You've already forked linux-apfs
mirror of
https://github.com/linux-apfs/linux-apfs.git
synced 2026-05-01 15:00:59 -07:00
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs-2.6
* 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs-2.6: (39 commits)
[PATCH] fix RLIM_NOFILE handling
[PATCH] get rid of corner case in dup3() entirely
[PATCH] remove remaining namei_{32,64}.h crap
[PATCH] get rid of indirect users of namei.h
[PATCH] get rid of __user_path_lookup_open
[PATCH] f_count may wrap around
[PATCH] dup3 fix
[PATCH] don't pass nameidata to __ncp_lookup_validate()
[PATCH] don't pass nameidata to gfs2_lookupi()
[PATCH] new (local) helper: user_path_parent()
[PATCH] sanitize __user_walk_fd() et.al.
[PATCH] preparation to __user_walk_fd cleanup
[PATCH] kill nameidata passing to permission(), rename to inode_permission()
[PATCH] take noexec checks to very few callers that care
Re: [PATCH 3/6] vfs: open_exec cleanup
[patch 4/4] vfs: immutable inode checking cleanup
[patch 3/4] fat: dont call notify_change
[patch 2/4] vfs: utimes cleanup
[patch 1/4] vfs: utimes: move owner check into inode_change_ok()
[PATCH] vfs: use kstrdup() and check failing allocation
...
This commit is contained in:
@@ -211,8 +211,7 @@ static int cap_inode_follow_link(struct dentry *dentry,
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int cap_inode_permission(struct inode *inode, int mask,
|
||||
struct nameidata *nd)
|
||||
static int cap_inode_permission(struct inode *inode, int mask)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
+3
-2
@@ -429,11 +429,11 @@ int security_inode_follow_link(struct dentry *dentry, struct nameidata *nd)
|
||||
return security_ops->inode_follow_link(dentry, nd);
|
||||
}
|
||||
|
||||
int security_inode_permission(struct inode *inode, int mask, struct nameidata *nd)
|
||||
int security_inode_permission(struct inode *inode, int mask)
|
||||
{
|
||||
if (unlikely(IS_PRIVATE(inode)))
|
||||
return 0;
|
||||
return security_ops->inode_permission(inode, mask, nd);
|
||||
return security_ops->inode_permission(inode, mask);
|
||||
}
|
||||
|
||||
int security_inode_setattr(struct dentry *dentry, struct iattr *attr)
|
||||
@@ -442,6 +442,7 @@ int security_inode_setattr(struct dentry *dentry, struct iattr *attr)
|
||||
return 0;
|
||||
return security_ops->inode_setattr(dentry, attr);
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(security_inode_setattr);
|
||||
|
||||
int security_inode_getattr(struct vfsmount *mnt, struct dentry *dentry)
|
||||
{
|
||||
|
||||
@@ -2624,12 +2624,11 @@ static int selinux_inode_follow_link(struct dentry *dentry, struct nameidata *na
|
||||
return dentry_has_perm(current, NULL, dentry, FILE__READ);
|
||||
}
|
||||
|
||||
static int selinux_inode_permission(struct inode *inode, int mask,
|
||||
struct nameidata *nd)
|
||||
static int selinux_inode_permission(struct inode *inode, int mask)
|
||||
{
|
||||
int rc;
|
||||
|
||||
rc = secondary_ops->inode_permission(inode, mask, nd);
|
||||
rc = secondary_ops->inode_permission(inode, mask);
|
||||
if (rc)
|
||||
return rc;
|
||||
|
||||
|
||||
@@ -522,8 +522,7 @@ static int smack_inode_rename(struct inode *old_inode,
|
||||
*
|
||||
* Returns 0 if access is permitted, -EACCES otherwise
|
||||
*/
|
||||
static int smack_inode_permission(struct inode *inode, int mask,
|
||||
struct nameidata *nd)
|
||||
static int smack_inode_permission(struct inode *inode, int mask)
|
||||
{
|
||||
/*
|
||||
* No permission to check. Existence test. Yup, it's there.
|
||||
|
||||
Reference in New Issue
Block a user