This patch fixes wrong adoption on fname padding.

Signed-off-by: Jaegeuk Kim <[email protected]>
---
 fs/f2fs/crypto_fname.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/fs/f2fs/crypto_fname.c b/fs/f2fs/crypto_fname.c
index 905c065..73741fb 100644
--- a/fs/f2fs/crypto_fname.c
+++ b/fs/f2fs/crypto_fname.c
@@ -267,13 +267,13 @@ int f2fs_fname_crypto_alloc_buffer(struct inode *inode,
                                   u32 ilen, struct f2fs_str *crypto_str)
 {
        unsigned int olen;
-       int padding = 16;
+       int padding = 32;
        struct f2fs_crypt_info *ci = F2FS_I(inode)->i_crypt_info;
 
        if (ci)
                padding = 4 << (ci->ci_flags & F2FS_POLICY_FLAGS_PAD_MASK);
-       if (padding < F2FS_CRYPTO_BLOCK_SIZE)
-               padding = F2FS_CRYPTO_BLOCK_SIZE;
+       if (ilen < F2FS_CRYPTO_BLOCK_SIZE)
+               ilen = F2FS_CRYPTO_BLOCK_SIZE;
        olen = f2fs_fname_crypto_round_up(ilen, padding);
        crypto_str->len = olen;
        if (olen < F2FS_FNAME_CRYPTO_DIGEST_SIZE * 2)
-- 
2.6.3


------------------------------------------------------------------------------
Site24x7 APM Insight: Get Deep Visibility into Application Performance
APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month
Monitor end-to-end web transactions and take corrective actions now
Troubleshoot faster and improve end-user experience. Signup Now!
http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140
_______________________________________________
Linux-f2fs-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/linux-f2fs-devel

Reply via email to