diff options
Diffstat (limited to 'fs/ecryptfs')
| -rw-r--r-- | fs/ecryptfs/Kconfig | 5 | ||||
| -rw-r--r-- | fs/ecryptfs/crypto.c | 39 | ||||
| -rw-r--r-- | fs/ecryptfs/inode.c | 2 | ||||
| -rw-r--r-- | fs/ecryptfs/keystore.c | 39 | ||||
| -rw-r--r-- | fs/ecryptfs/kthread.c | 24 | ||||
| -rw-r--r-- | fs/ecryptfs/main.c | 10 | ||||
| -rw-r--r-- | fs/ecryptfs/mmap.c | 4 | ||||
| -rw-r--r-- | fs/ecryptfs/read_write.c | 32 | ||||
| -rw-r--r-- | fs/ecryptfs/super.c | 2 |
9 files changed, 84 insertions, 73 deletions
diff --git a/fs/ecryptfs/Kconfig b/fs/ecryptfs/Kconfig index 0c754e64232b..1cd6d9d3e29a 100644 --- a/fs/ecryptfs/Kconfig +++ b/fs/ecryptfs/Kconfig | |||
| @@ -1,6 +1,9 @@ | |||
| 1 | config ECRYPT_FS | 1 | config ECRYPT_FS |
| 2 | tristate "eCrypt filesystem layer support (EXPERIMENTAL)" | 2 | tristate "eCrypt filesystem layer support (EXPERIMENTAL)" |
| 3 | depends on EXPERIMENTAL && KEYS && CRYPTO && NET | 3 | depends on EXPERIMENTAL && KEYS && CRYPTO |
| 4 | select CRYPTO_ECB | ||
| 5 | select CRYPTO_CBC | ||
| 6 | select CRYPTO_MD5 | ||
| 4 | help | 7 | help |
| 5 | Encrypted filesystem that operates on the VFS layer. See | 8 | Encrypted filesystem that operates on the VFS layer. See |
| 6 | <file:Documentation/filesystems/ecryptfs.txt> to learn more about | 9 | <file:Documentation/filesystems/ecryptfs.txt> to learn more about |
diff --git a/fs/ecryptfs/crypto.c b/fs/ecryptfs/crypto.c index b91851f1cda3..fbb6e5eed697 100644 --- a/fs/ecryptfs/crypto.c +++ b/fs/ecryptfs/crypto.c | |||
| @@ -245,13 +245,11 @@ void ecryptfs_destroy_crypt_stat(struct ecryptfs_crypt_stat *crypt_stat) | |||
| 245 | crypto_free_blkcipher(crypt_stat->tfm); | 245 | crypto_free_blkcipher(crypt_stat->tfm); |
| 246 | if (crypt_stat->hash_tfm) | 246 | if (crypt_stat->hash_tfm) |
| 247 | crypto_free_hash(crypt_stat->hash_tfm); | 247 | crypto_free_hash(crypt_stat->hash_tfm); |
| 248 | mutex_lock(&crypt_stat->keysig_list_mutex); | ||
| 249 | list_for_each_entry_safe(key_sig, key_sig_tmp, | 248 | list_for_each_entry_safe(key_sig, key_sig_tmp, |
| 250 | &crypt_stat->keysig_list, crypt_stat_list) { | 249 | &crypt_stat->keysig_list, crypt_stat_list) { |
| 251 | list_del(&key_sig->crypt_stat_list); | 250 | list_del(&key_sig->crypt_stat_list); |
| 252 | kmem_cache_free(ecryptfs_key_sig_cache, key_sig); | 251 | kmem_cache_free(ecryptfs_key_sig_cache, key_sig); |
| 253 | } | 252 | } |
| 254 | mutex_unlock(&crypt_stat->keysig_list_mutex); | ||
| 255 | memset(crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat)); | 253 | memset(crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat)); |
| 256 | } | 254 | } |
| 257 | 255 | ||
| @@ -511,13 +509,14 @@ int ecryptfs_encrypt_page(struct page *page) | |||
| 511 | + extent_offset), crypt_stat); | 509 | + extent_offset), crypt_stat); |
| 512 | rc = ecryptfs_write_lower(ecryptfs_inode, enc_extent_virt, | 510 | rc = ecryptfs_write_lower(ecryptfs_inode, enc_extent_virt, |
| 513 | offset, crypt_stat->extent_size); | 511 | offset, crypt_stat->extent_size); |
| 514 | if (rc) { | 512 | if (rc < 0) { |
| 515 | ecryptfs_printk(KERN_ERR, "Error attempting " | 513 | ecryptfs_printk(KERN_ERR, "Error attempting " |
| 516 | "to write lower page; rc = [%d]" | 514 | "to write lower page; rc = [%d]" |
| 517 | "\n", rc); | 515 | "\n", rc); |
| 518 | goto out; | 516 | goto out; |
| 519 | } | 517 | } |
| 520 | } | 518 | } |
| 519 | rc = 0; | ||
| 521 | out: | 520 | out: |
| 522 | if (enc_extent_page) { | 521 | if (enc_extent_page) { |
| 523 | kunmap(enc_extent_page); | 522 | kunmap(enc_extent_page); |
| @@ -633,7 +632,7 @@ int ecryptfs_decrypt_page(struct page *page) | |||
| 633 | rc = ecryptfs_read_lower(enc_extent_virt, offset, | 632 | rc = ecryptfs_read_lower(enc_extent_virt, offset, |
| 634 | crypt_stat->extent_size, | 633 | crypt_stat->extent_size, |
| 635 | ecryptfs_inode); | 634 | ecryptfs_inode); |
| 636 | if (rc) { | 635 | if (rc < 0) { |
| 637 | ecryptfs_printk(KERN_ERR, "Error attempting " | 636 | ecryptfs_printk(KERN_ERR, "Error attempting " |
| 638 | "to read lower page; rc = [%d]" | 637 | "to read lower page; rc = [%d]" |
| 639 | "\n", rc); | 638 | "\n", rc); |
| @@ -797,6 +796,7 @@ int ecryptfs_init_crypt_ctx(struct ecryptfs_crypt_stat *crypt_stat) | |||
| 797 | kfree(full_alg_name); | 796 | kfree(full_alg_name); |
| 798 | if (IS_ERR(crypt_stat->tfm)) { | 797 | if (IS_ERR(crypt_stat->tfm)) { |
| 799 | rc = PTR_ERR(crypt_stat->tfm); | 798 | rc = PTR_ERR(crypt_stat->tfm); |
| 799 | crypt_stat->tfm = NULL; | ||
| 800 | ecryptfs_printk(KERN_ERR, "cryptfs: init_crypt_ctx(): " | 800 | ecryptfs_printk(KERN_ERR, "cryptfs: init_crypt_ctx(): " |
| 801 | "Error initializing cipher [%s]\n", | 801 | "Error initializing cipher [%s]\n", |
| 802 | crypt_stat->cipher); | 802 | crypt_stat->cipher); |
| @@ -925,7 +925,9 @@ static int ecryptfs_copy_mount_wide_sigs_to_inode_sigs( | |||
| 925 | struct ecryptfs_global_auth_tok *global_auth_tok; | 925 | struct ecryptfs_global_auth_tok *global_auth_tok; |
| 926 | int rc = 0; | 926 | int rc = 0; |
| 927 | 927 | ||
| 928 | mutex_lock(&crypt_stat->keysig_list_mutex); | ||
| 928 | mutex_lock(&mount_crypt_stat->global_auth_tok_list_mutex); | 929 | mutex_lock(&mount_crypt_stat->global_auth_tok_list_mutex); |
| 930 | |||
| 929 | list_for_each_entry(global_auth_tok, | 931 | list_for_each_entry(global_auth_tok, |
| 930 | &mount_crypt_stat->global_auth_tok_list, | 932 | &mount_crypt_stat->global_auth_tok_list, |
| 931 | mount_crypt_stat_list) { | 933 | mount_crypt_stat_list) { |
| @@ -934,13 +936,13 @@ static int ecryptfs_copy_mount_wide_sigs_to_inode_sigs( | |||
| 934 | rc = ecryptfs_add_keysig(crypt_stat, global_auth_tok->sig); | 936 | rc = ecryptfs_add_keysig(crypt_stat, global_auth_tok->sig); |
| 935 | if (rc) { | 937 | if (rc) { |
| 936 | printk(KERN_ERR "Error adding keysig; rc = [%d]\n", rc); | 938 | printk(KERN_ERR "Error adding keysig; rc = [%d]\n", rc); |
| 937 | mutex_unlock( | ||
| 938 | &mount_crypt_stat->global_auth_tok_list_mutex); | ||
| 939 | goto out; | 939 | goto out; |
| 940 | } | 940 | } |
| 941 | } | 941 | } |
| 942 | mutex_unlock(&mount_crypt_stat->global_auth_tok_list_mutex); | 942 | |
| 943 | out: | 943 | out: |
| 944 | mutex_unlock(&mount_crypt_stat->global_auth_tok_list_mutex); | ||
| 945 | mutex_unlock(&crypt_stat->keysig_list_mutex); | ||
| 944 | return rc; | 946 | return rc; |
| 945 | } | 947 | } |
| 946 | 948 | ||
| @@ -1212,14 +1214,15 @@ int ecryptfs_read_and_validate_header_region(char *data, | |||
| 1212 | crypt_stat->extent_size = ECRYPTFS_DEFAULT_EXTENT_SIZE; | 1214 | crypt_stat->extent_size = ECRYPTFS_DEFAULT_EXTENT_SIZE; |
| 1213 | rc = ecryptfs_read_lower(data, 0, crypt_stat->extent_size, | 1215 | rc = ecryptfs_read_lower(data, 0, crypt_stat->extent_size, |
| 1214 | ecryptfs_inode); | 1216 | ecryptfs_inode); |
| 1215 | if (rc) { | 1217 | if (rc < 0) { |
| 1216 | printk(KERN_ERR "%s: Error reading header region; rc = [%d]\n", | 1218 | printk(KERN_ERR "%s: Error reading header region; rc = [%d]\n", |
| 1217 | __func__, rc); | 1219 | __func__, rc); |
| 1218 | goto out; | 1220 | goto out; |
| 1219 | } | 1221 | } |
| 1220 | if (!contains_ecryptfs_marker(data + ECRYPTFS_FILE_SIZE_BYTES)) { | 1222 | if (!contains_ecryptfs_marker(data + ECRYPTFS_FILE_SIZE_BYTES)) { |
| 1221 | rc = -EINVAL; | 1223 | rc = -EINVAL; |
| 1222 | } | 1224 | } else |
| 1225 | rc = 0; | ||
| 1223 | out: | 1226 | out: |
| 1224 | return rc; | 1227 | return rc; |
| 1225 | } | 1228 | } |
| @@ -1314,10 +1317,11 @@ ecryptfs_write_metadata_to_contents(struct dentry *ecryptfs_dentry, | |||
| 1314 | 1317 | ||
| 1315 | rc = ecryptfs_write_lower(ecryptfs_dentry->d_inode, virt, | 1318 | rc = ecryptfs_write_lower(ecryptfs_dentry->d_inode, virt, |
