1237fead6SMichael Halcrow /** 2237fead6SMichael Halcrow * eCryptfs: Linux filesystem encryption layer 3237fead6SMichael Halcrow * This is where eCryptfs coordinates the symmetric encryption and 4237fead6SMichael Halcrow * decryption of the file data as it passes between the lower 5237fead6SMichael Halcrow * encrypted file and the upper decrypted file. 6237fead6SMichael Halcrow * 7237fead6SMichael Halcrow * Copyright (C) 1997-2003 Erez Zadok 8237fead6SMichael Halcrow * Copyright (C) 2001-2003 Stony Brook University 9dd2a3b7aSMichael Halcrow * Copyright (C) 2004-2007 International Business Machines Corp. 10237fead6SMichael Halcrow * Author(s): Michael A. Halcrow <mahalcro@us.ibm.com> 11237fead6SMichael Halcrow * 12237fead6SMichael Halcrow * This program is free software; you can redistribute it and/or 13237fead6SMichael Halcrow * modify it under the terms of the GNU General Public License as 14237fead6SMichael Halcrow * published by the Free Software Foundation; either version 2 of the 15237fead6SMichael Halcrow * License, or (at your option) any later version. 16237fead6SMichael Halcrow * 17237fead6SMichael Halcrow * This program is distributed in the hope that it will be useful, but 18237fead6SMichael Halcrow * WITHOUT ANY WARRANTY; without even the implied warranty of 19237fead6SMichael Halcrow * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 20237fead6SMichael Halcrow * General Public License for more details. 21237fead6SMichael Halcrow * 22237fead6SMichael Halcrow * You should have received a copy of the GNU General Public License 23237fead6SMichael Halcrow * along with this program; if not, write to the Free Software 24237fead6SMichael Halcrow * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 25237fead6SMichael Halcrow * 02111-1307, USA. 26237fead6SMichael Halcrow */ 27237fead6SMichael Halcrow 28237fead6SMichael Halcrow #include <linux/pagemap.h> 29237fead6SMichael Halcrow #include <linux/writeback.h> 30237fead6SMichael Halcrow #include <linux/page-flags.h> 31237fead6SMichael Halcrow #include <linux/mount.h> 32237fead6SMichael Halcrow #include <linux/file.h> 33237fead6SMichael Halcrow #include <linux/crypto.h> 34237fead6SMichael Halcrow #include <linux/scatterlist.h> 35237fead6SMichael Halcrow #include "ecryptfs_kernel.h" 36237fead6SMichael Halcrow 37237fead6SMichael Halcrow struct kmem_cache *ecryptfs_lower_page_cache; 38237fead6SMichael Halcrow 39237fead6SMichael Halcrow /** 40237fead6SMichael Halcrow * ecryptfs_get1page 41237fead6SMichael Halcrow * 42237fead6SMichael Halcrow * Get one page from cache or lower f/s, return error otherwise. 43237fead6SMichael Halcrow * 44237fead6SMichael Halcrow * Returns unlocked and up-to-date page (if ok), with increased 45237fead6SMichael Halcrow * refcnt. 46237fead6SMichael Halcrow */ 47237fead6SMichael Halcrow static struct page *ecryptfs_get1page(struct file *file, int index) 48237fead6SMichael Halcrow { 49237fead6SMichael Halcrow struct dentry *dentry; 50237fead6SMichael Halcrow struct inode *inode; 51237fead6SMichael Halcrow struct address_space *mapping; 52237fead6SMichael Halcrow 53bd243a4bSJosef "Jeff" Sipek dentry = file->f_path.dentry; 54237fead6SMichael Halcrow inode = dentry->d_inode; 55237fead6SMichael Halcrow mapping = inode->i_mapping; 566fe6900eSNick Piggin return read_mapping_page(mapping, index, (void *)file); 57237fead6SMichael Halcrow } 58237fead6SMichael Halcrow 59237fead6SMichael Halcrow /** 60237fead6SMichael Halcrow * ecryptfs_fill_zeros 61237fead6SMichael Halcrow * @file: The ecryptfs file 62237fead6SMichael Halcrow * @new_length: The new length of the data in the underlying file; 63237fead6SMichael Halcrow * everything between the prior end of the file and the 64237fead6SMichael Halcrow * new end of the file will be filled with zero's. 65237fead6SMichael Halcrow * new_length must be greater than current length 66237fead6SMichael Halcrow * 67237fead6SMichael Halcrow * Function for handling lseek-ing past the end of the file. 68237fead6SMichael Halcrow * 69237fead6SMichael Halcrow * This function does not support shrinking, only growing a file. 70237fead6SMichael Halcrow * 71237fead6SMichael Halcrow * Returns zero on success; non-zero otherwise. 72237fead6SMichael Halcrow */ 73237fead6SMichael Halcrow int ecryptfs_fill_zeros(struct file *file, loff_t new_length) 74237fead6SMichael Halcrow { 75237fead6SMichael Halcrow int rc = 0; 76bd243a4bSJosef "Jeff" Sipek struct dentry *dentry = file->f_path.dentry; 77237fead6SMichael Halcrow struct inode *inode = dentry->d_inode; 78237fead6SMichael Halcrow pgoff_t old_end_page_index = 0; 79237fead6SMichael Halcrow pgoff_t index = old_end_page_index; 80237fead6SMichael Halcrow int old_end_pos_in_page = -1; 81237fead6SMichael Halcrow pgoff_t new_end_page_index; 82237fead6SMichael Halcrow int new_end_pos_in_page; 83237fead6SMichael Halcrow loff_t cur_length = i_size_read(inode); 84237fead6SMichael Halcrow 85237fead6SMichael Halcrow if (cur_length != 0) { 86237fead6SMichael Halcrow index = old_end_page_index = 87237fead6SMichael Halcrow ((cur_length - 1) >> PAGE_CACHE_SHIFT); 88237fead6SMichael Halcrow old_end_pos_in_page = ((cur_length - 1) & ~PAGE_CACHE_MASK); 89237fead6SMichael Halcrow } 90237fead6SMichael Halcrow new_end_page_index = ((new_length - 1) >> PAGE_CACHE_SHIFT); 91237fead6SMichael Halcrow new_end_pos_in_page = ((new_length - 1) & ~PAGE_CACHE_MASK); 92237fead6SMichael Halcrow ecryptfs_printk(KERN_DEBUG, "old_end_page_index = [0x%.16x]; " 93237fead6SMichael Halcrow "old_end_pos_in_page = [%d]; " 94237fead6SMichael Halcrow "new_end_page_index = [0x%.16x]; " 95237fead6SMichael Halcrow "new_end_pos_in_page = [%d]\n", 96237fead6SMichael Halcrow old_end_page_index, old_end_pos_in_page, 97237fead6SMichael Halcrow new_end_page_index, new_end_pos_in_page); 98237fead6SMichael Halcrow if (old_end_page_index == new_end_page_index) { 99237fead6SMichael Halcrow /* Start and end are in the same page; we just need to 100237fead6SMichael Halcrow * set a portion of the existing page to zero's */ 101*240e2df5SMichael Halcrow rc = ecryptfs_write_zeros(file, index, 102*240e2df5SMichael Halcrow (old_end_pos_in_page + 1), 103*240e2df5SMichael Halcrow (new_end_pos_in_page 104*240e2df5SMichael Halcrow - old_end_pos_in_page)); 105237fead6SMichael Halcrow if (rc) 106*240e2df5SMichael Halcrow ecryptfs_printk(KERN_ERR, "ecryptfs_write_zeros(" 107*240e2df5SMichael Halcrow "file=[%p], " 108237fead6SMichael Halcrow "index=[0x%.16x], " 109237fead6SMichael Halcrow "old_end_pos_in_page=[d], " 110237fead6SMichael Halcrow "(PAGE_CACHE_SIZE - new_end_pos_in_page" 111237fead6SMichael Halcrow "=[%d]" 112237fead6SMichael Halcrow ")=[d]) returned [%d]\n", file, index, 113237fead6SMichael Halcrow old_end_pos_in_page, 114237fead6SMichael Halcrow new_end_pos_in_page, 115237fead6SMichael Halcrow (PAGE_CACHE_SIZE - new_end_pos_in_page), 116237fead6SMichael Halcrow rc); 117237fead6SMichael Halcrow goto out; 118237fead6SMichael Halcrow } 119237fead6SMichael Halcrow /* Fill the remainder of the previous last page with zeros */ 120*240e2df5SMichael Halcrow rc = ecryptfs_write_zeros(file, index, (old_end_pos_in_page + 1), 121237fead6SMichael Halcrow ((PAGE_CACHE_SIZE - 1) - old_end_pos_in_page)); 122237fead6SMichael Halcrow if (rc) { 123*240e2df5SMichael Halcrow ecryptfs_printk(KERN_ERR, "ecryptfs_write_zeros(file=[%p], " 124237fead6SMichael Halcrow "index=[0x%.16x], old_end_pos_in_page=[d], " 125237fead6SMichael Halcrow "(PAGE_CACHE_SIZE - old_end_pos_in_page)=[d]) " 126237fead6SMichael Halcrow "returned [%d]\n", file, index, 127237fead6SMichael Halcrow old_end_pos_in_page, 128237fead6SMichael Halcrow (PAGE_CACHE_SIZE - old_end_pos_in_page), rc); 129237fead6SMichael Halcrow goto out; 130237fead6SMichael Halcrow } 131237fead6SMichael Halcrow index++; 132237fead6SMichael Halcrow while (index < new_end_page_index) { 133237fead6SMichael Halcrow /* Fill all intermediate pages with zeros */ 134*240e2df5SMichael Halcrow rc = ecryptfs_write_zeros(file, index, 0, PAGE_CACHE_SIZE); 135237fead6SMichael Halcrow if (rc) { 136*240e2df5SMichael Halcrow ecryptfs_printk(KERN_ERR, "ecryptfs_write_zeros(" 137*240e2df5SMichael Halcrow "file=[%p], " 138237fead6SMichael Halcrow "index=[0x%.16x], " 139237fead6SMichael Halcrow "old_end_pos_in_page=[d], " 140237fead6SMichael Halcrow "(PAGE_CACHE_SIZE - new_end_pos_in_page" 141237fead6SMichael Halcrow "=[%d]" 142237fead6SMichael Halcrow ")=[d]) returned [%d]\n", file, index, 143237fead6SMichael Halcrow old_end_pos_in_page, 144237fead6SMichael Halcrow new_end_pos_in_page, 145237fead6SMichael Halcrow (PAGE_CACHE_SIZE - new_end_pos_in_page), 146237fead6SMichael Halcrow rc); 147237fead6SMichael Halcrow goto out; 148237fead6SMichael Halcrow } 149237fead6SMichael Halcrow index++; 150237fead6SMichael Halcrow } 151237fead6SMichael Halcrow /* Fill the portion at the beginning of the last new page with 152237fead6SMichael Halcrow * zero's */ 153*240e2df5SMichael Halcrow rc = ecryptfs_write_zeros(file, index, 0, (new_end_pos_in_page + 1)); 154237fead6SMichael Halcrow if (rc) { 155*240e2df5SMichael Halcrow ecryptfs_printk(KERN_ERR, "ecryptfs_write_zeros(file=" 156237fead6SMichael Halcrow "[%p], index=[0x%.16x], 0, " 157237fead6SMichael Halcrow "new_end_pos_in_page=[%d]" 158237fead6SMichael Halcrow "returned [%d]\n", file, index, 159237fead6SMichael Halcrow new_end_pos_in_page, rc); 160237fead6SMichael Halcrow goto out; 161237fead6SMichael Halcrow } 162237fead6SMichael Halcrow out: 163237fead6SMichael Halcrow return rc; 164237fead6SMichael Halcrow } 165237fead6SMichael Halcrow 166237fead6SMichael Halcrow /** 167237fead6SMichael Halcrow * ecryptfs_writepage 168237fead6SMichael Halcrow * @page: Page that is locked before this call is made 169237fead6SMichael Halcrow * 170237fead6SMichael Halcrow * Returns zero on success; non-zero otherwise 171237fead6SMichael Halcrow */ 172237fead6SMichael Halcrow static int ecryptfs_writepage(struct page *page, struct writeback_control *wbc) 173237fead6SMichael Halcrow { 174237fead6SMichael Halcrow struct ecryptfs_page_crypt_context ctx; 175237fead6SMichael Halcrow int rc; 176237fead6SMichael Halcrow 177237fead6SMichael Halcrow ctx.page = page; 178237fead6SMichael Halcrow ctx.mode = ECRYPTFS_WRITEPAGE_MODE; 179237fead6SMichael Halcrow ctx.param.wbc = wbc; 180237fead6SMichael Halcrow rc = ecryptfs_encrypt_page(&ctx); 181237fead6SMichael Halcrow if (rc) { 182237fead6SMichael Halcrow ecryptfs_printk(KERN_WARNING, "Error encrypting " 183237fead6SMichael Halcrow "page (upper index [0x%.16x])\n", page->index); 184237fead6SMichael Halcrow ClearPageUptodate(page); 185237fead6SMichael Halcrow goto out; 186237fead6SMichael Halcrow } 187237fead6SMichael Halcrow SetPageUptodate(page); 188237fead6SMichael Halcrow unlock_page(page); 189237fead6SMichael Halcrow out: 190237fead6SMichael Halcrow return rc; 191237fead6SMichael Halcrow } 192237fead6SMichael Halcrow 193237fead6SMichael Halcrow /** 194237fead6SMichael Halcrow * Reads the data from the lower file file at index lower_page_index 195237fead6SMichael Halcrow * and copies that data into page. 196237fead6SMichael Halcrow * 197237fead6SMichael Halcrow * @param page Page to fill 198237fead6SMichael Halcrow * @param lower_page_index Index of the page in the lower file to get 199237fead6SMichael Halcrow */ 200237fead6SMichael Halcrow int ecryptfs_do_readpage(struct file *file, struct page *page, 201237fead6SMichael Halcrow pgoff_t lower_page_index) 202237fead6SMichael Halcrow { 203237fead6SMichael Halcrow int rc; 204237fead6SMichael Halcrow struct dentry *dentry; 205237fead6SMichael Halcrow struct file *lower_file; 206237fead6SMichael Halcrow struct dentry *lower_dentry; 207237fead6SMichael Halcrow