2006-10-04 17:16:22 +08:00
|
|
|
/**
|
|
|
|
* eCryptfs: Linux filesystem encryption layer
|
|
|
|
*
|
|
|
|
* Copyright (C) 1997-2004 Erez Zadok
|
|
|
|
* Copyright (C) 2001-2004 Stony Brook University
|
2007-02-12 16:53:46 +08:00
|
|
|
* Copyright (C) 2004-2007 International Business Machines Corp.
|
2006-10-04 17:16:22 +08:00
|
|
|
* Author(s): Michael A. Halcrow <mahalcro@us.ibm.com>
|
|
|
|
* Michael C. Thompsion <mcthomps@us.ibm.com>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License as
|
|
|
|
* published by the Free Software Foundation; either version 2 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful, but
|
|
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
|
|
|
|
* 02111-1307, USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/file.h>
|
|
|
|
#include <linux/vmalloc.h>
|
|
|
|
#include <linux/pagemap.h>
|
|
|
|
#include <linux/dcache.h>
|
|
|
|
#include <linux/namei.h>
|
|
|
|
#include <linux/mount.h>
|
|
|
|
#include <linux/crypto.h>
|
2006-12-08 18:36:31 +08:00
|
|
|
#include <linux/fs_stack.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 16:04:11 +08:00
|
|
|
#include <linux/slab.h>
|
2010-10-06 00:53:45 +08:00
|
|
|
#include <linux/xattr.h>
|
2008-07-24 12:30:07 +08:00
|
|
|
#include <asm/unaligned.h>
|
2006-10-04 17:16:22 +08:00
|
|
|
#include "ecryptfs_kernel.h"
|
|
|
|
|
|
|
|
static struct dentry *lock_parent(struct dentry *dentry)
|
|
|
|
{
|
|
|
|
struct dentry *dir;
|
|
|
|
|
2008-05-13 05:02:04 +08:00
|
|
|
dir = dget_parent(dentry);
|
2007-03-08 12:41:30 +08:00
|
|
|
mutex_lock_nested(&(dir->d_inode->i_mutex), I_MUTEX_PARENT);
|
2006-10-04 17:16:22 +08:00
|
|
|
return dir;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void unlock_dir(struct dentry *dir)
|
|
|
|
{
|
|
|
|
mutex_unlock(&dir->d_inode->i_mutex);
|
|
|
|
dput(dir);
|
|
|
|
}
|
|
|
|
|
2011-05-24 10:18:20 +08:00
|
|
|
static int ecryptfs_inode_test(struct inode *inode, void *lower_inode)
|
|
|
|
{
|
|
|
|
if (ecryptfs_inode_to_lower(inode) == (struct inode *)lower_inode)
|
|
|
|
return 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-05-24 15:16:51 +08:00
|
|
|
static int ecryptfs_inode_set(struct inode *inode, void *opaque)
|
2011-05-24 10:18:20 +08:00
|
|
|
{
|
2011-05-24 15:16:51 +08:00
|
|
|
struct inode *lower_inode = opaque;
|
|
|
|
|
|
|
|
ecryptfs_set_inode_lower(inode, lower_inode);
|
|
|
|
fsstack_copy_attr_all(inode, lower_inode);
|
|
|
|
/* i_size will be overwritten for encrypted regular files */
|
|
|
|
fsstack_copy_inode_size(inode, lower_inode);
|
|
|
|
inode->i_ino = lower_inode->i_ino;
|
2011-05-24 10:18:20 +08:00
|
|
|
inode->i_version++;
|
|
|
|
inode->i_mapping->a_ops = &ecryptfs_aops;
|
2011-05-24 15:16:51 +08:00
|
|
|
|
|
|
|
if (S_ISLNK(inode->i_mode))
|
|
|
|
inode->i_op = &ecryptfs_symlink_iops;
|
|
|
|
else if (S_ISDIR(inode->i_mode))
|
|
|
|
inode->i_op = &ecryptfs_dir_iops;
|
|
|
|
else
|
|
|
|
inode->i_op = &ecryptfs_main_iops;
|
|
|
|
|
|
|
|
if (S_ISDIR(inode->i_mode))
|
|
|
|
inode->i_fop = &ecryptfs_dir_fops;
|
|
|
|
else if (special_file(inode->i_mode))
|
|
|
|
init_special_inode(inode, inode->i_mode, inode->i_rdev);
|
|
|
|
else
|
|
|
|
inode->i_fop = &ecryptfs_main_fops;
|
|
|
|
|
2011-05-24 10:18:20 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-05-24 15:16:51 +08:00
|
|
|
static struct inode *__ecryptfs_get_inode(struct inode *lower_inode,
|
|
|
|
struct super_block *sb)
|
2011-05-24 10:18:20 +08:00
|
|
|
{
|
|
|
|
struct inode *inode;
|
|
|
|
|
2011-05-24 15:16:51 +08:00
|
|
|
if (lower_inode->i_sb != ecryptfs_superblock_to_lower(sb))
|
|
|
|
return ERR_PTR(-EXDEV);
|
|
|
|
if (!igrab(lower_inode))
|
|
|
|
return ERR_PTR(-ESTALE);
|
2011-05-24 10:18:20 +08:00
|
|
|
inode = iget5_locked(sb, (unsigned long)lower_inode,
|
|
|
|
ecryptfs_inode_test, ecryptfs_inode_set,
|
|
|
|
lower_inode);
|
|
|
|
if (!inode) {
|
|
|
|
iput(lower_inode);
|
2011-05-24 15:16:51 +08:00
|
|
|
return ERR_PTR(-EACCES);
|
2011-05-24 10:18:20 +08:00
|
|
|
}
|
2011-05-24 15:16:51 +08:00
|
|
|
if (!(inode->i_state & I_NEW))
|
2011-05-24 10:18:20 +08:00
|
|
|
iput(lower_inode);
|
2011-05-24 15:16:51 +08:00
|
|
|
|
|
|
|
return inode;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct inode *ecryptfs_get_inode(struct inode *lower_inode,
|
|
|
|
struct super_block *sb)
|
|
|
|
{
|
|
|
|
struct inode *inode = __ecryptfs_get_inode(lower_inode, sb);
|
|
|
|
|
|
|
|
if (!IS_ERR(inode) && (inode->i_state & I_NEW))
|
|
|
|
unlock_new_inode(inode);
|
|
|
|
|
2011-05-24 10:18:20 +08:00
|
|
|
return inode;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ecryptfs_interpose
|
|
|
|
* @lower_dentry: Existing dentry in the lower filesystem
|
|
|
|
* @dentry: ecryptfs' dentry
|
|
|
|
* @sb: ecryptfs's super_block
|
|
|
|
*
|
|
|
|
* Interposes upper and lower dentries.
|
|
|
|
*
|
|
|
|
* Returns zero on success; non-zero otherwise
|
|
|
|
*/
|
|
|
|
static int ecryptfs_interpose(struct dentry *lower_dentry,
|
2011-05-24 15:16:51 +08:00
|
|
|
struct dentry *dentry, struct super_block *sb)
|
2011-05-24 10:18:20 +08:00
|
|
|
{
|
2011-05-24 15:16:51 +08:00
|
|
|
struct inode *inode = ecryptfs_get_inode(lower_dentry->d_inode, sb);
|
|
|
|
|
2011-05-24 10:18:20 +08:00
|
|
|
if (IS_ERR(inode))
|
|
|
|
return PTR_ERR(inode);
|
2011-05-24 15:16:51 +08:00
|
|
|
d_instantiate(dentry, inode);
|
|
|
|
|
2011-05-24 10:18:20 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-10-04 17:16:22 +08:00
|
|
|
/**
|
|
|
|
* ecryptfs_create_underlying_file
|
|
|
|
* @lower_dir_inode: inode of the parent in the lower fs of the new file
|
2009-01-07 06:42:05 +08:00
|
|
|
* @dentry: New file's dentry
|
2006-10-04 17:16:22 +08:00
|
|
|
* @mode: The mode of the new file
|
|
|
|
* @nd: nameidata of ecryptfs' parent's dentry & vfsmount
|
|
|
|
*
|
|
|
|
* Creates the file in the lower file system.
|
|
|
|
*
|
|
|
|
* Returns zero on success; non-zero on error condition
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
ecryptfs_create_underlying_file(struct inode *lower_dir_inode,
|
|
|
|
struct dentry *dentry, int mode,
|
|
|
|
struct nameidata *nd)
|
|
|
|
{
|
|
|
|
struct dentry *lower_dentry = ecryptfs_dentry_to_lower(dentry);
|
|
|
|
struct vfsmount *lower_mnt = ecryptfs_dentry_to_lower_mnt(dentry);
|
|
|
|
struct dentry *dentry_save;
|
|
|
|
struct vfsmount *vfsmount_save;
|
2010-09-23 15:35:04 +08:00
|
|
|
unsigned int flags_save;
|
2006-10-04 17:16:22 +08:00
|
|
|
int rc;
|
|
|
|
|
2011-02-18 07:35:20 +08:00
|
|
|
if (nd) {
|
|
|
|
dentry_save = nd->path.dentry;
|
|
|
|
vfsmount_save = nd->path.mnt;
|
|
|
|
flags_save = nd->flags;
|
|
|
|
nd->path.dentry = lower_dentry;
|
|
|
|
nd->path.mnt = lower_mnt;
|
|
|
|
nd->flags &= ~LOOKUP_OPEN;
|
|
|
|
}
|
2006-10-04 17:16:22 +08:00
|
|
|
rc = vfs_create(lower_dir_inode, lower_dentry, mode, nd);
|
2011-02-18 07:35:20 +08:00
|
|
|
if (nd) {
|
|
|
|
nd->path.dentry = dentry_save;
|
|
|
|
nd->path.mnt = vfsmount_save;
|
|
|
|
nd->flags = flags_save;
|
|
|
|
}
|
2006-10-04 17:16:22 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ecryptfs_do_create
|
|
|
|
* @directory_inode: inode of the new file's dentry's parent in ecryptfs
|
|
|
|
* @ecryptfs_dentry: New file's dentry in ecryptfs
|
|
|
|
* @mode: The mode of the new file
|
|
|
|
* @nd: nameidata of ecryptfs' parent's dentry & vfsmount
|
|
|
|
*
|
|
|
|
* Creates the underlying file and the eCryptfs inode which will link to
|
|
|
|
* it. It will also update the eCryptfs directory inode to mimic the
|
|
|
|
* stat of the lower directory inode.
