linux/fs/ceph
Luís Henriques e127e03009 ceph: allow encrypting a directory while not having Ax caps
If a client doesn't have Fx caps on a directory, it will get errors while
trying encrypt it:

ceph: handle_cap_grant: cap grant attempt to change fscrypt_auth on non-I_NEW inode (old len 0 new len 48)
fscrypt (ceph, inode 1099511627812): Error -105 getting encryption context

A simple way to reproduce this is to use two clients:

    client1 # mkdir /mnt/mydir

    client2 # ls /mnt/mydir

    client1 # fscrypt encrypt /mnt/mydir
    client1 # echo hello > /mnt/mydir/world

This happens because, in __ceph_setattr(), we only initialize
ci->fscrypt_auth if we have Ax and ceph_fill_inode() won't use the
fscrypt_auth received if the inode state isn't I_NEW.  Fix it by allowing
ceph_fill_inode() to also set ci->fscrypt_auth if the inode doesn't have
it set already.

Signed-off-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
2023-08-24 11:24:35 +02:00
..
acl.c ceph: fscrypt_auth handling for ceph 2023-08-22 09:01:48 +02:00
addr.c ceph: use osd_req_op_extent_osd_iter for netfs reads 2023-08-22 09:01:48 +02:00
cache.c netfs: Fix gcc-12 warning by embedding vfs inode in netfs_i_context 2022-06-09 13:55:00 -07:00
cache.h netfs: Further cleanups after struct netfs_inode wrapper introduced 2022-06-10 20:55:21 +01:00
caps.c ceph: encode encrypted name in ceph_mdsc_build_path and dentry release 2023-08-24 11:22:37 +02:00
ceph_frag.c License cleanup: add SPDX GPL-2.0 license identifier to files with no license 2017-11-02 11:10:55 +01:00
crypto.c ceph: add support to readdir for encrypted names 2023-08-24 11:24:34 +02:00
crypto.h ceph: add some fscrypt guardrails 2023-08-24 11:24:35 +02:00
debugfs.c ceph: fix potential use-after-free bug when trimming caps 2023-04-30 12:37:28 +02:00
dir.c ceph: add some fscrypt guardrails 2023-08-24 11:24:35 +02:00
export.c ceph: make ceph_fill_trace and ceph_get_name decrypt names 2023-08-24 11:24:34 +02:00
file.c ceph: add some fscrypt guardrails 2023-08-24 11:24:35 +02:00
inode.c ceph: allow encrypting a directory while not having Ax caps 2023-08-24 11:24:35 +02:00
io.c ceph: fix kerneldoc copypasta over ceph_start_io_direct 2021-04-27 23:52:23 +02:00
io.h ceph: add buffered/direct exclusionary locking for reads and writes 2019-09-16 12:06:25 +02:00
ioctl.c ceph: add some fscrypt guardrails 2023-08-24 11:24:35 +02:00
ioctl.h License cleanup: add SPDX GPL-2.0 license identifier to files with no license 2017-11-02 11:10:55 +01:00
Kconfig ceph: conversion to new fscache API 2022-01-11 22:13:01 +00:00
locks.c filelock: move file locking definitions to separate header file 2023-01-11 06:52:32 -05:00
Makefile ceph: fscrypt_auth handling for ceph 2023-08-22 09:01:48 +02:00
mds_client.c ceph: add support to readdir for encrypted names 2023-08-24 11:24:34 +02:00
mds_client.h ceph: add support to readdir for encrypted names 2023-08-24 11:24:34 +02:00
mdsmap.c treewide: use get_random_u32_below() instead of deprecated function 2022-11-18 02:15:15 +01:00
metric.c ceph: never send metrics if disable_send_metrics is set 2023-07-24 13:15:39 +02:00
metric.h ceph: include average/stdev r/w/m latency in mds metrics 2022-03-21 13:35:16 +01:00
quota.c ceph: fix statfs for subdir mounts 2022-05-25 20:45:14 +02:00
snap.c ceph: trigger to flush the buffer when making snapshot 2023-06-30 12:08:55 +02:00
strings.c ceph: add getvxattr op 2022-03-01 18:26:37 +01:00
super.c ceph: implement -o test_dummy_encryption mount option 2023-08-22 09:01:48 +02:00
super.h ceph: implement -o test_dummy_encryption mount option 2023-08-22 09:01:48 +02:00
util.c ceph: move net/ceph/ceph_fs.c to fs/ceph/util.c 2020-01-27 16:53:40 +01:00
xattr.c ceph: add fscrypt ioctls and ceph.fscrypt.auth vxattr 2023-08-22 09:01:48 +02:00