Commit 8fd90c8d authored by Andreas Gruenbacher's avatar Andreas Gruenbacher Committed by root

vfs: indicate that the permission functions take all the MAY_* flags

Acked-by: default avatarJ. Bruce Fields <bfields@redhat.com>
Acked-by: default avatarDavid Howells <dhowells@redhat.com>
Signed-off-by: default avatarAndreas Gruenbacher <agruen@kernel.org>
Signed-off-by: default avatarAneesh Kumar K.V <aneesh.kumar@linux.vnet.ibm.com>
Signed-off-by: default avatarChristoph Hellwig <hch@lst.de>
parent 1448c721
...@@ -257,7 +257,7 @@ static int acl_permission_check(struct inode *inode, int mask) ...@@ -257,7 +257,7 @@ static int acl_permission_check(struct inode *inode, int mask)
/** /**
* generic_permission - check for access rights on a Posix-like filesystem * generic_permission - check for access rights on a Posix-like filesystem
* @inode: inode to check access rights for * @inode: inode to check access rights for
* @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC) * @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC, ...)
* *
* Used to check for read/write/execute permissions on a file. * Used to check for read/write/execute permissions on a file.
* We use "fsuid" for this, letting us set arbitrary permissions * We use "fsuid" for this, letting us set arbitrary permissions
...@@ -331,7 +331,7 @@ static inline int do_inode_permission(struct inode *inode, int mask) ...@@ -331,7 +331,7 @@ static inline int do_inode_permission(struct inode *inode, int mask)
/** /**
* inode_permission - check for access rights to a given inode * inode_permission - check for access rights to a given inode
* @inode: inode to check permission on * @inode: inode to check permission on
* @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC) * @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC, ...)
* *
* Used to check for read/write/execute permissions on an inode. * Used to check for read/write/execute permissions on an inode.
* We use "fsuid" for this, letting us set arbitrary permissions * We use "fsuid" for this, letting us set arbitrary permissions
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment