From patchwork Thu Jun 29 22:17:15 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sweet Tea Dorminy X-Patchwork-Id: 13297373 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6F619C001B0 for ; Thu, 29 Jun 2023 22:25:37 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229910AbjF2WZg (ORCPT ); Thu, 29 Jun 2023 18:25:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40384 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229646AbjF2WZf (ORCPT ); Thu, 29 Jun 2023 18:25:35 -0400 X-Greylist: delayed 479 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Thu, 29 Jun 2023 15:25:33 PDT Received: from box.fidei.email (box.fidei.email [71.19.144.250]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F30EA30F6 for ; Thu, 29 Jun 2023 15:25:33 -0700 (PDT) Received: from authenticated-user (box.fidei.email [71.19.144.250]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by box.fidei.email (Postfix) with ESMTPSA id AE32980702; Thu, 29 Jun 2023 18:17:31 -0400 (EDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=dorminy.me; s=mail; t=1688077052; bh=tSjVvle2uSxcOZ/ckvaZRLq6Jdqi0bIN8G3EChW8wBU=; h=From:To:Cc:Subject:Date:From; b=sEJkDDgR2OCWn0nd0/afpZx/xb8Yo/cGdaIZHU7qg19lsZ+eiFuTpwZwo4rBH1m2h SCabloxgV2GaU6L23WzFX4/qcXSMsthivJGxwH1/aliL+1cNwLoEwcCFulbDegJYCF RLqWLWUTHcQFOYMPl03VTGkFxurdIGIRWW5/7uPej8iDzbcmj1s82n835TPnhrOokW Tfvzas9n11HjFapO3d8/NMPhCa5vUAakCeZ6hTeVlR/Tch1nIUWExIzsNYOYhqRo3m GWCudfjkEZBgtaTxXsRe8j0si5tn5UFrs36fpK6AzxzwH2e7aJXJJxJoD10hET4K5C p0Y2ifVObxE/Q== From: Sweet Tea Dorminy To: linux-btrfs@vger.kernel.org, fstests@vger.kernel.org, kernel-team@meta.com, ebiggers@google.com, anand.jain@oracle.com, fdmanana@suse.com, linux-fscrypt@vger.kernel.org, fsverity@lists.linux.dev, zlang@kernel.org Cc: Sweet Tea Dorminy Subject: [RFC PATCH 0/8] fstests: add btrfs encryption testing Date: Thu, 29 Jun 2023 18:17:15 -0400 Message-Id: MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: fstests@vger.kernel.org This is a preliminary fstests side of the btrfs encryption feature; more tests are needed, but this gets the existing encryption tests working with btrfs. This requires the progs and the kernel changes: [1] [2]. Marked as RFC because they're not ready to merge until all its dependencies finish landing. [1] https://lore.kernel.org/linux-btrfs/cover.1688068420.git.sweettea-kernel@dorminy.me/T/#t [2] https://lore.kernel.org/linux-btrfs/cover.1687988380.git.sweettea-kernel@dorminy.me/T/#t Sweet Tea Dorminy (8): common/encrypt: separate data and inode nonces common/encrypt: add btrfs to get_encryption_*nonce common/encrypt: add btrfs to get_ciphertext_filename common/encrypt: enable making a encrypted btrfs filesystem generic/613: write some actual data for btrfs tests: adjust encryption tests for extent encryption common/verity: explicitly don't allow btrfs encryption btrfs: add simple test of reflink of encrypted data common/encrypt | 86 +++++++++++++++++++++++++++++++++++++++++---- common/verity | 4 +++ tests/btrfs/613 | 62 ++++++++++++++++++++++++++++++++ tests/btrfs/613.out | 13 +++++++ tests/generic/429 | 6 ++++ tests/generic/580 | 4 +++ tests/generic/595 | 4 +++ tests/generic/613 | 12 ++++--- 8 files changed, 180 insertions(+), 11 deletions(-) create mode 100755 tests/btrfs/613 create mode 100644 tests/btrfs/613.out base-commit: 87f90a2dae7a4adb7a0a314e27abae9aa1de78fb