Cover Letter Detail
Show a cover letter.
GET /api/covers/816541/?format=api
{ "id": 816541, "url": "http://patchwork.ozlabs.org/api/covers/816541/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-ext4/cover/20170920224605.22030-1-ebiggers3@gmail.com/", "project": { "id": 8, "url": "http://patchwork.ozlabs.org/api/projects/8/?format=api", "name": "Linux ext4 filesystem development", "link_name": "linux-ext4", "list_id": "linux-ext4.vger.kernel.org", "list_email": "linux-ext4@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20170920224605.22030-1-ebiggers3@gmail.com>", "list_archive_url": null, "date": "2017-09-20T22:45:40", "name": "[00/25] fscrypt: add some higher-level helper functions", "submitter": { "id": 65202, "url": "http://patchwork.ozlabs.org/api/people/65202/?format=api", "name": "Eric Biggers", "email": "ebiggers3@gmail.com" }, "mbox": "http://patchwork.ozlabs.org/project/linux-ext4/cover/20170920224605.22030-1-ebiggers3@gmail.com/mbox/", "series": [ { "id": 4249, "url": "http://patchwork.ozlabs.org/api/series/4249/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-ext4/list/?series=4249", "date": "2017-09-20T22:45:40", "name": "fscrypt: add some higher-level helper functions", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/4249/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/816541/comments/", "headers": { "Return-Path": "<linux-ext4-owner@vger.kernel.org>", "X-Original-To": "patchwork-incoming@ozlabs.org", "Delivered-To": "patchwork-incoming@ozlabs.org", "Authentication-Results": [ "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=linux-ext4-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)", "ozlabs.org; dkim=pass (2048-bit key;\n\tunprotected) header.d=gmail.com header.i=@gmail.com\n\theader.b=\"FphCao+M\"; dkim-atps=neutral" ], "Received": [ "from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3xyFH053nbz9sPm\n\tfor <patchwork-incoming@ozlabs.org>;\n\tThu, 21 Sep 2017 08:46:52 +1000 (AEST)", "(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S1751698AbdITWqu (ORCPT <rfc822;patchwork-incoming@ozlabs.org>);\n\tWed, 20 Sep 2017 18:46:50 -0400", "from mail-pf0-f195.google.com ([209.85.192.195]:38756 \"EHLO\n\tmail-pf0-f195.google.com\" rhost-flags-OK-OK-OK-OK) by vger.kernel.org\n\twith ESMTP id S1751635AbdITWqt (ORCPT\n\t<rfc822; linux-ext4@vger.kernel.org>); Wed, 20 Sep 2017 18:46:49 -0400", "by mail-pf0-f195.google.com with SMTP id a7so1717567pfj.5;\n\tWed, 20 Sep 2017 15:46:49 -0700 (PDT)", "from ebiggers-linuxstation.kir.corp.google.com ([100.66.174.81])\n\tby smtp.gmail.com with ESMTPSA id j2sm6249pgn.26.2017.09.20.15.46.47\n\t(version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128);\n\tWed, 20 Sep 2017 15:46:47 -0700 (PDT)" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=gmail.com; s=20161025;\n\th=from:to:cc:subject:date:message-id;\n\tbh=gg4dTmWolGvshKkwco5kNIF7wlEnX4tK2+q1ocOfBXQ=;\n\tb=FphCao+M+NY9mm9I4PCbsSzU5bAthzvJ33dxFjXbo7pOgQK/qVw7nNVX6JAh08R1DD\n\tlIsCJHKrVpSKcGzSrKq0wpoBq5qezhwWxm39tn2xTf9gYHevGpEkWBauhbrV1FCc/1P9\n\t4OcGUSXCatGHRMpN1/IDryWSSo8xu5D2s+SO3p10cRo1ORXowY4SiP6xqWzcXipq40ai\n\tKj+AIKgKiJvfqSRJ+mIkRNefMvpgf4mYuneAVWaHH0VsIJyMWEOnlU+JASXkZA0zjGRd\n\tUa/Vof3CTEQX1iSHT6bAEdYGcgp0GebGqgMT+2449gX4NjCjw05BkGvg1vkCYR9f5U1T\n\tpF+A==", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:from:to:cc:subject:date:message-id;\n\tbh=gg4dTmWolGvshKkwco5kNIF7wlEnX4tK2+q1ocOfBXQ=;\n\tb=JwFOOhqlaPJJUBOtNhvbo1dfU2bRgzuV70Bt0Ta0mHlYcECWXjIiA5QVWShBuWQAin\n\tDLaG4r8n0r29kHqxexN2AT932aBXoNzSrHropOiWuAzgVK1n5BU9zs98uylpmpuzQmUO\n\tSBr/RgYAfKKn+ot3Q5pvVvO8dc1FwsvplQgcIXT+uywdbU0mjBK5fLnLFtT1FqNRUQOL\n\tBGeAUCs85o3tME8xUk9s6bAdeMvi8gSe7eC3vaGBhjInG9dhMLpcMKELQBPo1rJn2WLI\n\tQtth3NWpVvWGikglPKwgZVbSa2m5RFuokEbxXhVBsYk/KoP9bo/5Jvtbk9ky6xOTv8By\n\tBKjA==", "X-Gm-Message-State": "AHPjjUguwXoGgtHdbkBjYwFaOAvyW1L3E7xK2cwNGcBiGZr7rAtUqeEo\n\tQCEXFxstjeqsO3FDLgAmmw+Unq3FASs=", "X-Google-Smtp-Source": "AOwi7QA2XPDNZ7ABiHw3lJUdagIHAgyIj9LkUcaKKrLDpgPBInV/CqRZQOMabdvmy+p+58NCWix5Cw==", "X-Received": "by 10.84.165.171 with SMTP id y40mr2725445pla.373.1505947608312; \n\tWed, 