Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp6249650iob; Tue, 10 May 2022 13:58:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxI9swQeJ9d9ttT445JRhnYvQal/CSLXbg6GiYXQlbuEp/cRmk6THfqFo8kEts5iaPdy68M X-Received: by 2002:a17:906:6a14:b0:6f4:78b8:39e7 with SMTP id qw20-20020a1709066a1400b006f478b839e7mr21063446ejc.309.1652216336706; Tue, 10 May 2022 13:58:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652216336; cv=none; d=google.com; s=arc-20160816; b=UJvL0pIqO28Ns2aSJsAIxwMBDemHrHVA0dRsDRwY1HD1CxcqVOmIt9D5JlQFNo0x1Q byTW0wLibeZm5JIFnRUAM3vEDLojuBa3VZE2N9abf/K6aUbjKeW2N1BKlChV5zG8N4MW GfkIyzJ9uFmLlzs2sYCfrl5zqisXN6LXFo3JxqPOB6p2H9kcydQlBBlUCKeI30SYYW6N UmvdNydKjTcGScRg4KQgQiulLf6WtCTVCq71DcTbJjkFHTs3k61k1lJF7NbwKG75wofT adz7ls4Yb9Q3xo9DZyq8a+epJf48V72/eTB6C51mjibi55ZTa8HfmGp8j2vD7fjhZRTX OMRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Fnv249fYhc8awLEpKpIuokBw1LqlnSwBRge1pSiJuKI=; b=JYhq/3uB8nhxEsYmMeoiDO27CljeuLNMw9x4o6HyMT4aCq5sZRIThb0s/tCYUhdmW9 wwVWTOTBFxNJEHEyAtB4AmiMZeRAd4rF/6tmSoX28/UVoP9TaBW59OcBwwbuCPfTLiUD 1GbaUqWjKmD2ydLS3I6HHtlga4qdpffkrZG5q22Oe3u9tCngHuPnIGvuDKtQvOcnb13E N56JVDKaVlY7E3uR9jIUbRDD1iInwqYWqhOUogKRGL9WEp9uToqkD8/9xUJv8Kza7Hii +rhrbwErXmZGPrCd2fKGqIlNsJ6Z200mdDZR26bFa5STo1ndTlN4PN8VcxP1d6LkDVLE ExwQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@mit.edu header.s=outgoing header.b=mHIRvZ8l; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gz12-20020a170906f2cc00b006e875262481si260734ejb.936.2022.05.10.13.58.26; Tue, 10 May 2022 13:58:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@mit.edu header.s=outgoing header.b=mHIRvZ8l; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345347AbiEJPRP (ORCPT + 99 others); Tue, 10 May 2022 11:17:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40424 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345885AbiEJPQ3 (ORCPT ); Tue, 10 May 2022 11:16:29 -0400 Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7F2312415EF; Tue, 10 May 2022 07:53:45 -0700 (PDT) Received: from cwcc.thunk.org (pool-108-7-220-252.bstnma.fios.verizon.net [108.7.220.252]) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 24AErZnc016713 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 10 May 2022 10:53:36 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=outgoing; t=1652194417; bh=Fnv249fYhc8awLEpKpIuokBw1LqlnSwBRge1pSiJuKI=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=mHIRvZ8l7TINnwyjTRv2rS1u4BTuYkQ0wHiJOtYLShj92jKOcMEeI7cBoWDsUqXPy 6GZS2EKYWKtP9qcoXCryzwDQKZaglT8JqHqIdMHiT+2SFqKY4gIG8aZ43TlETy7vdx 1IUOSDlGPVjxtbXEfDXXkdwPVjaGiAEAnURFj2RhvoHRQjA6jrvvJdC3fcp03HQiKR gkMNPztoC16aUuTBMOvqoiIBff44qKAFH5V6h+EkDxxXUMA9vVnOJjZ4PsWOXRLn7M dFR9Sk5uAVBRqj0ZnEN2/AvJyawfIrCL7Oee0CUF03YAoRG79fXxUs/YdARIF1OM8O L9pD/5FmCu2WQ== Received: by cwcc.thunk.org (Postfix, from userid 15806) id 79F0015C3F0A; Tue, 10 May 2022 10:53:35 -0400 (EDT) Date: Tue, 10 May 2022 10:53:35 -0400 From: "Theodore Ts'o" To: Eric Biggers Cc: fstests@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-ext4@vger.kernel.org, Lukas Czerner Subject: Re: [xfstests PATCH 1/2] ext4/053: update the test_dummy_encryption tests Message-ID: References: <20220501051928.540278-1-ebiggers@kernel.org> <20220501051928.540278-2-ebiggers@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-4.0 required=5.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Mon, May 02, 2022 at 10:19:10AM -0700, Eric Biggers wrote: > > We could gate them on the kernel version, similar to the whole ext4/053 which > already only runs on kernel version 5.12. (Kernel versions checks suck, but > maybe it's the right choice for this very-nit-picky test.) Alternatively, I > could just backport "ext4: only allow test_dummy_encryption when supported" to > 5.15, which would be the only relevant LTS kernel version. If we don't need the "only allow test_dummy_encryption when supported" in any Android, Distro, or LTS kernel --- which seems to be a reasonable assumption, that seems to be OK. Lukas, do you agree? In the long term I suspect there will be times when we want to backport mount option handling changes to older kernels, and we're going to be hit this issue again, but as the saying goes, "sufficient unto the day is the evil thereof". - Ted