lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20180112141129.27507-2-chandan@linux.vnet.ibm.com> Date: Fri, 12 Jan 2018 19:41:22 +0530 From: Chandan Rajendra <chandan@...ux.vnet.ibm.com> To: linux-ext4@...r.kernel.org Cc: Chandan Rajendra <chandan@...ux.vnet.ibm.com>, linux-fsdevel@...r.kernel.org, tytso@....edu Subject: [RFC PATCH 1/8] ext4: use EXT4_INODE_ENCRYPT flag to detect encrypted bio For supporting encryption in blocksize < pagesize scenario, bio->bi_private field will be needed to hold the address of the encryption context structure. Hence this commit uses ext4_encrypted_inode() to detect the encryption status of a file. Signed-off-by: Chandan Rajendra <chandan@...ux.vnet.ibm.com> --- fs/ext4/readpage.c | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/fs/ext4/readpage.c b/fs/ext4/readpage.c index 9ffa6fa..0be590b 100644 --- a/fs/ext4/readpage.c +++ b/fs/ext4/readpage.c @@ -50,7 +50,13 @@ static inline bool ext4_bio_encrypted(struct bio *bio) { #ifdef CONFIG_EXT4_FS_ENCRYPTION - return unlikely(bio->bi_private != NULL); + if (bio->bi_vcnt) { + struct inode *inode = bio->bi_io_vec->bv_page->mapping->host; + if (ext4_encrypted_inode(inode) && S_ISREG(inode->i_mode)) + return true; + } + + return false; #else return false; #endif -- 2.9.5
Powered by blists - more mailing lists