2006-10-04 13:16:22 +04:00
/**
* eCryptfs : Linux filesystem encryption layer
*
* Copyright ( C ) 1997 - 2004 Erez Zadok
* Copyright ( C ) 2001 - 2004 Stony Brook University
2007-02-12 11:53:46 +03:00
* Copyright ( C ) 2004 - 2007 International Business Machines Corp .
2006-10-04 13:16:22 +04:00
* Author ( s ) : Michael A . Halcrow < mahalcro @ us . ibm . com >
* Michael C . Thompsion < mcthomps @ us . ibm . com >
*
* This program is free software ; you can redistribute it and / or
* modify it under the terms of the GNU General Public License as
* published by the Free Software Foundation ; either version 2 of the
* License , or ( at your option ) any later version .
*
* This program is distributed in the hope that it will be useful , but
* WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the GNU
* General Public License for more details .
*
* You should have received a copy of the GNU General Public License
* along with this program ; if not , write to the Free Software
* Foundation , Inc . , 59 Temple Place - Suite 330 , Boston , MA
* 02111 - 1307 , USA .
*/
# include <linux/file.h>
# include <linux/vmalloc.h>
# include <linux/pagemap.h>
# include <linux/dcache.h>
# include <linux/namei.h>
# include <linux/mount.h>
# include <linux/crypto.h>
2006-12-08 13:36:31 +03:00
# include <linux/fs_stack.h>
2008-07-24 08:30:07 +04:00
# include <asm/unaligned.h>
2006-10-04 13:16:22 +04:00
# include "ecryptfs_kernel.h"
static struct dentry * lock_parent ( struct dentry * dentry )
{
struct dentry * dir ;
2008-05-13 01:02:04 +04:00
dir = dget_parent ( dentry ) ;
2007-03-08 07:41:30 +03:00
mutex_lock_nested ( & ( dir - > d_inode - > i_mutex ) , I_MUTEX_PARENT ) ;
2006-10-04 13:16:22 +04:00
return dir ;
}
static void unlock_dir ( struct dentry * dir )
{
mutex_unlock ( & dir - > d_inode - > i_mutex ) ;
dput ( dir ) ;
}
/**
* ecryptfs_create_underlying_file
* @ lower_dir_inode : inode of the parent in the lower fs of the new file
2009-01-07 01:42:05 +03:00
* @ dentry : New file ' s dentry
2006-10-04 13:16:22 +04:00
* @ mode : The mode of the new file
* @ nd : nameidata of ecryptfs ' parent ' s dentry & vfsmount
*
* Creates the file in the lower file system .
*
* Returns zero on success ; non - zero on error condition
*/
static int
ecryptfs_create_underlying_file ( struct inode * lower_dir_inode ,
struct dentry * dentry , int mode ,
struct nameidata * nd )
{
struct dentry * lower_dentry = ecryptfs_dentry_to_lower ( dentry ) ;
struct vfsmount * lower_mnt = ecryptfs_dentry_to_lower_mnt ( dentry ) ;
struct dentry * dentry_save ;
struct vfsmount * vfsmount_save ;
int rc ;
2008-02-15 06:34:32 +03:00
dentry_save = nd - > path . dentry ;
vfsmount_save = nd - > path . mnt ;
nd - > path . dentry = lower_dentry ;
nd - > path . mnt = lower_mnt ;
2006-10-04 13:16:22 +04:00
rc = vfs_create ( lower_dir_inode , lower_dentry , mode , nd ) ;
2008-02-15 06:34:32 +03:00
nd - > path . dentry = dentry_save ;
nd - > path . mnt = vfsmount_save ;
2006-10-04 13:16:22 +04:00
return rc ;
}
/**
* ecryptfs_do_create
* @ directory_inode : inode of the new file ' s dentry ' s parent in ecryptfs
* @ ecryptfs_dentry : New file ' s dentry in ecryptfs
* @ mode : The mode of the new file
* @ nd : nameidata of ecryptfs ' parent ' s dentry & vfsmount
*
* Creates the underlying file and the eCryptfs inode which will link to
* it . It will also update the eCryptfs directory inode to mimic the
* stat of the lower directory inode .
*
* Returns zero on success ; non - zero on error condition
*/
static int
ecryptfs_do_create ( struct inode * directory_inode ,
struct dentry * ecryptfs_dentry , int mode ,
struct nameidata * nd )
{
int rc ;
struct dentry * lower_dentry ;
struct dentry * lower_dir_dentry ;
lower_dentry = ecryptfs_dentry_to_lower ( ecryptfs_dentry ) ;
lower_dir_dentry = lock_parent ( lower_dentry ) ;
2008-04-29 12:03:09 +04:00
if ( IS_ERR ( lower_dir_dentry ) ) {
2006-10-04 13:16:22 +04:00
ecryptfs_printk ( KERN_ERR , " Error locking directory of "
" dentry \n " ) ;
rc = PTR_ERR ( lower_dir_dentry ) ;
goto out ;
}
rc = ecryptfs_create_underlying_file ( lower_dir_dentry - > d_inode ,
ecryptfs_dentry , mode , nd ) ;
2007-10-16 12:28:09 +04:00
if ( rc ) {
2008-01-09 02:33:02 +03:00
printk ( KERN_ERR " %s: Failure to create dentry in lower fs; "
2008-04-29 11:59:48 +04:00
" rc = [%d] \n " , __func__ , rc ) ;
2008-01-09 02:33:02 +03:00
goto out_lock ;
2006-10-04 13:16:22 +04:00
}
rc = ecryptfs_interpose ( lower_dentry , ecryptfs_dentry ,
directory_inode - > i_sb , 0 ) ;
if ( rc ) {
ecryptfs_printk ( KERN_ERR , " Failure in ecryptfs_interpose \n " ) ;
goto out_lock ;
}
2006-12-08 13:36:31 +03:00
fsstack_copy_attr_times ( directory_inode , lower_dir_dentry - > d_inode ) ;
fsstack_copy_inode_size ( directory_inode , lower_dir_dentry - > d_inode ) ;
2006-10-04 13:16:22 +04:00
out_lock :
unlock_dir ( lower_dir_dentry ) ;
out :
return rc ;
}
/**
* grow_file
2007-10-16 12:28:10 +04:00
* @ ecryptfs_dentry : the eCryptfs dentry
2006-10-04 13:16:22 +04:00
*
* This is the code which will grow the file to its correct size .
*/
2007-10-16 12:28:10 +04:00
static int grow_file ( struct dentry * ecryptfs_dentry )
2006-10-04 13:16:22 +04:00
{
2007-10-16 12:28:10 +04:00
struct inode * ecryptfs_inode = ecryptfs_dentry - > d_inode ;
2006-10-04 13:16:22 +04:00
struct file fake_file ;
struct ecryptfs_file_info tmp_file_info ;
2007-10-16 12:28:10 +04:00
char zero_virt [ ] = { 0x00 } ;
int rc = 0 ;
2006-10-04 13:16:22 +04:00
memset ( & fake_file , 0 , sizeof ( fake_file ) ) ;
2006-12-08 13:36:48 +03:00
fake_file . f_path . dentry = ecryptfs_dentry ;
2006-10-04 13:16:22 +04:00
memset ( & tmp_file_info , 0 , sizeof ( tmp_file_info ) ) ;
ecryptfs_set_file_private ( & fake_file , & tmp_file_info ) ;
2007-10-16 12:28:10 +04:00
ecryptfs_set_file_lower (
& fake_file ,
ecryptfs_inode_to_private ( ecryptfs_inode ) - > lower_file ) ;
rc = ecryptfs_write ( & fake_file , zero_virt , 0 , 1 ) ;
i_size_write ( ecryptfs_inode , 0 ) ;
rc = ecryptfs_write_inode_size_to_metadata ( ecryptfs_inode ) ;
ecryptfs_inode_to_private ( ecryptfs_inode ) - > crypt_stat . flags | =
ECRYPTFS_NEW_FILE ;
2006-10-04 13:16:22 +04:00
return rc ;
}
/**
* ecryptfs_initialize_file
*
* Cause the file to be changed from a basic empty file to an ecryptfs
* file with a header and first data page .
*
* Returns zero on success
*/
static int ecryptfs_initialize_file ( struct dentry * ecryptfs_dentry )
{
2007-10-16 12:28:10 +04:00
struct ecryptfs_crypt_stat * crypt_stat =
& ecryptfs_inode_to_private ( ecryptfs_dentry - > d_inode ) - > crypt_stat ;
2006-10-04 13:16:22 +04:00
int rc = 0 ;
if ( S_ISDIR ( ecryptfs_dentry - > d_inode - > i_mode ) ) {
ecryptfs_printk ( KERN_DEBUG , " This is a directory \n " ) ;
2007-02-12 11:53:49 +03:00
crypt_stat - > flags & = ~ ( ECRYPTFS_ENCRYPTED ) ;
2007-10-16 12:28:10 +04:00
goto out ;
2006-10-04 13:16:22 +04:00
}
2007-02-12 11:53:49 +03:00
crypt_stat - > flags | = ECRYPTFS_NEW_FILE ;
2006-10-04 13:16:22 +04:00
ecryptfs_printk ( KERN_DEBUG , " Initializing crypto context \n " ) ;
rc = ecryptfs_new_file_context ( ecryptfs_dentry ) ;
if ( rc ) {
2007-10-16 12:28:10 +04:00
ecryptfs_printk ( KERN_ERR , " Error creating new file "
" context; rc = [%d] \n " , rc ) ;
goto out ;
2006-10-04 13:16:22 +04:00
}
2008-07-24 08:30:08 +04:00
if ( ! ecryptfs_inode_to_private ( ecryptfs_dentry - > d_inode ) - > lower_file ) {
rc = ecryptfs_init_persistent_file ( ecryptfs_dentry ) ;
if ( rc ) {
printk ( KERN_ERR " %s: Error attempting to initialize "
" the persistent file for the dentry with name "
" [%s]; rc = [%d] \n " , __func__ ,
ecryptfs_dentry - > d_name . name , rc ) ;
goto out ;
}
}
2007-10-16 12:28:10 +04:00
rc = ecryptfs_write_metadata ( ecryptfs_dentry ) ;
2006-10-04 13:16:22 +04:00
if ( rc ) {
2007-10-16 12:28:10 +04:00
printk ( KERN_ERR " Error writing headers; rc = [%d] \n " , rc ) ;
goto out ;
2006-10-04 13:16:22 +04:00
}
2007-10-16 12:28:10 +04:00
rc = grow_file ( ecryptfs_dentry ) ;
2007-10-16 12:28:06 +04:00
if ( rc )
2007-10-16 12:28:10 +04:00
printk ( KERN_ERR " Error growing file; rc = [%d] \n " , rc ) ;
2006-10-04 13:16:22 +04:00
out :
return rc ;
}
/**
* ecryptfs_create
* @ dir : The inode of the directory in which to create the file .
* @ dentry : The eCryptfs dentry
* @ mode : The mode of the new file .
* @ nd : nameidata
*
* Creates a new file .
*
* Returns zero on success ; non - zero on error condition
*/
static int
ecryptfs_create ( struct inode * directory_inode , struct dentry * ecryptfs_dentry ,
int mode , struct nameidata * nd )
{
int rc ;
2009-01-07 01:42:00 +03:00
/* ecryptfs_do_create() calls ecryptfs_interpose() */
2006-10-04 13:16:22 +04:00
rc = ecryptfs_do_create ( directory_inode , ecryptfs_dentry , mode , nd ) ;
if ( unlikely ( rc ) ) {
ecryptfs_printk ( KERN_WARNING , " Failed to create file in "
" lower filesystem \n " ) ;
goto out ;
}
/* At this point, a file exists on "disk"; we need to make sure
* that this on disk file is prepared to be an ecryptfs file */
rc = ecryptfs_initialize_file ( ecryptfs_dentry ) ;
out :
return rc ;
}
/**
2009-01-07 01:42:00 +03:00
* ecryptfs_lookup_and_interpose_lower - Perform a lookup
2006-10-04 13:16:22 +04:00
*/
2009-01-07 01:42:00 +03:00
int ecryptfs_lookup_and_interpose_lower ( struct dentry * ecryptfs_dentry ,
struct dentry * lower_dentry ,
struct inode * ecryptfs_dir_inode ,
struct nameidata * ecryptfs_nd )
2006-10-04 13:16:22 +04:00
{
struct dentry * lower_dir_dentry ;
struct vfsmount * lower_mnt ;
2009-01-07 01:42:00 +03:00
struct inode * lower_inode ;
2007-02-12 11:53:47 +03:00
struct ecryptfs_mount_crypt_stat * mount_crypt_stat ;
2009-03-20 10:23:57 +03:00
struct ecryptfs_crypt_stat * crypt_stat ;
2006-10-04 13:16:22 +04:00
char * page_virt = NULL ;
u64 file_size ;
2009-01-07 01:42:00 +03:00
int rc = 0 ;
2006-10-04 13:16:22 +04:00
2009-01-07 01:42:00 +03:00
lower_dir_dentry = lower_dentry - > d_parent ;
lower_mnt = mntget ( ecryptfs_dentry_to_lower_mnt (
ecryptfs_dentry - > d_parent ) ) ;
2006-10-04 13:16:22 +04:00
lower_inode = lower_dentry - > d_inode ;
2009-01-07 01:42:00 +03:00
fsstack_copy_attr_atime ( ecryptfs_dir_inode , lower_dir_dentry - > d_inode ) ;
2006-10-04 13:16:22 +04:00
BUG_ON ( ! atomic_read ( & lower_dentry - > d_count ) ) ;
2009-01-07 01:42:00 +03:00
ecryptfs_set_dentry_private ( ecryptfs_dentry ,
2006-10-04 13:16:22 +04:00
kmem_cache_alloc ( ecryptfs_dentry_info_cache ,
2006-12-07 07:33:17 +03:00
GFP_KERNEL ) ) ;
2009-01-07 01:42:00 +03:00
if ( ! ecryptfs_dentry_to_private ( ecryptfs_dentry ) ) {
2006-10-04 13:16:22 +04:00
rc = - ENOMEM ;
2009-01-07 01:42:00 +03:00
printk ( KERN_ERR " %s: Out of memory whilst attempting "
" to allocate ecryptfs_dentry_info struct \n " ,
__func__ ) ;
2006-10-04 13:16:22 +04:00
goto out_dput ;
}
2009-01-07 01:42:00 +03:00
ecryptfs_set_dentry_lower ( ecryptfs_dentry , lower_dentry ) ;
ecryptfs_set_dentry_lower_mnt ( ecryptfs_dentry , lower_mnt ) ;
2006-10-04 13:16:22 +04:00
if ( ! lower_dentry - > d_inode ) {
/* We want to add because we couldn't find in lower */
2009-01-07 01:42:00 +03:00
d_add ( ecryptfs_dentry , NULL ) ;
2006-10-04 13:16:22 +04:00
goto out ;
}
2009-01-07 01:42:00 +03:00
rc = ecryptfs_interpose ( lower_dentry , ecryptfs_dentry ,
ecryptfs_dir_inode - > i_sb , 1 ) ;
2006-10-04 13:16:22 +04:00
if ( rc ) {
2009-01-07 01:42:00 +03:00
printk ( KERN_ERR " %s: Error interposing; rc = [%d] \n " ,
__func__ , rc ) ;
2008-07-24 08:30:08 +04:00
goto out ;
2006-10-04 13:16:22 +04:00
}
2009-01-07 01:42:00 +03:00
