Skip to content

Commit fa6e951

Browse files
committed
Merge tag 'ecryptfs-5.3-rc1-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/tyhicks/ecryptfs
Pull eCryptfs updates from Tyler Hicks: - Fix error handling when ecryptfs_read_lower() encounters an error - Fix read-only file creation when the eCryptfs mount is configured to store metadata in xattrs - Minor code cleanups * tag 'ecryptfs-5.3-rc1-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/tyhicks/ecryptfs: ecryptfs: Change return type of ecryptfs_process_flags ecryptfs: Make ecryptfs_xattr_handler static ecryptfs: remove unnessesary null check in ecryptfs_keyring_auth_tok_for_sig ecryptfs: use print_hex_dump_bytes for hexdump eCryptfs: fix permission denied with ecryptfs_xattr mount option when create readonly file ecryptfs: re-order a condition for static checkers eCryptfs: fix a couple type promotion bugs
2 parents a318423 + 7451c54 commit fa6e951

File tree

4 files changed

+34
-41
lines changed

4 files changed

+34
-41
lines changed

fs/ecryptfs/crypto.c

Lines changed: 25 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@
2323
#include <linux/slab.h>
2424
#include <asm/unaligned.h>
2525
#include <linux/kernel.h>
26+
#include <linux/xattr.h>
2627
#include "ecryptfs_kernel.h"
2728

2829
#define DECRYPT 0
@@ -860,13 +861,10 @@ static struct ecryptfs_flag_map_elem ecryptfs_flag_map[] = {
860861
* @crypt_stat: The cryptographic context
861862
* @page_virt: Source data to be parsed
862863
* @bytes_read: Updated with the number of bytes read
863-
*
864-
* Returns zero on success; non-zero if the flag set is invalid
865864
*/
866-
static int ecryptfs_process_flags(struct ecryptfs_crypt_stat *crypt_stat,
865+
static void ecryptfs_process_flags(struct ecryptfs_crypt_stat *crypt_stat,
867866
char *page_virt, int *bytes_read)
868867
{
869-
int rc = 0;
870868
int i;
871869
u32 flags;
872870

@@ -879,7 +877,6 @@ static int ecryptfs_process_flags(struct ecryptfs_crypt_stat *crypt_stat,
879877
/* Version is in top 8 bits of the 32-bit flag vector */
880878
crypt_stat->file_version = ((flags >> 24) & 0xFF);
881879
(*bytes_read) = 4;
882-
return rc;
883880
}
884881

885882
/**
@@ -1004,8 +1001,10 @@ int ecryptfs_read_and_validate_header_region(struct inode *inode)
10041001

10051002
rc = ecryptfs_read_lower(file_size, 0, ECRYPTFS_SIZE_AND_MARKER_BYTES,
10061003
inode);
1007-
if (rc < ECRYPTFS_SIZE_AND_MARKER_BYTES)
1008-
return rc >= 0 ? -EINVAL : rc;
1004+
if (rc < 0)
1005+
return rc;
1006+
else if (rc < ECRYPTFS_SIZE_AND_MARKER_BYTES)
1007+
return -EINVAL;
10091008
rc = ecryptfs_validate_marker(marker);
10101009
if (!rc)
10111010
ecryptfs_i_size_init(file_size, inode);
@@ -1115,9 +1114,21 @@ ecryptfs_write_metadata_to_xattr(struct dentry *ecryptfs_dentry,
11151114
char *page_virt, size_t size)
11161115
{
11171116
int rc;
1117+
struct dentry *lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry);
1118+
struct inode *lower_inode = d_inode(lower_dentry);
11181119

1119-
rc = ecryptfs_setxattr(ecryptfs_dentry, ecryptfs_inode,
1120-
ECRYPTFS_XATTR_NAME, page_virt, size, 0);
1120+
if (!(lower_inode->i_opflags & IOP_XATTR)) {
1121+
rc = -EOPNOTSUPP;
1122+
goto out;
1123+
}
1124+
1125+
inode_lock(lower_inode);
1126+
rc = __vfs_setxattr(lower_dentry, lower_inode, ECRYPTFS_XATTR_NAME,
1127+
page_virt, size, 0);
1128+
if (!rc && ecryptfs_inode)
1129+
fsstack_copy_attr_all(ecryptfs_inode, lower_inode);
1130+
inode_unlock(lower_inode);
1131+
out:
11211132
return rc;
11221133
}
11231134

@@ -1291,12 +1302,7 @@ static int ecryptfs_read_headers_virt(char *page_virt,
12911302
if (!(crypt_stat->flags & ECRYPTFS_I_SIZE_INITIALIZED))
12921303
ecryptfs_i_size_init(page_virt, d_inode(ecryptfs_dentry));
12931304
offset += MAGIC_ECRYPTFS_MARKER_SIZE_BYTES;
1294-
rc = ecryptfs_process_flags(crypt_stat, (page_virt + offset),
1295-
&bytes_read);
1296-
if (rc) {
1297-
ecryptfs_printk(KERN_WARNING, "Error processing flags\n");
1298-
goto out;
1299-
}
1305+
ecryptfs_process_flags(crypt_stat, (page_virt + offset), &bytes_read);
13001306
if (crypt_stat->file_version > ECRYPTFS_SUPPORTED_FILE_VERSION) {
13011307
ecryptfs_printk(KERN_WARNING, "File version is [%d]; only "
13021308
"file version [%d] is supported by this "
@@ -1367,8 +1373,10 @@ int ecryptfs_read_and_validate_xattr_region(struct dentry *dentry,
13671373
ecryptfs_inode_to_lower(inode),
13681374
ECRYPTFS_XATTR_NAME, file_size,
13691375
ECRYPTFS_SIZE_AND_MARKER_BYTES);
1370-
if (rc < ECRYPTFS_SIZE_AND_MARKER_BYTES)
1371-
return rc >= 0 ? -EINVAL : rc;
1376+
if (rc < 0)
1377+
return rc;
1378+
else if (rc < ECRYPTFS_SIZE_AND_MARKER_BYTES)
1379+
return -EINVAL;
13721380
rc = ecryptfs_validate_marker(marker);
13731381
if (!rc)
13741382
ecryptfs_i_size_init(file_size, inode);

fs/ecryptfs/debug.c

Lines changed: 3 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -83,25 +83,9 @@ void ecryptfs_dump_auth_tok(struct ecryptfs_auth_tok *auth_tok)
8383
*/
8484
void ecryptfs_dump_hex(char *data, int bytes)
8585
{
86-
int i = 0;
87-
int add_newline = 1;
88-
8986
if (ecryptfs_verbosity < 1)
9087
return;
91-
if (bytes != 0) {
92-
printk(KERN_DEBUG "0x%.2x.", (unsigned char)data[i]);
93-
i++;
94-
}
95-
while (i < bytes) {
96-
printk("0x%.2x.", (unsigned char)data[i]);
97-
i++;
98-
if (i % 16 == 0) {
99-
printk("\n");
100-
add_newline = 0;
101-
} else
102-
add_newline = 1;
103-
}
104-
if (add_newline)
105-
printk("\n");
106-
}
10788

89+
print_hex_dump(KERN_DEBUG, "ecryptfs: ", DUMP_PREFIX_OFFSET, 16, 1,
90+
data, bytes, false);
91+
}

fs/ecryptfs/inode.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1121,7 +1121,7 @@ static int ecryptfs_xattr_set(const struct xattr_handler *handler,
11211121
}
11221122
}
11231123

1124-
const struct xattr_handler ecryptfs_xattr_handler = {
1124+
static const struct xattr_handler ecryptfs_xattr_handler = {
11251125
.prefix = "", /* match anything */
11261126
.get = ecryptfs_xattr_get,
11271127
.set = ecryptfs_xattr_set,

fs/ecryptfs/keystore.c

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1048,8 +1048,9 @@ ecryptfs_parse_tag_70_packet(char **filename, size_t *filename_size,
10481048
"rc = [%d]\n", __func__, rc);
10491049
goto out_free_unlock;
10501050
}
1051-
while (s->decrypted_filename[s->i] != '\0'
1052-
&& s->i < s->block_aligned_filename_size)
1051+
1052+
while (s->i < s->block_aligned_filename_size &&
1053+
s->decrypted_filename[s->i] != '\0')
10531054
s->i++;
10541055
if (s->i == s->block_aligned_filename_size) {
10551056
printk(KERN_WARNING "%s: Invalid tag 70 packet; could not "
@@ -1611,9 +1612,9 @@ int ecryptfs_keyring_auth_tok_for_sig(struct key **auth_tok_key,
16111612
int rc = 0;
16121613

16131614
(*auth_tok_key) = request_key(&key_type_user, sig, NULL);
1614-
if (!(*auth_tok_key) || IS_ERR(*auth_tok_key)) {
1615+
if (IS_ERR(*auth_tok_key)) {
16151616
(*auth_tok_key) = ecryptfs_get_encrypted_key(sig);
1616-
if (!(*auth_tok_key) || IS_ERR(*auth_tok_key)) {
1617+
if (IS_ERR(*auth_tok_key)) {
16171618
printk(KERN_ERR "Could not find key with description: [%s]\n",
16181619
sig);
16191620
rc = process_request_key_err(PTR_ERR(*auth_tok_key));

0 commit comments

Comments
 (0)