mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 02:30:34 +02:00 
			
		
		
		
	fscrypt: use a common logging function
Use a common function for fscrypt warning and error messages so that all the messages are consistently ratelimited, include the "fscrypt:" prefix, and include the filesystem name if applicable. Also fix up a few of the log messages to be more descriptive. Signed-off-by: Eric Biggers <ebiggers@google.com> Signed-off-by: Theodore Ts'o <tytso@mit.edu>
This commit is contained in:
		
							parent
							
								
									11b8818ec0
								
							
						
					
					
						commit
						544d08fde2
					
				
					 5 changed files with 57 additions and 21 deletions
				
			
		| 
						 | 
					@ -174,9 +174,10 @@ int fscrypt_do_page_crypto(const struct inode *inode, fscrypt_direction_t rw,
 | 
				
			||||||
		res = crypto_wait_req(crypto_skcipher_encrypt(req), &wait);
 | 
							res = crypto_wait_req(crypto_skcipher_encrypt(req), &wait);
 | 
				
			||||||
	skcipher_request_free(req);
 | 
						skcipher_request_free(req);
 | 
				
			||||||
	if (res) {
 | 
						if (res) {
 | 
				
			||||||
		printk_ratelimited(KERN_ERR
 | 
							fscrypt_err(inode->i_sb,
 | 
				
			||||||
			"%s: crypto_skcipher_encrypt() returned %d\n",
 | 
								    "%scryption failed for inode %lu, block %llu: %d",
 | 
				
			||||||
			__func__, res);
 | 
								    (rw == FS_DECRYPT ? "de" : "en"),
 | 
				
			||||||
 | 
								    inode->i_ino, lblk_num, res);
 | 
				
			||||||
		return res;
 | 
							return res;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	return 0;
 | 
						return 0;
 | 
				
			||||||
| 
						 | 
					@ -416,6 +417,27 @@ int fscrypt_initialize(unsigned int cop_flags)
 | 
				
			||||||
	return res;
 | 
						return res;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void fscrypt_msg(struct super_block *sb, const char *level,
 | 
				
			||||||
 | 
							 const char *fmt, ...)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						static DEFINE_RATELIMIT_STATE(rs, DEFAULT_RATELIMIT_INTERVAL,
 | 
				
			||||||
 | 
									      DEFAULT_RATELIMIT_BURST);
 | 
				
			||||||
 | 
						struct va_format vaf;
 | 
				
			||||||
 | 
						va_list args;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!__ratelimit(&rs))
 | 
				
			||||||
 | 
							return;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						va_start(args, fmt);
 | 
				
			||||||
 | 
						vaf.fmt = fmt;
 | 
				
			||||||
 | 
						vaf.va = &args;
 | 
				
			||||||
 | 
						if (sb)
 | 
				
			||||||
 | 
							printk("%sfscrypt (%s): %pV\n", level, sb->s_id, &vaf);
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							printk("%sfscrypt: %pV\n", level, &vaf);
 | 
				
			||||||
 | 
						va_end(args);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * fscrypt_init() - Set up for fs encryption.
 | 
					 * fscrypt_init() - Set up for fs encryption.
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -71,8 +71,9 @@ int fname_encrypt(struct inode *inode, const struct qstr *iname,
 | 
				
			||||||
	res = crypto_wait_req(crypto_skcipher_encrypt(req), &wait);
 | 
						res = crypto_wait_req(crypto_skcipher_encrypt(req), &wait);
 | 
				
			||||||
	skcipher_request_free(req);
 | 
						skcipher_request_free(req);
 | 
				
			||||||
	if (res < 0) {
 | 
						if (res < 0) {
 | 
				
			||||||
		printk_ratelimited(KERN_ERR
 | 
							fscrypt_err(inode->i_sb,
 | 
				
			||||||
				"%s: Error (error code %d)\n", __func__, res);
 | 
								    "Filename encryption failed for inode %lu: %d",
 | 
				
			||||||
 | 
								    inode->i_ino, res);
 | 
				
			||||||
		return res;
 | 
							return res;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -115,8 +116,9 @@ static int fname_decrypt(struct inode *inode,
 | 
				
			||||||
	res = crypto_wait_req(crypto_skcipher_decrypt(req), &wait);
 | 
						res = crypto_wait_req(crypto_skcipher_decrypt(req), &wait);
 | 
				
			||||||
	skcipher_request_free(req);
 | 
						skcipher_request_free(req);
 | 
				
			||||||
	if (res < 0) {
 | 
						if (res < 0) {
 | 
				
			||||||
		printk_ratelimited(KERN_ERR
 | 
							fscrypt_err(inode->i_sb,
 | 
				
			||||||
				"%s: Error (error code %d)\n", __func__, res);
 | 
								    "Filename decryption failed for inode %lu: %d",
 | 
				
			||||||
 | 
								    inode->i_ino, res);
 | 
				
			||||||
		return res;
 | 
							return res;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -100,6 +100,14 @@ extern struct page *fscrypt_alloc_bounce_page(struct fscrypt_ctx *ctx,
 | 
				
			||||||
					      gfp_t gfp_flags);
 | 
										      gfp_t gfp_flags);
 | 
				
			||||||
extern const struct dentry_operations fscrypt_d_ops;
 | 
					extern const struct dentry_operations fscrypt_d_ops;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					extern void __printf(3, 4) __cold
 | 
				
			||||||
 | 
					fscrypt_msg(struct super_block *sb, const char *level, const char *fmt, ...);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define fscrypt_warn(sb, fmt, ...)		\
 | 
				
			||||||
 | 
						fscrypt_msg(sb, KERN_WARNING, fmt, ##__VA_ARGS__)
 | 
				
			||||||
 | 
					#define fscrypt_err(sb, fmt, ...)		\
 | 
				
			||||||
 | 
						fscrypt_msg(sb, KERN_ERR, fmt, ##__VA_ARGS__)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* fname.c */
 | 
					/* fname.c */
 | 
				
			||||||
extern int fname_encrypt(struct inode *inode, const struct qstr *iname,
 | 
					extern int fname_encrypt(struct inode *inode, const struct qstr *iname,
 | 
				
			||||||
			 u8 *out, unsigned int olen);
 | 
								 u8 *out, unsigned int olen);
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -39,8 +39,9 @@ int fscrypt_file_open(struct inode *inode, struct file *filp)
 | 
				
			||||||
	dir = dget_parent(file_dentry(filp));
 | 
						dir = dget_parent(file_dentry(filp));
 | 
				
			||||||
	if (IS_ENCRYPTED(d_inode(dir)) &&
 | 
						if (IS_ENCRYPTED(d_inode(dir)) &&
 | 
				
			||||||
	    !fscrypt_has_permitted_context(d_inode(dir), inode)) {
 | 
						    !fscrypt_has_permitted_context(d_inode(dir), inode)) {
 | 
				
			||||||
		pr_warn_ratelimited("fscrypt: inconsistent encryption contexts: %lu/%lu",
 | 
							fscrypt_warn(inode->i_sb,
 | 
				
			||||||
				    d_inode(dir)->i_ino, inode->i_ino);
 | 
								     "inconsistent encryption contexts: %lu/%lu",
 | 
				
			||||||
 | 
								     d_inode(dir)->i_ino, inode->i_ino);
 | 
				
			||||||
		err = -EPERM;
 | 
							err = -EPERM;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	dput(dir);
 | 
						dput(dir);
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -103,9 +103,8 @@ static int validate_user_key(struct fscrypt_info *crypt_info,
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (master_key->size < min_keysize || master_key->size > FS_MAX_KEY_SIZE
 | 
						if (master_key->size < min_keysize || master_key->size > FS_MAX_KEY_SIZE
 | 
				
			||||||
	    || master_key->size % AES_BLOCK_SIZE != 0) {
 | 
						    || master_key->size % AES_BLOCK_SIZE != 0) {
 | 
				
			||||||
		printk_once(KERN_WARNING
 | 
							fscrypt_warn(NULL, "key size incorrect: %u",
 | 
				
			||||||
				"%s: key size incorrect: %d\n",
 | 
								     master_key->size);
 | 
				
			||||||
				__func__, master_key->size);
 | 
					 | 
				
			||||||
		res = -ENOKEY;
 | 
							res = -ENOKEY;
 | 
				
			||||||
		goto out;
 | 
							goto out;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
| 
						 | 
					@ -132,9 +131,10 @@ static int determine_cipher_type(struct fscrypt_info *ci, struct inode *inode,
 | 
				
			||||||
	u32 mode;
 | 
						u32 mode;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!fscrypt_valid_enc_modes(ci->ci_data_mode, ci->ci_filename_mode)) {
 | 
						if (!fscrypt_valid_enc_modes(ci->ci_data_mode, ci->ci_filename_mode)) {
 | 
				
			||||||
		pr_warn_ratelimited("fscrypt: inode %lu uses unsupported encryption modes (contents mode %d, filenames mode %d)\n",
 | 
							fscrypt_warn(inode->i_sb,
 | 
				
			||||||
				    inode->i_ino,
 | 
								     "inode %lu uses unsupported encryption modes (contents mode %d, filenames mode %d)",
 | 
				
			||||||
				    ci->ci_data_mode, ci->ci_filename_mode);
 | 
								     inode->i_ino, ci->ci_data_mode,
 | 
				
			||||||
 | 
								     ci->ci_filename_mode);
 | 
				
			||||||
		return -EINVAL;
 | 
							return -EINVAL;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -173,8 +173,9 @@ static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		tfm = crypto_alloc_shash("sha256", 0, 0);
 | 
							tfm = crypto_alloc_shash("sha256", 0, 0);
 | 
				
			||||||
		if (IS_ERR(tfm)) {
 | 
							if (IS_ERR(tfm)) {
 | 
				
			||||||
			pr_warn_ratelimited("fscrypt: error allocating SHA-256 transform: %ld\n",
 | 
								fscrypt_warn(NULL,
 | 
				
			||||||
					    PTR_ERR(tfm));
 | 
									     "error allocating SHA-256 transform: %ld",
 | 
				
			||||||
 | 
									     PTR_ERR(tfm));
 | 
				
			||||||
			return PTR_ERR(tfm);
 | 
								return PTR_ERR(tfm);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		prev_tfm = cmpxchg(&essiv_hash_tfm, NULL, tfm);
 | 
							prev_tfm = cmpxchg(&essiv_hash_tfm, NULL, tfm);
 | 
				
			||||||
| 
						 | 
					@ -309,8 +310,9 @@ int fscrypt_get_encryption_info(struct inode *inode)
 | 
				
			||||||
	ctfm = crypto_alloc_skcipher(cipher_str, 0, 0);
 | 
						ctfm = crypto_alloc_skcipher(cipher_str, 0, 0);
 | 
				
			||||||
	if (IS_ERR(ctfm)) {
 | 
						if (IS_ERR(ctfm)) {
 | 
				
			||||||
		res = PTR_ERR(ctfm);
 | 
							res = PTR_ERR(ctfm);
 | 
				
			||||||
		pr_debug("%s: error %d (inode %lu) allocating crypto tfm\n",
 | 
							fscrypt_warn(inode->i_sb,
 | 
				
			||||||
			 __func__, res, inode->i_ino);
 | 
								     "error allocating '%s' transform for inode %lu: %d",
 | 
				
			||||||
 | 
								     cipher_str, inode->i_ino, res);
 | 
				
			||||||
		goto out;
 | 
							goto out;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	crypt_info->ci_ctfm = ctfm;
 | 
						crypt_info->ci_ctfm = ctfm;
 | 
				
			||||||
| 
						 | 
					@ -327,8 +329,9 @@ int fscrypt_get_encryption_info(struct inode *inode)
 | 
				
			||||||
	    crypt_info->ci_data_mode == FS_ENCRYPTION_MODE_AES_128_CBC) {
 | 
						    crypt_info->ci_data_mode == FS_ENCRYPTION_MODE_AES_128_CBC) {
 | 
				
			||||||
		res = init_essiv_generator(crypt_info, raw_key, keysize);
 | 
							res = init_essiv_generator(crypt_info, raw_key, keysize);
 | 
				
			||||||
		if (res) {
 | 
							if (res) {
 | 
				
			||||||
			pr_debug("%s: error %d (inode %lu) allocating essiv tfm\n",
 | 
								fscrypt_warn(inode->i_sb,
 | 
				
			||||||
				 __func__, res, inode->i_ino);
 | 
									     "error initializing ESSIV generator for inode %lu: %d",
 | 
				
			||||||
 | 
									     inode->i_ino, res);
 | 
				
			||||||
			goto out;
 | 
								goto out;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in a new issue