|
|
|
|
*
|
|
|
|
* Returns zero on success; non-zero on error condition
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
ecryptfs_do_create(struct inode *directory_inode,
|
|
|
|
struct dentry *ecryptfs_dentry, int mode,
|
|
|
|
struct nameidata *nd)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
struct dentry *lower_dentry;
|
|
|
|
struct dentry *lower_dir_dentry;
|
|
|
|
|
|
|
|
lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry);
|
|
|
|
lower_dir_dentry = lock_parent(lower_dentry);
|
2008-04-29 16:03:09 +08:00
|
|
|
if (IS_ERR(lower_dir_dentry)) {
|
2006-10-04 17:16:22 +08:00
|
|
|
ecryptfs_printk(KERN_ERR, "Error locking directory of "
|
|
|
|
"dentry\n");
|
|
|
|
rc = PTR_ERR(lower_dir_dentry);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
rc = ecryptfs_create_underlying_file(lower_dir_dentry->d_inode,
|
|
|
|
ecryptfs_dentry, mode, nd);
|
2007-10-16 16:28:09 +08:00
|
|
|
if (rc) {
|
2008-01-09 07:33:02 +08:00
|
|
|
printk(KERN_ERR "%s: Failure to create dentry in lower fs; "
|
2008-04-29 15:59:48 +08:00
|
|
|
"rc = [%d]\n", __func__, rc);
|
2008-01-09 07:33:02 +08:00
|
|
|
goto out_lock;
|
2006-10-04 17:16:22 +08:00
|
|
|
}
|
|
|
|
rc = ecryptfs_interpose(lower_dentry, ecryptfs_dentry,
|
2011-05-24 15:16:51 +08:00
|
|
|
directory_inode->i_sb);
|
2006-10-04 17:16:22 +08:00
|
|
|
if (rc) {
|
|
|
|
ecryptfs_printk(KERN_ERR, "Failure in ecryptfs_interpose\n");
|
|
|
|
goto out_lock;
|
|
|
|
}
|
2006-12-08 18:36:31 +08:00
|
|
|
fsstack_copy_attr_times(directory_inode, lower_dir_dentry->d_inode);
|
|
|
|
fsstack_copy_inode_size(directory_inode, lower_dir_dentry->d_inode);
|
2006-10-04 17:16:22 +08:00
|
|
|
out_lock:
|
|
|
|
unlock_dir(lower_dir_dentry);
|
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ecryptfs_initialize_file
|
|
|
|
*
|
|
|
|
* Cause the file to be changed from a basic empty file to an ecryptfs
|
|
|
|
* file with a header and first data page.
|
|
|
|
*
|
|
|
|
* Returns zero on success
|
|
|
|
*/
|
|
|
|
static int ecryptfs_initialize_file(struct dentry *ecryptfs_dentry)
|
|
|
|
{
|
2007-10-16 16:28:10 +08:00
|
|
|
struct ecryptfs_crypt_stat *crypt_stat =
|
|
|
|
&ecryptfs_inode_to_private(ecryptfs_dentry->d_inode)->crypt_stat;
|
2006-10-04 17:16:22 +08:00
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
if (S_ISDIR(ecryptfs_dentry->d_inode->i_mode)) {
|
|
|
|
ecryptfs_printk(KERN_DEBUG, "This is a directory\n");
|
2007-02-12 16:53:49 +08:00
|
|
|
crypt_stat->flags &= ~(ECRYPTFS_ENCRYPTED);
|
2007-10-16 16:28:10 +08:00
|
|
|
goto out;
|
2006-10-04 17:16:22 +08:00
|
|
|
}
|
|
|
|
ecryptfs_printk(KERN_DEBUG, "Initializing crypto context\n");
|
|
|
|
rc = ecryptfs_new_file_context(ecryptfs_dentry);
|
|
|
|
if (rc) {
|
2007-10-16 16:28:10 +08:00
|
|
|
ecryptfs_printk(KERN_ERR, "Error creating new file "
|
|
|
|
"context; rc = [%d]\n", rc);
|
|
|
|
goto out;
|
2006-10-04 17:16:22 +08:00
|
|
|
}
|
2011-05-24 16:49:02 +08:00
|
|
|
rc = ecryptfs_get_lower_file(ecryptfs_dentry,
|
|
|
|
ecryptfs_dentry->d_inode);
|
2010-11-03 18:11:28 +08:00
|
|
|
if (rc) {
|
|
|
|
printk(KERN_ERR "%s: Error attempting to initialize "
|
eCryptfs: Add reference counting to lower files
For any given lower inode, eCryptfs keeps only one lower file open and
multiplexes all eCryptfs file operations through that lower file. The
lower file was considered "persistent" and stayed open from the first
lookup through the lifetime of the inode.
This patch keeps the notion of a single, per-inode lower file, but adds
reference counting around the lower file so that it is closed when not
currently in use. If the reference count is at 0 when an operation (such
as open, create, etc.) needs to use the lower file, a new lower file is
opened. Since the file is no longer persistent, all references to the
term persistent file are changed to lower file.
Locking is added around the sections of code that opens the lower file
and assign the pointer in the inode info, as well as the code the fputs
the lower file when all eCryptfs users are done with it.
This patch is needed to fix issues, when mounted on top of the NFSv3
client, where the lower file is left silly renamed until the eCryptfs
inode is destroyed.
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
2011-04-15 04:35:11 +08:00
|
|
|
"the lower file for the dentry with name "
|
2010-11-03 18:11:28 +08:00
|
|
|
"[%s]; rc = [%d]\n", __func__,
|
|
|
|
ecryptfs_dentry->d_name.name, rc);
|
|
|
|
goto out;
|
2008-07-24 12:30:08 +08:00
|
|
|
}
|
2007-10-16 16:28:10 +08:00
|
|
|
rc = ecryptfs_write_metadata(ecryptfs_dentry);
|
eCryptfs: Add reference counting to lower files
For any given lower inode, eCryptfs keeps only one lower file open and
multiplexes all eCryptfs file operations through that lower file. The
lower file was considered "persistent" and stayed open from the first
lookup through the lifetime of the inode.
This patch keeps the notion of a single, per-inode lower file, but adds
reference counting around the lower file so that it is closed when not
currently in use. If the reference count is at 0 when an operation (such
as open, create, etc.) needs to use the lower file, a new lower file is
opened. Since the file is no longer persistent, all references to the
term persistent file are changed to lower file.
Locking is added around the sections of code that opens the lower file
and assign the pointer in the inode info, as well as the code the fputs
the lower file when all eCryptfs users are done with it.
This patch is needed to fix issues, when mounted on top of the NFSv3
client, where the lower file is left silly renamed until the eCryptfs
inode is destroyed.
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
2011-04-15 04:35:11 +08:00
|
|
|
if (rc)
|
2007-10-16 16:28:10 +08:00
|
|
|
printk(KERN_ERR "Error writing headers; rc = [%d]\n", rc);
|
eCryptfs: Add reference counting to lower files
For any given lower inode, eCryptfs keeps only one lower file open and
multiplexes all eCryptfs file operations through that lower file. The
lower file was considered "persistent" and stayed open from the first
lookup through the lifetime of the inode.
This patch keeps the notion of a single, per-inode lower file, but adds
reference counting around the lower file so that it is closed when not
currently in use. If the reference count is at 0 when an operation (such
as open, create, etc.) needs to use the lower file, a new lower file is
opened. Since the file is no longer persistent, all references to the
term persistent file are changed to lower file.
Locking is added around the sections of code that opens the lower file
and assign the pointer in the inode info, as well as the code the fputs
the lower file when all eCryptfs users are done with it.
This patch is needed to fix issues, when mounted on top of the NFSv3
client, where the lower file is left silly renamed until the eCryptfs
inode is destroyed.
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
2011-04-15 04:35:11 +08:00
|
|
|
ecryptfs_put_lower_file(ecryptfs_dentry->d_inode);
|
2006-10-04 17:16:22 +08:00
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ecryptfs_create
|
|
|
|
* @dir: The inode of the directory in which to create the file.
|
|
|
|
* @dentry: The eCryptfs dentry
|
|
|
|
* @mode: The mode of the new file.
|
|
|
|
* @nd: nameidata
|
|
|
|
*
|
|
|
|
* Creates a new file.
|
|
|
|
*
|
|
|
|
* Returns zero on success; non-zero on error condition
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
ecryptfs_create(struct inode *directory_inode, struct dentry *ecryptfs_dentry,
|
|
|
|
int mode, struct nameidata *nd)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
2009-01-07 06:42:00 +08:00
|
|
|
/* ecryptfs_do_create() calls ecryptfs_interpose() */
|
2006-10-04 17:16:22 +08:00
|
|
|
rc = ecryptfs_do_create(directory_inode, ecryptfs_dentry, mode, nd);
|
|
|
|
if (unlikely(rc)) {
|
|
|
|
ecryptfs_printk(KERN_WARNING, "Failed to create file in"
|
|
|
|
"lower filesystem\n");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/* At this point, a file exists on "disk"; we need to make sure
|
|
|
|
* that this on disk file is prepared to be an ecryptfs file */
|
|
|
|
rc = ecryptfs_initialize_file(ecryptfs_dentry);
|
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2011-05-24 15:16:51 +08:00
|
|
|
* ecryptfs_lookup_interpose - Dentry interposition for a lookup
|
2006-10-04 17:16:22 +08:00
|
|
|
*/
|
2011-05-24 15:16:51 +08:00
|
|
|
static int ecryptfs_lookup_interpose(struct dentry *ecryptfs_dentry,
|
|
|
|
struct dentry *lower_dentry,
|
|
|
|
struct inode *ecryptfs_dir_inode)
|
2006-10-04 17:16:22 +08:00
|
|
|
{
|
|
|
|
struct dentry *lower_dir_dentry;
|
|
|
|
struct vfsmount *lower_mnt;
|
2011-05-24 15:16:51 +08:00
|
|
|
struct inode *inode, *lower_inode;
|
2009-03-20 15:23:57 +08:00
|
|
|
struct ecryptfs_crypt_stat *crypt_stat;
|
2006-10-04 17:16:22 +08:00
|
|
|
char *page_virt = NULL;
|
eCryptfs: Add reference counting to lower files
For any given lower inode, eCryptfs keeps only one lower file open and
multiplexes all eCryptfs file operations through that lower file. The
lower file was considered "persistent" and stayed open from the first
lookup through the lifetime of the inode.
This patch keeps the notion of a single, per-inode lower file, but adds
reference counting around the lower file so that it is closed when not
currently in use. If the reference count is at 0 when an operation (such
as open, create, etc.) needs to use the lower file, a new lower file is
opened. Since the file is no longer persistent, all references to the
term persistent file are changed to lower file.
Locking is added around the sections of code that opens the lower file
and assign the pointer in the inode info, as well as the code the fputs
the lower file when all eCryptfs users are done with it.
This patch is needed to fix issues, when mounted on top of the NFSv3
client, where the lower file is left silly renamed until the eCryptfs
inode is destroyed.
