Thomas Gleixner | 1a59d1b8 | 2019-05-27 08:55:05 +0200 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 2 | /** |
| 3 | * eCryptfs: Linux filesystem encryption layer |
| 4 | * |
| 5 | * Copyright (C) 1997-2004 Erez Zadok |
| 6 | * Copyright (C) 2001-2004 Stony Brook University |
Michael Halcrow | dd2a3b7 | 2007-02-12 00:53:46 -0800 | [diff] [blame] | 7 | * Copyright (C) 2004-2007 International Business Machines Corp. |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 8 | * Author(s): Michael A. Halcrow <mahalcro@us.ibm.com> |
| 9 | * Michael C. Thompsion <mcthomps@us.ibm.com> |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 10 | */ |
| 11 | |
| 12 | #include <linux/file.h> |
| 13 | #include <linux/vmalloc.h> |
| 14 | #include <linux/pagemap.h> |
| 15 | #include <linux/dcache.h> |
| 16 | #include <linux/namei.h> |
| 17 | #include <linux/mount.h> |
Josef "Jeff" Sipek | 0cc72dc | 2006-12-08 02:36:31 -0800 | [diff] [blame] | 18 | #include <linux/fs_stack.h> |
Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 19 | #include <linux/slab.h> |
Roberto Sassu | 48b512e | 2010-10-05 18:53:45 +0200 | [diff] [blame] | 20 | #include <linux/xattr.h> |
Harvey Harrison | 0a688ad | 2008-07-23 21:30:07 -0700 | [diff] [blame] | 21 | #include <asm/unaligned.h> |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 22 | #include "ecryptfs_kernel.h" |
| 23 | |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 24 | static int lock_parent(struct dentry *dentry, |
| 25 | struct dentry **lower_dentry, |
| 26 | struct inode **lower_dir) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 27 | { |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 28 | struct dentry *lower_dir_dentry; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 29 | |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 30 | lower_dir_dentry = ecryptfs_dentry_to_lower(dentry->d_parent); |
| 31 | *lower_dir = d_inode(lower_dir_dentry); |
| 32 | *lower_dentry = ecryptfs_dentry_to_lower(dentry); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 33 | |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 34 | inode_lock_nested(*lower_dir, I_MUTEX_PARENT); |
| 35 | return (*lower_dentry)->d_parent == lower_dir_dentry ? 0 : -EINVAL; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 36 | } |
| 37 | |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 38 | static int ecryptfs_inode_test(struct inode *inode, void *lower_inode) |
| 39 | { |
Himangi Saraogi | c4cf3ba | 2014-06-27 01:11:59 +0530 | [diff] [blame] | 40 | return ecryptfs_inode_to_lower(inode) == lower_inode; |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 41 | } |
| 42 | |
Tyler Hicks | 5ccf920 | 2011-05-24 02:16:51 -0500 | [diff] [blame] | 43 | static int ecryptfs_inode_set(struct inode *inode, void *opaque) |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 44 | { |
Tyler Hicks | 5ccf920 | 2011-05-24 02:16:51 -0500 | [diff] [blame] | 45 | struct inode *lower_inode = opaque; |
| 46 | |
| 47 | ecryptfs_set_inode_lower(inode, lower_inode); |
| 48 | fsstack_copy_attr_all(inode, lower_inode); |
| 49 | /* i_size will be overwritten for encrypted regular files */ |
| 50 | fsstack_copy_inode_size(inode, lower_inode); |
| 51 | inode->i_ino = lower_inode->i_ino; |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 52 | inode->i_mapping->a_ops = &ecryptfs_aops; |
Tyler Hicks | 5ccf920 | 2011-05-24 02:16:51 -0500 | [diff] [blame] | 53 | |
| 54 | if (S_ISLNK(inode->i_mode)) |
| 55 | inode->i_op = &ecryptfs_symlink_iops; |
| 56 | else if (S_ISDIR(inode->i_mode)) |
| 57 | inode->i_op = &ecryptfs_dir_iops; |
| 58 | else |
| 59 | inode->i_op = &ecryptfs_main_iops; |
| 60 | |
| 61 | if (S_ISDIR(inode->i_mode)) |
| 62 | inode->i_fop = &ecryptfs_dir_fops; |
| 63 | else if (special_file(inode->i_mode)) |
| 64 | init_special_inode(inode, inode->i_mode, inode->i_rdev); |
| 65 | else |
| 66 | inode->i_fop = &ecryptfs_main_fops; |
| 67 | |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 68 | return 0; |
| 69 | } |
| 70 | |
Tyler Hicks | 5ccf920 | 2011-05-24 02:16:51 -0500 | [diff] [blame] | 71 | static struct inode *__ecryptfs_get_inode(struct inode *lower_inode, |
| 72 | struct super_block *sb) |
| 73 | { |
| 74 | struct inode *inode; |
| 75 | |
| 76 | if (lower_inode->i_sb != ecryptfs_superblock_to_lower(sb)) |
| 77 | return ERR_PTR(-EXDEV); |
| 78 | if (!igrab(lower_inode)) |
| 79 | return ERR_PTR(-ESTALE); |
| 80 | inode = iget5_locked(sb, (unsigned long)lower_inode, |
| 81 | ecryptfs_inode_test, ecryptfs_inode_set, |
| 82 | lower_inode); |
| 83 | if (!inode) { |
| 84 | iput(lower_inode); |
| 85 | return ERR_PTR(-EACCES); |
| 86 | } |
| 87 | if (!(inode->i_state & I_NEW)) |
| 88 | iput(lower_inode); |
| 89 | |
| 90 | return inode; |
| 91 | } |
| 92 | |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 93 | struct inode *ecryptfs_get_inode(struct inode *lower_inode, |
| 94 | struct super_block *sb) |
| 95 | { |
Tyler Hicks | 5ccf920 | 2011-05-24 02:16:51 -0500 | [diff] [blame] | 96 | struct inode *inode = __ecryptfs_get_inode(lower_inode, sb); |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 97 | |
Tyler Hicks | 5ccf920 | 2011-05-24 02:16:51 -0500 | [diff] [blame] | 98 | if (!IS_ERR(inode) && (inode->i_state & I_NEW)) |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 99 | unlock_new_inode(inode); |
Tyler Hicks | 5ccf920 | 2011-05-24 02:16:51 -0500 | [diff] [blame] | 100 | |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 101 | return inode; |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 102 | } |
| 103 | |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 104 | /** |
| 105 | * ecryptfs_interpose |
| 106 | * @lower_dentry: Existing dentry in the lower filesystem |
| 107 | * @dentry: ecryptfs' dentry |
| 108 | * @sb: ecryptfs's super_block |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 109 | * |
| 110 | * Interposes upper and lower dentries. |
| 111 | * |
| 112 | * Returns zero on success; non-zero otherwise |
| 113 | */ |
| 114 | static int ecryptfs_interpose(struct dentry *lower_dentry, |
Tyler Hicks | 5ccf920 | 2011-05-24 02:16:51 -0500 | [diff] [blame] | 115 | struct dentry *dentry, struct super_block *sb) |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 116 | { |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 117 | struct inode *inode = ecryptfs_get_inode(d_inode(lower_dentry), sb); |
Tyler Hicks | 5ccf920 | 2011-05-24 02:16:51 -0500 | [diff] [blame] | 118 | |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 119 | if (IS_ERR(inode)) |
| 120 | return PTR_ERR(inode); |
Tyler Hicks | 5ccf920 | 2011-05-24 02:16:51 -0500 | [diff] [blame] | 121 | d_instantiate(dentry, inode); |
| 122 | |
Tyler Hicks | c4f7907 | 2011-05-23 21:18:20 -0500 | [diff] [blame] | 123 | return 0; |
| 124 | } |
| 125 | |
Tyler Hicks | 8bc2d3c | 2012-05-22 15:09:50 -0500 | [diff] [blame] | 126 | static int ecryptfs_do_unlink(struct inode *dir, struct dentry *dentry, |
| 127 | struct inode *inode) |
| 128 | { |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 129 | struct dentry *lower_dentry; |
| 130 | struct inode *lower_dir; |
Tyler Hicks | 8bc2d3c | 2012-05-22 15:09:50 -0500 | [diff] [blame] | 131 | int rc; |
| 132 | |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 133 | rc = lock_parent(dentry, &lower_dentry, &lower_dir); |
Al Viro | bcf0d9d | 2019-11-03 12:07:15 -0500 | [diff] [blame] | 134 | dget(lower_dentry); // don't even try to make the lower negative |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 135 | if (!rc) { |
| 136 | if (d_unhashed(lower_dentry)) |
| 137 | rc = -EINVAL; |
| 138 | else |
| 139 | rc = vfs_unlink(&init_user_ns, lower_dir, lower_dentry, |
| 140 | NULL); |
| 141 | } |
Tyler Hicks | 8bc2d3c | 2012-05-22 15:09:50 -0500 | [diff] [blame] | 142 | if (rc) { |
| 143 | printk(KERN_ERR "Error in vfs_unlink; rc = [%d]\n", rc); |
| 144 | goto out_unlock; |
| 145 | } |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 146 | fsstack_copy_attr_times(dir, lower_dir); |
Tyler Hicks | 8bc2d3c | 2012-05-22 15:09:50 -0500 | [diff] [blame] | 147 | set_nlink(inode, ecryptfs_inode_to_lower(inode)->i_nlink); |
| 148 | inode->i_ctime = dir->i_ctime; |
Tyler Hicks | 8bc2d3c | 2012-05-22 15:09:50 -0500 | [diff] [blame] | 149 | out_unlock: |
Tyler Hicks | 8bc2d3c | 2012-05-22 15:09:50 -0500 | [diff] [blame] | 150 | dput(lower_dentry); |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 151 | inode_unlock(lower_dir); |
Al Viro | bcf0d9d | 2019-11-03 12:07:15 -0500 | [diff] [blame] | 152 | if (!rc) |
| 153 | d_drop(dentry); |
Tyler Hicks | 8bc2d3c | 2012-05-22 15:09:50 -0500 | [diff] [blame] | 154 | return rc; |
| 155 | } |
| 156 | |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 157 | /** |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 158 | * ecryptfs_do_create |
| 159 | * @directory_inode: inode of the new file's dentry's parent in ecryptfs |
| 160 | * @ecryptfs_dentry: New file's dentry in ecryptfs |
| 161 | * @mode: The mode of the new file |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 162 | * |
| 163 | * Creates the underlying file and the eCryptfs inode which will link to |
| 164 | * it. It will also update the eCryptfs directory inode to mimic the |
| 165 | * stat of the lower directory inode. |
| 166 | * |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 167 | * Returns the new eCryptfs inode on success; an ERR_PTR on error condition |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 168 | */ |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 169 | static struct inode * |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 170 | ecryptfs_do_create(struct inode *directory_inode, |
