Home
last modified time | relevance | path

Searched hist:f061feda6c54ccb02b0f2c09926fb8edd4882fbb (Results 1 – 2 of 2) sorted by relevance

/openbmc/linux/fs/ceph/
H A Dioctl.cdiff f061feda6c54ccb02b0f2c09926fb8edd4882fbb Tue Jul 28 08:58:43 CDT 2020 Jeff Layton <jlayton@kernel.org> ceph: add fscrypt ioctls and ceph.fscrypt.auth vxattr

We gate most of the ioctls on MDS feature support. The exception is the
key removal and status functions that we still want to work if the MDS's
were to (inexplicably) lose the feature.

For the set_policy ioctl, we take Fs caps to ensure that nothing can
create files in the directory while the ioctl is running. That should
be enough to ensure that the "empty_dir" check is reliable.

The vxattr is read-only, added mostly for future debugging purposes.

Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
H A Dxattr.cdiff f061feda6c54ccb02b0f2c09926fb8edd4882fbb Tue Jul 28 08:58:43 CDT 2020 Jeff Layton <jlayton@kernel.org> ceph: add fscrypt ioctls and ceph.fscrypt.auth vxattr

We gate most of the ioctls on MDS feature support. The exception is the
key removal and status functions that we still want to work if the MDS's
were to (inexplicably) lose the feature.

For the set_policy ioctl, we take Fs caps to ensure that nothing can
create files in the directory while the ioctl is running. That should
be enough to ensure that the "empty_dir" check is reliable.

The vxattr is read-only, added mostly for future debugging purposes.

Signed-off-by: Jeff Layton <jlayton@kernel.org>
Reviewed-by: Xiubo Li <xiubli@redhat.com>
Reviewed-and-tested-by: Luís Henriques <lhenriques@suse.de>
Reviewed-by: Milind Changire <mchangir@redhat.com>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>