struct inode *inode; 208237fead6SMichael Halcrow struct inode *lower_inode; 209237fead6SMichael Halcrow char *page_data; 210237fead6SMichael Halcrow struct page *lower_page = NULL; 211237fead6SMichael Halcrow char *lower_page_data; 212237fead6SMichael Halcrow const struct address_space_operations *lower_a_ops; 213237fead6SMichael Halcrow 214bd243a4bSJosef "Jeff" Sipek dentry = file->f_path.dentry; 215237fead6SMichael Halcrow lower_file = ecryptfs_file_to_lower(file); 216237fead6SMichael Halcrow lower_dentry = ecryptfs_dentry_to_lower(dentry); 217237fead6SMichael Halcrow inode = dentry->d_inode; 218237fead6SMichael Halcrow lower_inode = ecryptfs_inode_to_lower(inode); 219237fead6SMichael Halcrow lower_a_ops = lower_inode->i_mapping->a_ops; 220237fead6SMichael Halcrow lower_page = read_cache_page(lower_inode->i_mapping, lower_page_index, 221237fead6SMichael Halcrow (filler_t *)lower_a_ops->readpage, 222237fead6SMichael Halcrow (void *)lower_file); 223237fead6SMichael Halcrow if (IS_ERR(lower_page)) { 224237fead6SMichael Halcrow rc = PTR_ERR(lower_page); 225237fead6SMichael Halcrow lower_page = NULL; 226237fead6SMichael Halcrow ecryptfs_printk(KERN_ERR, "Error reading from page cache\n"); 227237fead6SMichael Halcrow goto out; 228237fead6SMichael Halcrow } 2299d8b8ce5SMichael Halcrow page_data = kmap_atomic(page, KM_USER0); 2309d8b8ce5SMichael Halcrow lower_page_data = kmap_atomic(lower_page, KM_USER1); 231237fead6SMichael Halcrow memcpy(page_data, lower_page_data, PAGE_CACHE_SIZE); 2329d8b8ce5SMichael Halcrow kunmap_atomic(lower_page_data, KM_USER1); 2339d8b8ce5SMichael Halcrow kunmap_atomic(page_data, KM_USER0); 2340a9ac382SMichael Halcrow flush_dcache_page(page); 235237fead6SMichael Halcrow rc = 0; 236237fead6SMichael Halcrow out: 237237fead6SMichael Halcrow if (likely(lower_page)) 238237fead6SMichael Halcrow page_cache_release(lower_page); 239237fead6SMichael Halcrow if (rc == 0) 240237fead6SMichael Halcrow SetPageUptodate(page); 241237fead6SMichael Halcrow else 242237fead6SMichael Halcrow ClearPageUptodate(page); 243237fead6SMichael Halcrow return rc; 244237fead6SMichael Halcrow } 245e77a56ddSMichael Halcrow /** 246e77a56ddSMichael Halcrow * Header Extent: 247e77a56ddSMichael Halcrow * Octets 0-7: Unencrypted file size (big-endian) 248e77a56ddSMichael Halcrow * Octets 8-15: eCryptfs special marker 249e77a56ddSMichael Halcrow * Octets 16-19: Flags 250e77a56ddSMichael Halcrow * Octet 16: File format version number (between 0 and 255) 251e77a56ddSMichael Halcrow * Octets 17-18: Reserved 252e77a56ddSMichael Halcrow * Octet 19: Bit 1 (lsb): Reserved 253e77a56ddSMichael Halcrow * Bit 2: Encrypted? 254e77a56ddSMichael Halcrow * Bits 3-8: Reserved 255e77a56ddSMichael Halcrow * Octets 20-23: Header extent size (big-endian) 256e77a56ddSMichael Halcrow * Octets 24-25: Number of header extents at front of file 257e77a56ddSMichael Halcrow * (big-endian) 258e77a56ddSMichael Halcrow * Octet 26: Begin RFC 2440 authentication token packet set 259e77a56ddSMichael Halcrow */ 260e77a56ddSMichael Halcrow static void set_header_info(char *page_virt, 261e77a56ddSMichael Halcrow struct ecryptfs_crypt_stat *crypt_stat) 262e77a56ddSMichael Halcrow { 263e77a56ddSMichael Halcrow size_t written; 264e77a56ddSMichael Halcrow int save_num_header_extents_at_front = 265e77a56ddSMichael Halcrow crypt_stat->num_header_extents_at_front; 266e77a56ddSMichael Halcrow 267e77a56ddSMichael Halcrow crypt_stat->num_header_extents_at_front = 1; 268e77a56ddSMichael Halcrow ecryptfs_write_header_metadata(page_virt + 20, crypt_stat, &written); 269e77a56ddSMichael Halcrow crypt_stat->num_header_extents_at_front = 270e77a56ddSMichael Halcrow save_num_header_extents_at_front; 271e77a56ddSMichael Halcrow } 272237fead6SMichael Halcrow 273237fead6SMichael Halcrow /** 274237fead6SMichael Halcrow * ecryptfs_readpage 275237fead6SMichael Halcrow * @file: This is an ecryptfs file 276237fead6SMichael Halcrow * @page: ecryptfs associated page to stick the read data into 277237fead6SMichael Halcrow * 278237fead6SMichael Halcrow * Read in a page, decrypting if necessary. 279237fead6SMichael Halcrow * 280237fead6SMichael Halcrow * Returns zero on success; non-zero on error. 281237fead6SMichael Halcrow */ 282237fead6SMichael Halcrow static int ecryptfs_readpage(struct file *file, struct page *page) 283237fead6SMichael Halcrow { 284237fead6SMichael Halcrow int rc = 0; 285237fead6SMichael Halcrow struct ecryptfs_crypt_stat *crypt_stat; 286237fead6SMichael Halcrow 287bd243a4bSJosef "Jeff" Sipek BUG_ON(!(file && file->f_path.dentry && file->f_path.dentry->d_inode)); 288bd243a4bSJosef "Jeff" Sipek crypt_stat = &ecryptfs_inode_to_private(file->f_path.dentry->d_inode) 289bd243a4bSJosef "Jeff" Sipek ->crypt_stat; 290237fead6SMichael Halcrow if (!crypt_stat 291e2bd99ecSMichael Halcrow || !(crypt_stat->flags & ECRYPTFS_ENCRYPTED) 292e2bd99ecSMichael Halcrow || (crypt_stat->flags & ECRYPTFS_NEW_FILE)) { 293237fead6SMichael Halcrow ecryptfs_printk(KERN_DEBUG, 294237fead6SMichael Halcrow "Passing through unencrypted page\n"); 295237fead6SMichael Halcrow rc = ecryptfs_do_readpage(file, page, page->index); 296237fead6SMichael Halcrow if (rc) { 297237fead6SMichael Halcrow ecryptfs_printk(KERN_ERR, "Error reading page; rc = " 298237fead6SMichael Halcrow "[%d]\n", rc); 299237fead6SMichael Halcrow goto out; 300237fead6SMichael Halcrow } 301e77a56ddSMichael Halcrow } else if (crypt_stat->flags & ECRYPTFS_VIEW_AS_ENCRYPTED) { 302e77a56ddSMichael Halcrow if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) { 303e77a56ddSMichael Halcrow int num_pages_in_header_region = 304e77a56ddSMichael Halcrow (crypt_stat->header_extent_size 305e77a56ddSMichael Halcrow / PAGE_CACHE_SIZE); 306e77a56ddSMichael Halcrow 307e77a56ddSMichael Halcrow if (page->index < num_pages_in_header_region) { 308e77a56ddSMichael Halcrow char *page_virt; 309e77a56ddSMichael Halcrow 3109d8b8ce5SMichael Halcrow page_virt = kmap_atomic(page, KM_USER0); 311e77a56ddSMichael Halcrow memset(page_virt, 0, PAGE_CACHE_SIZE); 312e77a56ddSMichael Halcrow if (page->index == 0) { 313e77a56ddSMichael Halcrow rc = ecryptfs_read_xattr_region( 314e77a56ddSMichael Halcrow page_virt, file->f_path.dentry); 315e77a56ddSMichael Halcrow set_header_info(page_virt, crypt_stat); 316e77a56ddSMichael Halcrow } 3179d8b8ce5SMichael Halcrow kunmap_atomic(page_virt, KM_USER0); 3180a9ac382SMichael Halcrow flush_dcache_page(page); 319e77a56ddSMichael Halcrow if (rc) { 320e77a56ddSMichael Halcrow printk(KERN_ERR "Error reading xattr " 321e77a56ddSMichael Halcrow "region\n"); 322e77a56ddSMichael Halcrow goto out; 323e77a56ddSMichael Halcrow } 324e77a56ddSMichael Halcrow } else { 325e77a56ddSMichael Halcrow rc = ecryptfs_do_readpage( 326e77a56ddSMichael Halcrow file, page, 327e77a56ddSMichael Halcrow (page->index 328e77a56ddSMichael Halcrow - num_pages_in_header_region)); 329e77a56ddSMichael Halcrow if (rc) { 330e77a56ddSMichael Halcrow printk(KERN_ERR "Error reading page; " 331e77a56ddSMichael Halcrow "rc = [%d]\n", rc); 332e77a56ddSMichael Halcrow goto out; 333e77a56ddSMichael Halcrow } 334e77a56ddSMichael Halcrow } 335e77a56ddSMichael Halcrow } else { 336e77a56ddSMichael Halcrow rc = ecryptfs_do_readpage(file, page, page->index); 337e77a56ddSMichael Halcrow if (rc) { 338e77a56ddSMichael Halcrow printk(KERN_ERR "Error reading page; rc = " 339e77a56ddSMichael Halcrow "[%d]\n", rc); 340e77a56ddSMichael Halcrow goto out; 341e77a56ddSMichael Halcrow } 342e77a56ddSMichael Halcrow } 343237fead6SMichael Halcrow } else { 344237fead6SMichael Halcrow rc = ecryptfs_decrypt_page(file, page); 345237fead6SMichael Halcrow if (rc) { 346237fead6SMichael Halcrow ecryptfs_printk(KERN_ERR, "Error decrypting page; " 347237fead6SMichael Halcrow "rc = [%d]\n", rc); 348237fead6SMichael Halcrow goto out; 349237fead6SMichael Halcrow } 350237fead6SMichael Halcrow } 351237fead6SMichael Halcrow SetPageUptodate(page); 352237fead6SMichael Halcrow out: 353237fead6SMichael Halcrow if (rc) 354237fead6SMichael Halcrow ClearPageUptodate(page); 355237fead6SMichael Halcrow ecryptfs_printk(KERN_DEBUG, "Unlocking page with index = [0x%.16x]\n", 356237fead6SMichael Halcrow page->index); 357237fead6SMichael Halcrow unlock_page(page); 358237fead6SMichael Halcrow return rc; 359237fead6SMichael Halcrow } 360237fead6SMichael Halcrow 361dd2a3b7aSMichael Halcrow /** 362dd2a3b7aSMichael Halcrow * Called with lower inode mutex held. 363dd2a3b7aSMichael Halcrow */ 364237fead6SMichael Halcrow static int fill_zeros_to_end_of_page(struct page *page, unsigned int to) 365237fead6SMichael Halcrow { 366237fead6SMichael Halcrow struct inode *inode = page->mapping->host; 367237fead6SMichael Halcrow int end_byte_in_page; 368237fead6SMichael Halcrow 3699d8b8ce5SMichael Halcrow if ((i_size_read(inode) / PAGE_CACHE_SIZE) != page->index) 3709d8b8ce5SMichael Halcrow goto out; 371237fead6SMichael Halcrow end_byte_in_page = i_size_read(inode) % PAGE_CACHE_SIZE; 372237fead6SMichael Halcrow if (to > end_byte_in_page) 373237fead6SMichael Halcrow end_byte_in_page = to; 374c9f2875bSNate Diller zero_user_page(page, end_byte_in_page, 375c9f2875bSNate Diller PAGE_CACHE_SIZE - end_byte_in_page, KM_USER0); 376237fead6SMichael Halcrow out: 3779d8b8ce5SMichael Halcrow return 0; 378237fead6SMichael Halcrow } 379237fead6SMichael Halcrow 38053a2731fSMichael Halcrow /** 38153a2731fSMichael Halcrow * eCryptfs does not currently support holes. When writing after a 38253a2731fSMichael Halcrow * seek past the end of the file, eCryptfs fills in 0's through to the 38353a2731fSMichael Halcrow * current location. The code to fill in the 0's to all the 38453a2731fSMichael Halcrow * intermediate pages calls ecryptfs_prepare_write_no_truncate(). 38553a2731fSMichael Halcrow */ 38653a2731fSMichael Halcrow static int 38753a2731fSMichael Halcrow ecryptfs_prepare_write_no_truncate(struct file *file, struct page *page, 388237fead6SMichael Halcrow unsigned from, unsigned to) 389237fead6SMichael Halcrow { 390237fead6SMichael Halcrow int rc = 0; 391237fead6SMichael Halcrow 392237fead6SMichael Halcrow if (from == 0 && to == PAGE_CACHE_SIZE) 393237fead6SMichael Halcrow goto out; /* If we are writing a full page, it will be 394237fead6SMichael Halcrow up to date. */ 395237fead6SMichael Halcrow if (!PageUptodate(page)) 396237fead6SMichael Halcrow rc = ecryptfs_do_readpage(file, page, page->index); 397237fead6SMichael Halcrow out: 398237fead6SMichael Halcrow return rc; 399237fead6SMichael Halcrow } 400237fead6SMichael Halcrow 40153a2731fSMichael Halcrow static int ecryptfs_prepare_write(struct file *file, struct page *page, 40253a2731fSMichael Halcrow unsigned from, unsigned to) 40353a2731fSMichael Halcrow { 40453a2731fSMichael Halcrow int rc = 0; 40553a2731fSMichael Halcrow 40653a2731fSMichael Halcrow if (from == 0 && to == PAGE_CACHE_SIZE) 40753a2731fSMichael Halcrow goto out; /* If we are writing a full page, it will be 40853a2731fSMichael Halcrow up to date. */ 40953a2731fSMichael Halcrow if (!PageUptodate(page)) 41053a2731fSMichael Halcrow rc = ecryptfs_do_readpage(file, page, page->index); 411*240e2df5SMichael Halcrow if (page->index != 0) { 412*240e2df5SMichael Halcrow loff_t end_of_prev_pg_pos = 413*240e2df5SMichael Halcrow (((loff_t)page->index << PAGE_CACHE_SHIFT) - 1); 414*240e2df5SMichael Halcrow 415*240e2df5SMichael Halcrow if (end_of_prev_pg_pos > i_size_read(page->mapping->host)) { 416*240e2df5SMichael Halcrow rc = ecryptfs_truncate(file->f_path.dentry, 417*240e2df5SMichael Halcrow end_of_prev_pg_pos); 41853a2731fSMichael Halcrow if (rc) { 41953a2731fSMichael Halcrow printk(KERN_ERR "Error on attempt to " 42053a2731fSMichael Halcrow "truncate to (higher) offset [%lld];" 421*240e2df5SMichael Halcrow " rc = [%d]\n", end_of_prev_pg_pos, rc); 42253a2731fSMichael Halcrow goto out; 42353a2731fSMichael Halcrow } 42453a2731fSMichael Halcrow } 425*240e2df5SMichael Halcrow } 42653a2731fSMichael Halcrow out: 42753a2731fSMichael Halcrow return rc; 42853a2731fSMichael Halcrow } 42953a2731fSMichael Halcrow 430237fead6SMichael Halcrow int ecryptfs_writepage_and_release_lower_page(struct page *lower_page, 431237fead6SMichael Halcrow struct inode *lower_inode, 432237fead6SMichael Halcrow struct writeback_control *wbc) 433237fead6SMichael Halcrow { 434237fead6SMichael Halcrow int rc = 0; 435237fead6SMichael Halcrow 436237fead6SMichael Halcrow rc = lower_inode->i_mapping->a_ops->writepage(lower_page, wbc); 437237fead6SMichael Halcrow if (rc) { 438237fead6SMichael Halcrow ecryptfs_printk(KERN_ERR, "Error calling lower writepage(); " 439237fead6SMichael Halcrow "rc = [%d]\n", rc); 440237fead6SMichael Halcrow goto out; 441237fead6SMichael Halcrow } 442237fead6SMichael Halcrow lower_inode->i_mtime = lower_inode->i_ctime = CURRENT_TIME; 443237fead6SMichael Halcrow page_cache_release(lower_page); 444237fead6SMichael Halcrow out: 445237fead6SMichael Halcrow return rc; 446237fead6SMichael Halcrow } 447237fead6SMichael Halcrow 448ae73fc09SMichael Halcrow static 449ae73fc09SMichael Halcrow void ecryptfs_release_lower_page(struct page *lower_page, int page_locked) 450237fead6SMichael Halcrow { 451ae73fc09SMichael Halcrow if (page_locked) 452237fead6SMichael Halcrow unlock_page(lower_page); 453237fead6SMichael Halcrow page_cache_release(lower_page); 454237fead6SMichael Halcrow } 455237fead6SMichael Halcrow 456237fead6SMichael Halcrow /** 457237fead6SMichael Halcrow * ecryptfs_write_inode_size_to_header 458237fead6SMichael Halcrow * 459237fead6SMichael Halcrow * Writes the lower file size to the first 8 bytes of the header. 460237fead6SMichael Halcrow * 461237fead6SMichael Halcrow * Returns zero on success; non-zero on error. 462237fead6SMichael Halcrow */ 463dd2a3b7aSMichael Halcrow static int ecryptfs_write_inode_size_to_header(struct file *lower_file, 464237fead6SMichael Halcrow struct inode *lower_inode, 465237fead6SMichael Halcrow struct inode *inode) 466237fead6SMichael Halcrow { 467237fead6SMichael Halcrow int rc = 0; 468237fead6SMichael Halcrow struct page *header_page; 469237fead6SMichael Halcrow char *header_virt; 470237fead6SMichael Halcrow const struct address_space_operations *lower_a_ops; 471237fead6SMichael Halcrow u64 file_size; 472237fead6SMichael Halcrow 473a8fa74abSDmitriy Monakhov retry: 4749d8b8ce5SMichael Halcrow header_page = grab_cache_page(lower_inode->i_mapping, 0); 4759d8b8ce5SMichael Halcrow if (!header_page) { 4769d8b8ce5SMichael Halcrow ecryptfs_printk(KERN_ERR, "grab_cache_page for " 4779d8b8ce5SMichael Halcrow "lower_page_index 0 failed\n"); 4789d8b8ce5SMichael Halcrow rc = -EINVAL; 479237fead6SMichael Halcrow goto out; 480237fead6SMichael Halcrow } 481237fead6SMichael Halcrow lower_a_ops = lower_inode->i_mapping->a_ops; 482237fead6SMichael Halcrow rc = lower_a_ops->prepare_write(lower_file, header_page, 0, 8); 483ae73fc09SMichael Halcrow if (rc) { 484a8fa74abSDmitriy Monakhov if (rc == AOP_TRUNCATED_PAGE) { 485ae73fc09SMichael Halcrow ecryptfs_release_lower_page(header_page, 0); 486a8fa74abSDmitriy Monakhov goto retry; 487a8fa74abSDmitriy Monakhov } else 488ae73fc09SMichael Halcrow ecryptfs_release_lower_page(header_page, 1); 489ae73fc09SMichael Halcrow goto out; 490ae73fc09SMichael Halcrow } 491237fead6SMichael Halcrow file_size = (u64)i_size_read(inode); 492237fead6SMichael Halcrow ecryptfs_printk(KERN_DEBUG, "Writing size: [0x%.16x]\n", file_size); 493237fead6SMichael Halcrow file_size = cpu_to_be64(file_size); 4949d8b8ce5SMichael Halcrow header_virt = kmap_atomic(header_page, KM_USER0); 495237fead6SMichael Halcrow memcpy(header_virt, &file_size, sizeof(u64)); 4969d8b8ce5SMichael Halcrow kunmap_atomic(header_virt, KM_USER0); 4970a9ac382SMichael Halcrow flush_dcache_page(header_page); 498237fead6SMichael Halcrow rc = lower_a_ops->commit_write(lower_file, header_page, 0, 8); 499237fead6SMichael Halcrow if (rc < 0) 500237fead6SMichael Halcrow ecryptfs_printk(KERN_ERR, "Error commiting header page " 501237fead6SMichael Halcrow "write\n"); 502a8fa74abSDmitriy Monakhov if (rc == AOP_TRUNCATED_PAGE) { 503ae73fc09SMichael Halcrow ecryptfs_release_lower_page(header_page, 0); 504a8fa74abSDmitriy Monakhov goto retry; 505a8fa74abSDmitriy Monakhov } else 506ae73fc09SMichael Halcrow ecryptfs_release_lower_page(header_page, 1); 507237fead6SMichael Halcrow lower_inode->i_mtime = lower_inode->i_ctime = CURRENT_TIME; 508237fead6SMichael Halcrow mark_inode_dirty_sync(inode); 509237fead6SMichael Halcrow out: 510237fead6SMichael Halcrow return rc; 511237fead6SMichael Halcrow } 512237fead6SMichael Halcrow 513dd2a3b7aSMichael Halcrow static int ecryptfs_write_inode_size_to_xattr(struct inode *lower_inode, 514dd2a3b7aSMichael Halcrow struct inode *inode, 515dd2a3b7aSMichael Halcrow struct dentry *ecryptfs_dentry, 516dd2a3b7aSMichael Halcrow int lower_i_mutex_held) 517dd2a3b7aSMichael Halcrow { 518dd2a3b7aSMichael Halcrow ssize_t size; 519dd2a3b7aSMichael Halcrow void *xattr_virt; 520dd2a3b7aSMichael Halcrow struct dentry *lower_dentry; 521dd2a3b7aSMichael Halcrow u64 file_size; 522dd2a3b7aSMichael Halcrow int rc; 523dd2a3b7aSMichael Halcrow 524dd2a3b7aSMichael Halcrow xattr_virt = kmem_cache_alloc(ecryptfs_xattr_cache, GFP_KERNEL); 525dd2a3b7aSMichael Halcrow if (!xattr_virt) { 526dd2a3b7aSMichael Halcrow printk(KERN_ERR "Out of memory whilst attempting to write " 527dd2a3b7aSMichael Halcrow "inode size to xattr\n"); 528dd2a3b7aSMichael Halcrow rc = -ENOMEM; 529dd2a3b7aSMichael Halcrow goto out; 530dd2a3b7aSMichael Halcrow } 531dd2a3b7aSMichael Halcrow lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry); 532ad5f1196SDmitriy Monakhov if (!lower_dentry->d_inode->i_op->getxattr || 533ad5f1196SDmitriy Monakhov !lower_dentry->d_inode->i_op->setxattr) { 534dd2a3b7aSMichael Halcrow printk(KERN_WARNING 535dd2a3b7aSMichael Halcrow "No support for setting xattr in lower filesystem\n"); 536dd2a3b7aSMichael Halcrow rc = -ENOSYS; 537dd2a3b7aSMichael Halcrow kmem_cache_free(ecryptfs_xattr_cache, xattr_virt); 538dd2a3b7aSMichael Halcrow goto out; 539dd2a3b7aSMichael Halcrow } 540dd2a3b7aSMichael Halcrow if (!lower_i_mutex_held) 541dd2a3b7aSMichael Halcrow mutex_lock(&lower_dentry->d_inode->i_mutex); 542dd2a3b7aSMichael Halcrow size = lower_dentry->d_inode->i_op->getxattr(lower_dentry, 543dd2a3b7aSMichael Halcrow ECRYPTFS_XATTR_NAME, 544dd2a3b7aSMichael Halcrow xattr_virt, 545dd2a3b7aSMichael Halcrow PAGE_CACHE_SIZE); 546dd2a3b7aSMichael Halcrow if (!lower_i_mutex_held) 547dd2a3b7aSMichael Halcrow mutex_unlock(&lower_dentry->d_inode->i_mutex); 548dd2a3b7aSMichael Halcrow if (size < 0) 549dd2a3b7aSMichael Halcrow size = 8; 550dd2a3b7aSMichael Halcrow file_size = (u64)i_size_read(inode); 551dd2a3b7aSMichael Halcrow file_size = cpu_to_be64(file_size); 552dd2a3b7aSMichael Halcrow memcpy(xattr_virt, &file_size, sizeof(u64)); 553dd2a3b7aSMichael Halcrow if (!lower_i_mutex_held) 554dd2a3b7aSMichael Halcrow mutex_lock(&lower_dentry->d_inode->i_mutex); 555dd2a3b7aSMichael Halcrow rc = lower_dentry->d_inode->i_op->setxattr(lower_dentry, 556dd2a3b7aSMichael Halcrow ECRYPTFS_XATTR_NAME, 557dd2a3b7aSMichael Halcrow xattr_virt, size, 0); 558dd2a3b7aSMichael Halcrow if (!lower_i_mutex_held) 559dd2a3b7aSMichael Halcrow mutex_unlock(&lower_dentry->d_inode->i_mutex); 560dd2a3b7aSMichael Halcrow if (rc) 561dd2a3b7aSMichael Halcrow printk(KERN_ERR "Error whilst attempting to write inode size " 562dd2a3b7aSMichael Halcrow "to lower file xattr; rc = [%d]\n", rc); 563dd2a3b7aSMichael Halcrow kmem_cache_free(ecryptfs_xattr_cache, xattr_virt); 564dd2a3b7aSMichael Halcrow out: 565dd2a3b7aSMichael Halcrow return rc; 566dd2a3b7aSMichael Halcrow } 567dd2a3b7aSMichael Halcrow 568dd2a3b7aSMichael Halcrow int 569dd2a3b7aSMichael Halcrow ecryptfs_write_inode_size_to_metadata(struct file *lower_file, 570dd2a3b7aSMichael Halcrow struct inode *lower_inode, 571dd2a3b7aSMichael Halcrow struct inode *inode, 572dd2a3b7aSMichael Halcrow struct dentry *ecryptfs_dentry, 573dd2a3b7aSMichael Halcrow int lower_i_mutex_held) 574dd2a3b7aSMichael Halcrow { 575dd2a3b7aSMichael Halcrow struct ecryptfs_crypt_stat *crypt_stat; 576dd2a3b7aSMichael Halcrow 577dd2a3b7aSMichael Halcrow crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat; 578dd2a3b7aSMichael Halcrow if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) 579dd2a3b7aSMichael Halcrow return ecryptfs_write_inode_size_to_xattr(lower_inode, inode, 580dd2a3b7aSMichael Halcrow ecryptfs_dentry, 581dd2a3b7aSMichael Halcrow lower_i_mutex_held); 582dd2a3b7aSMichael Halcrow else 583dd2a3b7aSMichael Halcrow return ecryptfs_write_inode_size_to_header(lower_file, 584dd2a3b7aSMichael Halcrow lower_inode, 585dd2a3b7aSMichael Halcrow inode); 586dd2a3b7aSMichael Halcrow } 587dd2a3b7aSMichael Halcrow 588237fead6SMichael Halcrow int ecryptfs_get_lower_page(struct page **lower_page, struct inode *lower_inode, 589237fead6SMichael Halcrow struct file *lower_file, 590237fead6SMichael Halcrow unsigned long lower_page_index, int byte_offset, 591237fead6SMichael Halcrow int region_bytes) 592237fead6SMichael Halcrow { 593237fead6SMichael Halcrow int rc = 0; 594237fead6SMichael Halcrow 595a8fa74abSDmitriy Monakhov retry: 5969d8b8ce5SMichael Halcrow *lower_page = grab_cache_page(lower_inode->i_mapping, lower_page_index); 5979d8b8ce5SMichael Halcrow if (!(*lower_page)) { 5989d8b8ce5SMichael Halcrow rc = -EINVAL; 5999d8b8ce5SMichael Halcrow ecryptfs_printk(KERN_ERR, "Error attempting to grab " 600237fead6SMichael Halcrow "lower page with index [0x%.16x]\n", 601237fead6SMichael Halcrow lower_page_index); 602237fead6SMichael Halcrow goto out; 603237fead6SMichael Halcrow } 604237fead6SMichael Halcrow rc = lower_inode->i_mapping->a_ops->prepare_write(lower_file, 605237fead6SMichael Halcrow (*lower_page), 606237fead6SMichael Halcrow byte_offset, 607237fead6SMichael Halcrow region_bytes); 608237fead6SMichael Halcrow if (rc) { 609a8fa74abSDmitriy Monakhov if (rc == AOP_TRUNCATED_PAGE) { 610a8fa74abSDmitriy Monakhov ecryptfs_release_lower_page(*lower_page, 0); 611a8fa74abSDmitriy Monakhov goto retry; 612a8fa74abSDmitriy Monakhov } else { 613237fead6SMichael Halcrow ecryptfs_printk(KERN_ERR, "prepare_write for " 614237fead6SMichael Halcrow "lower_page_index = [0x%.16x] failed; rc = " 615237fead6SMichael Halcrow "[%d]\n", lower_page_index, rc); 616ae73fc09SMichael Halcrow ecryptfs_release_lower_page(*lower_page, 1); 617237fead6SMichael Halcrow (*lower_page) = NULL; 618237fead6SMichael Halcrow } 619a8fa74abSDmitriy Monakhov } 620a8fa74abSDmitriy Monakhov out: 621237fead6SMichael Halcrow return rc; 622237fead6SMichael Halcrow } 623237fead6SMichael Halcrow 624237fead6SMichael Halcrow /** 625237fead6SMichael Halcrow * ecryptfs_commit_lower_page 626237fead6SMichael Halcrow * 627237fead6SMichael Halcrow * Returns zero on success; non-zero on error 628237fead6SMichael Halcrow */ 629237fead6SMichael Halcrow int 630237fead6SMichael Halcrow ecryptfs_commit_lower_page(struct page *lower_page, struct inode *lower_inode, 631237fead6SMichael Halcrow struct file *lower_file, int byte_offset, 632237fead6SMichael Halcrow int region_size) 633237fead6SMichael Halcrow { 634ae73fc09SMichael Halcrow int page_locked = 1; 635237fead6SMichael Halcrow int rc = 0; 636237fead6SMichael Halcrow 637237fead6SMichael Halcrow rc = lower_inode->i_mapping->a_ops->commit_write( 638237fead6SMichael Halcrow lower_file, lower_page, byte_offset, region_size); 639ae73fc09SMichael Halcrow if (rc == AOP_TRUNCATED_PAGE) 640ae73fc09SMichael Halcrow page_locked = 0; 641237fead6SMichael Halcrow if (rc < 0) { 642237fead6SMichael Halcrow ecryptfs_printk(KERN_ERR, 643237fead6SMichael Halcrow "Error committing write; rc = [%d]\n", rc); 644237fead6SMichael Halcrow } else 645237fead6SMichael Halcrow rc = 0; 646ae73fc09SMichael Halcrow ecryptfs_release_lower_page(lower_page, page_locked); 647237fead6SMichael Halcrow return rc; 648237fead6SMichael Halcrow } 649237fead6SMichael Halcrow 650237fead6SMichael Halcrow /** 651237fead6SMichael Halcrow * ecryptfs_copy_page_to_lower 652237fead6SMichael Halcrow * 653237fead6SMichael Halcrow * Used for plaintext pass-through; no page index interpolation 654237fead6SMichael Halcrow * required. 