162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * Encryption policy functions for per-file encryption support.
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Copyright (C) 2015, Google, Inc.
662306a36Sopenharmony_ci * Copyright (C) 2015, Motorola Mobility.
762306a36Sopenharmony_ci *
862306a36Sopenharmony_ci * Originally written by Michael Halcrow, 2015.
962306a36Sopenharmony_ci * Modified by Jaegeuk Kim, 2015.
1062306a36Sopenharmony_ci * Modified by Eric Biggers, 2019 for v2 policy support.
1162306a36Sopenharmony_ci */
1262306a36Sopenharmony_ci
1362306a36Sopenharmony_ci#include <linux/fs_context.h>
1462306a36Sopenharmony_ci#include <linux/random.h>
1562306a36Sopenharmony_ci#include <linux/seq_file.h>
1662306a36Sopenharmony_ci#include <linux/string.h>
1762306a36Sopenharmony_ci#include <linux/mount.h>
1862306a36Sopenharmony_ci#include "fscrypt_private.h"
1962306a36Sopenharmony_ci
2062306a36Sopenharmony_ci/**
2162306a36Sopenharmony_ci * fscrypt_policies_equal() - check whether two encryption policies are the same
2262306a36Sopenharmony_ci * @policy1: the first policy
2362306a36Sopenharmony_ci * @policy2: the second policy
2462306a36Sopenharmony_ci *
2562306a36Sopenharmony_ci * Return: %true if equal, else %false
2662306a36Sopenharmony_ci */
2762306a36Sopenharmony_cibool fscrypt_policies_equal(const union fscrypt_policy *policy1,
2862306a36Sopenharmony_ci			    const union fscrypt_policy *policy2)
2962306a36Sopenharmony_ci{
3062306a36Sopenharmony_ci	if (policy1->version != policy2->version)
3162306a36Sopenharmony_ci		return false;
3262306a36Sopenharmony_ci
3362306a36Sopenharmony_ci	return !memcmp(policy1, policy2, fscrypt_policy_size(policy1));
3462306a36Sopenharmony_ci}
3562306a36Sopenharmony_ci
3662306a36Sopenharmony_ciint fscrypt_policy_to_key_spec(const union fscrypt_policy *policy,
3762306a36Sopenharmony_ci			       struct fscrypt_key_specifier *key_spec)
3862306a36Sopenharmony_ci{
3962306a36Sopenharmony_ci	switch (policy->version) {
4062306a36Sopenharmony_ci	case FSCRYPT_POLICY_V1:
4162306a36Sopenharmony_ci		key_spec->type = FSCRYPT_KEY_SPEC_TYPE_DESCRIPTOR;
4262306a36Sopenharmony_ci		memcpy(key_spec->u.descriptor, policy->v1.master_key_descriptor,
4362306a36Sopenharmony_ci		       FSCRYPT_KEY_DESCRIPTOR_SIZE);
4462306a36Sopenharmony_ci		return 0;
4562306a36Sopenharmony_ci	case FSCRYPT_POLICY_V2:
4662306a36Sopenharmony_ci		key_spec->type = FSCRYPT_KEY_SPEC_TYPE_IDENTIFIER;
4762306a36Sopenharmony_ci		memcpy(key_spec->u.identifier, policy->v2.master_key_identifier,
4862306a36Sopenharmony_ci		       FSCRYPT_KEY_IDENTIFIER_SIZE);
4962306a36Sopenharmony_ci		return 0;
5062306a36Sopenharmony_ci	default:
5162306a36Sopenharmony_ci		WARN_ON_ONCE(1);
5262306a36Sopenharmony_ci		return -EINVAL;
5362306a36Sopenharmony_ci	}
5462306a36Sopenharmony_ci}
5562306a36Sopenharmony_ci
5662306a36Sopenharmony_ciconst union fscrypt_policy *fscrypt_get_dummy_policy(struct super_block *sb)
5762306a36Sopenharmony_ci{
5862306a36Sopenharmony_ci	if (!sb->s_cop->get_dummy_policy)
5962306a36Sopenharmony_ci		return NULL;
6062306a36Sopenharmony_ci	return sb->s_cop->get_dummy_policy(sb);
6162306a36Sopenharmony_ci}
6262306a36Sopenharmony_ci
6362306a36Sopenharmony_ci/*
6462306a36Sopenharmony_ci * Return %true if the given combination of encryption modes is supported for v1
6562306a36Sopenharmony_ci * (and later) encryption policies.
6662306a36Sopenharmony_ci *
6762306a36Sopenharmony_ci * Do *not* add anything new here, since v1 encryption policies are deprecated.
6862306a36Sopenharmony_ci * New combinations of modes should go in fscrypt_valid_enc_modes_v2() only.
6962306a36Sopenharmony_ci */
7062306a36Sopenharmony_cistatic bool fscrypt_valid_enc_modes_v1(u32 contents_mode, u32 filenames_mode)
7162306a36Sopenharmony_ci{
7262306a36Sopenharmony_ci	if (contents_mode == FSCRYPT_MODE_AES_256_XTS &&
7362306a36Sopenharmony_ci	    filenames_mode == FSCRYPT_MODE_AES_256_CTS)
7462306a36Sopenharmony_ci		return true;
7562306a36Sopenharmony_ci
7662306a36Sopenharmony_ci	if (contents_mode == FSCRYPT_MODE_AES_128_CBC &&
7762306a36Sopenharmony_ci	    filenames_mode == FSCRYPT_MODE_AES_128_CTS)
7862306a36Sopenharmony_ci		return true;
7962306a36Sopenharmony_ci
8062306a36Sopenharmony_ci	if (contents_mode == FSCRYPT_MODE_ADIANTUM &&
8162306a36Sopenharmony_ci	    filenames_mode == FSCRYPT_MODE_ADIANTUM)
8262306a36Sopenharmony_ci		return true;
8362306a36Sopenharmony_ci
8462306a36Sopenharmony_ci	return false;
8562306a36Sopenharmony_ci}
8662306a36Sopenharmony_ci
8762306a36Sopenharmony_cistatic bool fscrypt_valid_enc_modes_v2(u32 contents_mode, u32 filenames_mode)
8862306a36Sopenharmony_ci{
8962306a36Sopenharmony_ci	if (contents_mode == FSCRYPT_MODE_AES_256_XTS &&
9062306a36Sopenharmony_ci	    filenames_mode == FSCRYPT_MODE_AES_256_HCTR2)
9162306a36Sopenharmony_ci		return true;
9262306a36Sopenharmony_ci
9362306a36Sopenharmony_ci	if (contents_mode == FSCRYPT_MODE_SM4_XTS &&
9462306a36Sopenharmony_ci	    filenames_mode == FSCRYPT_MODE_SM4_CTS)
9562306a36Sopenharmony_ci		return true;
9662306a36Sopenharmony_ci
9762306a36Sopenharmony_ci	return fscrypt_valid_enc_modes_v1(contents_mode, filenames_mode);
9862306a36Sopenharmony_ci}
9962306a36Sopenharmony_ci
10062306a36Sopenharmony_cistatic bool supported_direct_key_modes(const struct inode *inode,
10162306a36Sopenharmony_ci				       u32 contents_mode, u32 filenames_mode)
10262306a36Sopenharmony_ci{
10362306a36Sopenharmony_ci	const struct fscrypt_mode *mode;
10462306a36Sopenharmony_ci
10562306a36Sopenharmony_ci	if (contents_mode != filenames_mode) {
10662306a36Sopenharmony_ci		fscrypt_warn(inode,
10762306a36Sopenharmony_ci			     "Direct key flag not allowed with different contents and filenames modes");
10862306a36Sopenharmony_ci		return false;
10962306a36Sopenharmony_ci	}
11062306a36Sopenharmony_ci	mode = &fscrypt_modes[contents_mode];
11162306a36Sopenharmony_ci
11262306a36Sopenharmony_ci	if (mode->ivsize < offsetofend(union fscrypt_iv, nonce)) {
11362306a36Sopenharmony_ci		fscrypt_warn(inode, "Direct key flag not allowed with %s",
11462306a36Sopenharmony_ci			     mode->friendly_name);
11562306a36Sopenharmony_ci		return false;
11662306a36Sopenharmony_ci	}
11762306a36Sopenharmony_ci	return true;
11862306a36Sopenharmony_ci}
11962306a36Sopenharmony_ci
12062306a36Sopenharmony_cistatic bool supported_iv_ino_lblk_policy(const struct fscrypt_policy_v2 *policy,
12162306a36Sopenharmony_ci					 const struct inode *inode,
12262306a36Sopenharmony_ci					 const char *type,
12362306a36Sopenharmony_ci					 int max_ino_bits, int max_lblk_bits)
12462306a36Sopenharmony_ci{
12562306a36Sopenharmony_ci	struct super_block *sb = inode->i_sb;
12662306a36Sopenharmony_ci	int ino_bits = 64, lblk_bits = 64;
12762306a36Sopenharmony_ci
12862306a36Sopenharmony_ci	/*
12962306a36Sopenharmony_ci	 * IV_INO_LBLK_* exist only because of hardware limitations, and
13062306a36Sopenharmony_ci	 * currently the only known use case for them involves AES-256-XTS.
