eCryptfs: Rename ecryptfs_crypt_stat.num_header_bytes_at_front

This patch renames the num_header_bytes_at_front variable to
metadata_size since it now contains the max size of the metadata.

Reviewed-by: Eric Sandeen <sandeen@redhat.com>
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>

+15 -20
+10 -14
fs/ecryptfs/crypto.c
··· 834 set_extent_mask_and_shift(crypt_stat); 835 crypt_stat->iv_bytes = ECRYPTFS_DEFAULT_IV_BYTES; 836 if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) 837 - crypt_stat->num_header_bytes_at_front = 838 - ECRYPTFS_MINIMUM_HEADER_EXTENT_SIZE; 839 else { 840 if (PAGE_CACHE_SIZE <= ECRYPTFS_MINIMUM_HEADER_EXTENT_SIZE) 841 - crypt_stat->num_header_bytes_at_front = 842 ECRYPTFS_MINIMUM_HEADER_EXTENT_SIZE; 843 else 844 - crypt_stat->num_header_bytes_at_front = PAGE_CACHE_SIZE; 845 } 846 } 847 ··· 1237 1238 header_extent_size = (u32)crypt_stat->extent_size; 1239 num_header_extents_at_front = 1240 - (u16)(crypt_stat->num_header_bytes_at_front 1241 - / crypt_stat->extent_size); 1242 put_unaligned_be32(header_extent_size, virt); 1243 virt += 4; 1244 put_unaligned_be16(num_header_extents_at_front, virt); ··· 1380 rc = -EINVAL; 1381 goto out; 1382 } 1383 - virt_len = crypt_stat->num_header_bytes_at_front; 1384 order = get_order(virt_len); 1385 /* Released in this function */ 1386 virt = (char *)ecryptfs_get_zeroed_pages(GFP_KERNEL, order); ··· 1426 header_extent_size = get_unaligned_be32(virt); 1427 virt += sizeof(__be32); 1428 num_header_extents_at_front = get_unaligned_be16(virt); 1429 - crypt_stat->num_header_bytes_at_front = 1430 - (((size_t)num_header_extents_at_front 1431 - * (size_t)header_extent_size)); 1432 (*bytes_read) = (sizeof(__be32) + sizeof(__be16)); 1433 if ((validate_header_size == ECRYPTFS_VALIDATE_HEADER_SIZE) 1434 - && (crypt_stat->num_header_bytes_at_front 1435 < ECRYPTFS_MINIMUM_HEADER_EXTENT_SIZE)) { 1436 rc = -EINVAL; 1437 printk(KERN_WARNING "Invalid header size: [%zd]\n", 1438 - crypt_stat->num_header_bytes_at_front); 1439 } 1440 return rc; 1441 } ··· 1449 */ 1450 static void set_default_header_data(struct ecryptfs_crypt_stat *crypt_stat) 1451 { 1452 - crypt_stat->num_header_bytes_at_front = 1453 - ECRYPTFS_MINIMUM_HEADER_EXTENT_SIZE; 1454 } 1455 1456 /**
··· 834 set_extent_mask_and_shift(crypt_stat); 835 crypt_stat->iv_bytes = ECRYPTFS_DEFAULT_IV_BYTES; 836 if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) 837 + crypt_stat->metadata_size = ECRYPTFS_MINIMUM_HEADER_EXTENT_SIZE; 838 else { 839 if (PAGE_CACHE_SIZE <= ECRYPTFS_MINIMUM_HEADER_EXTENT_SIZE) 840 + crypt_stat->metadata_size = 841 ECRYPTFS_MINIMUM_HEADER_EXTENT_SIZE; 842 else 843 + crypt_stat->metadata_size = PAGE_CACHE_SIZE; 844 } 845 } 846 ··· 1238 1239 header_extent_size = (u32)crypt_stat->extent_size; 1240 num_header_extents_at_front = 1241 + (u16)(crypt_stat->metadata_size / crypt_stat->extent_size); 1242 put_unaligned_be32(header_extent_size, virt); 1243 virt += 4; 1244 put_unaligned_be16(num_header_extents_at_front, virt); ··· 1382 rc = -EINVAL; 1383 goto out; 1384 } 1385 + virt_len = crypt_stat->metadata_size; 1386 order = get_order(virt_len); 1387 /* Released in this function */ 1388 virt = (char *)ecryptfs_get_zeroed_pages(GFP_KERNEL, order); ··· 1428 header_extent_size = get_unaligned_be32(virt); 1429 virt += sizeof(__be32); 