| 1316 | 0, virt_len); | 1319 | 0, virt_len); |
| 1317 | if (rc) | 1320 | if (rc < 0) |
| 1318 | printk(KERN_ERR "%s: Error attempting to write header " | 1321 | printk(KERN_ERR "%s: Error attempting to write header " |
| 1319 | "information to lower file; rc = [%d]\n", __func__, | 1322 | "information to lower file; rc = [%d]\n", __func__, rc); |
| 1320 | rc); | 1323 | else |
| 1324 | rc = 0; | ||
| 1321 | return rc; | 1325 | return rc; |
| 1322 | } | 1326 | } |
| 1323 | 1327 | ||
| @@ -1597,7 +1601,7 @@ int ecryptfs_read_metadata(struct dentry *ecryptfs_dentry) | |||
| 1597 | } | 1601 | } |
| 1598 | rc = ecryptfs_read_lower(page_virt, 0, crypt_stat->extent_size, | 1602 | rc = ecryptfs_read_lower(page_virt, 0, crypt_stat->extent_size, |
| 1599 | ecryptfs_inode); | 1603 | ecryptfs_inode); |
| 1600 | if (!rc) | 1604 | if (rc >= 0) |
| 1601 | rc = ecryptfs_read_headers_virt(page_virt, crypt_stat, | 1605 | rc = ecryptfs_read_headers_virt(page_virt, crypt_stat, |
| 1602 | ecryptfs_dentry, | 1606 | ecryptfs_dentry, |
| 1603 | ECRYPTFS_VALIDATE_HEADER_SIZE); | 1607 | ECRYPTFS_VALIDATE_HEADER_SIZE); |
| @@ -1702,7 +1706,7 @@ ecryptfs_encrypt_filename(struct ecryptfs_filename *filename, | |||
| 1702 | } else { | 1706 | } else { |
| 1703 | printk(KERN_ERR "%s: No support for requested filename " | 1707 | printk(KERN_ERR "%s: No support for requested filename " |
| 1704 | "encryption method in this release\n", __func__); | 1708 | "encryption method in this release\n", __func__); |
| 1705 | rc = -ENOTSUPP; | 1709 | rc = -EOPNOTSUPP; |
| 1706 | goto out; | 1710 | goto out; |
| 1707 | } | 1711 | } |
| 1708 | out: | 1712 | out: |
| @@ -1763,7 +1767,7 @@ ecryptfs_process_key_cipher(struct crypto_blkcipher **key_tfm, | |||
| 1763 | if (IS_ERR(*key_tfm)) { | 1767 | if (IS_ERR(*key_tfm)) { |
| 1764 | rc = PTR_ERR(*key_tfm); | 1768 | rc = PTR_ERR(*key_tfm); |
| 1765 | printk(KERN_ERR "Unable to allocate crypto cipher with name " | 1769 | printk(KERN_ERR "Unable to allocate crypto cipher with name " |
| 1766 | "[%s]; rc = [%d]\n", cipher_name, rc); | 1770 | "[%s]; rc = [%d]\n", full_alg_name, rc); |
| 1767 | goto out; | 1771 | goto out; |
| 1768 | } | 1772 | } |
| 1769 | crypto_blkcipher_set_flags(*key_tfm, CRYPTO_TFM_REQ_WEAK_KEY); | 1773 | crypto_blkcipher_set_flags(*key_tfm, CRYPTO_TFM_REQ_WEAK_KEY); |
| @@ -1776,7 +1780,8 @@ ecryptfs_process_key_cipher(struct crypto_blkcipher **key_tfm, | |||
| 1776 | rc = crypto_blkcipher_setkey(*key_tfm, dummy_key, *key_size); | 1780 | rc = crypto_blkcipher_setkey(*key_tfm, dummy_key, *key_size); |
| 1777 | if (rc) { | 1781 | if (rc) { |
| 1778 | printk(KERN_ERR "Error attempting to set key of size [%zd] for " | 1782 | printk(KERN_ERR "Error attempting to set key of size [%zd] for " |
| 1779 | "cipher [%s]; rc = [%d]\n", *key_size, cipher_name, rc); | 1783 | "cipher [%s]; rc = [%d]\n", *key_size, full_alg_name, |
| 1784 | rc); | ||
| 1780 | rc = -EINVAL; | 1785 | rc = -EINVAL; |
| 1781 | goto out; | 1786 | goto out; |
| 1782 | } | 1787 | } |
| @@ -2166,7 +2171,7 @@ int ecryptfs_encrypt_and_encode_filename( | |||
| 2166 | (*encoded_name)[(*encoded_name_size)] = '\0'; | 2171 | (*encoded_name)[(*encoded_name_size)] = '\0'; |
| 2167 | (*encoded_name_size)++; | 2172 | (*encoded_name_size)++; |
| 2168 | } else { | 2173 | } else { |
| 2169 | rc = -ENOTSUPP; | 2174 | rc = -EOPNOTSUPP; |
| 2170 | } | 2175 | } |
| 2171 | if (rc) { | 2176 | if (rc) { |
| 2172 | printk(KERN_ERR "%s: Error attempting to encode " | 2177 | printk(KERN_ERR "%s: Error attempting to encode " |
diff --git a/fs/ecryptfs/inode.c b/fs/ecryptfs/inode.c index 2f0945d63297..056fed62d0de 100644 --- a/fs/ecryptfs/inode.c +++ b/fs/ecryptfs/inode.c | |||
| @@ -476,6 +476,7 @@ static int ecryptfs_unlink(struct inode *dir, struct dentry *dentry) | |||
| 476 | struct inode *lower_dir_inode = ecryptfs_inode_to_lower(dir); | 476 | struct inode *lower_dir_inode = ecryptfs_inode_to_lower(dir); |
| 477 | struct dentry *lower_dir_dentry; | 477 | struct dentry *lower_dir_dentry; |
| 478 | 478 | ||
| 479 | dget(lower_dentry); | ||
| 479 | lower_dir_dentry = lock_parent(lower_dentry); | 480 | lower_dir_dentry = lock_parent(lower_dentry); |
| 480 | rc = vfs_unlink(lower_dir_inode, lower_dentry); | 481 | rc = vfs_unlink(lower_dir_inode, lower_dentry); |
| 481 | if (rc) { | 482 | if (rc) { |
| @@ -489,6 +490,7 @@ static int ecryptfs_unlink(struct inode *dir, struct dentry *dentry) | |||
| 489 | d_drop(dentry); | 490 | d_drop(dentry); |
| 490 | out_unlock: | 491 | out_unlock: |
| 491 | unlock_dir(lower_dir_dentry); | 492 | unlock_dir(lower_dir_dentry); |
| 493 | dput(lower_dentry); | ||
| 492 | return rc; | 494 | return rc; |
| 493 | } | 495 | } |
| 494 | 496 | ||
diff --git a/fs/ecryptfs/keystore.c b/fs/ecryptfs/keystore.c index 259525c9abb8..a0a7847567e9 100644 --- a/fs/ecryptfs/keystore.c +++ b/fs/ecryptfs/keystore.c | |||
| @@ -416,7 +416,9 @@ ecryptfs_find_global_auth_tok_for_sig( | |||
| 416 | &mount_crypt_stat->global_auth_tok_list, | 416 | &mount_crypt_stat->global_auth_tok_list, |
| 417 | mount_crypt_stat_list) { | 417 | mount_crypt_stat_list) { |
| 418 | if (memcmp(walker->sig, sig, ECRYPTFS_SIG_SIZE_HEX) == 0) { | 418 | if (memcmp(walker->sig, sig, ECRYPTFS_SIG_SIZE_HEX) == 0) { |
| 419 | (*global_auth_tok) = walker; | 419 | rc = key_validate(walker->global_auth_tok_key); |
| 420 | if (!rc) | ||
| 421 | (*global_auth_tok) = walker; | ||
| 420 | goto out; | 422 | goto out; |
| 421 | } | 423 | } |
| 422 | } | 424 | } |
| @@ -612,7 +614,12 @@ ecryptfs_write_tag_70_packet(char *dest, size_t *remaining_bytes, | |||
| 612 | } | 614 | } |
| 613 | /* TODO: Support other key modules than passphrase for | 615 | /* TODO: Support other key modules than passphrase for |
| 614 | * filename encryption */ | 616 | * filename encryption */ |
| 615 | BUG_ON(s->auth_tok->token_type != ECRYPTFS_PASSWORD); | 617 | if (s->auth_tok->token_type != ECRYPTFS_PASSWORD) { |
| 618 | rc = -EOPNOTSUPP; | ||
| 619 | printk(KERN_INFO "%s: Filename encryption only supports " | ||
| 620 | "password tokens\n", __func__); | ||
| 621 | goto out_free_unlock; | ||
| 622 | } | ||
| 616 | sg_init_one( | 623 | sg_init_one( |
| 617 | &s->hash_sg, | 624 | &s->hash_sg, |
| 618 | (u8 *)s->auth_tok->token.password.session_key_encryption_key, | 625 | (u8 *)s->auth_tok->token.password.session_key_encryption_key, |
| @@ -910,7 +917,12 @@ ecryptfs_parse_tag_70_packet(char **filename, size_t *filename_size, | |||
| 910 | } | 917 | } |
| 911 | /* TODO: Support other key modules than passphrase for | 918 | /* TODO: Support other key modules than passphrase for |
| 912 | * filename encryption */ | 919 | * filename encryption */ |
| 913 | BUG_ON(s->auth_tok->token_type != ECRYPTFS_PASSWORD); | 920 | if (s->auth_tok->token_type != ECRYPTFS_PASSWORD) { |
| 921 | rc = -EOPNOTSUPP; | ||
| 922 | printk(KERN_INFO "%s: Filename encryption only supports " | ||
| 923 | "password tokens\n", __func__); | ||
| 924 | goto out_free_unlock; | ||
| 925 | } | ||
| 914 | rc = crypto_blkcipher_setkey( | 926 | rc = crypto_blkcipher_setkey( |
| 915 | s->desc.tfm, | 927 | s->desc.tfm, |
| 916 | s->auth_tok->token.password.session_key_encryption_key, | 928 | s->auth_tok->token.password.session_key_encryption_key, |
| @@ -1316,8 +1328,10 @@ parse_tag_3_packet(struct ecryptfs_crypt_stat *crypt_stat, | |||
| 1316 | rc = -EINVAL; | 1328 | rc = -EINVAL; |
| 1317 | goto out_free; | 1329 | goto out_free; |
| 1318 | } | 1330 | } |
| 1319 | ecryptfs_cipher_code_to_string(crypt_stat->cipher, | 1331 | rc = ecryptfs_cipher_code_to_string(crypt_stat->cipher, |
| 1320 | (u16)data[(*packet_size)]); | 1332 | (u16)data[(*packet_size)]); |
| 1333 | if (rc) | ||
| 1334 | goto out_free; | ||
