lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20180112141129.27507-6-chandan@linux.vnet.ibm.com> Date: Fri, 12 Jan 2018 19:41:26 +0530 From: Chandan Rajendra <chandan@...ux.vnet.ibm.com> To: linux-ext4@...r.kernel.org Cc: Chandan Rajendra <chandan@...ux.vnet.ibm.com>, linux-fsdevel@...r.kernel.org, tytso@....edu Subject: [RFC PATCH 5/8] ext4: decrypt the block that needs to be partially zeroed __ext4_block_zero_page_range decrypts the entire page. This commit decrypts the block to be partially zeroed instead of the whole page. Signed-off-by: Chandan Rajendra <chandan@...ux.vnet.ibm.com> --- fs/ext4/inode.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/fs/ext4/inode.c b/fs/ext4/inode.c index d3baa15..db47f6d 100644 --- a/fs/ext4/inode.c +++ b/fs/ext4/inode.c @@ -4030,9 +4030,8 @@ static int __ext4_block_zero_page_range(handle_t *handle, ext4_encrypted_inode(inode)) { /* We expect the key to be set. */ BUG_ON(!fscrypt_has_encryption_key(inode)); - BUG_ON(blocksize != PAGE_SIZE); WARN_ON_ONCE(fscrypt_decrypt_page(page->mapping->host, - page, PAGE_SIZE, 0, page->index)); + page, blocksize, round_down(offset, blocksize), iblock)); } } if (ext4_should_journal_data(inode)) { -- 2.9.5
Powered by blists - more mailing lists