lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 7 Aug 2017 22:50:13 -0700 From: Eric Biggers <ebiggers3@...il.com> To: Dai Xiang <xiangx.dai@...el.com> Cc: Theodore Ts'o <tytso@....edu>, linux-ext4@...r.kernel.org Subject: Re: How to enable CONFIG_EXT4_ENCRYPTION On Tue, Aug 08, 2017 at 09:27:38AM +0800, Dai Xiang wrote: > > > > Actually, this is one of the tests in the "encrypt" group, which format the > > scratch device with "-O encrypt". So I believe the printed message is correct. > > Are you 100% sure that CONFIG_EXT4_ENCRYPTION is enabled in your kernel config > > and that you are running the correct kernel? > > I use v4.13-rc3 kernerl, and i find this info refer to https://wiki.archlinux.org/index.php/ext4#Using_file-based_encryption: > > Ext4 forbids encrypting the root (/) directory and will produce an error on kernel 4.13 and later > > Does it impact? > No, the tests do not try to encrypt the root directory. Can you please double check that the kernel you're testing actually has CONFIG_EXT4_ENCRYPTION enabled? Eric
Powered by blists - more mailing lists