From: Eric Biggers <ebiggers@kernel.org>
To: Jaegeuk Kim <jaegeuk@kernel.org>, Chao Yu <yuchao0@huawei.com>,
Daeho Jeong <daehojeong@google.com>
Cc: fstests@vger.kernel.org, linux-fscrypt@vger.kernel.org,
linux-f2fs-devel@lists.sourceforge.net
Subject: Re: [PATCH 0/5] xfstests: test f2fs compression+encryption
Date: Tue, 6 Oct 2020 20:48:29 -0700 [thread overview]
Message-ID: <20201007034829.GA912@sol.localdomain> (raw)
In-Reply-To: <20201001002508.328866-1-ebiggers@kernel.org>
On Wed, Sep 30, 2020 at 05:25:02PM -0700, Eric Biggers wrote:
> Add a test which verifies that encryption is done correctly when a file
> on f2fs uses both compression and encryption at the same time.
>
> Patches 1-4 add prerequisites for the test, while patch 5 adds the
> actual test. Patch 2 also fixes a bug which could cause the existing
> test generic/602 to fail in extremely rare cases. See the commit
> messages for details.
>
> The new test passes both with and without the inlinecrypt mount option.
> It requires CONFIG_F2FS_FS_COMPRESSION=y.
>
> I'd appreciate the f2fs developers taking a look.
>
> Note, there is a quirk where the IVs in compressed files are off by one
> from the "natural" values. It's still secure, though it made the test
> slightly harder to write. I'm not sure how intentional this quirk was.
>
> Eric Biggers (5):
> fscrypt-crypt-util: clean up parsing --block-size and --inode-number
> fscrypt-crypt-util: fix IV incrementing for --iv-ino-lblk-32
> fscrypt-crypt-util: add --block-number option
> common/f2fs: add _require_scratch_f2fs_compression()
> f2fs: verify ciphertext of compressed+encrypted file
Jaegeuk, Chao, Daeho: any comments on this?
- Eric
next prev parent reply other threads:[~2020-10-07 3:48 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-10-01 0:25 [PATCH 0/5] xfstests: test f2fs compression+encryption Eric Biggers
2020-10-01 0:25 ` [PATCH 1/5] fscrypt-crypt-util: clean up parsing --block-size and --inode-number Eric Biggers
2020-10-01 0:25 ` [PATCH 2/5] fscrypt-crypt-util: fix IV incrementing for --iv-ino-lblk-32 Eric Biggers
2020-10-01 0:25 ` [PATCH 3/5] fscrypt-crypt-util: add --block-number option Eric Biggers
2020-10-01 0:25 ` [PATCH 4/5] common/f2fs: add _require_scratch_f2fs_compression() Eric Biggers
2020-10-01 0:25 ` [PATCH 5/5] f2fs: verify ciphertext of compressed+encrypted file Eric Biggers
2020-10-07 3:48 ` Eric Biggers [this message]
2020-10-07 4:27 ` [f2fs-dev] [PATCH 0/5] xfstests: test f2fs compression+encryption Daeho Jeong
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20201007034829.GA912@sol.localdomain \
--to=ebiggers@kernel.org \
--cc=daehojeong@google.com \
--cc=fstests@vger.kernel.org \
--cc=jaegeuk@kernel.org \
--cc=linux-f2fs-devel@lists.sourceforge.net \
--cc=linux-fscrypt@vger.kernel.org \
--cc=yuchao0@huawei.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).