eCryptfs 101
Milestone information
- Project:
- eCryptfs
- Series:
- trunk
- Version:
- 101
- Released:
- Registrant:
- Dustin Kirkland
- Release registered:
- Active:
- Yes. Drivers can target bugs and blueprints to this milestone.
Activities
- Assigned to you:
- No blueprints or bugs assigned to you.
- Assignees:
- No users assigned to blueprints and bugs.
- Blueprints:
- No blueprints are targeted to this milestone.
- Bugs:
- No bugs are targeted to this milestone.
Download files for this release
Release notes
[ Eric Lammerts ]
* src/libecryptfs
- Handle NULL mnt pointer when sysfs is not mounted
[ Tyler Hicks ]
* src/utils/
- Correct minor misspelling
* src/utils/
- Fix option parsing when --rw is specified
* src/utils/
- Simplify success message to prevent incorrectly reporting that a
read-only mount was performed when the --rw option is specified
* tests/lib/
- Add test library function to return a lower path from an upper path,
based on inode numbers
* tests/kernel/
- Add regression test for open->mmap(
pattern
* tests/kernel/
- Add test for checking that a pre-existing target inode is properly
evicted after a rename
* tests/README:
- Add documentation on the steps to take when adding new test cases
[ Colin King ]
* tests/kernel/
- Add test case for initializing empty lower files during open()
* tests/kernel/
- Add test case to check for proper unlinking of lower files when
lower file initialization fails
* src/key_
src/
src/
src/
- address some issues raised by smatch static analysis
- fix some memory leaks with frees
- fix some pointer refs and derefs
- fix some comment typos
[ Dustin Kirkland ]
* src/libecryptfs
- silence pam error message when errno == EACCES
+ "Error attempting to parse .ecryptfsrc file; rc = [-13]"
* src/utils/
- fix race condition, which typically manifests itself with a user
saying that their home directory is not accessible, or that their
filenames are not decrypted
- the root of the problem is that we were reading the signature file,
~
so the file encryption signature is read and key is loaded, but then
some other process (usually from PAM, perhaps a cron job or a
subsequent login) mounts the home directory before the filename
encryption key is loaded; thus, $HOME is mounted but filenames are
not decrypted, so the second read of ~/.ecryptfs/
as that file is not found
- the solution is to rework the internal fetch_sig() function and read
one or both signatures within a single open/read/close operation of
the file
- free memory used by char **sig on failure
* debian/copyright:
- fix lintian warning
Changelog
This release does not have a changelog.
0 blueprints and 0 bugs targeted
There are no feature specifications or bug tasks targeted to this milestone. The project's maintainer, driver, or bug supervisor can target specifications and bug tasks to this milestone to track the things that are expected to be completed for the release.