655237fead6SMichael Halcrow */ 656237fead6SMichael Halcrow int ecryptfs_copy_page_to_lower(struct page *page, struct inode *lower_inode, 657237fead6SMichael Halcrow struct file *lower_file) 658237fead6SMichael Halcrow { 659237fead6SMichael Halcrow int rc = 0; 660237fead6SMichael Halcrow struct page *lower_page; 661237fead6SMichael Halcrow 662237fead6SMichael Halcrow rc = ecryptfs_get_lower_page(&lower_page, lower_inode, lower_file, 663237fead6SMichael Halcrow page->index, 0, PAGE_CACHE_SIZE); 664237fead6SMichael Halcrow if (rc) { 665237fead6SMichael Halcrow ecryptfs_printk(KERN_ERR, "Error attempting to get page " 666237fead6SMichael Halcrow "at index [0x%.16x]\n", page->index); 667237fead6SMichael Halcrow goto out; 668237fead6SMichael Halcrow } 669237fead6SMichael Halcrow /* TODO: aops */ 670237fead6SMichael Halcrow memcpy((char *)page_address(lower_page), page_address(page), 671237fead6SMichael Halcrow PAGE_CACHE_SIZE); 672237fead6SMichael Halcrow rc = ecryptfs_commit_lower_page(lower_page, lower_inode, lower_file, 673237fead6SMichael Halcrow 0, PAGE_CACHE_SIZE); 674237fead6SMichael Halcrow if (rc) 675237fead6SMichael Halcrow ecryptfs_printk(KERN_ERR, "Error attempting to commit page " 676237fead6SMichael Halcrow "at index [0x%.16x]\n", page->index); 677237fead6SMichael Halcrow out: 678237fead6SMichael Halcrow return rc; 679237fead6SMichael Halcrow } 680237fead6SMichael Halcrow 681dd2a3b7aSMichael Halcrow struct kmem_cache *ecryptfs_xattr_cache; 682dd2a3b7aSMichael Halcrow 683237fead6SMichael Halcrow /** 684237fead6SMichael Halcrow * ecryptfs_commit_write 685237fead6SMichael Halcrow * @file: The eCryptfs file object 686237fead6SMichael Halcrow * @page: The eCryptfs page 687237fead6SMichael Halcrow * @from: Ignored (we rotate the page IV on each write) 688237fead6SMichael Halcrow * @to: Ignored 689237fead6SMichael Halcrow * 690237fead6SMichael Halcrow * This is where we encrypt the data and pass the encrypted data to 691237fead6SMichael Halcrow * the lower filesystem. In OpenPGP-compatible mode, we operate on 692237fead6SMichael Halcrow * entire underlying packets. 693237fead6SMichael Halcrow */ 694237fead6SMichael Halcrow static int ecryptfs_commit_write(struct file *file, struct page *page, 695237fead6SMichael Halcrow unsigned from, unsigned to) 696237fead6SMichael Halcrow { 697237fead6SMichael Halcrow struct ecryptfs_page_crypt_context ctx; 698237fead6SMichael Halcrow loff_t pos; 699237fead6SMichael Halcrow struct inode *inode; 700237fead6SMichael Halcrow struct inode *lower_inode; 701237fead6SMichael Halcrow struct file *lower_file; 702237fead6SMichael Halcrow struct ecryptfs_crypt_stat *crypt_stat; 703237fead6SMichael Halcrow int rc; 704237fead6SMichael Halcrow 705237fead6SMichael Halcrow inode = page->mapping->host; 706237fead6SMichael Halcrow lower_inode = ecryptfs_inode_to_lower(inode); 707237fead6SMichael Halcrow lower_file = ecryptfs_file_to_lower(file); 708237fead6SMichael Halcrow mutex_lock(&lower_inode->i_mutex); 709bd243a4bSJosef "Jeff" Sipek crypt_stat = &ecryptfs_inode_to_private(file->f_path.dentry->d_inode) 710bd243a4bSJosef "Jeff" Sipek ->crypt_stat; 711e2bd99ecSMichael Halcrow if (crypt_stat->flags & ECRYPTFS_NEW_FILE) { 712237fead6SMichael Halcrow ecryptfs_printk(KERN_DEBUG, "ECRYPTFS_NEW_FILE flag set in " 713237fead6SMichael Halcrow "crypt_stat at memory location [%p]\n", crypt_stat); 714e2bd99ecSMichael Halcrow crypt_stat->flags &= ~(ECRYPTFS_NEW_FILE); 715237fead6SMichael Halcrow } else 716237fead6SMichael Halcrow ecryptfs_printk(KERN_DEBUG, "Not a new file\n"); 717237fead6SMichael Halcrow ecryptfs_printk(KERN_DEBUG, "Calling fill_zeros_to_end_of_page" 718237fead6SMichael Halcrow "(page w/ index = [0x%.16x], to = [%d])\n", page->index, 719237fead6SMichael Halcrow to); 720237fead6SMichael Halcrow rc = fill_zeros_to_end_of_page(page, to); 721237fead6SMichael Halcrow if (rc) { 722237fead6SMichael Halcrow ecryptfs_printk(KERN_WARNING, "Error attempting to fill " 723237fead6SMichael Halcrow "zeros in page with index = [0x%.16x]\n", 724237fead6SMichael Halcrow page->index); 725237fead6SMichael Halcrow goto out; 726237fead6SMichael Halcrow } 727237fead6SMichael Halcrow ctx.page = page; 728237fead6SMichael Halcrow ctx.mode = ECRYPTFS_PREPARE_COMMIT_MODE; 729237fead6SMichael Halcrow ctx.param.lower_file = lower_file; 730237fead6SMichael Halcrow rc = ecryptfs_encrypt_page(&ctx); 731237fead6SMichael Halcrow if (rc) { 732237fead6SMichael Halcrow ecryptfs_printk(KERN_WARNING, "Error encrypting page (upper " 733237fead6SMichael Halcrow "index [0x%.16x])\n", page->index); 734237fead6SMichael Halcrow goto out; 735237fead6SMichael Halcrow } 736237fead6SMichael Halcrow inode->i_blocks = lower_inode->i_blocks; 737237fead6SMichael Halcrow pos = (page->index << PAGE_CACHE_SHIFT) + to; 738237fead6SMichael Halcrow if (pos > i_size_read(inode)) { 739237fead6SMichael Halcrow i_size_write(inode, pos); 740237fead6SMichael Halcrow ecryptfs_printk(KERN_DEBUG, "Expanded file size to " 741237fead6SMichael Halcrow "[0x%.16x]\n", i_size_read(inode)); 742237fead6SMichael Halcrow } 743dd2a3b7aSMichael Halcrow rc = ecryptfs_write_inode_size_to_metadata(lower_file, lower_inode, 