* [PATCH] Check for immutable flag in fallocate path @ 2011-02-21 8:26 Marco Stornelli 2011-02-21 12:46 ` Christoph Hellwig ` (2 more replies) 0 siblings, 3 replies; 23+ messages in thread From: Marco Stornelli @ 2011-02-21 8:26 UTC (permalink / raw) To: Linux Kernel; +Cc: linux-ext4, linux-btrfs, cluster-devel, xfs, Linux FS Devel From: Marco Stornelli <marco.stornelli@gmail.com> All fs must check for the immutable flag in their fallocate callback. It's possible to have a race condition in this scenario: an application open a file in read/write and it does something, meanwhile root set the immutable flag on the file, the application at that point can call fallocate with success. Only Ocfs2 check for the immutable flag at the moment. Signed-off-by: Marco Stornelli <marco.stornelli@gmail.com> --- Patch is against 2.6.38-rc5 --- linux-2.6.38-rc5-orig/fs/ext4/extents.c 2011-02-16 04:23:45.000000000 +0100 +++ linux-2.6.38-rc5/fs/ext4/extents.c 2011-02-21 08:43:37.000000000 +0100 @@ -3670,6 +3670,12 @@ long ext4_fallocate(struct file *file, i */ credits = ext4_chunk_trans_blocks(inode, max_blocks); mutex_lock(&inode->i_mutex); + + if (IS_IMMUTABLE(inode)) { + mutex_unlock(&inode->i_mutex); + return -EPERM; + } + ret = inode_newsize_ok(inode, (len + offset)); if (ret) { mutex_unlock(&inode->i_mutex); --- linux-2.6.38-rc5-orig/fs/btrfs/file.c 2011-02-16 04:23:45.000000000 +0100 +++ linux-2.6.38-rc5/fs/btrfs/file.c 2011-02-21 08:55:58.000000000 +0100 @@ -1289,6 +1289,12 @@ static long btrfs_fallocate(struct file btrfs_wait_ordered_range(inode, alloc_start, alloc_end - alloc_start); mutex_lock(&inode->i_mutex); + + if (IS_IMMUTABLE(inode)) { + ret = -EPERM; + goto out; + } + ret = inode_newsize_ok(inode, alloc_end); if (ret) goto out; --- linux-2.6.38-rc5-orig/fs/xfs/linux-2.6/xfs_file.c 2011-02-16 04:23:45.000000000 +0100 +++ linux-2.6.38-rc5/fs/xfs/linux-2.6/xfs_file.c 2011-02-21 09:07:46.000000000 +0100 @@ -909,6 +909,11 @@ xfs_file_fallocate( if (mode & FALLOC_FL_PUNCH_HOLE) cmd = XFS_IOC_UNRESVSP; + if (IS_IMMUTABLE(inode)) { + error = -EPERM; + goto out_unlock; + } + /* check the new inode size is valid before allocating */ if (!(mode & FALLOC_FL_KEEP_SIZE) && offset + len > i_size_read(inode)) { --- linux-2.6.38-rc5-orig/fs/gfs2/file.c 2011-02-16 04:23:45.000000000 +0100 +++ linux-2.6.38-rc5/fs/gfs2/file.c 2011-02-21 09:09:17.000000000 +0100 @@ -797,6 +797,11 @@ static long gfs2_fallocate(struct file * if (unlikely(error)) goto out_uninit; + if (IS_IMMUTABLE(inode)) { + error = -EPERM; + goto out_unlock; + } + if (!gfs2_write_alloc_required(ip, offset, len)) goto out_unlock; ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH] Check for immutable flag in fallocate path 2011-02-21 8:26 [PATCH] Check for immutable flag in fallocate path Marco Stornelli @ 2011-02-21 12:46 ` Christoph Hellwig 2011-02-21 16:50 ` Marco Stornelli 2011-02-26 14:59 ` Marco Stornelli 2011-03-03 8:42 ` [PATCH v2] " Marco Stornelli 2 siblings, 1 reply; 23+ messages in thread From: Christoph Hellwig @ 2011-02-21 12:46 UTC (permalink / raw) To: Marco Stornelli Cc: Linux Kernel, cluster-devel, Linux FS Devel, linux-ext4, linux-btrfs, xfs On Mon, Feb 21, 2011 at 09:26:32AM +0100, Marco Stornelli wrote: > From: Marco Stornelli <marco.stornelli@gmail.com> > > All fs must check for the immutable flag in their fallocate callback. > It's possible to have a race condition in this scenario: an application > open a file in read/write and it does something, meanwhile root set the > immutable flag on the file, the application at that point can call > fallocate with success. Only Ocfs2 check for the immutable flag at the > moment. Please add the check in fs/open.c:do_fallocate() so that it covers all filesystems. ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH] Check for immutable flag in fallocate path 2011-02-21 12:46 ` Christoph Hellwig @ 2011-02-21 16:50 ` Marco Stornelli 2011-02-27 22:49 ` Ted Ts'o 0 siblings, 1 reply; 23+ messages in thread From: Marco Stornelli @ 2011-02-21 16:50 UTC (permalink / raw) To: Christoph Hellwig Cc: Linux Kernel, cluster-devel, Linux FS Devel, linux-ext4, linux-btrfs, xfs 2011/2/21 Christoph Hellwig <hch@infradead.org>: > On Mon, Feb 21, 2011 at 09:26:32AM +0100, Marco Stornelli wrote: >> From: Marco Stornelli <marco.stornelli@gmail.com> >> >> All fs must check for the immutable flag in their fallocate callback. >> It's possible to have a race condition in this scenario: an application >> open a file in read/write and it does something, meanwhile root set the >> immutable flag on the file, the application at that point can call >> fallocate with success. Only Ocfs2 check for the immutable flag at the >> moment. > > Please add the check in fs/open.c:do_fallocate() so that it covers all > filesystems. > > The check should be done after the fs got the inode mutex lock. Marco ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH] Check for immutable flag in fallocate path 2011-02-21 16:50 ` Marco Stornelli @ 2011-02-27 22:49 ` Ted Ts'o 2011-02-28 7:53 ` Marco Stornelli 2011-03-02 8:19 ` Marco Stornelli 0 siblings, 2 replies; 23+ messages in thread From: Ted Ts'o @ 2011-02-27 22:49 UTC (permalink / raw) To: Marco Stornelli Cc: Christoph Hellwig, Linux Kernel, cluster-devel, Linux FS Devel, linux-ext4, linux-btrfs, xfs On Mon, Feb 21, 2011 at 05:50:21PM +0100, Marco Stornelli wrote: > 2011/2/21 Christoph Hellwig <hch@infradead.org>: > > On Mon, Feb 21, 2011 at 09:26:32AM +0100, Marco Stornelli wrote: > >> From: Marco Stornelli <marco.stornelli@gmail.com> > >> > >> All fs must check for the immutable flag in their fallocate callback. > >> It's possible to have a race condition in this scenario: an application > >> open a file in read/write and it does something, meanwhile root set the > >> immutable flag