Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp721137iob; Wed, 18 May 2022 11:24:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz12SEQ31tRfPgZSxL/ZbrxgkBa3kjnOOeJg6A/aBga/Ak958q/05fCMYvhTTwhxY/HkkwG X-Received: by 2002:a17:90a:4148:b0:1df:6811:8633 with SMTP id m8-20020a17090a414800b001df68118633mr752073pjg.94.1652898242774; Wed, 18 May 2022 11:24:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652898242; cv=none; d=google.com; s=arc-20160816; b=P8w7hmu5Dy/OJIvA0W86awFn5I3O+nbhL65rRVw+0Ukq+2m4bB+VmIDFOC1ygIScYx Mnggf0WFH2DoOZ6JvWePryOQ8XbS2Fdv4qfbDkr+2vxZYuclo19zVc6bu/b3j9jiNmQN ox+UPkSmm86CgsHBWv8Z7LdsAEASwrvnRH2yHs7MaPk+bIwwKlpdDpSImuQ25AA5w0gJ CKj7Zm0gFjMwpKkUVlzo9kIIaM1ZdtKu61cWrmUUfEjuIDddMBcSCnDu6shuGDdgol9d SnjU6KUZQGXalDf9n0od4GoSSzGRLqrLr+cjg29CCxD5H6jZm5hm2maEzcobXXaMeRpw MPCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:mail-followup-to:message-id:subject:cc:to:from:date :dkim-signature; bh=BSStIx9A83ZgIdMdAhop9DurpOs3VaVQ8CwItY2at+c=; b=Jjba72Y7E3II6dY95MhBSzmr+yNOoMCC7h7iMvuq+PCETcqsheHgEzfRW+PIK1y0KX on0w/lqZHQvl2PqAG3WcJDwE9dUL9tuyx2IPgBo5MFRSLD+fboemlYcgd/TIZa64br7L WAuhHDVOgsrs5tAhRa1j7qO/BgXcvIk00KK/jqsv7LA0llkfmnM9Zq9oMKFlL2/8yJHe 8w+vWT67zM68gQ9UAd2H3PzkUdyOKX04dC2vZSmDeZJpN7fz4cCu2+ej/PFrBgnvSxCH 5Bov6+i7CQagfcZslrX/Rq//GPEwUESckXnwv9VY/VJ9UvNNDKqxWgnXsK7xGyebC4vn EO1Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=JYI+rAxd; spf=softfail (google.com: domain of transitioning linux-ext4-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id t127-20020a628185000000b00506855d333bsi4308087pfd.346.2022.05.18.11.24.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 18 May 2022 11:24:02 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-ext4-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=JYI+rAxd; spf=softfail (google.com: domain of transitioning linux-ext4-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 4525E2A243; Wed, 18 May 2022 11:16:24 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241307AbiERSQW (ORCPT + 99 others); Wed, 18 May 2022 14:16:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44144 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239866AbiERSQT (ORCPT ); Wed, 18 May 2022 14:16:19 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5096F29829 for ; Wed, 18 May 2022 11:16:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1652897776; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=BSStIx9A83ZgIdMdAhop9DurpOs3VaVQ8CwItY2at+c=; b=JYI+rAxdDmucY4MBuPF6r6+nKq7w6OvoHC3KYeg+Uk8LtwKojcn4ERPz+eW6ZmE7FeB/8m +x0agWEGZV/rNcV7ly74j+xxIc+oXrffOrtmw5a73sRB1lCBDg2JnJUm2tOfXF8VAqmQfA 1w2SIdV3C59LcGfOziyhJl2PMM7TYWw= Received: from mail-qv1-f72.google.com (mail-qv1-f72.google.com [209.85.219.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-173-XCItNxNVOiOWeM6CkX_Jig-1; Wed, 18 May 2022 14:16:14 -0400 X-MC-Unique: XCItNxNVOiOWeM6CkX_Jig-1 Received: by mail-qv1-f72.google.com with SMTP id n5-20020a0cbe85000000b0045aff56564bso2244078qvi.4 for ; Wed, 18 May 2022 11:16:14 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id :mail-followup-to:references:mime-version:content-disposition :in-reply-to; bh=BSStIx9A83ZgIdMdAhop9DurpOs3VaVQ8CwItY2at+c=; b=e5WoiKIUMR8qQ7MjDgOFBc8e9zddHum37sWq8mHV4VjpW2PmvZ05ImoeAU7aof6quy qIl8KrtTL98zlQ4+b4JG47sdbBoOWTqJdAsqFy80B7AnlE7241P/J/lRgo63jHp4xeDD iYP8BosGSuzSsC+T13lhLi7m7gqmQj9RZqy1x7XYBu6kRspIDZ7NUHkOhLVY6xd+4D6q eT2NTvQX5TKZIyLTwzK+BxVHh6V61O2WfDrWUwrv74XByEs3pDQ/muYCC0Mjn+cpb8rh itcd/g3u5zvjmPG7m0Ovk02Ai/UlToWbO74llqAjXrcJz2g5rkqlAWfcV/OLVCzoCq+d f09Q== X-Gm-Message-State: AOAM531lmSXV8YTloQ2b1KLba+ZGwczBs4F78XVVP4oCrHhpo6rV7N8t