From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 14E68C001B0 for ; Fri, 30 Jun 2023 00:02:02 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231823AbjF3ACA (ORCPT ); Thu, 29 Jun 2023 20:02:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45140 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229727AbjF3AB6 (ORCPT ); Thu, 29 Jun 2023 20:01:58 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 074992974 for ; Thu, 29 Jun 2023 17:01:58 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 908726165E for ; Fri, 30 Jun 2023 00:01:57 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A1B16C433C8; Fri, 30 Jun 2023 00:01:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1688083317; bh=Bej09wYFcT6D4FI/gm1ZGuRayoSdiiH2baukOvRvHEQ=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=LWmFFlvh/aXLzdmV/dcJn2GkigvCiQc4jA7nQOHqgG2p9NVoIcuBPwtlHgVSDIK/+ P6tfAOINFIzPaS1CaW8XWgs/r6B6QCZJV0uCr1+EwSz450QpPBHiYM8ZYeinUqLrjP TiQQSKO7TvNHS4zAQCm0eMEsYBGHFik9pPojQBGLctgE0iSVu68gKlwsSqUEZvqwBy R+DNMVdyT3OyWCZQX9nkVqe15fOYjfFX9PiwIhu3tbUwqFoqmjEAzN5TxOIX9EjOL5 WQP6ONBI2NMuVu1siTtZGqMAnS2FpBpqCzpPPwqtoad0MWatYvMk+VYlhYrVIcHtr0 ZePiyxj0S2FAQ== Date: Thu, 29 Jun 2023 17:01:55 -0700 From: Jakub Kicinski To: David Howells Cc: netdev@vger.kernel.org, Matthew Wilcox , Dave Chinner , Matt Whitlock , Linus Torvalds , Jens Axboe , linux-fsdevel@kvack.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [RFC PATCH 0/4] splice: Fix corruption in data spliced to pipe Message-ID: <20230629170155.175d71aa@kernel.org> In-Reply-To: <20230629155433.4170837-1-dhowells@redhat.com> References: <20230629155433.4170837-1-dhowells@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 29 Jun 2023 16:54:29 +0100 David Howells wrote: > I'm more inclined to adjust the documentation since the behaviour we > have has been that way since 2005, I think. +1 FWIW I think that networking always operated under the assumption that the pages may change. In TLS we require explicit opt-in from users that the pages they send will not get changed, if it could cause crypto errors (TLS_TX_ZEROCOPY_RO).