<feed xmlns='http://www.w3.org/2005/Atom'>
<title>mtd-utils.git/ubifs-utils, branch v2.1.0</title>
<subtitle>A mirror of http://git.infradead.org/mtd-utils.git</subtitle>
<id>https://git.infraroot.at/mtd-utils.git/atom?h=v2.1.0</id>
<link rel='self' href='https://git.infraroot.at/mtd-utils.git/atom?h=v2.1.0'/>
<link rel='alternate' type='text/html' href='https://git.infraroot.at/mtd-utils.git/'/>
<updated>2019-02-11T03:58:33+00:00</updated>
<entry>
<title>mtd-utils: fixes double free in mkfs.ubifs</title>
<updated>2019-02-11T03:58:33+00:00</updated>
<author>
<name>Yufen Yu</name>
<email>yuyufen@huawei.com</email>
</author>
<published>2019-01-24T09:06:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.infraroot.at/mtd-utils.git/commit/?id=f18e9636a26f39f6595ed365d31c01e876235b63'/>
<id>urn:sha1:f18e9636a26f39f6595ed365d31c01e876235b63</id>
<content type='text'>
In inode_add_xattr(), it malloc a buffer for name, and then passes
the bufffer ptr to add_xattr(). The ptr will be used to create a new
idx_entry in add_to_index().

However, inode_add_xattr() will free the buffer before return.
which can cause double free in write_index(): free(idx_ptr[i]-&gt;name)

*** Error in `./mkfs.ubifs': double free or corruption (fasttop): 0x0000000000aae220 ***
======= Backtrace: =========
/lib64/libc.so.6(+0x7cbac)[0x7f4881ff5bac]
/lib64/libc.so.6(+0x87a59)[0x7f4882000a59]
/lib64/libc.so.6(cfree+0x16e)[0x7f48820063be]
./mkfs.ubifs[0x402fbf]
/lib64/libc.so.6(__libc_start_main+0xea)[0x7f4881f9988a]
./mkfs.ubifs[0x40356a]

Signed-off-by: Yufen Yu &lt;yuyufen@huawei.com&gt;
Signed-off-by: David Oberhollenzer &lt;david.oberhollenzer@sigma-star.at&gt;
</content>
</entry>
<entry>
<title>mkfs.ubifs: fix default cipher in help output</title>
<updated>2018-12-17T07:13:35+00:00</updated>
<author>
<name>David Gstir</name>
<email>david@sigma-star.at</email>
</author>
<published>2018-12-03T13:40:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.infraroot.at/mtd-utils.git/commit/?id=b1ecfaba533af1895edbdd0ab9bdbbacb1a5ec10'/>
<id>urn:sha1:b1ecfaba533af1895edbdd0ab9bdbbacb1a5ec10</id>
<content type='text'>
AES-256-XTS is the default since dd0d9c623e22 ("mkfs.ubifs: Use AES-256-XTS as default"),
we want that to be correctly reflected in the help output as well.

Signed-off-by: David Gstir &lt;david@sigma-star.at&gt;
Signed-off-by: David Oberhollenzer &lt;david.oberhollenzer@sigma-star.at&gt;
</content>
</entry>
<entry>
<title>mkfs.ubifs: Don't compress by default if filesystem is encrypted</title>
<updated>2018-11-09T13:25:26+00:00</updated>
<author>
<name>Richard Weinberger</name>
<email>richard@nod.at</email>
</author>
<published>2018-11-07T20:56:35+00:00</published>
<link rel='alternate' type='text/html' href='https://git.infraroot.at/mtd-utils.git/commit/?id=ddeb70df91c0bf2574416279b4b6b9b36262b4c5'/>
<id>urn:sha1:ddeb70df91c0bf2574416279b4b6b9b36262b4c5</id>
<content type='text'>
Encryption and compression are not friends.
Enable compression in encryption mode only if the user explicitly
sets a compressor.

Signed-off-by: Richard Weinberger &lt;richard@nod.at&gt;
Tested-by: Heiko Schocher &lt;hsdenx.de&gt;
Signed-off-by: David Oberhollenzer &lt;david.oberhollenzer@sigma-star.at&gt;
</content>
</entry>
<entry>
<title>mkfs.ubifs: Store compr_size in correct endianness.</title>
<updated>2018-11-09T13:24:59+00:00</updated>
<author>
<name>Richard Weinberger</name>
<email>richard@nod.at</email>
</author>
<published>2018-11-07T20:21:08+00:00</published>
<link rel='alternate' type='text/html' href='https://git.infraroot.at/mtd-utils.git/commit/?id=a20cdd234def1d7b400d76e81cad45b82e0c6215'/>
<id>urn:sha1:a20cdd234def1d7b400d76e81cad45b82e0c6215</id>
<content type='text'>
compr_size has to be in LE16.

