file.c (b22364c8eec89e6b0c081a237f3b6348df87796f) file.c (c376222960ae91d5ffb9197ee36771aaed1d9f90)
1/**
2 * eCryptfs: Linux filesystem encryption layer
3 *
4 * Copyright (C) 1997-2004 Erez Zadok
5 * Copyright (C) 2001-2004 Stony Brook University
6 * Copyright (C) 2004-2006 International Business Machines Corp.
7 * Author(s): Michael A. Halcrow <mhalcrow@us.ibm.com>
8 * Michael C. Thompson <mcthomps@us.ibm.com>

--- 237 unchanged lines hidden (view full) ---

246 struct dentry *lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry);
247 struct inode *lower_inode = NULL;
248 struct file *lower_file = NULL;
249 struct vfsmount *lower_mnt;
250 struct ecryptfs_file_info *file_info;
251 int lower_flags;
252
253 /* Released in ecryptfs_release or end of function if failure */
1/**
2 * eCryptfs: Linux filesystem encryption layer
3 *
4 * Copyright (C) 1997-2004 Erez Zadok
5 * Copyright (C) 2001-2004 Stony Brook University
6 * Copyright (C) 2004-2006 International Business Machines Corp.
7 * Author(s): Michael A. Halcrow <mhalcrow@us.ibm.com>
8 * Michael C. Thompson <mcthomps@us.ibm.com>

--- 237 unchanged lines hidden (view full) ---

246 struct dentry *lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry);
247 struct inode *lower_inode = NULL;
248 struct file *lower_file = NULL;
249 struct vfsmount *lower_mnt;
250 struct ecryptfs_file_info *file_info;
251 int lower_flags;
252
253 /* Released in ecryptfs_release or end of function if failure */
254 file_info = kmem_cache_alloc(ecryptfs_file_info_cache, GFP_KERNEL);
254 file_info = kmem_cache_zalloc(ecryptfs_file_info_cache, GFP_KERNEL);
255 ecryptfs_set_file_private(file, file_info);
256 if (!file_info) {
257 ecryptfs_printk(KERN_ERR,
258 "Error attempting to allocate memory\n");
259 rc = -ENOMEM;
260 goto out;
261 }
255 ecryptfs_set_file_private(file, file_info);
256 if (!file_info) {
257 ecryptfs_printk(KERN_ERR,
258 "Error attempting to allocate memory\n");
259 rc = -ENOMEM;
260 goto out;
261 }
262 memset(file_info, 0, sizeof(*file_info));
263 lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry);
264 crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat;
265 mount_crypt_stat = &ecryptfs_superblock_to_private(
266 ecryptfs_dentry->d_sb)->mount_crypt_stat;
267 mutex_lock(&crypt_stat->cs_mutex);
268 if (!ECRYPTFS_CHECK_FLAG(crypt_stat->flags, ECRYPTFS_POLICY_APPLIED)) {
269 ecryptfs_printk(KERN_DEBUG, "Setting flags for stat...\n");
270 /* Policy code enabled in future release */

--- 199 unchanged lines hidden ---
262 lower_dentry = ecryptfs_dentry_to_lower(ecryptfs_dentry);
263 crypt_stat = &ecryptfs_inode_to_private(inode)->crypt_stat;
264 mount_crypt_stat = &ecryptfs_superblock_to_private(
265 ecryptfs_dentry->d_sb)->mount_crypt_stat;
266 mutex_lock(&crypt_stat->cs_mutex);
267 if (!ECRYPTFS_CHECK_FLAG(crypt_stat->flags, ECRYPTFS_POLICY_APPLIED)) {
268 ecryptfs_printk(KERN_DEBUG, "Setting flags for stat...\n");
269 /* Policy code enabled in future release */

--- 199 unchanged lines hidden ---