13162306a36Sopenharmony_ci	 * That's also all we test currently.  For these reasons, for now only
13262306a36Sopenharmony_ci	 * allow AES-256-XTS here.  This can be relaxed later if a use case for
13362306a36Sopenharmony_ci	 * IV_INO_LBLK_* with other encryption modes arises.
13462306a36Sopenharmony_ci	 */
13562306a36Sopenharmony_ci	if (policy->contents_encryption_mode != FSCRYPT_MODE_AES_256_XTS) {
13662306a36Sopenharmony_ci		fscrypt_warn(inode,
13762306a36Sopenharmony_ci			     "Can't use %s policy with contents mode other than AES-256-XTS",
13862306a36Sopenharmony_ci			     type);
13962306a36Sopenharmony_ci		return false;
14062306a36Sopenharmony_ci	}
14162306a36Sopenharmony_ci
14262306a36Sopenharmony_ci	/*
14362306a36Sopenharmony_ci	 * It's unsafe to include inode numbers in the IVs if the filesystem can
14462306a36Sopenharmony_ci	 * potentially renumber inodes, e.g. via filesystem shrinking.
14562306a36Sopenharmony_ci	 */
14662306a36Sopenharmony_ci	if (!sb->s_cop->has_stable_inodes ||
14762306a36Sopenharmony_ci	    !sb->s_cop->has_stable_inodes(sb)) {
14862306a36Sopenharmony_ci		fscrypt_warn(inode,
14962306a36Sopenharmony_ci			     "Can't use %s policy on filesystem '%s' because it doesn't have stable inode numbers",
15062306a36Sopenharmony_ci			     type, sb->s_id);
15162306a36Sopenharmony_ci		return false;
15262306a36Sopenharmony_ci	}
15362306a36Sopenharmony_ci	if (sb->s_cop->get_ino_and_lblk_bits)
15462306a36Sopenharmony_ci		sb->s_cop->get_ino_and_lblk_bits(sb, &ino_bits, &lblk_bits);
15562306a36Sopenharmony_ci	if (ino_bits > max_ino_bits) {
15662306a36Sopenharmony_ci		fscrypt_warn(inode,
15762306a36Sopenharmony_ci			     "Can't use %s policy on filesystem '%s' because its inode numbers are too long",
15862306a36Sopenharmony_ci			     type, sb->s_id);
15962306a36Sopenharmony_ci		return false;
16062306a36Sopenharmony_ci	}
16162306a36Sopenharmony_ci	if (lblk_bits > max_lblk_bits) {
16262306a36Sopenharmony_ci		fscrypt_warn(inode,
16362306a36Sopenharmony_ci			     "Can't use %s policy on filesystem '%s' because its block numbers are too long",
16462306a36Sopenharmony_ci			     type, sb->s_id);
16562306a36Sopenharmony_ci		return false;
16662306a36Sopenharmony_ci	}
16762306a36Sopenharmony_ci	return true;
16862306a36Sopenharmony_ci}
16962306a36Sopenharmony_ci
17062306a36Sopenharmony_cistatic bool fscrypt_supported_v1_policy(const struct fscrypt_policy_v1 *policy,
17162306a36Sopenharmony_ci					const struct inode *inode)
17262306a36Sopenharmony_ci{
17362306a36Sopenharmony_ci	if (!fscrypt_valid_enc_modes_v1(policy->contents_encryption_mode,
17462306a36Sopenharmony_ci				     policy->filenames_encryption_mode)) {
17562306a36Sopenharmony_ci		fscrypt_warn(inode,
17662306a36Sopenharmony_ci			     "Unsupported encryption modes (contents %d, filenames %d)",
17762306a36Sopenharmony_ci			     policy->contents_encryption_mode,
17862306a36Sopenharmony_ci			     policy->filenames_encryption_mode);
17962306a36Sopenharmony_ci		return false;
18062306a36Sopenharmony_ci	}
18162306a36Sopenharmony_ci
18262306a36Sopenharmony_ci	if (policy->flags & ~(FSCRYPT_POLICY_FLAGS_PAD_MASK |
18362306a36Sopenharmony_ci			      FSCRYPT_POLICY_FLAG_DIRECT_KEY)) {
18462306a36Sopenharmony_ci		fscrypt_warn(inode, "Unsupported encryption flags (0x%02x)",
18562306a36Sopenharmony_ci			     policy->flags);
18662306a36Sopenharmony_ci		return false;
18762306a36Sopenharmony_ci	}
18862306a36Sopenharmony_ci
18962306a36Sopenharmony_ci	if ((policy->flags & FSCRYPT_POLICY_FLAG_DIRECT_KEY) &&
19062306a36Sopenharmony_ci	    !supported_direct_key_modes(inode, policy->contents_encryption_mode,
19162306a36Sopenharmony_ci					policy->filenames_encryption_mode))
19262306a36Sopenharmony_ci		return false;
19362306a36Sopenharmony_ci
19462306a36Sopenharmony_ci	if (IS_CASEFOLDED(inode)) {
19562306a36Sopenharmony_ci		/* With v1, there's no way to derive dirhash keys. */
19662306a36Sopenharmony_ci		fscrypt_warn(inode,
19762306a36Sopenharmony_ci			     "v1 policies can't be used on casefolded directories");
19862306a36Sopenharmony_ci		return false;
19962306a36Sopenharmony_ci	}
20062306a36Sopenharmony_ci
20162306a36Sopenharmony_ci	return true;
20262306a36Sopenharmony_ci}
20362306a36Sopenharmony_ci
20462306a36Sopenharmony_cistatic bool fscrypt_supported_v2_policy(const struct fscrypt_policy_v2 *policy,
20562306a36Sopenharmony_ci					const struct inode *inode)
20662306a36Sopenharmony_ci{
20762306a36Sopenharmony_ci	int count = 0;
20862306a36Sopenharmony_ci
20962306a36Sopenharmony_ci	if (!fscrypt_valid_enc_modes_v2(policy->contents_encryption_mode,
21062306a36Sopenharmony_ci				     policy->filenames_encryption_mode)) {
21162306a36Sopenharmony_ci		fscrypt_warn(inode,
21262306a36Sopenharmony_ci			     "Unsupported encryption modes (contents %d, filenames %d)",
21362306a36Sopenharmony_ci			     policy->contents_encryption_mode,
21462306a36Sopenharmony_ci			     policy->filenames_encryption_mode);
21562306a36Sopenharmony_ci		return false;
21662306a36Sopenharmony_ci	}
21762306a36Sopenharmony_ci
21862306a36Sopenharmony_ci	if (policy->flags & ~(FSCRYPT_POLICY_FLAGS_PAD_MASK |
21962306a36Sopenharmony_ci			      FSCRYPT_POLICY_FLAG_DIRECT_KEY |
22062306a36Sopenharmony_ci			      FSCRYPT_POLICY_FLAG_IV_INO_LBLK_64 |
22162306a36Sopenharmony_ci			      FSCRYPT_POLICY_FLAG_IV_INO_LBLK_32)) {
22262306a36Sopenharmony_ci		fscrypt_warn(inode, "Unsupported encryption flags (0x%02x)",
22362306a36Sopenharmony_ci			     policy->flags);
22462306a36Sopenharmony_ci		return false;
22562306a36Sopenharmony_ci	}
22662306a36Sopenharmony_ci
22762306a36Sopenharmony_ci	count += !!(policy->flags & FSCRYPT_POLICY_FLAG_DIRECT_KEY);
22862306a36Sopenharmony_ci	count += !!(policy->flags & FSCRYPT_POLICY_FLAG_IV_INO_LBLK_64);
22962306a36Sopenharmony_ci	count += !!(policy->flags & FSCRYPT_POLICY_FLAG_IV_INO_LBLK_32);
23062306a36Sopenharmony_ci	if (count > 1) {
23162306a36Sopenharmony_ci		fscrypt_warn(inode, "Mutually exclusive encryption flags (0x%02x)",
23262306a36Sopenharmony_ci			     policy->flags);
23362306a36Sopenharmony_ci		return false;
23462306a36Sopenharmony_ci	}
23562306a36Sopenharmony_ci
23662306a36Sopenharmony_ci	if ((policy->flags & FSCRYPT_POLICY_FLAG_DIRECT_KEY) &&
23762306a36Sopenharmony_ci	    !supported_direct_key_modes(inode, policy->contents_encryption_mode,
23862306a36Sopenharmony_ci					policy->filenames_encryption_mode))
23962306a36Sopenharmony_ci		return false;
24062306a36Sopenharmony_ci
24162306a36Sopenharmony_ci	if ((policy->flags & FSCRYPT_POLICY_FLAG_IV_INO_LBLK_64) &&
24262306a36Sopenharmony_ci	    !supported_iv_ino_lblk_policy(policy, inode, "IV_INO_LBLK_64",
24362306a36Sopenharmony_ci					  32, 32))
24462306a36Sopenharmony_ci		return false;
24562306a36Sopenharmony_ci
24662306a36Sopenharmony_ci	/*
24762306a36Sopenharmony_ci	 * IV_INO_LBLK_32 hashes the inode number, so in principle it can
24862306a36Sopenharmony_ci	 * support any ino_bits.  However, currently the inode number is gotten
24962306a36Sopenharmony_ci	 * from inode::i_ino which is 'unsigned long'.  So for now the
25062306a36Sopenharmony_ci	 * implementation limit is 32 bits.
25162306a36Sopenharmony_ci	 */
25262306a36Sopenharmony_ci	if ((policy->flags & FSCRYPT_POLICY_FLAG_IV_INO_LBLK_32) &&
25362306a36Sopenharmony_ci	    !supported_iv_ino_lblk_policy(policy, inode, "IV_INO_LBLK_32",
25462306a36Sopenharmony_ci					  32, 32))
25562306a36Sopenharmony_ci		return false;
25662306a36Sopenharmony_ci
25762306a36Sopenharmony_ci	if (memchr_inv(policy->__reserved, 0, sizeof(policy->__reserved))) {
25862306a36Sopenharmony_ci		fscrypt_warn(inode, "Reserved bits set in encryption policy");
25962306a36Sopenharmony_ci		return false;
26062306a36Sopenharmony_ci	}
26162306a36Sopenharmony_ci
26262306a36Sopenharmony_ci	return true;
26362306a36Sopenharmony_ci}
26462306a36Sopenharmony_ci
26562306a36Sopenharmony_ci/**
26662306a36Sopenharmony_ci * fscrypt_supported_policy() - check whether an encryption policy is supported
26762306a36Sopenharmony_ci * @policy_u: the encryption policy
26862306a36Sopenharmony_ci * @inode: the inode on which the policy will be used
26962306a36Sopenharmony_ci *
27062306a36Sopenharmony_ci * Given an encryption policy, check whether all its encryption modes and other
27162306a36Sopenharmony_ci * settings are supported by this kernel on the given inode.  (But we don't
27262306a36Sopenharmony_ci * currently don't check for crypto API support here, so attempting to use an
27362306a36Sopenharmony_ci * algorithm not configured into the crypto API will still fail later.)
27462306a36Sopenharmony_ci *
27562306a36Sopenharmony_ci * Return: %true if supported, else %false
27662306a36Sopenharmony_ci */
27762306a36Sopenharmony_cibool fscrypt_supported_policy(const union fscrypt_policy *policy_u,
27862306a36Sopenharmony_ci			      const struct inode *inode)
27962306a36Sopenharmony_ci{
28062306a36Sopenharmony_ci	switch (policy_u->version) {
28162306a36Sopenharmony_ci	case FSCRYPT_POLICY_V1:
28262306a36Sopenharmony_ci		return fscrypt_supported_v1_policy(&policy_u->v1, inode);
28362306a36Sopenharmony_ci	case FSCRYPT_POLICY_V2:
28462306a36Sopenharmony_ci		return fscrypt_supported_v2_policy(&policy_u->v2, inode);
28562306a36Sopenharmony_ci	}
28662306a36Sopenharmony_ci	return false;
28762306a36Sopenharmony_ci}
28862306a36Sopenharmony_ci
28962306a36Sopenharmony_ci/**
29062306a36Sopenharmony_ci * fscrypt_new_context() - create a new fscrypt_context
29162306a36Sopenharmony_ci * @ctx_u: output context
29262306a36Sopenharmony_ci * @policy_u: input policy
29362306a36Sopenharmony_ci * @nonce: nonce to use
29462306a36Sopenharmony_ci *
29562306a36Sopenharmony_ci * Create an fscrypt_context for an inode that is being assigned the given
29662306a36Sopenharmony_ci * encryption policy.  @nonce must be a new random nonce.
29762306a36Sopenharmony_ci *
29862306a36Sopenharmony_ci * Return: the size of the new context in bytes.
29962306a36Sopenharmony_ci */
30062306a36Sopenharmony_cistatic int fscrypt_new_context(union fscrypt_context *ctx_u,
30162306a36Sopenharmony_ci			       const union fscrypt_policy *policy_u,
30262306a36Sopenharmony_ci			       const u8 nonce[FSCRYPT_FILE_NONCE_SIZE])
30362306a36Sopenharmony_ci{
30462306a36Sopenharmony_ci	memset(ctx_u, 0, sizeof(*ctx_u));
30562306a36Sopenharmony_ci
30662306a36Sopenharmony_ci	switch (policy_u->version) {
30762306a36Sopenharmony_ci	case FSCRYPT_POLICY_V1: {
30862306a36Sopenharmony_ci		const struct fscrypt_policy_v1 *policy = &policy_u->v1;
30962306a36Sopenharmony_ci		struct fscrypt_context_v1 *ctx = &ctx_u->v1;
31062306a36Sopenharmony_ci
31162306a36Sopenharmony_ci		ctx->version = FSCRYPT_CONTEXT_V1;
31262306a36Sopenharmony_ci		ctx->contents_encryption_mode =
31362306a36Sopenharmony_ci			policy->contents_encryption_mode;
31462306a36Sopenharmony_ci		ctx->filenames_encryption_mode =
31562306a36Sopenharmony_ci			policy->filenames_encryption_mode;
31662306a36Sopenharmony_ci		ctx->flags = policy->flags;
31762306a36Sopenharmony_ci		memcpy(ctx->master_key_descriptor,
31862306a36Sopenharmony_ci		       policy->master_key_descriptor,
31962306a36Sopenharmony_ci		       sizeof(ctx->master_key_descriptor));
32062306a36Sopenharmony_ci		memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE);
32162306a36Sopenharmony_ci		return sizeof(*ctx);
32262306a36Sopenharmony_ci	}
32362306a36Sopenharmony_ci	case FSCRYPT_POLICY_V2: {
32462306a36Sopenharmony_ci		const struct fscrypt_policy_v2 *policy = &policy_u->v2;
32562306a36Sopenharmony_ci		struct fscrypt_context_v2 *ctx = &ctx_u->v2;
32662306a36Sopenharmony_ci
32762306a36Sopenharmony_ci		ctx->version = FSCRYPT_CONTEXT_V2;
32862306a36Sopenharmony_ci		ctx->contents_encryption_mode =
32962306a36Sopenharmony_ci			policy->contents_encryption_mode;
33062306a36Sopenharmony_ci		ctx->filenames_encryption_mode =
33162306a36Sopenharmony_ci			policy->filenames_encryption_mode;
33262306a36Sopenharmony_ci		ctx->flags = policy->flags;
33362306a36Sopenharmony_ci		memcpy(ctx->master_key_identifier,
33462306a36Sopenharmony_ci		       policy->master_key_identifier,
33562306a36Sopenharmony_ci		       sizeof(ctx->master_key_identifier));
33662306a36Sopenharmony_ci		memcpy(ctx->nonce, nonce, FSCRYPT_FILE_NONCE_SIZE);
33762306a36Sopenharmony_ci		return sizeof(*ctx);
33862306a36Sopenharmony_ci	}
33962306a36Sopenharmony_ci	}
34062306a36Sopenharmony_ci	BUG();
34162306a36Sopenharmony_ci}
34262306a36Sopenharmony_ci
34362306a36Sopenharmony_ci/**
34462306a36Sopenharmony_ci * fscrypt_policy_from_context() - convert an fscrypt_context to
34562306a36Sopenharmony_ci *				   an fscrypt_policy
34662306a36Sopenharmony_ci * @policy_u: output policy
34762306a36Sopenharmony_ci * @ctx_u: input context
34862306a36Sopenharmony_ci * @ctx_size: size of input context in bytes
34962306a36Sopenharmony_ci *
35062306a36Sopenharmony_ci * Given an fscrypt_context, build the corresponding fscrypt_policy.
35162306a36Sopenharmony_ci *
35262306a36Sopenharmony_ci * Return: 0 on success, or -EINVAL if the fscrypt_context has an unrecognized
35362306a36Sopenharmony_ci * version number or size.
35462306a36Sopenharmony_ci *
35562306a36Sopenharmony_ci * This does *not* validate the settings within the policy itself, e.g. the
35662306a36Sopenharmony_ci * modes, flags, and reserved bits.  Use fscrypt_supported_policy() for that.
35762306a36Sopenharmony_ci */
35862306a36Sopenharmony_ciint fscrypt_policy_from_context(union fscrypt_policy *policy_u,
35962306a36Sopenharmony_ci				const union fscrypt_context *ctx_u,
36062306a36Sopenharmony_ci				int ctx_size)
36162306a36Sopenharmony_ci{
36262306a36Sopenharmony_ci	memset(policy_u, 0, sizeof(*policy_u));
36362306a36Sopenharmony_ci
36462306a36Sopenharmony_ci	if (!fscrypt_context_is_valid(ctx_u, ctx_size))
36562306a36Sopenharmony_ci		return -EINVAL;
36662306a36Sopenharmony_ci
36762306a36Sopenharmony_ci	switch (ctx_u->version) {
36862306a36Sopenharmony_ci	case FSCRYPT_CONTEXT_V1: {
36962306a36Sopenharmony_ci		const struct fscrypt_context_v1 *ctx = &ctx_u->v1;
37062306a36Sopenharmony_ci		struct fscrypt_policy_v1 *policy = &policy_u->v1;
37162306a36Sopenharmony_ci
37262306a36Sopenharmony_ci		policy->version = FSCRYPT_POLICY_V1;
37362306a36Sopenharmony_ci		policy->contents_encryption_mode =
37462306a36Sopenharmony_ci			ctx->contents_encryption_mode;
37562306a36Sopenharmony_ci		policy->filenames_encryption_mode =
37662306a36Sopenharmony_ci			ctx->filenames_encryption_mode;
37762306a36Sopenharmony_ci		policy->flags = ctx->flags;
37862306a36Sopenharmony_ci		memcpy(policy->master_key_descriptor,
37962306a36Sopenharmony_ci		       ctx->master_key_descriptor,
38062306a36Sopenharmony_ci		       sizeof(policy->master_key_descriptor));
38162306a36Sopenharmony_ci		return 0;
38262306a36Sopenharmony_ci	}
38362306a36Sopenharmony_ci	case FSCRYPT_CONTEXT_V2: {
38462306a36Sopenharmony_ci		const struct fscrypt_context_v2 *ctx = &ctx_u->v2;
38562306a36Sopenharmony_ci		struct fscrypt_policy_v2 *policy = &policy_u->v2;
38662306a36Sopenharmony_ci
38762306a36Sopenharmony_ci		policy->version = FSCRYPT_POLICY_V2;
38862306a36Sopenharmony_ci		policy->contents_encryption_mode =
38962306a36Sopenharmony_ci			ctx->contents_encryption_mode;
39062306a36Sopenharmony_ci		policy->filenames_encryption_mode =
39162306a36Sopenharmony_ci			ctx->filenames_encryption_mode;
39262306a36Sopenharmony_ci		policy->flags = ctx->flags;
39362306a36Sopenharmony_ci		memcpy(policy->__reserved, ctx->__reserved,
39462306a36Sopenharmony_ci		       sizeof(policy->__reserved));
39562306a36Sopenharmony_ci		memcpy(policy->master_key_identifier,
39662306a36Sopenharmony_ci		       ctx->master_key_identifier,
39762306a36Sopenharmony_ci		       sizeof(policy->master_key_identifier));
39862306a36Sopenharmony_ci		return 0;
39962306a36Sopenharmony_ci	}
40062306a36Sopenharmony_ci	}
40162306a36Sopenharmony_ci	/* unreachable */
40262306a36Sopenharmony_ci	return -EINVAL;
40362306a36Sopenharmony_ci}
40462306a36Sopenharmony_ci
40562306a36Sopenharmony_ci/* Retrieve an inode's encryption policy */
40662306a36Sopenharmony_cistatic int fscrypt_get_policy(struct inode *inode, union fscrypt_policy *policy)
40762306a36Sopenharmony_ci{
40862306a36Sopenharmony_ci	const struct fscrypt_info *ci;
40962306a36Sopenharmony_ci	union fscrypt_context ctx;
41062306a36Sopenharmony_ci	int ret;
41162306a36Sopenharmony_ci
41262306a36Sopenharmony_ci	ci = fscrypt_get_info(inode);
41362306a36Sopenharmony_ci	if (ci) {
41462306a36Sopenharmony_ci		/* key available, use the cached policy */
41562306a36Sopenharmony_ci		*policy = ci->ci_policy;
41662306a36Sopenharmony_ci		return 0;
41762306a36Sopenharmony_ci	}
41862306a36Sopenharmony_ci
41962306a36Sopenharmony_ci	if (!IS_ENCRYPTED(inode))
42062306a36Sopenharmony_ci		return -ENODATA;
42162306a36Sopenharmony_ci
42262306a36Sopenharmony_ci	ret = inode->i_sb->s_cop->get_context(inode, &ctx, sizeof(ctx));
42362306a36Sopenharmony_ci	if (ret < 0)
42462306a36Sopenharmony_ci		return (ret == -ERANGE) ? -EINVAL : ret;
42562306a36Sopenharmony_ci
42662306a36Sopenharmony_ci	return fscrypt_policy_from_context(policy, &ctx, ret);
42762306a36Sopenharmony_ci}
42862306a36Sopenharmony_ci
42962306a36Sopenharmony_cistatic int set_encryption_policy(struct inode *inode,
43062306a36Sopenharmony_ci				 const union fscrypt_policy *policy)
43162306a36Sopenharmony_ci{
43262306a36Sopenharmony_ci	u8 nonce[FSCRYPT_FILE_NONCE_SIZE];
43362306a36Sopenharmony_ci	union fscrypt_context ctx;
43462306a36Sopenharmony_ci	int ctxsize;
43562306a36Sopenharmony_ci	int err;
43662306a36Sopenharmony_ci
43762306a36Sopenharmony_ci	if (!fscrypt_supported_policy(policy, inode))
43862306a36Sopenharmony_ci		return -EINVAL;
43962306a36Sopenharmony_ci
44062306a36Sopenharmony_ci	switch (policy->version) {
44162306a36Sopenharmony_ci	case FSCRYPT_POLICY_V1:
44262306a36Sopenharmony_ci		/*
44362306a36Sopenharmony_ci		 * The original encryption policy version provided no way of
44462306a36Sopenharmony_ci		 * verifying that the correct master key was supplied, which was
44562306a36Sopenharmony_ci		 * insecure in scenarios where multiple users have access to the
44662306a36Sopenharmony_ci		 * same encrypted files (even just read-only access).  The new
44762306a36Sopenharmony_ci		 * encryption policy version fixes this and also implies use of
44862306a36Sopenharmony_ci		 * an improved key derivation function and allows non-root users
44962306a36Sopenharmony_ci		 * to securely remove keys.  So as long as compatibility with
45062306a36Sopenharmony_ci		 * old kernels isn't required, it is recommended to use the new
45162306a36Sopenharmony_ci		 * policy version for all new encrypted directories.