on the file, the application at that point can call > >> fallocate with success. Only Ocfs2 check for the immutable flag at the > >> moment. > > > > Please add the check in fs/open.c:do_fallocate() so that it covers all > > filesystems. > > > > > > The check should be done after the fs got the inode mutex lock. Why? None of the other places which check the IMMUTABLE flag do so under the inode mutex lock. Yes, it's true that we're not properly doing proper locking when updating i_flags from the ioctl (this is true for all file systems), but this has been true for quite some time, and using a mutex to protect bit set/clear/test operations would be like using a sledgehammer to kill a fly. A proper fix if we want to be completely correct about updates to i_flags would involve using test_bit, set_bit, and clear_bit, which is guaranteed to be atomic. This is how we update the ext4_inode_info->i_flags (which is different from inode->i_flags) (see the definition and use of EXT4_INODE_BIT_FNS in fs/ext4/ext4.h). At some point, it would be good to fix how we set/get i_flags values, but that's independent of the change that's being discussed here. - Ted ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH] Check for immutable flag in fallocate path 2011-02-27 22:49 ` Ted Ts'o @ 2011-02-28 7:53 ` Marco Stornelli 2011-03-02 8:19 ` Marco Stornelli 1 sibling, 0 replies; 23+ messages in thread From: Marco Stornelli @ 2011-02-28 7:53 UTC (permalink / raw) To: Ted Ts'o, Marco Stornelli, Christoph Hellwig, Linux Kernel, cluster-devel 2011/2/27 Ted Ts'o <tytso@mit.edu>: > On Mon, Feb 21, 2011 at 05:50:21PM +0100, Marco Stornelli wrote: >> 2011/2/21 Christoph Hellwig <hch@infradead.org>: >> > On Mon, Feb 21, 2011 at 09:26:32AM +0100, Marco Stornelli wrote: >> >> From: Marco Stornelli <marco.stornelli@gmail.com> >> >> >> >> All fs must check for the immutable flag in their fallocate callback. >> >> It's possible to have a race condition in this scenario: an application >> >> open a file in read/write and it does something, meanwhile root set the >> >> immutable flag on the file, the application at that point can call >> >> fallocate with success. Only Ocfs2 check for the immutable flag at the >> >> moment. >> > >> > Please add the check in fs/open.c:do_fallocate() so that it covers all >> > filesystems. >> > >> > >> >> The check should be done after the fs got the inode mutex lock. > > Why? None of the other places which check the IMMUTABLE flag do so > under the inode mutex lock. Yes, it's true that we're not properly > doing proper locking when updating i_flags from the ioctl (this is > true for all file systems), but this has been true for quite some > time, and using a mutex to protect bit set/clear/test operations would > be like using a sledgehammer to kill a fly. > > A proper fix if we want to be completely correct about updates to > i_flags would involve using test_bit, set_bit, and clear_bit, which is > guaranteed to be atomic. This is how we update the > ext4_inode_info->i_flags (which is different from inode->i_flags) (see > the definition and use of EXT4_INODE_BIT_FNS in fs/ext4/ext4.h). > > At some point, it would be good to fix how we set/get i_flags values, > but that's independent of the change that's being discussed here. > > - Ted > I was thinking to the possible race with setattr callback. Marco -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH] Check for immutable flag in fallocate path 2011-02-27 22:49 ` Ted Ts'o 2011-02-28 7:53 ` Marco Stornelli @ 2011-03-02 8:19 ` Marco Stornelli 1 sibling, 0 replies; 23+ messages in thread From: Marco Stornelli @ 2011-03-02 8:19 UTC (permalink / raw) To: Ted Ts'o, Christoph Hellwig, Linux Kernel, cluster-devel, Linux FS Devel Il 27/02/2011 23:49, Ted Ts'o ha scritto: > On Mon, Feb 21, 2011 at 05:50:21PM +0100, Marco Stornelli wrote: >> 2011/2/21 Christoph Hellwig <hch@infradead.org>: >>> On Mon, Feb 21, 2011 at 09:26:32AM +0100, Marco Stornelli wrote: >>>> From: Marco Stornelli <marco.stornelli@gmail.com> >>>> >>>> All fs must check for the immutable flag in their fallocate callback. >>>> It's possible to have a race condition in this scenario: an application >>>> open a file in read/write and it does something, meanwhile root set the >>>> immutable flag on the file, the application at that point can call >>>> fallocate with success. Only Ocfs2 check for the immutable flag at the >>>> moment. >>> >>> Please add the check in fs/open.c:do_fallocate() so that it covers all >>> filesystems. >>> >>> >> >> The check should be done after the fs got the inode mutex lock. > > Why? None of the other places which check the IMMUTABLE flag do so I add to my previous response an other point: IMHO each fs should check for it because after the inclusion of punch hole patch, the fs can/cannot check for the append-only flag. So XFS (it supports the "unreserve") should check even for append. I think we don't want to allow this operation for an append-only file, isn't it? About this point I'll update and resend my patch. Marco ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH] Check for immutable flag in fallocate path 2011-02-21 8:26 [PATCH] Check for immutable flag in fallocate path Marco Stornelli 2011-02-21 12:46 ` Christoph Hellwig @ 2011-02-26 14:59 ` Marco Stornelli 2011-03-03 8:42 ` [PATCH v2] " Marco Stornelli 2 siblings, 0 replies; 23+ messages in thread From: Marco Stornelli @ 2011-02-26 14:59 UTC (permalink / raw) To: Linux Kernel; +Cc: linux-ext4, linux-btrfs, cluster-devel, xfs, Linux FS Devel Il 21/02/2011 09:26, Marco Stornelli ha scritto: > From: Marco Stornelli <marco.stornelli@gmail.com> > > All fs must check for the immutable flag in their fallocate callback. > It's possible to have a race condition in this scenario: an application > open a file in read/write and it does something, meanwhile root set the > immutable flag on the file, the application at that point can call > fallocate with success. Only Ocfs2 check for the immutable flag at the > moment. > > Signed-off-by: Marco Stornelli <marco.stornelli@gmail.com> no comments? ^ permalink raw reply [flat|nested] 23+ messages in thread
