Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp244149pxj; Wed, 16 Jun 2021 01:07:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw+bvH07nQSqyvDhpaO3DOPlt1ZxCU95cy2RBY8a0CKB2sVfasKjJb8XrvtGem0t4uFDNVv X-Received: by 2002:a02:c987:: with SMTP id b7mr3018675jap.129.1623830872092; Wed, 16 Jun 2021 01:07:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623830872; cv=none; d=google.com; s=arc-20160816; b=Tc889llpi/S18u5lLanGWhYHQ4rOHNt/oVb0gdgz3gu/Uhr7ErVZYYSpoWK9m1TSEh SBmGBxkFy6EyF34qZlLnMOH6U81YowUMej2HdcQY/75qCVbvD509tTrNGQ6XKHLvQw0S UFG848YufEZcvjOoL16/gzQKCUhDgdWUzHeIVmGPBNH2Kn77AD90jwjFarSgMhl3mTOY bxdYus+3NkriUJlgwq+JS5QzKZEB3dynco/5+uxSv1BN0IqtV7qCrnz+9xCRKKrj40OG fdniVBHsTPK3Ot4Eos26x3NS70GpVyHlrDGlqTGDe6uc2Ent6Np7U0lE+pw/3FRfnVtb z7zQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=Aawz4KrDSfE1sRyy91mWXvyNZiPbdTlPW10y2Ia3xNQ=; b=EGS+xcEBJz9AtW3mCd4TNs01/4hCzRDXIe1R+TzQwDOAUyUMT5PBTIZy4WLHTpRSgI dHmncXeN5dncwhx9WRYMy474tddW4J/NyvR06dZyYXmIaSTvn04XCIHtFW1sZjr18Qi4 BGoHcHd/zM87JShmxh1CXvtv2oJuBGPpfGwnIdxQLzJ84jJic7yrCiqdNOewS+uSfbBb WBjMxAH8b6+BwDBUD0PbC/7rxSoMYmrjNVE6aYFQnT0L/10JDae5K2ksIcP323KqRfcm ow1C21pXX+QuUDDRYeu+5d4zRAhIcZISolkyWOb+J3xHCA+mYj7IFR1DUlJXKzSyou6s nC+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=VlcerfMU; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m7si1492492ilq.122.2021.06.16.01.07.36; Wed, 16 Jun 2021 01:07:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=VlcerfMU; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231750AbhFPIJg (ORCPT + 99 others); Wed, 16 Jun 2021 04:09:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51210 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231376AbhFPIJg (ORCPT ); Wed, 16 Jun 2021 04:09:36 -0400 Received: from mail-io1-xd2e.google.com (mail-io1-xd2e.google.com [IPv6:2607:f8b0:4864:20::d2e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 86D93C061574; Wed, 16 Jun 2021 01:07:30 -0700 (PDT) Received: by mail-io1-xd2e.google.com with SMTP id s19so2104930ioc.3; Wed, 16 Jun 2021 01:07:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Aawz4KrDSfE1sRyy91mWXvyNZiPbdTlPW10y2Ia3xNQ=; b=VlcerfMUG8fopKETs+lN3ycmkaxddG1zEhvjwIabwPv9dW/kniNkTXDGrPEbmZdjH9 KrhSjvtzZjpxmYcbGfslLvtWQao2xVb2x6RUfUoH9YxvWtYOBuCHlwozHKSIGk/FGphK emvzT/FKjmJRVEouqjxePNl4VQdMTAQL8mDN4YNub3bWNZGk4P/boKr/VC5D9ii6HhxR 0iCVjm9jWXa4b2QbscRRt+TZ0Sy7gHn9Gh6MRG9rW6kKcwuEn3bHi72HhkzI8X+N7ydZ 8JJcTlwIYMgAPktJ6ua/5DSXth2V86R4ejh5bjYnPqbHbARfElzt6u6vgekCVrQcL79c TvzQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Aawz4KrDSfE1sRyy91mWXvyNZiPbdTlPW10y2Ia3xNQ=; b=HGgFXnbVkeE0CvpKhNaX1dtoHBqu9fnoL3COKZ7QzqFDD2zeUa7caeXm/CsLoOSIWw 9j+YrciXwy2CTCkmgrycIemOgjHJLKH15q2nzhzK0ETV1Gs4VRhFbPvn/2rs2wuwzETm BsaVHXnRuC1lxPpvdYjWwePtiw56o42zE/248Ftw6JGoKVQm9KenEl54K7VhNMGgorA8 OBkE0Krrb0MVPYRy32gRWUcyd0eS5V+ONmAMYUJdTPZwlAAA8Mo/4/m/1hRzekvtBPpP FubJxVWP8DzytJGUmDpoy9QqEcWgAdF/820NHa7bxqyviiuaKOrCYLKT8y1MmDzdmXeR CnXg== X-Gm-Message-State: AOAM532ZWRSQ2LDQFCgii0LaVZui4tbzwTJhXl97MhE0P5V3yYorgxwD O02eGjn8JlrncyPi6NaeI5OK9P8tazQdMJUt0wM= X-Received: by 2002:a5d:8b03:: with SMTP id k3mr2601886ion.203.1623830848997; Wed, 16 Jun 2021 01:07:28 -0700 (PDT) MIME-Version: 1.0 References: <20210615235556.970928-1-krisman@collabora.com> <20210615235556.970928-4-krisman@collabora.com> In-Reply-To: <20210615235556.970928-4-krisman@collabora.com> From: Amir Goldstein Date: Wed, 16 Jun 2021 11:07:18 +0300 Message-ID: Subject: Re: [PATCH v2 03/14] fanotify: Split fsid check from other fid mode checks To: Gabriel Krisman Bertazi Cc: kernel@collabora.com, "Darrick J. Wong" , Theodore Tso , Dave Chinner , Jan Kara , David Howells , Khazhismel Kumykov , linux-fsdevel , Ext4 Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Wed, Jun 16, 2021 at 2:56 AM Gabriel Krisman Bertazi wrote: > > FAN_ERROR will require fsid, but not necessarily require the filesystem FAN_FS_ERROR > to expose a file handle. Split those checks into different functions, so > they can be used separately when setting up an event. > > Signed-off-by: Gabriel Krisman Bertazi > > --- > Changes since v1: > (Amir) > - Sort hunks to simplify diff. > Changes since RFC: > (Amir) > - Rename fanotify_check_path_fsid -> fanotify_test_fsid. > - Use dentry directly instead of path. > --- > fs/notify/fanotify/fanotify_user.c | 27 ++++++++++++++++++--------- > 1 file changed, 18 insertions(+), 9 deletions(-) > > diff --git a/fs/notify/fanotify/fanotify_user.c b/fs/notify/fanotify/fanotify_user.c > index 0da4e5dcab0f..af518790a80f 100644 > --- a/fs/notify/fanotify/fanotify_user.c > +++ b/fs/notify/fanotify/fanotify_user.c > @@ -1192,16 +1192,15 @@ SYSCALL_DEFINE2(fanotify_init, unsigned int, flags, unsigned int, event_f_flags) > return fd; > } > > -/* Check if filesystem can encode a unique fid */ > -static int fanotify_test_fid(struct path *path, __kernel_fsid_t *fsid) > +static int fanotify_test_fsid(struct dentry *dentry, __kernel_fsid_t *fsid) > { > __kernel_fsid_t root_fsid; > int err; > > /* > - * Make sure path is not in filesystem with zero fsid (e.g. tmpfs). > + * Make sure dentry is not of a filesystem with zero fsid (e.g. tmpfs). Sorry.... I forgot to update this comment 59cda49ecf6c ("shmem: allow reporting fanotify events with file handles on tmpfs") Not your fault, but best we fix the comment if we change it to be correct. It can be changed to (e.g. fuse) Thanks, Amir.