linux/fs/crypto/keyinfo.c
<<
>>
Prefs
   1// SPDX-License-Identifier: GPL-2.0
   2/*
   3 * key management facility for FS encryption support.
   4 *
   5 * Copyright (C) 2015, Google, Inc.
   6 *
   7 * This contains encryption key functions.
   8 *
   9 * Written by Michael Halcrow, Ildar Muslukhov, and Uday Savagaonkar, 2015.
  10 */
  11
  12#include <keys/user-type.h>
  13#include <linux/hashtable.h>
  14#include <linux/scatterlist.h>
  15#include <linux/ratelimit.h>
  16#include <crypto/aes.h>
  17#include <crypto/algapi.h>
  18#include <crypto/sha.h>
  19#include <crypto/skcipher.h>
  20#include "fscrypt_private.h"
  21
  22static struct crypto_shash *essiv_hash_tfm;
  23
  24/* Table of keys referenced by FS_POLICY_FLAG_DIRECT_KEY policies */
  25static DEFINE_HASHTABLE(fscrypt_master_keys, 6); /* 6 bits = 64 buckets */
  26static DEFINE_SPINLOCK(fscrypt_master_keys_lock);
  27
  28/*
  29 * Key derivation function.  This generates the derived key by encrypting the
  30 * master key with AES-128-ECB using the inode's nonce as the AES key.
  31 *
  32 * The master key must be at least as long as the derived key.  If the master
  33 * key is longer, then only the first 'derived_keysize' bytes are used.
  34 */
  35static int derive_key_aes(const u8 *master_key,
  36                          const struct fscrypt_context *ctx,
  37                          u8 *derived_key, unsigned int derived_keysize)
  38{
  39        int res = 0;
  40        struct skcipher_request *req = NULL;
  41        DECLARE_CRYPTO_WAIT(wait);
  42        struct scatterlist src_sg, dst_sg;
  43        struct crypto_skcipher *tfm = crypto_alloc_skcipher("ecb(aes)", 0, 0);
  44
  45        if (IS_ERR(tfm)) {
  46                res = PTR_ERR(tfm);
  47                tfm = NULL;
  48                goto out;
  49        }
  50        crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
  51        req = skcipher_request_alloc(tfm, GFP_NOFS);
  52        if (!req) {
  53                res = -ENOMEM;
  54                goto out;
  55        }
  56        skcipher_request_set_callback(req,
  57                        CRYPTO_TFM_REQ_MAY_BACKLOG | CRYPTO_TFM_REQ_MAY_SLEEP,
  58                        crypto_req_done, &wait);
  59        res = crypto_skcipher_setkey(tfm, ctx->nonce, sizeof(ctx->nonce));
  60        if (res < 0)
  61                goto out;
  62
  63        sg_init_one(&src_sg, master_key, derived_keysize);
  64        sg_init_one(&dst_sg, derived_key, derived_keysize);
  65        skcipher_request_set_crypt(req, &src_sg, &dst_sg, derived_keysize,
  66                                   NULL);
  67        res = crypto_wait_req(crypto_skcipher_encrypt(req), &wait);
  68out:
  69        skcipher_request_free(req);
  70        crypto_free_skcipher(tfm);
  71        return res;
  72}
  73
  74/*
  75 * Search the current task's subscribed keyrings for a "logon" key with
  76 * description prefix:descriptor, and if found acquire a read lock on it and
  77 * return a pointer to its validated payload in *payload_ret.
  78 */
  79static struct key *
  80find_and_lock_process_key(const char *prefix,
  81                          const u8 descriptor[FS_KEY_DESCRIPTOR_SIZE],
  82                          unsigned int min_keysize,
  83                          const struct fscrypt_key **payload_ret)
  84{
  85        char *description;
  86        struct key *key;
  87        const struct user_key_payload *ukp;
  88        const struct fscrypt_key *payload;
  89
  90        description = kasprintf(GFP_NOFS, "%s%*phN", prefix,
  91                                FS_KEY_DESCRIPTOR_SIZE, descriptor);
  92        if (!description)
  93                return ERR_PTR(-ENOMEM);
  94
  95        key = request_key(&key_type_logon, description, NULL);
  96        kfree(description);
  97        if (IS_ERR(key))
  98                return key;
  99
 100        down_read(&key->sem);
 101        ukp = user_key_payload_locked(key);
 102
 103        if (!ukp) /* was the key revoked before we acquired its semaphore? */
 104                goto invalid;
 105
 106        payload = (const struct fscrypt_key *)ukp->data;
 107
 108        if (ukp->datalen != sizeof(struct fscrypt_key) ||
 109            payload->size < 1 || payload->size > FS_MAX_KEY_SIZE) {
 110                fscrypt_warn(NULL,
 111                             "key with description '%s' has invalid payload",
 112                             key->description);
 113                goto invalid;
 114        }
 115
 116        if (payload->size < min_keysize) {
 117                fscrypt_warn(NULL,
 118                             "key with description '%s' is too short (got %u bytes, need %u+ bytes)",
 119                             key->description, payload->size, min_keysize);
 120                goto invalid;
 121        }
 122
 123        *payload_ret = payload;
 124        return key;
 125
 126invalid:
 127        up_read(&key->sem);
 128        key_put(key);
 129        return ERR_PTR(-ENOKEY);
 130}
 131
 132static struct fscrypt_mode available_modes[] = {
 133        [FS_ENCRYPTION_MODE_AES_256_XTS] = {
 134                .friendly_name = "AES-256-XTS",
 135                .cipher_str = "xts(aes)",
 136                .keysize = 64,
 137                .ivsize = 16,
 138        },
 139        [FS_ENCRYPTION_MODE_AES_256_CTS] = {
 140                .friendly_name = "AES-256-CTS-CBC",
 141                .cipher_str = "cts(cbc(aes))",
 142                .keysize = 32,
 143                .ivsize = 16,
 144        },
 145        [FS_ENCRYPTION_MODE_AES_128_CBC] = {
 146                .friendly_name = "AES-128-CBC",
 147                .cipher_str = "cbc(aes)",
 148                .keysize = 16,
 149                .ivsize = 16,
 150                .needs_essiv = true,
 151        },
 152        [FS_ENCRYPTION_MODE_AES_128_CTS] = {
 153                .friendly_name = "AES-128-CTS-CBC",
 154                .cipher_str = "cts(cbc(aes))",
 155                .keysize = 16,
 156                .ivsize = 16,
 157        },
 158        [FS_ENCRYPTION_MODE_ADIANTUM] = {
 159                .friendly_name = "Adiantum",
 160                .cipher_str = "adiantum(xchacha12,aes)",
 161                .keysize = 32,
 162                .ivsize = 32,
 163        },
 164};
 165
 166static struct fscrypt_mode *
 167select_encryption_mode(const struct fscrypt_info *ci, const struct inode *inode)
 168{
 169        if (!fscrypt_valid_enc_modes(ci->ci_data_mode, ci->ci_filename_mode)) {
 170                fscrypt_warn(inode->i_sb,
 171                             "inode %lu uses unsupported encryption modes (contents mode %d, filenames mode %d)",
 172                             inode->i_ino, ci->ci_data_mode,
 173                             ci->ci_filename_mode);
 174                return ERR_PTR(-EINVAL);
 175        }
 176
 177        if (S_ISREG(inode->i_mode))
 178                return &available_modes[ci->ci_data_mode];
 179
 180        if (S_ISDIR(inode->i_mode) || S_ISLNK(inode->i_mode))
 181                return &available_modes[ci->ci_filename_mode];
 182
 183        WARN_ONCE(1, "fscrypt: filesystem tried to load encryption info for inode %lu, which is not encryptable (file type %d)\n",
 184                  inode->i_ino, (inode->i_mode & S_IFMT));
 185        return ERR_PTR(-EINVAL);
 186}
 187
 188/* Find the master key, then derive the inode's actual encryption key */
 189static int find_and_derive_key(const struct inode *inode,
 190                               const struct fscrypt_context *ctx,
 191                               u8 *derived_key, const struct fscrypt_mode *mode)
 192{
 193        struct key *key;
 194        const struct fscrypt_key *payload;
 195        int err;
 196
