[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20210519113058.1979817-1-memxor@gmail.com>
Date: Wed, 19 May 2021 17:00:55 +0530
From: Kumar Kartikeya Dwivedi <memxor@...il.com>
To: io-uring@...r.kernel.org
Cc: Pavel Emelyanov <xemul@...nvz.org>,
Kumar Kartikeya Dwivedi <memxor@...il.com>,
Alexander Viro <viro@...iv.linux.org.uk>,
Jens Axboe <axboe@...nel.dk>,
Pavel Begunkov <asml.silence@...il.com>,
Daniel Colascione <dancol@...gle.com>,
Paul Moore <paul@...l-moore.com>,
Eric Biggers <ebiggers@...gle.com>,
Lokesh Gidra <lokeshgidra@...gle.com>,
linux-fsdevel@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [PATCH 0/2] Create io_uring fd with ephemeral inode
This set converts io_uring to use secure anon_inodes (with a newly allocated
non-S_PRIVATE inode) for each individual instance. In addition to allowing LSM
modules to enforce policy using the inode context, it also enables
checkpoint/restore usecases by allowing mapping the VMA to the open fd in a
task. Offset is already available to determine rings mapped per region, so this
was the only missing piece in establishing region <-> io_uring instance mapping.
LSM tie up has been left out of this set for now.
Kumar Kartikeya Dwivedi (2):
fs: anon_inodes: export anon_inode_getfile_secure helper
fs: io_uring: convert to use anon_inode_getfile_secure
fs/anon_inodes.c | 9 +++++++++
fs/io_uring.c | 4 ++--
include/linux/anon_inodes.h | 4 ++++
3 files changed, 15 insertions(+), 2 deletions(-)
--
2.31.1
Powered by blists - more mailing lists