linux/fs/ecryptfs
Kees Cook cb69f36ba1 ecryptfs: avoid ctx initialization race
It might be possible for two callers to race the mutex lock after the
NULL ctx check. Instead, move the lock above the check so there isn't
the possibility of leaking a crypto ctx. Additionally, report the full
algo name when failing.

Signed-off-by: Kees Cook <keescook@chromium.org>
[tyhicks: remove out label, which is no longer used]
Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
2013-09-06 16:58:18 -07:00
..
crypto.c ecryptfs: avoid ctx initialization race 2013-09-06 16:58:18 -07:00
debug.c
dentry.c
ecryptfs_kernel.h ecryptfs: switch ecryptfs_decode_and_decrypt_filename() from dentry to sb 2013-06-29 12:57:25 +04:00
file.c Code cleanups and improved buffer handling during page crypto operations 2013-07-11 10:20:18 -07:00
inode.c helper for reading ->d_count 2013-07-05 18:59:33 +04:00
Kconfig Minor code cleanups and new Kconfig option to disable /dev/ecryptfs 2013-03-07 12:47:24 -08:00
keystore.c eCryptfs: allow userspace messaging to be disabled 2013-03-03 23:59:59 -08:00
kthread.c
main.c Use ecryptfs_dentry_to_lower_path in a couple of places 2013-07-09 23:40:28 -07:00
Makefile eCryptfs: allow userspace messaging to be disabled 2013-03-03 23:59:59 -08:00
messaging.c eCryptfs: Cocci spatch "memdup.spatch" 2013-06-07 17:26:55 -07:00
miscdev.c ecryptfs: close rmmod race 2013-04-09 14:08:16 -04:00
mmap.c
read_write.c ecryptfs: don't open-code kernel_read() 2013-05-09 13:39:58 -04:00
super.c