* [PATCH v2] Check for immutable flag in fallocate path 2011-02-21 8:26 [PATCH] Check for immutable flag in fallocate path Marco Stornelli 2011-02-21 12:46 ` Christoph Hellwig 2011-02-26 14:59 ` Marco Stornelli @ 2011-03-03 8:42 ` Marco Stornelli 2011-03-03 21:39 ` Dave Chinner 2011-03-05 9:37 ` [PATCH v3] Check for immutable/append " Marco Stornelli 2 siblings, 2 replies; 23+ messages in thread From: Marco Stornelli @ 2011-03-03 8:42 UTC (permalink / raw) To: Linux Kernel; +Cc: linux-ext4, linux-btrfs, cluster-devel, xfs, Linux FS Devel From: Marco Stornelli <marco.stornelli@gmail.com> All fs must check for the immutable flag in their fallocate callback. It's possible to have a race condition in this scenario: an application open a file in read/write and it does something, meanwhile root set the immutable flag on the file, the application at that point can call fallocate with success. Only Ocfs2 check for the immutable flag at the moment. Signed-off-by: Marco Stornelli <marco.stornelli@gmail.com> --- Patch is against 2.6.38-rc5 ChangeLog v2: Added the check for append-only file for XFS v1: First draft --- linux-2.6.38-rc5-orig/fs/ext4/extents.c 2011-02-16 04:23:45.000000000 +0100 +++ linux-2.6.38-rc5/fs/ext4/extents.c 2011-02-21 08:43:37.000000000 +0100 @@ -3670,6 +3670,12 @@ long ext4_fallocate(struct file *file, i */ credits = ext4_chunk_trans_blocks(inode, max_blocks); mutex_lock(&inode->i_mutex); + + if (IS_IMMUTABLE(inode)) { + mutex_unlock(&inode->i_mutex); + return -EPERM; + } + ret = inode_newsize_ok(inode, (len + offset)); if (ret) { mutex_unlock(&inode->i_mutex); --- linux-2.6.38-rc5-orig/fs/btrfs/file.c 2011-02-16 04:23:45.000000000 +0100 +++ linux-2.6.38-rc5/fs/btrfs/file.c 2011-02-21 08:55:58.000000000 +0100 @@ -1289,6 +1289,12 @@ static long btrfs_fallocate(struct file btrfs_wait_ordered_range(inode, alloc_start, alloc_end - alloc_start); mutex_lock(&inode->i_mutex); + + if (IS_IMMUTABLE(inode)) { + ret = -EPERM; + goto out; + } + ret = inode_newsize_ok(inode, alloc_end); if (ret) goto out; --- linux-2.6.38-rc5-orig/fs/gfs2/file.c 2011-02-16 04:23:45.000000000 +0100 +++ linux-2.6.38-rc5/fs/gfs2/file.c 2011-02-21 09:09:17.000000000 +0100 @@ -797,6 +797,11 @@ static long gfs2_fallocate(struct file * if (unlikely(error)) goto out_uninit; + if (IS_IMMUTABLE(inode)) { + error = -EPERM; + goto out_unlock; + } + if (!gfs2_write_alloc_required(ip, offset, len)) goto out_unlock; --- ./linux-2.6.38-rc5/fs/xfs/linux-2.6/xfs_file.c 2011-02-16 04:23:45.000000000 +0100 +++ ./linux-2.6.38-rc5/fs/xfs/linux-2.6/xfs_file.c 2011-03-03 09:25:32.000000000 +0100 @@ -906,8 +906,18 @@ xfs_file_fallocate( xfs_ilock(ip, XFS_IOLOCK_EXCL); - if (mode & FALLOC_FL_PUNCH_HOLE) + if (mode & FALLOC_FL_PUNCH_HOLE) { cmd = XFS_IOC_UNRESVSP; + if (IS_APPEND(inode)) { + error = -EPERM; + goto out_unlock; + } + } + + if (IS_IMMUTABLE(inode)) { + error = -EPERM; + goto out_unlock; + } /* check the new inode size is valid before allocating */ if (!(mode & FALLOC_FL_KEEP_SIZE) && ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH v2] Check for immutable flag in fallocate path 2011-03-03 8:42 ` [PATCH v2] " Marco Stornelli @ 2011-03-03 21:39 ` Dave Chinner 2011-03-04 8:17 ` Marco Stornelli 2011-03-14 10:24 ` Christoph Hellwig 2011-03-05 9:37 ` [PATCH v3] Check for immutable/append " Marco Stornelli 1 sibling, 2 replies; 23+ messages in thread From: Dave Chinner @ 2011-03-03 21:39 UTC (permalink / raw) To: Marco Stornelli Cc: Linux Kernel, linux-ext4, linux-btrfs, cluster-devel, xfs, Linux FS Devel On Thu, Mar 03, 2011 at 09:42:27AM +0100, Marco Stornelli wrote: > From: Marco Stornelli <marco.stornelli@gmail.com> > > All fs must check for the immutable flag in their fallocate callback. > It's possible to have a race condition in this scenario: an application > open a file in read/write and it does something, meanwhile root set the > immutable flag on the file, the application at that point can call > fallocate with success. Only Ocfs2 check for the immutable flag at the > moment. > > Signed-off-by: Marco Stornelli <marco.stornelli@gmail.com> > --- > Patch is against 2.6.38-rc5 > > ChangeLog > v2: Added the check for append-only file for XFS > v1: First draft > > --- linux-2.6.38-rc5-orig/fs/ext4/extents.c 2011-02-16 04:23:45.000000000 +0100 > +++ linux-2.6.38-rc5/fs/ext4/extents.c 2011-02-21 08:43:37.000000000 +0100 > @@ -3670,6 +3670,12 @@ long ext4_fallocate(struct file *file, i > */ > credits = ext4_chunk_trans_blocks(inode, max_blocks); > mutex_lock(&inode->i_mutex); > + > + if (IS_IMMUTABLE(inode)) { > + mutex_unlock(&inode->i_mutex); > + return -EPERM; > + } > + > ret = inode_newsize_ok(inode, (len + offset)); > if (ret) { > mutex_unlock(&inode->i_mutex); > --- linux-2.6.38-rc5-orig/fs/btrfs/file.c 2011-02-16 04:23:45.000000000 +0100 > +++ linux-2.6.38-rc5/fs/btrfs/file.c 2011-02-21 08:55:58.000000000 +0100 > @@ -1289,6 +1289,12 @@ static long btrfs_fallocate(struct file > btrfs_wait_ordered_range(inode, alloc_start, alloc_end - alloc_start); > > mutex_lock(&inode->i_mutex); > + > + if (IS_IMMUTABLE(inode)) { > + ret = -EPERM; > + goto out; > + } > + > ret = inode_newsize_ok(inode, alloc_end); > if (ret) > goto out; > --- linux-2.6.38-rc5-orig/fs/gfs2/file.c 2011-02-16 04:23:45.000000000 +0100 > +++ linux-2.6.38-rc5/fs/gfs2/file.c 2011-02-21 09:09:17.000000000 +0100 > @@ -797,6 +797,11 @@ static long gfs2_fallocate(struct file * > if (unlikely(error)) > goto out_uninit; > > + if (IS_IMMUTABLE(inode)) { > + error = -EPERM; > + goto out_unlock; > + } > + > if (!gfs2_write_alloc_required(ip, offset, len)) > goto out_unlock; > > --- ./linux-2.6.38-rc5/fs/xfs/linux-2.6/xfs_file.c 2011-02-16 04:23:45.000000000 +0100 > +++ ./linux-2.6.38-rc5/fs/xfs/linux-2.6/xfs_file.c 2011-03-03 09:25:32.000000000 +0100 > @@ -906,8 +906,18 @@ xfs_file_fallocate( > > xfs_ilock(ip, XFS_IOLOCK_EXCL); > > - if (mode & FALLOC_FL_PUNCH_HOLE) > + if (mode & FALLOC_FL_PUNCH_HOLE) { > cmd = XFS_IOC_UNRESVSP; > + if (IS_APPEND(inode)) { > + error = -EPERM; > + goto out_unlock; > + } > + } WTF? Why does append mode have any effect on whether we can punch holes in a file or not? There's no justification for adding this in the commit message. Why is it even in a patch that is for checking immutable inodes? What is the point of adding it, when all that will happen is people will switch to XFS_IOC_UNRESVSP which has never had this limitation? And this asks bigger questions - why would you allow preallocate anywhere but at or beyond EOF on an append mode inode? You can only append to the file, so if you're going to add limitations based on the append flag, you need to think this through a bit more.... > + > + if (IS_IMMUTABLE(inode)) { > + error = -EPERM; > + goto out_unlock; > + } Also, like Christoph said, these checks belong in the generic code, not in every filesystem. The same checks have to be made for every filesystem, so they should be done before calling out the filesystems regardless of what functionality the filesystem actually supports. Cheers, Dave. -- Dave Chinner david@fromorbit.com ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH v2] Check for immutable flag in fallocate path 2011-03-03 21:39 ` Dave Chinner @ 2011-03-04 8:17 ` Marco Stornelli 2011-03-04 12:18 ` Marco Stornelli 2011-03-14 10:24 ` Christoph Hellwig 1 sibling, 1 reply; 23+ messages in thread From: Marco Stornelli @ 2011-03-04 8:17 UTC (permalink / raw) To: Dave Chinner Cc: Linux Kernel, linux-ext4, linux-btrfs, cluster-devel, xfs, Linux FS Devel Hi Dave, Il 03/03/2011 22:39, Dave Chinner ha scritto: > WTF? Why does append mode have any effect on whether we can punch > holes in a file or not? There's no justification for adding this in > the commit message. Why is it even in a patch that is for checking > immutable inodes? What is the point of adding it, when all that will > happen is people will switch to XFS_IOC_UNRESVSP which has never had > this limitation? So according to you, it's legal to do an "unreserve" operation on an append-only file. It's not the same for me, but if the community said that this is the right behavior then ok. > > And this asks bigger questions - why would you allow preallocate > anywhere but at or beyond EOF on an append mode inode? You can only > append to the file, so if you're going to add limitations based on > the append flag, you need to think this through a bit more.... > I don't understand this point. The theory of operation was: 1) we don't allow any operation (reserve/unreserve) on a immutable file; 2) we don't allow *unreserve* operation on an append-only file (this check makes sense only for fs that support the unreserve operation). > > Also, like Christoph said, these checks belong in the generic code, > not in every filesystem. The same checks have to be made for every > filesystem, so they should be done before calling out the > filesystems regardless of what functionality the filesystem actually > supports. > This was related to the first point, if we remove it then it's ok to check in a common code. Even if I think we should do the check under the inode lock to avoid race between fallocate and setattr, isn't it? Marco ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH v2] Check for immutable flag in fallocate path 2011-03-04 8:17 ` Marco Stornelli @ 2011-03-04 12:18 ` Marco Stornelli 0 siblings, 0 replies; 23+ messages in thread From: Marco Stornelli @ 2011-03-04 12:18 UTC (permalink / raw) To: Dave Chinner Cc: Linux Kernel, linux-ext4, linux-btrfs, cluster-devel, xfs, Linux FS Devel, tytso Il 04/03/2011 09:17, Marco Stornelli ha scritto: > Hi Dave, > > Il 03/03/2011 22:39, Dave Chinner ha scritto: >> WTF? Why does append mode have any effect on whether we can punch >> holes in a file or not? There's no justification for adding this in >> the commit message. Why is it even in a patch that is for checking >> immutable inodes? What is the point of adding it, when all that will >> happen is people will switch to XFS_IOC_UNRESVSP which has never had >> this limitation? > > So according to you, it's legal to do an "unreserve" operation on an > append-only file. It's not the same for me, but if the community said > that this is the right behavior then ok. > >> >> And this asks bigger questions - why would you allow preallocate >> anywhere but at or beyond EOF on an append mode inode? You can only >> append to the file, so if you're going to add limitations based on >> the append flag, you need to think this through a bit more.... >> > > I don't understand this point. The theory of operation was: > > 1) we don't allow any operation (reserve/unreserve) on a immutable file; > 2) we don't allow *unreserve* operation on an append-only file (this > check makes sense only for fs that support the unreserve operation). > >> >> Also, like Christoph said, these checks belong in the generic code, >> not in every filesystem. The same checks have to be made for every >> filesystem, so they should be done before calling out the >> filesystems regardless of what functionality the filesystem actually >> supports. >> > > This was related to the first point, if we remove it then it's ok to > check in a common code. Even if I think we should do the check under the > inode lock to avoid race between fallocate