diff options
author | Andreas Gruenbacher <agruen@kernel.org> | 2011-10-23 13:43:33 -0400 |
---|---|---|
committer | root <root@serles.lst.de> | 2011-10-28 08:58:55 -0400 |
commit | 948409c74d217f6cf054b8c927765a1c3fe16b53 (patch) | |
tree | e4d0d3d07eb8f11333fd050e3d577834da600db5 /fs/namei.c | |
parent | d124b60a838141bb9cac1b6567e9ca4539d1fff0 (diff) |
vfs: add a comment to inode_permission()
Acked-by: J. Bruce Fields <bfields@redhat.com>
Acked-by: David Howells <dhowells@redhat.com>
Signed-off-by: Andreas Gruenbacher <agruen@kernel.org>
Signed-off-by: Aneesh Kumar K.V <aneesh.kumar@linux.vnet.ibm.com>
Signed-off-by: Christoph Hellwig <hch@lst.de>
Diffstat (limited to 'fs/namei.c')
-rw-r--r-- | fs/namei.c | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/fs/namei.c b/fs/namei.c index 276cd30ab8f8..9061157e39d6 100644 --- a/fs/namei.c +++ b/fs/namei.c | |||
@@ -221,7 +221,7 @@ static int check_acl(struct inode *inode, int mask) | |||
221 | } | 221 | } |
222 | 222 | ||
223 | /* | 223 | /* |
224 | * This does basic POSIX ACL permission checking | 224 | * This does the basic permission checking |
225 | */ | 225 | */ |
226 | static int acl_permission_check(struct inode *inode, int mask) | 226 | static int acl_permission_check(struct inode *inode, int mask) |
227 | { | 227 | { |
@@ -271,7 +271,7 @@ int generic_permission(struct inode *inode, int mask) | |||
271 | int ret; | 271 | int ret; |
272 | 272 | ||
273 | /* | 273 | /* |
274 | * Do the basic POSIX ACL permission checks. | 274 | * Do the basic permission checks. |
275 | */ | 275 | */ |
276 | ret = acl_permission_check(inode, mask); | 276 | ret = acl_permission_check(inode, mask); |
277 | if (ret != -EACCES) | 277 | if (ret != -EACCES) |
@@ -335,6 +335,8 @@ static inline int do_inode_permission(struct inode *inode, int mask) | |||
335 | * We use "fsuid" for this, letting us set arbitrary permissions | 335 | * We use "fsuid" for this, letting us set arbitrary permissions |
336 | * for filesystem access without changing the "normal" uids which | 336 | * for filesystem access without changing the "normal" uids which |
337 | * are used for other things. | 337 | * are used for other things. |
338 | * | ||
339 | * When checking for MAY_APPEND, MAY_WRITE must also be set in @mask. | ||
338 | */ | 340 | */ |
339 | int inode_permission(struct inode *inode, int mask) | 341 | int inode_permission(struct inode *inode, int mask) |
340 | { | 342 | { |