diff options
author | David Gstir <david@sigma-star.at> | 2017-05-17 13:36:16 +0200 |
---|---|---|
committer | Richard Weinberger <richard@nod.at> | 2017-07-14 22:49:05 +0200 |
commit | f34e87f58dabc31eb69f61cf4a79e951d4176743 (patch) | |
tree | 3f7c4f599185777025667f0af650ee86d065ede2 /fs/ubifs/dir.c | |
parent | ubifs: Fix memory leak in RENAME_WHITEOUT error path in do_rename (diff) | |
download | linux-f34e87f58dabc31eb69f61cf4a79e951d4176743.tar.xz linux-f34e87f58dabc31eb69f61cf4a79e951d4176743.zip |
ubifs: Don't encrypt special files on creation
When a new inode is created, we check if the containing folder has a encryption
policy set and inherit that. This should however only be done for regular
files, links and subdirectories. Not for sockes fifos etc.
Fixes: d475a507457b ("ubifs: Add skeleton for fscrypto")
Cc: stable@vger.kernel.org
Signed-off-by: David Gstir <david@sigma-star.at>
Signed-off-by: Richard Weinberger <richard@nod.at>
Diffstat (limited to '')
-rw-r--r-- | fs/ubifs/dir.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/fs/ubifs/dir.c b/fs/ubifs/dir.c index 996e4215fd28..90a3f01c55d1 100644 --- a/fs/ubifs/dir.c +++ b/fs/ubifs/dir.c @@ -143,6 +143,7 @@ struct inode *ubifs_new_inode(struct ubifs_info *c, struct inode *dir, case S_IFBLK: case S_IFCHR: inode->i_op = &ubifs_file_inode_operations; + encrypted = false; break; default: BUG(); |