Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp6091430ybf; Thu, 5 Mar 2020 12:57:46 -0800 (PST) X-Google-Smtp-Source: ADFU+vsK9wwtZCFCdOc7HsdU9YAkgFedsYC8svaS8mgM9MLwNRY5O8vXTFINnSwI9mORYNW0KHsa X-Received: by 2002:aca:4987:: with SMTP id w129mr237105oia.103.1583441866023; Thu, 05 Mar 2020 12:57:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583441866; cv=none; d=google.com; s=arc-20160816; b=pFzuKf1AUnBjQ/16sXe6gCT0PEmZaPqu1jKbwyZI60qv4p/vaLhbpJuMlmWHh8FwSh 2lfgAO9J4CLOzQXohvhur8PeuV9fGubxf4nUlaQKBHkSO3uZSAp+Bfbw5Toxk6+aJ0o3 2O1B6zMxNVZFkU5AUxrR2IdX7DRuUmtuSmh4TJbNAQ3bjA7PRKKVYl3W2on2joeQYwhf VG3KhMlxo7C1RFSTUXA7dIOozKrz7sT/V3Mva9g6ejRx6Gl32JpMGN9s4l1DZ7OZyk7R rCQSuphR/vOs4qRyHFHDROz353YkOXiYvF9osV/dEA96Wx3nfsn1T18+WIE1GjIs59WF 9CAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=J3LYhRTQPxDvZsMOkuHMs5UxXR1j01TdCG/UxOWKpMk=; b=dL44ilV/V7e8O7IVtXLySRMv2PPRHDMKB0FEwTU+QNyZRWcgOBipDir22N1yg6DOgp q6bO8a0bs/oPjrNSnUGZEFnDHmAN2y2SsDnJ/8QO2Cii+cpxU1xiu9ggH4QcyCBi7c+i dF7bNtQvdbcX1AaJId1ps6rhegNqx2yjWlzk5gdC9ezo2RvJWF2Muo7nD3rgzoq5efk+ G9+Kuuhrsif7yMPsNHRFfkNbs+06IVsDk3URSje1IAmxrtMB47/RniMy1tIg7fJ39gwJ 48mAiM3eelWsVl8c8e5jjoF+kXf+3+2LixjOMyv8A+OPsR/Vq1QFVj8/aGcUGU0lYUQ3 kgrQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w7si45886otm.256.2020.03.05.12.57.33; Thu, 05 Mar 2020 12:57:46 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726080AbgCEU53 (ORCPT + 99 others); Thu, 5 Mar 2020 15:57:29 -0500 Received: from outgoing-auth-1.mit.edu ([18.9.28.11]:52278 "EHLO outgoing.mit.edu" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726049AbgCEU53 (ORCPT ); Thu, 5 Mar 2020 15:57:29 -0500 Received: from callcc.thunk.org (guestnat-104-133-0-105.corp.google.com [104.133.0.105] (may be forged)) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 025KvP3n009056 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 5 Mar 2020 15:57:25 -0500 Received: by callcc.thunk.org (Postfix, from userid 15806) id 90F0842045B; Thu, 5 Mar 2020 15:57:24 -0500 (EST) Date: Thu, 5 Mar 2020 15:57:24 -0500 From: "Theodore Y. Ts'o" To: Eric Whitney Cc: linux-ext4@vger.kernel.org Subject: Re: [PATCH] ext4: remove EXT4_EOFBLOCKS_FL and associated code Message-ID: <20200305205724.GE20967@mit.edu> References: <20200211210216.24960-1-enwlinux@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200211210216.24960-1-enwlinux@gmail.com> Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Tue, Feb 11, 2020 at 04:02:16PM -0500, Eric Whitney wrote: > The EXT4_EOFBLOCKS_FL inode flag is used to indicate whether a file > contains unwritten blocks past i_size. It's set when ext4_fallocate > is called with the KEEP_SIZE flag to extend a file with an unwritten > extent. However, this flag hasn't been useful functionally since > March, 2012, when a decision was made to remove it from ext4. > > All traces of EXT4_EOFBLOCKS_FL were removed from e2fsprogs version > 1.42.2 by commit 010dc7b90d97 ("e2fsck: remove EXT4_EOFBLOCKS_FL flag > handling") at that time. Now that enough time has passed to make > e2fsprogs versions containing this modification common, this patch now > removes the code associated with EXT4_EOFBLOCKS_FL from the kernel as > well. > > This change has two implications. First, because pre-1.42.2 e2fsck > versions only look for a problem if EXT4_EOFBLOCKS_FL is set, and > because that bit will never be set by newer kernels containing this > patch, old versions of e2fsck won't have a compatibility problem with > files created by newer kernels. > > Second, newer kernels will not clear EXT4_EOFBLOCKS_FL inode flag bits > belonging to a file written by an older kernel. If set, it will remain > in that state until the file is deleted. Because e2fsck versions since > 1.42.2 don't check the flag at all, no adverse effect is expected. > However, pre-1.42.2 e2fsck versions that do check the flag may report > that it is set when it ought not to be after a file has been truncated > or had its unwritten blocks written. In this case, the old version of > e2fsck will offer to clear the flag. No adverse effect would then > occur whether the user chooses to clear the flag or not. > > Signed-off-by: Eric Whitney Applied, thanks. - Ted