if ( S_ISDIR ( lower_inode - > i_mode ) )
2006-10-04 13:16:22 +04:00
goto out ;
2009-01-07 01:42:00 +03:00
if ( S_ISLNK ( lower_inode - > i_mode ) )
2006-10-04 13:16:22 +04:00
goto out ;
2009-01-07 01:42:00 +03:00
if ( special_file ( lower_inode - > i_mode ) )
2007-08-11 00:00:51 +04:00
goto out ;
2009-01-07 01:42:00 +03:00
if ( ! ecryptfs_nd )
2006-10-04 13:16:22 +04:00
goto out ;
/* Released in this function */
2009-01-07 01:42:00 +03:00
page_virt = kmem_cache_zalloc ( ecryptfs_header_cache_2 , GFP_USER ) ;
2006-10-04 13:16:22 +04:00
if ( ! page_virt ) {
2009-01-07 01:42:00 +03:00
printk ( KERN_ERR " %s: Cannot kmem_cache_zalloc() a page \n " ,
__func__ ) ;
2006-10-04 13:16:22 +04:00
rc = - ENOMEM ;
2008-07-24 08:30:08 +04:00
goto out ;
2006-10-04 13:16:22 +04:00
}
2009-01-07 01:42:00 +03:00
if ( ! ecryptfs_inode_to_private ( ecryptfs_dentry - > d_inode ) - > lower_file ) {
rc = ecryptfs_init_persistent_file ( ecryptfs_dentry ) ;
2008-07-24 08:30:08 +04:00
if ( rc ) {
printk ( KERN_ERR " %s: Error attempting to initialize "
" the persistent file for the dentry with name "
" [%s]; rc = [%d] \n " , __func__ ,
2009-01-07 01:42:00 +03:00
ecryptfs_dentry - > d_name . name , rc ) ;
goto out_free_kmem ;
2008-07-24 08:30:08 +04:00
}
}
2009-03-20 10:23:57 +03:00
crypt_stat = & ecryptfs_inode_to_private (
ecryptfs_dentry - > d_inode ) - > crypt_stat ;
/* TODO: lock for crypt_stat comparison */
if ( ! ( crypt_stat - > flags & ECRYPTFS_POLICY_APPLIED ) )
ecryptfs_set_default_sizes ( crypt_stat ) ;
2007-10-16 12:28:10 +04:00
rc = ecryptfs_read_and_validate_header_region ( page_virt ,
2009-01-07 01:42:00 +03:00
ecryptfs_dentry - > d_inode ) ;
2006-10-04 13:16:22 +04:00
if ( rc ) {
2009-01-07 01:42:00 +03:00
rc = ecryptfs_read_and_validate_xattr_region ( page_virt ,
ecryptfs_dentry ) ;
2007-02-12 11:53:46 +03:00
if ( rc ) {
rc = 0 ;
2009-01-07 01:42:00 +03:00
goto out_free_kmem ;
2006-10-04 13:16:22 +04:00
}
2007-02-12 11:53:46 +03:00
crypt_stat - > flags | = ECRYPTFS_METADATA_IN_XATTR ;
2006-10-04 13:16:22 +04:00
}
2007-02-12 11:53:47 +03:00
mount_crypt_stat = & ecryptfs_superblock_to_private (
2009-01-07 01:42:00 +03:00
ecryptfs_dentry - > d_sb ) - > mount_crypt_stat ;
2007-02-12 11:53:47 +03:00
if ( mount_crypt_stat - > flags & ECRYPTFS_ENCRYPTED_VIEW_ENABLED ) {
if ( crypt_stat - > flags & ECRYPTFS_METADATA_IN_XATTR )
2008-02-06 12:38:32 +03:00
file_size = ( crypt_stat - > num_header_bytes_at_front
2007-02-12 11:53:47 +03:00
+ i_size_read ( lower_dentry - > d_inode ) ) ;
else
file_size = i_size_read ( lower_dentry - > d_inode ) ;
} else {
2008-07-24 08:30:07 +04:00
file_size = get_unaligned_be64 ( page_virt ) ;
2007-02-12 11:53:47 +03:00
}
2009-01-07 01:42:00 +03:00
i_size_write ( ecryptfs_dentry - > d_inode , ( loff_t ) file_size ) ;
out_free_kmem :
2006-10-04 13:16:22 +04:00
kmem_cache_free ( ecryptfs_header_cache_2 , page_virt ) ;
goto out ;
out_dput :
dput ( lower_dentry ) ;
2009-01-07 01:42:00 +03:00
d_drop ( ecryptfs_dentry ) ;
out :
return rc ;
}
/**
* ecryptfs_lookup
* @ ecryptfs_dir_inode : The eCryptfs directory inode
* @ ecryptfs_dentry : The eCryptfs dentry that we are looking up
* @ ecryptfs_nd : nameidata ; may be NULL
*
* Find a file on disk . If the file does not exist , then we ' ll add it to the
* dentry cache and continue on to read it from the disk .
*/
static struct dentry * ecryptfs_lookup ( struct inode * ecryptfs_dir_inode ,
struct dentry * ecryptfs_dentry ,
struct nameidata * ecryptfs_nd )
{
char * encrypted_and_encoded_name = NULL ;
2009-01-07 01:42:03 +03:00
size_t encrypted_and_encoded_name_size ;
2009-01-07 01:42:00 +03:00
struct ecryptfs_mount_crypt_stat * mount_crypt_stat = NULL ;
struct dentry * lower_dir_dentry , * lower_dentry ;
int rc = 0 ;
ecryptfs_dentry - > d_op = & ecryptfs_dops ;
if ( ( ecryptfs_dentry - > d_name . len = = 1
& & ! strcmp ( ecryptfs_dentry - > d_name . name , " . " ) )
| | ( ecryptfs_dentry - > d_name . len = = 2
& & ! strcmp ( ecryptfs_dentry - > d_name . name , " .. " ) ) ) {
goto out_d_drop ;
}
lower_dir_dentry = ecryptfs_dentry_to_lower ( ecryptfs_dentry - > d_parent ) ;
2009-04-23 01:27:12 +04:00
mutex_lock ( & lower_dir_dentry - > d_inode - > i_mutex ) ;
2009-01-07 01:42:00 +03:00
lower_dentry = lookup_one_len ( ecryptfs_dentry - > d_name . name ,
lower_dir_dentry ,
ecryptfs_dentry - > d_name . len ) ;
2009-04-23 01:27:12 +04:00
mutex_unlock ( & lower_dir_dentry - > d_inode - > i_mutex ) ;
2009-01-07 01:42:00 +03:00
if ( IS_ERR ( lower_dentry ) ) {
rc = PTR_ERR ( lower_dentry ) ;
printk ( KERN_ERR " %s: lookup_one_len() returned [%d] on "
" lower_dentry = [%s] \n " , __func__ , rc ,
ecryptfs_dentry - > d_name . name ) ;
goto out_d_drop ;
}
if ( lower_dentry - > d_inode )
goto lookup_and_interpose ;
2009-03-20 10:23:57 +03:00
mount_crypt_stat = & ecryptfs_superblock_to_private (
ecryptfs_dentry - > d_sb ) - > mount_crypt_stat ;
if ( ! ( mount_crypt_stat
& & ( mount_crypt_stat - > flags & ECRYPTFS_GLOBAL_ENCRYPT_FILENAMES ) ) )
2009-01-07 01:42:00 +03:00
goto lookup_and_interpose ;
dput ( lower_dentry ) ;
rc = ecryptfs_encrypt_and_encode_filename (
& encrypted_and_encoded_name , & encrypted_and_encoded_name_size ,
2009-03-20 10:23:57 +03:00
NULL , mount_crypt_stat , ecryptfs_dentry - > d_name . name ,
2009-01-07 01:42:00 +03:00
ecryptfs_dentry - > d_name . len ) ;
if ( rc ) {
printk ( KERN_ERR " %s: Error attempting to encrypt and encode "
" filename; rc = [%d] \n " , __func__ , rc ) ;
goto out_d_drop ;
}
2009-04-23 01:27:12 +04:00
mutex_lock ( & lower_dir_dentry - > d_inode - > i_mutex ) ;
2009-01-07 01:42:00 +03:00
lower_dentry = lookup_one_len ( encrypted_and_encoded_name ,
lower_dir_dentry ,
encrypted_and_encoded_name_size - 1 ) ;
2009-04-23 01:27:12 +04:00
mutex_unlock ( & lower_dir_dentry - > d_inode - > i_mutex ) ;
2009-01-07 01:42:00 +03:00
if ( IS_ERR ( lower_dentry ) ) {
rc = PTR_ERR ( lower_dentry ) ;
printk ( KERN_ERR " %s: lookup_one_len() returned [%d] on "
" lower_dentry = [%s] \n " , __func__ , rc ,
encrypted_and_encoded_name ) ;
goto out_d_drop ;
}
lookup_and_interpose :
rc = ecryptfs_lookup_and_interpose_lower ( ecryptfs_dentry , lower_dentry ,
2009-03-20 10:23:57 +03:00
ecryptfs_dir_inode ,
2009-01-07 01:42:00 +03:00
ecryptfs_nd ) ;
goto out ;
out_d_drop :
d_drop ( ecryptfs_dentry ) ;
2006-10-04 13:16:22 +04:00
out :
2009-01-07 01:42:00 +03:00
kfree ( encrypted_and_encoded_name ) ;
2006-10-04 13:16:22 +04:00
return ERR_PTR ( rc ) ;
}
static int ecryptfs_link ( struct dentry * old_dentry , struct inode * dir ,
struct dentry * new_dentry )
{
struct dentry * lower_old_dentry ;
struct dentry * lower_new_dentry ;
struct dentry * lower_dir_dentry ;
u64 file_size_save ;
int rc ;
file_size_save = i_size_read ( old_dentry - > d_inode ) ;
lower_old_dentry = ecryptfs_dentry_to_lower ( old_dentry ) ;
lower_new_dentry = ecryptfs_dentry_to_lower ( new_dentry ) ;
dget ( lower_old_dentry ) ;
dget ( lower_new_dentry ) ;
lower_dir_dentry = lock_parent ( lower_new_dentry ) ;
rc = vfs_link ( lower_old_dentry , lower_dir_dentry - > d_inode ,
lower_new_dentry ) ;
if ( rc | | ! lower_new_dentry - > d_inode )
goto out_lock ;
rc = ecryptfs_interpose ( lower_new_dentry , new_dentry , dir - > i_sb , 0 ) ;
if ( rc )
goto out_lock ;
2006-12-08 13:36:31 +03:00
fsstack_copy_attr_times ( dir , lower_new_dentry - > d_inode ) ;
fsstack_copy_inode_size ( dir , lower_new_dentry - > d_inode ) ;
2006-10-04 13:16:22 +04:00
old_dentry - > d_inode - > i_nlink =
ecryptfs_inode_to_lower ( old_dentry - > d_inode ) - > i_nlink ;
i_size_write ( new_dentry - > d_inode , file_size_save ) ;
out_lock :
unlock_dir ( lower_dir_dentry ) ;
dput ( lower_new_dentry ) ;
dput ( lower_old_dentry ) ;
return rc ;
}
static int ecryptfs_unlink ( struct inode * dir , struct dentry * dentry )
{
int rc = 0 ;
struct dentry * lower_dentry = ecryptfs_dentry_to_lower ( dentry ) ;
struct inode * lower_dir_inode = ecryptfs_inode_to_lower ( dir ) ;
2008-05-13 01:02:04 +04:00
struct dentry * lower_dir_dentry ;
2006-10-04 13:16:22 +04:00
2009-09-22 21:52:17 +04:00
dget ( lower_dentry ) ;
2008-05-13 01:02:04 +04:00
lower_dir_dentry = lock_parent ( lower_dentry ) ;
2006-10-04 13:16:22 +04:00
rc = vfs_unlink ( lower_dir_inode , lower_dentry ) ;
if ( rc ) {
2006-11-16 12:19:30 +03:00
printk ( KERN_ERR " Error in vfs_unlink; rc = [%d] \n " , rc ) ;
2006-10-04 13:16:22 +04:00
goto out_unlock ;
}
2006-12-08 13:36:31 +03:00
fsstack_copy_attr_times ( dir , lower_dir_inode ) ;
2006-10-04 13:16:22 +04:00
dentry - > d_inode - > i_nlink =
ecryptfs_inode_to_lower ( dentry - > d_inode ) - > i_nlink ;
dentry - > d_inode - > i_ctime = dir - > i_ctime ;
2008-01-09 02:33:02 +03:00
d_drop ( dentry ) ;
2006-10-04 13:16:22 +04:00
out_unlock :
2008-05-13 01:02:04 +04:00
unlock_dir ( lower_dir_dentry ) ;
2009-09-22 21:52:17 +04:00
dput ( lower_dentry ) ;
2006-10-04 13:16:22 +04:00
return rc ;
}
static int ecryptfs_symlink ( struct inode * dir , struct dentry * dentry ,
const char * symname )
{
int rc ;
struct dentry * lower_dentry ;
struct dentry * lower_dir_dentry ;
char * encoded_symname ;
2009-01-07 01:42:00 +03:00
size_t encoded_symlen ;
struct ecryptfs_mount_crypt_stat * mount_crypt_stat = NULL ;
2006-10-04 13:16:22 +04:00
lower_dentry = ecryptfs_dentry_to_lower ( dentry ) ;
dget ( lower_dentry ) ;
lower_dir_dentry = lock_parent ( lower_dentry ) ;
2009-01-07 01:42:00 +03:00
mount_crypt_stat = & ecryptfs_superblock_to_private (
dir - > i_sb ) - > mount_crypt_stat ;
rc = ecryptfs_encrypt_and_encode_filename ( & encoded_symname ,
& encoded_symlen ,
NULL ,
mount_crypt_stat , symname ,
strlen ( symname ) ) ;
if ( rc )
2006-10-04 13:16:22 +04:00
goto out_lock ;
rc = vfs_symlink ( lower_dir_dentry - > d_inode , lower_dentry ,
2008-06-24 18:50:16 +04:00
encoded_symname ) ;
2006-10-04 13:16:22 +04:00
kfree ( encoded_symname ) ;
if ( rc | | ! lower_dentry - > d_inode )
goto out_lock ;
rc = ecryptfs_interpose ( lower_dentry , dentry , dir - > i_sb , 0 ) ;
if ( rc )
goto out_lock ;
2006-12-08 13:36:31 +03:00
fsstack_copy_attr_times ( dir , lower_dir_dentry - > d_inode ) ;
fsstack_copy_inode_size ( dir , lower_dir_dentry - > d_inode ) ;
2006-10-04 13:16:22 +04:00
out_lock :
unlock_dir ( lower_dir_dentry ) ;
dput ( lower_dentry ) ;
if ( ! dentry - > d_inode )
d_drop ( dentry ) ;
return rc ;
}
static int ecryptfs_mkdir ( struct inode * dir , struct dentry * dentry , int mode )
{
int rc ;
struct dentry * lower_dentry ;