 197        key = find_and_lock_process_key(FS_KEY_DESC_PREFIX,
 198                                        ctx->master_key_descriptor,
 199                                        mode->keysize, &payload);
 200        if (key == ERR_PTR(-ENOKEY) && inode->i_sb->s_cop->key_prefix) {
 201                key = find_and_lock_process_key(inode->i_sb->s_cop->key_prefix,
 202                                                ctx->master_key_descriptor,
 203                                                mode->keysize, &payload);
 204        }
 205        if (IS_ERR(key))
 206                return PTR_ERR(key);
 207
 208        if (ctx->flags & FS_POLICY_FLAG_DIRECT_KEY) {
 209                if (mode->ivsize < offsetofend(union fscrypt_iv, nonce)) {
 210                        fscrypt_warn(inode->i_sb,
 211                                     "direct key mode not allowed with %s",
 212                                     mode->friendly_name);
 213                        err = -EINVAL;
 214                } else if (ctx->contents_encryption_mode !=
 215                           ctx->filenames_encryption_mode) {
 216                        fscrypt_warn(inode->i_sb,
 217                                     "direct key mode not allowed with different contents and filenames modes");
 218                        err = -EINVAL;
 219                } else {
 220                        memcpy(derived_key, payload->raw, mode->keysize);
 221                        err = 0;
 222                }
 223        } else {
 224                err = derive_key_aes(payload->raw, ctx, derived_key,
 225                                     mode->keysize);
 226        }
 227        up_read(&key->sem);
 228        key_put(key);
 229        return err;
 230}
 231
 232/* Allocate and key a symmetric cipher object for the given encryption mode */
 233static struct crypto_skcipher *
 234allocate_skcipher_for_mode(struct fscrypt_mode *mode, const u8 *raw_key,
 235                           const struct inode *inode)
 236{
 237        struct crypto_skcipher *tfm;
 238        int err;
 239
 240        tfm = crypto_alloc_skcipher(mode->cipher_str, 0, 0);
 241        if (IS_ERR(tfm)) {
 242                fscrypt_warn(inode->i_sb,
 243                             "error allocating '%s' transform for inode %lu: %ld",
 244                             mode->cipher_str, inode->i_ino, PTR_ERR(tfm));
 245                return tfm;
 246        }
 247        if (unlikely(!mode->logged_impl_name)) {
 248                /*
 249                 * fscrypt performance can vary greatly depending on which
 250                 * crypto algorithm implementation is used.  Help people debug
 251                 * performance problems by logging the ->cra_driver_name the
 252                 * first time a mode is used.  Note that multiple threads can
 253                 * race here, but it doesn't really matter.
 254                 */
 255                mode->logged_impl_name = true;
 256                pr_info("fscrypt: %s using implementation \"%s\"\n",
 257                        mode->friendly_name,
 258                        crypto_skcipher_alg(tfm)->base.cra_driver_name);
 259        }
 260        crypto_skcipher_set_flags(tfm, CRYPTO_TFM_REQ_FORBID_WEAK_KEYS);
 261        err = crypto_skcipher_setkey(tfm, raw_key, mode->keysize);
 262        if (err)
 263                goto err_free_tfm;
 264
 265        return tfm;
 266
 267err_free_tfm:
 268        crypto_free_skcipher(tfm);
 269        return ERR_PTR(err);
 270}
 271
 272/* Master key referenced by FS_POLICY_FLAG_DIRECT_KEY policy */
 273struct fscrypt_master_key {
 274        struct hlist_node mk_node;
 275        refcount_t mk_refcount;
 276        const struct fscrypt_mode *mk_mode;
 277        struct crypto_skcipher *mk_ctfm;
 278        u8 mk_descriptor[FS_KEY_DESCRIPTOR_SIZE];
 279        u8 mk_raw[FS_MAX_KEY_SIZE];
 280};
 281
 282static void free_master_key(struct fscrypt_master_key *mk)
 283{
 284        if (mk) {
 285                crypto_free_skcipher(mk->mk_ctfm);
 286                kzfree(mk);
 287        }
 288}
 289
 290static void put_master_key(struct fscrypt_master_key *mk)
 291{
 292        if (!refcount_dec_and_lock(&mk->mk_refcount, &fscrypt_master_keys_lock))
 293                return;
 294        hash_del(&mk->mk_node);
 295        spin_unlock(&fscrypt_master_keys_lock);
 296
 297        free_master_key(mk);
 298}
 299
 300/*
 301 * Find/insert the given master key into the fscrypt_master_keys table.  If
 302 * found, it is returned with elevated refcount, and 'to_insert' is freed if
 303 * non-NULL.  If not found, 'to_insert' is inserted and returned if it's
 304 * non-NULL; otherwise NULL is returned.
