Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp519544yba; Thu, 16 May 2019 04:54:28 -0700 (PDT) X-Google-Smtp-Source: APXvYqymrXrdvCuBKV9NujwizWcUz2aVpoCXYJ0aSAJ6A1qQL/JHMBFRFAdFmZyiZ3jImvehT02L X-Received: by 2002:a63:d343:: with SMTP id u3mr50216257pgi.285.1558007667986; Thu, 16 May 2019 04:54:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558007667; cv=none; d=google.com; s=arc-20160816; b=DZUdwS47r/9++rtHC+HowoQ8lNi6p1LkSOyX/0bPlU/LilCcPVgUZzNulUbFQDtuEh amSUql9su6uZAnvFpx49v6onB4kN5ZQc9PDR07PGFKP2Xv9qL38/u0ZpLYTJHKb/+CAj r9pB1ShcHexW0NoS7Z5D1PU0QJtBRGHFsQGg00zepB5fFBJ5uagtQ1MSSx0MkaqCeIr6 zMdPliVcChpQAxZ09Qo7puzvvsIuBAVacdtIgQJvjehNqN9WVtt4lo6BdmSpbb7qDaZ4 QyHVPPnLhrZfPL2oX49YKqu3mfKkoUjl6rF1BZ1ZpAGlHt5bzCJytB0J/xZxJc8vPqnn A6ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:message-id:date:cc:to:from:subject; bh=gDmbaOYLOI1JcRKdkETe/YDDrWpXnvfj303gjR/dt20=; b=OR0WGGkTR4jAG4nTotoN8eRYaUWM5xeZgH6/eXNdywLBw0zao2m7bdmvH5zcycfv3V +fYjHhKxNGmc95zgcKWZ4MLLeCWWC9zyc9UmStkHhcBxs7PN+7QZFBS6+pGoAEEhy1or L1VEZcvLQQtJ0JK4CoiZlgwWJZmvA+LviCZVpY+dFJo3yaFt4EGUJO0VNq/xAnZEAH/v ovtHJvRp8Z9RDu/GtxG7htz6MVodIkJnnHFh60MjFp319n7EsCNKdwsI4AwX4+5A77tx X0UjUf5SVfF3fo9WL9niXNi5tKF3dmJN+h4gG5b2f1/W7tBk29nOTQfTnQX/z6dieSIg 8hug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s128si1448796pfs.242.2019.05.16.04.54.12; Thu, 16 May 2019 04:54:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727281AbfEPLwH (ORCPT + 99 others); Thu, 16 May 2019 07:52:07 -0400 Received: from mx1.redhat.com ([209.132.183.28]:36202 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726383AbfEPLwG (ORCPT ); Thu, 16 May 2019 07:52:06 -0400 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 85A0AD77F2; Thu, 16 May 2019 11:52:06 +0000 (UTC) Received: from warthog.procyon.org.uk (ovpn-120-61.rdu2.redhat.com [10.10.120.61]) by smtp.corp.redhat.com (Postfix) with ESMTP id 1EF92100203C; Thu, 16 May 2019 11:52:04 +0000 (UTC) Subject: [PATCH 0/4] uapi, vfs: Change the mount API UAPI [ver #2] From: David Howells To: torvalds@linux-foundation.org, viro@zeniv.linux.org.uk Cc: Christian Brauner , Arnd Bergmann , dhowells@redhat.com, christian@brauner.io, arnd@arndb.de, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Date: Thu, 16 May 2019 12:52:04 +0100 Message-ID: <155800752418.4037.9567789434648701032.stgit@warthog.procyon.org.uk> User-Agent: StGit/unknown-version MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.38]); Thu, 16 May 2019 11:52:06 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, Al, Here are some patches that make changes to the mount API UAPI and two of them really need applying, before -rc1 - if they're going to be applied at all. The following changes are made: (1) Make the file descriptors returned by open_tree(), fsopen(), fspick() and fsmount() O_CLOEXEC by default and remove the flags that allow this to be specified from the UAPI, shuffling other flags down as appropriate. fcntl() can still be used to change the flag. (2) Make the name of the anon inode object "[fscontext]" with square brackets to match other users. (3) Fix the numbering of the mount API syscalls to be in the common space rather than in the arch-specific space. (4) Wire up the mount API syscalls on all arches (it's only on x86 currently). Thanks, David --- Christian Brauner (2): uapi, fs: make all new mount api fds cloexec by default uapi, fsopen: use square brackets around "fscontext" David Howells (2): uapi, x86: Fix the syscall numbering of the mount API syscalls uapi: Wire up the mount API syscalls on non-x86 arches arch/alpha/kernel/syscalls/syscall.tbl | 6 ++++++ arch/arm/tools/syscall.tbl | 6 ++++++ arch/arm64/include/asm/unistd.h | 2 +- arch/arm64/include/asm/unistd32.h | 12 ++++++++++++ arch/ia64/kernel/syscalls/syscall.tbl | 6 ++++++ arch/m68k/kernel/syscalls/syscall.tbl | 6 ++++++ arch/microblaze/kernel/syscalls/syscall.tbl | 6 ++++++ arch/mips/kernel/syscalls/syscall_n32.tbl | 6 ++++++ arch/mips/kernel/syscalls/syscall_n64.tbl | 6 ++++++ arch/mips/kernel/syscalls/syscall_o32.tbl | 6 ++++++ arch/parisc/kernel/syscalls/syscall.tbl | 6 ++++++ arch/powerpc/kernel/syscalls/syscall.tbl | 6 ++++++ arch/s390/kernel/syscalls/syscall.tbl | 6 ++++++ arch/sh/kernel/syscalls/syscall.tbl | 6 ++++++ arch/sparc/kernel/syscalls/syscall.tbl | 6 ++++++ arch/x86/entry/syscalls/syscall_32.tbl | 12 ++++++------ arch/x86/entry/syscalls/syscall_64.tbl | 12 ++++++------ arch/xtensa/kernel/syscalls/syscall.tbl | 6 ++++++ fs/fsopen.c | 15 +++++++-------- fs/namespace.c | 11 ++++------- include/uapi/asm-generic/unistd.h | 14 +++++++++++++- include/uapi/linux/mount.h | 18 +++--------------- 22 files changed, 136 insertions(+), 44 deletions(-)