From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C0861C433DF for ; Mon, 15 Jun 2020 22:22:42 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id A0413207D3 for ; Mon, 15 Jun 2020 22:22:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592259762; bh=dEKEM9tfJcQh4c0Hq4LpP7QhlBxMRIlRi8fRHrmGiMA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=uJ/rbIXW5ORnMim8gHPC5WNTjqgFtVwUx1fPvgCazCraDbM87bzb1QXo0SZe7S7Ht ffmAdmFfIii9pO9w9C/6/Wdg6S1rY3nQ0k0m7SH/C2VBTP5kgbiAt6DNWPFJ3MXR4W HEAi09rMFv0y9s3gzYCl5niURdhJhwQD4QVZjRdo= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726341AbgFOWWm (ORCPT ); Mon, 15 Jun 2020 18:22:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:44730 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725960AbgFOWWm (ORCPT ); Mon, 15 Jun 2020 18:22:42 -0400 Received: from gmail.com (unknown [104.132.1.76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9116D20714; Mon, 15 Jun 2020 22:22:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592259761; bh=dEKEM9tfJcQh4c0Hq4LpP7QhlBxMRIlRi8fRHrmGiMA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=yV101K4k+8nMYB0Hj90e2MhEqc9Xu+Ra/bdEaJZ0JS5P7F8G7xT21kYJ2SlAgD475 j8kBgnWtwl7BmuuumVNCU3C7QzldqCW0/oFHvrchS+qR9y2yo7M1zZ/d8qkVnDtwCR s9DXnj1sWrjZWF906LLWq0j7/LKBXDZZ+z/pHWAA= Date: Mon, 15 Jun 2020 15:22:40 -0700 From: Eric Biggers To: "Theodore Y. Ts'o" Cc: linux-ext4@vger.kernel.org, linux-fscrypt@vger.kernel.org Subject: Re: [PATCH 0/4] e2fsprogs: fix and document the stable_inodes feature Message-ID: <20200615222240.GD85413@gmail.com> References: <20200401203239.163679-1-ebiggers@kernel.org> <20200410152406.GO45598@mit.edu> <20200507181847.GD236103@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200507181847.GD236103@gmail.com> Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Thu, May 07, 2020 at 11:18:47AM -0700, Eric Biggers wrote: > On Fri, Apr 10, 2020 at 11:24:06AM -0400, Theodore Y. Ts'o wrote: > > On Wed, Apr 01, 2020 at 01:32:35PM -0700, Eric Biggers wrote: > > > Fix tune2fs to not allow cases where IV_INO_LBLK_64-encrypted files > > > (which can exist if the stable_inodes feature is set) could be broken: > > > > > > - Changing the filesystem's UUID > > > - Clearing the stable_inodes feature > > > > > > Also document the stable_inodes feature in the appropriate places. > > > > > > Eric Biggers (4): > > > tune2fs: prevent changing UUID of fs with stable_inodes feature > > > tune2fs: prevent stable_inodes feature from being cleared > > > ext4.5: document the stable_inodes feature > > > tune2fs.8: document the stable_inodes feature > > > > Thanks, I've applied this patch series. > > > > Ted, I still don't see this in git. Are you planning to push it out? > Ping?