summaryrefslogtreecommitdiff
path: root/mm/kmemleak.c
diff options
context:
space:
mode:
authorTyler Hicks <tyhicks@canonical.com>2014-10-07 15:51:55 -0500
committerTyler Hicks <tyhicks@canonical.com>2014-10-23 09:11:03 -0400
commit332b122d39c9cbff8b799007a825d94b2e7c12f2 (patch)
tree3676cdebea8bffb909942ee4e5adb1b7ced2fc0f /mm/kmemleak.c
parentc3351dfabf5c78fb5ddc79d0f7b65ebd9e441337 (diff)
eCryptfs: Force RO mount when encrypted view is enabled
The ecryptfs_encrypted_view mount option greatly changes the functionality of an eCryptfs mount. Instead of encrypting and decrypting lower files, it provides a unified view of the encrypted files in the lower filesystem. The presence of the ecryptfs_encrypted_view mount option is intended to force a read-only mount and modifying files is not supported when the feature is in use. See the following commit for more information: e77a56d [PATCH] eCryptfs: Encrypted passthrough This patch forces the mount to be read-only when the ecryptfs_encrypted_view mount option is specified by setting the MS_RDONLY flag on the superblock. Additionally, this patch removes some broken logic in ecryptfs_open() that attempted to prevent modifications of files when the encrypted view feature was in use. The check in ecryptfs_open() was not sufficient to prevent file modifications using system calls that do not operate on a file descriptor. Signed-off-by: Tyler Hicks <tyhicks@canonical.com> Reported-by: Priya Bansal <p.bansal@samsung.com> Cc: stable@vger.kernel.org # v2.6.21+: e77a56d [PATCH] eCryptfs: Encrypted passthrough
Diffstat (limited to 'mm/kmemleak.c')
0 files changed, 0 insertions, 0 deletions