Commit e933424c authored by Linus Torvalds's avatar Linus Torvalds

Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ecryptfs/ecryptfs-2.6

* 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ecryptfs/ecryptfs-2.6:
  eCryptfs: Fix encrypted file name lookup regression
  ecryptfs: properly mark init functions
  fs/ecryptfs: Return -ENOMEM on memory allocation failure
parents 8f2a0029 93c3fe40
...@@ -1793,7 +1793,7 @@ struct kmem_cache *ecryptfs_key_tfm_cache; ...@@ -1793,7 +1793,7 @@ struct kmem_cache *ecryptfs_key_tfm_cache;
static struct list_head key_tfm_list; static struct list_head key_tfm_list;
struct mutex key_tfm_list_mutex; struct mutex key_tfm_list_mutex;
int ecryptfs_init_crypto(void) int __init ecryptfs_init_crypto(void)
{ {
mutex_init(&key_tfm_list_mutex); mutex_init(&key_tfm_list_mutex);
INIT_LIST_HEAD(&key_tfm_list); INIT_LIST_HEAD(&key_tfm_list);
...@@ -2169,7 +2169,6 @@ int ecryptfs_encrypt_and_encode_filename( ...@@ -2169,7 +2169,6 @@ int ecryptfs_encrypt_and_encode_filename(
(ECRYPTFS_FNEK_ENCRYPTED_FILENAME_PREFIX_SIZE (ECRYPTFS_FNEK_ENCRYPTED_FILENAME_PREFIX_SIZE
+ encoded_name_no_prefix_size); + encoded_name_no_prefix_size);
(*encoded_name)[(*encoded_name_size)] = '\0'; (*encoded_name)[(*encoded_name_size)] = '\0';
(*encoded_name_size)++;
} else { } else {
rc = -EOPNOTSUPP; rc = -EOPNOTSUPP;
} }
......
...@@ -349,7 +349,7 @@ int ecryptfs_lookup_and_interpose_lower(struct dentry *ecryptfs_dentry, ...@@ -349,7 +349,7 @@ int ecryptfs_lookup_and_interpose_lower(struct dentry *ecryptfs_dentry,
/** /**
* ecryptfs_new_lower_dentry * ecryptfs_new_lower_dentry
* @ename: The name of the new dentry. * @name: The name of the new dentry.
* @lower_dir_dentry: Parent directory of the new dentry. * @lower_dir_dentry: Parent directory of the new dentry.
* @nd: nameidata from last lookup. * @nd: nameidata from last lookup.
* *
...@@ -386,20 +386,19 @@ ecryptfs_new_lower_dentry(struct qstr *name, struct dentry *lower_dir_dentry, ...@@ -386,20 +386,19 @@ ecryptfs_new_lower_dentry(struct qstr *name, struct dentry *lower_dir_dentry,
* ecryptfs_lookup_one_lower * ecryptfs_lookup_one_lower
* @ecryptfs_dentry: The eCryptfs dentry that we are looking up * @ecryptfs_dentry: The eCryptfs dentry that we are looking up
* @lower_dir_dentry: lower parent directory * @lower_dir_dentry: lower parent directory
* @name: lower file name
* *
* Get the lower dentry from vfs. If lower dentry does not exist yet, * Get the lower dentry from vfs. If lower dentry does not exist yet,
* create it. * create it.
*/ */
static struct dentry * static struct dentry *
ecryptfs_lookup_one_lower(struct dentry *ecryptfs_dentry, ecryptfs_lookup_one_lower(struct dentry *ecryptfs_dentry,
struct dentry *lower_dir_dentry) struct dentry *lower_dir_dentry, struct qstr *name)
{ {
struct nameidata nd; struct nameidata nd;
struct vfsmount *lower_mnt; struct vfsmount *lower_mnt;
struct qstr *name;
int err; int err;
name = &ecryptfs_dentry->d_name;
lower_mnt = mntget(ecryptfs_dentry_to_lower_mnt( lower_mnt = mntget(ecryptfs_dentry_to_lower_mnt(
ecryptfs_dentry->d_parent)); ecryptfs_dentry->d_parent));
err = vfs_path_lookup(lower_dir_dentry, lower_mnt, name->name , 0, &nd); err = vfs_path_lookup(lower_dir_dentry, lower_mnt, name->name , 0, &nd);
...@@ -434,6 +433,7 @@ static struct dentry *ecryptfs_lookup(struct inode *ecryptfs_dir_inode, ...@@ -434,6 +433,7 @@ static struct dentry *ecryptfs_lookup(struct inode *ecryptfs_dir_inode,
size_t encrypted_and_encoded_name_size; size_t encrypted_and_encoded_name_size;
struct ecryptfs_mount_crypt_stat *mount_crypt_stat = NULL; struct ecryptfs_mount_crypt_stat *mount_crypt_stat = NULL;
struct dentry *lower_dir_dentry, *lower_dentry; struct dentry *lower_dir_dentry, *lower_dentry;
struct qstr lower_name;
int rc = 0; int rc = 0;
ecryptfs_dentry->d_op = &ecryptfs_dops; ecryptfs_dentry->d_op = &ecryptfs_dops;
...@@ -444,9 +444,17 @@ static struct dentry *ecryptfs_lookup(struct inode *ecryptfs_dir_inode, ...@@ -444,9 +444,17 @@ static struct dentry *ecryptfs_lookup(struct inode *ecryptfs_dir_inode,
goto out_d_drop; goto out_d_drop;
} }
