summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJaegeuk Kim <jaegeuk@kernel.org>2015-05-06 18:23:21 -0700
committerJaegeuk Kim <jaegeuk@kernel.org>2015-05-28 15:41:57 -0700
commitd690358b2bf43f5cb12ce07d209d09b1decb79c3 (patch)
tree011edc598aad4c27128e5750fd213487c8ccc148
parentedf3fb8e9e5771944815fadbd8ef6a7e43ef0f7c (diff)
downloadlinux-d690358b2bf43f5cb12ce07d209d09b1decb79c3.tar.bz2
f2fs crypto: remove checking key context during lookup
No matter what the key is valid or not, readdir shows the dir entries correctly. So, lookup should not failed. But, we expect further accesses should be denied from open, rename, link, and so on. Signed-off-by: Jaegeuk Kim <jaegeuk@kernel.org>
-rw-r--r--fs/f2fs/namei.c10
1 files changed, 0 insertions, 10 deletions
diff --git a/fs/f2fs/namei.c b/fs/f2fs/namei.c
index bbd83e427834..4ad7242f4829 100644
--- a/fs/f2fs/namei.c
+++ b/fs/f2fs/namei.c
@@ -260,16 +260,6 @@ static struct dentry *f2fs_lookup(struct inode *dir, struct dentry *dentry,
if (IS_ERR(inode))
return ERR_CAST(inode);
- if (f2fs_encrypted_inode(dir) && f2fs_may_encrypt(inode) &&
- !f2fs_is_child_context_consistent_with_parent(dir, inode)) {
- iput(inode);
- f2fs_msg(inode->i_sb, KERN_WARNING,
- "Inconsistent encryption contexts: %lu/%lu\n",
- (unsigned long)dir->i_ino,
- (unsigned long)inode->i_ino);
- return ERR_PTR(-EPERM);
- }
-
if (f2fs_has_inline_dots(inode)) {
err = __recover_dot_dentries(inode, dir->i_ino);
if (err)