@@ -1204,6 +1204,18 @@ buffer. Some filesystems, such as UBIFS, already use temporary
1204
1204
buffers regardless of encryption. Other filesystems, such as ext4 and
1205
1205
F2FS, have to allocate bounce pages specially for encryption.
1206
1206
1207
+ Fscrypt is also able to use inline encryption hardware instead of the
1208
+ kernel crypto API for en/decryption of file contents. When possible,
1209
+ and if directed to do so (by specifying the 'inlinecrypt' mount option
1210
+ for an ext4/F2FS filesystem), it adds encryption contexts to bios and
1211
+ uses blk-crypto to perform the en/decryption instead of making use of
1212
+ the above read/write path changes. Of course, even if directed to
1213
+ make use of inline encryption, fscrypt will only be able to do so if
1214
+ either hardware inline encryption support is available for the
1215
+ selected encryption algorithm or CONFIG_BLK_INLINE_ENCRYPTION_FALLBACK
1216
+ is selected. If neither is the case, fscrypt will fall back to using
1217
+ the above mentioned read/write path changes for en/decryption.
1218
+
1207
1219
Filename hashing and encoding
1208
1220
-----------------------------
1209
1221
@@ -1250,7 +1262,9 @@ Tests
1250
1262
1251
1263
To test fscrypt, use xfstests, which is Linux's de facto standard
1252
1264
filesystem test suite. First, run all the tests in the "encrypt"
1253
- group on the relevant filesystem(s). For example, to test ext4 and
1265
+ group on the relevant filesystem(s). One can also run the tests
1266
+ with the 'inlinecrypt' mount option to test the implementation for
1267
+ inline encryption support. For example, to test ext4 and
1254
1268
f2fs encryption using `kvm-xfstests
1255
1269
<https://github.com/tytso/xfstests-bld/blob/master/Documentation/kvm-quickstart.md> `_::
1256
1270
0 commit comments