diff options
| author | Christian Brauner <brauner@kernel.org> | 2025-07-03 09:36:41 +0200 |
|---|---|---|
| committer | Christian Brauner <brauner@kernel.org> | 2025-07-04 16:14:39 +0200 |
| commit | ca115d7e754691c0219eec95ec94dbac7f87daef (patch) | |
| tree | 4d9428ebd33b95fc42b9e280358ad757acd3b6d7 /security/security.c | |
| parent | 662416578541723a185278b7047d8b0112d3f600 (diff) | |
| download | bpf-next-ca115d7e754691c0219eec95ec94dbac7f87daef.tar.gz | |
tree-wide: s/struct fileattr/struct file_kattr/g
Now that we expose struct file_attr as our uapi struct rename all the
internal struct to struct file_kattr to clearly communicate that it is a
kernel internal struct. This is similar to struct mount_{k}attr and
others.
Link: https://lore.kernel.org/20250703-restlaufzeit-baurecht-9ed44552b481@brauner
Signed-off-by: Christian Brauner <brauner@kernel.org>
Diffstat (limited to 'security/security.c')
| -rw-r--r-- | security/security.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/security/security.c b/security/security.c index 711b4de40b8d36..a5766cbf6f7cc6 100644 --- a/security/security.c +++ b/security/security.c @@ -2632,7 +2632,7 @@ void security_inode_post_removexattr(struct dentry *dentry, const char *name) * * Return: Returns 0 if permission is granted. */ -int security_inode_file_setattr(struct dentry *dentry, struct fileattr *fa) +int security_inode_file_setattr(struct dentry *dentry, struct file_kattr *fa) { return call_int_hook(inode_file_setattr, dentry, fa); } @@ -2647,7 +2647,7 @@ int security_inode_file_setattr(struct dentry *dentry, struct fileattr *fa) * * Return: Returns 0 if permission is granted. */ -int security_inode_file_getattr(struct dentry *dentry, struct fileattr *fa) +int security_inode_file_getattr(struct dentry *dentry, struct file_kattr *fa) { return call_int_hook(inode_file_getattr, dentry, fa); } |
