162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Encryption policy functions for per-file encryption support. 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (C) 2015, Google, Inc. 662306a36Sopenharmony_ci * Copyright (C) 2015, Motorola Mobility. 762306a36Sopenharmony_ci * 862306a36Sopenharmony_ci * Originally written by Michael Halcrow, 2015. 962306a36Sopenharmony_ci * Modified by Jaegeuk Kim, 2015. 1062306a36Sopenharmony_ci * Modified by Eric Biggers, 2019 for v2 policy support. 1162306a36Sopenharmony_ci */ 1262306a36Sopenharmony_ci 1362306a36Sopenharmony_ci#include <linux/fs_context.h> 1462306a36Sopenharmony_ci#include <linux/random.h> 1562306a36Sopenharmony_ci#include <linux/seq_file.h> 1662306a36Sopenharmony_ci#include <linux/string.h> 1762306a36Sopenharmony_ci#include <linux/mount.h> 1862306a36Sopenharmony_ci#include "fscrypt_private.h" 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_ci/** 2162306a36Sopenharmony_ci * fscrypt_policies_equal() - check whether two encryption policies are the same 2262306a36Sopenharmony_ci * @policy1: the first policy 2362306a36Sopenharmony_ci * @policy2: the second policy 2462306a36Sopenharmony_ci * 2562306a36Sopenharmony_ci * Return: %true if equal, else %false 2662306a36Sopenharmony_ci */ 2762306a36Sopenharmony_cibool fscrypt_policies_equal(const union fscrypt_policy *policy1, 2862306a36Sopenharmony_ci const union fscrypt_policy *policy2) 2962306a36Sopenharmony_ci{ 3062306a36Sopenharmony_ci if (policy1->version != policy2->version) 3162306a36Sopenharmony_ci return false; 3262306a36Sopenharmony_ci 3362306a36Sopenharmony_ci return !memcmp(policy1, policy2, fscrypt_policy_size(policy1)); 3462306a36Sopenharmony_ci} 3562306a36Sopenharmony_ci 3662306a36Sopenharmony_ciint fscrypt_policy_to_key_spec(const union fscrypt_policy *policy, 3762306a36Sopenharmony_ci struct fscrypt_key_specifier *key_spec) 3862306a36Sopenharmony_ci{ 3962306a36Sopenharmony_ci switch (policy->version) { 4062306a36Sopenharmony_ci case FSCRYPT_POLICY_V1: 4162306a36Sopenharmony_ci key_spec->type = FSCRYPT_KEY_SPEC_TYPE_DESCRIPTOR; 4262306a36Sopenharmony_ci memcpy(key_spec->u.descriptor, policy->v1.master_key_descriptor, 4362306a36Sopenharmony_ci FSCRYPT_KEY_DESCRIPTOR_SIZE); 4462306a36Sopenharmony_ci return 0; 4562306a36Sopenharmony_ci case FSCRYPT_POLICY_V2: 4662306a36Sopenharmony_ci key_spec->type = FSCRYPT_KEY_SPEC_TYPE_IDENTIFIER; 4762306a36Sopenharmony_ci memcpy(key_spec->u.identifier, policy->v2.master_key_identifier, 4862306a36Sopenharmony_ci FSCRYPT_KEY_IDENTIFIER_SIZE); 4962306a36Sopenharmony_ci return 0; 5062306a36Sopenharmony_ci default: 5162306a36Sopenharmony_ci WARN_ON_ONCE(1); 5262306a36Sopenharmony_ci return -EINVAL; 5362306a36Sopenharmony_ci } 5462306a36Sopenharmony_ci} 5562306a36Sopenharmony_ci 5662306a36Sopenharmony_ciconst union fscrypt_policy *fscrypt_get_dummy_policy(struct super_block *sb) 5762306a36Sopenharmony_ci{ 5862306a36Sopenharmony_ci if (!sb->s_cop->get_dummy_policy) 5962306a36Sopenharmony_ci return NULL; 6062306a36Sopenharmony_ci return sb->s_cop->get_dummy_policy(sb); 6162306a36Sopenharmony_ci} 6262306a36Sopenharmony_ci 6362306a36Sopenharmony_ci/* 6462306a36Sopenharmony_ci * Return %true if the given combination of encryption modes is supported for v1 6562306a36Sopenharmony_ci * (and later) encryption policies. 6662306a36Sopenharmony_ci * 6762306a36Sopenharmony_ci * Do *not* add anything new here, since v1 encryption policies are deprecated. 6862306a36Sopenharmony_ci * New combinations of modes should go in fscrypt_valid_enc_modes_v2() only. 6962306a36Sopenharmony_ci */ 7062306a36Sopenharmony_cistatic bool fscrypt_valid_enc_modes_v1(u32 contents_mode, u32 filenames_mode) 7162306a36Sopenharmony_ci{ 7262306a36Sopenharmony_ci if (contents_mode == FSCRYPT_MODE_AES_256_XTS && 7362306a36Sopenharmony_ci filenames_mode == FSCRYPT_MODE_AES_256_CTS) 7462306a36Sopenharmony_ci return true; 7562306a36Sopenharmony_ci 7662306a36Sopenharmony_ci if (contents_mode == FSCRYPT_MODE_AES_128_CBC && 7762306a36Sopenharmony_ci filenames_mode == FSCRYPT_MODE_AES_128_CTS) 7862306a36Sopenharmony_ci return true; 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_ci if (contents_mode == FSCRYPT_MODE_ADIANTUM && 8162306a36Sopenharmony_ci filenames_mode == FSCRYPT_MODE_ADIANTUM) 8262306a36Sopenharmony_ci return true; 8362306a36Sopenharmony_ci 8462306a36Sopenharmony_ci return false; 8562306a36Sopenharmony_ci} 8662306a36Sopenharmony_ci 8762306a36Sopenharmony_cistatic bool fscrypt_valid_enc_modes_v2(u32 contents_mode, u32 filenames_mode) 8862306a36Sopenharmony_ci{ 8962306a36Sopenharmony_ci if (contents_mode == FSCRYPT_MODE_AES_256_XTS && 9062306a36Sopenharmony_ci filenames_mode == FSCRYPT_MODE_AES_256_HCTR2) 9162306a36Sopenharmony_ci return true; 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ci if (contents_mode == FSCRYPT_MODE_SM4_XTS && 9462306a36Sopenharmony_ci filenames_mode == FSCRYPT_MODE_SM4_CTS) 9562306a36Sopenharmony_ci return true; 9662306a36Sopenharmony_ci 9762306a36Sopenharmony_ci return fscrypt_valid_enc_modes_v1(contents_mode, filenames_mode); 9862306a36Sopenharmony_ci} 9962306a36Sopenharmony_ci 10062306a36Sopenharmony_cistatic bool supported_direct_key_modes(const struct inode *inode, 10162306a36Sopenharmony_ci u32 contents_mode, u32 filenames_mode) 10262306a36Sopenharmony_ci{ 10362306a36Sopenharmony_ci const struct fscrypt_mode *mode; 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_ci if (contents_mode != filenames_mode) { 10662306a36Sopenharmony_ci fscrypt_warn(inode, 10762306a36Sopenharmony_ci "Direct key flag not allowed with different contents and filenames modes"); 10862306a36Sopenharmony_ci return false; 10962306a36Sopenharmony_ci } 11062306a36Sopenharmony_ci mode = &fscrypt_modes[contents_mode]; 11162306a36Sopenharmony_ci 11262306a36Sopenharmony_ci if (mode->ivsize < offsetofend(union fscrypt_iv, nonce)) { 11362306a36Sopenharmony_ci fscrypt_warn(inode, "Direct key flag not allowed with %s", 11462306a36Sopenharmony_ci mode->friendly_name); 11562306a36Sopenharmony_ci return false; 11662306a36Sopenharmony_ci } 11762306a36Sopenharmony_ci return true; 11862306a36Sopenharmony_ci} 11962306a36Sopenharmony_ci 12062306a36Sopenharmony_cistatic bool supported_iv_ino_lblk_policy(const struct fscrypt_policy_v2 *policy, 12162306a36Sopenharmony_ci const struct inode *inode, 12262306a36Sopenharmony_ci const char *type, 12362306a36Sopenharmony_ci int max_ino_bits, int max_lblk_bits) 12462306a36Sopenharmony_ci{ 12562306a36Sopenharmony_ci struct super_block *sb = inode->i_sb; 12662306a36Sopenharmony_ci int ino_bits = 64, lblk_bits = 64; 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_ci /* 12962306a36Sopenharmony_ci * IV_INO_LBLK_* exist only because of hardware limitations, and 13062306a36Sopenharmony_ci * currently the only known use case for them involves AES-256-XTS. 13162306a36Sopenharmony_ci * That's also all we test currently. For these reasons, for now only 13262306a36Sopenharmony_ci * allow AES-256-XTS here. This can be relaxed later if a use case for 13362306a36Sopenharmony_ci * IV_INO_LBLK_* with other encryption modes arises. 13462306a36Sopenharmony_ci */ 13562306a36Sopenharmony_ci if (policy->contents_encryption_mode != FSCRYPT_MODE_AES_256_XTS) { 13662306a36Sopenharmony_ci fscrypt_warn(inode, 13762306a36Sopenharmony_ci "Can't use %s policy with contents mode other than AES-256-XTS", 13862306a36Sopenharmony_ci type); 13962306a36Sopenharmony_ci return false; 14062306a36Sopenharmony_ci } 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci /* 14362306a36Sopenharmony_ci * It's unsafe to include inode numbers in the IVs if the filesystem can 14462306a36Sopenharmony_ci * potentially renumber inodes, e.g. via filesystem shrinking. 14562306a36Sopenharmony_ci */ 14662306a36Sopenharmony_ci if (!sb->s_cop->has_stable_inodes || 14762306a36Sopenharmony_ci !sb->s_cop->has_stable_inodes(sb)) { 14862306a36Sopenharmony_ci fscrypt_warn(inode, 14962306a36Sopenharmony_ci "Can't use %s policy on filesystem '%s' because it doesn't have stable inode numbers", 15062306a36Sopenharmony_ci type, sb->s_id); 15162306a36Sopenharmony_ci return false; 15262306a36Sopenharmony_ci } 15362306a36Sopenharmony_ci if (sb->s_cop->get_ino_and_lblk_bits) 15462306a36Sopenharmony_ci sb->s_cop->get_ino_and_lblk_bits(sb, &ino_bits, &lblk_bits); 15562306a36Sopenharmony_ci if (ino_bits > max_ino_bits) { 15662306a36Sopenharmony_ci fscrypt_warn(inode, 15762306a36Sopenharmony_ci "Can't use %s policy on filesystem '%s' because its inode numbers are too long", 15862306a36Sopenharmony_ci type, sb->s_id); 15962306a36Sopenharmony_ci return false; 16062306a36Sopenharmony_ci } 16162306a36Sopenharmony_ci if (lblk_bits > max_lblk_bits) { 16262306a36Sopenharmony_ci fscrypt_warn(inode, 16362306a36Sopenharmony_ci "Can't use %s policy on filesystem '%s' because its block numbers are too long", 16462306a36Sopenharmony_ci type, sb->s_id); 16562306a36Sopenharmony_ci return false; 16662306a36Sopenharmony_ci } 16762306a36Sopenharmony_ci return true; 16862306a36Sopenharmony_ci} 16962306a36Sopenharmony_ci 17062306a36Sopenharmony_cistatic bool fscrypt_supported_v1_policy(const struct fscrypt_policy_v1 *policy, 17162306a36Sopenharmony_ci const struct inode *inode) 17262306a36Sopenharmony_ci{ 17362306a36Sopenharmony_ci if (!fscrypt_valid_enc_modes_v1(policy->contents_encryption_mode, 17462306a36Sopenharmony_ci policy->filenames_encryption_mode)) { 17562306a36Sopenharmony_ci fscrypt_warn(inode, 17662306a36Sopenharmony_ci "Unsupported encryption modes (contents %d, filenames %d)", 17762306a36Sopenharmony_ci policy->contents_encryption_mode, 17862306a36Sopenharmony_ci policy->filenames_encryption_mode); 17962306a36Sopenharmony_ci return false; 18062306a36Sopenharmony_ci } 18162306a36Sopenharmony_ci 18262306a36Sopenharmony_ci if (policy->flags & ~(FSCRYPT_POLICY_FLAGS_PAD_MASK | 18362306a36Sopenharmony_ci FSCRYPT_POLICY_FLAG_DIRECT_KEY)) { 18462306a36Sopenharmony_ci fscrypt_warn(inode, "Unsupported encryption flags (0x%02x)", 18562306a36Sopenharmony_ci policy->flags); 18662306a36Sopenharmony_ci return false; 18762306a36Sopenharmony_ci } 18862306a36Sopenharmony_ci 18962306a36Sopenharmony_ci if ((policy->flags & FSCRYPT_POLICY_FLAG_DIRECT_KEY) && 19062306a36Sopenharmony_ci !supported_direct_key_modes(inode, policy->contents_encryption_mode, 19162306a36Sopenharmony_ci policy->filenames_encryption_mode)) 19262306a36Sopenharmony_ci return false; 19362306a36Sopenharmony_ci 19462306a36Sopenharmony_ci if (IS_CASEFOLDED(inode)) { 19562306a36Sopenharmony_ci /* With v1, there's no way to derive dirhash keys. */ 19662306a36Sopenharmony_ci fscrypt_warn(inode, 19762306a36Sopenharmony_ci "v1 policies can't be used on casefolded directories"); 19862306a36Sopenharmony_ci return false; 19962306a36Sopenharmony_ci } 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_ci return true; 20262306a36Sopenharmony_ci} 20362306a36Sopenharmony_ci 20462306a36Sopenharmony_cistatic bool fscrypt_supported_v2_policy(const struct fscrypt_policy_v2 *policy, 20562306a36Sopenharmony_ci const struct inode *inode) 20662306a36Sopenharmony_ci{ 20762306a36Sopenharmony_ci int count = 0; 20862306a36Sopenharmony_ci 20962306a36Sopenharmony_ci if (!fscrypt_valid_enc_modes_v2(policy->contents_encryption_mode, 21062306a36Sopenharmony_ci policy->filenames_encryption_mode)) { 21162306a36Sopenharmony_ci fscrypt_warn(inode, 21262306a36Sopenharmony_ci "Unsupported encryption modes (contents %d, filenames %d)", 21362306a36Sopenharmony_ci policy->contents_encryption_mode, 21462306a36Sopenharmony_ci policy->filenames_encryption_mode); 21562306a36Sopenharmony_ci return false; 21662306a36Sopenharmony_ci } 21762306a36Sopenharmony_ci 21862306a36Sopenharmony_ci if (policy->flags & ~(FSCRYPT_POLICY_FLAGS_PAD_MASK | 21962306a36Sopenharmony_ci FSCRYPT_POLICY_FLAG_DIRECT_KEY | 22062306a36Sopenharmony_ci FSCRYPT_POLICY_FLAG_IV_INO_LBLK_64 | 22162306a36Sopenharmony_ci FSCRYPT_POLICY_FLAG_IV_INO_LBLK_32)) { 22262306a36Sopenharmony_ci fscrypt_warn(inode, "Unsupported encryption flags (0x%02x)", 22362306a36Sopenharmony_ci policy->flags); 22462306a36Sopenharmony_ci return false; 22562306a36Sopenharmony_ci } 22662306a36Sopenharmony_ci 22762306a36Sopenharmony_ci count += !!(policy->flags & FSCRYPT_POLICY_FLAG_DIRECT_KEY); 22862306a36Sopenharmony_ci count += !!(policy->flags & FSCRYPT_POLICY_FLAG_IV_INO_LBLK_64); 22962306a36Sopenharmony_ci count += !!(policy->flags & FSCRYPT_POLICY_FLAG_IV_INO_LBLK_32); 23062306a36Sopenharmony_ci if (count > 1) { 23162306a36Sopenharmony_ci fscrypt_warn(inode, "Mutually exclusive encryption flags (0x%02x)", 23262306a36Sopenharmony_ci policy->flags); 23362306a36Sopenharmony_ci return false; 23462306a36Sopenharmony_ci } 23562306a36Sopenharmony_ci 23662306a36Sopenharmony_ci if ((policy->flags & FSCRYPT_POLICY_FLAG_DIRECT_KEY) && 23762306a36Sopenharmony_ci !supported_direct_key_modes(inode, policy->contents_encryption_mode, 23862306a36Sopenharmony_ci policy->filenames_encryption_mode)) 23962306a36Sopenharmony_ci return false; 24062306a36Sopenharmony_ci 24162306a36Sopenharmony_ci if ((policy->flags & FSCRYPT_POLICY_FLAG_IV_INO_LBLK_64) && 24262306a36Sopenharmony_ci !supported_iv_ino_lblk_policy(policy, inode, "IV_INO_LBLK_64", 24362306a36Sopenharmony_ci 32, 32)) 24462306a36Sopenharmony_ci return false; 24562306a36Sopenharmony_ci 24662306a36Sopenharmony_ci /* 24762306a36Sopenharmony_ci * IV_INO_LBLK_32 hashes the inode number, so in principle it can 24862306a36Sopenharmony_ci * support any ino_bits. However, currently the inode number is gotten 24962306a36Sopenharmony_ci * from inode::i_ino which is 'unsigned long'. So for now the 25062306a36Sopenharmony_ci * implementation limit is 32 bits. 25162306a36Sopenharmony_ci */ 25262306a36Sopenharmony_ci if ((policy->flags & FSCRYPT_POLICY_FLAG_IV_INO_LBLK_32) && 25362306a36Sopenharmony_ci !supported_iv_ino_lblk_policy(policy, inode, "IV_INO_LBLK_32", 25462306a36Sopenharmony_ci 32, 32)) 25562306a36Sopenharmony_ci return false; 25662306a36Sopenharmony_ci 25762306a36Sopenharmony_ci if (memchr_inv(policy->__reserved, 0, sizeof(policy->__reserved))) { 25862306a36Sopenharmony_ci fscrypt_warn(inode, "Reserved bits set in encryption policy"); 25962306a36Sopenharmony_ci return false; 26062306a36Sopenharmony_ci } 26162306a36Sopenharmony_ci 26262306a36Sopenharmony_ci return true; 26362306a36Sopenharmony_ci} 26462306a36Sopenharmony_ci 26562306a36Sopenharmony_ci/** 26662306a36Sopenharmony_ci * fscrypt_supported_policy() - check whether an encryption policy is supported 26762306a36Sopenharmony_ci * @policy_u: the encryption policy 26862306a36Sopenharmony_ci * @inode: the inode on which the policy will be used 26962306a36Sopenharmony_ci * 27062306a36Sopenharmony_ci * Given an encryption policy, check whether all its encryption modes and other 27162306a36Sopenharmony_ci * settings are supported by this kernel on the given inode. (But we don't 27262306a36Sopenharmony_ci * currently don't check for crypto API support here, so attempting to use an 27362306a36Sopenharmony_ci * algorithm not configured into the crypto API will still fail later.) 27462306a36Sopenharmony_ci * 27562306a36Sopenharmony_ci * Return: %true if supported, else %false 27662306a36Sopenharmony_ci */ 27762306a36Sopenharmony_cibool fscrypt_supported_policy(const union fscrypt_policy *policy_u, 27862306a36Sopenharmony_ci const struct inode *inode) 27962306a36Sopenharmony_ci{ 28062306a36Sopenharmony_ci switch (policy_u->version) { 28162306a36Sopenharmony_ci case FSCRYPT_POLICY_V1: 28262306a36Sopenharmony_ci return fscrypt_supported_v1_policy(&policy_u->v1, inode); 28362306a36Sopenharmony_ci case FSCRYPT_POLICY_V2: 28462306a36Sopenharmony_ci return fscrypt_supported_v2_policy(&policy_u->v2, inode); 28562306a36Sopenharmony_ci } 28662306a36Sopenharmony_ci return false; 28762306a36Sopenharmony_ci} 28862306a36Sopenharmony_ci 28962306a36Sopenharmony_ci/** 29062306a36Sopenharmony_ci * fscrypt_new_context() - create a new fscrypt_context 29162306a36Sopenharmony_ci * @ctx_u: output context 29262306a36Sopenharmony_ci * @policy_u: input policy 29362306a36Sopenharmony_ci * @nonce: nonce to use 29462306a36Sopenharmony_ci * 29562306a36Sopenharmony_ci * Create an fscrypt_context for an inode that is being assigned the given 29662306a36Sopenharmony_ci * encryption policy. @nonce must be a new random nonce. 29762306a36Sopenharmony_ci * 29862306a36Sopenharmony_ci * Return: the size of the new context in bytes. 29962306a36Sopenharmony_ci */ 30062306a36Sopenharmony_cistatic int fscrypt_new_context(union fscrypt_context *ctx_u, 30162306a36Sopenharmony_ci const union fscrypt_policy *policy_u, 30262306a36Sopenharmony_ci const u8 nonce[FSCRYPT_FILE_NONCE_SIZE]) 30362306a36Sopenharmony_ci{ 30462306a36Sopenharmony_ci memset(ctx_u, 0, sizeof(*ctx_u)); 30562306a36Sopenharmony_ci 30662306a36Sopenharmony_ci switch (policy_u->version) { 30762306a36Sopenharmony_ci case FSCRYPT_POLICY_V1: { 30862306a36Sopenharmony_ci const struct fscrypt_policy_v1 *policy = &policy_u->v1; 30962306a36Sopenharmony_ci struct fscrypt_context_v1 *ctx = &ctx_u->v1; 31062306a36Sopenharmony_ci 31162306a36Sopenharmony_ci ctx->version = FSCRYPT_CONTEXT_V1; 31262306a36Sopenharmony_ci ctx->contents_encryption_mode = 31362306a36Sopenharmony_ci policy->contents_encryption_mode; 31462306a36Sopenharmony_ci ctx->filenames_encryption_mode = 31562306a36Sopenharmony_ci policy->filenames_encryption_mode; 31662306a36Sopenharmony_ci ctx->flags = policy->flags; 31762306a36Sopenharmony_ci memcpy(ctx->master_key_descriptor, 31862306a36Sopenharmony_ci policy->master_key_descriptor, 31962306a36Sopenharmony_ci sizeof(ctx->master_key_descriptor)); 32062306a36Sopenharmony_ci memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); 32162306a36Sopenharmony_ci return sizeof(*ctx); 32262306a36Sopenharmony_ci } 32362306a36Sopenharmony_ci case FSCRYPT_POLICY_V2: { 32462306a36Sopenharmony_ci const struct fscrypt_policy_v2 *policy = &policy_u->v2; 32562306a36Sopenharmony_ci struct fscrypt_context_v2 *ctx = &ctx_u->v2; 32662306a36Sopenharmony_ci 32762306a36Sopenharmony_ci ctx->version = FSCRYPT_CONTEXT_V2; 32862306a36Sopenharmony_ci ctx->contents_encryption_mode = 32962306a36Sopenharmony_ci policy->contents_encryption_mode; 33062306a36Sopenharmony_ci ctx->filenames_encryption_mode = 33162306a36Sopenharmony_ci policy->filenames_encryption_mode; 33262306a36Sopenharmony_ci ctx->flags = policy->flags; 33362306a36Sopenharmony_ci memcpy(ctx->master_key_identifier, 33462306a36Sopenharmony_ci policy->master_key_identifier, 33562306a36Sopenharmony_ci sizeof(ctx->master_key_identifier)); 33662306a36Sopenharmony_ci memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE); 33762306a36Sopenharmony_ci return sizeof(*ctx); 33862306a36Sopenharmony_ci } 33962306a36Sopenharmony_ci } 34062306a36Sopenharmony_ci BUG(); 34162306a36Sopenharmony_ci} 34262306a36Sopenharmony_ci 34362306a36Sopenharmony_ci/** 34462306a36Sopenharmony_ci * fscrypt_policy_from_context() - convert an fscrypt_context to 34562306a36Sopenharmony_ci * an fscrypt_policy 34662306a36Sopenharmony_ci * @policy_u: output policy 34762306a36Sopenharmony_ci * @ctx_u: input context 34862306a36Sopenharmony_ci * @ctx_size: size of input context in bytes 34962306a36Sopenharmony_ci * 35062306a36Sopenharmony_ci * Given an fscrypt_context, build the corresponding fscrypt_policy. 35162306a36Sopenharmony_ci * 35262306a36Sopenharmony_ci * Return: 0 on success, or -EINVAL if the fscrypt_context has an unrecognized 35362306a36Sopenharmony_ci * version number or size. 35462306a36Sopenharmony_ci * 35562306a36Sopenharmony_ci * This does *not* validate the settings within the policy itself, e.g. the 35662306a36Sopenharmony_ci * modes, flags, and reserved bits. Use fscrypt_supported_policy() for that. 35762306a36Sopenharmony_ci */ 35862306a36Sopenharmony_ciint fscrypt_policy_from_context(union fscrypt_policy *policy_u, 35962306a36Sopenharmony_ci const union fscrypt_context *ctx_u, 36062306a36Sopenharmony_ci int ctx_size) 36162306a36Sopenharmony_ci{ 36262306a36Sopenharmony_ci memset(policy_u, 0, sizeof(*policy_u)); 36362306a36Sopenharmony_ci 36462306a36Sopenharmony_ci if (!fscrypt_context_is_valid(ctx_u, ctx_size)) 36562306a36Sopenharmony_ci return -EINVAL; 36662306a36Sopenharmony_ci 36762306a36Sopenharmony_ci switch (ctx_u->version) { 36862306a36Sopenharmony_ci case FSCRYPT_CONTEXT_V1: { 36962306a36Sopenharmony_ci const struct fscrypt_context_v1 *ctx = &ctx_u->v1; 37062306a36Sopenharmony_ci struct fscrypt_policy_v1 *policy = &policy_u->v1; 37162306a36Sopenharmony_ci 37262306a36Sopenharmony_ci policy->version = FSCRYPT_POLICY_V1; 37362306a36Sopenharmony_ci policy->contents_encryption_mode = 37462306a36Sopenharmony_ci ctx->contents_encryption_mode; 37562306a36Sopenharmony_ci policy->filenames_encryption_mode = 37662306a36Sopenharmony_ci ctx->filenames_encryption_mode; 37762306a36Sopenharmony_ci policy->flags = ctx->flags; 37862306a36Sopenharmony_ci memcpy(policy->master_key_descriptor, 37962306a36Sopenharmony_ci ctx->master_key_descriptor, 38062306a36Sopenharmony_ci sizeof(policy->master_key_descriptor)); 38162306a36Sopenharmony_ci return 0; 38262306a36Sopenharmony_ci } 38362306a36Sopenharmony_ci case FSCRYPT_CONTEXT_V2: { 38462306a36Sopenharmony_ci const struct fscrypt_context_v2 *ctx = &ctx_u->v2; 38562306a36Sopenharmony_ci struct fscrypt_policy_v2 *policy = &policy_u->v2; 38662306a36Sopenharmony_ci 38762306a36Sopenharmony_ci policy->version = FSCRYPT_POLICY_V2; 38862306a36Sopenharmony_ci policy->contents_encryption_mode = 38962306a36Sopenharmony_ci ctx->contents_encryption_mode; 39062306a36Sopenharmony_ci policy->filenames_encryption_mode = 39162306a36Sopenharmony_ci ctx->filenames_encryption_mode; 39262306a36Sopenharmony_ci policy->flags = ctx->flags; 39362306a36Sopenharmony_ci memcpy(policy->__reserved, ctx->__reserved, 39462306a36Sopenharmony_ci sizeof(policy->__reserved)); 39562306a36Sopenharmony_ci memcpy(policy->master_key_identifier, 39662306a36Sopenharmony_ci ctx->master_key_identifier, 39762306a36Sopenharmony_ci sizeof(policy->master_key_identifier)); 39862306a36Sopenharmony_ci return 0; 39962306a36Sopenharmony_ci } 40062306a36Sopenharmony_ci } 40162306a36Sopenharmony_ci /* unreachable */ 40262306a36Sopenharmony_ci return -EINVAL; 40362306a36Sopenharmony_ci} 40462306a36Sopenharmony_ci 40562306a36Sopenharmony_ci/* Retrieve an inode's encryption policy */ 40662306a36Sopenharmony_cistatic int fscrypt_get_policy(struct inode *inode, union fscrypt_policy *policy) 40762306a36Sopenharmony_ci{ 40862306a36Sopenharmony_ci const struct fscrypt_info *ci; 40962306a36Sopenharmony_ci union fscrypt_context ctx; 41062306a36Sopenharmony_ci int ret; 41162306a36Sopenharmony_ci 41262306a36Sopenharmony_ci ci = fscrypt_get_info(inode); 41362306a36Sopenharmony_ci if (ci) { 41462306a36Sopenharmony_ci /* key available, use the cached policy */ 41562306a36Sopenharmony_ci *policy = ci->ci_policy; 41662306a36Sopenharmony_ci return 0; 41762306a36Sopenharmony_ci } 41862306a36Sopenharmony_ci 41962306a36Sopenharmony_ci if (!IS_ENCRYPTED(inode)) 42062306a36Sopenharmony_ci return -ENODATA; 42162306a36Sopenharmony_ci 42262306a36Sopenharmony_ci ret = inode->i_sb->s_cop->get_context(inode, &ctx, sizeof(ctx)); 42362306a36Sopenharmony_ci if (ret < 0) 42462306a36Sopenharmony_ci return (ret == -ERANGE) ? -EINVAL : ret; 42562306a36Sopenharmony_ci 42662306a36Sopenharmony_ci return fscrypt_policy_from_context(policy, &ctx, ret); 42762306a36Sopenharmony_ci} 42862306a36Sopenharmony_ci 42962306a36Sopenharmony_cistatic int set_encryption_policy(struct inode *inode, 43062306a36Sopenharmony_ci const union fscrypt_policy *policy) 43162306a36Sopenharmony_ci{ 43262306a36Sopenharmony_ci u8 nonce[FSCRYPT_FILE_NONCE_SIZE]; 43362306a36Sopenharmony_ci union fscrypt_context ctx; 43462306a36Sopenharmony_ci int ctxsize; 43562306a36Sopenharmony_ci int err; 43662306a36Sopenharmony_ci 43762306a36Sopenharmony_ci if (!fscrypt_supported_policy(policy, inode)) 43862306a36Sopenharmony_ci return -EINVAL; 43962306a36Sopenharmony_ci 44062306a36Sopenharmony_ci switch (policy->version) { 44162306a36Sopenharmony_ci case FSCRYPT_POLICY_V1: 44262306a36Sopenharmony_ci /* 44362306a36Sopenharmony_ci * The original encryption policy version provided no way of 44462306a36Sopenharmony_ci * verifying that the correct master key was supplied, which was 44562306a36Sopenharmony_ci * insecure in scenarios where multiple users have access to the 44662306a36Sopenharmony_ci * same encrypted files (even just read-only access). The new 44762306a36Sopenharmony_ci * encryption policy version fixes this and also implies use of 44862306a36Sopenharmony_ci * an improved key derivation function and allows non-root users 44962306a36Sopenharmony_ci * to securely remove keys. So as long as compatibility with 45062306a36Sopenharmony_ci * old kernels isn't required, it is recommended to use the new 45162306a36Sopenharmony_ci * policy version for all new encrypted directories. 45262306a36Sopenharmony_ci */ 45362306a36Sopenharmony_ci pr_warn_once("%s (pid %d) is setting deprecated v1 encryption policy; recommend upgrading to v2.\n", 45462306a36Sopenharmony_ci current->comm, current->pid); 45562306a36Sopenharmony_ci break; 45662306a36Sopenharmony_ci case FSCRYPT_POLICY_V2: 45762306a36Sopenharmony_ci err = fscrypt_verify_key_added(inode->i_sb, 45862306a36Sopenharmony_ci policy->v2.master_key_identifier); 45962306a36Sopenharmony_ci if (err) 46062306a36Sopenharmony_ci return err; 46162306a36Sopenharmony_ci if (policy->v2.flags & FSCRYPT_POLICY_FLAG_IV_INO_LBLK_32) 46262306a36Sopenharmony_ci pr_warn_once("%s (pid %d) is setting an IV_INO_LBLK_32 encryption policy. This should only be used if there are certain hardware limitations.\n", 46362306a36Sopenharmony_ci current->comm, current->pid); 46462306a36Sopenharmony_ci break; 46562306a36Sopenharmony_ci default: 46662306a36Sopenharmony_ci WARN_ON_ONCE(1); 46762306a36Sopenharmony_ci return -EINVAL; 46862306a36Sopenharmony_ci } 46962306a36Sopenharmony_ci 47062306a36Sopenharmony_ci get_random_bytes(nonce, FSCRYPT_FILE_NONCE_SIZE); 47162306a36Sopenharmony_ci ctxsize = fscrypt_new_context(&ctx, policy, nonce); 47262306a36Sopenharmony_ci 47362306a36Sopenharmony_ci return inode->i_sb->s_cop->set_context(inode, &ctx, ctxsize, NULL); 47462306a36Sopenharmony_ci} 47562306a36Sopenharmony_ci 47662306a36Sopenharmony_ciint fscrypt_ioctl_set_policy(struct file *filp, const void __user *arg) 47762306a36Sopenharmony_ci{ 47862306a36Sopenharmony_ci union fscrypt_policy policy; 47962306a36Sopenharmony_ci union fscrypt_policy existing_policy; 48062306a36Sopenharmony_ci struct inode *inode = file_inode(filp); 48162306a36Sopenharmony_ci u8 version; 48262306a36Sopenharmony_ci int size; 48362306a36Sopenharmony_ci int ret; 48462306a36Sopenharmony_ci 48562306a36Sopenharmony_ci if (get_user(policy.version, (const u8 __user *)arg)) 48662306a36Sopenharmony_ci return -EFAULT; 48762306a36Sopenharmony_ci 48862306a36Sopenharmony_ci size = fscrypt_policy_size(&policy); 48962306a36Sopenharmony_ci if (size <= 0) 49062306a36Sopenharmony_ci return -EINVAL; 49162306a36Sopenharmony_ci 49262306a36Sopenharmony_ci /* 49362306a36Sopenharmony_ci * We should just copy the remaining 'size - 1' bytes here, but a 49462306a36Sopenharmony_ci * bizarre bug in gcc 7 and earlier (fixed by gcc r255731) causes gcc to 49562306a36Sopenharmony_ci * think that size can be 0 here (despite the check above!) *and* that 49662306a36Sopenharmony_ci * it's a compile-time constant. Thus it would think copy_from_user() 49762306a36Sopenharmony_ci * is passed compile-time constant ULONG_MAX, causing the compile-time 49862306a36Sopenharmony_ci * buffer overflow check to fail, breaking the build. This only occurred 49962306a36Sopenharmony_ci * when building an i386 kernel with -Os and branch profiling enabled. 50062306a36Sopenharmony_ci * 50162306a36Sopenharmony_ci * Work around it by just copying the first byte again... 50262306a36Sopenharmony_ci */ 50362306a36Sopenharmony_ci version = policy.version; 50462306a36Sopenharmony_ci if (copy_from_user(&policy, arg, size)) 50562306a36Sopenharmony_ci return -EFAULT; 50662306a36Sopenharmony_ci policy.version = version; 50762306a36Sopenharmony_ci 50862306a36Sopenharmony_ci if (!inode_owner_or_capable(&nop_mnt_idmap, inode)) 50962306a36Sopenharmony_ci return -EACCES; 51062306a36Sopenharmony_ci 51162306a36Sopenharmony_ci ret = mnt_want_write_file(filp); 51262306a36Sopenharmony_ci if (ret) 51362306a36Sopenharmony_ci return ret; 51462306a36Sopenharmony_ci 51562306a36Sopenharmony_ci inode_lock(inode); 51662306a36Sopenharmony_ci 51762306a36Sopenharmony_ci ret = fscrypt_get_policy(inode, &existing_policy); 51862306a36Sopenharmony_ci if (ret == -ENODATA) { 51962306a36Sopenharmony_ci if (!S_ISDIR(inode->i_mode)) 52062306a36Sopenharmony_ci ret = -ENOTDIR; 52162306a36Sopenharmony_ci else if (IS_DEADDIR(inode)) 52262306a36Sopenharmony_ci ret = -ENOENT; 52362306a36Sopenharmony_ci else if (!inode->i_sb->s_cop->empty_dir(inode)) 52462306a36Sopenharmony_ci ret = -ENOTEMPTY; 52562306a36Sopenharmony_ci else 52662306a36Sopenharmony_ci ret = set_encryption_policy(inode, &policy); 52762306a36Sopenharmony_ci } else if (ret == -EINVAL || 52862306a36Sopenharmony_ci (ret == 0 && !fscrypt_policies_equal(&policy, 52962306a36Sopenharmony_ci &existing_policy))) { 53062306a36Sopenharmony_ci /* The file already uses a different encryption policy. */ 53162306a36Sopenharmony_ci ret = -EEXIST; 53262306a36Sopenharmony_ci } 53362306a36Sopenharmony_ci 53462306a36Sopenharmony_ci inode_unlock(inode); 53562306a36Sopenharmony_ci 53662306a36Sopenharmony_ci mnt_drop_write_file(filp); 53762306a36Sopenharmony_ci return ret; 53862306a36Sopenharmony_ci} 53962306a36Sopenharmony_ciEXPORT_SYMBOL(fscrypt_ioctl_set_policy); 54062306a36Sopenharmony_ci 54162306a36Sopenharmony_ci/* Original ioctl version; can only get the original policy version */ 54262306a36Sopenharmony_ciint fscrypt_ioctl_get_policy(struct file *filp, void __user *arg) 54362306a36Sopenharmony_ci{ 54462306a36Sopenharmony_ci union fscrypt_policy policy; 54562306a36Sopenharmony_ci int err; 54662306a36Sopenharmony_ci 54762306a36Sopenharmony_ci err = fscrypt_get_policy(file_inode(filp), &policy); 54862306a36Sopenharmony_ci if (err) 54962306a36Sopenharmony_ci return err; 55062306a36Sopenharmony_ci 55162306a36Sopenharmony_ci if (policy.version != FSCRYPT_POLICY_V1) 55262306a36Sopenharmony_ci return -EINVAL; 55362306a36Sopenharmony_ci 55462306a36Sopenharmony_ci if (copy_to_user(arg, &policy, sizeof(policy.v1))) 55562306a36Sopenharmony_ci return -EFAULT; 55662306a36Sopenharmony_ci return 0; 55762306a36Sopenharmony_ci} 55862306a36Sopenharmony_ciEXPORT_SYMBOL(fscrypt_ioctl_get_policy); 55962306a36Sopenharmony_ci 56062306a36Sopenharmony_ci/* Extended ioctl version; can get policies of any version */ 56162306a36Sopenharmony_ciint fscrypt_ioctl_get_policy_ex(struct file *filp, void __user *uarg) 56262306a36Sopenharmony_ci{ 56362306a36Sopenharmony_ci struct fscrypt_get_policy_ex_arg arg; 56462306a36Sopenharmony_ci union fscrypt_policy *policy = (union fscrypt_policy *)&arg.policy; 56562306a36Sopenharmony_ci size_t policy_size; 56662306a36Sopenharmony_ci int err; 56762306a36Sopenharmony_ci 56862306a36Sopenharmony_ci /* arg is policy_size, then policy */ 56962306a36Sopenharmony_ci BUILD_BUG_ON(offsetof(typeof(arg), policy_size) != 0); 57062306a36Sopenharmony_ci BUILD_BUG_ON(offsetofend(typeof(arg), policy_size) != 57162306a36Sopenharmony_ci offsetof(typeof(arg), policy)); 57262306a36Sopenharmony_ci BUILD_BUG_ON(sizeof(arg.policy) != sizeof(*policy)); 57362306a36Sopenharmony_ci 57462306a36Sopenharmony_ci err = fscrypt_get_policy(file_inode(filp), policy); 57562306a36Sopenharmony_ci if (err) 57662306a36Sopenharmony_ci return err; 57762306a36Sopenharmony_ci policy_size = fscrypt_policy_size(policy); 57862306a36Sopenharmony_ci 57962306a36Sopenharmony_ci if (copy_from_user(&arg, uarg, sizeof(arg.policy_size))) 58062306a36Sopenharmony_ci return -EFAULT; 58162306a36Sopenharmony_ci 58262306a36Sopenharmony_ci if (policy_size > arg.policy_size) 58362306a36Sopenharmony_ci return -EOVERFLOW; 58462306a36Sopenharmony_ci arg.policy_size = policy_size; 58562306a36Sopenharmony_ci 58662306a36Sopenharmony_ci if (copy_to_user(uarg, &arg, sizeof(arg.policy_size) + policy_size)) 58762306a36Sopenharmony_ci return -EFAULT; 58862306a36Sopenharmony_ci return 0; 58962306a36Sopenharmony_ci} 59062306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(fscrypt_ioctl_get_policy_ex); 59162306a36Sopenharmony_ci 59262306a36Sopenharmony_ci/* FS_IOC_GET_ENCRYPTION_NONCE: retrieve file's encryption nonce for testing */ 59362306a36Sopenharmony_ciint fscrypt_ioctl_get_nonce(struct file *filp, void __user *arg) 59462306a36Sopenharmony_ci{ 59562306a36Sopenharmony_ci struct inode *inode = file_inode(filp); 59662306a36Sopenharmony_ci union fscrypt_context ctx; 59762306a36Sopenharmony_ci int ret; 59862306a36Sopenharmony_ci 59962306a36Sopenharmony_ci ret = inode->i_sb->s_cop->get_context(inode, &ctx, sizeof(ctx)); 60062306a36Sopenharmony_ci if (ret < 0) 60162306a36Sopenharmony_ci return ret; 60262306a36Sopenharmony_ci if (!fscrypt_context_is_valid(&ctx, ret)) 60362306a36Sopenharmony_ci return -EINVAL; 60462306a36Sopenharmony_ci if (copy_to_user(arg, fscrypt_context_nonce(&ctx), 60562306a36Sopenharmony_ci FSCRYPT_FILE_NONCE_SIZE)) 60662306a36Sopenharmony_ci return -EFAULT; 60762306a36Sopenharmony_ci return 0; 60862306a36Sopenharmony_ci} 60962306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(fscrypt_ioctl_get_nonce); 61062306a36Sopenharmony_ci 61162306a36Sopenharmony_ci/** 61262306a36Sopenharmony_ci * fscrypt_has_permitted_context() - is a file's encryption policy permitted 61362306a36Sopenharmony_ci * within its directory? 61462306a36Sopenharmony_ci * 61562306a36Sopenharmony_ci * @parent: inode for parent directory 61662306a36Sopenharmony_ci * @child: inode for file being looked up, opened, or linked into @parent 61762306a36Sopenharmony_ci * 61862306a36Sopenharmony_ci * Filesystems must call this before permitting access to an inode in a 61962306a36Sopenharmony_ci * situation where the parent directory is encrypted (either before allowing 62062306a36Sopenharmony_ci * ->lookup() to succeed, or for a regular file before allowing it to be opened) 62162306a36Sopenharmony_ci * and before any operation that involves linking an inode into an encrypted 62262306a36Sopenharmony_ci * directory, including link, rename, and cross rename. It enforces the 62362306a36Sopenharmony_ci * constraint that within a given encrypted directory tree, all files use the 62462306a36Sopenharmony_ci * same encryption policy. The pre-access check is needed to detect potentially 62562306a36Sopenharmony_ci * malicious offline violations of this constraint, while the link and rename 62662306a36Sopenharmony_ci * checks are needed to prevent online violations of this constraint. 62762306a36Sopenharmony_ci * 62862306a36Sopenharmony_ci * Return: 1 if permitted, 0 if forbidden. 62962306a36Sopenharmony_ci */ 63062306a36Sopenharmony_ciint fscrypt_has_permitted_context(struct inode *parent, struct inode *child) 63162306a36Sopenharmony_ci{ 63262306a36Sopenharmony_ci union fscrypt_policy parent_policy, child_policy; 63362306a36Sopenharmony_ci int err, err1, err2; 63462306a36Sopenharmony_ci 63562306a36Sopenharmony_ci /* No restrictions on file types which are never encrypted */ 63662306a36Sopenharmony_ci if (!S_ISREG(child->i_mode) && !S_ISDIR(child->i_mode) && 63762306a36Sopenharmony_ci !S_ISLNK(child->i_mode)) 63862306a36Sopenharmony_ci return 1; 63962306a36Sopenharmony_ci 64062306a36Sopenharmony_ci /* No restrictions if the parent directory is unencrypted */ 64162306a36Sopenharmony_ci if (!IS_ENCRYPTED(parent)) 64262306a36Sopenharmony_ci return 1; 64362306a36Sopenharmony_ci 64462306a36Sopenharmony_ci /* Encrypted directories must not contain unencrypted files */ 64562306a36Sopenharmony_ci if (!IS_ENCRYPTED(child)) 64662306a36Sopenharmony_ci return 0; 64762306a36Sopenharmony_ci 64862306a36Sopenharmony_ci /* 64962306a36Sopenharmony_ci * Both parent and child are encrypted, so verify they use the same 65062306a36Sopenharmony_ci * encryption policy. Compare the fscrypt_info structs if the keys are 65162306a36Sopenharmony_ci * available, otherwise retrieve and compare the fscrypt_contexts. 65262306a36Sopenharmony_ci * 65362306a36Sopenharmony_ci * Note that the fscrypt_context retrieval will be required frequently 65462306a36Sopenharmony_ci * when accessing an encrypted directory tree without the key. 65562306a36Sopenharmony_ci * Performance-wise this is not a big deal because we already don't 65662306a36Sopenharmony_ci * really optimize for file access without the key (to the extent that 65762306a36Sopenharmony_ci * such access is even possible), given that any attempted access 65862306a36Sopenharmony_ci * already causes a fscrypt_context retrieval and keyring search. 65962306a36Sopenharmony_ci * 66062306a36Sopenharmony_ci * In any case, if an unexpected error occurs, fall back to "forbidden". 66162306a36Sopenharmony_ci */ 66262306a36Sopenharmony_ci 66362306a36Sopenharmony_ci err = fscrypt_get_encryption_info(parent, true); 66462306a36Sopenharmony_ci if (err) 66562306a36Sopenharmony_ci return 0; 66662306a36Sopenharmony_ci err = fscrypt_get_encryption_info(child, true); 66762306a36Sopenharmony_ci if (err) 66862306a36Sopenharmony_ci return 0; 66962306a36Sopenharmony_ci 67062306a36Sopenharmony_ci err1 = fscrypt_get_policy(parent, &parent_policy); 67162306a36Sopenharmony_ci err2 = fscrypt_get_policy(child, &child_policy); 67262306a36Sopenharmony_ci 67362306a36Sopenharmony_ci /* 67462306a36Sopenharmony_ci * Allow the case where the parent and child both have an unrecognized 67562306a36Sopenharmony_ci * encryption policy, so that files with an unrecognized encryption 67662306a36Sopenharmony_ci * policy can be deleted. 67762306a36Sopenharmony_ci */ 67862306a36Sopenharmony_ci if (err1 == -EINVAL && err2 == -EINVAL) 67962306a36Sopenharmony_ci return 1; 68062306a36Sopenharmony_ci 68162306a36Sopenharmony_ci if (err1 || err2) 68262306a36Sopenharmony_ci return 0; 68362306a36Sopenharmony_ci 68462306a36Sopenharmony_ci return fscrypt_policies_equal(&parent_policy, &child_policy); 68562306a36Sopenharmony_ci} 68662306a36Sopenharmony_ciEXPORT_SYMBOL(fscrypt_has_permitted_context); 68762306a36Sopenharmony_ci 68862306a36Sopenharmony_ci/* 68962306a36Sopenharmony_ci * Return the encryption policy that new files in the directory will inherit, or 69062306a36Sopenharmony_ci * NULL if none, or an ERR_PTR() on error. If the directory is encrypted, also 69162306a36Sopenharmony_ci * ensure that its key is set up, so that the new filename can be encrypted. 69262306a36Sopenharmony_ci */ 69362306a36Sopenharmony_ciconst union fscrypt_policy *fscrypt_policy_to_inherit(struct inode *dir) 69462306a36Sopenharmony_ci{ 69562306a36Sopenharmony_ci int err; 69662306a36Sopenharmony_ci 69762306a36Sopenharmony_ci if (IS_ENCRYPTED(dir)) { 69862306a36Sopenharmony_ci err = fscrypt_require_key(dir); 69962306a36Sopenharmony_ci if (err) 70062306a36Sopenharmony_ci return ERR_PTR(err); 70162306a36Sopenharmony_ci return &dir->i_crypt_info->ci_policy; 70262306a36Sopenharmony_ci } 70362306a36Sopenharmony_ci 70462306a36Sopenharmony_ci return fscrypt_get_dummy_policy(dir->i_sb); 70562306a36Sopenharmony_ci} 70662306a36Sopenharmony_ci 70762306a36Sopenharmony_ci/** 70862306a36Sopenharmony_ci * fscrypt_context_for_new_inode() - create an encryption context for a new inode 70962306a36Sopenharmony_ci * @ctx: where context should be written 71062306a36Sopenharmony_ci * @inode: inode from which to fetch policy and nonce 71162306a36Sopenharmony_ci * 71262306a36Sopenharmony_ci * Given an in-core "prepared" (via fscrypt_prepare_new_inode) inode, 71362306a36Sopenharmony_ci * generate a new context and write it to ctx. ctx _must_ be at least 71462306a36Sopenharmony_ci * FSCRYPT_SET_CONTEXT_MAX_SIZE bytes. 71562306a36Sopenharmony_ci * 71662306a36Sopenharmony_ci * Return: size of the resulting context or a negative error code. 71762306a36Sopenharmony_ci */ 71862306a36Sopenharmony_ciint fscrypt_context_for_new_inode(void *ctx, struct inode *inode) 71962306a36Sopenharmony_ci{ 72062306a36Sopenharmony_ci struct fscrypt_info *ci = inode->i_crypt_info; 72162306a36Sopenharmony_ci 72262306a36Sopenharmony_ci BUILD_BUG_ON(sizeof(union fscrypt_context) != 72362306a36Sopenharmony_ci FSCRYPT_SET_CONTEXT_MAX_SIZE); 72462306a36Sopenharmony_ci 72562306a36Sopenharmony_ci /* fscrypt_prepare_new_inode() should have set up the key already. */ 72662306a36Sopenharmony_ci if (WARN_ON_ONCE(!ci)) 72762306a36Sopenharmony_ci return -ENOKEY; 72862306a36Sopenharmony_ci 72962306a36Sopenharmony_ci return fscrypt_new_context(ctx, &ci->ci_policy, ci->ci_nonce); 73062306a36Sopenharmony_ci} 73162306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(fscrypt_context_for_new_inode); 73262306a36Sopenharmony_ci 73362306a36Sopenharmony_ci/** 73462306a36Sopenharmony_ci * fscrypt_set_context() - Set the fscrypt context of a new inode 73562306a36Sopenharmony_ci * @inode: a new inode 73662306a36Sopenharmony_ci * @fs_data: private data given by FS and passed to ->set_context() 73762306a36Sopenharmony_ci * 73862306a36Sopenharmony_ci * This should be called after fscrypt_prepare_new_inode(), generally during a 73962306a36Sopenharmony_ci * filesystem transaction. Everything here must be %GFP_NOFS-safe. 74062306a36Sopenharmony_ci * 74162306a36Sopenharmony_ci * Return: 0 on success, -errno on failure 74262306a36Sopenharmony_ci */ 74362306a36Sopenharmony_ciint fscrypt_set_context(struct inode *inode, void *fs_data) 74462306a36Sopenharmony_ci{ 74562306a36Sopenharmony_ci struct fscrypt_info *ci = inode->i_crypt_info; 74662306a36Sopenharmony_ci union fscrypt_context ctx; 74762306a36Sopenharmony_ci int ctxsize; 74862306a36Sopenharmony_ci 74962306a36Sopenharmony_ci ctxsize = fscrypt_context_for_new_inode(&ctx, inode); 75062306a36Sopenharmony_ci if (ctxsize < 0) 75162306a36Sopenharmony_ci return ctxsize; 75262306a36Sopenharmony_ci 75362306a36Sopenharmony_ci /* 75462306a36Sopenharmony_ci * This may be the first time the inode number is available, so do any 75562306a36Sopenharmony_ci * delayed key setup that requires the inode number. 