{"id":816557,"url":"http://patchwork.ozlabs.org/api/patches/816557/?format=json","web_url":"http://patchwork.ozlabs.org/project/linux-mtd/patch/20170920224605.22030-6-ebiggers3@gmail.com/","project":{"id":3,"url":"http://patchwork.ozlabs.org/api/projects/3/?format=json","name":"Linux MTD development","link_name":"linux-mtd","list_id":"linux-mtd.lists.infradead.org","list_email":"linux-mtd@lists.infradead.org","web_url":null,"scm_url":null,"webscm_url":null,"list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20170920224605.22030-6-ebiggers3@gmail.com>","list_archive_url":null,"date":"2017-09-20T22:45:45","name":"[05/25] fscrypt: new helper function - fscrypt_require_key()","commit_ref":null,"pull_url":null,"state":"not-applicable","archived":false,"hash":"4023e1bd85b09f993addd710751fb79657328bbd","submitter":{"id":65202,"url":"http://patchwork.ozlabs.org/api/people/65202/?format=json","name":"Eric Biggers","email":"ebiggers3@gmail.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/linux-mtd/patch/20170920224605.22030-6-ebiggers3@gmail.com/mbox/","series":[{"id":4250,"url":"http://patchwork.ozlabs.org/api/series/4250/?format=json","web_url":"http://patchwork.ozlabs.org/project/linux-mtd/list/?series=4250","date":"2017-09-20T22:45:45","name":"fscrypt: add some higher-level helper functions","version":1,"mbox":"http://patchwork.ozlabs.org/series/4250/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/816557/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/816557/checks/","tags":{},"related":[],"headers":{"Return-Path":"<linux-mtd-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@bilbo.ozlabs.org","Authentication-Results":["ozlabs.org; spf=none (mailfrom)\n\tsmtp.mailfrom=lists.infradead.org (client-ip=65.50.211.133;\n\thelo=bombadil.infradead.org;\n\tenvelope-from=linux-mtd-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n\treceiver=<UNKNOWN>)","ozlabs.org; dkim=pass (2048-bit key;\n\tunprotected) header.d=lists.infradead.org\n\theader.i=@lists.infradead.org header.b=\"kBn5TytY\"; \n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n\tunprotected) header.d=gmail.com header.i=@gmail.com\n\theader.b=\"psOkbfqt\"; dkim-atps=neutral"],"Received":["from bombadil.infradead.org (bombadil.infradead.org\n\t[65.50.211.133])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xyFJk3LRGz9sNr\n\tfor <incoming@patchwork.ozlabs.org>;\n\tThu, 21 Sep 2017 08:48:22 +1000 (AEST)","from localhost ([127.0.0.1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.87 #1 (Red Hat Linux))\n\tid 1dunmx-0005lC-1r; Wed, 20 Sep 2017 22:48:15 +0000","from mail-pg0-x241.google.com ([2607:f8b0:400e:c05::241])\n\tby bombadil.infradead.org with esmtps (Exim 4.87 #1 (Red Hat Linux))\n\tid 1dunlx-0004wr-PV\n\tfor linux-mtd@lists.infradead.org; Wed, 20 Sep 2017 22:47:18 +0000","by mail-pg0-x241.google.com with SMTP id u18so2378763pgo.1\n\tfor <linux-mtd@lists.infradead.org>;\n\tWed, 20 Sep 2017 15:46:57 -0700 (PDT)","from ebiggers-linuxstation.kir.corp.google.com ([100.66.174.81])\n\tby smtp.gmail.com with ESMTPSA id j2sm6249pgn.26.2017.09.20.15.46.55\n\t(version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128);\n\tWed, 20 Sep 2017 15:46:56 -0700 (PDT)"],"DKIM-Signature":["v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20170209; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:MIME-Version:Cc:List-Subscribe:\n\tList-Help:List-Post:List-Archive:List-Unsubscribe:List-Id:References:\n\tIn-Reply-To:Message-Id:Date:Subject:To:From:Reply-To:Content-ID:\n\tContent-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc\n\t:Resent-Message-ID:List-Owner;\n\tbh=ohibF2yOSRuPMpLnM+Smk7M+hTcs2JrlgU3whZzkcvs=;\n\tb=kBn5TytYXrzeoHK5ZgmI9tKNZx\n\tzXbmj9kz8nKFWiSqrU/CLp5YqaNP9PT5om3Gw7tJ0cb6rDNH1QA+TUdCs0AUpcznT2gj7TyJYIKTr\n\tIIt64Nz7NkunUJra2aAhTLnCAKevtgPB5YM7Cu2+nwjI/Ini17687OiYCTp/gl2YxEXxFjHzdNq2v\n\tsq2BA85/LgqEeKRmQ/gXkx2yDYdkO4iiU08nfeug+SfooB3GFUreqL46BCM8oXRxFUsKFjDUbaBwv\n\tl9xlH/veDvCZfHBGgRarBR64AixnYIcwrojYtkZTBu10x/I+Zet6BEIK98XaDD8IYC5KjIoLHp4aE\n\tw4GE4bPg==;","v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;\n\th=from:to:cc:subject:date:message-id:in-reply-to:references;\n\tbh=zk/GB8MlBbGtgz+89+4L5zxIzbwfvPyYyWzdMzv86nU=;\n\tb=psOkbfqtPyoPJbDDX7Xe+cMoRvOejwU/8FnfA95tq4/8otus2j3GKvamK+b4UH6obL\n\tphK3XRoDhRASO+XmKxvZDwG26CxMvcAdyzEozyjkslryfBUrVWcKVyPL5a7CDK9iSca4\n\t611FcNnuGA3GMNgr4s31hDZf6xNzdCjw5F3WHZ5jYxMMLCA3VsMAQljAysP56BZQ7+x+\n\tZs4xuHfYYFWI/uzvlB+UTNG3+Ig5CLBliJk6SEaT9Vvb3xBzK5CFzAPEqwWCiIeBcq7d\n\tNEiHmeHk57HOcH3dfKa9ylKrQZ14kd4SYFIkacmkDoCq6YI5nqp2VDzsXaLTuBQ6PRUQ\n\tKI2A=="],"X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to\n\t:references;\n\tbh=zk/GB8MlBbGtgz+89+4L5zxIzbwfvPyYyWzdMzv86nU=;\n\tb=g6xu7o4a+AS9XlJgTmH62ULDPyCH80altFI560+bJQty9u7q+FAJd79CD9/gVR6u40\n\t8QcBLWfsIiPGp0T7mOYxqBoBGQ+e4v3LtefpFnwijQz+FDR1+l+0aOwR9Y6xEsVQbaS2\n\tZrd0LButFtsb/D7wKAuZiYi1fT1noZ1kswGdZBf2XAiD9WjmNUGyQOIzXHl5DvEcVmia\n\t91up3WTtWDz7K3CM6CPoJjm6f/jZ5IpyfSYebggZv5qWiDhWxu/Vd8MyCDM4xZY5eQ5o\n\t6qZoG09DAdrl8+GiNAzkq5hSBRK34Vg2MbX1VYxJv2HNiN4PSs/7DAK2QUJx/2ZEtV2y\n\tFrYA==","X-Gm-Message-State":"AHPjjUiJQLat4jghL6JWkUF4mvLzGZvI4zV9saEHp4q45OU1RseV71Sb\n\tsGQ2jhCG2EAg4OwbgA+PLmw=","X-Google-Smtp-Source":"AOwi7QC9kOJQAvuSgsJvinxg+ZX2ljYeSWP1Q5Twwbn/UHYrAJYZbBLHs9PtAoxKPW3hEAlamw1q9Q==","X-Received":"by 10.99.188.25 with SMTP id q25mr1615630pge.54.1505947616663;\n\tWed, 20 Sep 2017 15:46:56 -0700 (PDT)","From":"Eric Biggers <ebiggers3@gmail.com>","To":"linux-fscrypt@vger.kernel.org","Subject":"[PATCH 05/25] fscrypt: new helper function - fscrypt_require_key()","Date":"Wed, 20 Sep 2017 15:45:45 -0700","Message-Id":"<20170920224605.22030-6-ebiggers3@gmail.com>","X-Mailer":"git-send-email 2.14.1.821.g8fa685d3b7-goog","In-Reply-To":"<20170920224605.22030-1-ebiggers3@gmail.com>","References":"<20170920224605.22030-1-ebiggers3@gmail.com>","X-CRM114-Version":"20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ","X-CRM114-CacheID":"sfid-20170920_154713_885596_D327F5ED ","X-CRM114-Status":"GOOD (  14.97  )","X-Spam-Score":"-1.8 (-)","X-Spam-Report":"SpamAssassin version 3.4.1 on bombadil.infradead.org summary:\n\tContent analysis details:   (-1.8 points)\n\tpts rule name              description\n\t---- ----------------------\n\t--------------------------------------------------\n\t-0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/,\n\tno\n\ttrust [2607:f8b0:400e:c05:0:0:0:241 listed in] [list.dnswl.org]\n\t-0.0 SPF_PASS               SPF: sender matches SPF record\n\t0.2 FREEMAIL_ENVFROM_END_DIGIT Envelope-from freemail username ends\n\tin digit (ebiggers3[at]gmail.com)\n\t0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail\n\tprovider (ebiggers3[at]gmail.com)\n\t-1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n\t[score: 0.0000]\n\t-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature\n\t0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n\tnot necessarily valid\n\t-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from\n\tauthor's domain","X-BeenThere":"linux-mtd@lists.infradead.org","X-Mailman-Version":"2.1.21","Precedence":"list","List-Id":"Linux MTD discussion mailing list <linux-mtd.lists.infradead.org>","List-Unsubscribe":"<http://lists.infradead.org/mailman/options/linux-mtd>,\n\t<mailto:linux-mtd-request@lists.infradead.org?subject=unsubscribe>","List-Archive":"<http://lists.infradead.org/pipermail/linux-mtd/>","List-Post":"<mailto:linux-mtd@lists.infradead.org>","List-Help":"<mailto:linux-mtd-request@lists.infradead.org?subject=help>","List-Subscribe":"<http://lists.infradead.org/mailman/listinfo/linux-mtd>,\n\t<mailto:linux-mtd-request@lists.infradead.org?subject=subscribe>","Cc":"\"Theodore Y . Ts'o\" <tytso@mit.edu>, Eric Biggers <ebiggers@google.com>, \n\tMichael Halcrow <mhalcrow@google.com>,\n\tlinux-f2fs-devel@lists.sourceforge.net, \n\tlinux-mtd@lists.infradead.org, linux-fsdevel@vger.kernel.org,\n\tJaegeuk Kim <jaegeuk@kernel.org>, linux-ext4@vger.kernel.org","MIME-Version":"1.0","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Sender":"\"linux-mtd\" <linux-mtd-bounces@lists.infradead.org>","Errors-To":"linux-mtd-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"},"content":"From: Eric Biggers <ebiggers@google.com>\n\nAdd a helper function which checks if an inode is encrypted, and if so,\ntries to set up its encryption key.  This is a pattern which is\nduplicated in multiple places in each of ext4, f2fs, and ubifs --- for\nexample, when a regular file is asked to be opened or truncated.\n\nSigned-off-by: Eric Biggers <ebiggers@google.com>\n---\n include/linux/fscrypt_notsupp.h |  8 ++++++++\n include/linux/fscrypt_supp.h    | 28 ++++++++++++++++++++++++++++\n 2 files changed, 36 insertions(+)","diff":"diff --git a/include/linux/fscrypt_notsupp.h b/include/linux/fscrypt_notsupp.h\nindex 3f1325ec4646..3cfc953fef71 100644\n--- a/include/linux/fscrypt_notsupp.h\n+++ b/include/linux/fscrypt_notsupp.h\n@@ -174,4 +174,12 @@ static inline int fscrypt_zeroout_range(const struct inode *inode, pgoff_t lblk,\n \treturn -EOPNOTSUPP;\n }\n \n+/* hooks.c */\n+static inline int fscrypt_require_key(struct inode *inode)\n+{\n+\tif (IS_ENCRYPTED(inode))\n+\t\treturn -EOPNOTSUPP;\n+\treturn 0;\n+}\n+\n #endif\t/* _LINUX_FSCRYPT_NOTSUPP_H */\ndiff --git a/include/linux/fscrypt_supp.h b/include/linux/fscrypt_supp.h\nindex 32e2fcf13b01..b6d4b5d303a3 100644\n--- a/include/linux/fscrypt_supp.h\n+++ b/include/linux/fscrypt_supp.h\n@@ -142,4 +142,32 @@ extern void fscrypt_pullback_bio_page(struct page **, bool);\n extern int fscrypt_zeroout_range(const struct inode *, pgoff_t, sector_t,\n \t\t\t\t unsigned int);\n \n+/* hooks.c */\n+\n+/**\n+ * fscrypt_require_key - require an inode's encryption key\n+ * @inode: the inode we need the key for\n+ *\n+ * If the inode is encrypted, set up its encryption key if not already done.\n+ * Then require that the key be present and return -ENOKEY otherwise.\n+ *\n+ * No locks are needed, and currently the key will live as long as the struct\n+ * inode --- so it won't go away from under you.\n+ *\n+ * Return: 0 on success, -ENOKEY if the key is missing, or another -errno code\n+ * if a problem occurred while setting up the encryption key.\n+ */\n+static inline int fscrypt_require_key(struct inode *inode)\n+{\n+\tif (IS_ENCRYPTED(inode)) {\n+\t\tint err = fscrypt_get_encryption_info(inode);\n+\n+\t\tif (err)\n+\t\t\treturn err;\n+\t\tif (!fscrypt_has_encryption_key(inode))\n+\t\t\treturn -ENOKEY;\n+\t}\n+\treturn 0;\n+}\n+\n #endif\t/* _LINUX_FSCRYPT_SUPP_H */\n","prefixes":["05/25"]}