549c729771
Extend some inode methods with an additional user namespace argument. A filesystem that is aware of idmapped mounts will receive the user namespace the mount has been marked with. This can be used for additional permission checking and also to enable filesystems to translate between uids and gids if they need to. We have implemented all relevant helpers in earlier patches. As requested we simply extend the exisiting inode method instead of introducing new ones. This is a little more code churn but it's mostly mechanical and doesnt't leave us with additional inode methods. Link: https://lore.kernel.org/r/20210121131959.646623-25-christian.brauner@ubuntu.com Cc: Christoph Hellwig <hch@lst.de> Cc: David Howells <dhowells@redhat.com> Cc: Al Viro <viro@zeniv.linux.org.uk> Cc: linux-fsdevel@vger.kernel.org Reviewed-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
92 lines
2.6 KiB
C
92 lines
2.6 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
/*
|
|
* Coda File System, Linux Kernel module
|
|
*
|
|
* Original version, adapted from cfs_mach.c, (C) Carnegie Mellon University
|
|
* Linux modifications (C) 1996, Peter J. Braam
|
|
* Rewritten for Linux 2.1 (C) 1997 Carnegie Mellon University
|
|
*
|
|
* Carnegie Mellon University encourages users of this software to
|
|
* contribute improvements to the Coda project.
|
|
*/
|
|
|
|
#ifndef _LINUX_CODA_FS
|
|
#define _LINUX_CODA_FS
|
|
|
|
#ifdef pr_fmt
|
|
#undef pr_fmt
|
|
#endif
|
|
|
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
|
|
|
#include <linux/kernel.h>
|
|
#include <linux/param.h>
|
|
#include <linux/mm.h>
|
|
#include <linux/vmalloc.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/wait.h>
|
|
#include <linux/types.h>
|
|
#include <linux/fs.h>
|
|
#include "coda_fs_i.h"
|
|
|
|
/* operations */
|
|
extern const struct inode_operations coda_dir_inode_operations;
|
|
extern const struct inode_operations coda_file_inode_operations;
|
|
extern const struct inode_operations coda_ioctl_inode_operations;
|
|
|
|
extern const struct dentry_operations coda_dentry_operations;
|
|
|
|
extern const struct address_space_operations coda_file_aops;
|
|
extern const struct address_space_operations coda_symlink_aops;
|
|
|
|
extern const struct file_operations coda_dir_operations;
|
|
extern const struct file_operations coda_file_operations;
|
|
extern const struct file_operations coda_ioctl_operations;
|
|
|
|
/* operations shared over more than one file */
|
|
int coda_open(struct inode *i, struct file *f);
|
|
int coda_release(struct inode *i, struct file *f);
|
|
int coda_permission(struct user_namespace *mnt_userns, struct inode *inode,
|
|
int mask);
|
|
int coda_revalidate_inode(struct inode *);
|
|
int coda_getattr(struct user_namespace *, const struct path *, struct kstat *,
|
|
u32, unsigned int);
|
|
int coda_setattr(struct user_namespace *, struct dentry *, struct iattr *);
|
|
|
|
/* this file: heloers */
|
|
char *coda_f2s(struct CodaFid *f);
|
|
int coda_iscontrol(const char *name, size_t length);
|
|
|
|
void coda_vattr_to_iattr(struct inode *, struct coda_vattr *);
|
|
void coda_iattr_to_vattr(struct iattr *, struct coda_vattr *);
|
|
unsigned short coda_flags_to_cflags(unsigned short);
|
|
|
|
/* inode to cnode access functions */
|
|
|
|
static inline struct coda_inode_info *ITOC(struct inode *inode)
|
|
{
|
|
return container_of(inode, struct coda_inode_info, vfs_inode);
|
|
}
|
|
|
|
static __inline__ struct CodaFid *coda_i2f(struct inode *inode)
|
|
{
|
|
return &(ITOC(inode)->c_fid);
|
|
}
|
|
|
|
static __inline__ char *coda_i2s(struct inode *inode)
|
|
{
|
|
return coda_f2s(&(ITOC(inode)->c_fid));
|
|
}
|
|
|
|
/* this will not zap the inode away */
|
|
static __inline__ void coda_flag_inode(struct inode *inode, int flag)
|
|
{
|
|
struct coda_inode_info *cii = ITOC(inode);
|
|
|
|
spin_lock(&cii->c_lock);
|
|
cii->c_flags |= flag;
|
|
spin_unlock(&cii->c_lock);
|
|
}
|
|
|
|
#endif
|