diff options
| author | Eric Biggers <[email protected]> | 2019-10-23 03:33:11 +0000 |
|---|---|---|
| committer | Theodore Ts'o <[email protected]> | 2019-11-14 21:40:45 +0000 |
| commit | 31fb992ce675ec3326dfd4db9634480391713db8 (patch) | |
| tree | 846219c2af7b9939c6ff12399616799602713f72 /net/unix/af_unix.c | |
| parent | ext4: Add error handling for io_end_vec struct allocation (diff) | |
| download | kernel-31fb992ce675ec3326dfd4db9634480391713db8.tar.gz kernel-31fb992ce675ec3326dfd4db9634480391713db8.zip | |
fs/buffer.c: support fscrypt in block_read_full_page()
After each filesystem block (as represented by a buffer_head) has been
read from disk by block_read_full_page(), decrypt it if needed. The
decryption is done on the fscrypt_read_workqueue.
This is the final change needed to support ext4 encryption with
blocksize != PAGE_SIZE, and it's a fairly small change now that
CONFIG_FS_ENCRYPTION is a bool and fs/crypto/ exposes functions to
decrypt individual blocks and to enqueue work on the fscrypt workqueue.
Don't try to add fs-verity support yet, as the fs/verity/ support layer
isn't ready for sub-page blocks yet. Just add fscrypt support for now.
Almost all the new code is compiled away when CONFIG_FS_ENCRYPTION=n.
Cc: Chandan Rajendra <[email protected]>
Signed-off-by: Eric Biggers <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Theodore Ts'o <[email protected]>
Diffstat (limited to 'net/unix/af_unix.c')
0 files changed, 0 insertions, 0 deletions
