xref: /openbmc/linux/fs/ecryptfs/mmap.c (revision 9d8b8ce5561890464c54645cdea4d6b157159fec)
1237fead6SMichael Halcrow /**
2237fead6SMichael Halcrow  * eCryptfs: Linux filesystem encryption layer
3237fead6SMichael Halcrow  * This is where eCryptfs coordinates the symmetric encryption and
4237fead6SMichael Halcrow  * decryption of the file data as it passes between the lower
5237fead6SMichael Halcrow  * encrypted file and the upper decrypted file.
6237fead6SMichael Halcrow  *
7237fead6SMichael Halcrow  * Copyright (C) 1997-2003 Erez Zadok
8237fead6SMichael Halcrow  * Copyright (C) 2001-2003 Stony Brook University
9dd2a3b7aSMichael Halcrow  * Copyright (C) 2004-2007 International Business Machines Corp.
10237fead6SMichael Halcrow  *   Author(s): Michael A. Halcrow <mahalcro@us.ibm.com>
11237fead6SMichael Halcrow  *
12237fead6SMichael Halcrow  * This program is free software; you can redistribute it and/or
13237fead6SMichael Halcrow  * modify it under the terms of the GNU General Public License as
14237fead6SMichael Halcrow  * published by the Free Software Foundation; either version 2 of the
15237fead6SMichael Halcrow  * License, or (at your option) any later version.
16237fead6SMichael Halcrow  *
17237fead6SMichael Halcrow  * This program is distributed in the hope that it will be useful, but
18237fead6SMichael Halcrow  * WITHOUT ANY WARRANTY; without even the implied warranty of
19237fead6SMichael Halcrow  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
20237fead6SMichael Halcrow  * General Public License for more details.
21237fead6SMichael Halcrow  *
22237fead6SMichael Halcrow  * You should have received a copy of the GNU General Public License
23237fead6SMichael Halcrow  * along with this program; if not, write to the Free Software
24237fead6SMichael Halcrow  * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
25237fead6SMichael Halcrow  * 02111-1307, USA.
26237fead6SMichael Halcrow  */
27237fead6SMichael Halcrow 
28237fead6SMichael Halcrow #include <linux/pagemap.h>
29237fead6SMichael Halcrow #include <linux/writeback.h>
30237fead6SMichael Halcrow #include <linux/page-flags.h>
31237fead6SMichael Halcrow #include <linux/mount.h>
32237fead6SMichael Halcrow #include <linux/file.h>
33237fead6SMichael Halcrow #include <linux/crypto.h>
34237fead6SMichael Halcrow #include <linux/scatterlist.h>
35237fead6SMichael Halcrow #include "ecryptfs_kernel.h"
36237fead6SMichael Halcrow 
37237fead6SMichael Halcrow struct kmem_cache *ecryptfs_lower_page_cache;
38237fead6SMichael Halcrow 
39237fead6SMichael Halcrow /**
40237fead6SMichael Halcrow  * ecryptfs_get1page
41237fead6SMichael Halcrow  *
42237fead6SMichael Halcrow  * Get one page from cache or lower f/s, return error otherwise.
43237fead6SMichael Halcrow  *
44237fead6SMichael Halcrow  * Returns unlocked and up-to-date page (if ok), with increased
45237fead6SMichael Halcrow  * refcnt.
46237fead6SMichael Halcrow  */
47237fead6SMichael Halcrow static struct page *ecryptfs_get1page(struct file *file, int index)
48237fead6SMichael Halcrow {
49237fead6SMichael Halcrow 	struct page *page;
50237fead6SMichael Halcrow 	struct dentry *dentry;
51237fead6SMichael Halcrow 	struct inode *inode;
52237fead6SMichael Halcrow 	struct address_space *mapping;
53237fead6SMichael Halcrow 
54bd243a4bSJosef "Jeff" Sipek 	dentry = file->f_path.dentry;
55237fead6SMichael Halcrow 	inode = dentry->d_inode;
56237fead6SMichael Halcrow 	mapping = inode->i_mapping;
57237fead6SMichael Halcrow 	page = read_cache_page(mapping, index,
58237fead6SMichael Halcrow 			       (filler_t *)mapping->a_ops->readpage,
59237fead6SMichael Halcrow 			       (void *)file);
60237fead6SMichael Halcrow 	if (IS_ERR(page))
61237fead6SMichael Halcrow 		goto out;
62237fead6SMichael Halcrow 	wait_on_page_locked(page);
63237fead6SMichael Halcrow out:
64237fead6SMichael Halcrow 	return page;
65237fead6SMichael Halcrow }
66237fead6SMichael Halcrow 
67237fead6SMichael Halcrow static
68237fead6SMichael Halcrow int write_zeros(struct file *file, pgoff_t index, int start, int num_zeros);
69237fead6SMichael Halcrow 
70237fead6SMichael Halcrow /**
71237fead6SMichael Halcrow  * ecryptfs_fill_zeros
72237fead6SMichael Halcrow  * @file: The ecryptfs file
73237fead6SMichael Halcrow  * @new_length: The new length of the data in the underlying file;
74237fead6SMichael Halcrow  *              everything between the prior end of the file and the
75237fead6SMichael Halcrow  *              new end of the file will be filled with zero's.
76237fead6SMichael Halcrow  *              new_length must be greater than  current length
77237fead6SMichael Halcrow  *
78237fead6SMichael Halcrow  * Function for handling lseek-ing past the end of the file.
79237fead6SMichael Halcrow  *
80237fead6SMichael Halcrow  * This function does not support shrinking, only growing a file.
81237fead6SMichael Halcrow  *
82237fead6SMichael Halcrow  * Returns zero on success; non-zero otherwise.
83237fead6SMichael Halcrow  */
84237fead6SMichael Halcrow int ecryptfs_fill_zeros(struct file *file, loff_t new_length)
85237fead6SMichael Halcrow {
86237fead6SMichael Halcrow 	int rc = 0;
87bd243a4bSJosef "Jeff" Sipek 	struct dentry *dentry = file->f_path.dentry;
88237fead6SMichael Halcrow 	struct inode *inode = dentry->d_inode;
89237fead6SMichael Halcrow 	pgoff_t old_end_page_index = 0;
90237fead6SMichael Halcrow 	pgoff_t index = old_end_page_index;
91237fead6SMichael Halcrow 	int old_end_pos_in_page = -1;
92237fead6SMichael Halcrow 	pgoff_t new_end_page_index;
93237fead6SMichael Halcrow 	int new_end_pos_in_page;
94237fead6SMichael Halcrow 	loff_t cur_length = i_size_read(inode);
95237fead6SMichael Halcrow 
96237fead6SMichael Halcrow 	if (cur_length != 0) {
97237fead6SMichael Halcrow 		index = old_end_page_index =
98237fead6SMichael Halcrow 		    ((cur_length - 1) >> PAGE_CACHE_SHIFT);
99237fead6SMichael Halcrow 		old_end_pos_in_page = ((cur_length - 1) & ~PAGE_CACHE_MASK);
100237fead6SMichael Halcrow 	}
101237fead6SMichael Halcrow 	new_end_page_index = ((new_length - 1) >> PAGE_CACHE_SHIFT);
102237fead6SMichael Halcrow 	new_end_pos_in_page = ((new_length - 1) & ~PAGE_CACHE_MASK);
103237fead6SMichael Halcrow 	ecryptfs_printk(KERN_DEBUG, "old_end_page_index = [0x%.16x]; "
104237fead6SMichael Halcrow 			"old_end_pos_in_page = [%d]; "
105237fead6SMichael Halcrow 			"new_end_page_index = [0x%.16x]; "
106237fead6SMichael Halcrow 			"new_end_pos_in_page = [%d]\n",
107237fead6SMichael Halcrow 			old_end_page_index, old_end_pos_in_page,
108237fead6SMichael Halcrow 			new_end_page_index, new_end_pos_in_page);
109237fead6SMichael Halcrow 	if (old_end_page_index == new_end_page_index) {
110237fead6SMichael Halcrow 		/* Start and end are in the same page; we just need to
111237fead6SMichael Halcrow 		 * set a portion of the existing page to zero's */
112237fead6SMichael Halcrow 		rc = write_zeros(file, index, (old_end_pos_in_page + 1),
113237fead6SMichael Halcrow 				 (new_end_pos_in_page - old_end_pos_in_page));
114237fead6SMichael Halcrow 		if (rc)
115237fead6SMichael Halcrow 			ecryptfs_printk(KERN_ERR, "write_zeros(file=[%p], "
116237fead6SMichael Halcrow 					"index=[0x%.16x], "
117237fead6SMichael Halcrow 					"old_end_pos_in_page=[d], "
118237fead6SMichael Halcrow 					"(PAGE_CACHE_SIZE - new_end_pos_in_page"
119237fead6SMichael Halcrow 					"=[%d]"
120237fead6SMichael Halcrow 					")=[d]) returned [%d]\n", file, index,
121237fead6SMichael Halcrow 					old_end_pos_in_page,
122237fead6SMichael Halcrow 					new_end_pos_in_page,
123237fead6SMichael Halcrow 					(PAGE_CACHE_SIZE - new_end_pos_in_page),
124237fead6SMichael Halcrow 					rc);
125237fead6SMichael Halcrow 		goto out;
126237fead6SMichael Halcrow 	}
127237fead6SMichael Halcrow 	/* Fill the remainder of the previous last page with zeros */
128237fead6SMichael Halcrow 	rc = write_zeros(file, index, (old_end_pos_in_page + 1),
129237fead6SMichael Halcrow 			 ((PAGE_CACHE_SIZE - 1) - old_end_pos_in_page));
130237fead6SMichael Halcrow 	if (rc) {
131237fead6SMichael Halcrow 		ecryptfs_printk(KERN_ERR, "write_zeros(file=[%p], "
132237fead6SMichael Halcrow 				"index=[0x%.16x], old_end_pos_in_page=[d], "
133237fead6SMichael Halcrow 				"(PAGE_CACHE_SIZE - old_end_pos_in_page)=[d]) "
134237fead6SMichael Halcrow 				"returned [%d]\n", file, index,
135237fead6SMichael Halcrow 				old_end_pos_in_page,
136237fead6SMichael Halcrow 				(PAGE_CACHE_SIZE - old_end_pos_in_page), rc);
137237fead6SMichael Halcrow 		goto out;
138237fead6SMichael Halcrow 	}
139237fead6SMichael Halcrow 	index++;
140237fead6SMichael Halcrow 	while (index < new_end_page_index) {
141237fead6SMichael Halcrow 		/* Fill all intermediate pages with zeros */
142237fead6SMichael Halcrow 		rc = write_zeros(file, index, 0, PAGE_CACHE_SIZE);
143237fead6SMichael Halcrow 		if (rc) {
144237fead6SMichael Halcrow 			ecryptfs_printk(KERN_ERR, "write_zeros(file=[%p], "
145237fead6SMichael Halcrow 					"index=[0x%.16x], "
146237fead6SMichael Halcrow 					"old_end_pos_in_page=[d], "
147237fead6SMichael Halcrow 					"(PAGE_CACHE_SIZE - new_end_pos_in_page"
148237fead6SMichael Halcrow 					"=[%d]"
149237fead6SMichael Halcrow 					")=[d]) returned [%d]\n", file, index,
150237fead6SMichael Halcrow 					old_end_pos_in_page,
151237fead6SMichael Halcrow 					new_end_pos_in_page,
152237fead6SMichael Halcrow 					(PAGE_CACHE_SIZE - new_end_pos_in_page),
153237fead6SMichael Halcrow 					rc);
154237fead6SMichael Halcrow 			goto out;
155237fead6SMichael Halcrow 		}
156237fead6SMichael Halcrow 		index++;
157237fead6SMichael Halcrow 	}
158237fead6SMichael Halcrow 	/* Fill the portion at the beginning of the last new page with
159237fead6SMichael Halcrow 	 * zero's */
160237fead6SMichael Halcrow 	rc = write_zeros(file, index, 0, (new_end_pos_in_page + 1));
161237fead6SMichael Halcrow 	if (rc) {
162237fead6SMichael Halcrow 		ecryptfs_printk(KERN_ERR, "write_zeros(file="
163237fead6SMichael Halcrow 				"[%p], index=[0x%.16x], 0, "
164237fead6SMichael Halcrow 				"new_end_pos_in_page=[%d]"
165237fead6SMichael Halcrow 				"returned [%d]\n", file, index,
166237fead6SMichael Halcrow 				new_end_pos_in_page, rc);
167237fead6SMichael Halcrow 		goto out;
168237fead6SMichael Halcrow 	}
169237fead6SMichael Halcrow out:
170237fead6SMichael Halcrow 	return rc;
171237fead6SMichael Halcrow }
172237fead6SMichael Halcrow 
173237fead6SMichael Halcrow /**
174237fead6SMichael Halcrow  * ecryptfs_writepage
175237fead6SMichael Halcrow  * @page: Page that is locked before this call is made
176237fead6SMichael Halcrow  *
177237fead6SMichael Halcrow  * Returns zero on success; non-zero otherwise
178237fead6SMichael Halcrow  */
179237fead6SMichael Halcrow static int ecryptfs_writepage(struct page *page, struct writeback_control *wbc)
180237fead6SMichael Halcrow {
181237fead6SMichael Halcrow 	struct ecryptfs_page_crypt_context ctx;
182237fead6SMichael Halcrow 	int rc;
183237fead6SMichael Halcrow 
184237fead6SMichael Halcrow 	ctx.page = page;
185237fead6SMichael Halcrow 	ctx.mode = ECRYPTFS_WRITEPAGE_MODE;
186237fead6SMichael Halcrow 	ctx.param.wbc = wbc;
187237fead6SMichael Halcrow 	rc = ecryptfs_encrypt_page(&ctx);
188237fead6SMichael Halcrow 	if (rc) {
189237fead6SMichael Halcrow 		ecryptfs_printk(KERN_WARNING, "Error encrypting "
190237fead6SMichael Halcrow 				"page (upper index [0x%.16x])\n", page->index);
191237fead6SMichael Halcrow 		ClearPageUptodate(page);
192237fead6SMichael Halcrow 		goto out;
193237fead6SMichael Halcrow 	}
194237fead6SMichael Halcrow 	SetPageUptodate(page);
195237fead6SMichael Halcrow 	unlock_page(page);
196237fead6SMichael Halcrow out:
197237fead6SMichael Halcrow 	return rc;
198237fead6SMichael Halcrow }
199237fead6SMichael Halcrow 
200237fead6SMichael Halcrow /**
201237fead6SMichael Halcrow  * Reads the data from the lower file file at index lower_page_index
202237fead6SMichael Halcrow  * and copies that data into page.
203237fead6SMichael Halcrow  *
204237fead6SMichael Halcrow  * @param page	Page to fill
205237fead6SMichael Halcrow  * @param lower_page_index Index of the page in the lower file to get
206237fead6SMichael Halcrow  */
207237fead6SMichael Halcrow int ecryptfs_do_readpage(struct file *file, struct page *page,
208237fead6SMichael Halcrow 			 pgoff_t lower_page_index)
209237fead6SMichael Halcrow {
210237fead6SMichael Halcrow 	int rc;
211237fead6SMichael Halcrow 	struct dentry *dentry;
212237fead6SMichael Halcrow 	struct file *lower_file;
213237fead6SMichael Halcrow 	struct dentry *lower_dentry;
214237fead6SMichael Halcrow 	struct inode *inode;
215237fead6SMichael Halcrow 	struct inode *lower_inode;
216237fead6SMichael Halcrow 	char *page_data;
217237fead6SMichael Halcrow 	struct page *lower_page = NULL;
218237fead6SMichael Halcrow 	char *lower_page_data;
219237fead6SMichael Halcrow 	const struct address_space_operations *lower_a_ops;
220237fead6SMichael Halcrow 
221bd243a4bSJosef "Jeff" Sipek 	dentry = file->f_path.dentry;
222237fead6SMichael Halcrow 	lower_file = ecryptfs_file_to_lower(file);
223237fead6SMichael Halcrow 	lower_dentry = ecryptfs_dentry_to_lower(dentry);
224237fead6SMichael Halcrow 	inode = dentry->d_inode;
225237fead6SMichael Halcrow 	lower_inode = ecryptfs_inode_to_lower(inode);
226237fead6SMichael Halcrow 	lower_a_ops = lower_inode->i_mapping->a_ops;
227237fead6SMichael Halcrow 	lower_page = read_cache_page(lower_inode->i_mapping, lower_page_index,
228237fead6SMichael Halcrow 				     (filler_t *)lower_a_ops->readpage,
229237fead6SMichael Halcrow 				     (void *)lower_file);
230237fead6SMichael Halcrow 	if (IS_ERR(lower_page)) {
231237fead6SMichael Halcrow 		rc = PTR_ERR(lower_page);
232237fead6SMichael Halcrow 		lower_page = NULL;
233237fead6SMichael Halcrow 		ecryptfs_printk(KERN_ERR, "Error reading from page cache\n");
234237fead6SMichael Halcrow 		goto out;
235237fead6SMichael Halcrow 	}
236237fead6SMichael Halcrow 	wait_on_page_locked(lower_page);
237*9d8b8ce5SMichael Halcrow 	page_data = kmap_atomic(page, KM_USER0);
238*9d8b8ce5SMichael Halcrow 	lower_page_data = kmap_atomic(lower_page, KM_USER1);
239237fead6SMichael Halcrow 	memcpy(page_data, lower_page_data, PAGE_CACHE_SIZE);
240*9d8b8ce5SMichael Halcrow 	kunmap_atomic(lower_page_data, KM_USER1);
241*9d8b8ce5SMichael Halcrow 	kunmap_atomic(page_data, KM_USER0);
242237fead6SMichael Halcrow 	rc = 0;
243237fead6SMichael Halcrow out:
244237fead6SMichael Halcrow 	if (likely(lower_page))
245237fead6SMichael Halcrow 		page_cache_release(lower_page);
246237fead6SMichael Halcrow 	if (rc == 0)
247237fead6SMichael Halcrow 		SetPageUptodate(page);
248237fead6SMichael Halcrow 	else
249237fead6SMichael Halcrow 		ClearPageUptodate(page);
250237fead6SMichael Halcrow 	return rc;
251237fead6SMichael Halcrow }
252e77a56ddSMichael Halcrow /**
253e77a56ddSMichael Halcrow  *   Header Extent:
254e77a56ddSMichael Halcrow  *     Octets 0-7:        Unencrypted file size (big-endian)
255e77a56ddSMichael Halcrow  *     Octets 8-15:       eCryptfs special marker
256e77a56ddSMichael Halcrow  *     Octets 16-19:      Flags
257e77a56ddSMichael Halcrow  *      Octet 16:         File format version number (between 0 and 255)
258e77a56ddSMichael Halcrow  *      Octets 17-18:     Reserved
259e77a56ddSMichael Halcrow  *      Octet 19:         Bit 1 (lsb): Reserved
260e77a56ddSMichael Halcrow  *                        Bit 2: Encrypted?
261e77a56ddSMichael Halcrow  *                        Bits 3-8: Reserved
262e77a56ddSMichael Halcrow  *     Octets 20-23:      Header extent size (big-endian)
263e77a56ddSMichael Halcrow  *     Octets 24-25:      Number of header extents at front of file
264e77a56ddSMichael Halcrow  *                        (big-endian)
265e77a56ddSMichael Halcrow  *     Octet  26:         Begin RFC 2440 authentication token packet set
266e77a56ddSMichael Halcrow  */
267e77a56ddSMichael Halcrow static void set_header_info(char *page_virt,
268e77a56ddSMichael Halcrow 			    struct ecryptfs_crypt_stat *crypt_stat)
269e77a56ddSMichael Halcrow {
270e77a56ddSMichael Halcrow 	size_t written;
271e77a56ddSMichael Halcrow 	int save_num_header_extents_at_front =
272e77a56ddSMichael Halcrow 		crypt_stat->num_header_extents_at_front;
273e77a56ddSMichael Halcrow 
274e77a56ddSMichael Halcrow 	crypt_stat->num_header_extents_at_front = 1;
275e77a56ddSMichael Halcrow 	ecryptfs_write_header_metadata(page_virt + 20, crypt_stat, &written);
276e77a56ddSMichael Halcrow 	crypt_stat->num_header_extents_at_front =
277e77a56ddSMichael Halcrow 		save_num_header_extents_at_front;
278e77a56ddSMichael Halcrow }
279237fead6SMichael Halcrow 
280237fead6SMichael Halcrow /**
281237fead6SMichael Halcrow  * ecryptfs_readpage
282237fead6SMichael Halcrow  * @file: This is an ecryptfs file
283237fead6SMichael Halcrow  * @page: ecryptfs associated page to stick the read data into
284237fead6SMichael Halcrow  *
285237fead6SMichael Halcrow  * Read in a page, decrypting if necessary.
286237fead6SMichael Halcrow  *
287237fead6SMichael Halcrow  * Returns zero on success; non-zero on error.