Al Viro | 175a4eb | 2011-07-26 03:30:54 -0400 | [diff] [blame] | 171 | struct dentry *ecryptfs_dentry, umode_t mode) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 172 | { |
| 173 | int rc; |
| 174 | struct dentry *lower_dentry; |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 175 | struct inode *lower_dir; |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 176 | struct inode *inode; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 177 | |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 178 | rc = lock_parent(ecryptfs_dentry, &lower_dentry, &lower_dir); |
| 179 | if (!rc) |
| 180 | rc = vfs_create(&init_user_ns, lower_dir, |
| 181 | lower_dentry, mode, true); |
Michael Halcrow | 4981e08 | 2007-10-16 01:28:09 -0700 | [diff] [blame] | 182 | if (rc) { |
Michael Halcrow | caeeeec | 2008-01-08 15:33:02 -0800 | [diff] [blame] | 183 | printk(KERN_ERR "%s: Failure to create dentry in lower fs; " |
Harvey Harrison | 18d1dbf | 2008-04-29 00:59:48 -0700 | [diff] [blame] | 184 | "rc = [%d]\n", __func__, rc); |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 185 | inode = ERR_PTR(rc); |
Michael Halcrow | caeeeec | 2008-01-08 15:33:02 -0800 | [diff] [blame] | 186 | goto out_lock; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 187 | } |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 188 | inode = __ecryptfs_get_inode(d_inode(lower_dentry), |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 189 | directory_inode->i_sb); |
Tyler Hicks | 8bc2d3c | 2012-05-22 15:09:50 -0500 | [diff] [blame] | 190 | if (IS_ERR(inode)) { |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 191 | vfs_unlink(&init_user_ns, lower_dir, lower_dentry, NULL); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 192 | goto out_lock; |
Tyler Hicks | 8bc2d3c | 2012-05-22 15:09:50 -0500 | [diff] [blame] | 193 | } |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 194 | fsstack_copy_attr_times(directory_inode, lower_dir); |
| 195 | fsstack_copy_inode_size(directory_inode, lower_dir); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 196 | out_lock: |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 197 | inode_unlock(lower_dir); |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 198 | return inode; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 199 | } |
| 200 | |
| 201 | /** |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 202 | * ecryptfs_initialize_file |
| 203 | * |
| 204 | * Cause the file to be changed from a basic empty file to an ecryptfs |
| 205 | * file with a header and first data page. |
| 206 | * |
| 207 | * Returns zero on success |
| 208 | */ |
Tyler Hicks | e3ccaa9 | 2012-06-20 23:50:59 -0700 | [diff] [blame] | 209 | int ecryptfs_initialize_file(struct dentry *ecryptfs_dentry, |
| 210 | struct inode *ecryptfs_inode) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 211 | { |
Michael Halcrow | d7cdc5f | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 212 | struct ecryptfs_crypt_stat *crypt_stat = |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 213 | &ecryptfs_inode_to_private(ecryptfs_inode)->crypt_stat; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 214 | int rc = 0; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 215 | |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 216 | if (S_ISDIR(ecryptfs_inode->i_mode)) { |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 217 | ecryptfs_printk(KERN_DEBUG, "This is a directory\n"); |
Michael Halcrow | e2bd99e | 2007-02-12 00:53:49 -0800 | [diff] [blame] | 218 | crypt_stat->flags &= ~(ECRYPTFS_ENCRYPTED); |
Michael Halcrow | d7cdc5f | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 219 | goto out; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 220 | } |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 221 | ecryptfs_printk(KERN_DEBUG, "Initializing crypto context\n"); |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 222 | rc = ecryptfs_new_file_context(ecryptfs_inode); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 223 | if (rc) { |
Michael Halcrow | d7cdc5f | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 224 | ecryptfs_printk(KERN_ERR, "Error creating new file " |
| 225 | "context; rc = [%d]\n", rc); |
| 226 | goto out; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 227 | } |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 228 | rc = ecryptfs_get_lower_file(ecryptfs_dentry, ecryptfs_inode); |
Roberto Sassu | 2799289 | 2010-11-03 11:11:28 +0100 | [diff] [blame] | 229 | if (rc) { |
| 230 | printk(KERN_ERR "%s: Error attempting to initialize " |
Tyler Hicks | 332ab16 | 2011-04-14 15:35:11 -0500 | [diff] [blame] | 231 | "the lower file for the dentry with name " |
David Howells | 9e78d14 | 2013-12-10 15:26:48 +0000 | [diff] [blame] | 232 | "[%pd]; rc = [%d]\n", __func__, |
| 233 | ecryptfs_dentry, rc); |
Roberto Sassu | 2799289 | 2010-11-03 11:11:28 +0100 | [diff] [blame] | 234 | goto out; |
Michael Halcrow | 391b52f | 2008-07-23 21:30:08 -0700 | [diff] [blame] | 235 | } |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 236 | rc = ecryptfs_write_metadata(ecryptfs_dentry, ecryptfs_inode); |
Tyler Hicks | 332ab16 | 2011-04-14 15:35:11 -0500 | [diff] [blame] | 237 | if (rc) |
Michael Halcrow | d7cdc5f | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 238 | printk(KERN_ERR "Error writing headers; rc = [%d]\n", rc); |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 239 | ecryptfs_put_lower_file(ecryptfs_inode); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 240 | out: |
| 241 | return rc; |
| 242 | } |
| 243 | |
| 244 | /** |
| 245 | * ecryptfs_create |
| 246 | * @dir: The inode of the directory in which to create the file. |
| 247 | * @dentry: The eCryptfs dentry |
| 248 | * @mode: The mode of the new file. |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 249 | * |
| 250 | * Creates a new file. |
| 251 | * |
| 252 | * Returns zero on success; non-zero on error condition |
| 253 | */ |
| 254 | static int |
Christian Brauner | 549c729 | 2021-01-21 14:19:43 +0100 | [diff] [blame] | 255 | ecryptfs_create(struct user_namespace *mnt_userns, |
| 256 | struct inode *directory_inode, struct dentry *ecryptfs_dentry, |
Al Viro | ebfc3b4 | 2012-06-10 18:05:36 -0400 | [diff] [blame] | 257 | umode_t mode, bool excl) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 258 | { |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 259 | struct inode *ecryptfs_inode; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 260 | int rc; |
| 261 | |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 262 | ecryptfs_inode = ecryptfs_do_create(directory_inode, ecryptfs_dentry, |
| 263 | mode); |
Viresh Kumar | a1c8368 | 2015-08-12 15:59:44 +0530 | [diff] [blame] | 264 | if (IS_ERR(ecryptfs_inode)) { |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 265 | ecryptfs_printk(KERN_WARNING, "Failed to create file in" |
| 266 | "lower filesystem\n"); |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 267 | rc = PTR_ERR(ecryptfs_inode); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 268 | goto out; |
| 269 | } |
| 270 | /* At this point, a file exists on "disk"; we need to make sure |
| 271 | * that this on disk file is prepared to be an ecryptfs file */ |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 272 | rc = ecryptfs_initialize_file(ecryptfs_dentry, ecryptfs_inode); |
| 273 | if (rc) { |
Tyler Hicks | 8bc2d3c | 2012-05-22 15:09:50 -0500 | [diff] [blame] | 274 | ecryptfs_do_unlink(directory_inode, ecryptfs_dentry, |
| 275 | ecryptfs_inode); |
Al Viro | 0e81ba2 | 2015-12-05 18:23:48 -0500 | [diff] [blame] | 276 | iget_failed(ecryptfs_inode); |
Tyler Hicks | b59db43 | 2011-11-21 17:31:02 -0600 | [diff] [blame] | 277 | goto out; |
| 278 | } |
Al Viro | 1e2e547 | 2018-05-04 08:23:01 -0400 | [diff] [blame] | 279 | d_instantiate_new(ecryptfs_dentry, ecryptfs_inode); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 280 | out: |
| 281 | return rc; |
| 282 | } |
| 283 | |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 284 | static int ecryptfs_i_size_read(struct dentry *dentry, struct inode *inode) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 285 | { |
Tyler Hicks | 2aac0cf | 2009-03-20 02:23:57 -0500 | [diff] [blame] | 286 | struct ecryptfs_crypt_stat *crypt_stat; |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 287 | int rc; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 288 | |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 289 | rc = ecryptfs_get_lower_file(dentry, inode); |
Roberto Sassu | 2799289 | 2010-11-03 11:11:28 +0100 | [diff] [blame] | 290 | if (rc) { |
| 291 | printk(KERN_ERR "%s: Error attempting to initialize " |
Tyler Hicks | 332ab16 | 2011-04-14 15:35:11 -0500 | [diff] [blame] | 292 | "the lower file for the dentry with name " |
David Howells | 9e78d14 | 2013-12-10 15:26:48 +0000 | [diff] [blame] | 293 | "[%pd]; rc = [%d]\n", __func__, |
| 294 | dentry, rc); |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 295 | return rc; |
Michael Halcrow | 391b52f | 2008-07-23 21:30:08 -0700 | [diff] [blame] | 296 | } |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 297 | |
Tyler Hicks | 3b06b3e | 2011-05-24 03:49:02 -0500 | [diff] [blame] | 298 | crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat; |
Tyler Hicks | 2aac0cf | 2009-03-20 02:23:57 -0500 | [diff] [blame] | 299 | /* TODO: lock for crypt_stat comparison */ |
| 300 | if (!(crypt_stat->flags & ECRYPTFS_POLICY_APPLIED)) |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 301 | ecryptfs_set_default_sizes(crypt_stat); |
| 302 | |
| 303 | rc = ecryptfs_read_and_validate_header_region(inode); |
| 304 | ecryptfs_put_lower_file(inode); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 305 | if (rc) { |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 306 | rc = ecryptfs_read_and_validate_xattr_region(dentry, inode); |
| 307 | if (!rc) |
| 308 | crypt_stat->flags |= ECRYPTFS_METADATA_IN_XATTR; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 309 | } |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 310 | |
| 311 | /* Must return 0 to allow non-eCryptfs files to be looked up, too */ |
| 312 | return 0; |
| 313 | } |
| 314 | |
| 315 | /** |
| 316 | * ecryptfs_lookup_interpose - Dentry interposition for a lookup |
| 317 | */ |
Al Viro | b1168a9 | 2016-03-28 00:30:35 -0400 | [diff] [blame] | 318 | static struct dentry *ecryptfs_lookup_interpose(struct dentry *dentry, |
| 319 | struct dentry *lower_dentry) |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 320 | { |
Al Viro | 762c696 | 2019-11-03 13:55:43 -0500 | [diff] [blame] | 321 | struct path *path = ecryptfs_dentry_to_lower_path(dentry->d_parent); |
Al Viro | e72b9dd | 2019-11-03 13:45:04 -0500 | [diff] [blame] | 322 | struct inode *inode, *lower_inode; |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 323 | struct ecryptfs_dentry_info *dentry_info; |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 324 | int rc = 0; |
| 325 | |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 326 | dentry_info = kmem_cache_alloc(ecryptfs_dentry_info_cache, GFP_KERNEL); |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 327 | if (!dentry_info) { |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 328 | dput(lower_dentry); |
Al Viro | b1168a9 | 2016-03-28 00:30:35 -0400 | [diff] [blame] | 329 | return ERR_PTR(-ENOMEM); |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 330 | } |
Al Viro | 0b1d901 | 2012-07-20 12:09:19 +0400 | [diff] [blame] | 331 | |
Al Viro | b1168a9 | 2016-03-28 00:30:35 -0400 | [diff] [blame] | 332 | fsstack_copy_attr_atime(d_inode(dentry->d_parent), |
Al Viro | 762c696 | 2019-11-03 13:55:43 -0500 | [diff] [blame] | 333 | d_inode(path->dentry)); |
Al Viro | 84d08fa | 2013-07-05 18:59:33 +0400 | [diff] [blame] | 334 | BUG_ON(!d_count(lower_dentry)); |
Al Viro | 0b1d901 | 2012-07-20 12:09:19 +0400 | [diff] [blame] | 335 | |
| 336 | ecryptfs_set_dentry_private(dentry, dentry_info); |
Al Viro | 762c696 | 2019-11-03 13:55:43 -0500 | [diff] [blame] | 337 | dentry_info->lower_path.mnt = mntget(path->mnt); |
Al Viro | 92dd123 | 2013-09-15 20:50:13 -0400 | [diff] [blame] | 338 | dentry_info->lower_path.dentry = lower_dentry; |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 339 | |
Al Viro | e72b9dd | 2019-11-03 13:45:04 -0500 | [diff] [blame] | 340 | /* |
| 341 | * negative dentry can go positive under us here - its parent is not |
| 342 | * locked. That's OK and that could happen just as we return from |
| 343 | * ecryptfs_lookup() anyway. Just need to be careful and fetch |
| 344 | * ->d_inode only once - it's not stable here. |
| 345 | */ |
| 346 | lower_inode = READ_ONCE(lower_dentry->d_inode); |
| 347 | |
| 348 | if (!lower_inode) { |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 349 | /* We want to add because we couldn't find in lower */ |
| 350 | d_add(dentry, NULL); |
Al Viro | b1168a9 | 2016-03-28 00:30:35 -0400 | [diff] [blame] | 351 | return NULL; |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 352 | } |
Al Viro | b1168a9 | 2016-03-28 00:30:35 -0400 | [diff] [blame] | 353 | inode = __ecryptfs_get_inode(lower_inode, dentry->d_sb); |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 354 | if (IS_ERR(inode)) { |
| 355 | printk(KERN_ERR "%s: Error interposing; rc = [%ld]\n", |
| 356 | __func__, PTR_ERR(inode)); |
Al Viro | b1168a9 | 2016-03-28 00:30:35 -0400 | [diff] [blame] | 357 | return ERR_CAST(inode); |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 358 | } |
| 359 | if (S_ISREG(inode->i_mode)) { |
| 360 | rc = ecryptfs_i_size_read(dentry, inode); |
| 361 | if (rc) { |
| 362 | make_bad_inode(inode); |
Al Viro | b1168a9 | 2016-03-28 00:30:35 -0400 | [diff] [blame] | 363 | return ERR_PTR(rc); |
Tyler Hicks | 778aeb4 | 2011-05-24 04:56:23 -0500 | [diff] [blame] | 364 | } |
| 365 | } |
| 366 | |
Tyler Hicks | 3b06b3e | 2011-05-24 03:49:02 -0500 | [diff] [blame] | 367 | if (inode->i_state & I_NEW) |
| 368 | unlock_new_inode(inode); |
Al Viro | b1168a9 | 2016-03-28 00:30:35 -0400 | [diff] [blame] | 369 | return d_splice_alias(inode, dentry); |
Michael Halcrow | addd65ad | 2009-01-06 14:42:00 -0800 | [diff] [blame] | 370 | } |
| 371 | |
| 372 | /** |
| 373 | * ecryptfs_lookup |
| 374 | * @ecryptfs_dir_inode: The eCryptfs directory inode |
| 375 | * @ecryptfs_dentry: The eCryptfs dentry that we are looking up |
Al Viro | 89076bc | 2015-05-12 08:29:38 -0400 | [diff] [blame] | 376 | * @flags: lookup flags |
Michael Halcrow | addd65ad | 2009-01-06 14:42:00 -0800 | [diff] [blame] | 377 | * |
| 378 | * Find a file on disk. If the file does not exist, then we'll add it to the |
| 379 | * dentry cache and continue on to read it from the disk. |
| 380 | */ |
| 381 | static struct dentry *ecryptfs_lookup(struct inode *ecryptfs_dir_inode, |
| 382 | struct dentry *ecryptfs_dentry, |
Al Viro | 00cd8dd | 2012-06-10 17:13:09 -0400 | [diff] [blame] | 383 | unsigned int flags) |
Michael Halcrow | addd65ad | 2009-01-06 14:42:00 -0800 | [diff] [blame] | 384 | { |
| 385 | char *encrypted_and_encoded_name = NULL; |
Al Viro | 88ae4ab | 2016-03-28 00:43:29 -0400 | [diff] [blame] | 386 | struct ecryptfs_mount_crypt_stat *mount_crypt_stat; |
Michael Halcrow | addd65ad | 2009-01-06 14:42:00 -0800 | [diff] [blame] | 387 | struct dentry *lower_dir_dentry, *lower_dentry; |
Al Viro | 88ae4ab | 2016-03-28 00:43:29 -0400 | [diff] [blame] | 388 | const char *name = ecryptfs_dentry->d_name.name; |
| 389 | size_t len = ecryptfs_dentry->d_name.len; |
Al Viro | b1168a9 | 2016-03-28 00:30:35 -0400 | [diff] [blame] | 390 | struct dentry *res; |
Michael Halcrow | addd65ad | 2009-01-06 14:42:00 -0800 | [diff] [blame] | 391 | int rc = 0; |
| 392 | |
Michael Halcrow | addd65ad | 2009-01-06 14:42:00 -0800 | [diff] [blame] | 393 | lower_dir_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry->d_parent); |
Al Viro | 88ae4ab | 2016-03-28 00:43:29 -0400 | [diff] [blame] | 394 | |
Tyler Hicks | 2aac0cf | 2009-03-20 02:23:57 -0500 | [diff] [blame] | 395 | mount_crypt_stat = &ecryptfs_superblock_to_private( |
| 396 | ecryptfs_dentry->d_sb)->mount_crypt_stat; |
Guenter Roeck | ab13a92 | 2018-01-18 18:40:25 -0800 | [diff] [blame] | 397 | if (mount_crypt_stat->flags & ECRYPTFS_GLOBAL_ENCRYPT_FILENAMES) { |
Al Viro | 88ae4ab | 2016-03-28 00:43:29 -0400 | [diff] [blame] | 398 | rc = ecryptfs_encrypt_and_encode_filename( |
| 399 | &encrypted_and_encoded_name, &len, |
| 400 | mount_crypt_stat, name, len); |
| 401 | if (rc) { |
| 402 | printk(KERN_ERR "%s: Error attempting to encrypt and encode " |
| 403 | "filename; rc = [%d]\n", __func__, rc); |
| 404 | return ERR_PTR(rc); |
| 405 | } |
| 406 | name = encrypted_and_encoded_name; |
Michael Halcrow | addd65ad | 2009-01-06 14:42:00 -0800 | [diff] [blame] | 407 | } |
Al Viro | 88ae4ab | 2016-03-28 00:43:29 -0400 | [diff] [blame] | 408 | |
| 409 | lower_dentry = lookup_one_len_unlocked(name, lower_dir_dentry, len); |
Michael Halcrow | addd65ad | 2009-01-06 14:42:00 -0800 | [diff] [blame] | 410 | if (IS_ERR(lower_dentry)) { |
Tyler Hicks | 8787c7a | 2011-02-17 18:51:24 -0600 | [diff] [blame] | 411 | ecryptfs_printk(KERN_DEBUG, "%s: lookup_one_len() returned " |
Al Viro | b1168a9 | 2016-03-28 00:30:35 -0400 | [diff] [blame] | 412 | "[%ld] on lower_dentry = [%s]\n", __func__, |
| 413 | PTR_ERR(lower_dentry), |
Al Viro | 88ae4ab | 2016-03-28 00:43:29 -0400 | [diff] [blame] | 414 | name); |
Al Viro | b1168a9 | 2016-03-28 00:30:35 -0400 | [diff] [blame] | 415 | res = ERR_CAST(lower_dentry); |
Al Viro | 88ae4ab | 2016-03-28 00:43:29 -0400 | [diff] [blame] | 416 | } else { |
| 417 | res = ecryptfs_lookup_interpose(ecryptfs_dentry, lower_dentry); |
Michael Halcrow | addd65ad | 2009-01-06 14:42:00 -0800 | [diff] [blame] | 418 | } |
Michael Halcrow | addd65ad | 2009-01-06 14:42:00 -0800 | [diff] [blame] | 419 | kfree(encrypted_and_encoded_name); |
Al Viro | b1168a9 | 2016-03-28 00:30:35 -0400 | [diff] [blame] | 420 | return res; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 421 | } |
| 422 | |
| 423 | static int ecryptfs_link(struct dentry *old_dentry, struct inode *dir, |
| 424 | struct dentry *new_dentry) |
| 425 | { |
| 426 | struct dentry *lower_old_dentry; |
| 427 | struct dentry *lower_new_dentry; |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 428 | struct inode *lower_dir; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 429 | u64 file_size_save; |
| 430 | int rc; |
| 431 | |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 432 | file_size_save = i_size_read(d_inode(old_dentry)); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 433 | lower_old_dentry = ecryptfs_dentry_to_lower(old_dentry); |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 434 | rc = lock_parent(new_dentry, &lower_new_dentry, &lower_dir); |
| 435 | if (!rc) |
| 436 | rc = vfs_link(lower_old_dentry, &init_user_ns, lower_dir, |
| 437 | lower_new_dentry, NULL); |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 438 | if (rc || d_really_is_negative(lower_new_dentry)) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 439 | goto out_lock; |
Tyler Hicks | 5ccf920 | 2011-05-24 02:16:51 -0500 | [diff] [blame] | 440 | rc = ecryptfs_interpose(lower_new_dentry, new_dentry, dir->i_sb); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 441 | if (rc) |
| 442 | goto out_lock; |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 443 | fsstack_copy_attr_times(dir, lower_dir); |
| 444 | fsstack_copy_inode_size(dir, lower_dir); |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 445 | set_nlink(d_inode(old_dentry), |
| 446 | ecryptfs_inode_to_lower(d_inode(old_dentry))->i_nlink); |
| 447 | i_size_write(d_inode(new_dentry), file_size_save); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 448 | out_lock: |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 449 | inode_unlock(lower_dir); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 450 | return rc; |
| 451 | } |
| 452 | |
| 453 | static int ecryptfs_unlink(struct inode *dir, struct dentry *dentry) |
| 454 | { |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 455 | return ecryptfs_do_unlink(dir, dentry, d_inode(dentry)); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 456 | } |
| 457 | |
Christian Brauner | 549c729 | 2021-01-21 14:19:43 +0100 | [diff] [blame] | 458 | static int ecryptfs_symlink(struct user_namespace *mnt_userns, |
| 459 | struct inode *dir, struct dentry *dentry, |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 460 | const char *symname) |
| 461 | { |
| 462 | int rc; |
| 463 | struct dentry *lower_dentry; |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 464 | struct inode *lower_dir; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 465 | char *encoded_symname; |
Michael Halcrow | addd65ad | 2009-01-06 14:42:00 -0800 | [diff] [blame] | 466 | size_t encoded_symlen; |
| 467 | struct ecryptfs_mount_crypt_stat *mount_crypt_stat = NULL; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 468 | |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 469 | rc = lock_parent(dentry, &lower_dentry, &lower_dir); |
| 470 | if (rc) |
| 471 | goto out_lock; |
Michael Halcrow | addd65ad | 2009-01-06 14:42:00 -0800 | [diff] [blame] | 472 | mount_crypt_stat = &ecryptfs_superblock_to_private( |
| 473 | dir->i_sb)->mount_crypt_stat; |
| 474 | rc = ecryptfs_encrypt_and_encode_filename(&encoded_symname, |
| 475 | &encoded_symlen, |
Michael Halcrow | addd65ad | 2009-01-06 14:42:00 -0800 | [diff] [blame] | 476 | mount_crypt_stat, symname, |
| 477 | strlen(symname)); |
| 478 | if (rc) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 479 | goto out_lock; |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 480 | rc = vfs_symlink(&init_user_ns, lower_dir, lower_dentry, |
Miklos Szeredi | db2e747 | 2008-06-24 16:50:16 +0200 | [diff] [blame] | 481 | encoded_symname); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 482 | kfree(encoded_symname); |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 483 | if (rc || d_really_is_negative(lower_dentry)) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 484 | goto out_lock; |
Tyler Hicks | 5ccf920 | 2011-05-24 02:16:51 -0500 | [diff] [blame] | 485 | rc = ecryptfs_interpose(lower_dentry, dentry, dir->i_sb); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 486 | if (rc) |
| 487 | goto out_lock; |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 488 | fsstack_copy_attr_times(dir, lower_dir); |
| 489 | fsstack_copy_inode_size(dir, lower_dir); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 490 | out_lock: |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 491 | inode_unlock(lower_dir); |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 492 | if (d_really_is_negative(dentry)) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 493 | d_drop(dentry); |
| 494 | return rc; |
| 495 | } |
| 496 | |
Christian Brauner | 549c729 | 2021-01-21 14:19:43 +0100 | [diff] [blame] | 497 | static int ecryptfs_mkdir(struct user_namespace *mnt_userns, struct inode *dir, |
| 498 | struct dentry *dentry, umode_t mode) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 499 | { |
| 500 | int rc; |
| 501 | struct dentry *lower_dentry; |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 502 | struct inode *lower_dir; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 503 | |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 504 | rc = lock_parent(dentry, &lower_dentry, &lower_dir); |
| 505 | if (!rc) |
| 506 | rc = vfs_mkdir(&init_user_ns, lower_dir, |
| 507 | lower_dentry, mode); |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 508 | if (rc || d_really_is_negative(lower_dentry)) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 509 | goto out; |
Tyler Hicks | 5ccf920 | 2011-05-24 02:16:51 -0500 | [diff] [blame] | 510 | rc = ecryptfs_interpose(lower_dentry, dentry, dir->i_sb); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 511 | if (rc) |
| 512 | goto out; |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 513 | fsstack_copy_attr_times(dir, lower_dir); |
| 514 | fsstack_copy_inode_size(dir, lower_dir); |
| 515 | set_nlink(dir, lower_dir->i_nlink); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 516 | out: |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 517 | inode_unlock(lower_dir); |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 518 | if (d_really_is_negative(dentry)) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 519 | d_drop(dentry); |
| 520 | return rc; |
| 521 | } |
| 522 | |
| 523 | static int ecryptfs_rmdir(struct inode *dir, struct dentry *dentry) |
| 524 | { |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 525 | struct dentry *lower_dentry; |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 526 | struct inode *lower_dir; |
Michael Halcrow | 45ec4aba | 2006-10-30 22:07:20 -0800 | [diff] [blame] | 527 | int rc; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 528 | |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 529 | rc = lock_parent(dentry, &lower_dentry, &lower_dir); |
Al Viro | bcf0d9d | 2019-11-03 12:07:15 -0500 | [diff] [blame] | 530 | dget(lower_dentry); // don't even try to make the lower negative |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 531 | if (!rc) { |
| 532 | if (d_unhashed(lower_dentry)) |
| 533 | rc = -EINVAL; |
| 534 | else |
| 535 | rc = vfs_rmdir(&init_user_ns, lower_dir, lower_dentry); |
| 536 | } |
Al Viro | bcf0d9d | 2019-11-03 12:07:15 -0500 | [diff] [blame] | 537 | if (!rc) { |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 538 | clear_nlink(d_inode(dentry)); |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 539 | fsstack_copy_attr_times(dir, lower_dir); |
| 540 | set_nlink(dir, lower_dir->i_nlink); |
Al Viro | bcf0d9d | 2019-11-03 12:07:15 -0500 | [diff] [blame] | 541 | } |
| 542 | dput(lower_dentry); |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 543 | inode_unlock(lower_dir); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 544 | if (!rc) |
| 545 | d_drop(dentry); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 546 | return rc; |
| 547 | } |
| 548 | |
| 549 | static int |
Christian Brauner | 549c729 | 2021-01-21 14:19:43 +0100 | [diff] [blame] | 550 | ecryptfs_mknod(struct user_namespace *mnt_userns, struct inode *dir, |
| 551 | struct dentry *dentry, umode_t mode, dev_t dev) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 552 | { |
| 553 | int rc; |
| 554 | struct dentry *lower_dentry; |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 555 | struct inode *lower_dir; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 556 | |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 557 | rc = lock_parent(dentry, &lower_dentry, &lower_dir); |
| 558 | if (!rc) |
| 559 | rc = vfs_mknod(&init_user_ns, lower_dir, |
| 560 | lower_dentry, mode, dev); |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 561 | if (rc || d_really_is_negative(lower_dentry)) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 562 | goto out; |
Tyler Hicks | 5ccf920 | 2011-05-24 02:16:51 -0500 | [diff] [blame] | 563 | rc = ecryptfs_interpose(lower_dentry, dentry, dir->i_sb); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 564 | if (rc) |
| 565 | goto out; |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 566 | fsstack_copy_attr_times(dir, lower_dir); |
| 567 | fsstack_copy_inode_size(dir, lower_dir); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 568 | out: |
Al Viro | b2648d5 | 2021-01-29 17:35:43 -0500 | [diff] [blame^] | 569 | inode_unlock(lower_dir); |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 570 | if (d_really_is_negative(dentry)) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 571 | d_drop(dentry); |
| 572 | return rc; |
| 573 | } |
| 574 | |
| 575 | static int |
Christian Brauner | 549c729 | 2021-01-21 14:19:43 +0100 | [diff] [blame] | 576 | ecryptfs_rename(struct user_namespace *mnt_userns, struct inode *old_dir, |
| 577 | struct dentry *old_dentry, struct inode *new_dir, |
| 578 | struct dentry *new_dentry, unsigned int flags) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 579 | { |
| 580 | int rc; |
| 581 | struct dentry *lower_old_dentry; |
| 582 | struct dentry *lower_new_dentry; |
| 583 | struct dentry *lower_old_dir_dentry; |
| 584 | struct dentry *lower_new_dir_dentry; |
Al Viro | bcf0d9d | 2019-11-03 12:07:15 -0500 | [diff] [blame] | 585 | struct dentry *trap; |
Tyler Hicks | 8335eaf | 2012-09-13 12:00:56 -0700 | [diff] [blame] | 586 | struct inode *target_inode; |
Christian Brauner | 9fe6145 | 2021-01-21 14:19:32 +0100 | [diff] [blame] | 587 | struct renamedata rd = {}; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 588 | |
Miklos Szeredi | 1cd66c9 | 2016-09-27 11:03:58 +0200 | [diff] [blame] | 589 | if (flags) |
| 590 | return -EINVAL; |
| 591 | |
Al Viro | bcf0d9d | 2019-11-03 12:07:15 -0500 | [diff] [blame] | 592 | lower_old_dir_dentry = ecryptfs_dentry_to_lower(old_dentry->d_parent); |
| 593 | lower_new_dir_dentry = ecryptfs_dentry_to_lower(new_dentry->d_parent); |
| 594 | |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 595 | lower_old_dentry = ecryptfs_dentry_to_lower(old_dentry); |
| 596 | lower_new_dentry = ecryptfs_dentry_to_lower(new_dentry); |
Al Viro | bcf0d9d | 2019-11-03 12:07:15 -0500 | [diff] [blame] | 597 | |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 598 | target_inode = d_inode(new_dentry); |
Al Viro | bcf0d9d | 2019-11-03 12:07:15 -0500 | [diff] [blame] | 599 | |
Erez Zadok | 0d132f7 | 2009-12-05 21:17:09 -0500 | [diff] [blame] | 600 | trap = lock_rename(lower_old_dir_dentry, lower_new_dir_dentry); |
Al Viro | bcf0d9d | 2019-11-03 12:07:15 -0500 | [diff] [blame] | 601 | dget(lower_new_dentry); |
Al Viro | 74dd7c9 | 2018-10-09 23:32:41 -0400 | [diff] [blame] | 602 | rc = -EINVAL; |
| 603 | if (lower_old_dentry->d_parent != lower_old_dir_dentry) |
Erez Zadok | 0d132f7 | 2009-12-05 21:17:09 -0500 | [diff] [blame] | 604 | goto out_lock; |
Al Viro | 74dd7c9 | 2018-10-09 23:32:41 -0400 | [diff] [blame] | 605 | if (lower_new_dentry->d_parent != lower_new_dir_dentry) |
| 606 | goto out_lock; |
| 607 | if (d_unhashed(lower_old_dentry) || d_unhashed(lower_new_dentry)) |
| 608 | goto out_lock; |
| 609 | /* source should not be ancestor of target */ |
| 610 | if (trap == lower_old_dentry) |
| 611 | goto out_lock; |
Erez Zadok | 0d132f7 | 2009-12-05 21:17:09 -0500 | [diff] [blame] | 612 | /* target should not be ancestor of source */ |
| 613 | if (trap == lower_new_dentry) { |
| 614 | rc = -ENOTEMPTY; |
| 615 | goto out_lock; |
| 616 | } |
Christian Brauner | 9fe6145 | 2021-01-21 14:19:32 +0100 | [diff] [blame] | 617 | |
Christian Brauner | 6521f89 | 2021-01-21 14:19:33 +0100 | [diff] [blame] | 618 | rd.old_mnt_userns = &init_user_ns; |
| 619 | rd.old_dir = d_inode(lower_old_dir_dentry); |
| 620 | rd.old_dentry = lower_old_dentry; |
| 621 | rd.new_mnt_userns = &init_user_ns; |
| 622 | rd.new_dir = d_inode(lower_new_dir_dentry); |
| 623 | rd.new_dentry = lower_new_dentry; |
Christian Brauner | 9fe6145 | 2021-01-21 14:19:32 +0100 | [diff] [blame] | 624 | rc = vfs_rename(&rd); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 625 | if (rc) |
| 626 | goto out_lock; |
Tyler Hicks | 8335eaf | 2012-09-13 12:00:56 -0700 | [diff] [blame] | 627 | if (target_inode) |
| 628 | fsstack_copy_attr_all(target_inode, |
| 629 | ecryptfs_inode_to_lower(target_inode)); |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 630 | fsstack_copy_attr_all(new_dir, d_inode(lower_new_dir_dentry)); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 631 | if (new_dir != old_dir) |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 632 | fsstack_copy_attr_all(old_dir, d_inode(lower_old_dir_dentry)); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 633 | out_lock: |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 634 | dput(lower_new_dentry); |
Al Viro | bcf0d9d | 2019-11-03 12:07:15 -0500 | [diff] [blame] | 635 | unlock_rename(lower_old_dir_dentry, lower_new_dir_dentry); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 636 | return rc; |
| 637 | } |
| 638 | |
Al Viro | b22e8fe | 2013-11-29 22:51:47 -0500 | [diff] [blame] | 639 | static char *ecryptfs_readlink_lower(struct dentry *dentry, size_t *bufsiz) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 640 | { |
Miklos Szeredi | 6c988f5 | 2016-12-09 16:45:03 +0100 | [diff] [blame] | 641 | DEFINE_DELAYED_CALL(done); |
Tyler Hicks | 3a60a16 | 2010-03-22 00:41:35 -0500 | [diff] [blame] | 642 | struct dentry *lower_dentry = ecryptfs_dentry_to_lower(dentry); |
Miklos Szeredi | 6c988f5 | 2016-12-09 16:45:03 +0100 | [diff] [blame] | 643 | const char *link; |
Al Viro | b22e8fe | 2013-11-29 22:51:47 -0500 | [diff] [blame] | 644 | char *buf; |
Michael Halcrow | addd65ad | 2009-01-06 14:42:00 -0800 | [diff] [blame] | 645 | int rc; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 646 | |
Miklos Szeredi | 6c988f5 | 2016-12-09 16:45:03 +0100 | [diff] [blame] | 647 | link = vfs_get_link(lower_dentry, &done); |
| 648 | if (IS_ERR(link)) |
| 649 | return ERR_CAST(link); |
| 650 | |
Al Viro | b22e8fe | 2013-11-29 22:51:47 -0500 | [diff] [blame] | 651 | rc = ecryptfs_decode_and_decrypt_filename(&buf, bufsiz, dentry->d_sb, |
Miklos Szeredi | 6c988f5 | 2016-12-09 16:45:03 +0100 | [diff] [blame] | 652 | link, strlen(link)); |
| 653 | do_delayed_call(&done); |
| 654 | if (rc) |
| 655 | return ERR_PTR(rc); |
| 656 | |
| 657 | return buf; |
Tyler Hicks | 3a60a16 | 2010-03-22 00:41:35 -0500 | [diff] [blame] | 658 | } |
| 659 | |
Al Viro | 6b25539 | 2015-11-17 10:20:54 -0500 | [diff] [blame] | 660 | static const char *ecryptfs_get_link(struct dentry *dentry, |
Al Viro | fceef39 | 2015-12-29 15:58:39 -0500 | [diff] [blame] | 661 | struct inode *inode, |
| 662 | struct delayed_call *done) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 663 | { |
Al Viro | b22e8fe | 2013-11-29 22:51:47 -0500 | [diff] [blame] | 664 | size_t len; |
Al Viro | 6b25539 | 2015-11-17 10:20:54 -0500 | [diff] [blame] | 665 | char *buf; |
| 666 | |
| 667 | if (!dentry) |
| 668 | return ERR_PTR(-ECHILD); |
| 669 | |
| 670 | buf = ecryptfs_readlink_lower(dentry, &len); |
Al Viro | b22e8fe | 2013-11-29 22:51:47 -0500 | [diff] [blame] | 671 | if (IS_ERR(buf)) |
Al Viro | 680baac | 2015-05-02 13:32:22 -0400 | [diff] [blame] | 672 | return buf; |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 673 | fsstack_copy_attr_atime(d_inode(dentry), |
| 674 | d_inode(ecryptfs_dentry_to_lower(dentry))); |
Al Viro | 408bd62 | 2012-05-03 09:34:20 -0400 | [diff] [blame] | 675 | buf[len] = '\0'; |
Al Viro | fceef39 | 2015-12-29 15:58:39 -0500 | [diff] [blame] | 676 | set_delayed_call(done, kfree_link, buf); |
| 677 | return buf; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 678 | } |
| 679 | |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 680 | /** |
| 681 | * upper_size_to_lower_size |
| 682 | * @crypt_stat: Crypt_stat associated with file |
| 683 | * @upper_size: Size of the upper file |
| 684 | * |
Michael Halcrow | cc11bef | 2008-02-06 01:38:32 -0800 | [diff] [blame] | 685 | * Calculate the required size of the lower file based on the |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 686 | * specified size of the upper file. This calculation is based on the |
| 687 | * number of headers in the underlying file and the extent size. |
| 688 | * |
| 689 | * Returns Calculated size of the lower file. |
| 690 | */ |
| 691 | static loff_t |
| 692 | upper_size_to_lower_size(struct ecryptfs_crypt_stat *crypt_stat, |
| 693 | loff_t upper_size) |
| 694 | { |
| 695 | loff_t lower_size; |
| 696 | |
Tyler Hicks | 157f107 | 2010-02-11 07:10:38 -0600 | [diff] [blame] | 697 | lower_size = ecryptfs_lower_header_size(crypt_stat); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 698 | if (upper_size != 0) { |
| 699 | loff_t num_extents; |
| 700 | |
| 701 | num_extents = upper_size >> crypt_stat->extent_shift; |
| 702 | if (upper_size & ~crypt_stat->extent_mask) |
| 703 | num_extents++; |
| 704 | lower_size += (num_extents * crypt_stat->extent_size); |
| 705 | } |
| 706 | return lower_size; |
| 707 | } |
| 708 | |
| 709 | /** |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 710 | * truncate_upper |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 711 | * @dentry: The ecryptfs layer dentry |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 712 | * @ia: Address of the ecryptfs inode's attributes |
| 713 | * @lower_ia: Address of the lower inode's attributes |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 714 | * |
| 715 | * Function to handle truncations modifying the size of the file. Note |
| 716 | * that the file sizes are interpolated. When expanding, we are simply |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 717 | * writing strings of 0's out. When truncating, we truncate the upper |
| 718 | * inode and update the lower_ia according to the page index |
| 719 | * interpolations. If ATTR_SIZE is set in lower_ia->ia_valid upon return, |
| 720 | * the caller must use lower_ia in a call to notify_change() to perform |
| 721 | * the truncation of the lower inode. |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 722 | * |
| 723 | * Returns zero on success; non-zero otherwise |
| 724 | */ |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 725 | static int truncate_upper(struct dentry *dentry, struct iattr *ia, |
| 726 | struct iattr *lower_ia) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 727 | { |
| 728 | int rc = 0; |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 729 | struct inode *inode = d_inode(dentry); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 730 | struct ecryptfs_crypt_stat *crypt_stat; |
| 731 | loff_t i_size = i_size_read(inode); |
| 732 | loff_t lower_size_before_truncate; |
| 733 | loff_t lower_size_after_truncate; |
| 734 | |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 735 | if (unlikely((ia->ia_size == i_size))) { |
| 736 | lower_ia->ia_valid &= ~ATTR_SIZE; |
Tyler Hicks | 332ab16 | 2011-04-14 15:35:11 -0500 | [diff] [blame] | 737 | return 0; |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 738 | } |
Tyler Hicks | 3b06b3e | 2011-05-24 03:49:02 -0500 | [diff] [blame] | 739 | rc = ecryptfs_get_lower_file(dentry, inode); |
Tyler Hicks | 332ab16 | 2011-04-14 15:35:11 -0500 | [diff] [blame] | 740 | if (rc) |
| 741 | return rc; |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 742 | crypt_stat = &ecryptfs_inode_to_private(d_inode(dentry))->crypt_stat; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 743 | /* Switch on growing or shrinking file */ |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 744 | if (ia->ia_size > i_size) { |
Michael Halcrow | 2ed9255 | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 745 | char zero[] = { 0x00 }; |
Michael Halcrow | 240e2df | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 746 | |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 747 | lower_ia->ia_valid &= ~ATTR_SIZE; |
Michael Halcrow | 2ed9255 | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 748 | /* Write a single 0 at the last position of the file; |
| 749 | * this triggers code that will fill in 0's throughout |
| 750 | * the intermediate portion of the previous end of the |
| 751 | * file and the new and of the file */ |
Al Viro | 48c1e44 | 2010-05-21 11:09:58 -0400 | [diff] [blame] | 752 | rc = ecryptfs_write(inode, zero, |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 753 | (ia->ia_size - 1), 1); |
| 754 | } else { /* ia->ia_size < i_size_read(inode) */ |
| 755 | /* We're chopping off all the pages down to the page |
| 756 | * in which ia->ia_size is located. Fill in the end of |
Kirill A. Shutemov | ea1754a | 2016-04-01 15:29:48 +0300 | [diff] [blame] | 757 | * that page from (ia->ia_size & ~PAGE_MASK) to |
| 758 | * PAGE_SIZE with zeros. */ |
Kirill A. Shutemov | 09cbfea | 2016-04-01 15:29:47 +0300 | [diff] [blame] | 759 | size_t num_zeros = (PAGE_SIZE |
| 760 | - (ia->ia_size & ~PAGE_MASK)); |
Michael Halcrow | 2ed9255 | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 761 | |
Tyler Hicks | 13a791b | 2009-04-13 15:29:27 -0500 | [diff] [blame] | 762 | if (!(crypt_stat->flags & ECRYPTFS_ENCRYPTED)) { |
Christoph Hellwig | 2c27c65 | 2010-06-04 11:30:04 +0200 | [diff] [blame] | 763 | truncate_setsize(inode, ia->ia_size); |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 764 | lower_ia->ia_size = ia->ia_size; |
| 765 | lower_ia->ia_valid |= ATTR_SIZE; |
Al Viro | 48c1e44 | 2010-05-21 11:09:58 -0400 | [diff] [blame] | 766 | goto out; |
Tyler Hicks | 13a791b | 2009-04-13 15:29:27 -0500 | [diff] [blame] | 767 | } |
Michael Halcrow | 2ed9255 | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 768 | if (num_zeros) { |
| 769 | char *zeros_virt; |
| 770 | |
| 771 | zeros_virt = kzalloc(num_zeros, GFP_KERNEL); |
| 772 | if (!zeros_virt) { |
| 773 | rc = -ENOMEM; |
Al Viro | 48c1e44 | 2010-05-21 11:09:58 -0400 | [diff] [blame] | 774 | goto out; |
Michael Halcrow | 2ed9255 | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 775 | } |
Al Viro | 48c1e44 | 2010-05-21 11:09:58 -0400 | [diff] [blame] | 776 | rc = ecryptfs_write(inode, zeros_virt, |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 777 | ia->ia_size, num_zeros); |
Michael Halcrow | 2ed9255 | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 778 | kfree(zeros_virt); |
Michael Halcrow | 5dda699 | 2007-10-16 01:28:06 -0700 | [diff] [blame] | 779 | if (rc) { |
Michael Halcrow | 240e2df | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 780 | printk(KERN_ERR "Error attempting to zero out " |
| 781 | "the remainder of the end page on " |
| 782 | "reducing truncate; rc = [%d]\n", rc); |
Al Viro | 48c1e44 | 2010-05-21 11:09:58 -0400 | [diff] [blame] | 783 | goto out; |
Michael Halcrow | 240e2df | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 784 | } |
| 785 | } |
Christoph Hellwig | 2c27c65 | 2010-06-04 11:30:04 +0200 | [diff] [blame] | 786 | truncate_setsize(inode, ia->ia_size); |
Michael Halcrow | 0216f7f | 2007-10-16 01:28:08 -0700 | [diff] [blame] | 787 | rc = ecryptfs_write_inode_size_to_metadata(inode); |
Michael Halcrow | dd2a3b7 | 2007-02-12 00:53:46 -0800 | [diff] [blame] | 788 | if (rc) { |
| 789 | printk(KERN_ERR "Problem with " |
| 790 | "ecryptfs_write_inode_size_to_metadata; " |
| 791 | "rc = [%d]\n", rc); |
Al Viro | 48c1e44 | 2010-05-21 11:09:58 -0400 | [diff] [blame] | 792 | goto out; |
Michael Halcrow | dd2a3b7 | 2007-02-12 00:53:46 -0800 | [diff] [blame] | 793 | } |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 794 | /* We are reducing the size of the ecryptfs file, and need to |
| 795 | * know if we need to reduce the size of the lower file. */ |
| 796 | lower_size_before_truncate = |
| 797 | upper_size_to_lower_size(crypt_stat, i_size); |
| 798 | lower_size_after_truncate = |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 799 | upper_size_to_lower_size(crypt_stat, ia->ia_size); |
| 800 | if (lower_size_after_truncate < lower_size_before_truncate) { |
| 801 | lower_ia->ia_size = lower_size_after_truncate; |
| 802 | lower_ia->ia_valid |= ATTR_SIZE; |
| 803 | } else |
| 804 | lower_ia->ia_valid &= ~ATTR_SIZE; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 805 | } |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 806 | out: |
Tyler Hicks | 332ab16 | 2011-04-14 15:35:11 -0500 | [diff] [blame] | 807 | ecryptfs_put_lower_file(inode); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 808 | return rc; |
| 809 | } |
| 810 | |
Tyler Hicks | a261a03 | 2012-01-19 20:33:44 -0600 | [diff] [blame] | 811 | static int ecryptfs_inode_newsize_ok(struct inode *inode, loff_t offset) |
| 812 | { |
| 813 | struct ecryptfs_crypt_stat *crypt_stat; |
| 814 | loff_t lower_oldsize, lower_newsize; |
| 815 | |
| 816 | crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat; |
| 817 | lower_oldsize = upper_size_to_lower_size(crypt_stat, |
| 818 | i_size_read(inode)); |
| 819 | lower_newsize = upper_size_to_lower_size(crypt_stat, offset); |
| 820 | if (lower_newsize > lower_oldsize) { |
| 821 | /* |
| 822 | * The eCryptfs inode and the new *lower* size are mixed here |
| 823 | * because we may not have the lower i_mutex held and/or it may |
| 824 | * not be appropriate to call inode_newsize_ok() with inodes |
| 825 | * from other filesystems. |
| 826 | */ |
| 827 | return inode_newsize_ok(inode, lower_newsize); |
| 828 | } |
| 829 | |
| 830 | return 0; |
| 831 | } |
| 832 | |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 833 | /** |
| 834 | * ecryptfs_truncate |
| 835 | * @dentry: The ecryptfs layer dentry |
| 836 | * @new_length: The length to expand the file to |
| 837 | * |
| 838 | * Simple function that handles the truncation of an eCryptfs inode and |
| 839 | * its corresponding lower inode. |
| 840 | * |
| 841 | * Returns zero on success; non-zero otherwise |
| 842 | */ |
| 843 | int ecryptfs_truncate(struct dentry *dentry, loff_t new_length) |
| 844 | { |
| 845 | struct iattr ia = { .ia_valid = ATTR_SIZE, .ia_size = new_length }; |
| 846 | struct iattr lower_ia = { .ia_valid = 0 }; |
| 847 | int rc; |
| 848 | |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 849 | rc = ecryptfs_inode_newsize_ok(d_inode(dentry), new_length); |
Tyler Hicks | a261a03 | 2012-01-19 20:33:44 -0600 | [diff] [blame] | 850 | if (rc) |
| 851 | return rc; |
| 852 | |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 853 | rc = truncate_upper(dentry, &ia, &lower_ia); |
| 854 | if (!rc && lower_ia.ia_valid & ATTR_SIZE) { |
| 855 | struct dentry *lower_dentry = ecryptfs_dentry_to_lower(dentry); |
| 856 | |
Al Viro | 5955102 | 2016-01-22 15:40:57 -0500 | [diff] [blame] | 857 | inode_lock(d_inode(lower_dentry)); |
Christian Brauner | 2f221d6 | 2021-01-21 14:19:26 +0100 | [diff] [blame] | 858 | rc = notify_change(&init_user_ns, lower_dentry, |
| 859 | &lower_ia, NULL); |
Al Viro | 5955102 | 2016-01-22 15:40:57 -0500 | [diff] [blame] | 860 | inode_unlock(d_inode(lower_dentry)); |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 861 | } |
| 862 | return rc; |
| 863 | } |
| 864 | |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 865 | static int |
Christian Brauner | 549c729 | 2021-01-21 14:19:43 +0100 | [diff] [blame] | 866 | ecryptfs_permission(struct user_namespace *mnt_userns, struct inode *inode, |
| 867 | int mask) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 868 | { |
Christian Brauner | 47291ba | 2021-01-21 14:19:24 +0100 | [diff] [blame] | 869 | return inode_permission(&init_user_ns, |
| 870 | ecryptfs_inode_to_lower(inode), mask); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 871 | } |
| 872 | |
| 873 | /** |
| 874 | * ecryptfs_setattr |
| 875 | * @dentry: dentry handle to the inode to modify |
| 876 | * @ia: Structure with flags of what to change and values |
| 877 | * |
| 878 | * Updates the metadata of an inode. If the update is to the size |
| 879 | * i.e. truncation, then ecryptfs_truncate will handle the size modification |
| 880 | * of both the ecryptfs inode and the lower inode. |
| 881 | * |
| 882 | * All other metadata changes will be passed right to the lower filesystem, |
| 883 | * and we will just update our inode to look like the lower. |
| 884 | */ |
Christian Brauner | 549c729 | 2021-01-21 14:19:43 +0100 | [diff] [blame] | 885 | static int ecryptfs_setattr(struct user_namespace *mnt_userns, |
| 886 | struct dentry *dentry, struct iattr *ia) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 887 | { |
| 888 | int rc = 0; |
| 889 | struct dentry *lower_dentry; |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 890 | struct iattr lower_ia; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 891 | struct inode *inode; |
| 892 | struct inode *lower_inode; |
| 893 | struct ecryptfs_crypt_stat *crypt_stat; |
| 894 | |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 895 | crypt_stat = &ecryptfs_inode_to_private(d_inode(dentry))->crypt_stat; |
Herbert Xu | e81f334 | 2016-04-16 15:01:09 +0800 | [diff] [blame] | 896 | if (!(crypt_stat->flags & ECRYPTFS_STRUCT_INITIALIZED)) { |
| 897 | rc = ecryptfs_init_crypt_stat(crypt_stat); |
| 898 | if (rc) |
| 899 | return rc; |
| 900 | } |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 901 | inode = d_inode(dentry); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 902 | lower_inode = ecryptfs_inode_to_lower(inode); |
Michael Halcrow | e10f281 | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 903 | lower_dentry = ecryptfs_dentry_to_lower(dentry); |
| 904 | mutex_lock(&crypt_stat->cs_mutex); |
David Howells | e36cb0b | 2015-01-29 12:02:35 +0000 | [diff] [blame] | 905 | if (d_is_dir(dentry)) |
Michael Halcrow | e10f281 | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 906 | crypt_stat->flags &= ~(ECRYPTFS_ENCRYPTED); |
David Howells | e36cb0b | 2015-01-29 12:02:35 +0000 | [diff] [blame] | 907 | else if (d_is_reg(dentry) |
Michael Halcrow | 64ee480 | 2007-07-19 01:47:54 -0700 | [diff] [blame] | 908 | && (!(crypt_stat->flags & ECRYPTFS_POLICY_APPLIED) |
| 909 | || !(crypt_stat->flags & ECRYPTFS_KEY_VALID))) { |
Michael Halcrow | e10f281 | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 910 | struct ecryptfs_mount_crypt_stat *mount_crypt_stat; |
Michael Halcrow | e10f281 | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 911 | |
Michael Halcrow | e10f281 | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 912 | mount_crypt_stat = &ecryptfs_superblock_to_private( |
| 913 | dentry->d_sb)->mount_crypt_stat; |
Tyler Hicks | 3b06b3e | 2011-05-24 03:49:02 -0500 | [diff] [blame] | 914 | rc = ecryptfs_get_lower_file(dentry, inode); |
Tyler Hicks | 332ab16 | 2011-04-14 15:35:11 -0500 | [diff] [blame] | 915 | if (rc) { |
| 916 | mutex_unlock(&crypt_stat->cs_mutex); |
| 917 | goto out; |
| 918 | } |
Michael Halcrow | d7cdc5f | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 919 | rc = ecryptfs_read_metadata(dentry); |
Tyler Hicks | 332ab16 | 2011-04-14 15:35:11 -0500 | [diff] [blame] | 920 | ecryptfs_put_lower_file(inode); |
Michael Halcrow | 5dda699 | 2007-10-16 01:28:06 -0700 | [diff] [blame] | 921 | if (rc) { |
Michael Halcrow | e10f281 | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 922 | if (!(mount_crypt_stat->flags |
| 923 | & ECRYPTFS_PLAINTEXT_PASSTHROUGH_ENABLED)) { |
| 924 | rc = -EIO; |
Michael Halcrow | 25bd817 | 2008-02-06 01:38:35 -0800 | [diff] [blame] | 925 | printk(KERN_WARNING "Either the lower file " |
Michael Halcrow | e10f281 | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 926 | "is not in a valid eCryptfs format, " |
Michael Halcrow | 25bd817 | 2008-02-06 01:38:35 -0800 | [diff] [blame] | 927 | "or the key could not be retrieved. " |
| 928 | "Plaintext passthrough mode is not " |
Michael Halcrow | e10f281 | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 929 | "enabled; returning -EIO\n"); |
Michael Halcrow | e10f281 | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 930 | mutex_unlock(&crypt_stat->cs_mutex); |
Michael Halcrow | e10f281 | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 931 | goto out; |
| 932 | } |
| 933 | rc = 0; |
Tyler Hicks | 3aeb86e | 2011-03-15 14:54:00 -0500 | [diff] [blame] | 934 | crypt_stat->flags &= ~(ECRYPTFS_I_SIZE_INITIALIZED |
| 935 | | ECRYPTFS_ENCRYPTED); |
Michael Halcrow | e10f281 | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 936 | } |
Michael Halcrow | e10f281 | 2007-06-27 14:09:44 -0700 | [diff] [blame] | 937 | } |
| 938 | mutex_unlock(&crypt_stat->cs_mutex); |
Tyler Hicks | a261a03 | 2012-01-19 20:33:44 -0600 | [diff] [blame] | 939 | |
Christian Brauner | 2f221d6 | 2021-01-21 14:19:26 +0100 | [diff] [blame] | 940 | rc = setattr_prepare(&init_user_ns, dentry, ia); |
Tyler Hicks | a261a03 | 2012-01-19 20:33:44 -0600 | [diff] [blame] | 941 | if (rc) |
| 942 | goto out; |
| 943 | if (ia->ia_valid & ATTR_SIZE) { |
| 944 | rc = ecryptfs_inode_newsize_ok(inode, ia->ia_size); |
| 945 | if (rc) |
| 946 | goto out; |
| 947 | } |
| 948 | |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 949 | memcpy(&lower_ia, ia, sizeof(lower_ia)); |
| 950 | if (ia->ia_valid & ATTR_FILE) |
| 951 | lower_ia.ia_file = ecryptfs_file_to_lower(ia->ia_file); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 952 | if (ia->ia_valid & ATTR_SIZE) { |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 953 | rc = truncate_upper(dentry, ia, &lower_ia); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 954 | if (rc < 0) |
| 955 | goto out; |
| 956 | } |
Jeff Layton | 1ac564e | 2007-10-18 03:05:17 -0700 | [diff] [blame] | 957 | |
| 958 | /* |
| 959 | * mode change is for clearing setuid/setgid bits. Allow lower fs |
| 960 | * to interpret this in its own way. |
| 961 | */ |
Tyler Hicks | 5f3ef64 | 2009-10-14 16:18:27 -0500 | [diff] [blame] | 962 | if (lower_ia.ia_valid & (ATTR_KILL_SUID | ATTR_KILL_SGID)) |
| 963 | lower_ia.ia_valid &= ~ATTR_MODE; |
Jeff Layton | 1ac564e | 2007-10-18 03:05:17 -0700 | [diff] [blame] | 964 | |
Al Viro | 5955102 | 2016-01-22 15:40:57 -0500 | [diff] [blame] | 965 | inode_lock(d_inode(lower_dentry)); |
Christian Brauner | 2f221d6 | 2021-01-21 14:19:26 +0100 | [diff] [blame] | 966 | rc = notify_change(&init_user_ns, lower_dentry, &lower_ia, NULL); |
Al Viro | 5955102 | 2016-01-22 15:40:57 -0500 | [diff] [blame] | 967 | inode_unlock(d_inode(lower_dentry)); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 968 | out: |
Erez Zadok | 9afa2fb | 2009-12-02 19:51:54 -0500 | [diff] [blame] | 969 | fsstack_copy_attr_all(inode, lower_inode); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 970 | return rc; |
| 971 | } |
| 972 | |
Christian Brauner | 549c729 | 2021-01-21 14:19:43 +0100 | [diff] [blame] | 973 | static int ecryptfs_getattr_link(struct user_namespace *mnt_userns, |
| 974 | const struct path *path, struct kstat *stat, |
David Howells | a528d35 | 2017-01-31 16:46:22 +0000 | [diff] [blame] | 975 | u32 request_mask, unsigned int flags) |
Tyler Hicks | 3a60a16 | 2010-03-22 00:41:35 -0500 | [diff] [blame] | 976 | { |
David Howells | a528d35 | 2017-01-31 16:46:22 +0000 | [diff] [blame] | 977 | struct dentry *dentry = path->dentry; |
Tyler Hicks | 3a60a16 | 2010-03-22 00:41:35 -0500 | [diff] [blame] | 978 | struct ecryptfs_mount_crypt_stat *mount_crypt_stat; |
| 979 | int rc = 0; |
| 980 | |
| 981 | mount_crypt_stat = &ecryptfs_superblock_to_private( |
| 982 | dentry->d_sb)->mount_crypt_stat; |
Christian Brauner | 0d56a45 | 2021-01-21 14:19:30 +0100 | [diff] [blame] | 983 | generic_fillattr(&init_user_ns, d_inode(dentry), stat); |
Tyler Hicks | 3a60a16 | 2010-03-22 00:41:35 -0500 | [diff] [blame] | 984 | if (mount_crypt_stat->flags & ECRYPTFS_GLOBAL_ENCRYPT_FILENAMES) { |
| 985 | char *target; |
| 986 | size_t targetsiz; |
| 987 | |
Al Viro | b22e8fe | 2013-11-29 22:51:47 -0500 | [diff] [blame] | 988 | target = ecryptfs_readlink_lower(dentry, &targetsiz); |
| 989 | if (!IS_ERR(target)) { |
Tyler Hicks | 3a60a16 | 2010-03-22 00:41:35 -0500 | [diff] [blame] | 990 | kfree(target); |
| 991 | stat->size = targetsiz; |
Al Viro | b22e8fe | 2013-11-29 22:51:47 -0500 | [diff] [blame] | 992 | } else { |
| 993 | rc = PTR_ERR(target); |
Tyler Hicks | 3a60a16 | 2010-03-22 00:41:35 -0500 | [diff] [blame] | 994 | } |
| 995 | } |
| 996 | return rc; |
| 997 | } |
| 998 | |
Christian Brauner | 549c729 | 2021-01-21 14:19:43 +0100 | [diff] [blame] | 999 | static int ecryptfs_getattr(struct user_namespace *mnt_userns, |
| 1000 | const struct path *path, struct kstat *stat, |
David Howells | a528d35 | 2017-01-31 16:46:22 +0000 | [diff] [blame] | 1001 | u32 request_mask, unsigned int flags) |
Tyler Hicks | f8f484d | 2009-11-04 02:48:01 -0600 | [diff] [blame] | 1002 | { |
David Howells | a528d35 | 2017-01-31 16:46:22 +0000 | [diff] [blame] | 1003 | struct dentry *dentry = path->dentry; |
Tyler Hicks | f8f484d | 2009-11-04 02:48:01 -0600 | [diff] [blame] | 1004 | struct kstat lower_stat; |
| 1005 | int rc; |
| 1006 | |
David Howells | a528d35 | 2017-01-31 16:46:22 +0000 | [diff] [blame] | 1007 | rc = vfs_getattr(ecryptfs_dentry_to_lower_path(dentry), &lower_stat, |
| 1008 | request_mask, flags); |
Tyler Hicks | f8f484d | 2009-11-04 02:48:01 -0600 | [diff] [blame] | 1009 | if (!rc) { |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 1010 | fsstack_copy_attr_all(d_inode(dentry), |
| 1011 | ecryptfs_inode_to_lower(d_inode(dentry))); |
Christian Brauner | 0d56a45 | 2021-01-21 14:19:30 +0100 | [diff] [blame] | 1012 | generic_fillattr(&init_user_ns, d_inode(dentry), stat); |
Tyler Hicks | f8f484d | 2009-11-04 02:48:01 -0600 | [diff] [blame] | 1013 | stat->blocks = lower_stat.blocks; |
| 1014 | } |
| 1015 | return rc; |
| 1016 | } |
| 1017 | |
Michael Halcrow | dd2a3b7 | 2007-02-12 00:53:46 -0800 | [diff] [blame] | 1018 | int |
Al Viro | 3767e25 | 2016-05-27 11:06:05 -0400 | [diff] [blame] | 1019 | ecryptfs_setxattr(struct dentry *dentry, struct inode *inode, |
| 1020 | const char *name, const void *value, |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1021 | size_t size, int flags) |
| 1022 | { |
Andreas Gruenbacher | 5d6c319 | 2016-09-29 17:48:42 +0200 | [diff] [blame] | 1023 | int rc; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1024 | struct dentry *lower_dentry; |