and setattr, isn't it? > Oops, I meant setflags in ioctl path, sorry. At this point I'm waiting for response about how to manage the append flag and how to manage the lock on the flags. Ted pointed out that a proper fix would be to avoid the lock and use bit operation but it requires a deep modification on several fs and it could be a separate patch and code review, so I think we can choice to use lock/unlock in do_fallocate. I'll resend the patch. Marco ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH v2] Check for immutable flag in fallocate path 2011-03-03 21:39 ` Dave Chinner 2011-03-04 8:17 ` Marco Stornelli @ 2011-03-14 10:24 ` Christoph Hellwig 2011-03-14 10:40 ` Marco Stornelli 1 sibling, 1 reply; 23+ messages in thread From: Christoph Hellwig @ 2011-03-14 10:24 UTC (permalink / raw) To: Dave Chinner Cc: Marco Stornelli, Linux Kernel, linux-ext4, linux-btrfs, cluster-devel, xfs, Linux FS Devel On Fri, Mar 04, 2011 at 08:39:03AM +1100, Dave Chinner wrote: > WTF? Why does append mode have any effect on whether we can punch > holes in a file or not? There's no justification for adding this in > the commit message. Why is it even in a patch that is for checking > immutable inodes? What is the point of adding it, when all that will > happen is people will switch to XFS_IOC_UNRESVSP which has never had > this limitation? xfs_ioc_space unconditionally rejects inodes with S_APPEND set for all preallocation / hole punching ioctls. This might be overzealous for preallocations not changing the size, or just extending i_size, but it's IMHO entirely correct for hole punching. ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH v2] Check for immutable flag in fallocate path 2011-03-14 10:24 ` Christoph Hellwig @ 2011-03-14 10:40 ` Marco Stornelli 0 siblings, 0 replies; 23+ messages in thread From: Marco Stornelli @ 2011-03-14 10:40 UTC (permalink / raw) To: Christoph Hellwig Cc: Dave Chinner, Linux Kernel, linux-ext4, linux-btrfs, cluster-devel, xfs, Linux FS Devel 2011/3/14 Christoph Hellwig <hch@infradead.org>: > On Fri, Mar 04, 2011 at 08:39:03AM +1100, Dave Chinner wrote: >> WTF? Why does append mode have any effect on whether we can punch >> holes in a file or not? There's no justification for adding this in >> the commit message. Why is it even in a patch that is for checking >> immutable inodes? What is the point of adding it, when all that will >> happen is people will switch to XFS_IOC_UNRESVSP which has never had >> this limitation? > > xfs_ioc_space unconditionally rejects inodes with S_APPEND set for > all preallocation / hole punching ioctls. This might be overzealous for > preallocations not changing the size, or just extending i_size, but it's > IMHO entirely correct for hole punching. > xfs_ioc_space is in the ioctl path, but we are talking about the fallocate path. Both of them calls the xfs_change_file_space, isnt'it? However we are agree about hole punching, the patch is already in Linus's git tree. Marco -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 23+ messages in thread
* [PATCH v3] Check for immutable/append flag in fallocate path 2011-03-03 8:42 ` [PATCH v2] " Marco Stornelli 2011-03-03 21:39 ` Dave Chinner @ 2011-03-05 9:37 ` Marco Stornelli 2011-03-05 10:00 ` Sedat Dilek 2011-03-08 5:11 ` [PATCH v3] " Dave Chinner 1 sibling, 2 replies; 23+ messages in thread From: Marco Stornelli @ 2011-03-05 9:37 UTC (permalink / raw) To: Linux Kernel; +Cc: Linux FS Devel From: Marco Stornelli <marco.stornelli@gmail.com> In the fallocate path the kernel doesn't check for the immutable/append flag. It's possible to have a race condition in this scenario: an application open a file in read/write and it does something, meanwhile root set the immutable flag on the file, the application at that point can call fallocate with success. In addition, we don't allow to do any unreserve operation on an append only file but only the reserve one. Signed-off-by: Marco Stornelli <marco.stornelli@gmail.com> --- Patch is against 2.6.38-rc7 ChangeLog: v3: Modified do_fallocate instead of every single fs v2: Added the check for append-only file for XFS v1: First draft --- open.c.orig 2011-03-01 22:55:12.000000000 +0100 +++ open.c 2011-03-04 15:28:43.000000000 +0100 @@ -233,6 +233,14 @@ int do_fallocate(struct file *file, int if (!(file->f_mode & FMODE_WRITE)) return -EBADF; + + /* It's not possible punch hole on append only file */ + if (mode & FALLOC_FL_PUNCH_HOLE && IS_APPEND(inode)) + return -EPERM; + + if (IS_IMMUTABLE(inode)) + return -EPERM; + /* * Revalidate the write permissions, in case security policy has * changed since the files were opened. ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH v3] Check for immutable/append flag in fallocate path 2011-03-05 9:37 ` [PATCH v3] Check for immutable/append " Marco Stornelli @ 2011-03-05 10:00 ` Sedat Dilek 2011-03-05 10:10 ` [PATCH v3][RESEND] " Marco Stornelli 2011-03-08 5:11 ` [PATCH v3] " Dave Chinner 1 sibling, 1 reply; 23+ messages in thread From: Sedat Dilek @ 2011-03-05 10:00 UTC (permalink / raw) To: Marco Stornelli; +Cc: Linux Kernel, Linux FS Devel On 3/5/11, Marco Stornelli <marco.stornelli@gmail.com> wrote: > From: Marco Stornelli <marco.stornelli@gmail.com> > > In the fallocate path the kernel doesn't check for the immutable/append > flag. It's possible to have a race condition in this scenario: an > application open a file in read/write and it does something, meanwhile > root set the immutable flag on the file, the application at that point > can call fallocate with success. In addition, we don't allow to do any > unreserve operation on an append only file but only the reserve one. > > Signed-off-by: Marco Stornelli <marco.stornelli@gmail.com> > --- > Patch is against 2.6.38-rc7 > > ChangeLog: > v3: Modified do_fallocate instead of every single fs > v2: Added the check for append-only file for XFS > v1: First draft > > --- open.c.orig 2011-03-01 22:55:12.000000000 +0100 > +++ open.c 2011-03-04 15:28:43.000000000 +0100 Shouldn't that be sth like...? --- linux-2.6.38-rc7.orig/fs/open.c +++ linux-2.6.38-rc7/fs/open.c - Sedat - ^ permalink raw reply [flat|nested] 23+ messages in thread
* [PATCH v3][RESEND] Check for immutable/append flag in fallocate path 2011-03-05 10:00 ` Sedat Dilek @ 2011-03-05 10:10 ` Marco Stornelli 2011-03-09 19:42 ` Marco Stornelli 0 siblings, 1 reply; 23+ messages in thread From: Marco Stornelli @ 2011-03-05 10:10 UTC (permalink / raw) To: Linux Kernel; +Cc: sedat.dilek, Sedat Dilek, Linux FS Devel From: Marco Stornelli <marco.stornelli@gmail.com> In the fallocate path the kernel doesn't check for the immutable/append flag. It's possible to have a race condition in this scenario: an application open a file in read/write and it does something, meanwhile root set the immutable flag on the file, the application at that point can call fallocate with success. In addition, we don't allow to do any unreserve operation on an append only file but only the reserve one. Signed-off-by: Marco Stornelli <marco.stornelli@gmail.com> --- ChangeLog: v3: Modified do_fallocate instead of every single fs v2: Added the check for append-only file for XFS v1: First draft --- linux-2.6.38-rc7/fs/open.c.orig 2011-03-01 22:55:12.000000000 +0100 +++ linux-2.6.38-rc7/fs/open.c 2011-03-04 15:28:43.000000000 +0100 @@ -233,6 +233,14 @@ int do_fallocate(struct file *file, int if (!(file->f_mode & FMODE_WRITE)) return -EBADF; + + /* It's not possible punch hole on append only file */ + if (mode & FALLOC_FL_PUNCH_HOLE && IS_APPEND(inode)) + return -EPERM; + + if (IS_IMMUTABLE(inode)) + return -EPERM; + /* * Revalidate the write permissions, in case security policy has * changed since the files were opened. ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH v3][RESEND] Check for immutable/append flag in fallocate path 2011-03-05 10:10 ` [PATCH v3][RESEND] " Marco Stornelli @ 2011-03-09 19:42 ` Marco Stornelli 2011-03-09 21:27 ` Greg KH 0 siblings, 1 reply; 23+ messages in thread From: Marco Stornelli @ 2011-03-09 19:42 UTC (permalink / raw) To: viro; +Cc: Linux Kernel, Linux FS Devel, Greg Kroah-Hartman Il 05/03/2011 11:10, Marco Stornelli ha scritto: > From: Marco Stornelli <marco.stornelli@gmail.com> > > In the fallocate path the kernel doesn't check for the immutable/append > flag. It's possible to have a race condition in this scenario: an > application open a file in read/write and it does something, meanwhile > root set the immutable flag on the file, the application at that point > can call fallocate with success. In addition, we don't allow to do any > unreserve operation on an append only file but only the reserve one. > > Signed-off-by: Marco Stornelli <marco.stornelli@gmail.com> Al, can you apply this patch please? I add Greg in cc, because maybe he could be interested about stable tree. Marco ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH v3][RESEND] Check for immutable/append flag in fallocate path 2011-03-09 19:42 ` Marco Stornelli @ 2011-03-09 21:27 ` Greg KH 2011-03-10 12:03 ` Marco Stornelli 0 siblings, 1 reply; 23+ messages in thread From: Greg KH @ 2011-03-09 21:27 UTC (permalink / raw) To: Marco Stornelli; +Cc: viro, Linux Kernel, Linux FS Devel On Wed, Mar 09, 2011 at 08:42:25PM +0100, Marco Stornelli wrote: > Il 05/03/2011 11:10, Marco Stornelli ha scritto: > > From: Marco Stornelli <marco.stornelli@gmail.com> > > > > In the fallocate path the kernel doesn't check for the immutable/append > > flag. It's possible to have a race condition in this scenario: an > > application open a file in read/write and it does something, meanwhile > > root set the immutable flag on the file, the application at that point > > can call fallocate with success. In addition, we don't allow to do any > > unreserve operation on an append only file but only the reserve one. > > > > Signed-off-by: Marco Stornelli <marco.stornelli@gmail.com> > > Al, can you apply this patch please? I add Greg in cc, because maybe he > could be interested about stable tree. Please read Documentation/stable_kernel_rules.txt for how to get patches into stable kernel releases (hint, emailing me like this is not the way to do it...) thanks, greg k-h ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH v3][RESEND] Check for immutable/append flag in fallocate path 2011-03-09 21:27 ` Greg KH @ 2011-03-10 12:03 ` Marco Stornelli 0 siblings, 0 replies; 23+ messages in thread From: Marco Stornelli @ 2011-03-10 12:03 UTC (permalink / raw) To: Greg KH; +Cc: viro, Linux Kernel, Linux FS Devel 2011/3/9 Greg KH <gregkh@suse.de>: > On Wed, Mar 09, 2011 at 08:42:25PM +0100, Marco Stornelli wrote: >> Il 05/03/2011 11:10, Marco Stornelli ha scritto: >> > From: Marco Stornelli <marco.stornelli@gmail.com> >> > >> > In the fallocate path the kernel doesn't check for the immutable/append >> > flag. It's possible to have a race condition in this scenario: an >> > application open a file in read/write and it does something, meanwhile >> > root set the immutable flag on the file, the application at that point >> > can call fallocate with success. In addition, we don't allow to do any >> > unreserve operation on an append only file but only the reserve one. >> > >> > Signed-off-by: Marco Stornelli <marco.stornelli@gmail.com> >> >> Al, can you apply this patch please? I add Greg in cc, because maybe he >> could be interested about stable tree. > > Please read Documentation/stable_kernel_rules.txt for how to get patches > into stable kernel releases (hint, emailing me like this is not the way > to do it...) > I'm sorry. It wasn't a request about the add of this patch to