Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp989163imm; Wed, 1 Aug 2018 08:26:10 -0700 (PDT) X-Google-Smtp-Source: AAOMgpc39ef0ZoG/f/+rHvHw0ZQEZ3cfFnDztgfiO/w0du1f9g6r3dUc+uzbeInB/wmI+92+zu1p X-Received: by 2002:a62:41d6:: with SMTP id g83-v6mr27085261pfd.219.1533137170394; Wed, 01 Aug 2018 08:26:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1533137170; cv=none; d=google.com; s=arc-20160816; b=M26G2aBDSXJvNmxBvToqfmh2fq6vuOPTpMTFz+u75mfWcIgPSDgfMqx4+rB2yUABrf P6r2EuzSd14ZTWWgHmX8KrkeDmJvghG0JAz2eX2sGSXXLAQEe/y4KN+DR9V5N9yVIrxN RHCB/HnXxYHBOjLjuHYGfjLVmjxuoTa3QJlc3IXury3FdtPQRntW1iPP588OJgq0vSjX eOEKUSipAdz7jlUDMzW0ZaUBgBTH2ItayepcG2JRLPI3SFjen5vrAEeGWSwTasNPAW/u qpaMdAClJsLvyj8+mWi/QzhdGmRcoSuBFlzRuX6fHLO160J4TUXqYKh/yMLmLMQxRyiK 67zw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject:organization:arc-authentication-results; bh=MLtzxc1jKoG7Z3cku1KpskbwsOKG0MpHCMbrV33VKyE=; b=CKiWJIif0wJZizH07vzG/gJ/HfVasc6a5TSOPCZkv5VbDxvOfwO4qG4YeoS+l4DeHQ PpFAD6L6s3BlNvZ8A87nHSFJnmgGOk62UN+aniDt3SwFK2peYBs5IzLP9IT37QTAbJCz 1l0xmN5afeQCOhXjG/lFZtpXWan80kL6S6DA6g1gyKqTPlBli1Tb+GtaNepaG+9mkrB4 eREXr7z5ws2g69alOGDm+tXt0zBzgj1UzTpF77yvqgtOIpUQ2ZAD0VNZKW5mdcvADp42 c+mPrc7fbAnCKxhvJJoZ72fWB0w/lZN+jWVYIVD1qNETN7TnlrjzypTNcnzx2kAOoI2I LY8w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z22-v6si15694407plo.219.2018.08.01.08.25.56; Wed, 01 Aug 2018 08:26:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389888AbeHARKx (ORCPT + 99 others); Wed, 1 Aug 2018 13:10:53 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:42612 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2389709AbeHARKw (ORCPT ); Wed, 1 Aug 2018 13:10:52 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 982994021704; Wed, 1 Aug 2018 15:24:38 +0000 (UTC) Received: from warthog.procyon.org.uk (ovpn-120-116.rdu2.redhat.com [10.10.120.116]) by smtp.corp.redhat.com (Postfix) with ESMTP id DACA31006EB9; Wed, 1 Aug 2018 15:24:37 +0000 (UTC) Organization: Red Hat UK Ltd. Registered Address: Red Hat UK Ltd, Amberley Place, 107-111 Peascod Street, Windsor, Berkshire, SI4 1TE, United Kingdom. Registered in England and Wales under Company Registration No. 3798903 Subject: [PATCH 05/33] vfs: Introduce the basic header for the new mount API's filesystem context [ver #11] From: David Howells To: viro@zeniv.linux.org.uk Cc: torvalds@linux-foundation.org, dhowells@redhat.com, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Date: Wed, 01 Aug 2018 16:24:37 +0100 Message-ID: <153313707740.13253.2158391084792921118.stgit@warthog.procyon.org.uk> In-Reply-To: <153313703562.13253.5766498657900728120.stgit@warthog.procyon.org.uk> References: <153313703562.13253.5766498657900728120.stgit@warthog.procyon.org.uk> User-Agent: StGit/unknown-version MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Wed, 01 Aug 2018 15:24:38 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Wed, 01 Aug 2018 15:24:38 +0000 (UTC) for IP:'10.11.54.3' DOMAIN:'int-mx03.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'dhowells@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Introduce a filesystem context concept to be used during superblock creation for mount and superblock reconfiguration for remount. This is allocated at the beginning of the mount procedure and into it is placed: (1) Filesystem type. (2) Namespaces. (3) Source/Device names (there may be multiple). (4) Superblock flags (SB_*). (5) Security details. (6) Filesystem-specific data, as set by the mount options. Also introduce a struct for typed key=value parameter concept with which configuration data will be passed to filesystems. This will allow not only for ordinary string values, but also