 305 */
 306static struct fscrypt_master_key *
 307find_or_insert_master_key(struct fscrypt_master_key *to_insert,
 308                          const u8 *raw_key, const struct fscrypt_mode *mode,
 309                          const struct fscrypt_info *ci)
 310{
 311        unsigned long hash_key;
 312        struct fscrypt_master_key *mk;
 313
 314        /*
 315         * Careful: to avoid potentially leaking secret key bytes via timing
 316         * information, we must key the hash table by descriptor rather than by
 317         * raw key, and use crypto_memneq() when comparing raw keys.
 318         */
 319
 320        BUILD_BUG_ON(sizeof(hash_key) > FS_KEY_DESCRIPTOR_SIZE);
 321        memcpy(&hash_key, ci->ci_master_key_descriptor, sizeof(hash_key));
 322
 323        spin_lock(&fscrypt_master_keys_lock);
 324        hash_for_each_possible(fscrypt_master_keys, mk, mk_node, hash_key) {
 325                if (memcmp(ci->ci_master_key_descriptor, mk->mk_descriptor,
 326                           FS_KEY_DESCRIPTOR_SIZE) != 0)
 327                        continue;
 328                if (mode != mk->mk_mode)
 329                        continue;
 330                if (crypto_memneq(raw_key, mk->mk_raw, mode->keysize))
 331                        continue;
 332                /* using existing tfm with same (descriptor, mode, raw_key) */
 333                refcount_inc(&mk->mk_refcount);
 334                spin_unlock(&fscrypt_master_keys_lock);
 335                free_master_key(to_insert);
 336                return mk;
 337        }
 338        if (to_insert)
 339                hash_add(fscrypt_master_keys, &to_insert->mk_node, hash_key);
 340        spin_unlock(&fscrypt_master_keys_lock);
 341        return to_insert;
 342}
 343
 344/* Prepare to encrypt directly using the master key in the given mode */
 345static struct fscrypt_master_key *
 346fscrypt_get_master_key(const struct fscrypt_info *ci, struct fscrypt_mode *mode,
 347                       const u8 *raw_key, const struct inode *inode)
 348{
 349        struct fscrypt_master_key *mk;
 350        int err;
 351
 352        /* Is there already a tfm for this key? */
 353        mk = find_or_insert_master_key(NULL, raw_key, mode, ci);
 354        if (mk)
 355                return mk;
 356
 357        /* Nope, allocate one. */
 358        mk = kzalloc(sizeof(*mk), GFP_NOFS);
 359        if (!mk)
 360                return ERR_PTR(-ENOMEM);
 361        refcount_set(&mk->mk_refcount, 1);
 362        mk->mk_mode = mode;
 363        mk->mk_ctfm = allocate_skcipher_for_mode(mode, raw_key, inode);
 364        if (IS_ERR(mk->mk_ctfm)) {
 365                err = PTR_ERR(mk->mk_ctfm);
 366                mk->mk_ctfm = NULL;
 367                goto err_free_mk;
 368        }
 369        memcpy(mk->mk_descriptor, ci->ci_master_key_descriptor,
 370               FS_KEY_DESCRIPTOR_SIZE);
 371        memcpy(mk->mk_raw, raw_key, mode->keysize);
 372
 373        return find_or_insert_master_key(mk, raw_key, mode, ci);
 374
 375err_free_mk:
 376        free_master_key(mk);
 377        return ERR_PTR(err);
 378}
 379
 380static int derive_essiv_salt(const u8 *key, int keysize, u8 *salt)
 381{
 382        struct crypto_shash *tfm = READ_ONCE(essiv_hash_tfm);
 383
 384        /* init hash transform on demand */
 385        if (unlikely(!tfm)) {
 386                struct crypto_shash *prev_tfm;
 387
 388                tfm = crypto_alloc_shash("sha256", 0, 0);
 389                if (IS_ERR(tfm)) {
 390                        fscrypt_warn(NULL,
 391                                     "error allocating SHA-256 transform: %ld",
 392                                     PTR_ERR(tfm));
 393                        return PTR_ERR(tfm);
 394                }
 395                prev_tfm = cmpxchg(&essiv_hash_tfm, NULL, tfm);
 396                if (prev_tfm) {
 397                        crypto_free_shash(tfm);
 398                        tfm = prev_tfm;
 399                }
 400        }
 401
 402        {
 403                SHASH_DESC_ON_STACK(desc, tfm);
 404                desc->tfm = tfm;
 405
 406                return crypto_shash_digest(desc, key, keysize, salt);
 407        }
 408}
 409
 410static int init_essiv_generator(struct fscrypt_info *ci, const u8 *raw_key,
 411                                int keysize)
 412{
 413        int err;
 414        struct crypto_cipher *essiv_tfm;
 415        u8 salt[SHA256_DIGEST_SIZE];
 416
 417        essiv_tfm = crypto_alloc_cipher("aes", 0, 0);
 418        if (IS_ERR(essiv_tfm))
 419                return PTR_ERR(essiv_tfm);
 420
 421        ci->ci_essiv_tfm = essiv_tfm;
 422
 423        err = derive_essiv_salt(raw_key, keysize, salt);
 424        if (err)
 425                goto out;
 426
 427        /*
 428         * Using SHA256 to derive the salt/key will result in AES-256 being
 429         * used for IV generation. File contents encryption will still use the
 430         * configured keysize (AES-128) nevertheless.
