Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2218858imm; Tue, 10 Jul 2018 15:43:58 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdj3AnfyNZz1LQOctOJhXY2/mDEgJ4/0EJyh/La5qS1ERrEkF8kvlIV1nd01IZIJupFys1J X-Received: by 2002:a17:902:8306:: with SMTP id bd6-v6mr26614167plb.120.1531262638793; Tue, 10 Jul 2018 15:43:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531262638; cv=none; d=google.com; s=arc-20160816; b=iWOo1BXZDXPXvAElg1FiYCuAdt5UB7V68hltJ6jwKL/+RBvNw2OqmK3K9CMBEfZpn0 h+mVTfeIF5MScoJknZlgt60Q35/6folLOBxEk0J17mw8ZDf8HUHq/46hGDH9r+km1BQY a7z8wgFXnx+ukUqUJQ/ngJdOH+lFSOeiD3ztiys/hhl0l0hg0koxs6oEAMlfUw5vvpPR W6eRfgGLiP7SBV8unbrupZObmNgi7KjmDCXbhOxIB7b2Lt7LTqbFLIZcyvoRoP24h9yu EpStzksCNXmgeRWuygCHn+DWYJKTgZ6leECjMoV5jSLbGcCDaTDWPgMBWjqQsdCTkSpq jDtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject:organization:arc-authentication-results; bh=dwCh+ielkHHGurTiujDC3arPUVfTUKKbeKcIVdDUvPQ=; b=z0m4MDTjJl+qDHsxLA9sQWjPWFxc4UyR92hmaMQQhLQVFu3pMvtdWsYKsBS/6dodCw IV2wbz+bk4XP1rQUdSORWlX0zF2p5mFdg4Dy6FbuizOLb4R8zS+p9PPrcaieJbaqQV7u xGXrEJDumnwHnzwII1c6eV7wyzcpXeDWhvoXCIuAA1Gi4i5AcsVYkMB4x0zI/OgO+wFS ohuzq/8l+3/sE6KctWiJWnHlsYquPicsj/wd//yFgMFaTSBbVCHPu3hy0R1WAIM8Vhvr v7kPVaVAk5l0h7aJiSIXevcruVgRw0GbQKkMG4+NhgUC28lpcgTi0qEn3wDDnRwhmrxf nGJQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g26-v6si17168546pgl.49.2018.07.10.15.43.43; Tue, 10 Jul 2018 15:43:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732531AbeGJWnQ (ORCPT + 99 others); Tue, 10 Jul 2018 18:43:16 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:49966 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1732299AbeGJWnQ (ORCPT ); Tue, 10 Jul 2018 18:43:16 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id B79DB4075783; Tue, 10 Jul 2018 22:42:02 +0000 (UTC) Received: from warthog.procyon.org.uk (ovpn-120-149.rdu2.redhat.com [10.10.120.149]) by smtp.corp.redhat.com (Postfix) with ESMTP id 0C440111CD5D; Tue, 10 Jul 2018 22:42:01 +0000 (UTC) Organization: Red Hat UK Ltd. Registered Address: Red Hat UK Ltd, Amberley Place, 107-111 Peascod Street, Windsor, Berkshire, SI4 1TE, United Kingdom. Registered in England and Wales under Company Registration No. 3798903 Subject: [PATCH 05/32] vfs: Introduce the basic header for the new mount API's filesystem context [ver #9] From: David Howells To: viro@zeniv.linux.org.uk Cc: dhowells@redhat.com, linux-fsdevel@vger.kernel.org, torvalds@linux-foundation.org, linux-kernel@vger.kernel.org Date: Tue, 10 Jul 2018 23:42:01 +0100 Message-ID: <153126252158.14533.2724180709257877554.stgit@warthog.procyon.org.uk> In-Reply-To: <153126248868.14533.9751473662727327569.stgit@warthog.procyon.org.uk> References: <153126248868.14533.9751473662727327569.stgit@warthog.procyon.org.uk> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Tue, 10 Jul 2018 22:42:02 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Tue, 10 Jul 2018 22:42:02 +0000 (UTC) for IP:'10.11.54.3' DOMAIN:'int-mx03.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'dhowells@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Introduce a filesystem context concept to be used during superblock creation for mount and superblock reconfiguration for remount. This is allocated at the beginning of the mount procedure and into it is placed: (1) Filesystem type. (2) Namespaces. (3) Source/Device names (there may be multiple). (4) Superblock flags (SB_*). (5) Security details. (6) Filesystem-specific data, as set by the mount options. Signed-off-by: David Howells --- include/linux/fs_context.h | 73 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 73 insertions(+) create mode 100644 include/linux/fs_context.h diff --git a/include/linux/fs_context.h b/include/linux/fs_context.h new file mode 100644 index 000000000000..0bde0a2a782e --- /dev/null +++ b/include/linux/fs_context.h @@ -0,0 +1,73 @@ +/* Filesystem superblock creation and reconfiguration context. + * + * Copyright (C) 2018 Red Hat, Inc. All Rights Reserved. + * Written by David Howells (dhowells@redhat.com) + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public Licence + * as published by the Free Software Foundation; either version + * 2 of the Licence, or (at your option) any later version. + */ + +#ifndef _LINUX_FS_CONTEXT_H +#define _LINUX_FS_CONTEXT_H + +#include +#include + +struct cred; +struct dentry; +struct file_operations; +struct file_system_type; +struct mnt_namespace; +struct net; +struct pid_namespace; +struct super_block; +struct user_namespace; +struct vfsmount; + +enum fs_context_purpose { + FS_CONTEXT_FOR_USER_MOUNT, /* New superblock for user-specified mount */ + FS_CONTEXT_FOR_KERNEL_MOUNT, /* New superblock for kernel-internal mount */ + FS_CONTEXT_FOR_SUBMOUNT, /* New superblock for automatic submount */ + FS_CONTEXT_FOR_RECONFIGURE, /* Superblock reconfiguration (remount) */ +}; + +/* + * Filesystem context for holding the parameters used in the creation or + * reconfiguration of a superblock. + * + * Superblock creation fills in ->root whereas reconfiguration begins with this + * already set. + * + * See Documentation/filesystems/mounting.txt + */ +struct fs_context { + const struct fs_context_operations *ops; + struct file_system_type *fs_type; + void *fs_private; /* The filesystem's context */ + struct dentry *root; /* The root and superblock */ + struct user_namespace *user_ns; /* The user namespace for this mount */ + struct net *net_ns; /* The network namespace for this mount */ + const struct cred *cred; /* The mounter's credentials */ + char *source; /* The source name (eg. dev path) */ + char *subtype; /* The subtype to set on the superblock */ + void *security; /* The LSM context */ + void *s_fs_info; /* Proposed s_fs_info */ + unsigned int sb_flags; /* Proposed superblock flags (SB_*) */ + enum fs_context_purpose purpose:8; + bool sloppy:1; /* T if unrecognised options are okay */ + bool silent:1; /* T if "o silent" specified */ +}; + +struct fs_context_operations { + void (*free)(struct fs_context *fc); + int (*dup)(struct fs_context *fc, struct fs_context *src_fc); + int (*parse_source)(struct fs_context *fc, char *source); + int (*parse_option)(struct fs_context *fc, char *opt, size_t len); + int (*parse_monolithic)(struct fs_context *fc, void *data); + int (*validate)(struct fs_context *fc); + int (*get_tree)(struct fs_context *fc); +}; + +#endif /* _LINUX_FS_CONTEXT_H */