From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
stable@vger.kernel.org, Tyler Hicks <tyhicks@canonical.com>,
Priya Bansal <p.bansal@samsung.com>
Subject: [PATCH 3.17 66/73] eCryptfs: Force RO mount when encrypted view is enabled
Date: Tue, 6 Jan 2015 18:16:27 -0800 [thread overview]
Message-ID: <20150107021559.536135082@linuxfoundation.org> (raw)
In-Reply-To: <20150107021557.521276020@linuxfoundation.org>
3.17-stable review patch. If anyone has any objections, please let me know.
------------------
From: Tyler Hicks <tyhicks@canonical.com>
commit 332b122d39c9cbff8b799007a825d94b2e7c12f2 upstream.
The ecryptfs_encrypted_view mount option greatly changes the
functionality of an eCryptfs mount. Instead of encrypting and decrypting
lower files, it provides a unified view of the encrypted files in the
lower filesystem. The presence of the ecryptfs_encrypted_view mount
option is intended to force a read-only mount and modifying files is not
supported when the feature is in use. See the following commit for more
information:
e77a56d [PATCH] eCryptfs: Encrypted passthrough
This patch forces the mount to be read-only when the
ecryptfs_encrypted_view mount option is specified by setting the
MS_RDONLY flag on the superblock. Additionally, this patch removes some
broken logic in ecryptfs_open() that attempted to prevent modifications
of files when the encrypted view feature was in use. The check in
ecryptfs_open() was not sufficient to prevent file modifications using
system calls that do not operate on a file descriptor.
Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
Reported-by: Priya Bansal <p.bansal@samsung.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
fs/ecryptfs/file.c | 12 ------------
fs/ecryptfs/main.c | 16 +++++++++++++---
2 files changed, 13 insertions(+), 15 deletions(-)
--- a/fs/ecryptfs/file.c
+++ b/fs/ecryptfs/file.c
@@ -190,23 +190,11 @@ static int ecryptfs_open(struct inode *i
{
int rc = 0;
struct ecryptfs_crypt_stat *crypt_stat = NULL;
- struct ecryptfs_mount_crypt_stat *mount_crypt_stat;
struct dentry *ecryptfs_dentry = file->f_path.dentry;
/* Private value of ecryptfs_dentry allocated in
* ecryptfs_lookup() */
struct ecryptfs_file_info *file_info;
- mount_crypt_stat = &ecryptfs_superblock_to_private(
- ecryptfs_dentry->d_sb)->mount_crypt_stat;
- if ((mount_crypt_stat->flags & ECRYPTFS_ENCRYPTED_VIEW_ENABLED)
- && ((file->f_flags & O_WRONLY) || (file->f_flags & O_RDWR)
- || (file->f_flags & O_CREAT) || (file->f_flags & O_TRUNC)
- || (file->f_flags & O_APPEND))) {
- printk(KERN_WARNING "Mount has encrypted view enabled; "
- "files may only be read\n");
- rc = -EPERM;
- goto out;
- }
/* Released in ecryptfs_release or end of function if failure */
file_info = kmem_cache_zalloc(ecryptfs_file_info_cache, GFP_KERNEL);
ecryptfs_set_file_private(file, file_info);
--- a/fs/ecryptfs/main.c
+++ b/fs/ecryptfs/main.c
@@ -493,6 +493,7 @@ static struct dentry *ecryptfs_mount(str
{
struct super_block *s;
struct ecryptfs_sb_info *sbi;
+ struct ecryptfs_mount_crypt_stat *mount_crypt_stat;
struct ecryptfs_dentry_info *root_info;
const char *err = "Getting sb failed";
struct inode *inode;
@@ -511,6 +512,7 @@ static struct dentry *ecryptfs_mount(str
err = "Error parsing options";
goto out;
}
+ mount_crypt_stat = &sbi->mount_crypt_stat;
s = sget(fs_type, NULL, set_anon_super, flags, NULL);
if (IS_ERR(s)) {
@@ -557,11 +559,19 @@ static struct dentry *ecryptfs_mount(str
/**
* Set the POSIX ACL flag based on whether they're enabled in the lower
- * mount. Force a read-only eCryptfs mount if the lower mount is ro.
- * Allow a ro eCryptfs mount even when the lower mount is rw.
+ * mount.