Tbs2/nIpxweKquaRIEqwqDAXq4rqyKE5JoukMD0o0mh30eFVQXOHKsxgg0EXSv+uBdzZ1l7/Bi4 XCqI7F7CS43xbXjHb3E0HPg== X-Received: by 2002:a05:6214:21e4:b0:45b:127b:7dca with SMTP id p4-20020a05621421e400b0045b127b7dcamr1023447qvj.98.1652897774395; Wed, 18 May 2022 11:16:14 -0700 (PDT) X-Received: by 2002:a05:6214:21e4:b0:45b:127b:7dca with SMTP id p4-20020a05621421e400b0045b127b7dcamr1023417qvj.98.1652897774068; Wed, 18 May 2022 11:16:14 -0700 (PDT) Received: from zlang-mailbox ([209.132.188.80]) by smtp.gmail.com with ESMTPSA id e4-20020a376904000000b0069fe1fc72e7sm1905664qkc.90.2022.05.18.11.16.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 18 May 2022 11:16:13 -0700 (PDT) Date: Thu, 19 May 2022 02:16:07 +0800 From: Zorro Lang To: Eric Biggers Cc: fstests@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-ext4@vger.kernel.org Subject: Re: [xfstests PATCH 0/2] update test_dummy_encryption testing in ext4/053 Message-ID: <20220518181607.fpzqmtnaky5jdiuw@zlang-mailbox> Mail-Followup-To: Eric Biggers , fstests@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-ext4@vger.kernel.org References: <20220501051928.540278-1-ebiggers@kernel.org> <20220518141911.zg73znk2o2krxxwk@zlang-mailbox> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-2.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Wed, May 18, 2022 at 10:37:47AM -0700, Eric Biggers wrote: > On Wed, May 18, 2022 at 10:19:11PM +0800, Zorro Lang wrote: > > On Sat, Apr 30, 2022 at 10:19:26PM -0700, Eric Biggers wrote: > > > This series updates the testing of the test_dummy_encryption mount > > > option in ext4/053. > > > > > > The first patch will be needed for the test to pass if the kernel patch > > > "ext4: only allow test_dummy_encryption when supported" > > > (https://lore.kernel.org/r/20220501050857.538984-2-ebiggers@kernel.org) > > > is applied. > > > > > > The second patch starts testing a case that previously wasn't tested. > > > It reproduces a bug that was introduced in the v5.17 kernel and will > > > be fixed by the kernel patch > > > "ext4: fix up test_dummy_encryption handling for new mount API" > > > (https://lore.kernel.org/r/20220501050857.538984-6-ebiggers@kernel.org). > > > > > > This applies on top of my recent patch > > > "ext4/053: fix the rejected mount option testing" > > > (https://lore.kernel.org/r/20220430192130.131842-1-ebiggers@kernel.org). > > > > Hi Eric, > > > > Your "ext4/053: fix the rejected mount option testing" has been merged. As the > > two kernel patches haven't been merged by upstream linux, I'd like to merge > > this patchset after the kernel patches be merged. (feel free to ping me, if > > I forget this:) > > Yes, I'm waiting for them to be applied. Thanks, I'll review this patches after your kernel patches be merged. Please remind me, if I don't notice that in time. > > > > > And I saw some discussion under this patchset, and no any RVB, so I'm wondering > > if you are still working/changing on it? > > > > I might add a check for kernel version >= 5.19 in patch 1. Otherwise I'm not > planning any more changes. Actually I don't think the kernel version check (in fstests) is a good method. Better to check a behavior/feature directly likes those "_require_*" functions. Why ext4/053 need >=5.12 or even >=5.19, what features restrict that? If some features testing might break the garden image (.out file), we can refer to _link_out_file(). Or even split this case to several small cases, make ext4/053 only test old stable behaviors. Then use other cases to test new features, and use _require_$feature_you_test for them (avoid the kernel version restriction). Thanks, Zorro > > - Eric >