Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1120410imm; Wed, 18 Jul 2018 17:24:56 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdYI/LgNRwS5gZhPBDt91V8pPhNzg9mjESJRKlYkQeWhLKfY+EhB6NHn6lT6M9I4Xnufny3 X-Received: by 2002:a17:902:8f86:: with SMTP id z6-v6mr7920023plo.38.1531959896354; Wed, 18 Jul 2018 17:24:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531959896; cv=none; d=google.com; s=arc-20160816; b=umaEMBACmm7V8ZvLQF2DS227xvTgmvI+9j96v/2fkpP0SgcUWmyI3wLAuskk1FLkeO oG89smhDkp03F0pjDu9ktLfBxSBHpgvHIon0s7exsadZfGOkCMnVR5c5+msU6iwXwY/4 EWyJ8U977ZcfJMoCm30WR8FVUDhVo2Sz58eTDFkjItJFhbIgU/XdIi0pw6tM6MT2LLJI wd3BCTmVVMzEt8HPPgjRqsPyVPj8uKNTtA6xwIY8P0vQ8dK8eYBDl4jOmvH2tbb4HERL OHnbWKnVTzoDXJ0oSVCzAt4By43t5hvmddLMTMDUxAWIOSNsxRBP3VH2sBB/irkqZJse 7CGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=DRTAcY52+UlGRnU6lEHA78OP+hu/eaorOcljvUURkFo=; b=e4MMO6CIExOs3k6qw7C9H53NL8Qub0q/YssE/ART8ekqBsWMQdrn96hFfsUii+lD8a 80mLkXRU1qxUgbuVDiwsKKxR+XnylgDDMUlSxItsCL9GjtZdl4oJQomeoEhETSP+3fE/ h+0rMFVjl5j4JT0TYhZJnaKb876n8L9w3ojXuz5toqLA/AMMMFStROI1P92KQg0tiQUY p5xx/7sIFrBvga/Anb4VJh5O5rDSG7wgIPcfnSE96Gpe/kwKQpSKmUknn2GKDDK5+z51 xcndIrIMCoMuZipIWS3xVdAXcdxs2rMd3VprcZ/2HwO5NMu5Xp7ElvDDk0FUKyk//1LY v1NQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f9-v6si4111080plo.206.2018.07.18.17.24.41; Wed, 18 Jul 2018 17:24:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730288AbeGSBEb (ORCPT + 99 others); Wed, 18 Jul 2018 21:04:31 -0400 Received: from lgeamrelo13.lge.com ([156.147.23.53]:49460 "EHLO lgeamrelo11.lge.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727009AbeGSBEa (ORCPT ); Wed, 18 Jul 2018 21:04:30 -0400 Received: from unknown (HELO lgemrelse6q.lge.com) (156.147.1.121) by 156.147.23.53 with ESMTP; 19 Jul 2018 09:24:04 +0900 X-Original-SENDERIP: 156.147.1.121 X-Original-MAILFROM: hyc.lee@gmail.com Received: from unknown (HELO localhost.localdomain) (10.177.225.35) by 156.147.1.121 with ESMTP; 19 Jul 2018 09:24:04 +0900 X-Original-SENDERIP: 10.177.225.35 X-Original-MAILFROM: hyc.lee@gmail.com From: Hyunchul Lee To: Jaegeuk Kim , Chao Yu Cc: linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org, kernel-team@lge.com, Hyunchul Lee Subject: [PATCH] f2fs: avoid duplicated permission check for "trusted." xattrs Date: Thu, 19 Jul 2018 09:23:57 +0900 Message-Id: <20180719002357.9882-1-hyc.lee@gmail.com> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Hyunchul Lee Because xattr_permission already checks CAP_SYS_ADMIN capability, we don't need to check it. Signed-off-by: Hyunchul Lee --- fs/f2fs/xattr.c | 6 ------ 1 file changed, 6 deletions(-) diff --git a/fs/f2fs/xattr.c b/fs/f2fs/xattr.c index 708271871f94..4b34244dcc69 100644 --- a/fs/f2fs/xattr.c +++ b/fs/f2fs/xattr.c @@ -37,9 +37,6 @@ static int f2fs_xattr_generic_get(const struct xattr_handler *handler, return -EOPNOTSUPP; break; case F2FS_XATTR_INDEX_TRUSTED: - if (!capable(CAP_SYS_ADMIN)) - return -EPERM; - break; case F2FS_XATTR_INDEX_SECURITY: break; default: @@ -62,9 +59,6 @@ static int f2fs_xattr_generic_set(const struct xattr_handler *handler, return -EOPNOTSUPP; break; case F2FS_XATTR_INDEX_TRUSTED: - if (!capable(CAP_SYS_ADMIN)) - return -EPERM; - break; case F2FS_XATTR_INDEX_SECURITY: break; default: -- 2.17.1