrown away and diverging from the existing fscrypt semantics.) Therefore, when the filesystem is using extent-based encryption, ->mk_secret can't be wiped when the key becomes incompletely removed. As a prerequisite for doing that, this patch makes the "present" state be tracked using a new field, ->mk_present. No behavior is changed yet. The basic idea here is borrowed from Josef Bacik's patch "fscrypt: use a flag to indicate that the master key is being evicted" (https://lore.kernel.org/r/e86c16dddc049ff065f877d793ad773e4c6bfad9.1696970227.git.josef@toxicpanda.com). I reimplemented it using a "present" bool instead of an "evicted" flag, fixed a couple bugs, and tried to update everything to be consistent. Note: I considered adding a ->mk_status field instead, holding one of FSCRYPT_KEY_STATUS_*. At first that seemed nice, but it ended up being more complex (despite simplifying FS_IOC_GET_ENCRYPTION_KEY_STATUS), since it would have introduced redundancy and had weird locking rules. Reviewed-by: Neal Gompa <neal@gompa.dev> Reviewed-by: Josef Bacik <josef@toxicpanda.com> Link: https://lore.kernel.org/r/20231015061055.62673-1-ebiggers@kernel.org Signed-off-by: Eric Biggers <ebiggers@google.com> |
||
---|---|---|
.. | ||
caching | ||
ext4 | ||
nfs | ||
smb | ||
spufs | ||
9p.rst | ||
adfs.rst | ||
affs.rst | ||
afs.rst | ||
api-summary.rst | ||
autofs-mount-control.rst | ||
autofs.rst | ||
automount-support.rst | ||
befs.rst | ||
bfs.rst | ||
btrfs.rst | ||
ceph.rst | ||
coda.rst | ||
configfs.rst | ||
cramfs.rst | ||
dax.rst | ||
debugfs.rst | ||
devpts.rst | ||
directory-locking.rst | ||
dlmfs.rst | ||
dnotify.rst | ||
ecryptfs.rst | ||
efivarfs.rst | ||
erofs.rst | ||
ext2.rst | ||
ext3.rst | ||
f2fs.rst | ||
fiemap.rst | ||
files.rst | ||
fscrypt.rst | ||
fsverity.rst | ||
fuse-io.rst | ||
fuse.rst | ||
gfs2-glocks.rst | ||
gfs2-uevents.rst | ||
gfs2.rst | ||
hfs.rst | ||
hfsplus.rst | ||
hpfs.rst | ||
idmappings.rst | ||
index.rst | ||
inotify.rst | ||
isofs.rst | ||
journalling.rst | ||
locking.rst | ||
locks.rst | ||
mount_api.rst | ||
netfs_library.rst | ||
nilfs2.rst | ||
ntfs3.rst | ||
ntfs.rst | ||
ocfs2-online-filecheck.rst | ||
ocfs2.rst | ||
omfs.rst | ||
orangefs.rst | ||
overlayfs.rst | ||
path-lookup.rst | ||
path-lookup.txt | ||
porting.rst | ||
proc.rst | ||
qnx6.rst | ||
quota.rst | ||
ramfs-rootfs-initramfs.rst | ||
relay.rst | ||
romfs.rst | ||
seq_file.rst | ||
sharedsubtree.rst | ||
splice.rst | ||
squashfs.rst | ||
sysfs.rst | ||
sysv-fs.rst | ||
tmpfs.rst | ||
ubifs-authentication.rst | ||
ubifs.rst | ||
udf.rst | ||
vfat.rst | ||
vfs.rst | ||
virtiofs.rst | ||
xfs-delayed-logging-design.rst | ||
xfs-maintainer-entry-profile.rst | ||
xfs-online-fsck-design.rst | ||
xfs-self-describing-metadata.rst | ||
zonefs.rst |