45262306a36Sopenharmony_ci		 */
45362306a36Sopenharmony_ci		pr_warn_once("%s (pid %d) is setting deprecated v1 encryption policy; recommend upgrading to v2.\n",
45462306a36Sopenharmony_ci			     current->comm, current->pid);
45562306a36Sopenharmony_ci		break;
45662306a36Sopenharmony_ci	case FSCRYPT_POLICY_V2:
45762306a36Sopenharmony_ci		err = fscrypt_verify_key_added(inode->i_sb,
45862306a36Sopenharmony_ci					       policy->v2.master_key_identifier);
45962306a36Sopenharmony_ci		if (err)
46062306a36Sopenharmony_ci			return err;
46162306a36Sopenharmony_ci		if (policy->v2.flags & FSCRYPT_POLICY_FLAG_IV_INO_LBLK_32)
46262306a36Sopenharmony_ci			pr_warn_once("%s (pid %d) is setting an IV_INO_LBLK_32 encryption policy.  This should only be used if there are certain hardware limitations.\n",
46362306a36Sopenharmony_ci				     current->comm, current->pid);
46462306a36Sopenharmony_ci		break;
46562306a36Sopenharmony_ci	default:
46662306a36Sopenharmony_ci		WARN_ON_ONCE(1);
46762306a36Sopenharmony_ci		return -EINVAL;
46862306a36Sopenharmony_ci	}
46962306a36Sopenharmony_ci
47062306a36Sopenharmony_ci	get_random_bytes(nonce, FSCRYPT_FILE_NONCE_SIZE);
47162306a36Sopenharmony_ci	ctxsize = fscrypt_new_context(&ctx, policy, nonce);
47262306a36Sopenharmony_ci
47362306a36Sopenharmony_ci	return inode->i_sb->s_cop->set_context(inode, &ctx, ctxsize, NULL);
47462306a36Sopenharmony_ci}
47562306a36Sopenharmony_ci
47662306a36Sopenharmony_ciint fscrypt_ioctl_set_policy(struct file *filp, const void __user *arg)
47762306a36Sopenharmony_ci{
47862306a36Sopenharmony_ci	union fscrypt_policy policy;
47962306a36Sopenharmony_ci	union fscrypt_policy existing_policy;
48062306a36Sopenharmony_ci	struct inode *inode = file_inode(filp);
48162306a36Sopenharmony_ci	u8 version;
48262306a36Sopenharmony_ci	int size;
48362306a36Sopenharmony_ci	int ret;
48462306a36Sopenharmony_ci
48562306a36Sopenharmony_ci	if (get_user(policy.version, (const u8 __user *)arg))
48662306a36Sopenharmony_ci		return -EFAULT;
48762306a36Sopenharmony_ci
48862306a36Sopenharmony_ci	size = fscrypt_policy_size(&policy);
48962306a36Sopenharmony_ci	if (size <= 0)
49062306a36Sopenharmony_ci		return -EINVAL;
49162306a36Sopenharmony_ci
49262306a36Sopenharmony_ci	/*
49362306a36Sopenharmony_ci	 * We should just copy the remaining 'size - 1' bytes here, but a
49462306a36Sopenharmony_ci	 * bizarre bug in gcc 7 and earlier (fixed by gcc r255731) causes gcc to
49562306a36Sopenharmony_ci	 * think that size can be 0 here (despite the check above!) *and* that
49662306a36Sopenharmony_ci	 * it's a compile-time constant.  Thus it would think copy_from_user()
49762306a36Sopenharmony_ci	 * is passed compile-time constant ULONG_MAX, causing the compile-time
49862306a36Sopenharmony_ci	 * buffer overflow check to fail, breaking the build. This only occurred
49962306a36Sopenharmony_ci	 * when building an i386 kernel with -Os and branch profiling enabled.
50062306a36Sopenharmony_ci	 *
50162306a36Sopenharmony_ci	 * Work around it by just copying the first byte again...
50262306a36Sopenharmony_ci	 */
50362306a36Sopenharmony_ci	version = policy.version;
50462306a36Sopenharmony_ci	if (copy_from_user(&policy, arg, size))
50562306a36Sopenharmony_ci		return -EFAULT;
50662306a36Sopenharmony_ci	policy.version = version;
50762306a36Sopenharmony_ci
50862306a36Sopenharmony_ci	if (!inode_owner_or_capable(&nop_mnt_idmap, inode))
50962306a36Sopenharmony_ci		return -EACCES;
51062306a36Sopenharmony_ci
51162306a36Sopenharmony_ci	ret = mnt_want_write_file(filp);
51262306a36Sopenharmony_ci	if (ret)
51362306a36Sopenharmony_ci		return ret;
51462306a36Sopenharmony_ci
51562306a36Sopenharmony_ci	inode_lock(inode);
51662306a36Sopenharmony_ci
51762306a36Sopenharmony_ci	ret = fscrypt_get_policy(inode, &existing_policy);
51862306a36Sopenharmony_ci	if (ret == -ENODATA) {
51962306a36Sopenharmony_ci		if (!S_ISDIR(inode->i_mode))
52062306a36Sopenharmony_ci			ret = -ENOTDIR;
52162306a36Sopenharmony_ci		else if (IS_DEADDIR(inode))
52262306a36Sopenharmony_ci			ret = -ENOENT;
52362306a36Sopenharmony_ci		else if (!inode->i_sb->s_cop->empty_dir(inode))
52462306a36Sopenharmony_ci			ret = -ENOTEMPTY;
52562306a36Sopenharmony_ci		else
52662306a36Sopenharmony_ci			ret = set_encryption_policy(inode, &policy);
52762306a36Sopenharmony_ci	} else if (ret == -EINVAL ||
52862306a36Sopenharmony_ci		   (ret == 0 && !fscrypt_policies_equal(&policy,
52962306a36Sopenharmony_ci							&existing_policy))) {
53062306a36Sopenharmony_ci		/* The file already uses a different encryption policy. */
53162306a36Sopenharmony_ci		ret = -EEXIST;
53262306a36Sopenharmony_ci	}
53362306a36Sopenharmony_ci
53462306a36Sopenharmony_ci	inode_unlock(inode);
53562306a36Sopenharmony_ci
53662306a36Sopenharmony_ci	mnt_drop_write_file(filp);
53762306a36Sopenharmony_ci	return ret;
53862306a36Sopenharmony_ci}
53962306a36Sopenharmony_ciEXPORT_SYMBOL(fscrypt_ioctl_set_policy);
54062306a36Sopenharmony_ci
54162306a36Sopenharmony_ci/* Original ioctl version; can only get the original policy version */
54262306a36Sopenharmony_ciint fscrypt_ioctl_get_policy(struct file *filp, void __user *arg)
54362306a36Sopenharmony_ci{
54462306a36Sopenharmony_ci	union fscrypt_policy policy;
54562306a36Sopenharmony_ci	int err;
54662306a36Sopenharmony_ci
54762306a36Sopenharmony_ci	err = fscrypt_get_policy(file_inode(filp), &policy);
54862306a36Sopenharmony_ci	if (err)
54962306a36Sopenharmony_ci		return err;
55062306a36Sopenharmony_ci
55162306a36Sopenharmony_ci	if (policy.version != FSCRYPT_POLICY_V1)
55262306a36Sopenharmony_ci		return -EINVAL;
55362306a36Sopenharmony_ci
55462306a36Sopenharmony_ci	if (copy_to_user(arg, &policy, sizeof(policy.v1)))
55562306a36Sopenharmony_ci		return -EFAULT;
55662306a36Sopenharmony_ci	return 0;
55762306a36Sopenharmony_ci}
55862306a36Sopenharmony_ciEXPORT_SYMBOL(fscrypt_ioctl_get_policy);
55962306a36Sopenharmony_ci
56062306a36Sopenharmony_ci/* Extended ioctl version; can get policies of any version */
56162306a36Sopenharmony_ciint fscrypt_ioctl_get_policy_ex(struct file *filp, void __user *uarg)
56262306a36Sopenharmony_ci{
56362306a36Sopenharmony_ci	struct fscrypt_get_policy_ex_arg arg;
56462306a36Sopenharmony_ci	union fscrypt_policy *policy = (union fscrypt_policy *)&arg.policy;
56562306a36Sopenharmony_ci	size_t policy_size;
56662306a36Sopenharmony_ci	int err;
56762306a36Sopenharmony_ci
56862306a36Sopenharmony_ci	/* arg is policy_size, then policy */
56962306a36Sopenharmony_ci	BUILD_BUG_ON(offsetof(typeof(arg), policy_size) != 0);
57062306a36Sopenharmony_ci	BUILD_BUG_ON(offsetofend(typeof(arg), policy_size) !=
57162306a36Sopenharmony_ci		     offsetof(typeof(arg), policy));
57262306a36Sopenharmony_ci	BUILD_BUG_ON(sizeof(arg.policy) != sizeof(*policy));
57362306a36Sopenharmony_ci
57462306a36Sopenharmony_ci	err = fscrypt_get_policy(file_inode(filp), policy);
57562306a36Sopenharmony_ci	if (err)
57662306a36Sopenharmony_ci		return err;
57762306a36Sopenharmony_ci	policy_size = fscrypt_policy_size(policy);
57862306a36Sopenharmony_ci
57962306a36Sopenharmony_ci	if (copy_from_user(&arg, uarg, sizeof(arg.policy_size)))
58062306a36Sopenharmony_ci		return -EFAULT;
58162306a36Sopenharmony_ci
58262306a36Sopenharmony_ci	if (policy_size > arg.policy_size)
58362306a36Sopenharmony_ci		return -EOVERFLOW;
58462306a36Sopenharmony_ci	arg.policy_size = policy_size;
58562306a36Sopenharmony_ci
58662306a36Sopenharmony_ci	if (copy_to_user(uarg, &arg, sizeof(arg.policy_size) + policy_size))
58762306a36Sopenharmony_ci		return -EFAULT;
58862306a36Sopenharmony_ci	return 0;
58962306a36Sopenharmony_ci}
59062306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(fscrypt_ioctl_get_policy_ex);
59162306a36Sopenharmony_ci
59262306a36Sopenharmony_ci/* FS_IOC_GET_ENCRYPTION_NONCE: retrieve file's encryption nonce for testing */
59362306a36Sopenharmony_ciint fscrypt_ioctl_get_nonce(struct file *filp, void __user *arg)
59462306a36Sopenharmony_ci{
59562306a36Sopenharmony_ci	struct inode *inode = file_inode(filp);
59662306a36Sopenharmony_ci	union fscrypt_context ctx;
59762306a36Sopenharmony_ci	int ret;
59862306a36Sopenharmony_ci
59962306a36Sopenharmony_ci	ret = inode->i_sb->s_cop->get_context(inode, &ctx, sizeof(ctx));
60062306a36Sopenharmony_ci	if (ret < 0)
60162306a36Sopenharmony_ci		return ret;
60262306a36Sopenharmony_ci	if (!fscrypt_context_is_valid(&ctx, ret))
60362306a36Sopenharmony_ci		return -EINVAL;
60462306a36Sopenharmony_ci	if (copy_to_user(arg, fscrypt_context_nonce(&ctx),
60562306a36Sopenharmony_ci			 FSCRYPT_FILE_NONCE_SIZE))
60662306a36Sopenharmony_ci		return -EFAULT;
60762306a36Sopenharmony_ci	return 0;
60862306a36Sopenharmony_ci}
60962306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(fscrypt_ioctl_get_nonce);
61062306a36Sopenharmony_ci
61162306a36Sopenharmony_ci/**
61262306a36Sopenharmony_ci * fscrypt_has_permitted_context() - is a file's encryption policy permitted
61362306a36Sopenharmony_ci *				     within its directory?
61462306a36Sopenharmony_ci *
61562306a36Sopenharmony_ci * @parent: inode for parent directory
61662306a36Sopenharmony_ci * @child: inode for file being looked up, opened, or linked into @parent
61762306a36Sopenharmony_ci *
61862306a36Sopenharmony_ci * Filesystems must call this before permitting access to an inode in a
61962306a36Sopenharmony_ci * situation where the parent directory is encrypted (either before allowing
62062306a36Sopenharmony_ci * ->lookup() to succeed, or for a regular file before allowing it to be opened)
62162306a36Sopenharmony_ci * and before any operation that involves linking an inode into an encrypted
62262306a36Sopenharmony_ci * directory, including link, rename, and cross rename.  It enforces the
62362306a36Sopenharmony_ci * constraint that within a given encrypted directory tree, all files use the
62462306a36Sopenharmony_ci * same encryption policy.  The pre-access check is needed to detect potentially
62562306a36Sopenharmony_ci * malicious offline violations of this constraint, while the link and rename
62662306a36Sopenharmony_ci * checks are needed to prevent online violations of this constraint.
62762306a36Sopenharmony_ci *
62862306a36Sopenharmony_ci * Return: 1 if permitted, 0 if forbidden.
62962306a36Sopenharmony_ci */
63062306a36Sopenharmony_ciint fscrypt_has_permitted_context(struct inode *parent, struct inode *child)
63162306a36Sopenharmony_ci{
63262306a36Sopenharmony_ci	union fscrypt_policy parent_policy, child_policy;
63362306a36Sopenharmony_ci	int err, err1, err2;
63462306a36Sopenharmony_ci
63562306a36Sopenharmony_ci	/* No restrictions on file types which are never encrypted */
63662306a36Sopenharmony_ci	if (!S_ISREG(child->i_mode) && !S_ISDIR(child->i_mode) &&
63762306a36Sopenharmony_ci	    !S_ISLNK(child->i_mode))
63862306a36Sopenharmony_ci		return 1;
63962306a36Sopenharmony_ci
64062306a36Sopenharmony_ci	/* No restrictions if the parent directory is unencrypted */
64162306a36Sopenharmony_ci	if (!IS_ENCRYPTED(parent))
64262306a36Sopenharmony_ci		return 1;
64362306a36Sopenharmony_ci
64462306a36Sopenharmony_ci	/* Encrypted directories must not contain unencrypted files */
64562306a36Sopenharmony_ci	if (!IS_ENCRYPTED(child))
64662306a36Sopenharmony_ci		return 0;
64762306a36Sopenharmony_ci
64862306a36Sopenharmony_ci	/*
64962306a36Sopenharmony_ci	 * Both parent and child are encrypted, so verify they use the same
65062306a36Sopenharmony_ci	 * encryption policy.  Compare the fscrypt_info structs if the keys are
65162306a36Sopenharmony_ci	 * available, otherwise retrieve and compare the fscrypt_contexts.
65262306a36Sopenharmony_ci	 *
65362306a36Sopenharmony_ci	 * Note that the fscrypt_context retrieval will be required frequently
65462306a36Sopenharmony_ci	 * when accessing an encrypted directory tree without the key.
65562306a36Sopenharmony_ci	 * Performance-wise this is not a big deal because we already don't
65662306a36Sopenharmony_ci	 * really optimize for file access without the key (to the extent that
65762306a36Sopenharmony_ci	 * such access is even possible), given that any attempted access
65862306a36Sopenharmony_ci	 * already causes a fscrypt_context retrieval and keyring search.
65962306a36Sopenharmony_ci	 *
66062306a36Sopenharmony_ci	 * In any case, if an unexpected error occurs, fall back to "forbidden".
66162306a36Sopenharmony_ci	 */
66262306a36Sopenharmony_ci
66362306a36Sopenharmony_ci	err = fscrypt_get_encryption_info(parent, true);
66462306a36Sopenharmony_ci	if (err)
66562306a36Sopenharmony_ci		return 0;
66662306a36Sopenharmony_ci	err = fscrypt_get_encryption_info(child, true);
66762306a36Sopenharmony_ci	if (err)
66862306a36Sopenharmony_ci		return 0;
66962306a36Sopenharmony_ci
67062306a36Sopenharmony_ci	err1 = fscrypt_get_policy(parent, &parent_policy);
67162306a36Sopenharmony_ci	err2 = fscrypt_get_policy(child, &child_policy);
67262306a36Sopenharmony_ci
67362306a36Sopenharmony_ci	/*
67462306a36Sopenharmony_ci	 * Allow the case where the parent and child both have an unrecognized
67562306a36Sopenharmony_ci	 * encryption policy, so that files with an unrecognized encryption
67662306a36Sopenharmony_ci	 * policy can be deleted.
67762306a36Sopenharmony_ci	 */
67862306a36Sopenharmony_ci	if (err1 == -EINVAL && err2 == -EINVAL)
67962306a36Sopenharmony_ci		return 1;
68062306a36Sopenharmony_ci
68162306a36Sopenharmony_ci	if (err1 || err2)
68262306a36Sopenharmony_ci		return 0;
68362306a36Sopenharmony_ci
68462306a36Sopenharmony_ci	return fscrypt_policies_equal(&parent_policy, &child_policy);
68562306a36Sopenharmony_ci}
68662306a36Sopenharmony_ciEXPORT_SYMBOL(fscrypt_has_permitted_context);
68762306a36Sopenharmony_ci
68862306a36Sopenharmony_ci/*
68962306a36Sopenharmony_ci * Return the encryption policy that new files in the directory will inherit, or
69062306a36Sopenharmony_ci * NULL if none, or an ERR_PTR() on error.  If the directory is encrypted, also
69162306a36Sopenharmony_ci * ensure that its key is set up, so that the new filename can be encrypted.
69262306a36Sopenharmony_ci */
69362306a36Sopenharmony_ciconst union fscrypt_policy *fscrypt_policy_to_inherit(struct inode *dir)
69462306a36Sopenharmony_ci{
69562306a36Sopenharmony_ci	int err;
69662306a36Sopenharmony_ci
69762306a36Sopenharmony_ci	if (IS_ENCRYPTED(dir)) {
69862306a36Sopenharmony_ci		err = fscrypt_require_key(dir);
69962306a36Sopenharmony_ci		if (err)
70062306a36Sopenharmony_ci			return ERR_PTR(err);
70162306a36Sopenharmony_ci		return &dir->i_crypt_info->ci_policy;
70262306a36Sopenharmony_ci	}
70362306a36Sopenharmony_ci
70462306a36Sopenharmony_ci	return fscrypt_get_dummy_policy(dir->i_sb);
70562306a36Sopenharmony_ci}
70662306a36Sopenharmony_ci
70762306a36Sopenharmony_ci/**
70862306a36Sopenharmony_ci * fscrypt_context_for_new_inode() - create an encryption context for a new inode
70962306a36Sopenharmony_ci * @ctx: where context should be written
71062306a36Sopenharmony_ci * @inode: inode from which to fetch policy and nonce
71162306a36Sopenharmony_ci *
71262306a36Sopenharmony_ci * Given an in-core "prepared" (via fscrypt_prepare_new_inode) inode,
71362306a36Sopenharmony_ci * generate a new context and write it to ctx. ctx _must_ be at least
71462306a36Sopenharmony_ci * FSCRYPT_SET_CONTEXT_MAX_SIZE bytes.
71562306a36Sopenharmony_ci *
71662306a36Sopenharmony_ci * Return: size of the resulting context or a negative error code.
71762306a36Sopenharmony_ci */
71862306a36Sopenharmony_ciint fscrypt_context_for_new_inode(void *ctx, struct inode *inode)
71962306a36Sopenharmony_ci{
72062306a36Sopenharmony_ci	struct fscrypt_info *ci = inode->i_crypt_info;
72162306a36Sopenharmony_ci
72262306a36Sopenharmony_ci	BUILD_BUG_ON(sizeof(union fscrypt_context) !=
72362306a36Sopenharmony_ci			FSCRYPT_SET_CONTEXT_MAX_SIZE);
72462306a36Sopenharmony_ci
72562306a36Sopenharmony_ci	/* fscrypt_prepare_new_inode() should have set up the key already. */
72662306a36Sopenharmony_ci	if (WARN_ON_ONCE(!ci))
72762306a36Sopenharmony_ci		return -ENOKEY;
72862306a36Sopenharmony_ci
72962306a36Sopenharmony_ci	return fscrypt_new_context(ctx, &ci->ci_policy, ci->ci_nonce);
73062306a36Sopenharmony_ci}
73162306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(fscrypt_context_for_new_inode);
73262306a36Sopenharmony_ci
73362306a36Sopenharmony_ci/**
73462306a36Sopenharmony_ci * fscrypt_set_context() - Set the fscrypt context of a new inode
73562306a36Sopenharmony_ci * @inode: a new inode
73662306a36Sopenharmony_ci * @fs_data: private data given by FS and passed to ->set_context()
73762306a36Sopenharmony_ci *
73862306a36Sopenharmony_ci * This should be called after fscrypt_prepare_new_inode(), generally during a
73962306a36Sopenharmony_ci * filesystem transaction.  Everything here must be %GFP_NOFS-safe.
74062306a36Sopenharmony_ci *
74162306a36Sopenharmony_ci * Return: 0 on success, -errno on failure
74262306a36Sopenharmony_ci */
74362306a36Sopenharmony_ciint fscrypt_set_context(struct inode *inode, void *fs_data)
74462306a36Sopenharmony_ci{
74562306a36Sopenharmony_ci	struct fscrypt_info *ci = inode->i_crypt_info;
74662306a36Sopenharmony_ci	union fscrypt_context ctx;
74762306a36Sopenharmony_ci	int ctxsize;
74862306a36Sopenharmony_ci
74962306a36Sopenharmony_ci	ctxsize = fscrypt_context_for_new_inode(&ctx, inode);
75062306a36Sopenharmony_ci	if (ctxsize < 0)
75162306a36Sopenharmony_ci		return ctxsize;
75262306a36Sopenharmony_ci
75362306a36Sopenharmony_ci	/*
75462306a36Sopenharmony_ci	 * This may be the first time the inode number is available, so do any
75562306a36Sopenharmony_ci	 * delayed key setup that requires the inode number.
75662306a36Sopenharmony_ci	 */
75762306a36Sopenharmony_ci	if (ci->ci_policy.version == FSCRYPT_POLICY_V2 &&
75862306a36Sopenharmony_ci	    (ci->ci_policy.v2.flags & FSCRYPT_POLICY_FLAG_IV_INO_LBLK_32))
75962306a36Sopenharmony_ci		fscrypt_hash_inode_number(ci, ci->ci_master_key);
76062306a36Sopenharmony_ci
76162306a36Sopenharmony_ci	return inode->i_sb->s_cop->set_context(inode, &ctx, ctxsize, fs_data);
76262306a36Sopenharmony_ci}
76362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(fscrypt_set_context);
76462306a36Sopenharmony_ci
76562306a36Sopenharmony_ci/**
76662306a36Sopenharmony_ci * fscrypt_parse_test_dummy_encryption() - parse the test_dummy_encryption mount option
76762306a36Sopenharmony_ci * @param: the mount option
76862306a36Sopenharmony_ci * @dummy_policy: (input/output) the place to write the dummy policy that will
76962306a36Sopenharmony_ci *	result from parsing the option.  Zero-initialize this.  If a policy is
77062306a36Sopenharmony_ci *	already set here (due to test_dummy_encryption being given multiple
77162306a36Sopenharmony_ci *	times), then this function will verify that the policies are the same.
77262306a36Sopenharmony_ci *
77362306a36Sopenharmony_ci * Return: 0 on success; -EINVAL if the argument is invalid; -EEXIST if the
77462306a36Sopenharmony_ci *	   argument conflicts with one already specified; or -ENOMEM.
77562306a36Sopenharmony_ci */
77662306a36Sopenharmony_ciint fscrypt_parse_test_dummy_encryption(const struct fs_parameter *param,
77762306a36Sopenharmony_ci				struct fscrypt_dummy_policy *dummy_policy)
77862306a36Sopenharmony_ci{
77962306a36Sopenharmony_ci	const char *arg = "v2";
78062306a36Sopenharmony_ci	union fscrypt_policy *policy;
78162306a36Sopenharmony_ci	int err;
78262306a36Sopenharmony_ci
78362306a36Sopenharmony_ci	if (param->type == fs_value_is_string && *param->string)
78462306a36Sopenharmony_ci		arg = param->string;
78562306a36Sopenharmony_ci
78662306a36Sopenharmony_ci	policy = kzalloc(sizeof(*policy), GFP_KERNEL);
78762306a36Sopenharmony_ci	if (!policy)
78862306a36Sopenharmony_ci		return -ENOMEM;
78962306a36Sopenharmony_ci
79062306a36Sopenharmony_ci	if (!strcmp(arg, "v1")) {
79162306a36Sopenharmony_ci		policy->version = FSCRYPT_POLICY_V1;
79262306a36Sopenharmony_ci		policy->v1.contents_encryption_mode = FSCRYPT_MODE_AES_256_XTS;
79362306a36Sopenharmony_ci		policy->v1.filenames_encryption_mode = FSCRYPT_MODE_AES_256_CTS;
79462306a36Sopenharmony_ci		memset(policy->v1.master_key_descriptor, 0x42,
79562306a36Sopenharmony_ci		       FSCRYPT_KEY_DESCRIPTOR_SIZE);
79662306a36Sopenharmony_ci	} else if (!strcmp(arg, "v2")) {
79762306a36Sopenharmony_ci		policy->version = FSCRYPT_POLICY_V2;
79862306a36Sopenharmony_ci		policy->v2.contents_encryption_mode = FSCRYPT_MODE_AES_256_XTS;
79962306a36Sopenharmony_ci		policy->v2.filenames_encryption_mode = FSCRYPT_MODE_AES_256_CTS;
80062306a36Sopenharmony_ci		err = fscrypt_get_test_dummy_key_identifier(
80162306a36Sopenharmony_ci				policy->v2.master_key_identifier);
80262306a36Sopenharmony_ci		if (err)
80362306a36Sopenharmony_ci			goto out;
80462306a36Sopenharmony_ci	} else {
80562306a36Sopenharmony_ci		err = -EINVAL;
80662306a36Sopenharmony_ci		goto out;
80762306a36Sopenharmony_ci	}
80862306a36Sopenharmony_ci
80962306a36Sopenharmony_ci	if (dummy_policy->policy) {
81062306a36Sopenharmony_ci		if (fscrypt_policies_equal(policy, dummy_policy->policy))
81162306a36Sopenharmony_ci			err = 0;
81262306a36Sopenharmony_ci		else
81362306a36Sopenharmony_ci			err = -EEXIST;
81462306a36Sopenharmony_ci		goto out;
81562306a36Sopenharmony_ci	}
81662306a36Sopenharmony_ci	dummy_policy->policy = policy;
81762306a36Sopenharmony_ci	policy = NULL;
81862306a36Sopenharmony_ci	err = 0;
81962306a36Sopenharmony_ciout:
82062306a36Sopenharmony_ci	kfree(policy);
82162306a36Sopenharmony_ci	return err;
82262306a36Sopenharmony_ci}
82362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(fscrypt_parse_test_dummy_encryption);
82462306a36Sopenharmony_ci
82562306a36Sopenharmony_ci/**
82662306a36Sopenharmony_ci * fscrypt_dummy_policies_equal() - check whether two dummy policies are equal
82762306a36Sopenharmony_ci * @p1: the first test dummy policy (may be unset)
82862306a36Sopenharmony_ci * @p2: the second test dummy policy (may be unset)
82962306a36Sopenharmony_ci *
83062306a36Sopenharmony_ci * Return: %true if the dummy policies are both set and equal, or both unset.
83162306a36Sopenharmony_ci */
83262306a36Sopenharmony_cibool fscrypt_dummy_policies_equal(const struct fscrypt_dummy_policy *p1,
83362306a36Sopenharmony_ci				  const struct fscrypt_dummy_policy *p2)
83462306a36Sopenharmony_ci{
83562306a36Sopenharmony_ci	if (!p1->policy && !p2->policy)
83662306a36Sopenharmony_ci		return true;
83762306a36Sopenharmony_ci	if (!p1->policy || !p2->policy)
83862306a36Sopenharmony_ci		return false;
83962306a36Sopenharmony_ci	return fscrypt_policies_equal(p1->policy, p2->policy);
84062306a36Sopenharmony_ci}
84162306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(fscrypt_dummy_policies_equal);
84262306a36Sopenharmony_ci
84362306a36Sopenharmony_ci/**
84462306a36Sopenharmony_ci * fscrypt_show_test_dummy_encryption() - show '-o test_dummy_encryption'
84562306a36Sopenharmony_ci * @seq: the seq_file to print the option to
84662306a36Sopenharmony_ci * @sep: the separator character to use
84762306a36Sopenharmony_ci * @sb: the filesystem whose options are being shown
84862306a36Sopenharmony_ci *
84962306a36Sopenharmony_ci * Show the test_dummy_encryption mount option, if it was specified.
85062306a36Sopenharmony_ci * This is mainly used for /proc/mounts.
85162306a36Sopenharmony_ci */
85262306a36Sopenharmony_civoid fscrypt_show_test_dummy_encryption(struct seq_file *seq, char sep,
85362306a36Sopenharmony_ci					struct super_block *sb)
85462306a36Sopenharmony_ci{
85562306a36Sopenharmony_ci	const union fscrypt_policy *policy = fscrypt_get_dummy_policy(sb);
85662306a36Sopenharmony_ci	int vers;
85762306a36Sopenharmony_ci
85862306a36Sopenharmony_ci	if (!policy)
85962306a36Sopenharmony_ci		return;
86062306a36Sopenharmony_ci
86162306a36Sopenharmony_ci	vers = policy->version;
86262306a36Sopenharmony_ci	if (vers == FSCRYPT_POLICY_V1) /* Handle numbering quirk */
86362306a36Sopenharmony_ci		vers = 1;
86462306a36Sopenharmony_ci
86562306a36Sopenharmony_ci	seq_printf(seq, "%ctest_dummy_encryption=v%d", sep, vers);
86662306a36Sopenharmony_ci}
86762306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(fscrypt_show_test_dummy_encryption);
868