2 * eCryptfs: Linux filesystem encryption layer
4 * Copyright (C) 2008 International Business Machines Corp.
5 * Author(s): Michael A. Halcrow <mahalcro@us.ibm.com>
7 * This program is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU General Public License as
9 * published by the Free Software Foundation; either version 2 of the
10 * License, or (at your option) any later version.
12 * This program is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
23 #include <linux/kthread.h>
24 #include <linux/freezer.h>
25 #include <linux/wait.h>
26 #include <linux/mount.h>
27 #include "ecryptfs_kernel.h"
29 struct kmem_cache
*ecryptfs_open_req_cache
;
31 static struct ecryptfs_kthread_ctl
{
32 #define ECRYPTFS_KTHREAD_ZOMBIE 0x00000001
35 struct list_head req_list
;
36 wait_queue_head_t wait
;
37 } ecryptfs_kthread_ctl
;
39 static struct task_struct
*ecryptfs_kthread
;
45 * The eCryptfs kernel thread that has the responsibility of getting
46 * the lower persistent file with RW permissions.
48 * Returns zero on success; non-zero otherwise
50 static int ecryptfs_threadfn(void *ignored
)
54 struct ecryptfs_open_req
*req
;
57 ecryptfs_kthread_ctl
.wait
,
58 (!list_empty(&ecryptfs_kthread_ctl
.req_list
)
59 || kthread_should_stop()));
60 mutex_lock(&ecryptfs_kthread_ctl
.mux
);
61 if (ecryptfs_kthread_ctl
.flags
& ECRYPTFS_KTHREAD_ZOMBIE
) {
62 mutex_unlock(&ecryptfs_kthread_ctl
.mux
);
65 while (!list_empty(&ecryptfs_kthread_ctl
.req_list
)) {
66 req
= list_first_entry(&ecryptfs_kthread_ctl
.req_list
,
67 struct ecryptfs_open_req
,
69 mutex_lock(&req
->mux
);
70 list_del(&req
->kthread_ctl_list
);
71 if (!(req
->flags
& ECRYPTFS_REQ_ZOMBIE
)) {
72 dget(req
->lower_dentry
);
73 mntget(req
->lower_mnt
);
74 (*req
->lower_file
) = dentry_open(
75 req
->lower_dentry
, req
->lower_mnt
,
76 (O_RDWR
| O_LARGEFILE
), current_cred());
77 req
->flags
|= ECRYPTFS_REQ_PROCESSED
;
80 mutex_unlock(&req
->mux
);
82 mutex_unlock(&ecryptfs_kthread_ctl
.mux
);
88 int ecryptfs_init_kthread(void)
92 mutex_init(&ecryptfs_kthread_ctl
.mux
);
93 init_waitqueue_head(&ecryptfs_kthread_ctl
.wait
);
94 INIT_LIST_HEAD(&ecryptfs_kthread_ctl
.req_list
);
95 ecryptfs_kthread
= kthread_run(&ecryptfs_threadfn
, NULL
,
97 if (IS_ERR(ecryptfs_kthread
)) {
98 rc
= PTR_ERR(ecryptfs_kthread
);
99 printk(KERN_ERR
"%s: Failed to create kernel thread; rc = [%d]"
105 void ecryptfs_destroy_kthread(void)
107 struct ecryptfs_open_req
*req
;
109 mutex_lock(&ecryptfs_kthread_ctl
.mux
);
110 ecryptfs_kthread_ctl
.flags
|= ECRYPTFS_KTHREAD_ZOMBIE
;
111 list_for_each_entry(req
, &ecryptfs_kthread_ctl
.req_list
,
113 mutex_lock(&req
->mux
);
114 req
->flags
|= ECRYPTFS_REQ_ZOMBIE
;
116 mutex_unlock(&req
->mux
);
118 mutex_unlock(&ecryptfs_kthread_ctl
.mux
);
119 kthread_stop(ecryptfs_kthread
);
120 wake_up(&ecryptfs_kthread_ctl
.wait
);
124 * ecryptfs_privileged_open
125 * @lower_file: Result of dentry_open by root on lower dentry
126 * @lower_dentry: Lower dentry for file to open
127 * @lower_mnt: Lower vfsmount for file to open
129 * This function gets a r/w file opened againt the lower dentry.
131 * Returns zero on success; non-zero otherwise
133 int ecryptfs_privileged_open(struct file
**lower_file
,
134 struct dentry
*lower_dentry
,
135 struct vfsmount
*lower_mnt
,
136 const struct cred
*cred
)
138 struct ecryptfs_open_req
*req
;
139 int flags
= O_LARGEFILE
;
142 /* Corresponding dput() and mntput() are done when the
143 * persistent file is fput() when the eCryptfs inode is
147 flags
|= IS_RDONLY(lower_dentry
->d_inode
) ? O_RDONLY
: O_RDWR
;
148 (*lower_file
) = dentry_open(lower_dentry
, lower_mnt
, flags
, cred
);
149 if (!IS_ERR(*lower_file
))
151 if (flags
& O_RDONLY
) {
152 rc
= PTR_ERR((*lower_file
));
155 req
= kmem_cache_alloc(ecryptfs_open_req_cache
, GFP_KERNEL
);
160 mutex_init(&req
->mux
);
161 req
->lower_file
= lower_file
;
162 req
->lower_dentry
= lower_dentry
;
163 req
->lower_mnt
= lower_mnt
;
164 init_waitqueue_head(&req
->wait
);
166 mutex_lock(&ecryptfs_kthread_ctl
.mux
);
167 if (ecryptfs_kthread_ctl
.flags
& ECRYPTFS_KTHREAD_ZOMBIE
) {
169 mutex_unlock(&ecryptfs_kthread_ctl
.mux
);
170 printk(KERN_ERR
"%s: We are in the middle of shutting down; "
171 "aborting privileged request to open lower file\n",
175 list_add_tail(&req
->kthread_ctl_list
, &ecryptfs_kthread_ctl
.req_list
);
176 mutex_unlock(&ecryptfs_kthread_ctl
.mux
);
177 wake_up(&ecryptfs_kthread_ctl
.wait
);
178 wait_event(req
->wait
, (req
->flags
!= 0));
179 mutex_lock(&req
->mux
);
180 BUG_ON(req
->flags
== 0);
181 if (req
->flags
& ECRYPTFS_REQ_DROPPED
182 || req
->flags
& ECRYPTFS_REQ_ZOMBIE
) {
184 printk(KERN_WARNING
"%s: Privileged open request dropped\n",
188 if (IS_ERR(*req
->lower_file
))
189 rc
= PTR_ERR(*req
->lower_file
);
191 mutex_unlock(&req
->mux
);
193 kmem_cache_free(ecryptfs_open_req_cache
, req
);