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
2011-04-15 04:35:11 +08:00
|
|
|
int put_lower = 0, rc = 0;
|
2006-10-04 17:16:22 +08:00
|
|
|
|
2009-01-07 06:42:00 +08:00
|
|
|
lower_dir_dentry = lower_dentry->d_parent;
|
|
|
|
lower_mnt = mntget(ecryptfs_dentry_to_lower_mnt(
|
|
|
|
ecryptfs_dentry->d_parent));
|
2006-10-04 17:16:22 +08:00
|
|
|
lower_inode = lower_dentry->d_inode;
|
2009-01-07 06:42:00 +08:00
|
|
|
fsstack_copy_attr_atime(ecryptfs_dir_inode, lower_dir_dentry->d_inode);
|
2011-01-07 14:49:32 +08:00
|
|
|
BUG_ON(!lower_dentry->d_count);
|
2009-01-07 06:42:00 +08:00
|
|
|
ecryptfs_set_dentry_private(ecryptfs_dentry,
|
2006-10-04 17:16:22 +08:00
|
|
|
kmem_cache_alloc(ecryptfs_dentry_info_cache,
|
2006-12-07 12:33:17 +08:00
|
|
|
GFP_KERNEL));
|
2009-01-07 06:42:00 +08:00
|
|
|
if (!ecryptfs_dentry_to_private(ecryptfs_dentry)) {
|
2006-10-04 17:16:22 +08:00
|
|
|
rc = -ENOMEM;
|
2009-01-07 06:42:00 +08:00
|
|
|
printk(KERN_ERR "%s: Out of memory whilst attempting "
|
|
|
|
"to allocate ecryptfs_dentry_info struct\n",
|
|
|
|
__func__);
|
2010-07-29 19:01:36 +08:00
|
|
|
goto out_put;
|
2006-10-04 17:16:22 +08:00
|
|
|
}
|
2009-01-07 06:42:00 +08:00
|
|
|
ecryptfs_set_dentry_lower(ecryptfs_dentry, lower_dentry);
|
|
|
|
ecryptfs_set_dentry_lower_mnt(ecryptfs_dentry, lower_mnt);
|
2006-10-04 17:16:22 +08:00
|
|
|
if (!lower_dentry->d_inode) {
|
|
|
|
/* We want to add because we couldn't find in lower */
|
2009-01-07 06:42:00 +08:00
|
|
|
d_add(ecryptfs_dentry, NULL);
|
2006-10-04 17:16:22 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2011-05-24 15:16:51 +08:00
|
|
|
inode = __ecryptfs_get_inode(lower_inode, ecryptfs_dir_inode->i_sb);
|
|
|
|
if (IS_ERR(inode)) {
|
|
|
|
rc = PTR_ERR(inode);
|
2009-01-07 06:42:00 +08:00
|
|
|
printk(KERN_ERR "%s: Error interposing; rc = [%d]\n",
|
|
|
|
__func__, rc);
|
2008-07-24 12:30:08 +08:00
|
|
|
goto out;
|
2006-10-04 17:16:22 +08:00
|
|
|
}
|
2011-05-24 16:49:02 +08:00
|
|
|
if (!S_ISREG(inode->i_mode)) {
|
|
|
|
if (inode->i_state & I_NEW)
|
|
|
|
unlock_new_inode(inode);
|
|
|
|
d_add(ecryptfs_dentry, inode);
|
2007-08-11 04:00:51 +08:00
|
|
|
goto out;
|
2011-05-24 16:49:02 +08:00
|
|
|
}
|
2006-10-04 17:16:22 +08:00
|
|
|
/* Released in this function */
|
2009-01-07 06:42:00 +08:00
|
|
|
page_virt = kmem_cache_zalloc(ecryptfs_header_cache_2, GFP_USER);
|
2006-10-04 17:16:22 +08:00
|
|
|
if (!page_virt) {
|
2009-01-07 06:42:00 +08:00
|
|
|
printk(KERN_ERR "%s: Cannot kmem_cache_zalloc() a page\n",
|
|
|
|
__func__);
|
2006-10-04 17:16:22 +08:00
|
|
|
rc = -ENOMEM;
|
2011-05-24 16:49:02 +08:00
|
|
|
make_bad_inode(inode);
|
2008-07-24 12:30:08 +08:00
|
|
|
goto out;
|
2006-10-04 17:16:22 +08:00
|
|
|
}
|
2011-05-24 16:49:02 +08:00
|
|
|
rc = ecryptfs_get_lower_file(ecryptfs_dentry, inode);
|
2010-11-03 18:11:28 +08:00
|
|
|
if (rc) {
|
|
|
|
printk(KERN_ERR "%s: Error attempting to initialize "
|
eCryptfs: Add reference counting to lower files
For any given lower inode, eCryptfs keeps only one lower file open and
multiplexes all eCryptfs file operations through that lower file. The
lower file was considered "persistent" and stayed open from the first
lookup through the lifetime of the inode.
This patch keeps the notion of a single, per-inode lower file, but adds
reference counting around the lower file so that it is closed when not
currently in use. If the reference count is at 0 when an operation (such
as open, create, etc.) needs to use the lower file, a new lower file is
opened. Since the file is no longer persistent, all references to the
term persistent file are changed to lower file.
Locking is added around the sections of code that opens the lower file
and assign the pointer in the inode info, as well as the code the fputs
the lower file when all eCryptfs users are done with it.
This patch is needed to fix issues, when mounted on top of the NFSv3
client, where the lower file is left silly renamed until the eCryptfs
inode is destroyed.
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
2011-04-15 04:35:11 +08:00
|
|
|
"the lower file for the dentry with name "
|
2010-11-03 18:11:28 +08:00
|
|
|
"[%s]; rc = [%d]\n", __func__,
|
|
|
|
ecryptfs_dentry->d_name.name, rc);
|
2011-05-24 16:49:02 +08:00
|
|
|
make_bad_inode(inode);
|
2010-11-03 18:11:28 +08:00
|
|
|
goto out_free_kmem;
|
2008-07-24 12:30:08 +08:00
|
|
|
}
|
eCryptfs: Add reference counting to lower files
For any given lower inode, eCryptfs keeps only one lower file open and
multiplexes all eCryptfs file operations through that lower file. The
lower file was considered "persistent" and stayed open from the first
lookup through the lifetime of the inode.
This patch keeps the notion of a single, per-inode lower file, but adds
reference counting around the lower file so that it is closed when not
currently in use. If the reference count is at 0 when an operation (such
as open, create, etc.) needs to use the lower file, a new lower file is
opened. Since the file is no longer persistent, all references to the
term persistent file are changed to lower file.
Locking is added around the sections of code that opens the lower file
and assign the pointer in the inode info, as well as the code the fputs
the lower file when all eCryptfs users are done with it.
This patch is needed to fix issues, when mounted on top of the NFSv3
client, where the lower file is left silly renamed until the eCryptfs
inode is destroyed.
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
2011-04-15 04:35:11 +08:00
|
|
|
put_lower = 1;
|
2011-05-24 16:49:02 +08:00
|
|
|
crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat;
|
2009-03-20 15:23:57 +08:00
|
|
|
/* TODO: lock for crypt_stat comparison */
|
|
|
|
if (!(crypt_stat->flags & ECRYPTFS_POLICY_APPLIED))
|
|
|
|
ecryptfs_set_default_sizes(crypt_stat);
|
2011-05-24 16:49:02 +08:00
|
|
|
rc = ecryptfs_read_and_validate_header_region(page_virt, inode);
|
2006-10-04 17:16:22 +08:00
|
|
|
if (rc) {
|
2010-02-11 13:17:44 +08:00
|
|
|
memset(page_virt, 0, PAGE_CACHE_SIZE);
|
2009-01-07 06:42:00 +08:00
|
|
|
rc = ecryptfs_read_and_validate_xattr_region(page_virt,
|
2011-05-24 16:49:02 +08:00
|
|
|
inode);
|
2007-02-12 16:53:46 +08:00
|
|
|
if (rc) {
|
|
|
|
rc = 0;
|
2011-05-24 16:49:02 +08:00
|
|
|
goto unlock_inode;
|
2006-10-04 17:16:22 +08:00
|
|
|
}
|
2007-02-12 16:53:46 +08:00
|
|
|
crypt_stat->flags |= ECRYPTFS_METADATA_IN_XATTR;
|
2006-10-04 17:16:22 +08:00
|
|
|
}
|
2011-05-24 16:49:02 +08:00
|
|
|
ecryptfs_i_size_init(page_virt, inode);
|
|
|
|
unlock_inode:
|
|
|
|
if (inode->i_state & I_NEW)
|
|
|
|
unlock_new_inode(inode);
|
|
|
|
d_add(ecryptfs_dentry, inode);
|
2009-01-07 06:42:00 +08:00
|
|
|
out_free_kmem:
|
2006-10-04 17:16:22 +08:00
|
|
|
kmem_cache_free(ecryptfs_header_cache_2, page_virt);
|
|
|
|
goto out;
|
2010-07-29 19:01:36 +08:00
|
|
|
out_put:
|
2006-10-04 17:16:22 +08:00
|
|
|
dput(lower_dentry);
|
2010-07-29 19:01:36 +08:00
|
|
|
mntput(lower_mnt);
|
2009-01-07 06:42:00 +08:00
|
|
|
d_drop(ecryptfs_dentry);
|
|
|
|
out:
|
eCryptfs: Add reference counting to lower files
For any given lower inode, eCryptfs keeps only one lower file open and
multiplexes all eCryptfs file operations through that lower file. The
lower file was considered "persistent" and stayed open from the first
lookup through the lifetime of the inode.
This patch keeps the notion of a single, per-inode lower file, but adds
reference counting around the lower file so that it is closed when not
currently in use. If the reference count is at 0 when an operation (such
as open, create, etc.) needs to use the lower file, a new lower file is
opened. Since the file is no longer persistent, all references to the
term persistent file are changed to lower file.
Locking is added around the sections of code that opens the lower file
and assign the pointer in the inode info, as well as the code the fputs
the lower file when all eCryptfs users are done with it.
This patch is needed to fix issues, when mounted on top of the NFSv3
client, where the lower file is left silly renamed until the eCryptfs
inode is destroyed.
