diff options
author | Al Viro <viro@zeniv.linux.org.uk> | 2011-06-18 20:42:00 -0400 |
---|---|---|
committer | Al Viro <viro@zeniv.linux.org.uk> | 2011-06-20 10:45:25 -0400 |
commit | 1aec7036d0c2996c86ce483ca0a28f3b20807b43 (patch) | |
tree | 718103f35e7882593ec9ad8994a6e004b3757381 | |
parent | 1d29b5a2ed7eb8862c9b66daf475f3e4c1a40299 (diff) | |
download | linux-1aec7036d0c2996c86ce483ca0a28f3b20807b43.tar.bz2 |
proc_sys_permission() is OK in RCU mode
nothing blocking there, since all instances of sysctl
->permissions() method are non-blocking - both of them,
that is.
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
-rw-r--r-- | fs/proc/proc_sysctl.c | 3 |
1 files changed, 0 insertions, 3 deletions
diff --git a/fs/proc/proc_sysctl.c b/fs/proc/proc_sysctl.c index f50133c11c24..d167de365a8d 100644 --- a/fs/proc/proc_sysctl.c +++ b/fs/proc/proc_sysctl.c @@ -304,9 +304,6 @@ static int proc_sys_permission(struct inode *inode, int mask,unsigned int flags) struct ctl_table *table; int error; - if (flags & IPERM_FLAG_RCU) - return -ECHILD; - /* Executable files are not allowed under /proc/sys/ */ if ((mask & MAY_EXEC) && S_ISREG(inode->i_mode)) return -EACCES; |