the stable tree, it was only a request for comment about the applicability of this patch in the stable tree. However thanks for the tip, in case I'll send the patch to the stable mailing list. Regards, Marco ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH v3] Check for immutable/append flag in fallocate path 2011-03-05 9:37 ` [PATCH v3] Check for immutable/append " Marco Stornelli 2011-03-05 10:00 ` Sedat Dilek @ 2011-03-08 5:11 ` Dave Chinner 2011-03-08 5:38 ` Andreas Dilger 1 sibling, 1 reply; 23+ messages in thread From: Dave Chinner @ 2011-03-08 5:11 UTC (permalink / raw) To: Marco Stornelli; +Cc: Linux Kernel, Linux FS Devel On Sat, Mar 05, 2011 at 10:37:45AM +0100, Marco Stornelli wrote: > From: Marco Stornelli <marco.stornelli@gmail.com> > > In the fallocate path the kernel doesn't check for the immutable/append > flag. It's possible to have a race condition in this scenario: an > application open a file in read/write and it does something, meanwhile > root set the immutable flag on the file, the application at that point > can call fallocate with success. In addition, we don't allow to do any > unreserve operation on an append only file but only the reserve one. > > Signed-off-by: Marco Stornelli <marco.stornelli@gmail.com> > --- > Patch is against 2.6.38-rc7 > > ChangeLog: > v3: Modified do_fallocate instead of every single fs > v2: Added the check for append-only file for XFS > v1: First draft > > --- open.c.orig 2011-03-01 22:55:12.000000000 +0100 > +++ open.c 2011-03-04 15:28:43.000000000 +0100 > @@ -233,6 +233,14 @@ int do_fallocate(struct file *file, int > > if (!(file->f_mode & FMODE_WRITE)) > return -EBADF; > + > + /* It's not possible punch hole on append only file */ > + if (mode & FALLOC_FL_PUNCH_HOLE && IS_APPEND(inode)) > + return -EPERM; Seeing as I didn't get an answer in before you reposted, I still think punching an append-only file is a valid thing to want to do. I've seen this done in the past for application-level transaction journal files. The journal file is append only so new transactions can only be written at the end of the file i.e. you cannot overwrite (and therefore corrupt) existing transactions. However, once a transaction is complete and the changes flushed to disk, the transaction is punched out of the file to zero the range so it doesn't get replayed during recovery after a system crash. Cheers, Dave. -- Dave Chinner david@fromorbit.com ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH v3] Check for immutable/append flag in fallocate path 2011-03-08 5:11 ` [PATCH v3] " Dave Chinner @ 2011-03-08 5:38 ` Andreas Dilger 2011-03-08 7:35 ` Marco Stornelli 2011-03-09 1:30 ` Dave Chinner 0 siblings, 2 replies; 23+ messages in thread From: Andreas Dilger @ 2011-03-08 5:38 UTC (permalink / raw) To: Dave Chinner; +Cc: Marco Stornelli, Linux Kernel, Linux FS Devel On 2011-03-07, at 10:11 PM, Dave Chinner wrote: > On Sat, Mar 05, 2011 at 10:37:45AM +0100, Marco Stornelli wrote: >> From: Marco Stornelli <marco.stornelli@gmail.com> >> >> In the fallocate path the kernel doesn't check for the immutable/append >> flag. It's possible to have a race condition in this scenario: an >> application open a file in read/write and it does something, meanwhile >> root set the immutable flag on the file, the application at that point >> can call fallocate with success. In addition, we don't allow to do any >> unreserve operation on an append only file but only the reserve one. >> >> Signed-off-by: Marco Stornelli <marco.stornelli@gmail.com> >> --- >> Patch is against 2.6.38-rc7 >> >> ChangeLog: >> v3: Modified do_fallocate instead of every single fs >> v2: Added the check for append-only file for XFS >> v1: First draft >> >> --- open.c.orig 2011-03-01 22:55:12.000000000 +0100 >> +++ open.c 2011-03-04 15:28:43.000000000 +0100 >> @@ -233,6 +233,14 @@ int do_fallocate(struct file *file, int >> >> if (!(file->f_mode & FMODE_WRITE)) >> return -EBADF; >> + >> + /* It's not possible punch hole on append only file */ >> + if (mode & FALLOC_FL_PUNCH_HOLE && IS_APPEND(inode)) >> + return -EPERM; > > Seeing as I didn't get an answer in before you reposted, I still > think punching an append-only file is a valid thing to want to do. > > I've seen this done in the past for application-level transaction > journal files. The journal file is append only so new transactions > can only be written at the end of the file i.e. you cannot overwrite > (and therefore corrupt) existing transactions. However, once a > transaction is complete and the changes flushed to disk, the > transaction is punched out of the file to zero the range so it > doesn't get replayed during recovery after a system crash. To my thinking "append only" means just that - only new data can be written at the end of the file, and existing data cannot be modified. Allowing hole punch on such a file (e.g. range 0 .. ~0) would allow erasing all of the data, entirely bypassing the append-only flag. Cheers, Andreas ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH v3] Check for immutable/append flag in fallocate path 2011-03-08 5:38 ` Andreas Dilger @ 2011-03-08 7:35 ` Marco Stornelli 2011-03-09 1:30 ` Dave Chinner 1 sibling, 0 replies; 23+ messages in thread From: Marco Stornelli @ 2011-03-08 7:35 UTC (permalink / raw) To: Andreas Dilger; +Cc: Dave Chinner, Linux Kernel, Linux FS Devel 2011/3/8 Andreas Dilger <adilger.kernel@dilger.ca>: > On 2011-03-07, at 10:11 PM, Dave Chinner wrote: >> On Sat, Mar 05, 2011 at 10:37:45AM +0100, Marco Stornelli wrote: >>> From: Marco Stornelli <marco.stornelli@gmail.com> >>> >>> In the fallocate path the kernel doesn't check for the immutable/append >>> flag. It's possible to have a race condition in this scenario: an >>> application open a file in read/write and it does something, meanwhile >>> root set the immutable flag on the file, the application at that point >>> can call fallocate with success. In addition, we don't allow to do any >>> unreserve operation on an append only file but only the reserve one. >>> >>> Signed-off-by: Marco Stornelli <marco.stornelli@gmail.com> >>> --- >>> Patch is against 2.6.38-rc7 >>> >>> ChangeLog: >>> v3: Modified do_fallocate instead of every single fs >>> v2: Added the check for append-only file for XFS >>> v1: First draft >>> >>> --- open.c.orig 2011-03-01 22:55:12.000000000 +0100 >>> +++ open.c 2011-03-04 15:28:43.000000000 +0100 >>> @@ -233,6 +233,14 @@ int do_fallocate(struct file *file, int >>> >>> if (!