diff options
Diffstat (limited to 'fs/ecryptfs/file.c')
| -rw-r--r-- | fs/ecryptfs/file.c | 211 | 
1 files changed, 114 insertions, 97 deletions
diff --git a/fs/ecryptfs/file.c b/fs/ecryptfs/file.c index 91da02987bf..db0fad3269c 100644 --- a/fs/ecryptfs/file.c +++ b/fs/ecryptfs/file.c @@ -31,6 +31,7 @@  #include <linux/security.h>  #include <linux/compat.h>  #include <linux/fs_stack.h> +#include <linux/aio.h>  #include "ecryptfs_kernel.h"  /** @@ -44,15 +45,13 @@   * The function to be used for directory reads is ecryptfs_read.   */  static ssize_t ecryptfs_read_update_atime(struct kiocb *iocb, -				const struct iovec *iov, -				unsigned long nr_segs, loff_t pos) +				struct iov_iter *to)  { -	int rc; -	struct dentry *lower_dentry; -	struct vfsmount *lower_vfsmount; +	ssize_t rc; +	struct path *path;  	struct file *file = iocb->ki_filp; -	rc = generic_file_aio_read(iocb, iov, nr_segs, pos); +	rc = generic_file_read_iter(iocb, to);  	/*  	 * Even though this is a async interface, we need to wait  	 * for IO to finish to update atime @@ -60,17 +59,16 @@ static ssize_t ecryptfs_read_update_atime(struct kiocb *iocb,  	if (-EIOCBQUEUED == rc)  		rc = wait_on_sync_kiocb(iocb);  	if (rc >= 0) { -		lower_dentry = ecryptfs_dentry_to_lower(file->f_path.dentry); -		lower_vfsmount = ecryptfs_dentry_to_lower_mnt(file->f_path.dentry); -		touch_atime(lower_vfsmount, lower_dentry); +		path = ecryptfs_dentry_to_lower_path(file->f_path.dentry); +		touch_atime(path);  	}  	return rc;  }  struct ecryptfs_getdents_callback { -	void *dirent; -	struct dentry *dentry; -	filldir_t filldir; +	struct dir_context ctx; +	struct dir_context *caller; +	struct super_block *sb;  	int filldir_called;  	int entries_written;  }; @@ -88,7 +86,7 @@ ecryptfs_filldir(void *dirent, const char *lower_name, int lower_namelen,  	buf->filldir_called++;  	rc = ecryptfs_decode_and_decrypt_filename(&name, &name_size, -						  buf->dentry, lower_name, +						  buf->sb, lower_name,  						  lower_namelen);  	if (rc) {  		printk(KERN_ERR "%s: Error attempting to decode and decrypt " @@ -96,9 +94,10 @@ ecryptfs_filldir(void *dirent, const char *lower_name, int lower_namelen,  		       rc);  		goto out;  	} -	rc = buf->filldir(buf->dirent, name, name_size, offset, ino, d_type); +	buf->caller->pos = buf->ctx.pos; +	rc = !dir_emit(buf->caller, name, name_size, ino, d_type);  	kfree(name); -	if (rc >= 0) +	if (!rc)  		buf->entries_written++;  out:  	return rc; @@ -107,40 +106,77 @@ out:  /**   * ecryptfs_readdir   * @file: The eCryptfs directory file - * @dirent: Directory entry handle - * @filldir: The filldir callback function + * @ctx: The actor to feed the entries to   */ -static int ecryptfs_readdir(struct file *file, void *dirent, filldir_t filldir) +static int ecryptfs_readdir(struct file *file, struct dir_context *ctx)  {  	int rc;  	struct file *lower_file; -	struct inode *inode; -	struct ecryptfs_getdents_callback buf; - +	struct inode *inode = file_inode(file); +	struct ecryptfs_getdents_callback buf = { +		.ctx.actor = ecryptfs_filldir, +		.caller = ctx, +		.sb = inode->i_sb, +	};  	lower_file = ecryptfs_file_to_lower(file); -	lower_file->f_pos = file->f_pos; -	inode = file->f_path.dentry->d_inode; -	memset(&buf, 0, sizeof(buf)); -	buf.dirent = dirent; -	buf.dentry = file->f_path.dentry; -	buf.filldir = filldir; -	buf.filldir_called = 0; -	buf.entries_written = 0; -	rc = vfs_readdir(lower_file, ecryptfs_filldir, (void *)&buf); -	file->f_pos = lower_file->f_pos; +	lower_file->f_pos = ctx->pos; +	rc = iterate_dir(lower_file, &buf.ctx); +	ctx->pos = buf.ctx.pos;  	if (rc < 0)  		goto out;  	if (buf.filldir_called && !buf.entries_written)  		goto out;  	if (rc >= 0)  		fsstack_copy_attr_atime(inode, -					lower_file->f_path.dentry->d_inode); +					file_inode(lower_file));  out:  	return rc;  }  struct kmem_cache *ecryptfs_file_info_cache; +static int read_or_initialize_metadata(struct dentry *dentry) +{ +	struct inode *inode = dentry->d_inode; +	struct ecryptfs_mount_crypt_stat *mount_crypt_stat; +	struct ecryptfs_crypt_stat *crypt_stat; +	int rc; + +	crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat; +	mount_crypt_stat = &ecryptfs_superblock_to_private( +						inode->i_sb)->mount_crypt_stat; +	mutex_lock(&crypt_stat->cs_mutex); + +	if (crypt_stat->flags & ECRYPTFS_POLICY_APPLIED && +	    crypt_stat->flags & ECRYPTFS_KEY_VALID) { +		rc = 0; +		goto out; +	} + +	rc = ecryptfs_read_metadata(dentry); +	if (!rc) +		goto out; + +	if (mount_crypt_stat->flags & ECRYPTFS_PLAINTEXT_PASSTHROUGH_ENABLED) { +		crypt_stat->flags &= ~(ECRYPTFS_I_SIZE_INITIALIZED +				       | ECRYPTFS_ENCRYPTED); +		rc = 0; +		goto out; +	} + +	if (!(mount_crypt_stat->flags & ECRYPTFS_XATTR_METADATA_ENABLED) && +	    !i_size_read(ecryptfs_inode_to_lower(inode))) { +		rc = ecryptfs_initialize_file(dentry, inode); +		if (!rc) +			goto out; +	} + +	rc = -EIO; +out: +	mutex_unlock(&crypt_stat->cs_mutex); +	return rc; +} +  /**   * ecryptfs_open   * @inode: inode speciying file to open @@ -158,7 +194,6 @@ static int ecryptfs_open(struct inode *inode, struct file *file)  	struct dentry *ecryptfs_dentry = file->f_path.dentry;  	/* Private value of ecryptfs_dentry allocated in  	 * ecryptfs_lookup() */ -	struct dentry *lower_dentry;  	struct ecryptfs_file_info *file_info;  	mount_crypt_stat = &ecryptfs_superblock_to_private( @@ -181,7 +216,6 @@ static int ecryptfs_open(struct inode *inode, struct file *file)  		rc = -ENOMEM;  		goto out;  	} -	lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry);  	crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat;  	mutex_lock(&crypt_stat->cs_mutex);  	if (!