Commit 29433a29 authored by Miklos Szeredi's avatar Miklos Szeredi

fuse: get rid of fc->flags

Only two flags: "default_permissions" and "allow_other".  All other flags
are handled via bitfields.  So convert these two as well.  They don't
change during the lifetime of the filesystem, so this is quite safe.
Signed-off-by: default avatarMiklos Szeredi <mszeredi@redhat.com>
parent bcb6f6d2
...@@ -1028,7 +1028,7 @@ int fuse_allow_current_process(struct fuse_conn *fc) ...@@ -1028,7 +1028,7 @@ int fuse_allow_current_process(struct fuse_conn *fc)
{ {
const struct cred *cred; const struct cred *cred;
if (fc->flags & FUSE_ALLOW_OTHER) if (fc->allow_other)
return 1; return 1;
cred = current_cred(); cred = current_cred();
...@@ -1104,7 +1104,7 @@ static int fuse_permission(struct inode *inode, int mask) ...@@ -1104,7 +1104,7 @@ static int fuse_permission(struct inode *inode, int mask)
/* /*
* If attributes are needed, refresh them before proceeding * If attributes are needed, refresh them before proceeding
*/ */
if ((fc->flags & FUSE_DEFAULT_PERMISSIONS) || if (fc->default_permissions ||
((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) { ((mask & MAY_EXEC) && S_ISREG(inode->i_mode))) {
struct fuse_inode *fi = get_fuse_inode(inode); struct fuse_inode *fi = get_fuse_inode(inode);
...@@ -1117,7 +1117,7 @@ static int fuse_permission(struct inode *inode, int mask) ...@@ -1117,7 +1117,7 @@ static int fuse_permission(struct inode *inode, int mask)
} }
} }
if (fc->flags & FUSE_DEFAULT_PERMISSIONS) { if (fc->default_permissions) {
err = generic_permission(inode, mask); err = generic_permission(inode, mask);
/* If permission is denied, try to refresh file /* If permission is denied, try to refresh file
...@@ -1618,7 +1618,7 @@ int fuse_do_setattr(struct inode *inode, struct iattr *attr, ...@@ -1618,7 +1618,7 @@ int fuse_do_setattr(struct inode *inode, struct iattr *attr,
int err; int err;
bool trust_local_cmtime = is_wb && S_ISREG(inode->i_mode); bool trust_local_cmtime = is_wb && S_ISREG(inode->i_mode);
if (!(fc->flags & FUSE_DEFAULT_PERMISSIONS)) if (!fc->default_permissions)
attr->ia_valid |= ATTR_FORCE; attr->ia_valid |= ATTR_FORCE;
err = inode_change_ok(inode, attr); err = inode_change_ok(inode, attr);
......
...@@ -37,15 +37,6 @@ ...@@ -37,15 +37,6 @@
/** Number of dentries for each connection in the control filesystem */ /** Number of dentries for each connection in the control filesystem */
#define FUSE_CTL_NUM_DENTRIES 5 #define FUSE_CTL_NUM_DENTRIES 5
/** If the FUSE_DEFAULT_PERMISSIONS flag is given, the filesystem
module will check permissions based on the file mode. Otherwise no
permission checking is done in the kernel */
#define FUSE_DEFAULT_PERMISSIONS (1 << 0)
/** If the FUSE_ALLOW_OTHER flag is given, then not only the user
doing the mount will be allowed to access the filesystem */
#define FUSE_ALLOW_OTHER (1 << 1)
/** Number of page pointers embedded in fuse_req */ /** Number of page pointers embedded in fuse_req */
#define FUSE_REQ_INLINE_PAGES 1 #define FUSE_REQ_INLINE_PAGES 1
...@@ -470,9 +461,6 @@ struct fuse_conn { ...@@ -470,9 +461,6 @@ struct fuse_conn {
/** The group id for this mount */ /** The group id for this mount */
kgid_t group_id; kgid_t group_id;
/** The fuse mount flags for this mount */
unsigned flags;
/** Maximum read size */ /** Maximum read size */
unsigned max_read; unsigned max_read;
...@@ -631,6 +619,12 @@ struct fuse_conn { ...@@ -631,6 +619,12 @@ struct fuse_conn {
/** Does the filesystem support posix acls? */ /** Does the filesystem support posix acls? */
unsigned posix_acl:1; unsigned posix_acl:1;
/** Check permissions based on the file mode or not? */
unsigned default_permissions:1;
/** Allow other than the mounter user to access the filesystem ? */
unsigned allow_other:1;
/** The number of requests waiting for completion */ /** The number of requests waiting for completion */
atomic_t num_waiting; atomic_t num_waiting;
......