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
2011-04-15 04:35:11 +08:00
|
|
|
if (put_lower)
|
2011-05-24 16:49:02 +08:00
|
|
|
ecryptfs_put_lower_file(inode);
|
2009-01-07 06:42:00 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ecryptfs_lookup
|
|
|
|
* @ecryptfs_dir_inode: The eCryptfs directory inode
|
|
|
|
* @ecryptfs_dentry: The eCryptfs dentry that we are looking up
|
|
|
|
* @ecryptfs_nd: nameidata; may be NULL
|
|
|
|
*
|
|
|
|
* Find a file on disk. If the file does not exist, then we'll add it to the
|
|
|
|
* dentry cache and continue on to read it from the disk.
|
|
|
|
*/
|
|
|
|
static struct dentry *ecryptfs_lookup(struct inode *ecryptfs_dir_inode,
|
|
|
|
struct dentry *ecryptfs_dentry,
|
|
|
|
struct nameidata *ecryptfs_nd)
|
|
|
|
{
|
|
|
|
char *encrypted_and_encoded_name = NULL;
|
2009-01-07 06:42:03 +08:00
|
|
|
size_t encrypted_and_encoded_name_size;
|
2009-01-07 06:42:00 +08:00
|
|
|
struct ecryptfs_mount_crypt_stat *mount_crypt_stat = NULL;
|
|
|
|
struct dentry *lower_dir_dentry, *lower_dentry;
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
if ((ecryptfs_dentry->d_name.len == 1
|
|
|
|
&& !strcmp(ecryptfs_dentry->d_name.name, "."))
|
|
|
|
|| (ecryptfs_dentry->d_name.len == 2
|
|
|
|
&& !strcmp(ecryptfs_dentry->d_name.name, ".."))) {
|
|
|
|
goto out_d_drop;
|
|
|
|
}
|
|
|
|
lower_dir_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry->d_parent);
|
2011-02-18 08:51:24 +08:00
|
|
|
mutex_lock(&lower_dir_dentry->d_inode->i_mutex);
|
|
|
|
lower_dentry = lookup_one_len(ecryptfs_dentry->d_name.name,
|
|
|
|
lower_dir_dentry,
|
|
|
|
ecryptfs_dentry->d_name.len);
|
|
|
|
mutex_unlock(&lower_dir_dentry->d_inode->i_mutex);
|
2009-01-07 06:42:00 +08:00
|
|
|
if (IS_ERR(lower_dentry)) {
|
|
|
|
rc = PTR_ERR(lower_dentry);
|
2011-02-18 08:51:24 +08:00
|
|
|
ecryptfs_printk(KERN_DEBUG, "%s: lookup_one_len() returned "
|
2010-03-26 00:16:56 +08:00
|
|
|
"[%d] on lower_dentry = [%s]\n", __func__, rc,
|
|
|
|
encrypted_and_encoded_name);
|
2009-01-07 06:42:00 +08:00
|
|
|
goto out_d_drop;
|
|
|
|
}
|
|
|
|
if (lower_dentry->d_inode)
|
2011-05-24 15:16:51 +08:00
|
|
|
goto interpose;
|
2009-03-20 15:23:57 +08:00
|
|
|
mount_crypt_stat = &ecryptfs_superblock_to_private(
|
|
|
|
ecryptfs_dentry->d_sb)->mount_crypt_stat;
|
|
|
|
if (!(mount_crypt_stat
|
|
|
|
&& (mount_crypt_stat->flags & ECRYPTFS_GLOBAL_ENCRYPT_FILENAMES)))
|
2011-05-24 15:16:51 +08:00
|
|
|
goto interpose;
|
2009-01-07 06:42:00 +08:00
|
|
|
dput(lower_dentry);
|
|
|
|
rc = ecryptfs_encrypt_and_encode_filename(
|
|
|
|
&encrypted_and_encoded_name, &encrypted_and_encoded_name_size,
|
2009-03-20 15:23:57 +08:00
|
|
|
NULL, mount_crypt_stat, ecryptfs_dentry->d_name.name,
|
2009-01-07 06:42:00 +08:00
|
|
|
ecryptfs_dentry->d_name.len);
|
|
|
|
if (rc) {
|
|
|
|
printk(KERN_ERR "%s: Error attempting to encrypt and encode "
|
|
|
|
"filename; rc = [%d]\n", __func__, rc);
|
|
|
|
goto out_d_drop;
|
|
|
|
}
|
2011-02-18 08:51:24 +08:00
|
|
|
mutex_lock(&lower_dir_dentry->d_inode->i_mutex);
|
|
|
|
lower_dentry = lookup_one_len(encrypted_and_encoded_name,
|
|
|
|
lower_dir_dentry,
|
|
|
|
encrypted_and_encoded_name_size);
|
|
|
|
mutex_unlock(&lower_dir_dentry->d_inode->i_mutex);
|
2009-01-07 06:42:00 +08:00
|
|
|
if (IS_ERR(lower_dentry)) {
|
|
|
|
rc = PTR_ERR(lower_dentry);
|
2011-02-18 08:51:24 +08:00
|
|
|
ecryptfs_printk(KERN_DEBUG, "%s: lookup_one_len() returned "
|
2010-03-26 00:16:56 +08:00
|
|
|
"[%d] on lower_dentry = [%s]\n", __func__, rc,
|
|
|
|
encrypted_and_encoded_name);
|
2009-01-07 06:42:00 +08:00
|
|
|
goto out_d_drop;
|
|
|
|
}
|
2011-05-24 15:16:51 +08:00
|
|
|
interpose:
|
|
|
|
rc = ecryptfs_lookup_interpose(ecryptfs_dentry, lower_dentry,
|
|
|
|
ecryptfs_dir_inode);
|
2009-01-07 06:42:00 +08:00
|
|
|
goto out;
|
|
|
|
out_d_drop:
|
|
|
|
d_drop(ecryptfs_dentry);
|
2006-10-04 17:16:22 +08:00
|
|
|
out:
|
2009-01-07 06:42:00 +08:00
|
|
|
kfree(encrypted_and_encoded_name);
|
2006-10-04 17:16:22 +08:00
|
|
|
return ERR_PTR(rc);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ecryptfs_link(struct dentry *old_dentry, struct inode *dir,
|
|
|
|
struct dentry *new_dentry)
|
|
|
|
{
|
|
|
|
struct dentry *lower_old_dentry;
|
|
|
|
struct dentry *lower_new_dentry;
|
|
|
|
struct dentry *lower_dir_dentry;
|
|
|
|
u64 file_size_save;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
file_size_save = i_size_read(old_dentry->d_inode);
|
|
|
|
lower_old_dentry = ecryptfs_dentry_to_lower(old_dentry);
|
|
|
|
lower_new_dentry = ecryptfs_dentry_to_lower(new_dentry);
|
|
|
|
dget(lower_old_dentry);
|
|
|
|
dget(lower_new_dentry);
|
|
|
|
lower_dir_dentry = lock_parent(lower_new_dentry);
|
|
|
|
rc = vfs_link(lower_old_dentry, lower_dir_dentry->d_inode,
|
|
|
|
lower_new_dentry);
|
|
|
|
if (rc || !lower_new_dentry->d_inode)
|
|
|
|
goto out_lock;
|
2011-05-24 15:16:51 +08:00
|
|
|
rc = ecryptfs_interpose(lower_new_dentry, new_dentry, dir->i_sb);
|
2006-10-04 17:16:22 +08:00
|
|
|
if (rc)
|
|
|
|
goto out_lock;
|
2010-03-24 07:09:02 +08:00
|
|
|
fsstack_copy_attr_times(dir, lower_dir_dentry->d_inode);
|
|
|
|
fsstack_copy_inode_size(dir, lower_dir_dentry->d_inode);
|
2006-10-04 17:16:22 +08:00
|
|
|
old_dentry->d_inode->i_nlink =
|
|
|
|
ecryptfs_inode_to_lower(old_dentry->d_inode)->i_nlink;
|
|
|
|
i_size_write(new_dentry->d_inode, file_size_save);
|
|
|
|
out_lock:
|
|
|
|
unlock_dir(lower_dir_dentry);
|
|
|
|
dput(lower_new_dentry);
|
|
|
|
dput(lower_old_dentry);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ecryptfs_unlink(struct inode *dir, struct dentry *dentry)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
struct dentry *lower_dentry = ecryptfs_dentry_to_lower(dentry);
|
|
|
|
struct inode *lower_dir_inode = ecryptfs_inode_to_lower(dir);
|
2008-05-13 05:02:04 +08:00
|
|
|
struct dentry *lower_dir_dentry;
|
2006-10-04 17:16:22 +08:00
|
|
|
|
2009-09-23 01:52:17 +08:00
|
|
|
dget(lower_dentry);
|
2008-05-13 05:02:04 +08:00
|
|
|
lower_dir_dentry = lock_parent(lower_dentry);
|
2006-10-04 17:16:22 +08:00
|
|
|
rc = vfs_unlink(lower_dir_inode, lower_dentry);
|
|
|
|
if (rc) {
|
2006-11-16 17:19:30 +08:00
|
|
|
printk(KERN_ERR "Error in vfs_unlink; rc = [%d]\n", rc);
|
2006-10-04 17:16:22 +08:00
|
|
|
goto out_unlock;
|
|
|
|
}
|
2006-12-08 18:36:31 +08:00
|
|
|
fsstack_copy_attr_times(dir, lower_dir_inode);
|
2006-10-04 17:16:22 +08:00
|
|
|
dentry->d_inode->i_nlink =
|
|
|
|
ecryptfs_inode_to_lower(dentry->d_inode)->i_nlink;
|
|
|
|
dentry->d_inode->i_ctime = dir->i_ctime;
|
2008-01-09 07:33:02 +08:00
|
|
|
d_drop(dentry);
|
2006-10-04 17:16:22 +08:00
|
|
|
out_unlock:
|
2008-05-13 05:02:04 +08:00
|
|
|
unlock_dir(lower_dir_dentry);
|
2009-09-23 01:52:17 +08:00
|
|
|
dput(lower_dentry);
|
2006-10-04 17:16:22 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ecryptfs_symlink(struct inode *dir, struct dentry *dentry,
|
|
|
|
const char *symname)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
struct dentry *lower_dentry;
|
|
|
|
struct dentry *lower_dir_dentry;
|
|
|
|
char *encoded_symname;
|
2009-01-07 06:42:00 +08:00
|
|
|
size_t encoded_symlen;
|
|
|
|
struct ecryptfs_mount_crypt_stat *mount_crypt_stat = NULL;
|
2006-10-04 17:16:22 +08:00
|
|
|
|
|
|
|
lower_dentry = ecryptfs_dentry_to_lower(dentry);
|
|
|
|
dget(lower_dentry);
|
|
|
|
lower_dir_dentry = lock_parent(lower_dentry);
|
2009-01-07 06:42:00 +08:00
|
|
|
mount_crypt_stat = &ecryptfs_superblock_to_private(
|
|
|
|
dir->i_sb)->mount_crypt_stat;
|
|
|
|
rc = ecryptfs_encrypt_and_encode_filename(&encoded_symname,
|
|
|
|
&encoded_symlen,
|
|
|
|
NULL,
|
|
|
|
mount_crypt_stat, symname,
|
|
|
|
strlen(symname));
|
|
|
|
if (rc)
|
2006-10-04 17:16:22 +08:00
|
|
|
goto out_lock;
|
|
|
|
rc = vfs_symlink(lower_dir_dentry->d_inode, lower_dentry,
|
2008-06-24 22:50:16 +08:00
|
|
|
encoded_symname);
|
2006-10-04 17:16:22 +08:00
|
|
|
kfree(encoded_symname);
|
|
|
|
if (rc || !lower_dentry->d_inode)
|
|
|
|
goto out_lock;
|
2011-05-24 15:16:51 +08:00
|
|
|
rc = ecryptfs_interpose(lower_dentry, dentry, dir->i_sb);
|
2006-10-04 17:16:22 +08:00
|
|
|
if (rc)
|
|
|
|
goto out_lock;
|
2006-12-08 18:36:31 +08:00
|
|
|
fsstack_copy_attr_times(dir, lower_dir_dentry->d_inode);
|
|
|
|
fsstack_copy_inode_size(dir, lower_dir_dentry->d_inode);
|
2006-10-04 17:16:22 +08:00
|
|
|
out_lock:
|
|
|
|
unlock_dir(lower_dir_dentry);
|
|
|
|
dput(lower_dentry);
|
|
|
|
if (!dentry->d_inode)
|
|
|
|
d_drop(dentry);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ecryptfs_mkdir(struct inode *dir, struct dentry *dentry, int mode)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
struct dentry *lower_dentry;
|
|
|
|
struct dentry *lower_dir_dentry;
|
|
|
|
|
|
|
|
lower_dentry = ecryptfs_dentry_to_lower(dentry);
|
|
|
|
lower_dir_dentry = lock_parent(lower_dentry);
|
|
|
|
rc = vfs_mkdir(lower_dir_dentry->d_inode, lower_dentry, mode);
|
|
|
|
if (rc || !lower_dentry->d_inode)
|
|
|
|
goto out;
|
2011-05-24 15:16:51 +08:00
|
|
|
rc = ecryptfs_interpose(lower_dentry, dentry, dir->i_sb);
|
2006-10-04 17:16:22 +08:00
|
|
|
if (rc)
|
|
|
|
goto out;
|
2006-12-08 18:36:31 +08:00
|
|
|
fsstack_copy_attr_times(dir, lower_dir_dentry->d_inode);
|
|
|
|
fsstack_copy_inode_size(dir, lower_dir_dentry->d_inode);
|
2006-10-04 17:16:22 +08:00
|
|
|
dir->i_nlink = lower_dir_dentry->d_inode->i_nlink;
|
|
|
|
out:
|
|
|
|
unlock_dir(lower_dir_dentry);
|
|
|
|
if (!dentry->d_inode)
|
|
|
|
d_drop(dentry);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ecryptfs_rmdir(struct inode *dir, struct dentry *dentry)
|
|
|
|
{
|
|
|
|
struct dentry *lower_dentry;
|
|
|
|
struct dentry *lower_dir_dentry;
|
2006-10-31 14:07:20 +08:00
|
|
|
int rc;
|
2006-10-04 17:16:22 +08:00
|
|
|
|
|
|
|
lower_dentry = ecryptfs_dentry_to_lower(dentry);
|
2006-10-31 14:07:20 +08:00
|
|
|
dget(dentry);
|
2006-10-04 17:16:22 +08:00
|
|
|
lower_dir_dentry = lock_parent(lower_dentry);
|
2006-10-31 14:07:20 +08:00
|
|
|
dget(lower_dentry);
|
2006-10-04 17:16:22 +08:00
|
|
|
rc = vfs_rmdir(lower_dir_dentry->d_inode, lower_dentry);
|
2006-10-31 14:07:20 +08:00
|
|
|
dput(lower_dentry);
|
2011-04-30 05:26:27 +08:00
|
|
|
if (!rc && dentry->d_inode)
|
|
|
|
clear_nlink(dentry->d_inode);
|
2006-12-08 18:36:31 +08:00
|
|
|
fsstack_copy_attr_times(dir, lower_dir_dentry->d_inode);
|
2006-10-04 17:16:22 +08:00
|
|
|
dir->i_nlink = lower_dir_dentry->d_inode->i_nlink;
|
|
|
|
unlock_dir(lower_dir_dentry);
|
|
|
|
if (!rc)
|
|
|
|
d_drop(dentry);
|
2006-10-31 14:07:20 +08:00
|
|
|
dput(dentry);
|
2006-10-04 17:16:22 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
ecryptfs_mknod(struct inode *dir, struct dentry *dentry, int mode, dev_t dev)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
struct dentry *lower_dentry;
|
|
|
|
struct dentry *lower_dir_dentry;
|
|
|
|
|
|
|
|
lower_dentry = ecryptfs_dentry_to_lower(dentry);
|
|
|
|
lower_dir_dentry = lock_parent(lower_dentry);
|
|
|
|
rc = vfs_mknod(lower_dir_dentry->d_inode, lower_dentry, mode, dev);
|
|
|
|
if (rc || !lower_dentry->d_inode)
|
|
|
|
goto out;
|
2011-05-24 15:16:51 +08:00
|
|
|
rc = ecryptfs_interpose(lower_dentry, dentry, dir->i_sb);
|
2006-10-04 17:16:22 +08:00
|
|
|
if (rc)
|
|
|
|
goto out;
|
2006-12-08 18:36:31 +08:00
|
|
|
fsstack_copy_attr_times(dir, lower_dir_dentry->d_inode);
|
|
|
|
fsstack_copy_inode_size(dir, lower_dir_dentry->d_inode);
|
2006-10-04 17:16:22 +08:00
|
|
|
out:
|
|
|
|
unlock_dir(lower_dir_dentry);
|
|
|
|
if (!dentry->d_inode)
|
|
|
|
d_drop(dentry);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
ecryptfs_rename(struct inode *old_dir, struct dentry *old_dentry,
|
|
|
|
struct inode *new_dir, struct dentry *new_dentry)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
struct dentry *lower_old_dentry;
|
|
|
|
struct dentry *lower_new_dentry;
|
|
|
|
struct dentry *lower_old_dir_dentry;
|
|
|
|
struct dentry *lower_new_dir_dentry;
|
2009-12-06 10:17:09 +08:00
|
|
|
struct dentry *trap = NULL;
|
2006-10-04 17:16:22 +08:00
|
|
|
|
|
|
|
lower_old_dentry = ecryptfs_dentry_to_lower(old_dentry);
|
|
|
|
lower_new_dentry = ecryptfs_dentry_to_lower(new_dentry);
|
|
|
|
dget(lower_old_dentry);
|
|
|
|
dget(lower_new_dentry);
|
|
|
|
lower_old_dir_dentry = dget_parent(lower_old_dentry);
|
|
|
|
lower_new_dir_dentry = dget_parent(lower_new_dentry);
|
2009-12-06 10:17:09 +08:00
|
|
|
trap = lock_rename(lower_old_dir_dentry, lower_new_dir_dentry);
|
|
|
|
/* source should not be ancestor of target */
|
|
|
|
if (trap == lower_old_dentry) {
|
|
|
|
rc = -EINVAL;
|
|
|
|
goto out_lock;
|
|
|
|
}
|
|
|
|
/* target should not be ancestor of source */
|
|
|
|
if (trap == lower_new_dentry) {
|
|
|
|
rc = -ENOTEMPTY;
|
|
|
|
goto out_lock;
|
|
|
|
}
|
2006-10-04 17:16:22 +08:00
|
|
|
rc = vfs_rename(lower_old_dir_dentry->d_inode, lower_old_dentry,
|
|
|
|
lower_new_dir_dentry->d_inode, lower_new_dentry);
|
|
|
|
if (rc)
|
|
|
|
goto out_lock;
|
2009-12-03 08:51:54 +08:00
|
|
|
fsstack_copy_attr_all(new_dir, lower_new_dir_dentry->d_inode);
|
2006-10-04 17:16:22 +08:00
|
|
|
if (new_dir != old_dir)
|
2009-12-03 08:51:54 +08:00
|
|
|
fsstack_copy_attr_all(old_dir, lower_old_dir_dentry->d_inode);
|
2006-10-04 17:16:22 +08:00
|
|
|
out_lock:
|
|
|
|
unlock_rename(lower_old_dir_dentry, lower_new_dir_dentry);
|
2011-04-13 00:23:09 +08:00
|
|
|
dput(lower_new_dir_dentry);
|
|
|
|
dput(lower_old_dir_dentry);
|
2006-10-04 17:16:22 +08:00
|
|
|
dput(lower_new_dentry);
|
|
|
|
dput(lower_old_dentry);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2010-03-22 13:41:35 +08:00
|
|
|
static int ecryptfs_readlink_lower(struct dentry *dentry, char **buf,
|
|
|
|
size_t *bufsiz)
|
2006-10-04 17:16:22 +08:00
|
|
|
{
|
2010-03-22 13:41:35 +08:00
|
|
|
struct dentry *lower_dentry = ecryptfs_dentry_to_lower(dentry);
|
2006-10-04 17:16:22 +08:00
|
|
|
char *lower_buf;
|
2010-03-22 13:41:35 +08:00
|
|
|
size_t lower_bufsiz = PATH_MAX;
|
2009-01-07 06:42:00 +08:00
|
|
|
mm_segment_t old_fs;
|
|
|
|
int rc;
|
2006-10-04 17:16:22 +08:00
|
|
|
|
2009-04-17 07:35:37 +08:00
|
|
|
lower_buf = kmalloc(lower_bufsiz, GFP_KERNEL);
|
2010-03-22 13:41:35 +08:00
|
|
|
if (!lower_buf) {
|
2006-10-04 17:16:22 +08:00
|
|
|
rc = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
old_fs = get_fs();
|
|
|
|
set_fs(get_ds());
|
|
|
|
rc = lower_dentry->d_inode->i_op->readlink(lower_dentry,
|
|
|
|
(char __user *)lower_buf,
|
2009-04-17 07:35:37 +08:00
|
|
|
lower_bufsiz);
|
2006-10-04 17:16:22 +08:00
|
|
|
set_fs(old_fs);
|
2010-03-22 13:41:35 +08:00
|
|
|
if (rc < 0)
|
|
|
|
goto out;
|
|
|
|
lower_bufsiz = rc;
|
|
|
|
rc = ecryptfs_decode_and_decrypt_filename(buf, bufsiz, dentry,
|
|
|
|
lower_buf, lower_bufsiz);
|
|
|
|
out:
|
2006-10-04 17:16:22 +08:00
|
|
|
kfree(lower_buf);
|
2010-03-22 13:41:35 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
ecryptfs_readlink(struct dentry *dentry, char __user *buf, int bufsiz)
|
|
|
|
{
|
|
|
|
char *kbuf;
|
|
|
|
size_t kbufsiz, copied;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = ecryptfs_readlink_lower(dentry, &kbuf, &kbufsiz);
|
|
|
|
if (rc)
|
|
|
|
goto out;
|
|
|
|
copied = min_t(size_t, bufsiz, kbufsiz);
|
|
|
|
rc = copy_to_user(buf, kbuf, copied) ? -EFAULT : copied;
|
|
|
|
kfree(kbuf);
|
|
|
|
fsstack_copy_attr_atime(dentry->d_inode,
|
|
|
|
ecryptfs_dentry_to_lower(dentry)->d_inode);
|
2006-10-04 17:16:22 +08:00
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void *ecryptfs_follow_link(struct dentry *dentry, struct nameidata *nd)
|
|
|
|
{
|
|
|
|
char *buf;
|
|
|
|
int len = PAGE_SIZE, rc;
|
|
|
|
mm_segment_t old_fs;
|
|
|
|
|
|
|
|
/* Released in ecryptfs_put_link(); only release here on error */
|
|
|
|
buf = kmalloc(len, GFP_KERNEL);
|
|
|
|
if (!buf) {
|
2010-01-12 02:36:14 +08:00
|
|
|
buf = ERR_PTR(-ENOMEM);
|
2006-10-04 17:16:22 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
old_fs = get_fs();
|
|
|
|
set_fs(get_ds());
|
|
|
|
rc = dentry->d_inode->i_op->readlink(dentry, (char __user *)buf, len);
|
|
|
|
set_fs(old_fs);
|
2010-01-12 02:36:14 +08:00
|
|
|
if (rc < 0) {
|
|
|
|
kfree(buf);
|
|
|
|
buf = ERR_PTR(rc);
|
|
|
|
} else
|
2008-12-20 04:47:10 +08:00
|
|
|
buf[rc] = '\0';
|
2006-10-04 17:16:22 +08:00
|
|
|
out:
|
2010-01-12 02:36:14 +08:00
|
|
|
nd_set_link(nd, buf);
|
|
|
|
return NULL;
|
2006-10-04 17:16:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ecryptfs_put_link(struct dentry *dentry, struct nameidata *nd, void *ptr)
|
|
|
|
{
|
2010-01-12 02:36:14 +08:00
|
|
|
char *buf = nd_get_link(nd);
|
|
|
|
if (!IS_ERR(buf)) {
|
|
|
|
/* Free the char* */
|
|
|
|
kfree(buf);
|
|
|
|
}
|
2006-10-04 17:16:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* upper_size_to_lower_size
|
|
|
|
* @crypt_stat: Crypt_stat associated with file
|
|
|
|
* @upper_size: Size of the upper file
|
|
|
|
*
|
2008-02-06 17:38:32 +08:00
|
|
|
* Calculate the required size of the lower file based on the
|
2006-10-04 17:16:22 +08:00
|
|
|
* specified size of the upper file. This calculation is based on the
|
|
|
|
* number of headers in the underlying file and the extent size.
