Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp183565iob; Mon, 2 May 2022 16:32:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyqvDlXOnIdsxfm8AT3lDSNEXoZDo3lY4inPj13zUgjL/FA31zBrPnhWbJWZO5Fl7XqAJRa X-Received: by 2002:a17:903:244d:b0:15e:a3a2:5a6f with SMTP id l13-20020a170903244d00b0015ea3a25a6fmr7403152pls.72.1651534339004; Mon, 02 May 2022 16:32:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651534339; cv=none; d=google.com; s=arc-20160816; b=R+BX11neA7T8YkREogF9P0YnUZBUOWJi0YI0eob9/u6i0X09NleRzZSO6REKm08SNk z9mDJXAp/HO8ftgNAnru5EizRH1yku9ceSwmrNQu5NnvONwYtgjP/VbNynDBwin7vObr oT5kH2QIAqs+8Tc1qBFxc+A031drM1UsSCmdRdpi6hVnbp44mODD++M4xCmdEf/0s6Ec tqeSvLQTMFIjG5sd3PTjtC0xmYclPLvKWdVBS/CeUtt9/qd7ZTba+x3e/0uTWIUHUQ+y 6l2N2kW8CHMo35/8hDgUPfN+eu6PvsR/APv2hyXMUuoT36qpAcSIhdqgxSgJFqAmxsLA U7qg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=HVHUrWiiaWfwLM0mk62zD+pv8E3zx5KHujwrLi/E++Q=; b=fZNcX7tFqgsbUyriEXuni88YRirD+hNcC4IRqmSOeX5kjwKDf/Kx7azzHf5S0YMu57 gCYKwgWpIW1h0hOJxNR+rdkUH2p3Yl1vd3pE2vZDAXWBdum6QU4pODjjI4qdioNQUQxu feoUFyvm7+to7VP+JVWfzPsMVabnbJiCcoMkdKJaaL7j4fOZR7UhLcDU7qMJo51ufZiX iujYJr/rWKd9ybX4GEInuWTM/a8EaR6Mv7cMO6DLUdOPe2QNW/QfD35zWLp6Sl5eKPbF 48nuFe6UWEC/9Wod9K/6yZEsU1ldGZVuGhBmYDcskttpnSUppfkRgH3Na6Z1ciBTZKCd omzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="i/x1wgrc"; spf=softfail (google.com: domain of transitioning linux-ext4-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id c10-20020a170902aa4a00b00153b2d1655dsi14711144plr.357.2022.05.02.16.32.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 May 2022 16:32:18 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-ext4-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="i/x1wgrc"; spf=softfail (google.com: domain of transitioning linux-ext4-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id AB023FD35; Mon, 2 May 2022 16:32:08 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1382326AbiEBRWm (ORCPT + 99 others); Mon, 2 May 2022 13:22:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60968 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1378055AbiEBRWm (ORCPT ); Mon, 2 May 2022 13:22:42 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 21D42A1B3; Mon, 2 May 2022 10:19:13 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id A072161387; Mon, 2 May 2022 17:19:12 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id DA972C385A4; Mon, 2 May 2022 17:19:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1651511952; bh=CtRpX1tdcltC56Fv1eZRdGrqwoNvl2NEMPN+4Lp1ZSA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=i/x1wgrcgzDeaMLiYZ9AdDxoIXX/UruxTSQOa9XzRsHjlfMBMUp49E5LKJgYRqMuK +2zP0vkleiNW4OvfODRHSPwBzeWIZFEPUzJ+PWFLt2M4hNlPfQad76DxIT3NHBzQdZ HqQBrnNvUkaGYwSauo7O0eXkFe0RQLw+bK8cupKoZNdwhHjg5GMNduHLMaDyNtTYt6 yixey9gsNdzb6VyhqqgENzWLErp26zvcXVRwvaERes4gjqnOmrzTjeN5lueVFj8XCq tlWN9dKs2Bf/di6IL5CFnUa/aFHQaOE7yvTCBHt4ABRH12mEN6AeHsvql77um9kRKQ LIpivkerkzbFw== Date: Mon, 2 May 2022 10:19:10 -0700 From: Eric Biggers To: tytso Cc: fstests@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-ext4@vger.kernel.org, Lukas Czerner Subject: Re: [xfstests PATCH 1/2] ext4/053: update the test_dummy_encryption tests Message-ID: References: <20220501051928.540278-1-ebiggers@kernel.org> <20220501051928.540278-2-ebiggers@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-2.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Mon, May 02, 2022 at 05:46:11AM -0700, tytso wrote: > On Sat, Apr 30, 2022 at 10:19:27PM -0700, Eric Biggers wrote: > > > > The kernel patch "ext4: only allow test_dummy_encryption when supported" > > will tighten the requirements on when the test_dummy_encryption mount > > option will be accepted. Update ext4/053 accordingly. > > One of the problems with ext4/053 is that it is very implementation > dependent. It was useful when we were making the change to the new > mount API, but the problem is any future changes to the mount option > handling is going to break the patch. > > So for example, the kernel patch which Eric has proposed, "ext4: only > allow test_dummy_encryption when supported", breaks ext4/053, which I > noted in the review the patch. But then this patch will break kernels > as they currently stand without this patch, and for kernels that > haven't moved to the new mount API, fixing it is going to be a mess. > > Perhaps ext4/053 is still useful in that it will flag changes that > might unintentionally make user-visible changes mount options handling > in ext4, but for cases like this one, where we are changing a mount > option which is really intended for kernel developers, perhaps the > right approach here is to just remove the parts of ext4/053 that are > testing the behaviour of test_dummy_encryption in such a > super-nit-picky way? > > What do folks think? I'd like to keep the test_dummy_encryption test cases. Trying to add a couple new test cases (patch 2) actually found a regression. We could gate them on the kernel version, similar to the whole ext4/053 which already only runs on kernel version 5.12. (Kernel versions checks suck, but maybe it's the right choice for this very-nit-picky test.) Alternatively, I could just backport "ext4: only allow test_dummy_encryption when supported" to 5.15, which would be the only relevant LTS kernel version. > > > Move the test cases to later in the file to group them with the other > > test cases that use do_mkfs to add custom mkfs options instead of using > > the "default" filesystem that the test creates at the beginning. > > Note: this patch doesn't apply because ext4/053 currently has this > line: > > not_mnt test_dummy_encryption=v3 > > and the patch is trying to remove this line in the first patch chunk: > > mnt test_dummy_encryption=v3 ^test_dummy_encryption=v3 > > I checked the upstream version of ext4/053 just in case I had some > local modification of ext4/053 in my tree via "git diff -r > origin/master tests/ext4/053" but that returned no deltas. > > Eric, do you have a local modification to this test in your tree > already, perhaps? Sorry about that; as I mentioned in the cover letter, this is based on my other patch "ext4/053: fix the rejected mount option testing". As-is, 'not_mnt' doesn't really work at all, so I wanted to fix that first. - Eric