(file->f_mode & FMODE_WRITE)) >>> return -EBADF; >>> + >>> + /* It's not possible punch hole on append only file */ >>> + if (mode & FALLOC_FL_PUNCH_HOLE && IS_APPEND(inode)) >>> + return -EPERM; >> >> Seeing as I didn't get an answer in before you reposted, I still >> think punching an append-only file is a valid thing to want to do. >> >> I've seen this done in the past for application-level transaction >> journal files. The journal file is append only so new transactions >> can only be written at the end of the file i.e. you cannot overwrite >> (and therefore corrupt) existing transactions. However, once a >> transaction is complete and the changes flushed to disk, the >> transaction is punched out of the file to zero the range so it >> doesn't get replayed during recovery after a system crash. > > To my thinking "append only" means just that - only new data can be written at the end of the file, and existing data cannot be >modified. Allowing hole punch on such a file (e.g. range 0 .. ~0) would allow erasing all of the data, entirely bypassing the >append-only flag. > > Cheers, Andreas > I quite agree with Andreas. Marco -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: [PATCH v3] Check for immutable/append flag in fallocate path 2011-03-08 5:38 ` Andreas Dilger 2011-03-08 7:35 ` Marco Stornelli @ 2011-03-09 1:30 ` Dave Chinner 1 sibling, 0 replies; 23+ messages in thread From: Dave Chinner @ 2011-03-09 1:30 UTC (permalink / raw) To: Andreas Dilger; +Cc: Marco Stornelli, Linux Kernel, Linux FS Devel On Mon, Mar 07, 2011 at 10:38:37PM -0700, Andreas Dilger wrote: > On 2011-03-07, at 10:11 PM, Dave Chinner wrote: > > On Sat, Mar 05, 2011 at 10:37:45AM +0100, Marco Stornelli wrote: > >> From: Marco Stornelli <marco.stornelli@gmail.com> > >> > >> In the fallocate path the kernel doesn't check for the immutable/append > >> flag. It's possible to have a race condition in this scenario: an > >> application open a file in read/write and it does something, meanwhile > >> root set the immutable flag on the file, the application at that point > >> can call fallocate with success. In addition, we don't allow to do any > >> unreserve operation on an append only file but only the reserve one. > >> > >> Signed-off-by: Marco Stornelli <marco.stornelli@gmail.com> > >> --- > >> Patch is against 2.6.38-rc7 > >> > >> ChangeLog: > >> v3: Modified do_fallocate instead of every single fs > >> v2: Added the check for append-only file for XFS > >> v1: First draft > >> > >> --- open.c.orig 2011-03-01 22:55:12.000000000 +0100 > >> +++ open.c 2011-03-04 15:28:43.000000000 +0100 > >> @@ -233,6 +233,14 @@ int do_fallocate(struct file *file, int > >> > >> if (!(file->f_mode & FMODE_WRITE)) > >> return -EBADF; > >> + > >> + /* It's not possible punch hole on append only file */ > >> + if (mode & FALLOC_FL_PUNCH_HOLE && IS_APPEND(inode)) > >> + return -EPERM; > > > > Seeing as I didn't get an answer in before you reposted, I still > > think punching an append-only file is a valid thing to want to do. > > > > I've seen this done in the past for application-level transaction > > journal files. The journal file is append only so new transactions > > can only be written at the end of the file i.e. you cannot overwrite > > (and therefore corrupt) existing transactions. However, once a > > transaction is complete and the changes flushed to disk, the > > transaction is punched out of the file to zero the range so it > > doesn't get replayed during recovery after a system crash. > > To my thinking "append only" means just that - only new data can > be written at the end of the file, and existing data cannot be > modified. Allowing hole punch on such a file (e.g. range 0 .. ~0) > would allow erasing all of the data, entirely bypassing the > append-only flag. Not worth arguing over. XFS_IOC_UNRESVSP won't get changed, so the applications already doing this can just keep using that interface... Cheers, Dave. -- Dave Chinner david@fromorbit.com ^ permalink raw reply [flat|nested] 23+ messages in thread
end of thread, other threads:[~2011-03-14 10:40 UTC | newest] Thread overview: 23+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2011-02-21 8:26 [PATCH] Check for immutable flag in fallocate path Marco Stornelli 2011-02-21 12:46 ` Christoph Hellwig 2011-02-21 16:50 ` Marco Stornelli 2011-02-27 22:49 ` Ted Ts'o 2011-02-28 7:53 ` Marco Stornelli 2011-03-02 8:19 ` Marco Stornelli 2011-02-26 14:59 ` Marco Stornelli 2011-03-03 8:42 ` [PATCH v2] " Marco Stornelli 2011-03-03 21:39 ` Dave Chinner 2011-03-04 8:17 ` Marco Stornelli 2011-03-04 12:18 ` Marco Stornelli 2011-03-14 10:24 ` Christoph Hellwig 2011-03-14 10:40 ` Marco Stornelli 2011-03-05 9:37 ` [PATCH v3] Check for immutable/append " Marco Stornelli 2011-03-05 10:00 ` Sedat Dilek 2011-03-05 10:10 ` [PATCH v3][RESEND] " Marco Stornelli 2011-03-09 19:42 ` Marco Stornelli 2011-03-09 21:27 ` Greg KH 2011-03-10 12:03 ` Marco Stornelli 2011-03-08 5:11 ` [PATCH v3] " Dave Chinner 2011-03-08 5:38 ` Andreas Dilger 2011-03-08 7:35 ` Marco Stornelli 2011-03-09 1:30 ` Dave Chinner
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).