aboutsummaryrefslogtreecommitdiffstats
path: root/fs
diff options
context:
space:
mode:
authorChao Yu <chao2.yu@samsung.com>2016-02-14 05:58:35 -0500
committerJaegeuk Kim <jaegeuk@kernel.org>2016-02-22 19:07:23 -0500
commitae1086686487f13130937918ca91d920c1daafcb (patch)
tree7868f8e4b1850e6f4ea2492567203ccae695c7ee /fs
parented3360abbc0412f32c398e1c58887d74f3d04225 (diff)
f2fs crypto: handle unexpected lack of encryption keys
This patch syncs f2fs with commit abdd438b26b4 ("ext4 crypto: handle unexpected lack of encryption keys") from ext4. Fix up attempts by users to try to write to a file when they don't have access to the encryption key. Signed-off-by: Theodore Ts'o <tytso@mit.edu> Signed-off-by: Chao Yu <chao2.yu@samsung.com> Signed-off-by: Jaegeuk Kim <jaegeuk@kernel.org>
Diffstat (limited to 'fs')
-rw-r--r--fs/f2fs/crypto_policy.c3
-rw-r--r--fs/f2fs/file.c6
2 files changed, 7 insertions, 2 deletions
diff --git a/fs/f2fs/crypto_policy.c b/fs/f2fs/crypto_policy.c
index d4a96af513c2..596f02490f27 100644
--- a/fs/f2fs/crypto_policy.c
+++ b/fs/f2fs/crypto_policy.c
@@ -192,7 +192,8 @@ int f2fs_inherit_context(struct inode *parent, struct inode *child,
192 return res; 192 return res;
193 193
194 ci = F2FS_I(parent)->i_crypt_info; 194 ci = F2FS_I(parent)->i_crypt_info;
195 BUG_ON(ci == NULL); 195 if (ci == NULL)
196 return -ENOKEY;
196 197
197 ctx.format = F2FS_ENCRYPTION_CONTEXT_FORMAT_V1; 198 ctx.format = F2FS_ENCRYPTION_CONTEXT_FORMAT_V1;
198 199
diff --git a/fs/f2fs/file.c b/fs/f2fs/file.c
index 05f5f2f8f8fd..8dea19500120 100644
--- a/fs/f2fs/file.c
+++ b/fs/f2fs/file.c
@@ -424,6 +424,8 @@ static int f2fs_file_mmap(struct file *file, struct vm_area_struct *vma)
424 err = f2fs_get_encryption_info(inode); 424 err = f2fs_get_encryption_info(inode);
425 if (err) 425 if (err)
426 return 0; 426 return 0;
427 if (!f2fs_encrypted_inode(inode))
428 return -ENOKEY;
427 } 429 }
428 430
429 /* we don't need to use inline_data strictly */ 431 /* we don't need to use inline_data strictly */
@@ -443,7 +445,9 @@ static int f2fs_file_open(struct inode *inode, struct file *filp)
443 if (!ret && f2fs_encrypted_inode(inode)) { 445 if (!ret && f2fs_encrypted_inode(inode)) {
444 ret = f2fs_get_encryption_info(inode); 446 ret = f2fs_get_encryption_info(inode);
445 if (ret) 447 if (ret)
446 ret = -EACCES; 448 return -EACCES;
449 if (!f2fs_encrypted_inode(inode))
450 return -ENOKEY;
447 } 451 }
448 return ret; 452 return ret;
449} 453}