1430 num_header_extents_at_front = get_unaligned_be16(virt); 1431 + crypt_stat->metadata_size = (((size_t)num_header_extents_at_front 1432 + * (size_t)header_extent_size)); 1433 (*bytes_read) = (sizeof(__be32) + sizeof(__be16)); 1434 if ((validate_header_size == ECRYPTFS_VALIDATE_HEADER_SIZE) 1435 + && (crypt_stat->metadata_size 1436 < ECRYPTFS_MINIMUM_HEADER_EXTENT_SIZE)) { 1437 rc = -EINVAL; 1438 printk(KERN_WARNING "Invalid header size: [%zd]\n", 1439 + crypt_stat->metadata_size); 1440 } 1441 return rc; 1442 } ··· 1452 */ 1453 static void set_default_header_data(struct ecryptfs_crypt_stat *crypt_stat) 1454 { 1455 + crypt_stat->metadata_size = ECRYPTFS_MINIMUM_HEADER_EXTENT_SIZE; 1456 } 1457 1458 /**
+2 -2
fs/ecryptfs/ecryptfs_kernel.h
··· 273 u32 flags; 274 unsigned int file_version; 275 size_t iv_bytes; 276 - size_t num_header_bytes_at_front; 277 size_t extent_size; /* Data extent size; default is 4096 */ 278 size_t key_size; 279 size_t extent_shift; ··· 469 { 470 if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) 471 return 0; 472 - return crypt_stat->num_header_bytes_at_front; 473 } 474 475 static inline struct ecryptfs_file_info *
··· 273 u32 flags; 274 unsigned int file_version; 275 size_t iv_bytes; 276 + size_t metadata_size; 277 size_t extent_size; /* Data extent size; default is 4096 */ 278 size_t key_size; 279 size_t extent_shift; ··· 469 { 470 if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) 471 return 0; 472 + return crypt_stat->metadata_size; 473 } 474 475 static inline struct ecryptfs_file_info *
+1 -1
fs/ecryptfs/inode.c
··· 335 ecryptfs_dentry->d_sb)->mount_crypt_stat; 336 if (mount_crypt_stat->flags & ECRYPTFS_ENCRYPTED_VIEW_ENABLED) { 337 if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) 338 - file_size = (crypt_stat->num_header_bytes_at_front 339 + i_size_read(lower_dentry->d_inode)); 340 else 341 file_size = i_size_read(lower_dentry->d_inode);
··· 335 ecryptfs_dentry->d_sb)->mount_crypt_stat; 336 if (mount_crypt_stat->flags & ECRYPTFS_ENCRYPTED_VIEW_ENABLED) { 337 if (crypt_stat->flags & ECRYPTFS_METADATA_IN_XATTR) 338 + file_size = (crypt_stat->metadata_size 339 + i_size_read(lower_dentry->d_inode)); 340 else 341 file_size = i_size_read(lower_dentry->d_inode);
+2 -3
fs/ecryptfs/mmap.c
··· 122 * num_extents_per_page) 123 + extent_num_in_page); 124 size_t num_header_extents_at_front = 125 - (crypt_stat->num_header_bytes_at_front 126 - / crypt_stat->extent_size); 127 128 if (view_extent_num < num_header_extents_at_front) { 129 /* This is a header extent */ ··· 151 /* This is an encrypted data extent */ 152 loff_t lower_offset = 153 ((view_extent_num * crypt_stat->extent_size) 154 - - crypt_stat->num_header_bytes_at_front); 155 156 rc = ecryptfs_read_lower_page_segment( 157 page, (lower_offset >> PAGE_CACHE_SHIFT),
··· 122 * num_extents_per_page) 123 + extent_num_in_page); 124 size_t num_header_extents_at_front = 125 + (crypt_stat->metadata_size / crypt_stat->extent_size); 126 127 if (view_extent_num < num_header_extents_at_front) { 128 /* This is a header extent */ ··· 152 /* This is an encrypted data extent */ 153 loff_t lower_offset = 154 ((view_extent_num * crypt_stat->extent_size) 155 + - crypt_stat->metadata_size); 156 157 rc = ecryptfs_read_lower_page_segment( 158 page, (lower_offset >> PAGE_CACHE_SHIFT),