|
|
|
|
*
|
|
|
|
* Returns Calculated size of the lower file.
|
|
|
|
*/
|
|
|
|
static loff_t
|
|
|
|
upper_size_to_lower_size(struct ecryptfs_crypt_stat *crypt_stat,
|
|
|
|
loff_t upper_size)
|
|
|
|
{
|
|
|
|
loff_t lower_size;
|
|
|
|
|
2010-02-11 21:10:38 +08:00
|
|
|
lower_size = ecryptfs_lower_header_size(crypt_stat);
|
2006-10-04 17:16:22 +08:00
|
|
|
if (upper_size != 0) {
|
|
|
|
loff_t num_extents;
|
|
|
|
|
|
|
|
num_extents = upper_size >> crypt_stat->extent_shift;
|
|
|
|
if (upper_size & ~crypt_stat->extent_mask)
|
|
|
|
num_extents++;
|
|
|
|
lower_size += (num_extents * crypt_stat->extent_size);
|
|
|
|
}
|
|
|
|
return lower_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2009-10-15 05:18:27 +08:00
|
|
|
* truncate_upper
|
2006-10-04 17:16:22 +08:00
|
|
|
* @dentry: The ecryptfs layer dentry
|
2009-10-15 05:18:27 +08:00
|
|
|
* @ia: Address of the ecryptfs inode's attributes
|
|
|
|
* @lower_ia: Address of the lower inode's attributes
|
2006-10-04 17:16:22 +08:00
|
|
|
*
|
|
|
|
* Function to handle truncations modifying the size of the file. Note
|
|
|
|
* that the file sizes are interpolated. When expanding, we are simply
|
2009-10-15 05:18:27 +08:00
|
|
|
* writing strings of 0's out. When truncating, we truncate the upper
|
|
|
|
* inode and update the lower_ia according to the page index
|
|
|
|
* interpolations. If ATTR_SIZE is set in lower_ia->ia_valid upon return,
|
|
|
|
* the caller must use lower_ia in a call to notify_change() to perform
|
|
|
|
* the truncation of the lower inode.
|
2006-10-04 17:16:22 +08:00
|
|
|
*
|
|
|
|
* Returns zero on success; non-zero otherwise
|
|
|
|
*/
|
2009-10-15 05:18:27 +08:00
|
|
|
static int truncate_upper(struct dentry *dentry, struct iattr *ia,
|
|
|
|
struct iattr *lower_ia)
|
2006-10-04 17:16:22 +08:00
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
struct inode *inode = dentry->d_inode;
|
|
|
|
struct ecryptfs_crypt_stat *crypt_stat;
|
|
|
|
loff_t i_size = i_size_read(inode);
|
|
|
|
loff_t lower_size_before_truncate;
|
|
|
|
loff_t lower_size_after_truncate;
|
|
|
|
|
2009-10-15 05:18:27 +08:00
|
|
|
if (unlikely((ia->ia_size == i_size))) {
|
|
|
|
lower_ia->ia_valid &= ~ATTR_SIZE;
|
eCryptfs: Add reference counting to lower files
For any given lower inode, eCryptfs keeps only one lower file open and
multiplexes all eCryptfs file operations through that lower file. The
lower file was considered "persistent" and stayed open from the first
lookup through the lifetime of the inode.
This patch keeps the notion of a single, per-inode lower file, but adds
reference counting around the lower file so that it is closed when not
currently in use. If the reference count is at 0 when an operation (such
as open, create, etc.) needs to use the lower file, a new lower file is
opened. Since the file is no longer persistent, all references to the
term persistent file are changed to lower file.
Locking is added around the sections of code that opens the lower file
and assign the pointer in the inode info, as well as the code the fputs
the lower file when all eCryptfs users are done with it.
This patch is needed to fix issues, when mounted on top of the NFSv3
client, where the lower file is left silly renamed until the eCryptfs
inode is destroyed.
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
2011-04-15 04:35:11 +08:00
|
|
|
return 0;
|
2009-10-15 05:18:27 +08:00
|
|
|
}
|
2011-05-24 16:49:02 +08:00
|
|
|
rc = ecryptfs_get_lower_file(dentry, inode);
|
eCryptfs: Add reference counting to lower files
For any given lower inode, eCryptfs keeps only one lower file open and
multiplexes all eCryptfs file operations through that lower file. The
lower file was considered "persistent" and stayed open from the first
lookup through the lifetime of the inode.
This patch keeps the notion of a single, per-inode lower file, but adds
reference counting around the lower file so that it is closed when not
currently in use. If the reference count is at 0 when an operation (such
as open, create, etc.) needs to use the lower file, a new lower file is
opened. Since the file is no longer persistent, all references to the
term persistent file are changed to lower file.
Locking is added around the sections of code that opens the lower file
and assign the pointer in the inode info, as well as the code the fputs
the lower file when all eCryptfs users are done with it.
This patch is needed to fix issues, when mounted on top of the NFSv3
client, where the lower file is left silly renamed until the eCryptfs
inode is destroyed.
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
2011-04-15 04:35:11 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
2006-10-04 17:16:22 +08:00
|
|
|
crypt_stat = &ecryptfs_inode_to_private(dentry->d_inode)->crypt_stat;
|
|
|
|
/* Switch on growing or shrinking file */
|
2009-10-15 05:18:27 +08:00
|
|
|
if (ia->ia_size > i_size) {
|
2007-10-16 16:28:10 +08:00
|
|
|
char zero[] = { 0x00 };
|
|
|
|
|
2009-10-15 05:18:27 +08:00
|
|
|
lower_ia->ia_valid &= ~ATTR_SIZE;
|
2007-10-16 16:28:10 +08:00
|
|
|
/* Write a single 0 at the last position of the file;
|
|
|
|
* this triggers code that will fill in 0's throughout
|
|
|
|
* the intermediate portion of the previous end of the
|
|
|
|
* file and the new and of the file */
|
2010-05-21 23:09:58 +08:00
|
|
|
rc = ecryptfs_write(inode, zero,
|
2009-10-15 05:18:27 +08:00
|
|
|
(ia->ia_size - 1), 1);
|
|
|
|
} else { /* ia->ia_size < i_size_read(inode) */
|
|
|
|
/* We're chopping off all the pages down to the page
|
|
|
|
* in which ia->ia_size is located. Fill in the end of
|
|
|
|
* that page from (ia->ia_size & ~PAGE_CACHE_MASK) to
|
2007-10-16 16:28:10 +08:00
|
|
|
* PAGE_CACHE_SIZE with zeros. */
|
|
|
|
size_t num_zeros = (PAGE_CACHE_SIZE
|
2009-10-15 05:18:27 +08:00
|
|
|
- (ia->ia_size & ~PAGE_CACHE_MASK));
|
2007-10-16 16:28:10 +08:00
|
|
|
|
2010-06-04 17:30:04 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX(truncate) this should really happen at the begginning
|
|
|
|
* of ->setattr. But the code is too messy to that as part
|
|
|
|
* of a larger patch. ecryptfs is also totally missing out
|
|
|
|
* on the inode_change_ok check at the beginning of
|
|
|
|
* ->setattr while would include this.
