On 27/05/2020 15:55, Johannes Thumshirn wrote: > On 27/05/2020 15:25, David Sterba wrote: >> On Thu, May 14, 2020 at 11:24:14AM +0200, Johannes Thumshirn wrote: >>> From: Johannes Thumshirn <johannes.thumshirn@xxxxxxx> >>> Example usage: >>> Create a file-system with authentication key 0123456 >>> mkfs.btrfs --csum "hmac(sha256)" --auth-key 0123456 /dev/disk >>> >>> Add the key to the kernel's keyring as keyid 'btrfs:foo' >>> keyctl add logon btrfs:foo 0123456 @u >>> >>> Mount the fs using the 'btrfs:foo' key >>> mount -o auth_key=btrfs:foo,auth_hash_name="hmac(sha256)" /dev/disk /mnt/point >> >> I tried to follow the example but the filesystem does not mount. But >> what almost shocked me was the way the key is specified on the userspace >> side. OK I think I know what happened. Did I forget to send a v2 of the progs side? I changed the csum_type number to not have holes in the array, this obviously needs to be done in progs as well.