struct dentry * lower_dir_dentry ;
lower_dentry = ecryptfs_dentry_to_lower ( dentry ) ;
lower_dir_dentry = lock_parent ( lower_dentry ) ;
rc = vfs_mkdir ( lower_dir_dentry - > d_inode , lower_dentry , mode ) ;
if ( rc | | ! lower_dentry - > d_inode )
goto out ;
rc = ecryptfs_interpose ( lower_dentry , dentry , dir - > i_sb , 0 ) ;
if ( rc )
goto out ;
2006-12-08 13:36:31 +03:00
fsstack_copy_attr_times ( dir , lower_dir_dentry - > d_inode ) ;
fsstack_copy_inode_size ( dir , lower_dir_dentry - > d_inode ) ;
2006-10-04 13:16:22 +04:00
dir - > i_nlink = lower_dir_dentry - > d_inode - > i_nlink ;
out :
unlock_dir ( lower_dir_dentry ) ;
if ( ! dentry - > d_inode )
d_drop ( dentry ) ;
return rc ;
}
static int ecryptfs_rmdir ( struct inode * dir , struct dentry * dentry )
{
struct dentry * lower_dentry ;
struct dentry * lower_dir_dentry ;
2006-10-31 09:07:20 +03:00
int rc ;
2006-10-04 13:16:22 +04:00
lower_dentry = ecryptfs_dentry_to_lower ( dentry ) ;
2006-10-31 09:07:20 +03:00
dget ( dentry ) ;
2006-10-04 13:16:22 +04:00
lower_dir_dentry = lock_parent ( lower_dentry ) ;
2006-10-31 09:07:20 +03:00
dget ( lower_dentry ) ;
2006-10-04 13:16:22 +04:00
rc = vfs_rmdir ( lower_dir_dentry - > d_inode , lower_dentry ) ;
2006-10-31 09:07:20 +03:00
dput ( lower_dentry ) ;
if ( ! rc )
d_delete ( lower_dentry ) ;
2006-12-08 13:36:31 +03:00
fsstack_copy_attr_times ( dir , lower_dir_dentry - > d_inode ) ;
2006-10-04 13:16:22 +04:00
dir - > i_nlink = lower_dir_dentry - > d_inode - > i_nlink ;
unlock_dir ( lower_dir_dentry ) ;
if ( ! rc )
d_drop ( dentry ) ;
2006-10-31 09:07:20 +03:00
dput ( dentry ) ;
2006-10-04 13:16:22 +04:00
return rc ;
}
static int
ecryptfs_mknod ( struct inode * dir , struct dentry * dentry , int mode , dev_t dev )
{
int rc ;
struct dentry * lower_dentry ;
struct dentry * lower_dir_dentry ;
lower_dentry = ecryptfs_dentry_to_lower ( dentry ) ;
lower_dir_dentry = lock_parent ( lower_dentry ) ;
rc = vfs_mknod ( lower_dir_dentry - > d_inode , lower_dentry , mode , dev ) ;
if ( rc | | ! lower_dentry - > d_inode )
goto out ;
2008-07-24 08:30:08 +04:00
rc = ecryptfs_interpose ( lower_dentry , dentry , dir - > i_sb , 0 ) ;
2006-10-04 13:16:22 +04:00
if ( rc )
goto out ;
2006-12-08 13:36:31 +03:00
fsstack_copy_attr_times ( dir , lower_dir_dentry - > d_inode ) ;
fsstack_copy_inode_size ( dir , lower_dir_dentry - > d_inode ) ;
2006-10-04 13:16:22 +04:00
out :
unlock_dir ( lower_dir_dentry ) ;
if ( ! dentry - > d_inode )
d_drop ( dentry ) ;
return rc ;
}
static int
ecryptfs_rename ( struct inode * old_dir , struct dentry * old_dentry ,
struct inode * new_dir , struct dentry * new_dentry )
{
int rc ;
struct dentry * lower_old_dentry ;
struct dentry * lower_new_dentry ;
struct dentry * lower_old_dir_dentry ;
struct dentry * lower_new_dir_dentry ;
2009-12-06 05:17:09 +03:00
struct dentry * trap = NULL ;
2006-10-04 13:16:22 +04:00
lower_old_dentry = ecryptfs_dentry_to_lower ( old_dentry ) ;
lower_new_dentry = ecryptfs_dentry_to_lower ( new_dentry ) ;
dget ( lower_old_dentry ) ;
dget ( lower_new_dentry ) ;
lower_old_dir_dentry = dget_parent ( lower_old_dentry ) ;
lower_new_dir_dentry = dget_parent ( lower_new_dentry ) ;
2009-12-06 05:17:09 +03:00
trap = lock_rename ( lower_old_dir_dentry , lower_new_dir_dentry ) ;
/* source should not be ancestor of target */
if ( trap = = lower_old_dentry ) {
rc = - EINVAL ;
goto out_lock ;
}
/* target should not be ancestor of source */
if ( trap = = lower_new_dentry ) {
rc = - ENOTEMPTY ;
goto out_lock ;
}
2006-10-04 13:16:22 +04:00
rc = vfs_rename ( lower_old_dir_dentry - > d_inode , lower_old_dentry ,
lower_new_dir_dentry - > d_inode , lower_new_dentry ) ;
if ( rc )
goto out_lock ;
2009-12-03 03:51:54 +03:00
fsstack_copy_attr_all ( new_dir , lower_new_dir_dentry - > d_inode ) ;
2006-10-04 13:16:22 +04:00
if ( new_dir ! = old_dir )
2009-12-03 03:51:54 +03:00
fsstack_copy_attr_all ( old_dir , lower_old_dir_dentry - > d_inode ) ;
2006-10-04 13:16:22 +04:00
out_lock :
unlock_rename ( lower_old_dir_dentry , lower_new_dir_dentry ) ;
2006-11-16 12:19:16 +03:00
dput ( lower_new_dentry - > d_parent ) ;
dput ( lower_old_dentry - > d_parent ) ;
2006-10-04 13:16:22 +04:00
dput ( lower_new_dentry ) ;
dput ( lower_old_dentry ) ;
return rc ;
}
static int
2009-01-07 01:42:00 +03:00
ecryptfs_readlink ( struct dentry * dentry , char __user * buf , int bufsiz )
2006-10-04 13:16:22 +04:00
{
char * lower_buf ;
2009-04-17 03:35:37 +04:00
size_t lower_bufsiz ;
2009-01-07 01:42:00 +03:00
struct dentry * lower_dentry ;
2009-04-17 03:35:37 +04:00
struct ecryptfs_mount_crypt_stat * mount_crypt_stat ;
2009-01-07 01:42:00 +03:00
char * plaintext_name ;
size_t plaintext_name_size ;
mm_segment_t old_fs ;
int rc ;
2006-10-04 13:16:22 +04:00
lower_dentry = ecryptfs_dentry_to_lower ( dentry ) ;
2008-12-04 18:06:33 +03:00
if ( ! lower_dentry - > d_inode - > i_op - > readlink ) {
2006-10-04 13:16:22 +04:00
rc = - EINVAL ;
goto out ;
}
2009-04-17 03:35:37 +04:00
mount_crypt_stat = & ecryptfs_superblock_to_private (
dentry - > d_sb ) - > mount_crypt_stat ;
/*
* If the lower filename is encrypted , it will result in a significantly
* longer name . If needed , truncate the name after decode and decrypt .
*/
if ( mount_crypt_stat - > flags & ECRYPTFS_GLOBAL_ENCRYPT_FILENAMES )
lower_bufsiz = PATH_MAX ;
else
lower_bufsiz = bufsiz ;
2006-10-04 13:16:22 +04:00
/* Released in this function */
2009-04-17 03:35:37 +04:00
lower_buf = kmalloc ( lower_bufsiz , GFP_KERNEL ) ;
2006-10-04 13:16:22 +04:00
if ( lower_buf = = NULL ) {
2009-01-07 01:42:00 +03:00
printk ( KERN_ERR " %s: Out of memory whilst attempting to "
2009-04-28 08:24:28 +04:00
" kmalloc [%zd] bytes \n " , __func__ , lower_bufsiz ) ;
2006-10-04 13:16:22 +04:00
rc = - ENOMEM ;
goto out ;
}
old_fs = get_fs ( ) ;
set_fs ( get_ds ( ) ) ;
rc = lower_dentry - > d_inode - > i_op - > readlink ( lower_dentry ,
( char __user * ) lower_buf ,
2009-04-17 03:35:37 +04:00
lower_bufsiz ) ;
2006-10-04 13:16:22 +04:00
set_fs ( old_fs ) ;
if ( rc > = 0 ) {
2009-01-07 01:42:00 +03:00
rc = ecryptfs_decode_and_decrypt_filename ( & plaintext_name ,
& plaintext_name_size ,
dentry , lower_buf ,
rc ) ;
if ( rc ) {
printk ( KERN_ERR " %s: Error attempting to decode and "
" decrypt filename; rc = [%d] \n " , __func__ ,
rc ) ;
2006-10-04 13:16:22 +04:00
goto out_free_lower_buf ;
}
2009-04-17 03:35:37 +04:00
/* Check for bufsiz <= 0 done in sys_readlinkat() */
rc = copy_to_user ( buf , plaintext_name ,
2009-04-27 22:31:12 +04:00
min ( ( size_t ) bufsiz , plaintext_name_size ) ) ;
2009-01-07 01:42:00 +03:00
if ( rc )
rc = - EFAULT ;
else
rc = plaintext_name_size ;
kfree ( plaintext_name ) ;
fsstack_copy_attr_atime ( dentry - > d_inode , lower_dentry - > d_inode ) ;
2006-10-04 13:16:22 +04:00
}
out_free_lower_buf :
kfree ( lower_buf ) ;
out :
return rc ;
}
static void * ecryptfs_follow_link ( struct dentry * dentry , struct nameidata * nd )
{
char * buf ;
int len = PAGE_SIZE , rc ;
mm_segment_t old_fs ;
/* Released in ecryptfs_put_link(); only release here on error */
buf = kmalloc ( len , GFP_KERNEL ) ;
if ( ! buf ) {
2010-01-11 21:36:14 +03:00
buf = ERR_PTR ( - ENOMEM ) ;
2006-10-04 13:16:22 +04:00
goto out ;
}
old_fs = get_fs ( ) ;
set_fs ( get_ds ( ) ) ;
rc = dentry - > d_inode - > i_op - > readlink ( dentry , ( char __user * ) buf , len ) ;
set_fs ( old_fs ) ;
2010-01-11 21:36:14 +03:00
if ( rc < 0 ) {
kfree ( buf ) ;
buf = ERR_PTR ( rc ) ;
} else
2008-12-19 23:47:10 +03:00
buf [ rc ] = ' \0 ' ;
2006-10-04 13:16:22 +04:00
out :
2010-01-11 21:36:14 +03:00
nd_set_link ( nd , buf ) ;
return NULL ;
2006-10-04 13:16:22 +04:00
}
static void
ecryptfs_put_link ( struct dentry * dentry , struct nameidata * nd , void * ptr )
{
2010-01-11 21:36:14 +03:00
char * buf = nd_get_link ( nd ) ;
if ( ! IS_ERR ( buf ) ) {
/* Free the char* */
kfree ( buf ) ;
}
2006-10-04 13:16:22 +04:00
}
/**
* upper_size_to_lower_size
* @ crypt_stat : Crypt_stat associated with file
* @ upper_size : Size of the upper file
*
2008-02-06 12:38:32 +03:00
* Calculate the required size of the lower file based on the
2006-10-04 13:16:22 +04:00
* specified size of the upper file . This calculation is based on the
* number of headers in the underlying file and the extent size .
*
* Returns Calculated size of the lower file .
*/
static loff_t
upper_size_to_lower_size ( struct ecryptfs_crypt_stat * crypt_stat ,
loff_t upper_size )
{
loff_t lower_size ;
2008-02-06 12:38:32 +03:00
lower_size = crypt_stat - > num_header_bytes_at_front ;
2006-10-04 13:16:22 +04:00
if ( upper_size ! = 0 ) {
loff_t num_extents ;
num_extents = upper_size > > crypt_stat - > extent_shift ;
if ( upper_size & ~ crypt_stat - > extent_mask )
num_extents + + ;
lower_size + = ( num_extents * crypt_stat - > extent_size ) ;
}
return lower_size ;
}
/**
2009-10-15 01:18:27 +04:00
* truncate_upper
2006-10-04 13:16:22 +04:00
* @ dentry : The ecryptfs layer dentry
2009-10-15 01:18:27 +04:00
* @ ia : Address of the ecryptfs inode ' s attributes
* @ lower_ia : Address of the lower inode ' s attributes
2006-10-04 13:16:22 +04:00
*
* Function to handle truncations modifying the size of the file . Note
* that the file sizes are interpolated . When expanding , we are simply
2009-10-15 01:18:27 +04:00
* writing strings of 0 ' s out . When truncating , we truncate the upper
* inode and update the lower_ia according to the page index
* interpolations . If ATTR_SIZE is set in lower_ia - > ia_valid upon return ,
* the caller must use lower_ia in a call to notify_change ( ) to perform
* the truncation of the lower inode .
2006-10-04 13:16:22 +04:00
*
* Returns zero on success ; non - zero otherwise
*/
2009-10-15 01:18:27 +04:00
static int truncate_upper ( struct dentry * dentry , struct iattr * ia ,
struct iattr * lower_ia )
2006-10-04 13:16:22 +04:00
{
int rc = 0 ;
struct inode * inode = dentry - > d_inode ;
struct dentry * lower_dentry ;
2007-10-16 12:28:10 +04:00
struct file fake_ecryptfs_file ;
2006-10-04 13:16:22 +04:00
struct ecryptfs_crypt_stat * crypt_stat ;
loff_t i_size = i_size_read ( inode ) ;
loff_t lower_size_before_truncate ;
loff_t lower_size_after_truncate ;
2009-10-15 01:18:27 +04:00
if ( unlikely ( ( ia - > ia_size = = i_size ) ) ) {
lower_ia - > ia_valid & = ~ ATTR_SIZE ;
2006-10-04 13:16:22 +04:00
goto out ;
2009-10-15 01:18:27 +04:00
}
2006-10-04 13:16:22 +04:00
crypt_stat = & ecryptfs_inode_to_private ( dentry - > d_inode ) - > crypt_stat ;
/* Set up a fake ecryptfs file, this is used to interface with
* the file in the underlying filesystem so that the
* truncation has an effect there as well . */
memset ( & fake_ecryptfs_file , 0 , sizeof ( fake_ecryptfs_file ) ) ;
2006-12-08 13:36:48 +03:00
fake_ecryptfs_file . f_path . dentry = dentry ;
2006-10-04 13:16:22 +04:00
/* Released at out_free: label */
ecryptfs_set_file_private ( & fake_ecryptfs_file ,
kmem_cache_alloc ( ecryptfs_file_info_cache ,
2006-12-07 07:33:17 +03:00
GFP_KERNEL ) ) ;
2006-10-04 13:16:22 +04:00
if ( unlikely ( ! ecryptfs_file_to_private ( & fake_ecryptfs_file ) ) ) {
rc = - ENOMEM ;
goto out ;
}
lower_dentry = ecryptfs_dentry_to_lower ( dentry ) ;
2007-10-16 12:28:10 +04:00
ecryptfs_set_file_lower (
& fake_ecryptfs_file ,
ecryptfs_inode_to_private ( dentry - > d_inode ) - > lower_file ) ;
2006-10-04 13:16:22 +04:00
/* Switch on growing or shrinking file */
2009-10-15 01:18:27 +04:00
if ( ia - > ia_size > i_size ) {
2007-10-16 12:28:10 +04:00
char zero [ ] = { 0x00 } ;
2009-10-15 01:18:27 +04:00
lower_ia - > ia_valid & = ~ ATTR_SIZE ;
2007-10-16 12:28:10 +04:00
/* Write a single 0 at the last position of the file;
* this triggers code that will fill in 0 ' s throughout
* the intermediate portion of the previous end of the
* file and the new and of the file */
rc = ecryptfs_write ( & fake_ecryptfs_file , zero ,
2009-10-15 01:18:27 +04:00
