diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-17 08:35:42 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-17 08:36:13 +0000 |
commit | 98bb3da708a475ff67dc019fddcb307d18856e5f (patch) | |
tree | b3e34a4af21848ad41adebadc573cf8d39c4a70c /debian/patches/Print-warning-when-keyslot-requires-more-memory-than-avai.patch | |
parent | Merging upstream version 2:2.7.0. (diff) | |
download | cryptsetup-98bb3da708a475ff67dc019fddcb307d18856e5f.tar.xz cryptsetup-98bb3da708a475ff67dc019fddcb307d18856e5f.zip |
Merging debian version 2:2.7.0-1.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'debian/patches/Print-warning-when-keyslot-requires-more-memory-than-avai.patch')
-rw-r--r-- | debian/patches/Print-warning-when-keyslot-requires-more-memory-than-avai.patch | 49 |
1 files changed, 0 insertions, 49 deletions
diff --git a/debian/patches/Print-warning-when-keyslot-requires-more-memory-than-avai.patch b/debian/patches/Print-warning-when-keyslot-requires-more-memory-than-avai.patch deleted file mode 100644 index 91bab91..0000000 --- a/debian/patches/Print-warning-when-keyslot-requires-more-memory-than-avai.patch +++ /dev/null @@ -1,49 +0,0 @@ -From: Milan Broz <gmazyland@gmail.com> -Date: Tue, 28 Feb 2023 14:18:10 +0100 -Subject: Print warning when keyslot requires more memory than available - -This warning is displayed only if maximum memory was adjusted: -no swap, not enough memory, but is not printed if user set keyslot -memory cost above default limit intentionally. - -In the latter case we have to check all available memory and guess -if swap is enough - this is not job af cryptsetup and also -it should not excessively parse any /sys files during keyslot open. - -Origin: https://gitlab.com/cryptsetup/cryptsetup/-/commit/27f8e5c08f0e0054225c9a2b1eda5b4200d4565b -Bug: https://gitlab.com/cryptsetup/cryptsetup/-/issues/802#note_1287298872 -Bug-Debian: https://bugs.debian.org/1032734 ---- - lib/luks2/luks2_keyslot_luks2.c | 12 +++++++++++- - 1 file changed, 11 insertions(+), 1 deletion(-) - -diff --git a/lib/luks2/luks2_keyslot_luks2.c b/lib/luks2/luks2_keyslot_luks2.c -index 491dcad..3be1135 100644 ---- a/lib/luks2/luks2_keyslot_luks2.c -+++ b/lib/luks2/luks2_keyslot_luks2.c -@@ -307,7 +307,7 @@ static int luks2_keyslot_get_key(struct crypt_device *cd, - char *volume_key, size_t volume_key_len) - { - struct volume_key *derived_key = NULL; -- struct crypt_pbkdf_type pbkdf; -+ struct crypt_pbkdf_type pbkdf, *cd_pbkdf; - char *AfKey = NULL; - size_t AFEKSize; - const char *af_hash = NULL; -@@ -360,6 +360,16 @@ static int luks2_keyslot_get_key(struct crypt_device *cd, - goto out; - } - -+ /* -+ * Print warning when keyslot requires more memory than available -+ * (if maximum memory was adjusted - no swap, not enough memory), -+ * but be silent if user set keyslot memory cost above default limit intentionally. -+ */ -+ cd_pbkdf = crypt_get_pbkdf(cd); -+ if (cd_pbkdf->max_memory_kb && pbkdf.max_memory_kb > cd_pbkdf->max_memory_kb && -+ pbkdf.max_memory_kb <= DEFAULT_LUKS2_MEMORY_KB) -+ log_std(cd, _("Warning: keyslot operation could fail as it requires more than available memory.\n")); -+ - /* - * If requested, serialize unlocking for memory-hard KDF. Usually NOOP. - */ |