75662306a36Sopenharmony_ci */ 75762306a36Sopenharmony_ci if (ci->ci_policy.version == FSCRYPT_POLICY_V2 && 75862306a36Sopenharmony_ci (ci->ci_policy.v2.flags & FSCRYPT_POLICY_FLAG_IV_INO_LBLK_32)) 75962306a36Sopenharmony_ci fscrypt_hash_inode_number(ci, ci->ci_master_key); 76062306a36Sopenharmony_ci 76162306a36Sopenharmony_ci return inode->i_sb->s_cop->set_context(inode, &ctx, ctxsize, fs_data); 76262306a36Sopenharmony_ci} 76362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(fscrypt_set_context); 76462306a36Sopenharmony_ci 76562306a36Sopenharmony_ci/** 76662306a36Sopenharmony_ci * fscrypt_parse_test_dummy_encryption() - parse the test_dummy_encryption mount option 76762306a36Sopenharmony_ci * @param: the mount option 76862306a36Sopenharmony_ci * @dummy_policy: (input/output) the place to write the dummy policy that will 76962306a36Sopenharmony_ci * result from parsing the option. Zero-initialize this. If a policy is 77062306a36Sopenharmony_ci * already set here (due to test_dummy_encryption being given multiple 77162306a36Sopenharmony_ci * times), then this function will verify that the policies are the same. 77262306a36Sopenharmony_ci * 77362306a36Sopenharmony_ci * Return: 0 on success; -EINVAL if the argument is invalid; -EEXIST if the 77462306a36Sopenharmony_ci * argument conflicts with one already specified; or -ENOMEM. 77562306a36Sopenharmony_ci */ 77662306a36Sopenharmony_ciint fscrypt_parse_test_dummy_encryption(const struct fs_parameter *param, 77762306a36Sopenharmony_ci struct fscrypt_dummy_policy *dummy_policy) 77862306a36Sopenharmony_ci{ 77962306a36Sopenharmony_ci const char *arg = "v2"; 78062306a36Sopenharmony_ci union fscrypt_policy *policy; 78162306a36Sopenharmony_ci int err; 78262306a36Sopenharmony_ci 78362306a36Sopenharmony_ci if (param->type == fs_value_is_string && *param->string) 78462306a36Sopenharmony_ci arg = param->string; 78562306a36Sopenharmony_ci 78662306a36Sopenharmony_ci policy = kzalloc(sizeof(*policy), GFP_KERNEL); 78762306a36Sopenharmony_ci if (!policy) 78862306a36Sopenharmony_ci return -ENOMEM; 78962306a36Sopenharmony_ci 79062306a36Sopenharmony_ci if (!strcmp(arg, "v1")) { 79162306a36Sopenharmony_ci policy->version = FSCRYPT_POLICY_V1; 79262306a36Sopenharmony_ci policy->v1.contents_encryption_mode = FSCRYPT_MODE_AES_256_XTS; 79362306a36Sopenharmony_ci policy->v1.filenames_encryption_mode = FSCRYPT_MODE_AES_256_CTS; 79462306a36Sopenharmony_ci memset(policy->v1.master_key_descriptor, 0x42, 79562306a36Sopenharmony_ci FSCRYPT_KEY_DESCRIPTOR_SIZE); 79662306a36Sopenharmony_ci } else if (!strcmp(arg, "v2")) { 79762306a36Sopenharmony_ci policy->version = FSCRYPT_POLICY_V2; 79862306a36Sopenharmony_ci policy->v2.contents_encryption_mode = FSCRYPT_MODE_AES_256_XTS; 79962306a36Sopenharmony_ci policy->v2.filenames_encryption_mode = FSCRYPT_MODE_AES_256_CTS; 80062306a36Sopenharmony_ci err = fscrypt_get_test_dummy_key_identifier( 80162306a36Sopenharmony_ci policy->v2.master_key_identifier); 80262306a36Sopenharmony_ci if (err) 80362306a36Sopenharmony_ci goto out; 80462306a36Sopenharmony_ci } else { 80562306a36Sopenharmony_ci err = -EINVAL; 80662306a36Sopenharmony_ci goto out; 80762306a36Sopenharmony_ci } 80862306a36Sopenharmony_ci 80962306a36Sopenharmony_ci if (dummy_policy->policy) { 81062306a36Sopenharmony_ci if (fscrypt_policies_equal(policy, dummy_policy->policy)) 81162306a36Sopenharmony_ci err = 0; 81262306a36Sopenharmony_ci else 81362306a36Sopenharmony_ci err = -EEXIST; 81462306a36Sopenharmony_ci goto out; 81562306a36Sopenharmony_ci } 81662306a36Sopenharmony_ci dummy_policy->policy = policy; 81762306a36Sopenharmony_ci policy = NULL; 81862306a36Sopenharmony_ci err = 0; 81962306a36Sopenharmony_ciout: 82062306a36Sopenharmony_ci kfree(policy); 82162306a36Sopenharmony_ci return err; 82262306a36Sopenharmony_ci} 82362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(fscrypt_parse_test_dummy_encryption); 82462306a36Sopenharmony_ci 82562306a36Sopenharmony_ci/** 82662306a36Sopenharmony_ci * fscrypt_dummy_policies_equal() - check whether two dummy policies are equal 82762306a36Sopenharmony_ci * @p1: the first test dummy policy (may be unset) 82862306a36Sopenharmony_ci * @p2: the second test dummy policy (may be unset) 82962306a36Sopenharmony_ci * 83062306a36Sopenharmony_ci * Return: %true if the dummy policies are both set and equal, or both unset. 83162306a36Sopenharmony_ci */ 83262306a36Sopenharmony_cibool fscrypt_dummy_policies_equal(const struct fscrypt_dummy_policy *p1, 83362306a36Sopenharmony_ci const struct fscrypt_dummy_policy *p2) 83462306a36Sopenharmony_ci{ 83562306a36Sopenharmony_ci if (!p1->policy && !p2->policy) 83662306a36Sopenharmony_ci return true; 83762306a36Sopenharmony_ci if (!p1->policy || !p2->policy) 83862306a36Sopenharmony_ci return false; 83962306a36Sopenharmony_ci return fscrypt_policies_equal(p1->policy, p2->policy); 84062306a36Sopenharmony_ci} 84162306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(fscrypt_dummy_policies_equal); 84262306a36Sopenharmony_ci 84362306a36Sopenharmony_ci/** 84462306a36Sopenharmony_ci * fscrypt_show_test_dummy_encryption() - show '-o test_dummy_encryption' 84562306a36Sopenharmony_ci * @seq: the seq_file to print the option to 84662306a36Sopenharmony_ci * @sep: the separator character to use 84762306a36Sopenharmony_ci * @sb: the filesystem whose options are being shown 84862306a36Sopenharmony_ci * 84962306a36Sopenharmony_ci * Show the test_dummy_encryption mount option, if it was specified. 85062306a36Sopenharmony_ci * This is mainly used for /proc/mounts. 85162306a36Sopenharmony_ci */ 85262306a36Sopenharmony_civoid fscrypt_show_test_dummy_encryption(struct seq_file *seq, char sep, 85362306a36Sopenharmony_ci struct super_block *sb) 85462306a36Sopenharmony_ci{ 85562306a36Sopenharmony_ci const union fscrypt_policy *policy = fscrypt_get_dummy_policy(sb); 85662306a36Sopenharmony_ci int vers; 85762306a36Sopenharmony_ci 85862306a36Sopenharmony_ci if (!policy) 85962306a36Sopenharmony_ci return; 86062306a36Sopenharmony_ci 86162306a36Sopenharmony_ci vers = policy->version; 86262306a36Sopenharmony_ci if (vers == FSCRYPT_POLICY_V1) /* Handle numbering quirk */ 86362306a36Sopenharmony_ci vers = 1; 86462306a36Sopenharmony_ci 86562306a36Sopenharmony_ci seq_printf(seq, "%ctest_dummy_encryption=v%d", sep, vers); 86662306a36Sopenharmony_ci} 86762306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(fscrypt_show_test_dummy_encryption); 868