...@@ -67,7 +67,8 @@ struct fuse_mount_data { ...@@ -67,7 +67,8 @@ struct fuse_mount_data {
unsigned rootmode_present:1; unsigned rootmode_present:1;
unsigned user_id_present:1; unsigned user_id_present:1;
unsigned group_id_present:1; unsigned group_id_present:1;
unsigned flags; unsigned default_permissions:1;
unsigned allow_other:1;
unsigned max_read; unsigned max_read;
unsigned blksize; unsigned blksize;
}; };
...@@ -193,7 +194,7 @@ void fuse_change_attributes_common(struct inode *inode, struct fuse_attr *attr, ...@@ -193,7 +194,7 @@ void fuse_change_attributes_common(struct inode *inode, struct fuse_attr *attr,
* check in may_delete(). * check in may_delete().
*/ */
fi->orig_i_mode = inode->i_mode; fi->orig_i_mode = inode->i_mode;
if (!(fc->flags & FUSE_DEFAULT_PERMISSIONS)) if (!fc->default_permissions)
inode->i_mode &= ~S_ISVTX; inode->i_mode &= ~S_ISVTX;
fi->orig_ino = attr->ino; fi->orig_ino = attr->ino;
...@@ -534,11 +535,11 @@ static int parse_fuse_opt(char *opt, struct fuse_mount_data *d, int is_bdev) ...@@ -534,11 +535,11 @@ static int parse_fuse_opt(char *opt, struct fuse_mount_data *d, int is_bdev)
break; break;
case OPT_DEFAULT_PERMISSIONS: case OPT_DEFAULT_PERMISSIONS:
d->flags |= FUSE_DEFAULT_PERMISSIONS; d->default_permissions = 1;
break; break;
case OPT_ALLOW_OTHER: case OPT_ALLOW_OTHER:
d->flags |= FUSE_ALLOW_OTHER; d->allow_other = 1;
break; break;
case OPT_MAX_READ: case OPT_MAX_READ:
...@@ -572,9 +573,9 @@ static int fuse_show_options(struct seq_file *m, struct dentry *root) ...@@ -572,9 +573,9 @@ static int fuse_show_options(struct seq_file *m, struct dentry *root)
seq_printf(m, ",user_id=%u", from_kuid_munged(&init_user_ns, fc->user_id)); seq_printf(m, ",user_id=%u", from_kuid_munged(&init_user_ns, fc->user_id));
seq_printf(m, ",group_id=%u", from_kgid_munged(&init_user_ns, fc->group_id)); seq_printf(m, ",group_id=%u", from_kgid_munged(&init_user_ns, fc->group_id));
if (fc->flags & FUSE_DEFAULT_PERMISSIONS) if (fc->default_permissions)
seq_puts(m, ",default_permissions"); seq_puts(m, ",default_permissions");
if (fc->flags & FUSE_ALLOW_OTHER) if (fc->allow_other)
seq_puts(m, ",allow_other"); seq_puts(m, ",allow_other");
if (fc->max_read != ~0) if (fc->max_read != ~0)
seq_printf(m, ",max_read=%u", fc->max_read); seq_printf(m, ",max_read=%u", fc->max_read);
...@@ -917,7 +918,7 @@ static void process_init_reply(struct fuse_conn *fc, struct fuse_req *req) ...@@ -917,7 +918,7 @@ static void process_init_reply(struct fuse_conn *fc, struct fuse_req *req)
if (arg->time_gran && arg->time_gran <= 1000000000) if (arg->time_gran && arg->time_gran <= 1000000000)
fc->sb->s_time_gran = arg->time_gran; fc->sb->s_time_gran = arg->time_gran;
if ((arg->flags & FUSE_POSIX_ACL)) { if ((arg->flags & FUSE_POSIX_ACL)) {
fc->flags |= FUSE_DEFAULT_PERMISSIONS; fc->default_permissions = 1;
fc->posix_acl = 1; fc->posix_acl = 1;
fc->sb->s_xattr = fuse_acl_xattr_handlers; fc->sb->s_xattr = fuse_acl_xattr_handlers;
} }
...@@ -1119,7 +1120,8 @@ static int fuse_fill_super(struct super_block *sb, void *data, int silent) ...@@ -1119,7 +1120,8 @@ static int fuse_fill_super(struct super_block *sb, void *data, int silent)
fc->dont_mask = 1; fc->dont_mask = 1;
sb->s_flags |= MS_POSIXACL; sb->s_flags |= MS_POSIXACL;
fc->flags = d.flags; fc->default_permissions = d.default_permissions;
fc->allow_other = d.allow_other;
fc->user_id = d.user_id; fc->user_id = d.user_id;
fc->group_id = d.group_id; fc->group_id = d.group_id;
fc->max_read = max_t(unsigned, 4096, d.max_read); fc->max_read = max_t(unsigned, 4096, d.max_read);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment