diff options
author | Miklos Szeredi <mszeredi@suse.cz> | 2014-10-23 18:14:35 -0400 |
---|---|---|
committer | Miklos Szeredi <mszeredi@suse.cz> | 2014-10-23 18:14:35 -0400 |
commit | bd5d08569cc379f8366663a61558a9ce17c2e460 (patch) | |
tree | 8408b3137f09f09f0906bbd91d3f700f956341b5 /fs | |
parent | 1c118596a7682912106c80007102ce0184c77780 (diff) |
vfs: export __inode_permission() to modules
We need to be able to check inode permissions (but not filesystem implied
permissions) for stackable filesystems. Expose this interface for overlayfs.
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
Diffstat (limited to 'fs')
-rw-r--r-- | fs/internal.h | 1 | ||||
-rw-r--r-- | fs/namei.c | 1 |
2 files changed, 1 insertions, 1 deletions
diff --git a/fs/internal.h b/fs/internal.h index 0f0626a6997c..757ba2abf21e 100644 --- a/fs/internal.h +++ b/fs/internal.h | |||
@@ -47,7 +47,6 @@ extern void __init chrdev_init(void); | |||
47 | /* | 47 | /* |
48 | * namei.c | 48 | * namei.c |
49 | */ | 49 | */ |
50 | extern int __inode_permission(struct inode *, int); | ||
51 | extern int user_path_mountpoint_at(int, const char __user *, unsigned int, struct path *); | 50 | extern int user_path_mountpoint_at(int, const char __user *, unsigned int, struct path *); |
52 | extern int vfs_path_lookup(struct dentry *, struct vfsmount *, | 51 | extern int vfs_path_lookup(struct dentry *, struct vfsmount *, |
53 | const char *, unsigned int, struct path *); | 52 | const char *, unsigned int, struct path *); |
diff --git a/fs/namei.c b/fs/namei.c index 75306b3c9526..d944f6db9b07 100644 --- a/fs/namei.c +++ b/fs/namei.c | |||
@@ -416,6 +416,7 @@ int __inode_permission(struct inode *inode, int mask) | |||
416 | 416 | ||
417 | return security_inode_permission(inode, mask); | 417 | return security_inode_permission(inode, mask); |
418 | } | 418 | } |
419 | EXPORT_SYMBOL(__inode_permission); | ||
419 | 420 | ||
420 | /** | 421 | /** |
421 | * sb_permission - Check superblock-level permissions | 422 | * sb_permission - Check superblock-level permissions |