( ia - > ia_size - 1 ) , 1 ) ;
} else { /* ia->ia_size < i_size_read(inode) */
/* We're chopping off all the pages down to the page
* in which ia - > ia_size is located . Fill in the end of
* that page from ( ia - > ia_size & ~ PAGE_CACHE_MASK ) to
2007-10-16 12:28:10 +04:00
* PAGE_CACHE_SIZE with zeros . */
size_t num_zeros = ( PAGE_CACHE_SIZE
2009-10-15 01:18:27 +04:00
- ( ia - > ia_size & ~ PAGE_CACHE_MASK ) ) ;
2007-10-16 12:28:10 +04:00
2009-04-14 00:29:27 +04:00
if ( ! ( crypt_stat - > flags & ECRYPTFS_ENCRYPTED ) ) {
2009-10-15 01:18:27 +04:00
rc = vmtruncate ( inode , ia - > ia_size ) ;
2009-04-14 00:29:27 +04:00
if ( rc )
goto out_free ;
2009-10-15 01:18:27 +04:00
lower_ia - > ia_size = ia - > ia_size ;
lower_ia - > ia_valid | = ATTR_SIZE ;
2009-04-14 00:29:27 +04:00
goto out_free ;
}
2007-10-16 12:28:10 +04:00
if ( num_zeros ) {
char * zeros_virt ;
zeros_virt = kzalloc ( num_zeros , GFP_KERNEL ) ;
if ( ! zeros_virt ) {
rc = - ENOMEM ;
goto out_free ;
}
rc = ecryptfs_write ( & fake_ecryptfs_file , zeros_virt ,
2009-10-15 01:18:27 +04:00
ia - > ia_size , num_zeros ) ;
2007-10-16 12:28:10 +04:00
kfree ( zeros_virt ) ;
2007-10-16 12:28:06 +04:00
if ( rc ) {
2007-06-28 01:09:44 +04:00
printk ( KERN_ERR " Error attempting to zero out "
" the remainder of the end page on "
" reducing truncate; rc = [%d] \n " , rc ) ;
2007-10-16 12:28:10 +04:00
goto out_free ;
2007-06-28 01:09:44 +04:00
}
}
2009-10-15 01:18:27 +04:00
vmtruncate ( inode , ia - > ia_size ) ;
2007-10-16 12:28:08 +04:00
rc = ecryptfs_write_inode_size_to_metadata ( inode ) ;
2007-02-12 11:53:46 +03:00
if ( rc ) {
printk ( KERN_ERR " Problem with "
" ecryptfs_write_inode_size_to_metadata; "
" rc = [%d] \n " , rc ) ;
2007-10-16 12:28:10 +04:00
goto out_free ;
2007-02-12 11:53:46 +03:00
}
2006-10-04 13:16:22 +04:00
/* We are reducing the size of the ecryptfs file, and need to
* know if we need to reduce the size of the lower file . */
lower_size_before_truncate =
upper_size_to_lower_size ( crypt_stat , i_size ) ;
lower_size_after_truncate =
2009-10-15 01:18:27 +04:00
upper_size_to_lower_size ( crypt_stat , ia - > ia_size ) ;
if ( lower_size_after_truncate < lower_size_before_truncate ) {
lower_ia - > ia_size = lower_size_after_truncate ;
lower_ia - > ia_valid | = ATTR_SIZE ;
} else
lower_ia - > ia_valid & = ~ ATTR_SIZE ;
2006-10-04 13:16:22 +04:00
}
out_free :
if ( ecryptfs_file_to_private ( & fake_ecryptfs_file ) )
kmem_cache_free ( ecryptfs_file_info_cache ,
ecryptfs_file_to_private ( & fake_ecryptfs_file ) ) ;
out :
return rc ;
}
2009-10-15 01:18:27 +04:00
/**
* ecryptfs_truncate
* @ dentry : The ecryptfs layer dentry
* @ new_length : The length to expand the file to
*
* Simple function that handles the truncation of an eCryptfs inode and
* its corresponding lower inode .
*
* Returns zero on success ; non - zero otherwise
*/
int ecryptfs_truncate ( struct dentry * dentry , loff_t new_length )
{
struct iattr ia = { . ia_valid = ATTR_SIZE , . ia_size = new_length } ;
struct iattr lower_ia = { . ia_valid = 0 } ;
int rc ;
rc = truncate_upper ( dentry , & ia , & lower_ia ) ;
if ( ! rc & & lower_ia . ia_valid & ATTR_SIZE ) {
struct dentry * lower_dentry = ecryptfs_dentry_to_lower ( dentry ) ;
mutex_lock ( & lower_dentry - > d_inode - > i_mutex ) ;
rc = notify_change ( lower_dentry , & lower_ia ) ;
mutex_unlock ( & lower_dentry - > d_inode - > i_mutex ) ;
}
return rc ;
}
2006-10-04 13:16:22 +04:00
static int
2008-07-16 05:03:57 +04:00
ecryptfs_permission ( struct inode * inode , int mask )
2006-10-04 13:16:22 +04:00
{
2008-07-22 08:07:17 +04:00
return inode_permission ( ecryptfs_inode_to_lower ( inode ) , mask ) ;
2006-10-04 13:16:22 +04:00
}
/**
* ecryptfs_setattr
* @ dentry : dentry handle to the inode to modify
* @ ia : Structure with flags of what to change and values
*
* Updates the metadata of an inode . If the update is to the size
* i . e . truncation , then ecryptfs_truncate will handle the size modification
* of both the ecryptfs inode and the lower inode .
*
* All other metadata changes will be passed right to the lower filesystem ,
* and we will just update our inode to look like the lower .
*/
static int ecryptfs_setattr ( struct dentry * dentry , struct iattr * ia )
{
int rc = 0 ;
struct dentry * lower_dentry ;
2009-10-15 01:18:27 +04:00
struct iattr lower_ia ;
2006-10-04 13:16:22 +04:00
struct inode * inode ;
struct inode * lower_inode ;
struct ecryptfs_crypt_stat * crypt_stat ;
crypt_stat = & ecryptfs_inode_to_private ( dentry - > d_inode ) - > crypt_stat ;
2007-06-28 01:09:44 +04:00
if ( ! ( crypt_stat - > flags & ECRYPTFS_STRUCT_INITIALIZED ) )
ecryptfs_init_crypt_stat ( crypt_stat ) ;
2006-10-04 13:16:22 +04:00
inode = dentry - > d_inode ;
lower_inode = ecryptfs_inode_to_lower ( inode ) ;
2007-06-28 01:09:44 +04:00
lower_dentry = ecryptfs_dentry_to_lower ( dentry ) ;
mutex_lock ( & crypt_stat - > cs_mutex ) ;
if ( S_ISDIR ( dentry - > d_inode - > i_mode ) )
crypt_stat - > flags & = ~ ( ECRYPTFS_ENCRYPTED ) ;
2007-07-19 12:47:54 +04:00
else if ( S_ISREG ( dentry - > d_inode - > i_mode )
& & ( ! ( crypt_stat - > flags & ECRYPTFS_POLICY_APPLIED )
| | ! ( crypt_stat - > flags & ECRYPTFS_KEY_VALID ) ) ) {
2007-06-28 01:09:44 +04:00
struct ecryptfs_mount_crypt_stat * mount_crypt_stat ;
mount_crypt_stat = & ecryptfs_superblock_to_private (
dentry - > d_sb ) - > mount_crypt_stat ;
2007-10-16 12:28:10 +04:00
rc = ecryptfs_read_metadata ( dentry ) ;
2007-10-16 12:28:06 +04:00
if ( rc ) {
2007-06-28 01:09:44 +04:00
if ( ! ( mount_crypt_stat - > flags
& ECRYPTFS_PLAINTEXT_PASSTHROUGH_ENABLED ) ) {
rc = - EIO ;
2008-02-06 12:38:35 +03:00
printk ( KERN_WARNING " Either the lower file "
2007-06-28 01:09:44 +04:00
" is not in a valid eCryptfs format, "
2008-02-06 12:38:35 +03:00
" or the key could not be retrieved. "
" Plaintext passthrough mode is not "
2007-06-28 01:09:44 +04:00
" enabled; returning -EIO \n " ) ;
mutex_unlock ( & crypt_stat - > cs_mutex ) ;
goto out ;
}
rc = 0 ;
crypt_stat - > flags & = ~ ( ECRYPTFS_ENCRYPTED ) ;
}
}
mutex_unlock ( & crypt_stat - > cs_mutex ) ;
2009-10-15 01:18:27 +04:00
memcpy ( & lower_ia , ia , sizeof ( lower_ia ) ) ;
if ( ia - > ia_valid & ATTR_FILE )
lower_ia . ia_file = ecryptfs_file_to_lower ( ia - > ia_file ) ;
2006-10-04 13:16:22 +04:00
if ( ia - > ia_valid & ATTR_SIZE ) {
2009-10-15 01:18:27 +04:00
rc = truncate_upper ( dentry , ia , & lower_ia ) ;
2006-10-04 13:16:22 +04:00
if ( rc < 0 )
goto out ;
}
2007-10-18 14:05:17 +04:00
/*
* mode change is for clearing setuid / setgid bits . Allow lower fs
* to interpret this in its own way .
