Message ID | 20201217150435.1505269-1-satyat@google.com (mailing list archive) |
---|---|
Headers | show |
Series | add support for metadata encryption to F2FS | expand |
On Thu, Dec 17, 2020 at 03:04:32PM +0000, Satya Tangirala wrote: > Changes to the userspace > tools (that are required to test out metadata encryption with F2FS) are > also being sent out - I'll post a link as a reply to this mail once it's > out. The userspace changes are at https://lore.kernel.org/linux-f2fs-devel/20201217151013.1513045-1-satyat@google.com/
On Thu, Dec 17, 2020 at 03:04:32PM +0000, Satya Tangirala wrote: > This patch series adds support for metadata encryption to F2FS using > blk-crypto. Is there a companion patch series needed so that f2fstools can check/repair a file system with metadata encryption enabled? - Ted
On Thu, Dec 17, 2020 at 01:08:49PM -0500, Theodore Y. Ts'o wrote: > On Thu, Dec 17, 2020 at 03:04:32PM +0000, Satya Tangirala wrote: > > This patch series adds support for metadata encryption to F2FS using > > blk-crypto. > > Is there a companion patch series needed so that f2fstools can > check/repair a file system with metadata encryption enabled? > > - Ted Yes! It's at https://lore.kernel.org/linux-f2fs-devel/20201217151013.1513045-1-satyat@google.com/
On Thu, Dec 17, 2020 at 08:51:14PM +0000, Satya Tangirala wrote: > On Thu, Dec 17, 2020 at 01:08:49PM -0500, Theodore Y. Ts'o wrote: > > On Thu, Dec 17, 2020 at 03:04:32PM +0000, Satya Tangirala wrote: > > > This patch series adds support for metadata encryption to F2FS using > > > blk-crypto. > > > > Is there a companion patch series needed so that f2fstools can > > check/repair a file system with metadata encryption enabled? > > > > - Ted > Yes! It's at > https://lore.kernel.org/linux-f2fs-devel/20201217151013.1513045-1-satyat@google.com/ Cool, I've been meaning to update f2fs-tools in Debian, and including these patches will allow us to generate {kvm,gce,android}-xfstests images with this support. I'm hoping to get to it sometime betweeen Christmas and New Year's. I guess there will need to be some additional work needed to create the f2fs image with a fixed keys for a particular file system in xfstests-bld, and then mounting and checking said image with the appropriatre keys as well. Is that something you've put together? Cheers, - Ted
On Thu, Dec 17, 2020 at 06:34:27PM -0500, Theodore Y. Ts'o wrote: > On Thu, Dec 17, 2020 at 08:51:14PM +0000, Satya Tangirala wrote: > > On Thu, Dec 17, 2020 at 01:08:49PM -0500, Theodore Y. Ts'o wrote: > > > On Thu, Dec 17, 2020 at 03:04:32PM +0000, Satya Tangirala wrote: > > > > This patch series adds support for metadata encryption to F2FS using > > > > blk-crypto. > > > > > > Is there a companion patch series needed so that f2fstools can > > > check/repair a file system with metadata encryption enabled? > > > > > > - Ted > > Yes! It's at > > https://lore.kernel.org/linux-f2fs-devel/20201217151013.1513045-1-satyat@google.com/ > > Cool, I've been meaning to update f2fs-tools in Debian, and including > these patches will allow us to generate {kvm,gce,android}-xfstests > images with this support. I'm hoping to get to it sometime betweeen > Christmas and New Year's. > > I guess there will need to be some additional work needed to create > the f2fs image with a fixed keys for a particular file system in > xfstests-bld, and then mounting and checking said image with the > appropriatre keys as well. Is that something you've put together? > I did put something together that sets up metadata encryption on the disks used by kvm-xfstests. The main code changes were to add a fixed metadata encryption key with keyctl, and export MKFS_OPTIONS with the metadata encryption options. The mkfs options are the only options that need direct modification because the rest of the tools (fsck/dump etc.) automatically do the right thing if the FS superblock has the metadata encryption options. But the rest of the tools do need the metadata encryption key to be present, and some xfstests/other parts of the harness code clear the keyrings directly, so I had a few more hacky changes to re-add the keys when they're cleared. Some more hacky changes were needed because some xfstests override MKFS_OPTIONS. I'll be happy to send what I have to you/put it up somewhere. I'll also try to clean up the code a little, but my knowledge of xfstests is definitely limited so it might take a little while. > Cheers, > > - Ted