@@ -886,25 +886,23 @@ ecryptfs_permission(struct mnt_idmap *idmap, struct inode *inode,
886886static int ecryptfs_setattr (struct mnt_idmap * idmap ,
887887 struct dentry * dentry , struct iattr * ia )
888888{
889- int rc = 0 ;
890- struct dentry * lower_dentry ;
889+ struct inode * inode = d_inode (dentry );
890+ struct dentry * lower_dentry = ecryptfs_dentry_to_lower (dentry );
891+ struct inode * lower_inode = ecryptfs_inode_to_lower (inode );
891892 struct iattr lower_ia ;
892- struct inode * inode ;
893- struct inode * lower_inode ;
894893 struct ecryptfs_crypt_stat * crypt_stat ;
894+ int rc ;
895895
896896 crypt_stat = & ecryptfs_inode_to_private (d_inode (dentry ))-> crypt_stat ;
897897 if (!(crypt_stat -> flags & ECRYPTFS_STRUCT_INITIALIZED ))
898898 ecryptfs_init_crypt_stat (crypt_stat );
899- inode = d_inode (dentry );
900- lower_inode = ecryptfs_inode_to_lower (inode );
901- lower_dentry = ecryptfs_dentry_to_lower (dentry );
899+
902900 mutex_lock (& crypt_stat -> cs_mutex );
903901 if (d_is_dir (dentry ))
904902 crypt_stat -> flags &= ~(ECRYPTFS_ENCRYPTED );
905- else if (d_is_reg (dentry )
906- && (!(crypt_stat -> flags & ECRYPTFS_POLICY_APPLIED )
907- || !(crypt_stat -> flags & ECRYPTFS_KEY_VALID ))) {
903+ else if (d_is_reg (dentry ) &&
904+ (!(crypt_stat -> flags & ECRYPTFS_POLICY_APPLIED ) ||
905+ !(crypt_stat -> flags & ECRYPTFS_KEY_VALID ))) {
908906 struct ecryptfs_mount_crypt_stat * mount_crypt_stat ;
909907
910908 mount_crypt_stat = & ecryptfs_superblock_to_private (
@@ -917,8 +915,8 @@ static int ecryptfs_setattr(struct mnt_idmap *idmap,
917915 rc = ecryptfs_read_metadata (dentry );
918916 ecryptfs_put_lower_file (inode );
919917 if (rc ) {
920- if (!(mount_crypt_stat -> flags
921- & ECRYPTFS_PLAINTEXT_PASSTHROUGH_ENABLED )) {
918+ if (!(mount_crypt_stat -> flags &
919+ ECRYPTFS_PLAINTEXT_PASSTHROUGH_ENABLED )) {
922920 rc = - EIO ;
923921 printk (KERN_WARNING "Either the lower file "
924922 "is not in a valid eCryptfs format, "
0 commit comments