(crypt_stat->flags & ECRYPTFS_POLICY_APPLIED)) { @@ -191,22 +225,20 @@ static int ecryptfs_open(struct inode *inode, struct file *file)  				      | ECRYPTFS_ENCRYPTED);  	}  	mutex_unlock(&crypt_stat->cs_mutex); -	if (!ecryptfs_inode_to_private(inode)->lower_file) { -		rc = ecryptfs_init_persistent_file(ecryptfs_dentry); -		if (rc) { -			printk(KERN_ERR "%s: Error attempting to initialize " -			       "the persistent file for the dentry with name " -			       "[%s]; rc = [%d]\n", __func__, -			       ecryptfs_dentry->d_name.name, rc); -			goto out_free; -		} +	rc = ecryptfs_get_lower_file(ecryptfs_dentry, inode); +	if (rc) { +		printk(KERN_ERR "%s: Error attempting to initialize " +			"the lower file for the dentry with name " +			"[%s]; rc = [%d]\n", __func__, +			ecryptfs_dentry->d_name.name, rc); +		goto out_free;  	} -	if ((ecryptfs_inode_to_private(inode)->lower_file->f_flags & O_RDONLY) -	    && !(file->f_flags & O_RDONLY)) { +	if ((ecryptfs_inode_to_private(inode)->lower_file->f_flags & O_ACCMODE) +	    == O_RDONLY && (file->f_flags & O_ACCMODE) != O_RDONLY) {  		rc = -EPERM; -		printk(KERN_WARNING "%s: Lower persistent file is RO; eCryptfs " +		printk(KERN_WARNING "%s: Lower file is RO; eCryptfs "  		       "file must hence be opened RO\n", __func__); -		goto out_free; +		goto out_put;  	}  	ecryptfs_set_file_lower(  		file, ecryptfs_inode_to_private(inode)->lower_file); @@ -218,35 +250,15 @@ static int ecryptfs_open(struct inode *inode, struct file *file)  		rc = 0;  		goto out;  	} -	mutex_lock(&crypt_stat->cs_mutex); -	if (!(crypt_stat->flags & ECRYPTFS_POLICY_APPLIED) -	    || !(crypt_stat->flags & ECRYPTFS_KEY_VALID)) { -		rc = ecryptfs_read_metadata(ecryptfs_dentry); -		if (rc) { -			ecryptfs_printk(KERN_DEBUG, -					"Valid headers not found\n"); -			if (!(mount_crypt_stat->flags -			      & ECRYPTFS_PLAINTEXT_PASSTHROUGH_ENABLED)) { -				rc = -EIO; -				printk(KERN_WARNING "Either the lower file " -				       "is not in a valid eCryptfs format, " -				       "or the key could not be retrieved. " -				       "Plaintext passthrough mode is not " -				       "enabled; returning -EIO\n"); -				mutex_unlock(&crypt_stat->cs_mutex); -				goto out_free; -			} -			rc = 0; -			crypt_stat->flags &= ~(ECRYPTFS_ENCRYPTED); -			mutex_unlock(&crypt_stat->cs_mutex); -			goto out; -		} -	} -	mutex_unlock(&crypt_stat->cs_mutex); -	ecryptfs_printk(KERN_DEBUG, "inode w/ addr = [0x%p], i_ino = [0x%.16x] " -			"size: [0x%.16x]\n", inode, inode->i_ino, -			i_size_read(inode)); +	rc = read_or_initialize_metadata(ecryptfs_dentry); +	if (rc) +		goto out_put; +	ecryptfs_printk(KERN_DEBUG, "inode w/ addr = [0x%p], i_ino = " +			"[0x%.16lx] size: [0x%.16llx]\n", inode, inode->i_ino, +			(unsigned long long)i_size_read(inode));  	goto out; +out_put: +	ecryptfs_put_lower_file(inode);  out_free:  	kmem_cache_free(ecryptfs_file_info_cache,  			ecryptfs_file_to_private(file)); @@ -256,25 +268,33 @@ out:  static int ecryptfs_flush(struct file *file, fl_owner_t td)  { -	int rc = 0; -	struct file *lower_file = NULL; +	struct file *lower_file = ecryptfs_file_to_lower(file); -	lower_file = ecryptfs_file_to_lower(file); -	if (lower_file->f_op && lower_file->f_op->flush) -		rc = lower_file->f_op->flush(lower_file, td); -	return rc; +	if (lower_file->f_op->flush) { +		