linux-next: manual merge of the ecryptfs tree with Linus' tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Tyler,

Today's linux-next merge of the ecryptfs tree got a conflict in
fs/ecryptfs/main.c between commit
66cb76666d69502fe982990b2cff5b6d607fd3b1 ("sanitize ecryptfs ->mount()")
from Linus' tree and commit c65b788ce32e9cd1c7d221551275774f1aa83084
("ecryptfs: missing initialization of the superblock 'magic' field") from
the ecryptfs tree.

I fixed it up (I think - see below) and can carry the fix as necessary.
-- 
Cheers,
Stephen Rothwell                    sfr@xxxxxxxxxxxxxxxx

diff --cc fs/ecryptfs/main.c
index d3b28ab,70009a7..0000000
--- a/fs/ecryptfs/main.c
+++ b/fs/ecryptfs/main.c
@@@ -546,54 -587,34 +546,55 @@@ static struct dentry *ecryptfs_mount(st
  	/* ->kill_sb() will take care of sbi after that point */
  	sbi = NULL;
  	s->s_op = &ecryptfs_sops;
 +	s->s_d_op = &ecryptfs_dops;
  
 -	rc = -ENOMEM;
 -	s->s_root = d_alloc(NULL, &(const struct qstr) {
 -			     .hash = 0,.name = "/",.len = 1});
 +	err = "Reading sb failed";
 +	rc = kern_path(dev_name, LOOKUP_FOLLOW | LOOKUP_DIRECTORY, &path);
 +	if (rc) {
 +		ecryptfs_printk(KERN_WARNING, "kern_path() failed\n");
 +		goto out1;
 +	}
 +	if (path.dentry->d_sb->s_type == &ecryptfs_fs_type) {
 +		rc = -EINVAL;
 +		printk(KERN_ERR "Mount on filesystem of type "
 +			"eCryptfs explicitly disallowed due to "
 +			"known incompatibilities\n");
 +		goto out_free;
 +	}
 +	ecryptfs_set_superblock_lower(s, path.dentry->d_sb);
 +	s->s_maxbytes = path.dentry->d_sb->s_maxbytes;
 +	s->s_blocksize = path.dentry->d_sb->s_blocksize;
++	s->s_magic = ECRYPTFS_SUPER_MAGIC;
 +
 +	inode = ecryptfs_get_inode(path.dentry->d_inode, s);
 +	rc = PTR_ERR(inode);
 +	if (IS_ERR(inode))
 +		goto out_free;
 +
 +	s->s_root = d_alloc_root(inode);
  	if (!s->s_root) {
 -		deactivate_locked_super(s);
 -		goto out;
 +		iput(inode);
 +		rc = -ENOMEM;
 +		goto out_free;
  	}
 -	s->s_root->d_op = &ecryptfs_dops;
 -	s->s_root->d_sb = s;
 -	s->s_root->d_parent = s->s_root;
  
 +	rc = -ENOMEM;
  	root_info = kmem_cache_zalloc(ecryptfs_dentry_info_cache, GFP_KERNEL);
 -	if (!root_info) {
 -		deactivate_locked_super(s);
 -		goto out;
 -	}
 +	if (!root_info)
 +		goto out_free;
 +
  	/* ->kill_sb() will take care of root_info */
  	ecryptfs_set_dentry_private(s->s_root, root_info);
 +	ecryptfs_set_dentry_lower(s->s_root, path.dentry);
 +	ecryptfs_set_dentry_lower_mnt(s->s_root, path.mnt);
 +
  	s->s_flags |= MS_ACTIVE;
 -	rc = ecryptfs_read_super(s, dev_name);
 -	if (rc) {
 -		deactivate_locked_super(s);
 -		err = "Reading sb failed";
 -		goto out;
 -	}
  	return dget(s->s_root);
  
 +out_free:
 +	path_put(&path);
 +out1:
 +	deactivate_locked_super(s);
  out:
  	if (sbi) {
  		ecryptfs_destroy_mount_crypt_stat(&sbi->mount_crypt_stat);
--
To unsubscribe from this list: send the line "unsubscribe linux-next" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Kernel]     [Linux USB Development]     [Yosemite News]     [Linux SCSI]

  Powered by Linux