From patchwork Wed Feb 23 13:51:48 2011 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Aneesh Kumar K.V" X-Patchwork-Id: 584901 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by demeter1.kernel.org (8.14.4/8.14.3) with ESMTP id p1NE2BH0029727 for ; Wed, 23 Feb 2011 14:02:33 GMT Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755315Ab1BWNw5 (ORCPT ); Wed, 23 Feb 2011 08:52:57 -0500 Received: from e28smtp08.in.ibm.com ([122.248.162.8]:33448 "EHLO e28smtp08.in.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755299Ab1BWNwz (ORCPT ); Wed, 23 Feb 2011 08:52:55 -0500 Received: from d28relay03.in.ibm.com (d28relay03.in.ibm.com [9.184.220.60]) by e28smtp08.in.ibm.com (8.14.4/8.13.1) with ESMTP id p1NCuEE0007672; Wed, 23 Feb 2011 18:26:14 +0530 Received: from d28av05.in.ibm.com (d28av05.in.ibm.com [9.184.220.67]) by d28relay03.in.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p1NDqpPl3944664; Wed, 23 Feb 2011 19:22:52 +0530 Received: from d28av05.in.ibm.com (loopback [127.0.0.1]) by d28av05.in.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p1NDqjAW016226; Thu, 24 Feb 2011 00:52:47 +1100 Received: from skywalker.ibm.com ([9.77.68.27]) by d28av05.in.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p1NDqS1s014791; Thu, 24 Feb 2011 00:52:43 +1100 From: "Aneesh Kumar K.V" To: sfrench@us.ibm.com, agruen@linbit.com, dilger.kernel@dilger.ca, sandeen@redhat.com, tytso@mit.edu, bfields@fieldses.org, jlayton@redhat.com Cc: aneesh.kumar@linux.vnet.ibm.com, linux-fsdevel@vger.kernel.org, linux-nfs@vger.kernel.org, linux-ext4@vger.kernel.org, linux-kernel@vger.kernel.org, Andreas Gruenbacher Subject: [PATCH -V5 01/24] vfs: Indicate that the permission functions take all the MAY_* flags Date: Wed, 23 Feb 2011 19:21:48 +0530 Message-Id: <1298469131-16555-2-git-send-email-aneesh.kumar@linux.vnet.ibm.com> X-Mailer: git-send-email 1.7.1 In-Reply-To: <1298469131-16555-1-git-send-email-aneesh.kumar@linux.vnet.ibm.com> References: <1298469131-16555-1-git-send-email-aneesh.kumar@linux.vnet.ibm.com> Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org X-Greylist: IP, sender and recipient auto-whitelisted, not delayed by milter-greylist-4.2.6 (demeter1.kernel.org [140.211.167.41]); Wed, 23 Feb 2011 14:02:34 +0000 (UTC) diff --git a/fs/namei.c b/fs/namei.c index 0087cf9..b01eab8 100644 --- a/fs/namei.c +++ b/fs/namei.c @@ -200,7 +200,7 @@ static int acl_permission_check(struct inode *inode, int mask, unsigned int flag /** * generic_permission - check for access rights on a Posix-like filesystem * @inode: inode to check access rights for - * @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC) + * @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC, ...) * @check_acl: optional callback to check for Posix ACLs * @flags: IPERM_FLAG_ flags. * @@ -247,7 +247,7 @@ int generic_permission(struct inode *inode, int mask, unsigned int flags, /** * inode_permission - check for access rights to a given inode * @inode: inode to check permission on - * @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC) + * @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC, ...) * * Used to check for read/write/execute permissions on an inode. * We use "fsuid" for this, letting us set arbitrary permissions @@ -294,7 +294,7 @@ int inode_permission(struct inode *inode, int mask) /** * file_permission - check for additional access rights to a given file * @file: file to check access rights for - * @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC) + * @mask: right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC, ...) * * Used to check for read/write/execute permissions on an already opened * file.