*/
2009-10-15 01:18:27 +04:00
if ( lower_ia . ia_valid & ( ATTR_KILL_SUID | ATTR_KILL_SGID ) )
lower_ia . ia_valid & = ~ ATTR_MODE ;
2007-10-18 14:05:17 +04:00
2008-04-29 11:59:48 +04:00
mutex_lock ( & lower_dentry - > d_inode - > i_mutex ) ;
2009-10-15 01:18:27 +04:00
rc = notify_change ( lower_dentry , & lower_ia ) ;
2008-04-29 11:59:48 +04:00
mutex_unlock ( & lower_dentry - > d_inode - > i_mutex ) ;
2006-10-04 13:16:22 +04:00
out :
2009-12-03 03:51:54 +03:00
fsstack_copy_attr_all ( inode , lower_inode ) ;
2006-10-04 13:16:22 +04:00
return rc ;
}
2009-11-04 11:48:01 +03:00
int ecryptfs_getattr ( struct vfsmount * mnt , struct dentry * dentry ,
struct kstat * stat )
{
struct kstat lower_stat ;
int rc ;
rc = vfs_getattr ( ecryptfs_dentry_to_lower_mnt ( dentry ) ,
ecryptfs_dentry_to_lower ( dentry ) , & lower_stat ) ;
if ( ! rc ) {
generic_fillattr ( dentry - > d_inode , stat ) ;
stat - > blocks = lower_stat . blocks ;
}
return rc ;
}
2007-02-12 11:53:46 +03:00
int
2006-10-04 13:16:22 +04:00
ecryptfs_setxattr ( struct dentry * dentry , const char * name , const void * value ,
size_t size , int flags )
{
int rc = 0 ;
struct dentry * lower_dentry ;
lower_dentry = ecryptfs_dentry_to_lower ( dentry ) ;
if ( ! lower_dentry - > d_inode - > i_op - > setxattr ) {
rc = - ENOSYS ;
goto out ;
}
mutex_lock ( & lower_dentry - > d_inode - > i_mutex ) ;
rc = lower_dentry - > d_inode - > i_op - > setxattr ( lower_dentry , name , value ,
size , flags ) ;
mutex_unlock ( & lower_dentry - > d_inode - > i_mutex ) ;
out :
return rc ;
}
2007-10-16 12:28:10 +04:00
ssize_t
ecryptfs_getxattr_lower ( struct dentry * lower_dentry , const char * name ,
void * value , size_t size )
{
int rc = 0 ;
if ( ! lower_dentry - > d_inode - > i_op - > getxattr ) {
rc = - ENOSYS ;
goto out ;
}
mutex_lock ( & lower_dentry - > d_inode - > i_mutex ) ;
rc = lower_dentry - > d_inode - > i_op - > getxattr ( lower_dentry , name , value ,
size ) ;
mutex_unlock ( & lower_dentry - > d_inode - > i_mutex ) ;
out :
return rc ;
}
2008-02-06 12:38:32 +03:00
static ssize_t
2006-10-04 13:16:22 +04:00
ecryptfs_getxattr ( struct dentry * dentry , const char * name , void * value ,
size_t size )
{
2007-10-16 12:28:10 +04:00
return ecryptfs_getxattr_lower ( ecryptfs_dentry_to_lower ( dentry ) , name ,
value , size ) ;
2006-10-04 13:16:22 +04:00
}
static ssize_t
ecryptfs_listxattr ( struct dentry * dentry , char * list , size_t size )
{
int rc = 0 ;
struct dentry * lower_dentry ;
lower_dentry = ecryptfs_dentry_to_lower ( dentry ) ;
if ( ! lower_dentry - > d_inode - > i_op - > listxattr ) {
rc = - ENOSYS ;
goto out ;
}
mutex_lock ( & lower_dentry - > d_inode - > i_mutex ) ;
rc = lower_dentry - > d_inode - > i_op - > listxattr ( lower_dentry , list , size ) ;
mutex_unlock ( & lower_dentry - > d_inode - > i_mutex ) ;
out :
return rc ;
}
static int ecryptfs_removexattr ( struct dentry * dentry , const char * name )
{
int rc = 0 ;
struct dentry * lower_dentry ;
lower_dentry = ecryptfs_dentry_to_lower ( dentry ) ;
if ( ! lower_dentry - > d_inode - > i_op - > removexattr ) {
rc = - ENOSYS ;
goto out ;
}
mutex_lock ( & lower_dentry - > d_inode - > i_mutex ) ;
rc = lower_dentry - > d_inode - > i_op - > removexattr ( lower_dentry , name ) ;
mutex_unlock ( & lower_dentry - > d_inode - > i_mutex ) ;
out :
return rc ;
}
int ecryptfs_inode_test ( struct inode * inode , void * candidate_lower_inode )
{
if ( ( ecryptfs_inode_to_lower ( inode )
= = ( struct inode * ) candidate_lower_inode ) )
return 1 ;
else
return 0 ;
}
int ecryptfs_inode_set ( struct inode * inode , void * lower_inode )
{
ecryptfs_init_inode ( inode , ( struct inode * ) lower_inode ) ;
return 0 ;
}
2007-02-12 11:55:38 +03:00
const struct inode_operations ecryptfs_symlink_iops = {
2006-10-04 13:16:22 +04:00
. readlink = ecryptfs_readlink ,
. follow_link = ecryptfs_follow_link ,
. put_link = ecryptfs_put_link ,
. permission = ecryptfs_permission ,
. setattr = ecryptfs_setattr ,
. setxattr = ecryptfs_setxattr ,
. getxattr = ecryptfs_getxattr ,
. listxattr = ecryptfs_listxattr ,
. removexattr = ecryptfs_removexattr
} ;
2007-02-12 11:55:38 +03:00
const struct inode_operations ecryptfs_dir_iops = {
2006-10-04 13:16:22 +04:00
. create = ecryptfs_create ,
. lookup = ecryptfs_lookup ,
. link = ecryptfs_link ,
. unlink = ecryptfs_unlink ,
. symlink = ecryptfs_symlink ,
. mkdir = ecryptfs_mkdir ,
. rmdir = ecryptfs_rmdir ,
. mknod = ecryptfs_mknod ,
. rename = ecryptfs_rename ,
. permission = ecryptfs_permission ,
. setattr = ecryptfs_setattr ,
. setxattr = ecryptfs_setxattr ,
. getxattr = ecryptfs_getxattr ,
. listxattr = ecryptfs_listxattr ,
. removexattr = ecryptfs_removexattr
} ;
2007-02-12 11:55:38 +03:00
const struct inode_operations ecryptfs_main_iops = {
2006-10-04 13:16:22 +04:00
. permission = ecryptfs_permission ,
. setattr = ecryptfs_setattr ,
2009-11-04 11:48:01 +03:00
. getattr = ecryptfs_getattr ,
2006-10-04 13:16:22 +04:00
. setxattr = ecryptfs_setxattr ,
. getxattr = ecryptfs_getxattr ,
. listxattr = ecryptfs_listxattr ,
. removexattr = ecryptfs_removexattr
} ;