Ban ecryptfs over ecryptfs
authorAl Viro <viro@zeniv.linux.org.uk>
Mon, 17 May 2010 04:59:46 +0000 (00:59 -0400)
committerAl Viro <viro@zeniv.linux.org.uk>
Fri, 21 May 2010 22:31:27 +0000 (18:31 -0400)
commit4403158ba295c8e36f6736b1bb12d0f7e1923dac
treea85c276c7ba414ecc65a93488dcb2ef7972779c0
parentab9a79b9669c28734a69fa9384df6fb93152e53a
Ban ecryptfs over ecryptfs

This is a seriously simplified patch from Eric Sandeen; copy of
rationale follows:
===
  mounting stacked ecryptfs on ecryptfs has been shown to lead to bugs
  in testing.  For crypto info in xattr, there is no mechanism for handling
  this at all, and for normal file headers, we run into other trouble:

  BUG: unable to handle kernel NULL pointer dereference at 0000000000000008
  IP: [<ffffffffa015b0b3>] ecryptfs_d_revalidate+0x43/0xa0 [ecryptfs]
  ...

  There doesn't seem to be any good usecase for this, so I'd suggest just
  disallowing the configuration.

  Based on a patch originally, I believe, from Mike Halcrow.
===

Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
fs/ecryptfs/main.c