filemap_write_and_wait(file->f_mapping); +		return lower_file->f_op->flush(lower_file, td); +	} + +	return 0;  }  static int ecryptfs_release(struct inode *inode, struct file *file)  { +	ecryptfs_put_lower_file(inode);  	kmem_cache_free(ecryptfs_file_info_cache,  			ecryptfs_file_to_private(file));  	return 0;  }  static int -ecryptfs_fsync(struct file *file, int datasync) +ecryptfs_fsync(struct file *file, loff_t start, loff_t end, int datasync)  { +	int rc; + +	rc = filemap_write_and_wait(file->f_mapping); +	if (rc) +		return rc; +  	return vfs_fsync(ecryptfs_file_to_lower(file), datasync);  } @@ -284,7 +304,7 @@ static int ecryptfs_fasync(int fd, struct file *file, int flag)  	struct file *lower_file = NULL;  	lower_file = ecryptfs_file_to_lower(file); -	if (lower_file->f_op && lower_file->f_op->fasync) +	if (lower_file->f_op->fasync)  		rc = lower_file->f_op->fasync(fd, lower_file, flag);  	return rc;  } @@ -292,12 +312,10 @@ static int ecryptfs_fasync(int fd, struct file *file, int flag)  static long  ecryptfs_unlocked_ioctl(struct file *file, unsigned int cmd, unsigned long arg)  { -	struct file *lower_file = NULL; +	struct file *lower_file = ecryptfs_file_to_lower(file);  	long rc = -ENOTTY; -	if (ecryptfs_file_to_private(file)) -		lower_file = ecryptfs_file_to_lower(file); -	if (lower_file && lower_file->f_op && lower_file->f_op->unlocked_ioctl) +	if (lower_file->f_op->unlocked_ioctl)  		rc = lower_file->f_op->unlocked_ioctl(lower_file, cmd, arg);  	return rc;  } @@ -306,19 +324,18 @@ ecryptfs_unlocked_ioctl(struct file *file, unsigned int cmd, unsigned long arg)  static long  ecryptfs_compat_ioctl(struct file *file, unsigned int cmd, unsigned long arg)  { -	struct file *lower_file = NULL; +	struct file *lower_file = ecryptfs_file_to_lower(file);  	long rc = -ENOIOCTLCMD; -	if (ecryptfs_file_to_private(file)) -		lower_file = ecryptfs_file_to_lower(file); -	if (lower_file && lower_file->f_op && lower_file->f_op->compat_ioctl) +	if (lower_file->f_op && lower_file->f_op->compat_ioctl)  		rc = lower_file->f_op->compat_ioctl(lower_file, cmd, arg);  	return rc;  }  #endif  const struct file_operations ecryptfs_dir_fops = { -	.readdir = ecryptfs_readdir, +	.iterate = ecryptfs_readdir, +	.read = generic_read_dir,  	.unlocked_ioctl = ecryptfs_unlocked_ioctl,  #ifdef CONFIG_COMPAT  	.compat_ioctl = ecryptfs_compat_ioctl, @@ -334,11 +351,11 @@ const struct file_operations ecryptfs_dir_fops = {  const struct file_operations ecryptfs_main_fops = {  	.llseek = generic_file_llseek, -	.read = do_sync_read, -	.aio_read = ecryptfs_read_update_atime, -	.write = do_sync_write, -	.aio_write = generic_file_aio_write, -	.readdir = ecryptfs_readdir, +	.read = new_sync_read, +	.read_iter = ecryptfs_read_update_atime, +	.write = new_sync_write, +	.write_iter = generic_file_write_iter, +	.iterate = ecryptfs_readdir,  	.unlocked_ioctl = ecryptfs_unlocked_ioctl,  #ifdef CONFIG_COMPAT  	.compat_ioctl = ecryptfs_compat_ioctl,  | 
