Cover Letter Detail
Show a cover letter.
GET /api/covers/811266/?format=api
{ "id": 811266, "url": "http://patchwork.ozlabs.org/api/covers/811266/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-ext4/cover/20170908001204.18174-1-mhalcrow@google.com/", "project": { "id": 8, "url": "http://patchwork.ozlabs.org/api/projects/8/?format=api", "name": "Linux ext4 filesystem development", "link_name": "linux-ext4", "list_id": "linux-ext4.vger.kernel.org", "list_email": "linux-ext4@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20170908001204.18174-1-mhalcrow@google.com>", "list_archive_url": null, "date": "2017-09-08T00:12:01", "name": "[0/3] fscrypto: Return -EXDEV for link, rename, and cross-rename between incompat contexts", "submitter": { "id": 64496, "url": "http://patchwork.ozlabs.org/api/people/64496/?format=api", "name": "Michael Halcrow", "email": "mhalcrow@google.com" }, "mbox": "http://patchwork.ozlabs.org/project/linux-ext4/cover/20170908001204.18174-1-mhalcrow@google.com/mbox/", "series": [ { "id": 2077, "url": "http://patchwork.ozlabs.org/api/series/2077/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-ext4/list/?series=2077", "date": "2017-09-08T00:12:01", "name": "fscrypto: Return -EXDEV for link, rename, and cross-rename between incompat contexts", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/2077/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/811266/comments/", "headers": { "Return-Path": "<linux-ext4-owner@vger.kernel.org>", "X-Original-To": "patchwork-incoming@ozlabs.org", "Delivered-To": "patchwork-incoming@ozlabs.org", "Authentication-Results": [ "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=linux-ext4-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)", "ozlabs.org; dkim=pass (2048-bit key;\n\tunprotected) header.d=google.com header.i=@google.com\n\theader.b=\"mrG8Ph7D\"; dkim-atps=neutral" ], "Received": [ "from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3xpHng6Th8z9s81\n\tfor <patchwork-incoming@ozlabs.org>;\n\tFri, 8 Sep 2017 10:12:23 +1000 (AEST)", "(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S1752653AbdIHAMW (ORCPT <rfc822;patchwork-incoming@ozlabs.org>);\n\tThu, 7 Sep 2017 20:12:22 -0400", "from mail-pg0-f52.google.com ([74.125.83.52]:37468 \"EHLO\n\tmail-pg0-f52.google.com\" rhost-flags-OK-OK-OK-OK) by vger.kernel.org\n\twith ESMTP id S1752495AbdIHAMV (ORCPT\n\t<rfc822; linux-ext4@vger.kernel.org>); Thu, 7 Sep 2017 20:12:21 -0400", "by mail-pg0-f52.google.com with SMTP id d8so2100441pgt.4\n\tfor <linux-ext4@vger.kernel.org>;\n\tThu, 07 Sep 2017 17:12:21 -0700 (PDT)", "from mhalcrow-linux.kir.corp.google.com ([100.66.175.61])\n\tby smtp.gmail.com with ESMTPSA id\n\td25sm1007805pfb.1.2017.09.07.17.12.19\n\t(version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128);\n\tThu, 07 Sep 2017 17:12:19 -0700 (PDT)" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=google.com; s=20161025;\n\th=from:to:cc:subject:date:message-id;\n\tbh=jTHbND+USUoffSm9/ZTc++ND3F8AJEV9q9r/Bg1vV7s=;\n\tb=mrG8Ph7D3TOr+pCssmw8w2I6Iribi0ukcRYLp8Z5UqdjAkMNV5wtaeBEmjSKPXkBa8\n\tkcYqtgFeqSpE/991JkLDk05ambc7D+cfPsQ7kvIH+WnhBD2iUBiKNximnfX04SITceK0\n\tFsiz0P64GvNh9w5EL9zf6GSdKozfYvUe4nmrM/EMc1BvxX+Sx4NzlXC47tzqG79jOMYv\n\t+uJr3qkSDLnJu7lnc85F9oyB/a/vvV4YY3iUpe8LxABX5+vDemuxwtpaEH3NLhXGSsz4\n\trn17DwqwAiqyqQ1q6kyXNb6NU/WspmVscRmJOjuiRg05wXuOD9q8TRGtkPzF04dWXm46\n\t3plg==", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:from:to:cc:subject:date:message-id;\n\tbh=jTHbND+USUoffSm9/ZTc++ND3F8AJEV9q9r/Bg1vV7s=;\n\tb=ZUD+0HPEeWYgk6BkAM0bokRWssCJnbLlj2Q0J5NqmgaJdXewETexGqlUCLTHwJrpBL\n\thfMVx7fIIrLPmtVpwxzcvQ0x+2lWvxbbQACtioI0i94p2+o6d9s0z2qBKOgLumvZfpS+\n\t8r4wLGN29ilrhoGF6hdwynduqMq34sHXyPsgkx0FRzeKOc51Qes/iselL0J/5depC+lv\n\tJHe0TxxG3YYa6FQDzDoq8WccAckdSf8LMRC6sJXoZkOmVsaMwwEv3pmBVd0doJ7A7di8\n\tNFUT0gBiA8Q/EGtynrG54TPUfZsKR8FF8viv77rvOd7uergdehTJgWEdXG1fxWZMUxOE\n\tlskQ==", "X-Gm-Message-State": "AHPjjUjDgFs15Ctl+d3fX+fVIMXENASw/3SCttjoZ5fGMrmHgedQZOxM\n\tOxhAxZvzSYyeeAet", "X-Google-Smtp-Source": "ADKCNb5ltTxAE4sTif4Bz3PB5C6oFRbcpdfQQeOs9AoJyvFwsO7mMF57PwhA233mrYIZYbzroPnQvQ==", "X-Received": "by 10.98.11.11 with SMTP id t11mr1240190pfi.16.1504829540444;\n\tThu, 07 Sep 2017 17:12:20 -0700 (PDT)", "From": "Michael Halcrow <mhalcrow@google.com>", "To": "linux-fscrypt@vger.kernel.org", "Cc": "linux-fsdevel@vger.kernel.org, linux-ext4@vger.kernel.org,\n\ttytso@mit.edu, linux-f2fs-devel@lists.sourceforge.net,\n\tlinux-mtd@lists.infradead.org", "Subject": "[PATCH 0/3] fscrypto: Return -EXDEV for link, rename,\n\tand cross-rename between incompat contexts", "Date": "Thu, 7 Sep 2017 17:12:01 -0700", "Message-Id": "<20170908001204.18174-1-mhalcrow@google.com>", "X-Mailer": "git-send-email 2.14.1.581.gf28d330327-goog", "Sender": "linux-ext4-owner@vger.kernel.org", "Precedence": "bulk", "List-ID": "<linux-ext4.vger.kernel.org>", "X-Mailing-List": "linux-ext4@vger.kernel.org" }, "content": "Currently file systems support fscrypto will return -EPERM when the\nuser attempts to link, rename, or cross-rename between two directories\nthat have incompatible encryption policy contexts. User space tools\nwill fail the operation when receiving this errno. With -EXDEV, user\nspace tools will typically fall back to copy-and-delete instead.\n\nOur original motivation for returning -EPERM was to force users to try\nharder when doing these operations, hopefully making them think more\ncarefully about whether what they're doing is secure. One security\nconcern is that when moving files between unencrypted locations into\nencrypted locations, the data in the unencrypted location will remain\nin the clear on the storage device until the freed blocks are\noverwritten at some arbitrary point in the future (if ever). Moving\nfiles from encrypted locations into unencrypted locations is also\n(perhaps more obviously) problematic.\n\nWhether making things fail will have the intended effect on users is\nup for debate. Meanwhile I've had at least one person tell me their\nuserspace tools are failing and that they would prefer seeing the same\nsort of behavior that they see when (for example) moving files from\none project quota hierarchy to another (ext4 returns -EXDEV).\n\nNote that xfstests generic/398 will require an update with this\nchange.\n\nMichael Halcrow (3):\n ext4 crypto: Return -EXDEV for link, rename, and cross-rename between\n incompat contexts\n F2FS crypto: Return -EXDEV for link, rename, and cross-rename between\n incompat contexts\n UBIFS crypto: Return -EXDEV for link, rename, and cross-rename between\n incompat contexts\n\n fs/ext4/namei.c | 6 +++---\n fs/f2fs/namei.c | 6 +++---\n fs/ubifs/dir.c | 6 +++---\n 3 files changed, 9 insertions(+), 9 deletions(-)" }