file.c (b22364c8eec89e6b0c081a237f3b6348df87796f) | file.c (c376222960ae91d5ffb9197ee36771aaed1d9f90) |
---|---|
1/** 2 * eCryptfs: Linux filesystem encryption layer 3 * 4 * Copyright (C) 1997-2004 Erez Zadok 5 * Copyright (C) 2001-2004 Stony Brook University 6 * Copyright (C) 2004-2006 International Business Machines Corp. 7 * Author(s): Michael A. Halcrow <mhalcrow@us.ibm.com> 8 * Michael C. Thompson <mcthomps@us.ibm.com> --- 237 unchanged lines hidden (view full) --- 246 struct dentry *lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry); 247 struct inode *lower_inode = NULL; 248 struct file *lower_file = NULL; 249 struct vfsmount *lower_mnt; 250 struct ecryptfs_file_info *file_info; 251 int lower_flags; 252 253 /* Released in ecryptfs_release or end of function if failure */ | 1/** 2 * eCryptfs: Linux filesystem encryption layer 3 * 4 * Copyright (C) 1997-2004 Erez Zadok 5 * Copyright (C) 2001-2004 Stony Brook University 6 * Copyright (C) 2004-2006 International Business Machines Corp. 7 * Author(s): Michael A. Halcrow <mhalcrow@us.ibm.com> 8 * Michael C. Thompson <mcthomps@us.ibm.com> --- 237 unchanged lines hidden (view full) --- 246 struct dentry *lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry); 247 struct inode *lower_inode = NULL; 248 struct file *lower_file = NULL; 249 struct vfsmount *lower_mnt; 250 struct ecryptfs_file_info *file_info; 251 int lower_flags; 252 253 /* Released in ecryptfs_release or end of function if failure */ |
254 file_info = kmem_cache_alloc(ecryptfs_file_info_cache, GFP_KERNEL); | 254 file_info = kmem_cache_zalloc(ecryptfs_file_info_cache, GFP_KERNEL); |
255 ecryptfs_set_file_private(file, file_info); 256 if (!file_info) { 257 ecryptfs_printk(KERN_ERR, 258 "Error attempting to allocate memory\n"); 259 rc = -ENOMEM; 260 goto out; 261 } | 255 ecryptfs_set_file_private(file, file_info); 256 if (!file_info) { 257 ecryptfs_printk(KERN_ERR, 258 "Error attempting to allocate memory\n"); 259 rc = -ENOMEM; 260 goto out; 261 } |
262 memset(file_info, 0, sizeof(*file_info)); | |
263 lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry); 264 crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat; 265 mount_crypt_stat = &ecryptfs_superblock_to_private( 266 ecryptfs_dentry->d_sb)->mount_crypt_stat; 267 mutex_lock(&crypt_stat->cs_mutex); 268 if (!ECRYPTFS_CHECK_FLAG(crypt_stat->flags, ECRYPTFS_POLICY_APPLIED)) { 269 ecryptfs_printk(KERN_DEBUG, "Setting flags for stat...\n"); 270 /* Policy code enabled in future release */ --- 199 unchanged lines hidden --- | 262 lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry); 263 crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat; 264 mount_crypt_stat = &ecryptfs_superblock_to_private( 265 ecryptfs_dentry->d_sb)->mount_crypt_stat; 266 mutex_lock(&crypt_stat->cs_mutex); 267 if (!ECRYPTFS_CHECK_FLAG(crypt_stat->flags, ECRYPTFS_POLICY_APPLIED)) { 268 ecryptfs_printk(KERN_DEBUG, "Setting flags for stat...\n"); 269 /* Policy code enabled in future release */ --- 199 unchanged lines hidden --- |