diff options
author | Miklos Szeredi <mszeredi@suse.cz> | 2014-10-24 00:14:35 +0200 |
---|---|---|
committer | Miklos Szeredi <mszeredi@suse.cz> | 2014-10-24 00:14:35 +0200 |
commit | bd5d08569cc379f8366663a61558a9ce17c2e460 (patch) | |
tree | 8408b3137f09f09f0906bbd91d3f700f956341b5 /fs | |
parent | 1c118596a7682912106c80007102ce0184c77780 (diff) | |
download | op-kernel-dev-bd5d08569cc379f8366663a61558a9ce17c2e460.zip op-kernel-dev-bd5d08569cc379f8366663a61558a9ce17c2e460.tar.gz |
vfs: export __inode_permission() to modules
We need to be able to check inode permissions (but not filesystem implied
permissions) for stackable filesystems. Expose this interface for overlayfs.
Signed-off-by: Miklos Szeredi <mszeredi@suse.cz>
Diffstat (limited to 'fs')
-rw-r--r-- | fs/internal.h | 1 | ||||
-rw-r--r-- | fs/namei.c | 1 |
2 files changed, 1 insertions, 1 deletions
diff --git a/fs/internal.h b/fs/internal.h index 0f0626a..757ba2a 100644 --- a/fs/internal.h +++ b/fs/internal.h @@ -47,7 +47,6 @@ extern void __init chrdev_init(void); /* * namei.c */ -extern int __inode_permission(struct inode *, int); extern int user_path_mountpoint_at(int, const char __user *, unsigned int, struct path *); extern int vfs_path_lookup(struct dentry *, struct vfsmount *, const char *, unsigned int, struct path *); @@ -416,6 +416,7 @@ int __inode_permission(struct inode *inode, int mask) return security_inode_permission(inode, mask); } +EXPORT_SYMBOL(__inode_permission); /** * sb_permission - Check superblock-level permissions |