]> git.karo-electronics.de Git - karo-tx-linux.git/commit
ext4 crypto: add ext4 encryption facilities
authorMichael Halcrow <mhalcrow@google.com>
Wed, 8 Apr 2015 04:19:28 +0000 (00:19 -0400)
committerTheodore Ts'o <tytso@mit.edu>
Wed, 8 Apr 2015 04:19:28 +0000 (00:19 -0400)
commitfc395979ae0bc38c9eb2c29572cc498de283fba5
tree54f89cc537e992016fb9288f966f9893bb2bd1a8
parentb73a0558bd3e9b6548e304e0921336ee801c4530
ext4 crypto: add ext4 encryption facilities

On encrypt, we will re-assign the buffer_heads to point to a bounce
page rather than the control_page (which is the original page to write
that contains the plaintext). The block I/O occurs against the bounce
page.  On write completion, we re-assign the buffer_heads to the
original plaintext page.

On decrypt, we will attach a read completion callback to the bio
struct. This read completion will decrypt the read contents in-place
prior to setting the page up-to-date.

The current encryption mode, AES-256-XTS, lacks cryptographic
integrity. AES-256-GCM is in-plan, but we will need to devise a
mechanism for handling the integrity data.

Change-Id: I5ed4c913d49971d7f7e9b10bb4e694df86f960d7
Signed-off-by: Michael Halcrow <mhalcrow@google.com>
Signed-off-by: Ildar Muslukhov <ildarm@google.com>
Signed-off-by: Theodore Ts'o <tytso@mit.edu>
fs/ext4/Makefile
fs/ext4/crypto.c [new file with mode: 0644]
fs/ext4/crypto_policy.c
fs/ext4/ext4.h
fs/ext4/ext4_crypto.h
fs/ext4/super.c