 431         */
 432        err = crypto_cipher_setkey(essiv_tfm, salt, sizeof(salt));
 433        if (err)
 434                goto out;
 435
 436out:
 437        memzero_explicit(salt, sizeof(salt));
 438        return err;
 439}
 440
 441void __exit fscrypt_essiv_cleanup(void)
 442{
 443        crypto_free_shash(essiv_hash_tfm);
 444}
 445
 446/*
 447 * Given the encryption mode and key (normally the derived key, but for
 448 * FS_POLICY_FLAG_DIRECT_KEY mode it's the master key), set up the inode's
 449 * symmetric cipher transform object(s).
 450 */
 451static int setup_crypto_transform(struct fscrypt_info *ci,
 452                                  struct fscrypt_mode *mode,
 453                                  const u8 *raw_key, const struct inode *inode)
 454{
 455        struct fscrypt_master_key *mk;
 456        struct crypto_skcipher *ctfm;
 457        int err;
 458
 459        if (ci->ci_flags & FS_POLICY_FLAG_DIRECT_KEY) {
 460                mk = fscrypt_get_master_key(ci, mode, raw_key, inode);
 461                if (IS_ERR(mk))
 462                        return PTR_ERR(mk);
 463                ctfm = mk->mk_ctfm;
 464        } else {
 465                mk = NULL;
 466                ctfm = allocate_skcipher_for_mode(mode, raw_key, inode);
 467                if (IS_ERR(ctfm))
 468                        return PTR_ERR(ctfm);
 469        }
 470        ci->ci_master_key = mk;
 471        ci->ci_ctfm = ctfm;
 472
 473        if (mode->needs_essiv) {
 474                /* ESSIV implies 16-byte IVs which implies !DIRECT_KEY */
 475                WARN_ON(mode->ivsize != AES_BLOCK_SIZE);
 476                WARN_ON(ci->ci_flags & FS_POLICY_FLAG_DIRECT_KEY);
 477
 478                err = init_essiv_generator(ci, raw_key, mode->keysize);
 479                if (err) {
 480                        fscrypt_warn(inode->i_sb,
 481                                     "error initializing ESSIV generator for inode %lu: %d",
 482                                     inode->i_ino, err);
 483                        return err;
 484                }
 485        }
 486        return 0;
 487}
 488
 489static void put_crypt_info(struct fscrypt_info *ci)
 490{
 491        if (!ci)
 492                return;
 493
 494        if (ci->ci_master_key) {
 495                put_master_key(ci->ci_master_key);
 496        } else {
 497                crypto_free_skcipher(ci->ci_ctfm);
 498                crypto_free_cipher(ci->ci_essiv_tfm);
 499        }
 500        kmem_cache_free(fscrypt_info_cachep, ci);
 501}
 502
 503int fscrypt_get_encryption_info(struct inode *inode)
 504{
 505        struct fscrypt_info *crypt_info;
 506        struct fscrypt_context ctx;
 507        struct fscrypt_mode *mode;
 508        u8 *raw_key = NULL;
 509        int res;
 510
 511        if (fscrypt_has_encryption_key(inode))
 512                return 0;
 513
 514        res = fscrypt_initialize(inode->i_sb->s_cop->flags);
 515        if (res)
 516                return res;
 517
 518        res = inode->i_sb->s_cop->get_context(inode, &ctx, sizeof(ctx));
 519        if (res < 0) {
 520                if (!fscrypt_dummy_context_enabled(inode) ||
 521                    IS_ENCRYPTED(inode))
 522                        return res;
 523                /* Fake up a context for an unencrypted directory */
 524                memset(&ctx, 0, sizeof(ctx));
 525                ctx.format = FS_ENCRYPTION_CONTEXT_FORMAT_V1;
 526                ctx.contents_encryption_mode = FS_ENCRYPTION_MODE_AES_256_XTS;
 527                ctx.filenames_encryption_mode = FS_ENCRYPTION_MODE_AES_256_CTS;
 528                memset(ctx.master_key_descriptor, 0x42, FS_KEY_DESCRIPTOR_SIZE);
 529        } else if (res != sizeof(ctx)) {
 530                return -EINVAL;
 531        }
 532
 533        if (ctx.format != FS_ENCRYPTION_CONTEXT_FORMAT_V1)
 534                return -EINVAL;
 535
 536        if (ctx.flags & ~FS_POLICY_FLAGS_VALID)
 537                return -EINVAL;
 538
 539        crypt_info = kmem_cache_zalloc(fscrypt_info_cachep, GFP_NOFS);
 540        if (!crypt_info)
 541                return -ENOMEM;
 542
 543        crypt_info->ci_flags = ctx.flags;
 544        crypt_info->ci_data_mode = ctx.contents_encryption_mode;
 545        crypt_info->ci_filename_mode = ctx.filenames_encryption_mode;
 546        memcpy(crypt_info->ci_master_key_descriptor, ctx.master_key_descriptor,
 547               FS_KEY_DESCRIPTOR_SIZE);
 548        memcpy(crypt_info->ci_nonce, ctx.nonce, FS_KEY_DERIVATION_NONCE_SIZE);
 549
 550        mode = select_encryption_mode(crypt_info, inode);
 551        if (IS_ERR(mode)) {
 552                res = PTR_ERR(mode);
 553                goto out;
 554        }
 555        WARN_ON(mode->ivsize > FSCRYPT_MAX_IV_SIZE);
 556        crypt_info->ci_mode = mode;
 557
 558        /*
 559         * This cannot be a stack buffer because it may be passed to the
 560         * scatterlist crypto API as part of key derivation.
 561         */
 562        res = -ENOMEM;
 563        raw_key = kmalloc(mode->keysize, GFP_NOFS);
 564        if (!raw_key)
 565                goto out;
 566
 567        res = find_and_derive_key(inode, &ctx, raw_key, mode);
 568        if (res)
 569                goto out;
 570
 571        res = setup_crypto_transform(crypt_info, mode, raw_key, inode);
 572        if (res)
 573                goto out;
 574
 575        if (cmpxchg_release(&inode->i_crypt_info, NULL, crypt_info) == NULL)
 576                crypt_info = NULL;
 577out:
 578        if (res == -ENOKEY)
 579                res = 0;
 580        put_crypt_info(crypt_info);
 581        kzfree(raw_key);
 582        return res;
 583}
 584EXPORT_SYMBOL(fscrypt_get_encryption_info);
 585
 586/**
 587 * fscrypt_put_encryption_info - free most of an inode's fscrypt data
 588 *
 589 * Free the inode's fscrypt_info.  Filesystems must call this when the inode is
 590 * being evicted.  An RCU grace period need not have elapsed yet.
 591 */
 592void fscrypt_put_encryption_info(struct inode *inode)
 593{
 594        put_crypt_info(inode->i_crypt_info);
 595        inode->i_crypt_info = NULL;
 596}
 597EXPORT_SYMBOL(fscrypt_put_encryption_info);
 598
 599/**
 600 * fscrypt_free_inode - free an inode's fscrypt data requiring RCU delay
 601 *
 602 * Free the inode's cached decrypted symlink target, if any.  Filesystems must
 603 * call this after an RCU grace period, just before they free the inode.
 604 */
 605void fscrypt_free_inode(struct inode *inode)
 606{
 607        if (IS_ENCRYPTED(inode) && S_ISLNK(inode->i_mode)) {
 608                kfree(inode->i_link);
 609                inode->i_link = NULL;
 610        }
 611}
 612EXPORT_SYMBOL(fscrypt_free_inode);
 613