linux-fsdevel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH v3 0/5] Prepare for fsnotify pre-content permission events
@ 2023-12-12  9:44 Amir Goldstein
  2023-12-12  9:44 ` [PATCH v3 1/5] splice: return type ssize_t from all helpers Amir Goldstein
                   ` (6 more replies)
  0 siblings, 7 replies; 10+ messages in thread
From: Amir Goldstein @ 2023-12-12  9:44 UTC (permalink / raw)
  To: Christian Brauner
  Cc: Jan Kara, Jeff Layton, Josef Bacik, Christoph Hellwig,
	David Howells, Jens Axboe, Miklos Szeredi, Al Viro, linux-fsdevel

Hi Christian,

This v3 of pre-content event prep patches addresses some comments and
replaces the v1 patches [1] that are currently applied to vfs.rw.

I started with a new cleanup patch for ssize_t return type that you
suggested.

Patch 2 has a fix for a build error reported by kernel tests robot
(moved MAX_RW_COUNT capping to splice_file_range()), so I did not
retain Josef's RVB from v1 on this patch.

Patches 3,4 are unchanged and retain the RVBs from v1.

Patch 5 changes the fsnotify hook name, so I did not retain Josef's
RVB from v1. Jan has already reviewed v2.

Thanks,
Amir.

Changes since v2:
- Fixes to splice helpers return type
- Add RVBs from Jan

Changes since v1 [1]:
- Move MAX_RW_COUNT capping to splice_file_range() to fix build error
- Cleanup splice helpers return type
- Change fsnotify hook name to fsnotify_file_area_perm()
- Add RVBs

[1] https://lore.kernel.org/r/20231207123825.4011620-1-amir73il@gmail.com/

Amir Goldstein (5):
  splice: return type ssize_t from all helpers
  fs: use splice_copy_file_range() inline helper
  fsnotify: split fsnotify_perm() into two hooks
  fsnotify: assert that file_start_write() is not held in permission
    hooks
  fsnotify: optionally pass access range in file permission hooks

 fs/ceph/file.c           |   4 +-
 fs/fuse/file.c           |   5 +-
 fs/internal.h            |   8 +--
 fs/nfs/nfs4file.c        |   5 +-
 fs/open.c                |   4 ++
 fs/overlayfs/copy_up.c   |   2 +-
 fs/read_write.c          |  46 ++++------------
 fs/readdir.c             |   4 ++
 fs/remap_range.c         |   8 ++-
 fs/smb/client/cifsfs.c   |   5 +-
 fs/splice.c              | 110 ++++++++++++++++++++-------------------
 include/linux/fs.h       |   3 --
 include/linux/fsnotify.h |  50 ++++++++++++------
 include/linux/splice.h   |  50 ++++++++++--------
 io_uring/splice.c        |   4 +-
 security/security.c      |  10 +---
 16 files changed, 163 insertions(+), 155 deletions(-)

-- 
2.34.1


^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2023-12-12 15:22 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-12-12  9:44 [PATCH v3 0/5] Prepare for fsnotify pre-content permission events Amir Goldstein
2023-12-12  9:44 ` [PATCH v3 1/5] splice: return type ssize_t from all helpers Amir Goldstein
2023-12-12 14:19   ` Jan Kara
2023-12-12 15:20     ` Christian Brauner
2023-12-12  9:44 ` [PATCH v3 2/5] fs: use splice_copy_file_range() inline helper Amir Goldstein
2023-12-12  9:44 ` [PATCH v3 3/5] fsnotify: split fsnotify_perm() into two hooks Amir Goldstein
2023-12-12  9:44 ` [PATCH v3 4/5] fsnotify: assert that file_start_write() is not held in permission hooks Amir Goldstein
2023-12-12  9:44 ` [PATCH v3 5/5] fsnotify: optionally pass access range in file " Amir Goldstein
2023-12-12 13:34 ` [PATCH v3 0/5] Prepare for fsnotify pre-content permission events Christian Brauner
2023-12-12 15:22 ` [PATCH v3 1/5] splice: return type ssize_t from all helpers David Howells

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).