Commit 959c2de2 authored by Richard Weinberger's avatar Richard Weinberger

ubifs: Enforce crypto policy in mmap

We need this extra check in mmap because a process could
gain an already opened fd.
Signed-off-by: default avatarRichard Weinberger <richard@nod.at>
parent 700eada8
...@@ -1594,6 +1594,15 @@ static const struct vm_operations_struct ubifs_file_vm_ops = { ...@@ -1594,6 +1594,15 @@ static const struct vm_operations_struct ubifs_file_vm_ops = {
static int ubifs_file_mmap(struct file *file, struct vm_area_struct *vma) static int ubifs_file_mmap(struct file *file, struct vm_area_struct *vma)
{ {
int err; int err;
struct inode *inode = file->f_mapping->host;
if (ubifs_crypt_is_encrypted(inode)) {
err = fscrypt_get_encryption_info(inode);
if (err)
return -EACCES;
if (!fscrypt_has_encryption_key(inode))
return -ENOKEY;
}
err = generic_file_mmap(file, vma); err = generic_file_mmap(file, vma);
if (err) if (err)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment