|
@@ -352,6 +352,7 @@ int __inode_permission(struct inode *inode, int mask)
|
|
|
/**
|
|
|
* sb_permission - Check superblock-level permissions
|
|
|
* @sb: Superblock of inode to check permission on
|
|
|
+ * @inode: Inode to check permission on
|
|
|
* @mask: Right to check for (%MAY_READ, %MAY_WRITE, %MAY_EXEC)
|
|
|
*
|
|
|
* Separate out file-system wide checks from inode-specific permission checks.
|
|
@@ -656,6 +657,7 @@ int sysctl_protected_hardlinks __read_mostly = 1;
|
|
|
/**
|
|
|
* may_follow_link - Check symlink following for unsafe situations
|
|
|
* @link: The path of the symlink
|
|
|
+ * @nd: nameidata pathwalk data
|
|
|
*
|
|
|
* In the case of the sysctl_protected_symlinks sysctl being enabled,
|
|
|
* CAP_DAC_OVERRIDE needs to be specifically ignored if the symlink is
|