1. 29 10月, 2010 4 次提交
    • R
      ecryptfs: checking return code of ecryptfs_find_auth_tok_for_sig() · 39fac853
      Roberto Sassu 提交于
      This patch replaces the check of the 'matching_auth_tok' pointer with
      the exit status of ecryptfs_find_auth_tok_for_sig().
      This avoids to use authentication tokens obtained through the function
      ecryptfs_keyring_auth_tok_for_sig which are not valid.
      Signed-off-by: NRoberto Sassu <roberto.sassu@polito.it>
      Cc: Dustin Kirkland <kirkland@canonical.com>
      Cc: James Morris <jmorris@namei.org>
      Signed-off-by: NTyler Hicks <tyhicks@linux.vnet.ibm.com>
      39fac853
    • R
      ecryptfs: release keys loaded in ecryptfs_keyring_auth_tok_for_sig() · aee683b9
      Roberto Sassu 提交于
      This patch allows keys requested in the function
      ecryptfs_keyring_auth_tok_for_sig()to be released when they are no
      longer required. In particular keys are directly released in the same
      function if the obtained authentication token is not valid.
      
      Further, a new function parameter 'auth_tok_key' has been added to
      ecryptfs_find_auth_tok_for_sig() in order to provide callers the key
      pointer to be passed to key_put().
      Signed-off-by: NRoberto Sassu <roberto.sassu@polito.it>
      Cc: Dustin Kirkland <kirkland@canonical.com>
      Cc: James Morris <jmorris@namei.org>
      [Tyler: Initialize auth_tok_key to NULL in ecryptfs_parse_packet_set]
      Signed-off-by: NTyler Hicks <tyhicks@linux.vnet.ibm.com>
      aee683b9
    • T
      eCryptfs: Clear LOOKUP_OPEN flag when creating lower file · 2e21b3f1
      Tyler Hicks 提交于
      eCryptfs was passing the LOOKUP_OPEN flag through to the lower file
      system, even though ecryptfs_create() doesn't support the flag. A valid
      filp for the lower filesystem could be returned in the nameidata if the
      lower file system's create() function supported LOOKUP_OPEN, possibly
      resulting in unencrypted writes to the lower file.
      
      However, this is only a potential problem in filesystems (FUSE, NFS,
      CIFS, CEPH, 9p) that eCryptfs isn't known to support today.
      
      https://bugs.launchpad.net/ecryptfs/+bug/641703
      
      Reported-by: Kevin Buhr
      Cc: stable <stable@kernel.org>
      Signed-off-by: NTyler Hicks <tyhicks@linux.vnet.ibm.com>
      2e21b3f1
    • R
      ecryptfs: call vfs_setxattr() in ecryptfs_setxattr() · 48b512e6
      Roberto Sassu 提交于
      Ecryptfs is a stackable filesystem which relies on lower filesystems the
      ability of setting/getting extended attributes.
      
      If there is a security module enabled on the system it updates the
      'security' field of inodes according to the owned extended attribute set
      with the function vfs_setxattr().  When this function is performed on a
      ecryptfs filesystem the 'security' field is not updated for the lower
      filesystem since the call security_inode_post_setxattr() is missing for
      the lower inode.
      Further, the call security_inode_setxattr() is missing for the lower inode,
      leading to policy violations in the security module because specific
      checks for this hook are not performed (i. e. filesystem
      'associate' permission on SELinux is not checked for the lower filesystem).
      
      This patch replaces the call of the setxattr() method of the lower inode
      in the function ecryptfs_setxattr() with vfs_setxattr().
      Signed-off-by: NRoberto Sassu <roberto.sassu@polito.it>
      Cc: stable <stable@kernel.org>
      Cc: Dustin Kirkland <kirkland@canonical.com>
      Acked-by: NJames Morris <jmorris@namei.org>
      Signed-off-by: NTyler Hicks <tyhicks@linux.vnet.ibm.com>
      48b512e6
  2. 21 10月, 2010 5 次提交
  3. 20 10月, 2010 7 次提交
  4. 19 10月, 2010 6 次提交
  5. 18 10月, 2010 14 次提交
  6. 17 10月, 2010 2 次提交
  7. 16 10月, 2010 2 次提交