| 1321 | /* A little extra work to differentiate among the AES key | 1335 | /* A little extra work to differentiate among the AES key |
| 1322 | * sizes; see RFC2440 */ | 1336 | * sizes; see RFC2440 */ |
| 1323 | switch(data[(*packet_size)++]) { | 1337 | switch(data[(*packet_size)++]) { |
| @@ -1328,7 +1342,9 @@ parse_tag_3_packet(struct ecryptfs_crypt_stat *crypt_stat, | |||
| 1328 | crypt_stat->key_size = | 1342 | crypt_stat->key_size = |
| 1329 | (*new_auth_tok)->session_key.encrypted_key_size; | 1343 | (*new_auth_tok)->session_key.encrypted_key_size; |
| 1330 | } | 1344 | } |
| 1331 | ecryptfs_init_crypt_ctx(crypt_stat); | 1345 | rc = ecryptfs_init_crypt_ctx(crypt_stat); |
| 1346 | if (rc) | ||
| 1347 | goto out_free; | ||
| 1332 | if (unlikely(data[(*packet_size)++] != 0x03)) { | 1348 | if (unlikely(data[(*packet_size)++] != 0x03)) { |
| 1333 | printk(KERN_WARNING "Only S2K ID 3 is currently supported\n"); | 1349 | printk(KERN_WARNING "Only S2K ID 3 is currently supported\n"); |
| 1334 | rc = -ENOSYS; | 1350 | rc = -ENOSYS; |
| @@ -2366,21 +2382,18 @@ struct kmem_cache *ecryptfs_key_sig_cache; | |||
| 2366 | int ecryptfs_add_keysig(struct ecryptfs_crypt_stat *crypt_stat, char *sig) | 2382 | int ecryptfs_add_keysig(struct ecryptfs_crypt_stat *crypt_stat, char *sig) |
| 2367 | { | 2383 | { |
| 2368 | struct ecryptfs_key_sig *new_key_sig; | 2384 | struct ecryptfs_key_sig *new_key_sig; |
| 2369 | int rc = 0; | ||
| 2370 | 2385 | ||
| 2371 | new_key_sig = kmem_cache_alloc(ecryptfs_key_sig_cache, GFP_KERNEL); | 2386 | new_key_sig = kmem_cache_alloc(ecryptfs_key_sig_cache, GFP_KERNEL); |
| 2372 | if (!new_key_sig) { | 2387 | if (!new_key_sig) { |
| 2373 | rc = -ENOMEM; | ||
| 2374 | printk(KERN_ERR | 2388 | printk(KERN_ERR |
| 2375 | "Error allocating from ecryptfs_key_sig_cache\n"); | 2389 | "Error allocating from ecryptfs_key_sig_cache\n"); |
| 2376 | goto out; | 2390 | return -ENOMEM; |
| 2377 | } | 2391 | } |
| 2378 | memcpy(new_key_sig->keysig, sig, ECRYPTFS_SIG_SIZE_HEX); | 2392 | memcpy(new_key_sig->keysig, sig, ECRYPTFS_SIG_SIZE_HEX); |
| 2379 | mutex_lock(&crypt_stat->keysig_list_mutex); | 2393 | /* Caller must hold keysig_list_mutex */ |
| 2380 | list_add(&new_key_sig->crypt_stat_list, &crypt_stat->keysig_list); | 2394 | list_add(&new_key_sig->crypt_stat_list, &crypt_stat->keysig_list); |
| 2381 | mutex_unlock(&crypt_stat->keysig_list_mutex); | 2395 | |
| 2382 | out: | 2396 | return 0; |
| 2383 | return rc; | ||
| 2384 | } | 2397 | } |
| 2385 | 2398 | ||
| 2386 | struct kmem_cache *ecryptfs_global_auth_tok_cache; | 2399 | struct kmem_cache *ecryptfs_global_auth_tok_cache; |
diff --git a/fs/ecryptfs/kthread.c b/fs/ecryptfs/kthread.c index c6d7a4d748a0..e14cf7e588db 100644 --- a/fs/ecryptfs/kthread.c +++ b/fs/ecryptfs/kthread.c | |||
| @@ -136,6 +136,7 @@ int ecryptfs_privileged_open(struct file **lower_file, | |||
| 136 | const struct cred *cred) | 136 | const struct cred *cred) |
| 137 | { | 137 | { |
| 138 | struct ecryptfs_open_req *req; | 138 | struct ecryptfs_open_req *req; |
| 139 | int flags = O_LARGEFILE; | ||
| 139 | int rc = 0; | 140 | int rc = 0; |
| 140 | 141 | ||
| 141 | /* Corresponding dput() and mntput() are done when the | 142 | /* Corresponding dput() and mntput() are done when the |
| @@ -143,10 +144,14 @@ int ecryptfs_privileged_open(struct file **lower_file, | |||
| 143 | * destroyed. */ | 144 | * destroyed. */ |
| 144 | dget(lower_dentry); | 145 | dget(lower_dentry); |
| 145 | mntget(lower_mnt); | 146 | mntget(lower_mnt); |
| 146 | (*lower_file) = dentry_open(lower_dentry, lower_mnt, | 147 | flags |= IS_RDONLY(lower_dentry->d_inode) ? O_RDONLY : O_RDWR; |
| 147 | (O_RDWR | O_LARGEFILE), cred); | 148 | (*lower_file) = dentry_open(lower_dentry, lower_mnt, flags, cred); |
| 148 | if (!IS_ERR(*lower_file)) | 149 | if (!IS_ERR(*lower_file)) |
| 149 | goto out; | 150 | goto out; |
| 151 | if (flags & O_RDONLY) { | ||
| 152 | rc = PTR_ERR((*lower_file)); | ||
| 153 | goto out; | ||
| 154 | } | ||
| 150 | req = kmem_cache_alloc(ecryptfs_open_req_cache, GFP_KERNEL); | 155 | req = kmem_cache_alloc(ecryptfs_open_req_cache, GFP_KERNEL); |
| 151 | if (!req) { | 156 | if (!req) { |
| 152 | rc = -ENOMEM; | 157 | rc = -ENOMEM; |
| @@ -180,21 +185,8 @@ int ecryptfs_privileged_open(struct file **lower_file, | |||
| 180 | __func__); | 185 | __func__); |
| 181 | goto out_unlock; | 186 | goto out_unlock; |
| 182 | } | 187 | } |
| 183 | if (IS_ERR(*req->lower_file)) { | 188 | if (IS_ERR(*req->lower_file)) |
| 184 | rc = PTR_ERR(*req->lower_file); | 189 | rc = PTR_ERR(*req->lower_file); |
| 185 | dget(lower_dentry); | ||
| 186 | mntget(lower_mnt); | ||
| 187 | (*lower_file) = dentry_open(lower_dentry, lower_mnt, | ||
| 188 | (O_RDONLY | O_LARGEFILE), cred); | ||
| 189 | if (IS_ERR(*lower_file)) { | ||
| 190 | rc = PTR_ERR(*req->lower_file); | ||
| 191 | (*lower_file) = NULL; | ||
| 192 | printk(KERN_WARNING "%s: Error attempting privileged " | ||
| 193 | "open of lower file with either RW or RO " | ||
| 194 | "perms; rc = [%d]. Giving up.\n", | ||
| 195 | __func__, rc); | ||
| 196 | } | ||
| 197 | } | ||
| 198 | out_unlock: | 190 | out_unlock: |
| 199 | mutex_unlock(&req->mux); | 191 | mutex_unlock(&req->mux); |
| 200 | out_free: | 192 | out_free: |
diff --git a/fs/ecryptfs/main.c b/fs/ecryptfs/main.c index 9f0aa9883c28..c6ac85d6c701 100644 --- a/fs/ecryptfs/main.c +++ b/fs/ecryptfs/main.c | |||
| @@ -35,6 +35,7 @@ | |||
| 35 | #include <linux/key.h> | 35 | #include <linux/key.h> |
| 36 | #include <linux/parser.h> | 36 | #include <linux/parser.h> |
| 37 | #include <linux/fs_stack.h> | 37 | #include <linux/fs_stack.h> |
| 38 | #include <linux/ima.h> | ||
| 38 | #include "ecryptfs_kernel.h" | 39 | #include "ecryptfs_kernel.h" |
| 39 | 40 | ||
| 40 | /** | 41 | /** |
| @@ -118,6 +119,7 @@ int ecryptfs_init_persistent_file(struct dentry *ecryptfs_dentry) | |||
| 118 | const struct cred *cred = current_cred(); | 119 | const struct cred *cred = current_cred(); |
| 119 | struct ecryptfs_inode_info *inode_info = | 120 | struct ecryptfs_inode_info *inode_info = |
| 120 | ecryptfs_inode_to_private(ecryptfs_dentry->d_inode); | 121 | ecryptfs_inode_to_private(ecryptfs_dentry->d_inode); |
| 122 | int opened_lower_file = 0; | ||
| 121 | int rc = 0; | 123 | int rc = 0; |
| 122 | 124 | ||
| 123 | mutex_lock(&inode_info->lower_file_mutex); | 125 | mutex_lock(&inode_info->lower_file_mutex); |
| @@ -129,15 +131,17 @@ int ecryptfs_init_persistent_file(struct dentry *ecryptfs_dentry) | |||
| 129 | lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry); | 131 | lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry); |
| 130 | rc = ecryptfs_privileged_open(&inode_info->lower_file, | 132 | rc = ecryptfs_privileged_open(&inode_info->lower_file, |
| 131 | lower_dentry, lower_mnt, cred); | 133 | lower_dentry, lower_mnt, cred); |
| 132 | if (rc || IS_ERR(inode_info->lower_file)) { | 134 | if (rc) { |
| 133 | printk(KERN_ERR "Error opening lower persistent file " | 135 | printk(KERN_ERR "Error opening lower persistent file " |
| 134 | "for lower_dentry [0x%p] and lower_mnt [0x%p]; " | 136 | "for lower_dentry [0x%p] and lower_mnt [0x%p]; " |
| 135 | "rc = [%d]\n", lower_dentry, lower_mnt, rc); | 137 | "rc = [%d]\n", lower_dentry, lower_mnt, rc); |
| 136 | rc = PTR_ERR(inode_info->lower_file); | ||
| 137 | inode_info->lower_file = NULL; | 138 | inode_info->lower_file = NULL; |
| 138 | } | 139 | } else |
| 140 | opened_lower_file = 1; | ||
| 139 | } | 141 | } |
| 140 | mutex_unlock(&inode_info->lower_file_mutex); | 142 | mutex_unlock(&inode_info->lower_file_mutex); |
| 143 | if (opened_lower_file) | ||
| 144 | ima_counts_get(inode_info->lower_file); | ||
| 141 | return rc; | 145 | return rc; |
| 142 | } | 146 | } |
| 143 | 147 | ||
diff --git a/fs/ecryptfs/mmap.c b/fs/ecryptfs/mmap.c index 05772aeaa8f4..df4ce99d0597 100644 --- a/fs/ecryptfs/mmap.c +++ b/fs/ecryptfs/mmap.c | |||
| @@ -396,9 +396,11 @@ static int ecryptfs_write_inode_size_to_header(struct inode *ecryptfs_inode) | |||
| 396 | rc = ecryptfs_write_lower(ecryptfs_inode, file_size_virt, 0, | 396 | rc = ecryptfs_write_lower(ecryptfs_inode, file_size_virt, 0, |
| 397 | sizeof(u64)); | 397 | sizeof(u64)); |
| 398 | kfree(file_size_virt); | 398 | kfree(file_size_virt); |
| 399 | if (rc) | 399 | if (rc < 0) |
| 400 | printk(KERN_ERR "%s: Error writing file size to header; " | 400 | printk(KERN_ERR "%s: Error writing file size to header; " |
| 401 | "rc = [%d]\n", __func__, rc); | 401 | "rc = [%d]\n", __func__, rc); |
| 402 | else | ||
| 403 | rc = 0; | ||
| 402 | out: | 404 | out: |
| 403 | return rc; | 405 | return rc; |
| 404 | } | 406 | } |
diff --git a/fs/ecryptfs/read_write.c b/fs/ecryptfs/read_write.c index a137c6ea2fee..0cc4fafd6552 100644 --- a/fs/ecryptfs/read_write.c +++ b/fs/ecryptfs/read_write.c | |||
| @@ -34,15 +34,14 @@ | |||
| 34 | * | 34 | * |
| 35 | * Write data to the lower file. | 35 | * Write data to the lower file. |
| 36 | * | 36 | * |
| 37 | * Returns zero on success; non-zero on error | 37 | * Returns bytes written on success; less than zero on error |
| 38 | */ | 38 | */ |
| 39 | int ecryptfs_write_lower(struct inode *ecryptfs_inode, char *data, | 39 | int ecryptfs_write_lower(struct inode *ecryptfs_inode, char *data, |
| 40 | loff_t offset, size_t size) | 40 | loff_t offset, size_t size) |
| 41 | { | 41 | { |
| 42 | struct ecryptfs_inode_info *inode_info; | 42 | struct ecryptfs_inode_info *inode_info; |
| 43 | ssize_t octets_written; | ||
| 44 | mm_segment_t fs_save; | 43 | mm_segment_t fs_save; |
| 45 | int rc = 0; | 44 | ssize_t rc; |
| 46 | 45 | ||
| 47 | inode_info = ecryptfs_inode_to_private(ecryptfs_inode); | 46 | inode_info = ecryptfs_inode_to_private(ecryptfs_inode); |
| 48 | mutex_lock(&inode_info->lower_file_mutex); | 47 | mutex_lock(&inode_info->lower_file_mutex); |
| @@ -50,14 +49,9 @@ int ecryptfs_write_lower(struct inode *ecryptfs_inode, char *data, | |||
| 50 | inode_info->lower_file->f_pos = offset; | 49 | inode_info->lower_file->f_pos = offset; |
| 51 | fs_save = get_fs(); | 50 | fs_save = get_fs(); |
| 52 | set_fs(get_ds()); | 51 | set_fs(get_ds()); |
| 53 | octets_written = vfs_write(inode_info->lower_file, data, size, | 52 | rc = vfs_write(inode_info->lower_file, data, size, |
| 54 | &inode_info->lower_file->f_pos); | 53 | &inode_info->lower_file->f_pos); |
| 55 | set_fs(fs_save); | 54 | set_fs(fs_save); |
| 56 | if (octets_written < 0) { | ||
| 57 | printk(KERN_ERR "%s: octets_written = [%td]; " | ||
| 58 | "expected [%td]\n", __func__, octets_written, size); | ||
| 59 | rc = -EINVAL; | ||
| 60 | } | ||
| 61 | mutex_unlock(&inode_info->lower_file_mutex); | 55 | mutex_unlock(&inode_info->lower_file_mutex); |
| 62 | mark_inode_dirty_sync(ecryptfs_inode); | 56 | mark_inode_dirty_sync(ecryptfs_inode); |
| 63 | return rc; | 57 | return rc; |
| @@ -91,6 +85,8 @@ int ecryptfs_write_lower_page_segment(struct inode *ecryptfs_inode, | |||
| 91 | + offset_in_page); | 85 | + offset_in_page); |
| 92 | virt = kmap(page_for_lower); | 86 | virt = kmap(page_for_lower); |
| 93 | rc = ecryptfs_write_lower(ecryptfs_inode, virt, offset, size); | 87 | rc = ecryptfs_write_lower(ecryptfs_inode, virt, offset, size); |
| 88 | if (rc > 0) | ||
| 89 | rc = 0; | ||
| 94 | kunmap(page_for_lower); | 90 | kunmap(page_for_lower); |
| 95 | return rc; | 91 | return rc; |
| 96 | } | 92 | } |
| @@ -229,30 +225,24 @@ out: | |||
| 229 | * Read @size bytes of data at byte offset @offset from the lower | 225 | * Read @size bytes of data at byte offset @offset from the lower |