744dd2a3b7aSMichael Halcrow inode, file->f_dentry, 745dd2a3b7aSMichael Halcrow ECRYPTFS_LOWER_I_MUTEX_HELD); 746dd2a3b7aSMichael Halcrow if (rc) 747dd2a3b7aSMichael Halcrow printk(KERN_ERR "Error writing inode size to metadata; " 748dd2a3b7aSMichael Halcrow "rc = [%d]\n", rc); 749237fead6SMichael Halcrow lower_inode->i_mtime = lower_inode->i_ctime = CURRENT_TIME; 750237fead6SMichael Halcrow mark_inode_dirty_sync(inode); 751237fead6SMichael Halcrow out: 752237fead6SMichael Halcrow if (rc < 0) 753237fead6SMichael Halcrow ClearPageUptodate(page); 754237fead6SMichael Halcrow else 755237fead6SMichael Halcrow SetPageUptodate(page); 756237fead6SMichael Halcrow mutex_unlock(&lower_inode->i_mutex); 757237fead6SMichael Halcrow return rc; 758237fead6SMichael Halcrow } 759237fead6SMichael Halcrow 760237fead6SMichael Halcrow /** 761*240e2df5SMichael Halcrow * ecryptfs_write_zeros 762237fead6SMichael Halcrow * @file: The ecryptfs file 763237fead6SMichael Halcrow * @index: The index in which we are writing 764237fead6SMichael Halcrow * @start: The position after the last block of data 765237fead6SMichael Halcrow * @num_zeros: The number of zeros to write 766237fead6SMichael Halcrow * 767237fead6SMichael Halcrow * Write a specified number of zero's to a page. 768237fead6SMichael Halcrow * 769237fead6SMichael Halcrow * (start + num_zeros) must be less than or equal to PAGE_CACHE_SIZE 770237fead6SMichael Halcrow */ 771*240e2df5SMichael Halcrow int 772*240e2df5SMichael Halcrow ecryptfs_write_zeros(struct file *file, pgoff_t index, int start, int num_zeros) 773237fead6SMichael Halcrow { 774237fead6SMichael Halcrow int rc = 0; 775237fead6SMichael Halcrow struct page *tmp_page; 776237fead6SMichael Halcrow 777237fead6SMichael Halcrow tmp_page = ecryptfs_get1page(file, index); 778237fead6SMichael Halcrow if (IS_ERR(tmp_page)) { 779237fead6SMichael Halcrow ecryptfs_printk(KERN_ERR, "Error getting page at index " 780237fead6SMichael Halcrow "[0x%.16x]\n", index); 781237fead6SMichael Halcrow rc = PTR_ERR(tmp_page); 782237fead6SMichael Halcrow goto out; 783237fead6SMichael Halcrow } 78453a2731fSMichael Halcrow if ((rc = ecryptfs_prepare_write_no_truncate(file, tmp_page, start, 78553a2731fSMichael Halcrow (start + num_zeros)))) { 786237fead6SMichael Halcrow ecryptfs_printk(KERN_ERR, "Error preparing to write zero's " 78753a2731fSMichael Halcrow "to page at index [0x%.16x]\n", 788237fead6SMichael Halcrow index); 789237fead6SMichael Halcrow page_cache_release(tmp_page); 790237fead6SMichael Halcrow goto out; 791237fead6SMichael Halcrow } 792c9f2875bSNate Diller zero_user_page(tmp_page, start, num_zeros, KM_USER0); 793237fead6SMichael Halcrow rc = ecryptfs_commit_write(file, tmp_page, start, start + num_zeros); 794237fead6SMichael Halcrow if (rc < 0) { 795237fead6SMichael Halcrow ecryptfs_printk(KERN_ERR, "Error attempting to write zero's " 796237fead6SMichael Halcrow "to remainder of page at index [0x%.16x]\n", 797237fead6SMichael Halcrow index); 798237fead6SMichael Halcrow page_cache_release(tmp_page); 799237fead6SMichael Halcrow goto out; 800237fead6SMichael Halcrow } 801237fead6SMichael Halcrow rc = 0; 802237fead6SMichael Halcrow page_cache_release(tmp_page); 803237fead6SMichael Halcrow out: 804237fead6SMichael Halcrow return rc; 805237fead6SMichael Halcrow } 806237fead6SMichael Halcrow 807237fead6SMichael Halcrow static sector_t ecryptfs_bmap(struct address_space *mapping, sector_t block) 808237fead6SMichael Halcrow { 809237fead6SMichael Halcrow int rc = 0; 810237fead6SMichael Halcrow struct inode *inode; 811237fead6SMichael Halcrow struct inode *lower_inode; 812237fead6SMichael Halcrow 813237fead6SMichael Halcrow inode = (struct inode *)mapping->host; 814237fead6SMichael Halcrow lower_inode = ecryptfs_inode_to_lower(inode); 815237fead6SMichael Halcrow if (lower_inode->i_mapping->a_ops->bmap) 816237fead6SMichael Halcrow rc = lower_inode->i_mapping->a_ops->bmap(lower_inode->i_mapping, 817237fead6SMichael Halcrow block); 818237fead6SMichael Halcrow return rc; 819237fead6SMichael Halcrow } 820237fead6SMichael Halcrow 821237fead6SMichael Halcrow static void ecryptfs_sync_page(struct page *page) 822237fead6SMichael Halcrow { 823237fead6SMichael Halcrow struct inode *inode; 824237fead6SMichael Halcrow struct inode *lower_inode; 825237fead6SMichael Halcrow struct page *lower_page; 826237fead6SMichael Halcrow 827237fead6SMichael Halcrow inode = page->mapping->host; 828237fead6SMichael Halcrow lower_inode = ecryptfs_inode_to_lower(inode); 829237fead6SMichael Halcrow /* NOTE: Recently swapped with grab_cache_page(), since 830237fead6SMichael Halcrow * sync_page() just makes sure that pending I/O gets done. */ 831237fead6SMichael Halcrow lower_page = find_lock_page(lower_inode->i_mapping, page->index); 832237fead6SMichael Halcrow if (!lower_page) { 833237fead6SMichael Halcrow ecryptfs_printk(KERN_DEBUG, "find_lock_page failed\n"); 834237fead6SMichael Halcrow return; 835237fead6SMichael Halcrow } 836237fead6SMichael Halcrow lower_page->mapping->a_ops->sync_page(lower_page); 837237fead6SMichael Halcrow ecryptfs_printk(KERN_DEBUG, "Unlocking page with index = [0x%.16x]\n", 838237fead6SMichael Halcrow lower_page->index); 839237fead6SMichael Halcrow unlock_page(lower_page); 840237fead6SMichael Halcrow page_cache_release(lower_page); 841237fead6SMichael Halcrow } 842237fead6SMichael Halcrow 843237fead6SMichael Halcrow struct address_space_operations ecryptfs_aops = { 844237fead6SMichael Halcrow .writepage = ecryptfs_writepage, 845237fead6SMichael Halcrow .readpage = ecryptfs_readpage, 846237fead6SMichael Halcrow .prepare_write = ecryptfs_prepare_write, 847237fead6SMichael Halcrow .commit_write = ecryptfs_commit_write, 848237fead6SMichael Halcrow .bmap = ecryptfs_bmap, 849237fead6SMichael Halcrow .sync_page = ecryptfs_sync_page, 850237fead6SMichael Halcrow }; 851