Skip to content
  • Eric Biggers's avatar
    fscrypto: improved validation when loading inode encryption metadata · 8f39850d
    Eric Biggers authored
    
    
    - Validate fscrypt_context.format and fscrypt_context.flags.  If
      unrecognized values are set, then the kernel may not know how to
      interpret the encrypted file, so it should fail the operation.
    
    - Validate that AES_256_XTS is used for contents and that AES_256_CTS is
      used for filenames.  It was previously possible for the kernel to
      accept these reversed, though it would have taken manual editing of
      the block device.  This was not intended.
    
    - Fail cleanly rather than BUG()-ing if a file has an unexpected type.
    
    Signed-off-by: default avatarEric Biggers <ebiggers@google.com>
    Signed-off-by: default avatarTheodore Ts'o <tytso@mit.edu>
    8f39850d