20 Sep 2017 15:46:48 -0700 (PDT)", "From": "Eric Biggers <ebiggers3@gmail.com>", "To": "linux-fscrypt@vger.kernel.org", "Cc": "linux-fsdevel@vger.kernel.org, linux-ext4@vger.kernel.org,\n\tlinux-f2fs-devel@lists.sourceforge.net,\n\tlinux-mtd@lists.infradead.org, \"Theodore Y . Ts'o\" <tytso@mit.edu>,\n\tJaegeuk Kim <jaegeuk@kernel.org>, Michael Halcrow <mhalcrow@google.com>,\n\tEric Biggers <ebiggers@google.com>", "Subject": "[PATCH 00/25] fscrypt: add some higher-level helper functions", "Date": "Wed, 20 Sep 2017 15:45:40 -0700", "Message-Id": "<20170920224605.22030-1-ebiggers3@gmail.com>", "X-Mailer": "git-send-email 2.14.1.821.g8fa685d3b7-goog", "Sender": "linux-ext4-owner@vger.kernel.org", "Precedence": "bulk", "List-ID": "<linux-ext4.vger.kernel.org>", "X-Mailing-List": "linux-ext4@vger.kernel.org" }, "content": "From: Eric Biggers <ebiggers@google.com>\n\nThis series reduces code duplication among ext4, f2fs, and ubifs by\nintroducing a S_ENCRYPTED inode flag (so we don't have to call back into\nthe filesystem to test the filesystem-specific inode flag), then\nintroducing new helper functions that are called at the beginning of the\nopen, link, rename, lookup, and setattr operations.\n\nIn the future we maybe should even call these new helpers from the VFS\nso that each individual filesystem doesn't have to do it. But that's\nnot possible currently because fs/crypto/ can be built as a module.\n\nMaking changes like this is a bit challenging due to interdependencies\nbetween fscrypt and the individual filesystems, all of which have\ndifferent maintainers. For now my intent is that patches 1-10 be taken\nthrough the fscrypt tree --- though it's not perfect since patches 1-4\ndo make some changes to each filesystem, as everyone must set\nS_ENCRYPTED before we can use it everywhere in the shared code. But\nafterwards, patches 11-25 can be picked up by the individual filesystems\nto switch to the new helpers.\n\nEric Biggers (25):\n fs, fscrypt: add an S_ENCRYPTED inode flag\n fscrypt: switch from ->is_encrypted() to IS_ENCRYPTED()\n fscrypt: remove ->is_encrypted()\n fscrypt: remove unneeded empty fscrypt_operations structs\n fscrypt: new helper function - fscrypt_require_key()\n fscrypt: new helper function - fscrypt_file_open()\n fscrypt: new helper function - fscrypt_prepare_link()\n fscrypt: new helper function - fscrypt_prepare_rename()\n fscrypt: new helper function - fscrypt_prepare_lookup()\n fscrypt: new helper function - fscrypt_prepare_setattr()\n ext4: switch to fscrypt_file_open()\n ext4: switch to fscrypt_prepare_link()\n ext4: switch to fscrypt_prepare_rename()\n ext4: switch to fscrypt_prepare_lookup()\n ext4: switch to fscrypt_prepare_setattr()\n f2fs: switch to fscrypt_file_open()\n f2fs: switch to fscrypt_prepare_link()\n f2fs: switch to fscrypt_prepare_rename()\n f2fs: switch to fscrypt_prepare_lookup()\n f2fs: switch to fscrypt_prepare_setattr()\n ubifs: switch to fscrypt_file_open()\n ubifs: switch to fscrypt_prepare_link()\n ubifs: switch to fscrypt_prepare_rename()\n ubifs: switch to fscrypt_prepare_lookup()\n ubifs: switch to fscrypt_prepare_setattr()\n\n fs/crypto/Makefile | 2 +-\n fs/crypto/crypto.c | 2 +-\n fs/crypto/fname.c | 3 +-\n fs/crypto/hooks.c | 112 +++++++++++++++++++++++++++++\n fs/crypto/keyinfo.c | 2 +-\n fs/crypto/policy.c | 6 +-\n fs/ext4/file.c | 23 ++----\n fs/ext4/inode.c | 19 +++--\n fs/ext4/namei.c | 62 +++++-----------\n fs/ext4/super.c | 15 ++--\n fs/f2fs/f2fs.h | 1 +\n fs/f2fs/file.c | 30 ++------\n fs/f2fs/inode.c | 5 +-\n fs/f2fs/namei.c | 54 ++++----------\n fs/f2fs/super.c | 7 +-\n fs/ubifs/crypto.c | 1 -\n fs/ubifs/dir.c | 43 ++++-------\n fs/ubifs/file.c | 41 ++---------\n fs/ubifs/ioctl.c | 5 +-\n fs/ubifs/super.c | 8 +--\n fs/ubifs/ubifs.h | 9 +--\n fs/ubifs/xattr.c | 1 +\n include/linux/fs.h | 2 +\n include/linux/fscrypt_common.h | 1 -\n include/linux/fscrypt_notsupp.h | 54 +++++++++++++-\n include/linux/fscrypt_supp.h | 153 ++++++++++++++++++++++++++++++++++++++++\n 26 files changed, 418 insertions(+), 243 deletions(-)\n create mode 100644 fs/crypto/hooks.c" }