288237fead6SMichael Halcrow  */
289237fead6SMichael Halcrow static int ecryptfs_readpage(struct file *file, struct page *page)
290237fead6SMichael Halcrow {
291237fead6SMichael Halcrow 	int rc = 0;
292237fead6SMichael Halcrow 	struct ecryptfs_crypt_stat *crypt_stat;
293237fead6SMichael Halcrow 
294bd243a4bSJosef "Jeff" Sipek 	BUG_ON(!(file && file->f_path.dentry && file->f_path.dentry->d_inode));
295bd243a4bSJosef "Jeff" Sipek 	crypt_stat = &ecryptfs_inode_to_private(file->f_path.dentry->d_inode)
296bd243a4bSJosef "Jeff" Sipek 			->crypt_stat;
297237fead6SMichael Halcrow 	if (!crypt_stat
298237fead6SMichael Halcrow 	    || !ECRYPTFS_CHECK_FLAG(crypt_stat->flags, ECRYPTFS_ENCRYPTED)
299237fead6SMichael Halcrow 	    || ECRYPTFS_CHECK_FLAG(crypt_stat->flags, ECRYPTFS_NEW_FILE)) {
300237fead6SMichael Halcrow 		ecryptfs_printk(KERN_DEBUG,
301237fead6SMichael Halcrow 				"Passing through unencrypted page\n");
302237fead6SMichael Halcrow 		rc = ecryptfs_do_readpage(file, page, page->index);
303237fead6SMichael Halcrow 		if (rc) {
304237fead6SMichael Halcrow 			ecryptfs_printk(KERN_ERR, "Error reading page; rc = "
305237fead6SMichael Halcrow 					"[%d]\n", rc);
306237fead6SMichael Halcrow 			goto out;
307237fead6SMichael Halcrow 		}
308e77a56ddSMichael Halcrow 	} else if (crypt_stat->flags & ECRYPTFS_VIEW_AS_ENCRYPTED) {
309e77a56ddSMichael Halcrow 		if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) {
310e77a56ddSMichael Halcrow 			int num_pages_in_header_region =
311e77a56ddSMichael Halcrow 				(crypt_stat->header_extent_size
312e77a56ddSMichael Halcrow 				 / PAGE_CACHE_SIZE);
313e77a56ddSMichael Halcrow 
314e77a56ddSMichael Halcrow 			if (page->index < num_pages_in_header_region) {
315e77a56ddSMichael Halcrow 				char *page_virt;
316e77a56ddSMichael Halcrow 
317*9d8b8ce5SMichael Halcrow 				page_virt = kmap_atomic(page, KM_USER0);
318e77a56ddSMichael Halcrow 				memset(page_virt, 0, PAGE_CACHE_SIZE);
319e77a56ddSMichael Halcrow 				if (page->index == 0) {
320e77a56ddSMichael Halcrow 					rc = ecryptfs_read_xattr_region(
321e77a56ddSMichael Halcrow 						page_virt, file->f_path.dentry);
322e77a56ddSMichael Halcrow 					set_header_info(page_virt, crypt_stat);
323e77a56ddSMichael Halcrow 				}
324*9d8b8ce5SMichael Halcrow 				kunmap_atomic(page_virt, KM_USER0);
325e77a56ddSMichael Halcrow 				if (rc) {
326e77a56ddSMichael Halcrow 					printk(KERN_ERR "Error reading xattr "
327e77a56ddSMichael Halcrow 					       "region\n");
328e77a56ddSMichael Halcrow 					goto out;
329e77a56ddSMichael Halcrow 				}
330e77a56ddSMichael Halcrow 			} else {
331e77a56ddSMichael Halcrow 				rc = ecryptfs_do_readpage(
332e77a56ddSMichael Halcrow 					file, page,
333e77a56ddSMichael Halcrow 					(page->index
334e77a56ddSMichael Halcrow 					 - num_pages_in_header_region));
335e77a56ddSMichael Halcrow 				if (rc) {
336e77a56ddSMichael Halcrow 					printk(KERN_ERR "Error reading page; "
337e77a56ddSMichael Halcrow 					       "rc = [%d]\n", rc);
338e77a56ddSMichael Halcrow 					goto out;
339e77a56ddSMichael Halcrow 				}
340e77a56ddSMichael Halcrow 			}
341e77a56ddSMichael Halcrow 		} else {
342e77a56ddSMichael Halcrow 			rc = ecryptfs_do_readpage(file, page, page->index);
343e77a56ddSMichael Halcrow 			if (rc) {
344e77a56ddSMichael Halcrow 				printk(KERN_ERR "Error reading page; rc = "
345e77a56ddSMichael Halcrow 				       "[%d]\n", rc);
346e77a56ddSMichael Halcrow 				goto out;
347e77a56ddSMichael Halcrow 			}
348e77a56ddSMichael Halcrow 		}
349237fead6SMichael Halcrow 	} else {
350237fead6SMichael Halcrow 		rc = ecryptfs_decrypt_page(file, page);
351237fead6SMichael Halcrow 		if (rc) {
352237fead6SMichael Halcrow 			ecryptfs_printk(KERN_ERR, "Error decrypting page; "
353237fead6SMichael Halcrow 					"rc = [%d]\n", rc);
354237fead6SMichael Halcrow 			goto out;
355237fead6SMichael Halcrow 		}
356237fead6SMichael Halcrow 	}
357237fead6SMichael Halcrow 	SetPageUptodate(page);
358237fead6SMichael Halcrow out:
359237fead6SMichael Halcrow 	if (rc)
360237fead6SMichael Halcrow 		ClearPageUptodate(page);
361237fead6SMichael Halcrow 	ecryptfs_printk(KERN_DEBUG, "Unlocking page with index = [0x%.16x]\n",
362237fead6SMichael Halcrow 			page->index);
363237fead6SMichael Halcrow 	unlock_page(page);
364237fead6SMichael Halcrow 	return rc;
365237fead6SMichael Halcrow }
366237fead6SMichael Halcrow 
367dd2a3b7aSMichael Halcrow /**
368dd2a3b7aSMichael Halcrow  * Called with lower inode mutex held.
369dd2a3b7aSMichael Halcrow  */
370237fead6SMichael Halcrow static int fill_zeros_to_end_of_page(struct page *page, unsigned int to)
371237fead6SMichael Halcrow {
372237fead6SMichael Halcrow 	struct inode *inode = page->mapping->host;
373237fead6SMichael Halcrow 	int end_byte_in_page;
374237fead6SMichael Halcrow 	char *page_virt;
375237fead6SMichael Halcrow 
376*9d8b8ce5SMichael Halcrow 	if ((i_size_read(inode) / PAGE_CACHE_SIZE) != page->index)
377*9d8b8ce5SMichael Halcrow 		goto out;
378237fead6SMichael Halcrow 	end_byte_in_page = i_size_read(inode) % PAGE_CACHE_SIZE;
379237fead6SMichael Halcrow 	if (to > end_byte_in_page)
380237fead6SMichael Halcrow 		end_byte_in_page = to;
381*9d8b8ce5SMichael Halcrow 	page_virt = kmap_atomic(page, KM_USER0);
382237fead6SMichael Halcrow 	memset((page_virt + end_byte_in_page), 0,
383237fead6SMichael Halcrow 	       (PAGE_CACHE_SIZE - end_byte_in_page));
384*9d8b8ce5SMichael Halcrow 	kunmap_atomic(page_virt, KM_USER0);
385237fead6SMichael Halcrow out:
386*9d8b8ce5SMichael Halcrow 	return 0;
387237fead6SMichael Halcrow }
388237fead6SMichael Halcrow 
389237fead6SMichael Halcrow static int ecryptfs_prepare_write(struct file *file, struct page *page,
390237fead6SMichael Halcrow 				  unsigned from, unsigned to)
391237fead6SMichael Halcrow {
392237fead6SMichael Halcrow 	int rc = 0;
393237fead6SMichael Halcrow 
394237fead6SMichael Halcrow 	if (from == 0 && to == PAGE_CACHE_SIZE)
395237fead6SMichael Halcrow 		goto out;	/* If we are writing a full page, it will be
396237fead6SMichael Halcrow 				   up to date. */
397237fead6SMichael Halcrow 	if (!PageUptodate(page))
398237fead6SMichael Halcrow 		rc = ecryptfs_do_readpage(file, page, page->index);
399237fead6SMichael Halcrow out:
400237fead6SMichael Halcrow 	return rc;
401237fead6SMichael Halcrow }
402237fead6SMichael Halcrow 
403237fead6SMichael Halcrow int ecryptfs_writepage_and_release_lower_page(struct page *lower_page,
404237fead6SMichael Halcrow 					      struct inode *lower_inode,
405237fead6SMichael Halcrow 					      struct writeback_control *wbc)
406237fead6SMichael Halcrow {
407237fead6SMichael Halcrow 	int rc = 0;
408237fead6SMichael Halcrow 
409237fead6SMichael Halcrow 	rc = lower_inode->i_mapping->a_ops->writepage(lower_page, wbc);
410237fead6SMichael Halcrow 	if (rc) {
411237fead6SMichael Halcrow 		ecryptfs_printk(KERN_ERR, "Error calling lower writepage(); "
412237fead6SMichael Halcrow 				"rc = [%d]\n", rc);
413237fead6SMichael Halcrow 		goto out;
414237fead6SMichael Halcrow 	}
415237fead6SMichael Halcrow 	lower_inode->i_mtime = lower_inode->i_ctime = CURRENT_TIME;
416237fead6SMichael Halcrow 	page_cache_release(lower_page);
417237fead6SMichael Halcrow out:
418237fead6SMichael Halcrow 	return rc;
419237fead6SMichael Halcrow }
420237fead6SMichael Halcrow 
421*9d8b8ce5SMichael Halcrow static void ecryptfs_release_lower_page(struct page *lower_page)
422237fead6SMichael Halcrow {
423237fead6SMichael Halcrow 	unlock_page(lower_page);
424237fead6SMichael Halcrow 	page_cache_release(lower_page);
425237fead6SMichael Halcrow }
426237fead6SMichael Halcrow 
427237fead6SMichael Halcrow /**
428237fead6SMichael Halcrow  * ecryptfs_write_inode_size_to_header
429237fead6SMichael Halcrow  *
430237fead6SMichael Halcrow  * Writes the lower file size to the first 8 bytes of the header.
