eCryptfs: Handle ioctl calls with unlocked and compat functions
commit8939a755413a77d8449ae22ed8cc80ebd5e7fa80
authorTyler Hicks <tyhicks@linux.vnet.ibm.com>
Tue, 3 Nov 2009 17:45:11 +0000 (3 11:45 -0600)
committerGreg Kroah-Hartman <gregkh@suse.de>
Fri, 13 Aug 2010 20:27:21 +0000 (13 13:27 -0700)
treeb1c673998fa3dc0994943d2be29c3856c20340e5
parentac793824b5235b7ca62a6f5fffc7840b7eae9795
eCryptfs: Handle ioctl calls with unlocked and compat functions

commit c43f7b8fb03be8bcc579bfc4e6ab70eac887ab55 upstream.

Lower filesystems that only implemented unlocked_ioctl weren't being
passed ioctl calls because eCryptfs only checked for
lower_file->f_op->ioctl and returned -ENOTTY if it was NULL.

eCryptfs shouldn't implement ioctl(), since it doesn't require the BKL.
This patch introduces ecryptfs_unlocked_ioctl() and
ecryptfs_compat_ioctl(), which passes the calls on to the lower file
system.

https://bugs.launchpad.net/ecryptfs/+bug/469664

Reported-by: James Dupin <james.dupin@gmail.com>
Signed-off-by: Tyler Hicks <tyhicks@linux.vnet.ibm.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
fs/ecryptfs/file.c