aboutsummaryrefslogtreecommitdiffstats
path: root/fs/namei.c
diff options
context:
space:
mode:
authorChristoph Hellwig <hch@lst.de>2008-10-24 03:59:29 -0400
committerAl Viro <viro@zeniv.linux.org.uk>2008-12-31 18:07:41 -0500
commitcb23beb55100171646e69e248fb45f10db6e99a4 (patch)
treea8868859b02f14dc27ef560de903088ca35b4ad4 /fs/namei.c
parent3fb64190aa3c23c10e6e9fd0124ac030115c99bf (diff)
kill vfs_permission
With all the nameidata removal there's no point anymore for this helper. Of the three callers left two will go away with the next lookup series anyway. Also add proper kerneldoc to inode_permission as this is the main permission check routine now. Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Diffstat (limited to 'fs/namei.c')
-rw-r--r--fs/namei.c31
1 files changed, 13 insertions, 18 deletions
diff --git a/fs/namei.c b/fs/namei.c
index 5cc0dc95a7a5..3f88e043d459 100644
--- a/fs/namei.c
+++ b/fs/namei.c
@@ -226,6 +226,16 @@ int generic_permission(struct inode *inode, int mask,
226 return -EACCES; 226 return -EACCES;
227} 227}
228 228
229/**
230 * inode_permission - check for access rights to a given inode
231 * @inode: inode to check permission on
232 * @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC)
233 *
234 * Used to check for read/write/execute permissions on an inode.
235 * We use "fsuid" for this, letting us set arbitrary permissions
236 * for filesystem access without changing the "normal" uids which
237 * are used for other things.
238 */
229int inode_permission(struct inode *inode, int mask) 239int inode_permission(struct inode *inode, int mask)
230{ 240{
231 int retval; 241 int retval;
@@ -264,21 +274,6 @@ int inode_permission(struct inode *inode, int mask)
264} 274}
265 275
266/** 276/**
267 * vfs_permission - check for access rights to a given path
268 * @nd: lookup result that describes the path
269 * @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC)
270 *
271 * Used to check for read/write/execute permissions on a path.
272 * We use "fsuid" for this, letting us set arbitrary permissions
273 * for filesystem access without changing the "normal" uids which
274 * are used for other things.
275 */
276int vfs_permission(struct nameidata *nd, int mask)
277{
278 return inode_permission(nd->path.dentry->d_inode, mask);
279}
280
281/**
282 * file_permission - check for additional access rights to a given file 277 * file_permission - check for additional access rights to a given file
283 * @file: file to check access rights for 278 * @file: file to check access rights for
284 * @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC) 279 * @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC)
@@ -288,7 +283,7 @@ int vfs_permission(struct nameidata *nd, int mask)
288 * 283 *
289 * Note: 284 * Note:
290 * Do not use this function in new code. All access checks should 285 * Do not use this function in new code. All access checks should
291 * be done using vfs_permission(). 286 * be done using inode_permission().
292 */ 287 */
293int file_permission(struct file *file, int mask) 288int file_permission(struct file *file, int mask)
294{ 289{
@@ -853,7 +848,8 @@ static int __link_path_walk(const char *name, struct nameidata *nd)
853 nd->flags |= LOOKUP_CONTINUE; 848 nd->flags |= LOOKUP_CONTINUE;
854 err = exec_permission_lite(inode); 849 err = exec_permission_lite(inode);
855 if (err == -EAGAIN) 850 if (err == -EAGAIN)
856 err = vfs_permission(nd, MAY_EXEC); 851 err = inode_permission(nd->path.dentry->d_inode,
852 MAY_EXEC);
857 if (err) 853 if (err)
858 break; 854 break;
859 855
@@ -2882,7 +2878,6 @@ EXPORT_SYMBOL(path_lookup);
2882EXPORT_SYMBOL(kern_path); 2878EXPORT_SYMBOL(kern_path);
2883EXPORT_SYMBOL(vfs_path_lookup); 2879EXPORT_SYMBOL(vfs_path_lookup);
2884EXPORT_SYMBOL(inode_permission); 2880EXPORT_SYMBOL(inode_permission);
2885EXPORT_SYMBOL(vfs_permission);
2886EXPORT_SYMBOL(file_permission); 2881EXPORT_SYMBOL(file_permission);
2887EXPORT_SYMBOL(unlock_rename); 2882EXPORT_SYMBOL(unlock_rename);
2888EXPORT_SYMBOL(vfs_create); 2883EXPORT_SYMBOL(vfs_create);