| 230 | * inode into memory location @data. | 226 | * inode into memory location @data. |
| 231 | * | 227 | * |
| 232 | * Returns zero on success; non-zero on error | 228 | * Returns bytes read on success; 0 on EOF; less than zero on error |
| 233 | */ | 229 | */ |
| 234 | int ecryptfs_read_lower(char *data, loff_t offset, size_t size, | 230 | int ecryptfs_read_lower(char *data, loff_t offset, size_t size, |
| 235 | struct inode *ecryptfs_inode) | 231 | struct inode *ecryptfs_inode) |
| 236 | { | 232 | { |
| 237 | struct ecryptfs_inode_info *inode_info = | 233 | struct ecryptfs_inode_info *inode_info = |
| 238 | ecryptfs_inode_to_private(ecryptfs_inode); | 234 | ecryptfs_inode_to_private(ecryptfs_inode); |
| 239 | ssize_t octets_read; | ||
| 240 | mm_segment_t fs_save; | 235 | mm_segment_t fs_save; |
| 241 | int rc = 0; | 236 | ssize_t rc; |
| 242 | 237 | ||
| 243 | mutex_lock(&inode_info->lower_file_mutex); | 238 | mutex_lock(&inode_info->lower_file_mutex); |
| 244 | BUG_ON(!inode_info->lower_file); | 239 | BUG_ON(!inode_info->lower_file); |
| 245 | inode_info->lower_file->f_pos = offset; | 240 | inode_info->lower_file->f_pos = offset; |
| 246 | fs_save = get_fs(); | 241 | fs_save = get_fs(); |
| 247 | set_fs(get_ds()); | 242 | set_fs(get_ds()); |
| 248 | octets_read = vfs_read(inode_info->lower_file, data, size, | 243 | rc = vfs_read(inode_info->lower_file, data, size, |
| 249 | &inode_info->lower_file->f_pos); | 244 | &inode_info->lower_file->f_pos); |
| 250 | set_fs(fs_save); | 245 | set_fs(fs_save); |
| 251 | if (octets_read < 0) { | ||
| 252 | printk(KERN_ERR "%s: octets_read = [%td]; " | ||
| 253 | "expected [%td]\n", __func__, octets_read, size); | ||
| 254 | rc = -EINVAL; | ||
| 255 | } | ||
| 256 | mutex_unlock(&inode_info->lower_file_mutex); | 246 | mutex_unlock(&inode_info->lower_file_mutex); |
| 257 | return rc; | 247 | return rc; |
| 258 | } | 248 | } |
| @@ -284,6 +274,8 @@ int ecryptfs_read_lower_page_segment(struct page *page_for_ecryptfs, | |||
| 284 | offset = ((((loff_t)page_index) << PAGE_CACHE_SHIFT) + offset_in_page); | 274 | offset = ((((loff_t)page_index) << PAGE_CACHE_SHIFT) + offset_in_page); |
| 285 | virt = kmap(page_for_ecryptfs); | 275 | virt = kmap(page_for_ecryptfs); |
| 286 | rc = ecryptfs_read_lower(virt, offset, size, ecryptfs_inode); | 276 | rc = ecryptfs_read_lower(virt, offset, size, ecryptfs_inode); |
| 277 | if (rc > 0) | ||
| 278 | rc = 0; | ||
| 287 | kunmap(page_for_ecryptfs); | 279 | kunmap(page_for_ecryptfs); |
| 288 | flush_dcache_page(page_for_ecryptfs); | 280 | flush_dcache_page(page_for_ecryptfs); |
| 289 | return rc; | 281 | return rc; |
diff --git a/fs/ecryptfs/super.c b/fs/ecryptfs/super.c index 12d649602d3a..b15a43a80ab7 100644 --- a/fs/ecryptfs/super.c +++ b/fs/ecryptfs/super.c | |||
| @@ -77,7 +77,6 @@ static void ecryptfs_destroy_inode(struct inode *inode) | |||
| 77 | struct ecryptfs_inode_info *inode_info; | 77 | struct ecryptfs_inode_info *inode_info; |
| 78 | 78 | ||
| 79 | inode_info = ecryptfs_inode_to_private(inode); | 79 | inode_info = ecryptfs_inode_to_private(inode); |
| 80 | mutex_lock(&inode_info->lower_file_mutex); | ||
| 81 | if (inode_info->lower_file) { | 80 | if (inode_info->lower_file) { |
| 82 | struct dentry *lower_dentry = | 81 | struct dentry *lower_dentry = |
| 83 | inode_info->lower_file->f_dentry; | 82 | inode_info->lower_file->f_dentry; |
| @@ -89,7 +88,6 @@ static void ecryptfs_destroy_inode(struct inode *inode) | |||
| 89 | d_drop(lower_dentry); | 88 | d_drop(lower_dentry); |
| 90 | } | 89 | } |
| 91 | } | 90 | } |
| 92 | mutex_unlock(&inode_info->lower_file_mutex); | ||
| 93 | ecryptfs_destroy_crypt_stat(&inode_info->crypt_stat); | 91 | ecryptfs_destroy_crypt_stat(&inode_info->crypt_stat); |
| 94 | kmem_cache_free(ecryptfs_inode_info_cache, inode_info); | 92 | kmem_cache_free(ecryptfs_inode_info_cache, inode_info); |
| 95 | } | 93 | } |
