1. 05 5月, 2020 18 次提交
  2. 29 4月, 2020 2 次提交
  3. 21 4月, 2020 1 次提交
  4. 09 4月, 2020 1 次提交
  5. 08 4月, 2020 2 次提交
  6. 04 4月, 2020 1 次提交
  7. 30 3月, 2020 1 次提交
  8. 27 3月, 2020 1 次提交
  9. 25 3月, 2020 1 次提交
    • D
      zonfs: Fix handling of read-only zones · ccf4ad7d
      Damien Le Moal 提交于
      The write pointer of zones in the read-only consition is defined as
      invalid by the SCSI ZBC and ATA ZAC specifications. It is thus not
      possible to determine the correct size of a read-only zone file on
      mount. Fix this by handling read-only zones in the same manner as
      offline zones by disabling all accesses to the zone (read and write)
      and initializing the inode size of the read-only zone to 0).
      
      For zones found to be in the read-only condition at runtime, only
      disable write access to the zone and keep the size of the zone file to
      its last updated value to allow the user to recover previously written
      data.
      
      Also fix zonefs documentation file to reflect this change.
      Signed-off-by: NDamien Le Moal <damien.lemoal@wdc.com>
      Reviewed-by: NJohannes Thumshirn <johannes.thumshirn@wdc.com>
      ccf4ad7d
  10. 21 3月, 2020 3 次提交
  11. 20 3月, 2020 1 次提交
    • E
      fscrypt: add FS_IOC_GET_ENCRYPTION_NONCE ioctl · e98ad464
      Eric Biggers 提交于
      Add an ioctl FS_IOC_GET_ENCRYPTION_NONCE which retrieves the nonce from
      an encrypted file or directory.  The nonce is the 16-byte random value
      stored in the inode's encryption xattr.  It is normally used together
      with the master key to derive the inode's actual encryption key.
      
      The nonces are needed by automated tests that verify the correctness of
      the ciphertext on-disk.  Except for the IV_INO_LBLK_64 case, there's no
      way to replicate a file's ciphertext without knowing that file's nonce.
      
      The nonces aren't secret, and the existing ciphertext verification tests
      in xfstests retrieve them from disk using debugfs or dump.f2fs.  But in
      environments that lack these debugging tools, getting the nonces by
      manually parsing the filesystem structure would be very hard.
      
      To make this important type of testing much easier, let's just add an
      ioctl that retrieves the nonce.
      
      Link: https://lore.kernel.org/r/20200314205052.93294-2-ebiggers@kernel.orgReviewed-by: NTheodore Ts'o <tytso@mit.edu>
      Signed-off-by: NEric Biggers <ebiggers@google.com>
      e98ad464
  12. 18 3月, 2020 1 次提交
  13. 17 3月, 2020 1 次提交
  14. 15 3月, 2020 1 次提交
  15. 14 3月, 2020 1 次提交
    • A
      sanitize handling of nd->last_type, kill LAST_BIND · b4c03536
      Al Viro 提交于
      ->last_type values are set in 3 places: path_init() (sets to LAST_ROOT),
      link_path_walk (LAST_NORM/DOT/DOTDOT) and pick_link (LAST_BIND).
      
      The are checked in walk_component(), lookup_last() and do_last().
      They also get copied to the caller by filename_parentat().  In the last
      3 cases the value is what we had at the return from link_path_walk().
      In case of walk_component() it's either directly downstream from
      assignment in link_path_walk() or, when called by lookup_last(), the
      value we have at the return from link_path_walk().
      
      The value at the entry into link_path_walk() can survive to return only
      if the pathname contains nothing but slashes.  Note that pick_link()
      never returns such - pure jumps are handled directly.  So for the calls
      of link_path_walk() for trailing symlinks it does not matter what value
      had been there at the entry; the value at the return won't depend upon it.
      
      There are 3 call chains that might have pick_link() storing LAST_BIND:
      
      1) pick_link() from step_into() from walk_component() from
      link_path_walk().  In that case we will either be parsing the next
      component immediately after return into link_path_walk(), which will
      overwrite the ->last_type before anyone has a chance to look at it,
      or we'll fail, in which case nobody will be looking at ->last_type at all.
      
      2) pick_link() from step_into() from walk_component() from lookup_last().
      The value is never looked at due to the above; it won't affect the value
      seen at return from any link_path_walk().
      
      3) pick_link() from step_into() from do_last().  Ditto.
      
      In other words, assignemnt in pick_link() is pointless, and so is
      LAST_BIND itself; nothing ever looks at that value.  Kill it off.
      And make link_path_walk() _always_ assign ->last_type - in the only
      case when the value at the entry might survive to the return that value
      is always LAST_ROOT, inherited from path_init().  Move that assignment
      from path_init() into the beginning of link_path_walk(), to consolidate
      the things.
      
      Historical note: LAST_BIND used to be used for the kludge with trailing
      pure jump symlinks (extra iteration through the top-level loop).
      No point keeping it anymore...
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      b4c03536
  16. 13 3月, 2020 1 次提交
    • A
      cifs_atomic_open(): fix double-put on late allocation failure · d9a9f484
      Al Viro 提交于
      several iterations of ->atomic_open() calling conventions ago, we
      used to need fput() if ->atomic_open() failed at some point after
      successful finish_open().  Now (since 2016) it's not needed -
      struct file carries enough state to make fput() work regardless
      of the point in struct file lifecycle and discarding it on
      failure exits in open() got unified.  Unfortunately, I'd missed
      the fact that we had an instance of ->atomic_open() (cifs one)
      that used to need that fput(), as well as the stale comment in
      finish_open() demanding such late failure handling.  Trivially
      fixed...
      
      Fixes: fe9ec829 "do_last(): take fput() on error after opening to out:"
      Cc: stable@kernel.org # v4.7+
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      d9a9f484
  17. 11 3月, 2020 1 次提交
  18. 03 3月, 2020 2 次提交