aboutsummaryrefslogtreecommitdiffstats
path: root/executor/executor_linux.h
diff options
context:
space:
mode:
authorEric Biggers <ebiggers@google.com>2020-12-01 19:31:29 -0800
committerDmitry Vyukov <dvyukov@google.com>2020-12-03 10:03:12 +0100
commite6b0d3140b98e8456fbd089d584e932e19257d94 (patch)
tree31e17b9d8d299e6f931e133a0391e3591fa08b78 /executor/executor_linux.h
parent15ab7140c0419b3ca8c88e153d9876b3c8aae0eb (diff)
sys/linux: add some basic fscrypt test programs
With fscrypt (a.k.a. ext4, f2fs, and ubifs encryption), several steps are required to get to a properly set-up encrypted directory: - Mount a filesystem that supports encryption. - Call FS_IOC_ADD_ENCRYPTION_KEY on the mountpoint. - Create a directory in the filesystem. - Call FS_IOC_SET_ENCRYPTION_POLICY on the directory, specifying the encryption key that was added earlier. - Then actually create stuff in the directory. It may be too hard for syzkaller to generate all these steps, which may explain why syzbot isn't yet properly covering the fscrypt code; see https://storage.googleapis.com/syzkaller/cover/ci-upstream-kasan-gce.html which currently shows only 5% coverage of the fs/crypto/ directory. Therefore add some test programs which do this setup on ext4 and f2fs. Note that ubifs support can't be included yet because syzkaller doesn't yet know how to mount an ubifs filesystem (which would likely require using block2mtd, as ubifs uses MTD devices rather than block devices).
Diffstat (limited to 'executor/executor_linux.h')
0 files changed, 0 insertions, 0 deletions