Miklos Szeredi | 0b96444 | 2021-01-19 17:22:03 +0100 | [diff] [blame] | 1025 | struct inode *lower_inode; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1026 | |
| 1027 | lower_dentry = ecryptfs_dentry_to_lower(dentry); |
Miklos Szeredi | 0b96444 | 2021-01-19 17:22:03 +0100 | [diff] [blame] | 1028 | lower_inode = d_inode(lower_dentry); |
| 1029 | if (!(lower_inode->i_opflags & IOP_XATTR)) { |
Christian Pulvermacher | cfce08c | 2010-03-23 11:51:38 -0500 | [diff] [blame] | 1030 | rc = -EOPNOTSUPP; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1031 | goto out; |
| 1032 | } |
Miklos Szeredi | 0b96444 | 2021-01-19 17:22:03 +0100 | [diff] [blame] | 1033 | inode_lock(lower_inode); |
Linus Torvalds | 7d6beb7 | 2021-02-23 13:39:45 -0800 | [diff] [blame] | 1034 | rc = __vfs_setxattr_locked(&init_user_ns, lower_dentry, name, value, size, flags, NULL); |
Miklos Szeredi | 0b96444 | 2021-01-19 17:22:03 +0100 | [diff] [blame] | 1035 | inode_unlock(lower_inode); |
Al Viro | 3767e25 | 2016-05-27 11:06:05 -0400 | [diff] [blame] | 1036 | if (!rc && inode) |
Miklos Szeredi | 0b96444 | 2021-01-19 17:22:03 +0100 | [diff] [blame] | 1037 | fsstack_copy_attr_all(inode, lower_inode); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1038 | out: |
| 1039 | return rc; |
| 1040 | } |
| 1041 | |
Michael Halcrow | dd2a3b7 | 2007-02-12 00:53:46 -0800 | [diff] [blame] | 1042 | ssize_t |
Al Viro | ce23e64 | 2016-04-11 00:48:00 -0400 | [diff] [blame] | 1043 | ecryptfs_getxattr_lower(struct dentry *lower_dentry, struct inode *lower_inode, |
| 1044 | const char *name, void *value, size_t size) |
Michael Halcrow | d7cdc5f | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 1045 | { |
Andreas Gruenbacher | 5d6c319 | 2016-09-29 17:48:42 +0200 | [diff] [blame] | 1046 | int rc; |
Michael Halcrow | d7cdc5f | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 1047 | |
Andreas Gruenbacher | 5d6c319 | 2016-09-29 17:48:42 +0200 | [diff] [blame] | 1048 | if (!(lower_inode->i_opflags & IOP_XATTR)) { |
Christian Pulvermacher | cfce08c | 2010-03-23 11:51:38 -0500 | [diff] [blame] | 1049 | rc = -EOPNOTSUPP; |
Michael Halcrow | d7cdc5f | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 1050 | goto out; |
| 1051 | } |
Al Viro | ce23e64 | 2016-04-11 00:48:00 -0400 | [diff] [blame] | 1052 | inode_lock(lower_inode); |
Andreas Gruenbacher | 5d6c319 | 2016-09-29 17:48:42 +0200 | [diff] [blame] | 1053 | rc = __vfs_getxattr(lower_dentry, lower_inode, name, value, size); |
Al Viro | ce23e64 | 2016-04-11 00:48:00 -0400 | [diff] [blame] | 1054 | inode_unlock(lower_inode); |
Michael Halcrow | d7cdc5f | 2007-10-16 01:28:10 -0700 | [diff] [blame] | 1055 | out: |
| 1056 | return rc; |
| 1057 | } |
| 1058 | |
Adrian Bunk | 7896b63 | 2008-02-06 01:38:32 -0800 | [diff] [blame] | 1059 | static ssize_t |
Al Viro | ce23e64 | 2016-04-11 00:48:00 -0400 | [diff] [blame] | 1060 | ecryptfs_getxattr(struct dentry *dentry, struct inode *inode, |
| 1061 | const char *name, void *value, size_t size) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1062 | { |
Al Viro | ce23e64 | 2016-04-11 00:48:00 -0400 | [diff] [blame] | 1063 | return ecryptfs_getxattr_lower(ecryptfs_dentry_to_lower(dentry), |
| 1064 | ecryptfs_inode_to_lower(inode), |
| 1065 | name, value, size); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1066 | } |
| 1067 | |
| 1068 | static ssize_t |
| 1069 | ecryptfs_listxattr(struct dentry *dentry, char *list, size_t size) |
| 1070 | { |
| 1071 | int rc = 0; |
| 1072 | struct dentry *lower_dentry; |
| 1073 | |
| 1074 | lower_dentry = ecryptfs_dentry_to_lower(dentry); |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 1075 | if (!d_inode(lower_dentry)->i_op->listxattr) { |
Christian Pulvermacher | cfce08c | 2010-03-23 11:51:38 -0500 | [diff] [blame] | 1076 | rc = -EOPNOTSUPP; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1077 | goto out; |
| 1078 | } |
Al Viro | 5955102 | 2016-01-22 15:40:57 -0500 | [diff] [blame] | 1079 | inode_lock(d_inode(lower_dentry)); |
David Howells | 2b0143b | 2015-03-17 22:25:59 +0000 | [diff] [blame] | 1080 | rc = d_inode(lower_dentry)->i_op->listxattr(lower_dentry, list, size); |
Al Viro | 5955102 | 2016-01-22 15:40:57 -0500 | [diff] [blame] | 1081 | inode_unlock(d_inode(lower_dentry)); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1082 | out: |
| 1083 | return rc; |
| 1084 | } |
| 1085 | |
Andreas Gruenbacher | 4b899da | 2016-09-29 17:48:36 +0200 | [diff] [blame] | 1086 | static int ecryptfs_removexattr(struct dentry *dentry, struct inode *inode, |
| 1087 | const char *name) |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1088 | { |
Andreas Gruenbacher | 5d6c319 | 2016-09-29 17:48:42 +0200 | [diff] [blame] | 1089 | int rc; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1090 | struct dentry *lower_dentry; |
Andreas Gruenbacher | 4b899da | 2016-09-29 17:48:36 +0200 | [diff] [blame] | 1091 | struct inode *lower_inode; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1092 | |
| 1093 | lower_dentry = ecryptfs_dentry_to_lower(dentry); |
Andreas Gruenbacher | 4b899da | 2016-09-29 17:48:36 +0200 | [diff] [blame] | 1094 | lower_inode = ecryptfs_inode_to_lower(inode); |
Andreas Gruenbacher | 5d6c319 | 2016-09-29 17:48:42 +0200 | [diff] [blame] | 1095 | if (!(lower_inode->i_opflags & IOP_XATTR)) { |
Christian Pulvermacher | cfce08c | 2010-03-23 11:51:38 -0500 | [diff] [blame] | 1096 | rc = -EOPNOTSUPP; |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1097 | goto out; |
| 1098 | } |
Andreas Gruenbacher | 4b899da | 2016-09-29 17:48:36 +0200 | [diff] [blame] | 1099 | inode_lock(lower_inode); |
Tycho Andersen | c7c7a1a1 | 2021-01-21 14:19:28 +0100 | [diff] [blame] | 1100 | rc = __vfs_removexattr(&init_user_ns, lower_dentry, name); |
Andreas Gruenbacher | 4b899da | 2016-09-29 17:48:36 +0200 | [diff] [blame] | 1101 | inode_unlock(lower_inode); |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1102 | out: |
| 1103 | return rc; |
| 1104 | } |
| 1105 | |
Arjan van de Ven | 754661f | 2007-02-12 00:55:38 -0800 | [diff] [blame] | 1106 | const struct inode_operations ecryptfs_symlink_iops = { |
Al Viro | 6b25539 | 2015-11-17 10:20:54 -0500 | [diff] [blame] | 1107 | .get_link = ecryptfs_get_link, |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1108 | .permission = ecryptfs_permission, |
| 1109 | .setattr = ecryptfs_setattr, |
Tyler Hicks | 3a60a16 | 2010-03-22 00:41:35 -0500 | [diff] [blame] | 1110 | .getattr = ecryptfs_getattr_link, |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1111 | .listxattr = ecryptfs_listxattr, |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1112 | }; |
| 1113 | |
Arjan van de Ven | 754661f | 2007-02-12 00:55:38 -0800 | [diff] [blame] | 1114 | const struct inode_operations ecryptfs_dir_iops = { |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1115 | .create = ecryptfs_create, |
| 1116 | .lookup = ecryptfs_lookup, |
| 1117 | .link = ecryptfs_link, |
| 1118 | .unlink = ecryptfs_unlink, |
| 1119 | .symlink = ecryptfs_symlink, |
| 1120 | .mkdir = ecryptfs_mkdir, |
| 1121 | .rmdir = ecryptfs_rmdir, |
| 1122 | .mknod = ecryptfs_mknod, |
| 1123 | .rename = ecryptfs_rename, |
| 1124 | .permission = ecryptfs_permission, |
| 1125 | .setattr = ecryptfs_setattr, |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1126 | .listxattr = ecryptfs_listxattr, |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1127 | }; |
| 1128 | |
Arjan van de Ven | 754661f | 2007-02-12 00:55:38 -0800 | [diff] [blame] | 1129 | const struct inode_operations ecryptfs_main_iops = { |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1130 | .permission = ecryptfs_permission, |
| 1131 | .setattr = ecryptfs_setattr, |
Tyler Hicks | f8f484d | 2009-11-04 02:48:01 -0600 | [diff] [blame] | 1132 | .getattr = ecryptfs_getattr, |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1133 | .listxattr = ecryptfs_listxattr, |
Andreas Gruenbacher | 4b899da | 2016-09-29 17:48:36 +0200 | [diff] [blame] | 1134 | }; |
| 1135 | |
| 1136 | static int ecryptfs_xattr_get(const struct xattr_handler *handler, |
| 1137 | struct dentry *dentry, struct inode *inode, |
| 1138 | const char *name, void *buffer, size_t size) |
| 1139 | { |
| 1140 | return ecryptfs_getxattr(dentry, inode, name, buffer, size); |
| 1141 | } |
| 1142 | |
| 1143 | static int ecryptfs_xattr_set(const struct xattr_handler *handler, |
Christian Brauner | e65ce2a | 2021-01-21 14:19:27 +0100 | [diff] [blame] | 1144 | struct user_namespace *mnt_userns, |
Andreas Gruenbacher | 4b899da | 2016-09-29 17:48:36 +0200 | [diff] [blame] | 1145 | struct dentry *dentry, struct inode *inode, |
| 1146 | const char *name, const void *value, size_t size, |
| 1147 | int flags) |
| 1148 | { |
| 1149 | if (value) |
| 1150 | return ecryptfs_setxattr(dentry, inode, name, value, size, flags); |
| 1151 | else { |
| 1152 | BUG_ON(flags != XATTR_REPLACE); |
| 1153 | return ecryptfs_removexattr(dentry, inode, name); |
| 1154 | } |
| 1155 | } |
| 1156 | |
YueHaibing | c036061 | 2019-06-14 23:51:17 +0800 | [diff] [blame] | 1157 | static const struct xattr_handler ecryptfs_xattr_handler = { |
Andreas Gruenbacher | 4b899da | 2016-09-29 17:48:36 +0200 | [diff] [blame] | 1158 | .prefix = "", /* match anything */ |
| 1159 | .get = ecryptfs_xattr_get, |
| 1160 | .set = ecryptfs_xattr_set, |
| 1161 | }; |
| 1162 | |
| 1163 | const struct xattr_handler *ecryptfs_xattr_handlers[] = { |
| 1164 | &ecryptfs_xattr_handler, |
| 1165 | NULL |
Michael Halcrow | 237fead | 2006-10-04 02:16:22 -0700 | [diff] [blame] | 1166 | }; |