Re: [PATCH v2 2/3] fscrypt: Don't allow v1 policies with casefolding

From: Eric Biggers
Date: Mon Jan 06 2020 - 22:35:07 EST


On Mon, Jan 06, 2020 at 06:33:22PM -0800, Daniel Rosenberg wrote:
> Casefolding currently requires a derived key for computing the siphash.
> This is available for v2 policies, but not v1, so we disallow it for v1.
>
> Signed-off-by: Daniel Rosenberg <drosen@xxxxxxxxxx>
> ---
> fs/crypto/keysetup.c | 7 ++++---
> fs/crypto/policy.c | 39 +++++++++++++++++++++++++++++++++++++++
> fs/inode.c | 7 +++++++
> include/linux/fscrypt.h | 11 +++++++++++
> 4 files changed, 61 insertions(+), 3 deletions(-)
>
> diff --git a/fs/crypto/keysetup.c b/fs/crypto/keysetup.c
> index c1bd897c9310..7445ab76e0b3 100644
> --- a/fs/crypto/keysetup.c
> +++ b/fs/crypto/keysetup.c
> @@ -224,10 +224,11 @@ static int fscrypt_setup_v2_file_key(struct fscrypt_info *ci,
> FS_KEY_DERIVATION_NONCE_SIZE,
> (u8 *)&ci->ci_hash_key,
> sizeof(ci->ci_hash_key));
> - if (!err)
> - ci->ci_hash_key_initialized = true;
> + if (err)
> + return err;
> + ci->ci_hash_key_initialized = true;
> }
> - return err;
> + return 0;
> }

This part should be folded into patch 1.

>
> /*
> diff --git a/fs/crypto/policy.c b/fs/crypto/policy.c
> index f1cff83c151a..9e937cfa732c 100644
> --- a/fs/crypto/policy.c
> +++ b/fs/crypto/policy.c
> @@ -124,6 +124,12 @@ static bool fscrypt_supported_v1_policy(const struct fscrypt_policy_v1 *policy,
> policy->filenames_encryption_mode))
> return false;
>
> + if (IS_CASEFOLDED(inode)) {
> + fscrypt_warn(inode,
> + "v1 policy does not support casefolded directories");
> + return false;
> + }
> +
> return true;
> }
>
> @@ -579,3 +585,36 @@ int fscrypt_inherit_context(struct inode *parent, struct inode *child,
> return preload ? fscrypt_get_encryption_info(child): 0;
> }
> EXPORT_SYMBOL(fscrypt_inherit_context);
> +
> +static int fscrypt_set_casefolding_allowed(struct inode *inode)
> +{
> + union fscrypt_policy policy;
> + int err = fscrypt_get_policy(inode, &policy);
> +
> + if (err)
> + return err;
> +
> + if (policy.version != FSCRYPT_POLICY_V2)
> + return -EINVAL;
> +
> + return 0;
> +}
> +
> +int fscrypt_ioc_setflags_prepare(struct inode *inode,
> + unsigned int oldflags,
> + unsigned int flags)
> +{
> + int err;
> +
> + /*
> + * When a directory is encrypted, the CASEFOLD flag can only be turned
> + * on if the fscrypt policy supports it.
> + */
> + if (IS_ENCRYPTED(inode) && (flags & ~oldflags & FS_CASEFOLD_FL)) {
> + err = fscrypt_set_casefolding_allowed(inode);
> + if (err)
> + return err;
> + }
> +
> + return 0;
> +}

There's not really any point to the fscrypt_set_casefolding_allowed() function.
It can just be folded into fscrypt_ioc_setflags_prepare():

int fscrypt_ioc_setflags_prepare(struct inode *inode,
unsigned int oldflags,
unsigned int flags)
{
union fscrypt_policy policy;
int err;

/*
* When a directory is encrypted, the CASEFOLD flag can only be turned
* on if the fscrypt policy supports it.
*/
if (IS_ENCRYPTED(inode) && (flags & ~oldflags & FS_CASEFOLD_FL)) {
err = fscrypt_get_policy(inode, &policy);
if (err)
return err;
if (policy.version != FSCRYPT_POLICY_V2)
return -EINVAL;
}

return 0;
}

> @@ -2242,6 +2243,8 @@ EXPORT_SYMBOL(current_time);
> int vfs_ioc_setflags_prepare(struct inode *inode, unsigned int oldflags,
> unsigned int flags)
> {
> + int err;
> +
> /*
> * The IMMUTABLE and APPEND_ONLY flags can only be changed by
> * the relevant capability.
> @@ -2252,6 +2255,10 @@ int vfs_ioc_setflags_prepare(struct inode *inode, unsigned int oldflags,
> !capable(CAP_LINUX_IMMUTABLE))
> return -EPERM;
>
> + err = fscrypt_ioc_setflags_prepare(inode, oldflags, flags);
> + if (err)
> + return err;
> +
> return 0;
> }

Can just do 'return fscrypt_ioc_setflags_prepare(inode, oldflags, flags);'

- Eric