|
|
|
|
*/
|
|
|
|
rc = inode_newsize_ok(inode, ia->ia_size);
|
|
|
|
if (rc)
|
|
|
|
goto out;
|
|
|
|
|
2009-04-14 04:29:27 +08:00
|
|
|
if (!(crypt_stat->flags & ECRYPTFS_ENCRYPTED)) {
|
2010-06-04 17:30:04 +08:00
|
|
|
truncate_setsize(inode, ia->ia_size);
|
2009-10-15 05:18:27 +08:00
|
|
|
lower_ia->ia_size = ia->ia_size;
|
|
|
|
lower_ia->ia_valid |= ATTR_SIZE;
|
2010-05-21 23:09:58 +08:00
|
|
|
goto out;
|
2009-04-14 04:29:27 +08:00
|
|
|
}
|
2007-10-16 16:28:10 +08:00
|
|
|
if (num_zeros) {
|
|
|
|
char *zeros_virt;
|
|
|
|
|
|
|
|
zeros_virt = kzalloc(num_zeros, GFP_KERNEL);
|
|
|
|
if (!zeros_virt) {
|
|
|
|
rc = -ENOMEM;
|
2010-05-21 23:09:58 +08:00
|
|
|
goto out;
|
2007-10-16 16:28:10 +08:00
|
|
|
}
|
2010-05-21 23:09:58 +08:00
|
|
|
rc = ecryptfs_write(inode, zeros_virt,
|
2009-10-15 05:18:27 +08:00
|
|
|
ia->ia_size, num_zeros);
|
2007-10-16 16:28:10 +08:00
|
|
|
kfree(zeros_virt);
|
2007-10-16 16:28:06 +08:00
|
|
|
if (rc) {
|
2007-06-28 05:09:44 +08:00
|
|
|
printk(KERN_ERR "Error attempting to zero out "
|
|
|
|
"the remainder of the end page on "
|
|
|
|
"reducing truncate; rc = [%d]\n", rc);
|
2010-05-21 23:09:58 +08:00
|
|
|
goto out;
|
2007-06-28 05:09:44 +08:00
|
|
|
}
|
|
|
|
}
|
2010-06-04 17:30:04 +08:00
|
|
|
truncate_setsize(inode, ia->ia_size);
|
2007-10-16 16:28:08 +08:00
|
|
|
rc = ecryptfs_write_inode_size_to_metadata(inode);
|
2007-02-12 16:53:46 +08:00
|
|
|
if (rc) {
|
|
|
|
printk(KERN_ERR "Problem with "
|
|
|
|
"ecryptfs_write_inode_size_to_metadata; "
|
|
|
|
"rc = [%d]\n", rc);
|
2010-05-21 23:09:58 +08:00
|
|
|
goto out;
|
2007-02-12 16:53:46 +08:00
|
|
|
}
|
2006-10-04 17:16:22 +08:00
|
|
|
/* We are reducing the size of the ecryptfs file, and need to
|
|
|
|
* know if we need to reduce the size of the lower file. */
|
|
|
|
lower_size_before_truncate =
|
|
|
|
upper_size_to_lower_size(crypt_stat, i_size);
|
|
|
|
lower_size_after_truncate =
|
2009-10-15 05:18:27 +08:00
|
|
|
upper_size_to_lower_size(crypt_stat, ia->ia_size);
|
|
|
|
if (lower_size_after_truncate < lower_size_before_truncate) {
|
|
|
|
lower_ia->ia_size = lower_size_after_truncate;
|
|
|
|
lower_ia->ia_valid |= ATTR_SIZE;
|
|
|
|
} else
|
|
|
|
lower_ia->ia_valid &= ~ATTR_SIZE;
|
2006-10-04 17:16:22 +08:00
|
|
|
}
|
|
|
|
out:
|
eCryptfs: Add reference counting to lower files
For any given lower inode, eCryptfs keeps only one lower file open and
multiplexes all eCryptfs file operations through that lower file. The
lower file was considered "persistent" and stayed open from the first
lookup through the lifetime of the inode.
This patch keeps the notion of a single, per-inode lower file, but adds
reference counting around the lower file so that it is closed when not
currently in use. If the reference count is at 0 when an operation (such
as open, create, etc.) needs to use the lower file, a new lower file is
opened. Since the file is no longer persistent, all references to the
term persistent file are changed to lower file.
Locking is added around the sections of code that opens the lower file
and assign the pointer in the inode info, as well as the code the fputs
the lower file when all eCryptfs users are done with it.
This patch is needed to fix issues, when mounted on top of the NFSv3
client, where the lower file is left silly renamed until the eCryptfs
inode is destroyed.
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
2011-04-15 04:35:11 +08:00
|
|
|
ecryptfs_put_lower_file(inode);
|
2006-10-04 17:16:22 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2009-10-15 05:18:27 +08:00
|
|
|
/**
|
|
|
|
* ecryptfs_truncate
|
|
|
|
* @dentry: The ecryptfs layer dentry
|
|
|
|
* @new_length: The length to expand the file to
|
|
|
|
*
|
|
|
|
* Simple function that handles the truncation of an eCryptfs inode and
|
|
|
|
* its corresponding lower inode.
|
|
|
|
*
|
|
|
|
* Returns zero on success; non-zero otherwise
|
|
|
|
*/
|
|
|
|
int ecryptfs_truncate(struct dentry *dentry, loff_t new_length)
|
|
|
|
{
|
|
|
|
struct iattr ia = { .ia_valid = ATTR_SIZE, .ia_size = new_length };
|
|
|
|
struct iattr lower_ia = { .ia_valid = 0 };
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = truncate_upper(dentry, &ia, &lower_ia);
|
|
|
|
if (!rc && lower_ia.ia_valid & ATTR_SIZE) {
|
|
|
|
struct dentry *lower_dentry = ecryptfs_dentry_to_lower(dentry);
|
|
|
|
|
|
|
|
mutex_lock(&lower_dentry->d_inode->i_mutex);
|
|
|
|
rc = notify_change(lower_dentry, &lower_ia);
|
|
|
|
mutex_unlock(&lower_dentry->d_inode->i_mutex);
|
|
|
|
}
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2006-10-04 17:16:22 +08:00
|
|
|
static int
|
2011-01-07 14:49:58 +08:00
|
|
|
ecryptfs_permission(struct inode *inode, int mask, unsigned int flags)
|
2006-10-04 17:16:22 +08:00
|
|
|
{
|
2011-01-07 14:49:58 +08:00
|
|
|
if (flags & IPERM_FLAG_RCU)
|
|
|
|
return -ECHILD;
|
2008-07-22 12:07:17 +08:00
|
|
|
return inode_permission(ecryptfs_inode_to_lower(inode), mask);
|
2006-10-04 17:16:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ecryptfs_setattr
|
|
|
|
* @dentry: dentry handle to the inode to modify
|
|
|
|
* @ia: Structure with flags of what to change and values
|
|
|
|
*
|
|
|
|
* Updates the metadata of an inode. If the update is to the size
|
|
|
|
* i.e. truncation, then ecryptfs_truncate will handle the size modification
|
|
|
|
* of both the ecryptfs inode and the lower inode.
|
|
|
|
*
|
|
|
|
* All other metadata changes will be passed right to the lower filesystem,
|
|
|
|
* and we will just update our inode to look like the lower.
|
|
|
|
*/
|
|
|
|
static int ecryptfs_setattr(struct dentry *dentry, struct iattr *ia)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
struct dentry *lower_dentry;
|
2009-10-15 05:18:27 +08:00
|
|
|
struct iattr lower_ia;
|
2006-10-04 17:16:22 +08:00
|
|
|
struct inode *inode;
|
|
|
|
struct inode *lower_inode;
|
|
|
|
struct ecryptfs_crypt_stat *crypt_stat;
|
|
|
|
|
|
|
|
crypt_stat = &ecryptfs_inode_to_private(dentry->d_inode)->crypt_stat;
|
2007-06-28 05:09:44 +08:00
|
|
|
if (!(crypt_stat->flags & ECRYPTFS_STRUCT_INITIALIZED))
|
|
|
|
ecryptfs_init_crypt_stat(crypt_stat);
|
2006-10-04 17:16:22 +08:00
|
|
|
inode = dentry->d_inode;
|
|
|
|
lower_inode = ecryptfs_inode_to_lower(inode);
|
2007-06-28 05:09:44 +08:00
|
|
|
lower_dentry = ecryptfs_dentry_to_lower(dentry);
|
|
|
|
mutex_lock(&crypt_stat->cs_mutex);
|
|
|
|
if (S_ISDIR(dentry->d_inode->i_mode))
|
|
|
|
crypt_stat->flags &= ~(ECRYPTFS_ENCRYPTED);
|
2007-07-19 16:47:54 +08:00
|
|
|
else if (S_ISREG(dentry->d_inode->i_mode)
|
|
|
|
&& (!(crypt_stat->flags & ECRYPTFS_POLICY_APPLIED)
|
|
|
|
|| !(crypt_stat->flags & ECRYPTFS_KEY_VALID))) {
|
2007-06-28 05:09:44 +08:00
|
|
|
struct ecryptfs_mount_crypt_stat *mount_crypt_stat;
|
|
|
|
|
|
|
|
mount_crypt_stat = &ecryptfs_superblock_to_private(
|
|
|
|
dentry->d_sb)->mount_crypt_stat;
|
2011-05-24 16:49:02 +08:00
|
|
|
rc = ecryptfs_get_lower_file(dentry, inode);
|
eCryptfs: Add reference counting to lower files
For any given lower inode, eCryptfs keeps only one lower file open and
multiplexes all eCryptfs file operations through that lower file. The
lower file was considered "persistent" and stayed open from the first
lookup through the lifetime of the inode.
This patch keeps the notion of a single, per-inode lower file, but adds
reference counting around the lower file so that it is closed when not
currently in use. If the reference count is at 0 when an operation (such
as open, create, etc.) needs to use the lower file, a new lower file is
opened. Since the file is no longer persistent, all references to the
term persistent file are changed to lower file.
Locking is added around the sections of code that opens the lower file
and assign the pointer in the inode info, as well as the code the fputs
the lower file when all eCryptfs users are done with it.
This patch is needed to fix issues, when mounted on top of the NFSv3
client, where the lower file is left silly renamed until the eCryptfs
inode is destroyed.
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
2011-04-15 04:35:11 +08:00
|
|
|
if (rc) {
|
|
|
|
mutex_unlock(&crypt_stat->cs_mutex);
|
|
|
|
goto out;
|
|
|
|
}
|
2007-10-16 16:28:10 +08:00
|
|
|
rc = ecryptfs_read_metadata(dentry);
|
eCryptfs: Add reference counting to lower files
For any given lower inode, eCryptfs keeps only one lower file open and
multiplexes all eCryptfs file operations through that lower file. The
lower file was considered "persistent" and stayed open from the first
lookup through the lifetime of the inode.
This patch keeps the notion of a single, per-inode lower file, but adds
reference counting around the lower file so that it is closed when not
currently in use. If the reference count is at 0 when an operation (such
as open, create, etc.) needs to use the lower file, a new lower file is
opened. Since the file is no longer persistent, all references to the
term persistent file are changed to lower file.
Locking is added around the sections of code that opens the lower file
and assign the pointer in the inode info, as well as the code the fputs
the lower file when all eCryptfs users are done with it.
This patch is needed to fix issues, when mounted on top of the NFSv3
client, where the lower file is left silly renamed until the eCryptfs
inode is destroyed.
