From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id A28ECC87FE1 for ; Fri, 9 Jun 2023 12:51:11 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240734AbjFIMuk (ORCPT ); Fri, 9 Jun 2023 08:50:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52384 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240758AbjFIMua (ORCPT ); Fri, 9 Jun 2023 08:50:30 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1446E272A; Fri, 9 Jun 2023 05:50:29 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id A053B65489; Fri, 9 Jun 2023 12:50:28 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 04CB9C433EF; Fri, 9 Jun 2023 12:50:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1686315028; bh=gIZwlLvY4sTdkvZELuapNhoOFzzZExwAnWiPWsxbXHo=; h=From:To:Subject:Date:From; b=dcwqOrVfEIufAkx9HYctn0bCPuNyn/IoA3qeRLEf0QBZaM2ZxNK4fITHocjWjP+BS ArXA2HvHcNMCbQoCJLgk3YNktWjq5smDP0btfPqHdZkDkaNlMvMKacJZXz5oGbyybS Seh3kB1aYVkF1EaQIzj0KMYE2IM8/UE/RnW4K8gKxJc+5U/2OtM1xACvDi/T8P0Pdc Xkm13/IgUo3Vr5PsmuoEohjK9wBWC2RLrPIKKbIGloomJhioPPXWTe43kEqN5X837K nGxIOrekLqpwpPCILVczWkex/Sm2OoMe1QXBZj99WR32Ho0RhbyqroHBCWw41oCA3r Vj6GOBo2c2fNw== From: Jeff Layton To: Christian Brauner , Al Viro , Brad Warrum , Ritu Agarwal , Arnd Bergmann , Greg Kroah-Hartman , Ian Kent , "Tigran A. Aivazian" , Jeremy Kerr , Ard Biesheuvel , Namjae Jeon , Sungjong Seo , Bob Peterson , Andreas Gruenbacher , Steve French , Paulo Alcantara , Ronnie Sahlberg , Shyam Prasad N , Tom Talpey , John Johansen , Paul Moore , James Morris , "Serge E. Hallyn" , Ruihan Li , Suren Baghdasaryan , Sebastian Reichel , Wolfram Sang , linux-kernel@vger.kernel.org, linux-usb@vger.kernel.org, autofs@vger.kernel.org, linux-efi@vger.kernel.org, linux-fsdevel@vger.kernel.org, cluster-devel@redhat.com, linux-cifs@vger.kernel.org, samba-technical@lists.samba.org, apparmor@lists.ubuntu.com, linux-security-module@vger.kernel.org Subject: [PATCH 0/9] fs: add some missing ctime updates Date: Fri, 9 Jun 2023 08:50:14 -0400 Message-Id: <20230609125023.399942-1-jlayton@kernel.org> X-Mailer: git-send-email 2.40.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org While working on a patch series to change how we handle the ctime, I found a number of places that update the mtime without a corresponding ctime update. POSIX requires that when the mtime is updated that the ctime also be updated. Note that these are largely untested other than for compilation, so please review carefully. These are a preliminary set for the upcoming rework of how we handle the ctime. None of these seem to be very crucial, but it would be nice if various maintainers could pick these up for v6.5. Please let me know if you do. Jeff Layton (9): ibmvmc: update ctime in conjunction with mtime on write usb: update the ctime as well when updating mtime after an ioctl autofs: set ctime as well when mtime changes on a dir bfs: update ctime in addition to mtime when adding entries efivarfs: update ctime when mtime changes on a write exfat: ensure that ctime is updated whenever the mtime is gfs2: update ctime when quota is updated apparmor: update ctime whenever the mtime changes on an inode cifs: update the ctime on a partial page write drivers/misc/ibmvmc.c | 2 +- drivers/usb/core/devio.c | 16 ++++++++-------- fs/autofs/root.c | 6 +++--- fs/bfs/dir.c | 2 +- fs/efivarfs/file.c | 2 +- fs/exfat/namei.c | 8 ++++---- fs/gfs2/quota.c | 2 +- fs/smb/client/file.c | 2 +- security/apparmor/apparmorfs.c | 7 +++++-- security/apparmor/policy_unpack.c | 11 +++++++---- 10 files changed, 32 insertions(+), 26 deletions(-) -- 2.40.1