*/
s->s_flags = flags & ~MS_POSIXACL;
- s->s_flags |= path.dentry->d_sb->s_flags & (MS_RDONLY | MS_POSIXACL);
+ s->s_flags |= path.dentry->d_sb->s_flags & MS_POSIXACL;
+
+ /**
+ * Force a read-only eCryptfs mount when:
+ * 1) The lower mount is ro
+ * 2) The ecryptfs_encrypted_view mount option is specified
+ */
+ if (path.dentry->d_sb->s_flags & MS_RDONLY ||
+ mount_crypt_stat->flags & ECRYPTFS_ENCRYPTED_VIEW_ENABLED)
+ s->s_flags |= MS_RDONLY;
s->s_maxbytes = path.dentry->d_sb->s_maxbytes;
s->s_blocksize = path.dentry->d_sb->s_blocksize;
next prev parent reply other threads:[~2015-01-07 2:18 UTC|newest]
Thread overview: 75+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-01-07 2:15 [PATCH 3.17 00/73] 3.17.8-stable review Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 01/73] isofs: Fix infinite looping over CE entries Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 02/73] x86/tls: Validate TLS entries to protect espfix Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 03/73] x86/tls: Disallow unusual TLS segments Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 04/73] x86_64, switch_to(): Load TLS descriptors before switching DS and ES Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 05/73] x86, kvm: Clear paravirt_enabled on KVM guests for espfix32s benefit Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 06/73] md/bitmap: always wait for writes on unplug Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 07/73] mfd: twl4030-power: Fix regression with missing compatible flag Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 08/73] mfd: tc6393xb: Fail ohci suspend if full state restore is required Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 09/73] mmc: dw_mmc: avoid write to CDTHRCTL on older versions Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 10/73] mmc: omap_hsmmc: Fix UHS card with DDR50 support Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 11/73] mmc: block: add newline to sysfs display of force_ro Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 12/73] mmc: sdhci-pci-o2micro: Fix Dell E5440 issue Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 13/73] megaraid_sas: corrected return of wait_event from abort frame path Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 14/73] regulator: anatop: Set default voltage selector for vddpu Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 15/73] scsi: correct return values for .eh_abort_handler implementations Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 16/73] f2fs: fix possible data corruption in f2fs_write_begin() Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 17/73] nfs41: fix nfs4_proc_layoutget error handling Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 18/73] dcache: fix kmemcheck warning in switch_names Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 19/73] dm bufio: fix memleak when using a dm_buffers inline bio Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 20/73] dm crypt: use memzero_explicit for on-stack buffer Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 21/73] dm cache: only use overwrite optimisation for promotion when in writeback mode Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 22/73] dm cache: dirty flag was mistakenly being cleared when promoting via overwrite Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 23/73] dm cache: fix spurious cell_defer when dealing with partial block at end of device Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 24/73] dm space map metadata: fix sm_bootstrap_get_nr_blocks() Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 25/73] dm thin: fix inability to discard blocks when in out-of-data-space mode Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 26/73] dm thin: fix missing out-of-data-space to write mode transition if blocks are released Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 27/73] dm thin: fix a race in thin_dtr Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 28/73] brcmfmac: Fix bitmap malloc bug in msgbuf Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 29/73] arm64: Add COMPAT_HWCAP_LPAE Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 30/73] drm/tegra: gem: dumb: pitch and size are outputs Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 31/73] ARM: tegra: Re-add removed SoC id macro to tegra_resume() Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 32/73] ARM: mvebu: make the coherency_ll.S functions work with no coherency fabric Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 33/73] ARM: mvebu: disable I/O coherency on non-SMP situations on Armada 370/375/38x/XP Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 35/73] x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 36/73] x86/tls: Dont validate lm in set_thread_area() after all Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 37/73] isofs: Fix unchecked printing of ER records Greg Kroah-Hartman
2015-01-07 2:15 ` [PATCH 3.17 38/73] KEYS: Fix stale key registration at error path Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 40/73] mac80211: free management frame keys when removing station Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 41/73] mnt: Fix a memory stomp in umount Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 42/73] thermal: Fix error path in thermal_init() Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 43/73] mnt: Implicitly add MNT_NODEV on remount when it was implicitly added by mount Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 44/73] mnt: Update unprivileged remount test Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 45/73] umount: Disallow unprivileged mount force Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 46/73] groups: Consolidate the setgroups permission checks Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 47/73] userns: Document what the invariant required for safe unprivileged mappings Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 48/73] userns: Dont allow setgroups until a gid mapping has been setablished Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 49/73] userns: Dont allow unprivileged creation of gid mappings Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 50/73] userns: Check euid no fsuid when establishing an unprivileged uid mapping Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 51/73] userns: Only allow the creator of the userns unprivileged mappings Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 52/73] userns: Rename id_map_mutex to userns_state_mutex Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 53/73] userns: Add a knob to disable setgroups on a per user namespace basis Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 54/73] userns: Allow setting gid_maps without privilege when setgroups is disabled Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 55/73] userns: Unbreak the unprivileged remount tests Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 56/73] audit: use supplied gfp_mask from audit_buffer in kauditd_send_multicast_skb Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 57/73] audit: dont attempt to lookup PIDs when changing PID filtering audit rules Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 58/73] audit: restore AUDIT_LOGINUID unset ABI Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 59/73] crypto: af_alg - fix backlog handling Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 60/73] ncpfs: return proper error from NCP_IOC_SETROOT ioctl Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 61/73] exit: pidns: alloc_pid() leaks pid_namespace if child_reaper is exiting Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 62/73] udf: Check path length when reading symlink Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 63/73] udf: Verify i_size when loading inode Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 64/73] udf: Verify symlink size before loading it Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 65/73] udf: Check component length before reading it Greg Kroah-Hartman
2015-01-07 2:16 ` Greg Kroah-Hartman [this message]
2015-01-07 2:16 ` [PATCH 3.17 67/73] eCryptfs: Remove buggy and unnecessary write in file name decode routine Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 68/73] Btrfs: make sure we wait on logged extents when fsycning two subvols Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 69/73] btrfs: fix wrong accounting of raid1 data profile in statfs Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 70/73] Btrfs: do not move em to modified list when unpinning Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 71/73] Btrfs: make sure logged extents complete in the current transaction V3 Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 72/73] Btrfs: fix loop writing of async reclaim Greg Kroah-Hartman
2015-01-07 2:16 ` [PATCH 3.17 73/73] Btrfs: fix fs corruption on transaction abort if device supports discard Greg Kroah-Hartman
2015-01-07 13:46 ` [PATCH 3.17 00/73] 3.17.8-stable review Guenter Roeck
2015-01-07 23:46 ` Greg Kroah-Hartman
2015-01-07 23:34 ` Shuah Khan
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20150107021559.536135082@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=linux-kernel@vger.kernel.org \
--cc=p.bansal@samsung.com \
--cc=stable@vger.kernel.org \
--cc=tyhicks@canonical.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.