431237fead6SMichael Halcrow  *
432237fead6SMichael Halcrow  * Returns zero on success; non-zero on error.
433237fead6SMichael Halcrow  */
434dd2a3b7aSMichael Halcrow static int ecryptfs_write_inode_size_to_header(struct file *lower_file,
435237fead6SMichael Halcrow 					       struct inode *lower_inode,
436237fead6SMichael Halcrow 					       struct inode *inode)
437237fead6SMichael Halcrow {
438237fead6SMichael Halcrow 	int rc = 0;
439237fead6SMichael Halcrow 	struct page *header_page;
440237fead6SMichael Halcrow 	char *header_virt;
441237fead6SMichael Halcrow 	const struct address_space_operations *lower_a_ops;
442237fead6SMichael Halcrow 	u64 file_size;
443237fead6SMichael Halcrow 
444*9d8b8ce5SMichael Halcrow 	header_page = grab_cache_page(lower_inode->i_mapping, 0);
445*9d8b8ce5SMichael Halcrow 	if (!header_page) {
446*9d8b8ce5SMichael Halcrow 		ecryptfs_printk(KERN_ERR, "grab_cache_page for "
447*9d8b8ce5SMichael Halcrow 				"lower_page_index 0 failed\n");
448*9d8b8ce5SMichael Halcrow 		rc = -EINVAL;
449237fead6SMichael Halcrow 		goto out;
450237fead6SMichael Halcrow 	}
451237fead6SMichael Halcrow 	lower_a_ops = lower_inode->i_mapping->a_ops;
452237fead6SMichael Halcrow 	rc = lower_a_ops->prepare_write(lower_file, header_page, 0, 8);
453237fead6SMichael Halcrow 	file_size = (u64)i_size_read(inode);
454237fead6SMichael Halcrow 	ecryptfs_printk(KERN_DEBUG, "Writing size: [0x%.16x]\n", file_size);
455237fead6SMichael Halcrow 	file_size = cpu_to_be64(file_size);
456*9d8b8ce5SMichael Halcrow 	header_virt = kmap_atomic(header_page, KM_USER0);
457237fead6SMichael Halcrow 	memcpy(header_virt, &file_size, sizeof(u64));
458*9d8b8ce5SMichael Halcrow 	kunmap_atomic(header_virt, KM_USER0);
459237fead6SMichael Halcrow 	rc = lower_a_ops->commit_write(lower_file, header_page, 0, 8);
460237fead6SMichael Halcrow 	if (rc < 0)
461237fead6SMichael Halcrow 		ecryptfs_printk(KERN_ERR, "Error commiting header page "
462237fead6SMichael Halcrow 				"write\n");
463*9d8b8ce5SMichael Halcrow 	ecryptfs_release_lower_page(header_page);
464237fead6SMichael Halcrow 	lower_inode->i_mtime = lower_inode->i_ctime = CURRENT_TIME;
465237fead6SMichael Halcrow 	mark_inode_dirty_sync(inode);
466237fead6SMichael Halcrow out:
467237fead6SMichael Halcrow 	return rc;
468237fead6SMichael Halcrow }
469237fead6SMichael Halcrow 
470dd2a3b7aSMichael Halcrow static int ecryptfs_write_inode_size_to_xattr(struct inode *lower_inode,
471dd2a3b7aSMichael Halcrow 					      struct inode *inode,
472dd2a3b7aSMichael Halcrow 					      struct dentry *ecryptfs_dentry,
473dd2a3b7aSMichael Halcrow 					      int lower_i_mutex_held)
474dd2a3b7aSMichael Halcrow {
475dd2a3b7aSMichael Halcrow 	ssize_t size;
476dd2a3b7aSMichael Halcrow 	void *xattr_virt;
477dd2a3b7aSMichael Halcrow 	struct dentry *lower_dentry;
478dd2a3b7aSMichael Halcrow 	u64 file_size;
479dd2a3b7aSMichael Halcrow 	int rc;
480dd2a3b7aSMichael Halcrow 
481dd2a3b7aSMichael Halcrow 	xattr_virt = kmem_cache_alloc(ecryptfs_xattr_cache, GFP_KERNEL);
482dd2a3b7aSMichael Halcrow 	if (!xattr_virt) {
483dd2a3b7aSMichael Halcrow 		printk(KERN_ERR "Out of memory whilst attempting to write "
484dd2a3b7aSMichael Halcrow 		       "inode size to xattr\n");
485dd2a3b7aSMichael Halcrow 		rc = -ENOMEM;
486dd2a3b7aSMichael Halcrow 		goto out;
487dd2a3b7aSMichael Halcrow 	}
488dd2a3b7aSMichael Halcrow 	lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry);
489dd2a3b7aSMichael Halcrow 	if (!lower_dentry->d_inode->i_op->getxattr) {
490dd2a3b7aSMichael Halcrow 		printk(KERN_WARNING
491dd2a3b7aSMichael Halcrow 		       "No support for setting xattr in lower filesystem\n");
492dd2a3b7aSMichael Halcrow 		rc = -ENOSYS;
493dd2a3b7aSMichael Halcrow 		kmem_cache_free(ecryptfs_xattr_cache, xattr_virt);
494dd2a3b7aSMichael Halcrow 		goto out;
495dd2a3b7aSMichael Halcrow 	}
496dd2a3b7aSMichael Halcrow 	if (!lower_i_mutex_held)
497dd2a3b7aSMichael Halcrow 		mutex_lock(&lower_dentry->d_inode->i_mutex);
498dd2a3b7aSMichael Halcrow 	size = lower_dentry->d_inode->i_op->getxattr(lower_dentry,
499dd2a3b7aSMichael Halcrow 						     ECRYPTFS_XATTR_NAME,
500dd2a3b7aSMichael Halcrow 						     xattr_virt,
501dd2a3b7aSMichael Halcrow 						     PAGE_CACHE_SIZE);
502dd2a3b7aSMichael Halcrow 	if (!lower_i_mutex_held)
503dd2a3b7aSMichael Halcrow 		mutex_unlock(&lower_dentry->d_inode->i_mutex);
504dd2a3b7aSMichael Halcrow 	if (size < 0)
505dd2a3b7aSMichael Halcrow 		size = 8;
506dd2a3b7aSMichael Halcrow 	file_size = (u64)i_size_read(inode);
507dd2a3b7aSMichael Halcrow 	file_size = cpu_to_be64(file_size);
508dd2a3b7aSMichael Halcrow 	memcpy(xattr_virt, &file_size, sizeof(u64));
509dd2a3b7aSMichael Halcrow 	if (!lower_i_mutex_held)
510dd2a3b7aSMichael Halcrow 		mutex_lock(&lower_dentry->d_inode->i_mutex);
511dd2a3b7aSMichael Halcrow 	rc = lower_dentry->d_inode->i_op->setxattr(lower_dentry,
512dd2a3b7aSMichael Halcrow 						   ECRYPTFS_XATTR_NAME,
513dd2a3b7aSMichael Halcrow 						   xattr_virt, size, 0);
514dd2a3b7aSMichael Halcrow 	if (!lower_i_mutex_held)
515dd2a3b7aSMichael Halcrow 		mutex_unlock(&lower_dentry->d_inode->i_mutex);
516dd2a3b7aSMichael Halcrow 	if (rc)
517dd2a3b7aSMichael Halcrow 		printk(KERN_ERR "Error whilst attempting to write inode size "
518dd2a3b7aSMichael Halcrow 		       "to lower file xattr; rc = [%d]\n", rc);
519dd2a3b7aSMichael Halcrow 	kmem_cache_free(ecryptfs_xattr_cache, xattr_virt);
520dd2a3b7aSMichael Halcrow out:
521dd2a3b7aSMichael Halcrow 	return rc;
522dd2a3b7aSMichael Halcrow }
523dd2a3b7aSMichael Halcrow 
524dd2a3b7aSMichael Halcrow int
525dd2a3b7aSMichael Halcrow ecryptfs_write_inode_size_to_metadata(struct file *lower_file,
526dd2a3b7aSMichael Halcrow 				      struct inode *lower_inode,
527dd2a3b7aSMichael Halcrow 				      struct inode *inode,
528dd2a3b7aSMichael Halcrow 				      struct dentry *ecryptfs_dentry,
529dd2a3b7aSMichael Halcrow 				      int lower_i_mutex_held)
530dd2a3b7aSMichael Halcrow {
531dd2a3b7aSMichael Halcrow 	struct ecryptfs_crypt_stat *crypt_stat;
532dd2a3b7aSMichael Halcrow 
533dd2a3b7aSMichael Halcrow 	crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat;
534dd2a3b7aSMichael Halcrow 	if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR)
535dd2a3b7aSMichael Halcrow 		return ecryptfs_write_inode_size_to_xattr(lower_inode, inode,
536dd2a3b7aSMichael Halcrow 							  ecryptfs_dentry,
537dd2a3b7aSMichael Halcrow 							  lower_i_mutex_held);
538dd2a3b7aSMichael Halcrow 	else
539dd2a3b7aSMichael Halcrow 		return ecryptfs_write_inode_size_to_header(lower_file,
540dd2a3b7aSMichael Halcrow 							   lower_inode,
541dd2a3b7aSMichael Halcrow 							   inode);
542dd2a3b7aSMichael Halcrow }
543dd2a3b7aSMichael Halcrow 
544237fead6SMichael Halcrow int ecryptfs_get_lower_page(struct page **lower_page, struct inode *lower_inode,
545237fead6SMichael Halcrow 			    struct file *lower_file,
546237fead6SMichael Halcrow 			    unsigned long lower_page_index, int byte_offset,
547237fead6SMichael Halcrow 			    int region_bytes)
548237fead6SMichael Halcrow {
549237fead6SMichael Halcrow 	int rc = 0;
550237fead6SMichael Halcrow 
551*9d8b8ce5SMichael Halcrow 	*lower_page = grab_cache_page(lower_inode->i_mapping, lower_page_index);
552*9d8b8ce5SMichael Halcrow 	if (!(*lower_page)) {
553*9d8b8ce5SMichael Halcrow 		rc = -EINVAL;
554*9d8b8ce5SMichael Halcrow 		ecryptfs_printk(KERN_ERR, "Error attempting to grab "
555237fead6SMichael Halcrow 				"lower page with index [0x%.16x]\n",
556237fead6SMichael Halcrow 				lower_page_index);
557237fead6SMichael Halcrow 		goto out;
558237fead6SMichael Halcrow 	}
559237fead6SMichael Halcrow 	rc = lower_inode->i_mapping->a_ops->prepare_write(lower_file,
560237fead6SMichael Halcrow 							  (*lower_page),
561237fead6SMichael Halcrow 							  byte_offset,
562237fead6SMichael Halcrow 							  region_bytes);
563237fead6SMichael Halcrow 	if (rc) {
564237fead6SMichael Halcrow 		ecryptfs_printk(KERN_ERR, "prepare_write for "
565237fead6SMichael Halcrow 				"lower_page_index = [0x%.16x] failed; rc = "
566237fead6SMichael Halcrow 				"[%d]\n", lower_page_index, rc);
567237fead6SMichael Halcrow 	}
568237fead6SMichael Halcrow out:
569237fead6SMichael Halcrow 	if (rc && (*lower_page)) {
570*9d8b8ce5SMichael Halcrow 		ecryptfs_release_lower_page(*lower_page);
571237fead6SMichael Halcrow 		(*lower_page) = NULL;
572237fead6SMichael Halcrow 	}
573237fead6SMichael Halcrow 	return rc;
574237fead6SMichael Halcrow }
575237fead6SMichael Halcrow 
576237fead6SMichael Halcrow /**
577237fead6SMichael Halcrow  * ecryptfs_commit_lower_page
578237fead6SMichael Halcrow  *
579237fead6SMichael Halcrow  * Returns zero on success; non-zero on error
580237fead6SMichael Halcrow  */
581237fead6SMichael Halcrow int
582237fead6SMichael Halcrow ecryptfs_commit_lower_page(struct page *lower_page, struct inode *lower_inode,
583237fead6SMichael Halcrow 			   struct file *lower_file, int byte_offset,
584237fead6SMichael Halcrow 			   int region_size)
585237fead6SMichael Halcrow {
586237fead6SMichael Halcrow 	int rc = 0;
587237fead6SMichael Halcrow 
588237fead6SMichael Halcrow 	rc = lower_inode->i_mapping->a_ops->commit_write(
589237fead6SMichael Halcrow 		lower_file, lower_page, byte_offset, region_size);
590237fead6SMichael Halcrow 	if (rc < 0) {
591237fead6SMichael Halcrow 		ecryptfs_printk(KERN_ERR,
592237fead6SMichael Halcrow 				"Error committing write; rc = [%d]\n", rc);
593237fead6SMichael Halcrow 	} else
594237fead6SMichael Halcrow 		rc = 0;
595*9d8b8ce5SMichael Halcrow 	ecryptfs_release_lower_page(lower_page);
596237fead6SMichael Halcrow 	return rc;
597237fead6SMichael Halcrow }
598237fead6SMichael Halcrow 
599237fead6SMichael Halcrow /**
600237fead6SMichael Halcrow  * ecryptfs_copy_page_to_lower
601237fead6SMichael Halcrow  *
602237fead6SMichael Halcrow  * Used for plaintext pass-through; no page index interpolation
603237fead6SMichael Halcrow  * required.