make it possible to pass more exotic values such as binary blobs, paths and fds with greater ease. Signed-off-by: David Howells --- include/linux/fs_context.h | 101 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 101 insertions(+) create mode 100644 include/linux/fs_context.h diff --git a/include/linux/fs_context.h b/include/linux/fs_context.h new file mode 100644 index 000000000000..0ff4969f9d5a --- /dev/null +++ b/include/linux/fs_context.h @@ -0,0 +1,101 @@ +/* Filesystem superblock creation and reconfiguration context. + * + * Copyright (C) 2018 Red Hat, Inc. All Rights Reserved. + * Written by David Howells (dhowells@redhat.com) + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public Licence + * as published by the Free Software Foundation; either version + * 2 of the Licence, or (at your option) any later version. + */ + +#ifndef _LINUX_FS_CONTEXT_H +#define _LINUX_FS_CONTEXT_H + +#include +#include + +struct cred; +struct dentry; +struct file_operations; +struct file_system_type; +struct mnt_namespace; +struct net; +struct pid_namespace; +struct super_block; +struct user_namespace; +struct vfsmount; + +enum fs_context_purpose { + FS_CONTEXT_FOR_USER_MOUNT, /* New superblock for user-specified mount */ + FS_CONTEXT_FOR_KERNEL_MOUNT, /* New superblock for kernel-internal mount */ + FS_CONTEXT_FOR_SUBMOUNT, /* New superblock for automatic submount */ + FS_CONTEXT_FOR_RECONFIGURE, /* Superblock reconfiguration (remount) */ +}; + +/* + * Type of parameter value. + */ +enum fs_value_type { + fs_value_is_undefined, + fs_value_is_flag, /* Value not given a value */ + fs_value_is_string, /* Value is a string */ + fs_value_is_blob, /* Value is a binary blob */ + fs_value_is_filename, /* Value is a filename* + dirfd */ + fs_value_is_filename_empty, /* Value is a filename* + dirfd + AT_EMPTY_PATH */ + fs_value_is_file, /* Value is a file* */ +}; + +/* + * Configuration parameter. + */ +struct fs_parameter { + const char *key; /* Parameter name */ + enum fs_value_type type:8; /* The type of value here */ + union { + char *string; + void *blob; + struct filename *name; + struct file *file; + }; + size_t size; + int dirfd; +}; + +/* + * Filesystem context for holding the parameters used in the creation or + * reconfiguration of a superblock. + * + * Superblock creation fills in ->root whereas reconfiguration begins with this + * already set. + * + * See Documentation/filesystems/mounting.txt + */ +struct fs_context { + const struct fs_context_operations *ops; + struct file_system_type *fs_type; + void *fs_private; /* The filesystem's context */ + struct dentry *root; /* The root and superblock */ + struct user_namespace *user_ns; /* The user namespace for this mount */ + struct net *net_ns; /* The network namespace for this mount */ + const struct cred *cred; /* The mounter's credentials */ + char *source; /* The source name (eg. dev path) */ + char *subtype; /* The subtype to set on the superblock */ + void *security; /* The LSM context */ + void *s_fs_info; /* Proposed s_fs_info */ + unsigned int sb_flags; /* Proposed superblock flags (SB_*) */ + enum fs_context_purpose purpose:8; + bool sloppy:1; /* T if unrecognised options are okay */ + bool silent:1; /* T if "o silent" specified */ +}; + +struct fs_context_operations { + void (*free)(struct fs_context *fc); + int (*dup)(struct fs_context *fc, struct fs_context *src_fc); + int (*parse_param)(struct fs_context *fc, struct fs_parameter *param); + int (*parse_monolithic)(struct fs_context *fc, void *data, size_t data_size); + int (*validate)(struct fs_context *fc); + int (*get_tree)(struct fs_context *fc); +}; + +#endif /* _LINUX_FS_CONTEXT_H */