lower_dir_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry->d_parent); lower_dir_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry->d_parent);
lower_name.name = ecryptfs_dentry->d_name.name;
lower_name.len = ecryptfs_dentry->d_name.len;
lower_name.hash = ecryptfs_dentry->d_name.hash;
if (lower_dir_dentry->d_op && lower_dir_dentry->d_op->d_hash) {
rc = lower_dir_dentry->d_op->d_hash(lower_dir_dentry,
&lower_name);
if (rc < 0)
goto out_d_drop;
}
lower_dentry = ecryptfs_lookup_one_lower(ecryptfs_dentry, lower_dentry = ecryptfs_lookup_one_lower(ecryptfs_dentry,
lower_dir_dentry); lower_dir_dentry, &lower_name);
if (IS_ERR(lower_dentry)) { if (IS_ERR(lower_dentry)) {
rc = PTR_ERR(lower_dentry); rc = PTR_ERR(lower_dentry);
ecryptfs_printk(KERN_DEBUG, "%s: lookup_one_lower() returned " ecryptfs_printk(KERN_DEBUG, "%s: lookup_one_lower() returned "
...@@ -471,8 +479,17 @@ static struct dentry *ecryptfs_lookup(struct inode *ecryptfs_dir_inode, ...@@ -471,8 +479,17 @@ static struct dentry *ecryptfs_lookup(struct inode *ecryptfs_dir_inode,
"filename; rc = [%d]\n", __func__, rc); "filename; rc = [%d]\n", __func__, rc);
goto out_d_drop; goto out_d_drop;
} }
lower_name.name = encrypted_and_encoded_name;
lower_name.len = encrypted_and_encoded_name_size;
lower_name.hash = full_name_hash(lower_name.name, lower_name.len);
if (lower_dir_dentry->d_op && lower_dir_dentry->d_op->d_hash) {
rc = lower_dir_dentry->d_op->d_hash(lower_dir_dentry,
&lower_name);
if (rc < 0)
goto out_d_drop;
}
lower_dentry = ecryptfs_lookup_one_lower(ecryptfs_dentry, lower_dentry = ecryptfs_lookup_one_lower(ecryptfs_dentry,
lower_dir_dentry); lower_dir_dentry, &lower_name);
if (IS_ERR(lower_dentry)) { if (IS_ERR(lower_dentry)) {
rc = PTR_ERR(lower_dentry); rc = PTR_ERR(lower_dentry);
ecryptfs_printk(KERN_DEBUG, "%s: lookup_one_lower() returned " ecryptfs_printk(KERN_DEBUG, "%s: lookup_one_lower() returned "
......
...@@ -515,6 +515,7 @@ ecryptfs_write_tag_70_packet(char *dest, size_t *remaining_bytes, ...@@ -515,6 +515,7 @@ ecryptfs_write_tag_70_packet(char *dest, size_t *remaining_bytes,
if (!s) { if (!s) {
printk(KERN_ERR "%s: Out of memory whilst trying to kmalloc " printk(KERN_ERR "%s: Out of memory whilst trying to kmalloc "
"[%zd] bytes of kernel memory\n", __func__, sizeof(*s)); "[%zd] bytes of kernel memory\n", __func__, sizeof(*s));
rc = -ENOMEM;
goto out; goto out;
} }
s->desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP; s->desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP;
...@@ -806,6 +807,7 @@ ecryptfs_parse_tag_70_packet(char **filename, size_t *filename_size, ...@@ -806,6 +807,7 @@ ecryptfs_parse_tag_70_packet(char **filename, size_t *filename_size,
if (!s) { if (!s) {
printk(KERN_ERR "%s: Out of memory whilst trying to kmalloc " printk(KERN_ERR "%s: Out of memory whilst trying to kmalloc "
"[%zd] bytes of kernel memory\n", __func__, sizeof(*s)); "[%zd] bytes of kernel memory\n", __func__, sizeof(*s));
rc = -ENOMEM;
goto out; goto out;
} }
s->desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP; s->desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP;
......
...@@ -86,7 +86,7 @@ static int ecryptfs_threadfn(void *ignored) ...@@ -86,7 +86,7 @@ static int ecryptfs_threadfn(void *ignored)
return 0; return 0;
} }
int ecryptfs_init_kthread(void) int __init ecryptfs_init_kthread(void)
{ {
int rc = 0; int rc = 0;
......
...@@ -473,7 +473,7 @@ int ecryptfs_wait_for_response(struct ecryptfs_msg_ctx *msg_ctx, ...@@ -473,7 +473,7 @@ int ecryptfs_wait_for_response(struct ecryptfs_msg_ctx *msg_ctx,
return rc; return rc;
} }
int ecryptfs_init_messaging(void) int __init ecryptfs_init_messaging(void)
{ {
int i; int i;
int rc = 0; int rc = 0;
......
...@@ -500,7 +500,7 @@ static struct miscdevice ecryptfs_miscdev = { ...@@ -500,7 +500,7 @@ static struct miscdevice ecryptfs_miscdev = {
* *
* Returns zero on success; non-zero otherwise * Returns zero on success; non-zero otherwise
*/ */
int ecryptfs_init_ecryptfs_miscdev(void) int __init ecryptfs_init_ecryptfs_miscdev(void)
{ {
int rc; int rc;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment