Received: by 10.192.165.156 with SMTP id m28csp891604imm; Thu, 19 Apr 2018 09:12:33 -0700 (PDT) X-Google-Smtp-Source: AIpwx49Cm5zDiAzM9KP09dBlzgwHIAHPGeExwO0OSLD4zzDIaWdQJAurMiwQj+yI0+/UdOSSQNSi X-Received: by 2002:a17:902:1aa:: with SMTP id b39-v6mr3421418plb.120.1524154353534; Thu, 19 Apr 2018 09:12:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524154353; cv=none; d=google.com; s=arc-20160816; b=F7CuV9QhiJSkP7TvvkyMn9XLjuvs6kvxzt83NR9ZWFZu+F0tpfleOxldTRcWO4uAd9 qe5Rp0K8OlL3AThHe/4QLyurgqVuSpz4mHSVAWh8C0jx8Fgwvl0TsNNR0AkgqBTsRRjL 52e8YlA9yvpYrdcOjiJlBd6VZqsR9NNiz/fWRjkU9GKRx0xWnCbFAh0JVUW/CmH1nIjh sSaIBxVgwdIXor3QnQ/pZ3I3pgW5k/InMGU83Oli1ouVIiATMP7kB00vUODsOqrstKYc HJ8h7ZnY9LiLRSn7kshgm1hQjuuqYkkJki4GyDEqsMKgxt7K/++OPlyXwHoyUv2RUAh9 FAEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:content-disposition :mime-version:message-id:subject:cc:to:from:date :arc-authentication-results; bh=XAR6Z2gJ/g9A9tIUBNqs3aQjAnsUlav/1yPb8Rv2pgw=; b=FfYlhOLooO9q/kdVLVZ2OHTkSJu0vlUrZb9zTEpe1VC444haCKLbw+naPKTyjE6o7T 67Rygdj81ht0zhBcx4HgJ/5+cS5aASRCZyLpJXlIdz56y+es1XBA2i3ktz4OXqgkB4oL XmSTW4xl6w8JiNRJCamyEkRoA7fcgPbtCK4soNJXo2PsDqgGaaRgp4jKSlEgTNGjn0AY Qks6G+7hBj1o4djQ5dik0xmdjT2AZKh82Gg8M1cjj6SfNK/NRawD+u4UppB7iP8L+Nxb TV/UPHTFa2S5jxifUK9ccO15HdB7bbKOfp1ee8Ebij2vIfr6Km9KXkpAVrKCKJv5B9oJ F/ZA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z6-v6si3493367pln.339.2018.04.19.09.12.16; Thu, 19 Apr 2018 09:12:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753655AbeDSQKf (ORCPT + 99 others); Thu, 19 Apr 2018 12:10:35 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:55757 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753239AbeDSQKd (ORCPT ); Thu, 19 Apr 2018 12:10:33 -0400 Received: from 2.general.tyhicks.us.vpn ([10.172.64.53] helo=sec) by youngberry.canonical.com with esmtpsa (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from ) id 1f9C8m-0001y6-Im; Thu, 19 Apr 2018 16:10:32 +0000 Date: Thu, 19 Apr 2018 16:10:29 +0000 From: Tyler Hicks To: Linus Torvalds Cc: Andrew Morton , linux-kernel@vger.kernel.org, ecryptfs@vger.kernel.org Subject: [GIT PULL] eCryptfs fixes for 4.17-rc2 Message-ID: <20180419160750.GA16628@sec> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="0eh6TmSyL6TZE2Uz" Content-Disposition: inline User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --0eh6TmSyL6TZE2Uz Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hi Linus, The following changes since commit 3215b9d57a2c75c4305a3956ca303d7004485200: Merge tag 'clk-fixes-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/clk/linux (2018-03-20 17:44:27 -0700) are available in the git repository at: https://git.kernel.org/pub/scm/linux/kernel/git/tyhicks/ecryptfs.git tags/ecryptfs-4.17-rc2-fixes for you to fetch changes up to e86281e700cca8a773f9a572fa406adf2784ba5c: eCryptfs: don't pass up plaintext names when using filename encryption (2018-04-16 18:51:22 +0000) ---------------------------------------------------------------- Minor cleanups and a bug fix to completely ignore unencrypted filenames in the lower filesystem when filename encryption is enabled at the eCryptfs layer. ---------------------------------------------------------------- Colin Ian King (1): ecryptfs: fix spelling mistake: "cadidate" -> "candidate" Guenter Roeck (1): ecryptfs: lookup: Don't check if mount_crypt_stat is NULL Tyler Hicks (1): eCryptfs: don't pass up plaintext names when using filename encryption fs/ecryptfs/crypto.c | 41 ++++++++++++++++++++++++++++------------- fs/ecryptfs/file.c | 21 ++++++++++++++++----- fs/ecryptfs/inode.c | 3 +-- fs/ecryptfs/keystore.c | 2 +- 4 files changed, 46 insertions(+), 21 deletions(-) --0eh6TmSyL6TZE2Uz Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJa2L9pAAoJENaSAD2qAscKDFYP/R1LQEn6HG8SpedTnYLLBp6O 8ieCBd8LPTRXHJnchR0q3lkeZsPGoPXIQpTsQdpqECs7lzvIOw8Mm6bAPiVhMLYp MZtnnsfuPuOA7r1G1p503ksiCtin2Y8TVT9EDzZE+Hv92zIivUlQYZYp9tzrqTpu xd6oYU06AI7DIshVT6fpchd6hHl0J+8d1EhH62ssHqEUK2ZPSbft92cJ+uZHHqgP UXJDxnyzvAT/wQdbg/86ZDH6+QlMgZ4Gps/YLGV3j/hGr0h2BE7RZQ7pR6u2Q+u3 H9A587K4uQTRsSSwqyJ5qhMlGPSxt7qsBeq6blx0l74/hNZqRjGfFOdKbYBqhGs3 vwI611C70y0FHXyxDp1OL5GjKgGjo3Zu/DETf2PLFvNkqDKPYe8pj2IMUboAE1f0 Cj9rqHg+jzDnGuk1LgMb6KPDkIr/S4Yye6OY96h2mQ4Runz3hxpwG1fHldBGx1Kn aDfWFN7c5ADcLxY+f4spHCqRcO9t8YKVudovze0bbwmYO4dH+oBJoyHLfLK08VWy t9PNDmC4vFaBko0Yxvb1RR7afD2BSC7JKaeyvfXfxVwHPiD3dxGRDSX0TSUN96SO vjEJafZkDzDHNliH7aUj+X9FRSbMCEHbZWU+QnOWbPsRRcUjaqlF84wreJC8yVaY K3wFCq0kXTCp6uIy0D21 =C90c -----END PGP SIGNATURE----- --0eh6TmSyL6TZE2Uz--