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
2011-04-15 04:35:11 +08:00
|
|
|
ecryptfs_put_lower_file(inode);
|
2007-10-16 16:28:06 +08:00
|
|
|
if (rc) {
|
2007-06-28 05:09:44 +08:00
|
|
|
if (!(mount_crypt_stat->flags
|
|
|
|
& ECRYPTFS_PLAINTEXT_PASSTHROUGH_ENABLED)) {
|
|
|
|
rc = -EIO;
|
2008-02-06 17:38:35 +08:00
|
|
|
printk(KERN_WARNING "Either the lower file "
|
2007-06-28 05:09:44 +08:00
|
|
|
"is not in a valid eCryptfs format, "
|
2008-02-06 17:38:35 +08:00
|
|
|
"or the key could not be retrieved. "
|
|
|
|
"Plaintext passthrough mode is not "
|
2007-06-28 05:09:44 +08:00
|
|
|
"enabled; returning -EIO\n");
|
|
|
|
mutex_unlock(&crypt_stat->cs_mutex);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
rc = 0;
|
2011-03-16 03:54:00 +08:00
|
|
|
crypt_stat->flags &= ~(ECRYPTFS_I_SIZE_INITIALIZED
|
|
|
|
| ECRYPTFS_ENCRYPTED);
|
2007-06-28 05:09:44 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
mutex_unlock(&crypt_stat->cs_mutex);
|
2011-04-23 02:08:00 +08:00
|
|
|
if (S_ISREG(inode->i_mode)) {
|
|
|
|
rc = filemap_write_and_wait(inode->i_mapping);
|
|
|
|
if (rc)
|
|
|
|
goto out;
|
|
|
|
fsstack_copy_attr_all(inode, lower_inode);
|
|
|
|
}
|
2009-10-15 05:18:27 +08:00
|
|
|
memcpy(&lower_ia, ia, sizeof(lower_ia));
|
|
|
|
if (ia->ia_valid & ATTR_FILE)
|
|
|
|
lower_ia.ia_file = ecryptfs_file_to_lower(ia->ia_file);
|
2006-10-04 17:16:22 +08:00
|
|
|
if (ia->ia_valid & ATTR_SIZE) {
|
2009-10-15 05:18:27 +08:00
|
|
|
rc = truncate_upper(dentry, ia, &lower_ia);
|
2006-10-04 17:16:22 +08:00
|
|
|
if (rc < 0)
|
|
|
|
goto out;
|
|
|
|
}
|
2007-10-18 18:05:17 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* mode change is for clearing setuid/setgid bits. Allow lower fs
|
|
|
|
* to interpret this in its own way.
|
|
|
|
*/
|
2009-10-15 05:18:27 +08:00
|
|
|
if (lower_ia.ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID))
|
|
|
|
lower_ia.ia_valid &= ~ATTR_MODE;
|
2007-10-18 18:05:17 +08:00
|
|
|
|
2008-04-29 15:59:48 +08:00
|
|
|
mutex_lock(&lower_dentry->d_inode->i_mutex);
|
2009-10-15 05:18:27 +08:00
|
|
|
rc = notify_change(lower_dentry, &lower_ia);
|
2008-04-29 15:59:48 +08:00
|
|
|
mutex_unlock(&lower_dentry->d_inode->i_mutex);
|
2006-10-04 17:16:22 +08:00
|
|
|
out:
|
2009-12-03 08:51:54 +08:00
|
|
|
fsstack_copy_attr_all(inode, lower_inode);
|
2006-10-04 17:16:22 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2010-03-22 13:41:35 +08:00
|
|
|
int ecryptfs_getattr_link(struct vfsmount *mnt, struct dentry *dentry,
|
|
|
|
struct kstat *stat)
|
|
|
|
{
|
|
|
|
struct ecryptfs_mount_crypt_stat *mount_crypt_stat;
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
mount_crypt_stat = &ecryptfs_superblock_to_private(
|
|
|
|
dentry->d_sb)->mount_crypt_stat;
|
|
|
|
generic_fillattr(dentry->d_inode, stat);
|
|
|
|
if (mount_crypt_stat->flags & ECRYPTFS_GLOBAL_ENCRYPT_FILENAMES) {
|
|
|
|
char *target;
|
|
|
|
size_t targetsiz;
|
|
|
|
|
|
|
|
rc = ecryptfs_readlink_lower(dentry, &target, &targetsiz);
|
|
|
|
if (!rc) {
|
|
|
|
kfree(target);
|
|
|
|
stat->size = targetsiz;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2009-11-04 16:48:01 +08:00
|
|
|
int ecryptfs_getattr(struct vfsmount *mnt, struct dentry *dentry,
|
|
|
|
struct kstat *stat)
|
|
|
|
{
|
|
|
|
struct kstat lower_stat;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = vfs_getattr(ecryptfs_dentry_to_lower_mnt(dentry),
|
|
|
|
ecryptfs_dentry_to_lower(dentry), &lower_stat);
|
|
|
|
if (!rc) {
|
2011-01-12 02:43:42 +08:00
|
|
|
fsstack_copy_attr_all(dentry->d_inode,
|
|
|
|
ecryptfs_inode_to_lower(dentry->d_inode));
|
2009-11-04 16:48:01 +08:00
|
|
|
generic_fillattr(dentry->d_inode, stat);
|
|
|
|
stat->blocks = lower_stat.blocks;
|
|
|
|
}
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2007-02-12 16:53:46 +08:00
|
|
|
int
|
2006-10-04 17:16:22 +08:00
|
|
|
ecryptfs_setxattr(struct dentry *dentry, const char *name, const void *value,
|
|
|
|
size_t size, int flags)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
struct dentry *lower_dentry;
|
|
|
|
|
|
|
|
lower_dentry = ecryptfs_dentry_to_lower(dentry);
|
|
|
|
if (!lower_dentry->d_inode->i_op->setxattr) {
|
2010-03-24 00:51:38 +08:00
|
|
|
rc = -EOPNOTSUPP;
|
2006-10-04 17:16:22 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2010-10-06 00:53:45 +08:00
|
|
|
|
|
|
|
rc = vfs_setxattr(lower_dentry, name, value, size, flags);
|
2006-10-04 17:16:22 +08:00
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2007-10-16 16:28:10 +08:00
|
|
|
ssize_t
|
|
|
|
ecryptfs_getxattr_lower(struct dentry *lower_dentry, const char *name,
|
|
|
|
void *value, size_t size)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
if (!lower_dentry->d_inode->i_op->getxattr) {
|
2010-03-24 00:51:38 +08:00
|
|
|
rc = -EOPNOTSUPP;
|
2007-10-16 16:28:10 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
mutex_lock(&lower_dentry->d_inode->i_mutex);
|
|
|
|
rc = lower_dentry->d_inode->i_op->getxattr(lower_dentry, name, value,
|
|
|
|
size);
|
|
|
|
mutex_unlock(&lower_dentry->d_inode->i_mutex);
|
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2008-02-06 17:38:32 +08:00
|
|
|
static ssize_t
|
2006-10-04 17:16:22 +08:00
|
|
|
ecryptfs_getxattr(struct dentry *dentry, const char *name, void *value,
|
|
|
|
size_t size)
|
|
|
|
{
|
2007-10-16 16:28:10 +08:00
|
|
|
return ecryptfs_getxattr_lower(ecryptfs_dentry_to_lower(dentry), name,
|
|
|
|
value, size);
|
2006-10-04 17:16:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t
|
|
|
|
ecryptfs_listxattr(struct dentry *dentry, char *list, size_t size)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
struct dentry *lower_dentry;
|
|
|
|
|
|
|
|
lower_dentry = ecryptfs_dentry_to_lower(dentry);
|
|
|
|
if (!lower_dentry->d_inode->i_op->listxattr) {
|
2010-03-24 00:51:38 +08:00
|
|
|
rc = -EOPNOTSUPP;
|
2006-10-04 17:16:22 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
mutex_lock(&lower_dentry->d_inode->i_mutex);
|
|
|
|
rc = lower_dentry->d_inode->i_op->listxattr(lower_dentry, list, size);
|
|
|
|
mutex_unlock(&lower_dentry->d_inode->i_mutex);
|
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ecryptfs_removexattr(struct dentry *dentry, const char *name)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
struct dentry *lower_dentry;
|
|
|
|
|
|
|
|
lower_dentry = ecryptfs_dentry_to_lower(dentry);
|
|
|
|
if (!lower_dentry->d_inode->i_op->removexattr) {
|
2010-03-24 00:51:38 +08:00
|
|
|
rc = -EOPNOTSUPP;
|
2006-10-04 17:16:22 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
mutex_lock(&lower_dentry->d_inode->i_mutex);
|
|
|
|
rc = lower_dentry->d_inode->i_op->removexattr(lower_dentry, name);
|
|
|
|
mutex_unlock(&lower_dentry->d_inode->i_mutex);
|
|
|
|
out:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2007-02-12 16:55:38 +08:00
|
|
|
const struct inode_operations ecryptfs_symlink_iops = {
|
2006-10-04 17:16:22 +08:00
|
|
|
.readlink = ecryptfs_readlink,
|
|
|
|
.follow_link = ecryptfs_follow_link,
|
|
|
|
.put_link = ecryptfs_put_link,
|
|
|
|
.permission = ecryptfs_permission,
|
|
|
|
.setattr = ecryptfs_setattr,
|
2010-03-22 13:41:35 +08:00
|
|
|
.getattr = ecryptfs_getattr_link,
|
2006-10-04 17:16:22 +08:00
|
|
|
.setxattr = ecryptfs_setxattr,
|
|
|
|
.getxattr = ecryptfs_getxattr,
|
|
|
|
.listxattr = ecryptfs_listxattr,
|
|
|
|
.removexattr = ecryptfs_removexattr
|
|
|
|
};
|
|
|
|
|
2007-02-12 16:55:38 +08:00
|
|
|
const struct inode_operations ecryptfs_dir_iops = {
|
2006-10-04 17:16:22 +08:00
|
|
|
.create = ecryptfs_create,
|
|
|
|
.lookup = ecryptfs_lookup,
|
|
|
|
.link = ecryptfs_link,
|
|
|
|
.unlink = ecryptfs_unlink,
|
|
|
|
.symlink = ecryptfs_symlink,
|
|
|
|
.mkdir = ecryptfs_mkdir,
|
|
|
|
.rmdir = ecryptfs_rmdir,
|
|
|
|
.mknod = ecryptfs_mknod,
|
|
|
|
.rename = ecryptfs_rename,
|
|
|
|
.permission = ecryptfs_permission,
|
|
|
|
.setattr = ecryptfs_setattr,
|
|
|
|
.setxattr = ecryptfs_setxattr,
|
|
|
|
.getxattr = ecryptfs_getxattr,
|
|
|
|
.listxattr = ecryptfs_listxattr,
|
|
|
|
.removexattr = ecryptfs_removexattr
|
|
|
|
};
|
|
|
|
|
2007-02-12 16:55:38 +08:00
|
|
|
const struct inode_operations ecryptfs_main_iops = {
|
2006-10-04 17:16:22 +08:00
|
|
|
.permission = ecryptfs_permission,
|
|
|
|
.setattr = ecryptfs_setattr,
|
2009-11-04 16:48:01 +08:00
|
|
|
.getattr = ecryptfs_getattr,
|
2006-10-04 17:16:22 +08:00
|
|
|
.setxattr = ecryptfs_setxattr,
|
|
|
|
.getxattr = ecryptfs_getxattr,
|
|
|
|
.listxattr = ecryptfs_listxattr,
|
|
|
|
.removexattr = ecryptfs_removexattr
|
|
|
|
};
|