Signed-off-by: Richard Weinberger &lt;richard@nod.at&gt;
Tested-by: Heiko Schocher &lt;hsdenx.de&gt;
Signed-off-by: David Oberhollenzer &lt;david.oberhollenzer@sigma-star.at&gt;
</content>
</entry>
<entry>
<title>mkfs.ubifs: Fix IV selection</title>
<updated>2018-11-09T13:24:39+00:00</updated>
<author>
<name>Richard Weinberger</name>
<email>richard@nod.at</email>
</author>
<published>2018-11-07T20:21:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.infraroot.at/mtd-utils.git/commit/?id=9ddc6f08c9ecd0a6328ffbef3c444e0a00b2768a'/>
<id>urn:sha1:9ddc6f08c9ecd0a6328ffbef3c444e0a00b2768a</id>
<content type='text'>
We need to check for AES being in 128-cbc mode and not 256-cbc.
fscrypt supports only 128-cbc and 256-xts so far.

Signed-off-by: Richard Weinberger &lt;richard@nod.at&gt;
Tested-by: Heiko Schocher &lt;hsdenx.de&gt;
Signed-off-by: David Oberhollenzer &lt;david.oberhollenzer@sigma-star.at&gt;
</content>
</entry>
<entry>
<title>mkfs.ubifs: Use AES-256-XTS as default</title>
<updated>2018-11-01T11:42:41+00:00</updated>
<author>
<name>Richard Weinberger</name>
<email>richard@nod.at</email>
</author>
<published>2018-10-18T14:37:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.infraroot.at/mtd-utils.git/commit/?id=dd0d9c623e22255b16757c524cecf6c7edf8a3de'/>
<id>urn:sha1:dd0d9c623e22255b16757c524cecf6c7edf8a3de</id>
<content type='text'>
AES-128-CBC should only being used when 256-XTS is too slow
on low end hardware.

Signed-off-by: Richard Weinberger &lt;richard@nod.at&gt;
Signed-off-by: David Oberhollenzer &lt;david.oberhollenzer@sigma-star.at&gt;
</content>
</entry>
<entry>
<title>mkfs.ubifs: Print key descriptor only when generated</title>
<updated>2018-11-01T11:42:36+00:00</updated>
<author>
<name>Richard Weinberger</name>
<email>richard@nod.at</email>
</author>
<published>2018-10-18T14:37:17+00:00</published>
<link rel='alternate' type='text/html' href='https://git.infraroot.at/mtd-utils.git/commit/?id=189d8c872bb1ac5a0280fbf232493ad4e15b09f9'/>
<id>urn:sha1:189d8c872bb1ac5a0280fbf232493ad4e15b09f9</id>
<content type='text'>
Signed-off-by: Richard Weinberger &lt;richard@nod.at&gt;
Signed-off-by: David Oberhollenzer &lt;david.oberhollenzer@sigma-star.at&gt;
</content>
</entry>
<entry>
<title>mkfs.ubifs: Enable support for building without crypto</title>
<updated>2018-11-01T11:42:31+00:00</updated>
<author>
<name>Richard Weinberger</name>
<email>richard@nod.at</email>
</author>
<published>2018-10-18T14:37:16+00:00</published>
<link rel='alternate' type='text/html' href='https://git.infraroot.at/mtd-utils.git/commit/?id=cc4c5e295f5467edf91bb355e3cd525b3279be31'/>
<id>urn:sha1:cc4c5e295f5467edf91bb355e3cd525b3279be31</id>
<content type='text'>
Signed-off-by: Richard Weinberger &lt;richard@nod.at&gt;
Signed-off-by: David Oberhollenzer &lt;david.oberhollenzer@sigma-star.at&gt;
</content>
</entry>
<entry>
<title>mkfs.ubifs: Move RAND_poll to crypto.c</title>
<updated>2018-11-01T11:42:25+00:00</updated>
<author>
<name>Richard Weinberger</name>
<email>richard@nod.at</email>
</author>
<published>2018-10-18T14:37:15+00:00</published>
<link rel='alternate' type='text/html' href='https://git.infraroot.at/mtd-utils.git/commit/?id=13eef731cf3911e5a60891a236d69ce4802e5326'/>
<id>urn:sha1:13eef731cf3911e5a60891a236d69ce4802e5326</id>
<content type='text'>
Signed-off-by: Richard Weinberger &lt;richard@nod.at&gt;
Signed-off-by: David Oberhollenzer &lt;david.oberhollenzer@sigma-star.at&gt;
</content>
</entry>
<entry>
<title>mkfs.ubifs: More fscryptctl compatibility</title>
<updated>2018-11-01T11:42:19+00:00</updated>
<author>
<name>Richard Weinberger</name>
<email>richard@nod.at</email>
</author>
<published>2018-10-18T14:37:14+00:00</published>
<link rel='alternate' type='text/html' href='https://git.infraroot.at/mtd-utils.git/commit/?id=cef0495f7a536256252a559c88266c8d272bfdb1'/>
<id>urn:sha1:cef0495f7a536256252a559c88266c8d272bfdb1</id>
<content type='text'>
fscryptctl reads up to FS_MAX_KEY_SIZE bytes from the source key
to compute the descriptor.

Signed-off-by: Richard Weinberger &lt;richard@nod.at&gt;
Signed-off-by: David Oberhollenzer &lt;david.oberhollenzer@sigma-star.at&gt;
</content>
</entry>
</feed>