604237fead6SMichael Halcrow  */
605237fead6SMichael Halcrow int ecryptfs_copy_page_to_lower(struct page *page, struct inode *lower_inode,
606237fead6SMichael Halcrow 				struct file *lower_file)
607237fead6SMichael Halcrow {
608237fead6SMichael Halcrow 	int rc = 0;
609237fead6SMichael Halcrow 	struct page *lower_page;
610237fead6SMichael Halcrow 
611237fead6SMichael Halcrow 	rc = ecryptfs_get_lower_page(&lower_page, lower_inode, lower_file,
612237fead6SMichael Halcrow 				     page->index, 0, PAGE_CACHE_SIZE);
613237fead6SMichael Halcrow 	if (rc) {
614237fead6SMichael Halcrow 		ecryptfs_printk(KERN_ERR, "Error attempting to get page "
615237fead6SMichael Halcrow 				"at index [0x%.16x]\n", page->index);
616237fead6SMichael Halcrow 		goto out;
617237fead6SMichael Halcrow 	}
618237fead6SMichael Halcrow 	/* TODO: aops */
619237fead6SMichael Halcrow 	memcpy((char *)page_address(lower_page), page_address(page),
620237fead6SMichael Halcrow 	       PAGE_CACHE_SIZE);
621237fead6SMichael Halcrow 	rc = ecryptfs_commit_lower_page(lower_page, lower_inode, lower_file,
622237fead6SMichael Halcrow 					0, PAGE_CACHE_SIZE);
623237fead6SMichael Halcrow 	if (rc)
624237fead6SMichael Halcrow 		ecryptfs_printk(KERN_ERR, "Error attempting to commit page "
625237fead6SMichael Halcrow 				"at index [0x%.16x]\n", page->index);
626237fead6SMichael Halcrow out:
627237fead6SMichael Halcrow 	return rc;
628237fead6SMichael Halcrow }
629237fead6SMichael Halcrow 
630dd2a3b7aSMichael Halcrow struct kmem_cache *ecryptfs_xattr_cache;
631dd2a3b7aSMichael Halcrow 
632237fead6SMichael Halcrow /**
633237fead6SMichael Halcrow  * ecryptfs_commit_write
634237fead6SMichael Halcrow  * @file: The eCryptfs file object
635237fead6SMichael Halcrow  * @page: The eCryptfs page
636237fead6SMichael Halcrow  * @from: Ignored (we rotate the page IV on each write)
637237fead6SMichael Halcrow  * @to: Ignored
638237fead6SMichael Halcrow  *
639237fead6SMichael Halcrow  * This is where we encrypt the data and pass the encrypted data to
640237fead6SMichael Halcrow  * the lower filesystem.  In OpenPGP-compatible mode, we operate on
641237fead6SMichael Halcrow  * entire underlying packets.
642237fead6SMichael Halcrow  */
643237fead6SMichael Halcrow static int ecryptfs_commit_write(struct file *file, struct page *page,
644237fead6SMichael Halcrow 				 unsigned from, unsigned to)
645237fead6SMichael Halcrow {
646237fead6SMichael Halcrow 	struct ecryptfs_page_crypt_context ctx;
647237fead6SMichael Halcrow 	loff_t pos;
648237fead6SMichael Halcrow 	struct inode *inode;
649237fead6SMichael Halcrow 	struct inode *lower_inode;
650237fead6SMichael Halcrow 	struct file *lower_file;
651237fead6SMichael Halcrow 	struct ecryptfs_crypt_stat *crypt_stat;
652237fead6SMichael Halcrow 	int rc;
653237fead6SMichael Halcrow 
654237fead6SMichael Halcrow 	inode = page->mapping->host;
655237fead6SMichael Halcrow 	lower_inode = ecryptfs_inode_to_lower(inode);
656237fead6SMichael Halcrow 	lower_file = ecryptfs_file_to_lower(file);
657237fead6SMichael Halcrow 	mutex_lock(&lower_inode->i_mutex);
658bd243a4bSJosef "Jeff" Sipek 	crypt_stat = &ecryptfs_inode_to_private(file->f_path.dentry->d_inode)
659bd243a4bSJosef "Jeff" Sipek 				->crypt_stat;
660237fead6SMichael Halcrow 	if (ECRYPTFS_CHECK_FLAG(crypt_stat->flags, ECRYPTFS_NEW_FILE)) {
661237fead6SMichael Halcrow 		ecryptfs_printk(KERN_DEBUG, "ECRYPTFS_NEW_FILE flag set in "
662237fead6SMichael Halcrow 			"crypt_stat at memory location [%p]\n", crypt_stat);
663dddfa461SMichael Halcrow 		ECRYPTFS_CLEAR_FLAG(crypt_stat->flags, ECRYPTFS_NEW_FILE);
664237fead6SMichael Halcrow 	} else
665237fead6SMichael Halcrow 		ecryptfs_printk(KERN_DEBUG, "Not a new file\n");
666237fead6SMichael Halcrow 	ecryptfs_printk(KERN_DEBUG, "Calling fill_zeros_to_end_of_page"
667237fead6SMichael Halcrow 			"(page w/ index = [0x%.16x], to = [%d])\n", page->index,
668237fead6SMichael Halcrow 			to);
669237fead6SMichael Halcrow 	rc = fill_zeros_to_end_of_page(page, to);
670237fead6SMichael Halcrow 	if (rc) {
671237fead6SMichael Halcrow 		ecryptfs_printk(KERN_WARNING, "Error attempting to fill "
672237fead6SMichael Halcrow 				"zeros in page with index = [0x%.16x]\n",
673237fead6SMichael Halcrow 				page->index);
674237fead6SMichael Halcrow 		goto out;
675237fead6SMichael Halcrow 	}
676237fead6SMichael Halcrow 	ctx.page = page;
677237fead6SMichael Halcrow 	ctx.mode = ECRYPTFS_PREPARE_COMMIT_MODE;
678237fead6SMichael Halcrow 	ctx.param.lower_file = lower_file;
679237fead6SMichael Halcrow 	rc = ecryptfs_encrypt_page(&ctx);
680237fead6SMichael Halcrow 	if (rc) {
681237fead6SMichael Halcrow 		ecryptfs_printk(KERN_WARNING, "Error encrypting page (upper "
682237fead6SMichael Halcrow 				"index [0x%.16x])\n", page->index);
683237fead6SMichael Halcrow 		goto out;
684237fead6SMichael Halcrow 	}
685237fead6SMichael Halcrow 	inode->i_blocks = lower_inode->i_blocks;
686237fead6SMichael Halcrow 	pos = (page->index << PAGE_CACHE_SHIFT) + to;
687237fead6SMichael Halcrow 	if (pos > i_size_read(inode)) {
688237fead6SMichael Halcrow 		i_size_write(inode, pos);
689237fead6SMichael Halcrow 		ecryptfs_printk(KERN_DEBUG, "Expanded file size to "
690237fead6SMichael Halcrow 				"[0x%.16x]\n", i_size_read(inode));
691237fead6SMichael Halcrow 	}
692dd2a3b7aSMichael Halcrow 	rc = ecryptfs_write_inode_size_to_metadata(lower_file, lower_inode,
693dd2a3b7aSMichael Halcrow 						   inode, file->f_dentry,
694dd2a3b7aSMichael Halcrow 						   ECRYPTFS_LOWER_I_MUTEX_HELD);
695dd2a3b7aSMichael Halcrow 	if (rc)
696dd2a3b7aSMichael Halcrow 		printk(KERN_ERR "Error writing inode size to metadata; "
697dd2a3b7aSMichael Halcrow 		       "rc = [%d]\n", rc);
698237fead6SMichael Halcrow 	lower_inode->i_mtime = lower_inode->i_ctime = CURRENT_TIME;
699237fead6SMichael Halcrow 	mark_inode_dirty_sync(inode);
700237fead6SMichael Halcrow out:
701237fead6SMichael Halcrow 	if (rc < 0)
702237fead6SMichael Halcrow 		ClearPageUptodate(page);
703237fead6SMichael Halcrow 	else
704237fead6SMichael Halcrow 		SetPageUptodate(page);
705237fead6SMichael Halcrow 	mutex_unlock(&lower_inode->i_mutex);
706237fead6SMichael Halcrow 	return rc;
707237fead6SMichael Halcrow }
708237fead6SMichael Halcrow 
709237fead6SMichael Halcrow /**
710237fead6SMichael Halcrow  * write_zeros
711237fead6SMichael Halcrow  * @file: The ecryptfs file
712237fead6SMichael Halcrow  * @index: The index in which we are writing
713237fead6SMichael Halcrow  * @start: The position after the last block of data
714237fead6SMichael Halcrow  * @num_zeros: The number of zeros to write
715237fead6SMichael Halcrow  *
716237fead6SMichael Halcrow  * Write a specified number of zero's to a page.
717237fead6SMichael Halcrow  *
718237fead6SMichael Halcrow  * (start + num_zeros) must be less than or equal to PAGE_CACHE_SIZE
719237fead6SMichael Halcrow  */
720237fead6SMichael Halcrow static
721237fead6SMichael Halcrow int write_zeros(struct file *file, pgoff_t index, int start, int num_zeros)
722237fead6SMichael Halcrow {
723237fead6SMichael Halcrow 	int rc = 0;
724237fead6SMichael Halcrow 	struct page *tmp_page;
725*9d8b8ce5SMichael Halcrow 	char *tmp_page_virt;
726237fead6SMichael Halcrow 
727237fead6SMichael Halcrow 	tmp_page = ecryptfs_get1page(file, index);
728237fead6SMichael Halcrow 	if (IS_ERR(tmp_page)) {
729237fead6SMichael Halcrow 		ecryptfs_printk(KERN_ERR, "Error getting page at index "
730237fead6SMichael Halcrow 				"[0x%.16x]\n", index);
731237fead6SMichael Halcrow 		rc = PTR_ERR(tmp_page);
732237fead6SMichael Halcrow 		goto out;
733237fead6SMichael Halcrow 	}
734237fead6SMichael Halcrow 	rc = ecryptfs_prepare_write(file, tmp_page, start, start + num_zeros);
735237fead6SMichael Halcrow 	if (rc) {
736237fead6SMichael Halcrow 		ecryptfs_printk(KERN_ERR, "Error preparing to write zero's "
737237fead6SMichael Halcrow 				"to remainder of page at index [0x%.16x]\n",
738237fead6SMichael Halcrow 				index);
739237fead6SMichael Halcrow 		page_cache_release(tmp_page);
740237fead6SMichael Halcrow 		goto out;
741237fead6SMichael Halcrow 	}
742*9d8b8ce5SMichael Halcrow 	tmp_page_virt = kmap_atomic(tmp_page, KM_USER0);
743*9d8b8ce5SMichael Halcrow 	memset(((char *)tmp_page_virt + start), 0, num_zeros);
744*9d8b8ce5SMichael Halcrow 	kunmap_atomic(tmp_page_virt, KM_USER0);
745237fead6SMichael Halcrow 	rc = ecryptfs_commit_write(file, tmp_page, start, start + num_zeros);
746237fead6SMichael Halcrow 	if (rc < 0) {
747237fead6SMichael Halcrow 		ecryptfs_printk(KERN_ERR, "Error attempting to write zero's "
748237fead6SMichael Halcrow 				"to remainder of page at index [0x%.16x]\n",
749237fead6SMichael Halcrow 				index);
750237fead6SMichael Halcrow 		page_cache_release(tmp_page);
751237fead6SMichael Halcrow 		goto out;
752237fead6SMichael Halcrow 	}
753237fead6SMichael Halcrow 	rc = 0;
754237fead6SMichael Halcrow 	page_cache_release(tmp_page);
755237fead6SMichael Halcrow out:
756237fead6SMichael Halcrow 	return rc;
757237fead6SMichael Halcrow }
758237fead6SMichael Halcrow 
759237fead6SMichael Halcrow static sector_t ecryptfs_bmap(struct address_space *mapping, sector_t block)
760237fead6SMichael Halcrow {
761237fead6SMichael Halcrow 	int rc = 0;
762237fead6SMichael Halcrow 	struct inode *inode;
763237fead6SMichael Halcrow 	struct inode *lower_inode;
764237fead6SMichael Halcrow 
765237fead6SMichael Halcrow 	inode = (struct inode *)mapping->host;
766237fead6SMichael Halcrow 	lower_inode = ecryptfs_inode_to_lower(inode);
767237fead6SMichael Halcrow 	if (lower_inode->i_mapping->a_ops->bmap)
768237fead6SMichael Halcrow 		rc = lower_inode->i_mapping->a_ops->bmap(lower_inode->i_mapping,
769237fead6SMichael Halcrow 							 block);
770237fead6SMichael Halcrow 	return rc;
771237fead6SMichael Halcrow }
772237fead6SMichael Halcrow 
773237fead6SMichael Halcrow static void ecryptfs_sync_page(struct page *page)
774237fead6SMichael Halcrow {
775237fead6SMichael Halcrow 	struct inode *inode;
776237fead6SMichael Halcrow 	struct inode *lower_inode;
777237fead6SMichael Halcrow 	struct page *lower_page;
778237fead6SMichael Halcrow 
779237fead6SMichael Halcrow 	inode = page->mapping->host;
780237fead6SMichael Halcrow 	lower_inode = ecryptfs_inode_to_lower(inode);
781237fead6SMichael Halcrow 	/* NOTE: Recently swapped with grab_cache_page(), since
782237fead6SMichael Halcrow 	 * sync_page() just makes sure that pending I/O gets done. */
783237fead6SMichael Halcrow 	lower_page = find_lock_page(lower_inode->i_mapping, page->index);
784237fead6SMichael Halcrow 	if (!lower_page) {
785237fead6SMichael Halcrow 		ecryptfs_printk(KERN_DEBUG, "find_lock_page failed\n");
786237fead6SMichael Halcrow 		return;
787237fead6SMichael Halcrow 	}
788237fead6SMichael Halcrow 	lower_page->mapping->a_ops->sync_page(lower_page);
789237fead6SMichael Halcrow 	ecryptfs_printk(KERN_DEBUG, "Unlocking page with index = [0x%.16x]\n",
790237fead6SMichael Halcrow 			lower_page->index);
791237fead6SMichael Halcrow 	unlock_page(lower_page);
792237fead6SMichael Halcrow 	page_cache_release(lower_page);
793237fead6SMichael Halcrow }
794237fead6SMichael Halcrow 
795237fead6SMichael Halcrow struct address_space_operations ecryptfs_aops = {
796237fead6SMichael Halcrow 	.writepage = ecryptfs_writepage,
797237fead6SMichael Halcrow 	.readpage = ecryptfs_readpage,
798237fead6SMichael Halcrow 	.prepare_write = ecryptfs_prepare_write,
799237fead6SMichael Halcrow 	.commit_write = ecryptfs_commit_write,
800237fead6SMichael Halcrow 	.bmap = ecryptfs_bmap,
801237fead6SMichael Halcrow 	.sync_page = ecryptfs_sync_page,
802237fead6SMichael Halcrow };
803