lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 18 Apr 2022 18:43:15 -0400 From: "Theodore Ts'o" <tytso@....edu> To: Eric Biggers <ebiggers@...nel.org> Cc: 常凤楠 <changfengnan@...o.com>, "jaegeuk@...nel.org" <jaegeuk@...nel.org>, "chao@...nel.org" <chao@...nel.org>, "adilger.kernel@...ger.ca" <adilger.kernel@...ger.ca>, "axboe@...nel.dk" <axboe@...nel.dk>, "linux-block@...r.kernel.org" <linux-block@...r.kernel.org>, "linux-ext4@...r.kernel.org" <linux-ext4@...r.kernel.org>, "linux-f2fs-devel@...ts.sourceforge.net" <linux-f2fs-devel@...ts.sourceforge.net> Subject: Re: [PATCH 2/3] f2fs: notify when device not supprt inlinecrypt On Mon, Apr 18, 2022 at 03:27:16PM -0700, Eric Biggers wrote: > > When I test fscrypt first, it make me confused. Not a real problem, just make this logical more reasonable. > > Do you think this needs to be revised? > > Well, I'm just not sure we should do this, or at least by itself, given that > support for inline encryption is not an either-or thing, and the inlinecrypt > mount option is already documented to apply only to files where inline > encryption can be used. Indeed; some encryption algorithms won't be available because they weren't compiled into the kernel; others because block device for a particular file system doesn't support inline crypto. It seems to me that the test or the test runner should be able to figure this out. It should be able to explicitly try to set a particular policy, and if that policy fails, it should give an intelligent message, e.g., "Skipping this test config because inline-crypto isn't supported." Why can't we fix this in the test runner's scripts? - Ted
Powered by blists - more mailing lists