|  | // SPDX-License-Identifier: GPL-2.0 | 
|  | #include <linux/mount.h> | 
|  | #include <linux/pseudo_fs.h> | 
|  | #include <linux/file.h> | 
|  | #include <linux/fs.h> | 
|  | #include <linux/proc_fs.h> | 
|  | #include <linux/proc_ns.h> | 
|  | #include <linux/magic.h> | 
|  | #include <linux/ktime.h> | 
|  | #include <linux/seq_file.h> | 
|  | #include <linux/pid_namespace.h> | 
|  | #include <linux/user_namespace.h> | 
|  | #include <linux/nsfs.h> | 
|  | #include <linux/uaccess.h> | 
|  | #include <linux/mnt_namespace.h> | 
|  | #include <linux/ipc_namespace.h> | 
|  | #include <linux/time_namespace.h> | 
|  | #include <linux/utsname.h> | 
|  | #include <linux/exportfs.h> | 
|  | #include <linux/nstree.h> | 
|  | #include <net/net_namespace.h> | 
|  |  | 
|  | #include "mount.h" | 
|  | #include "internal.h" | 
|  |  | 
|  | static struct vfsmount *nsfs_mnt; | 
|  |  | 
|  | static struct path nsfs_root_path = {}; | 
|  |  | 
|  | void nsfs_get_root(struct path *path) | 
|  | { | 
|  | *path = nsfs_root_path; | 
|  | path_get(path); | 
|  | } | 
|  |  | 
|  | static long ns_ioctl(struct file *filp, unsigned int ioctl, | 
|  | unsigned long arg); | 
|  | static const struct file_operations ns_file_operations = { | 
|  | .unlocked_ioctl = ns_ioctl, | 
|  | .compat_ioctl   = compat_ptr_ioctl, | 
|  | }; | 
|  |  | 
|  | static char *ns_dname(struct dentry *dentry, char *buffer, int buflen) | 
|  | { | 
|  | struct inode *inode = d_inode(dentry); | 
|  | struct ns_common *ns = inode->i_private; | 
|  | const struct proc_ns_operations *ns_ops = ns->ops; | 
|  |  | 
|  | return dynamic_dname(buffer, buflen, "%s:[%lu]", | 
|  | ns_ops->name, inode->i_ino); | 
|  | } | 
|  |  | 
|  | const struct dentry_operations ns_dentry_operations = { | 
|  | .d_dname	= ns_dname, | 
|  | .d_prune	= stashed_dentry_prune, | 
|  | }; | 
|  |  | 
|  | static void nsfs_evict(struct inode *inode) | 
|  | { | 
|  | struct ns_common *ns = inode->i_private; | 
|  | clear_inode(inode); | 
|  | ns->ops->put(ns); | 
|  | } | 
|  |  | 
|  | int ns_get_path_cb(struct path *path, ns_get_path_helper_t *ns_get_cb, | 
|  | void *private_data) | 
|  | { | 
|  | struct ns_common *ns; | 
|  |  | 
|  | ns = ns_get_cb(private_data); | 
|  | if (!ns) | 
|  | return -ENOENT; | 
|  |  | 
|  | return path_from_stashed(&ns->stashed, nsfs_mnt, ns, path); | 
|  | } | 
|  |  | 
|  | struct ns_get_path_task_args { | 
|  | const struct proc_ns_operations *ns_ops; | 
|  | struct task_struct *task; | 
|  | }; | 
|  |  | 
|  | static struct ns_common *ns_get_path_task(void *private_data) | 
|  | { | 
|  | struct ns_get_path_task_args *args = private_data; | 
|  |  | 
|  | return args->ns_ops->get(args->task); | 
|  | } | 
|  |  | 
|  | int ns_get_path(struct path *path, struct task_struct *task, | 
|  | const struct proc_ns_operations *ns_ops) | 
|  | { | 
|  | struct ns_get_path_task_args args = { | 
|  | .ns_ops	= ns_ops, | 
|  | .task	= task, | 
|  | }; | 
|  |  | 
|  | return ns_get_path_cb(path, ns_get_path_task, &args); | 
|  | } | 
|  |  | 
|  | /** | 
|  | * open_namespace - open a namespace | 
|  | * @ns: the namespace to open | 
|  | * | 
|  | * This will consume a reference to @ns indendent of success or failure. | 
|  | * | 
|  | * Return: A file descriptor on success or a negative error code on failure. | 
|  | */ | 
|  | int open_namespace(struct ns_common *ns) | 
|  | { | 
|  | struct path path __free(path_put) = {}; | 
|  | struct file *f; | 
|  | int err; | 
|  |  | 
|  | /* call first to consume reference */ | 
|  | err = path_from_stashed(&ns->stashed, nsfs_mnt, ns, &path); | 
|  | if (err < 0) | 
|  | return err; | 
|  |  | 
|  | CLASS(get_unused_fd, fd)(O_CLOEXEC); | 
|  | if (fd < 0) | 
|  | return fd; | 
|  |  | 
|  | f = dentry_open(&path, O_RDONLY, current_cred()); | 
|  | if (IS_ERR(f)) | 
|  | return PTR_ERR(f); | 
|  |  | 
|  | fd_install(fd, f); | 
|  | return take_fd(fd); | 
|  | } | 
|  |  | 
|  | int open_related_ns(struct ns_common *ns, | 
|  | struct ns_common *(*get_ns)(struct ns_common *ns)) | 
|  | { | 
|  | struct ns_common *relative; | 
|  |  | 
|  | relative = get_ns(ns); | 
|  | if (IS_ERR(relative)) | 
|  | return PTR_ERR(relative); | 
|  |  | 
|  | return open_namespace(relative); | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(open_related_ns); | 
|  |  | 
|  | static int copy_ns_info_to_user(const struct mnt_namespace *mnt_ns, | 
|  | struct mnt_ns_info __user *uinfo, size_t usize, | 
|  | struct mnt_ns_info *kinfo) | 
|  | { | 
|  | /* | 
|  | * If userspace and the kernel have the same struct size it can just | 
|  | * be copied. If userspace provides an older struct, only the bits that | 
|  | * userspace knows about will be copied. If userspace provides a new | 
|  | * struct, only the bits that the kernel knows aobut will be copied and | 
|  | * the size value will be set to the size the kernel knows about. | 
|  | */ | 
|  | kinfo->size		= min(usize, sizeof(*kinfo)); | 
|  | kinfo->mnt_ns_id	= mnt_ns->ns.ns_id; | 
|  | kinfo->nr_mounts	= READ_ONCE(mnt_ns->nr_mounts); | 
|  | /* Subtract the root mount of the mount namespace. */ | 
|  | if (kinfo->nr_mounts) | 
|  | kinfo->nr_mounts--; | 
|  |  | 
|  | if (copy_to_user(uinfo, kinfo, kinfo->size)) | 
|  | return -EFAULT; | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static bool nsfs_ioctl_valid(unsigned int cmd) | 
|  | { | 
|  | switch (cmd) { | 
|  | case NS_GET_USERNS: | 
|  | case NS_GET_PARENT: | 
|  | case NS_GET_NSTYPE: | 
|  | case NS_GET_OWNER_UID: | 
|  | case NS_GET_MNTNS_ID: | 
|  | case NS_GET_PID_FROM_PIDNS: | 
|  | case NS_GET_TGID_FROM_PIDNS: | 
|  | case NS_GET_PID_IN_PIDNS: | 
|  | case NS_GET_TGID_IN_PIDNS: | 
|  | case NS_GET_ID: | 
|  | return true; | 
|  | } | 
|  |  | 
|  | /* Extensible ioctls require some extra handling. */ | 
|  | switch (_IOC_NR(cmd)) { | 
|  | case _IOC_NR(NS_MNT_GET_INFO): | 
|  | return extensible_ioctl_valid(cmd, NS_MNT_GET_INFO, MNT_NS_INFO_SIZE_VER0); | 
|  | case _IOC_NR(NS_MNT_GET_NEXT): | 
|  | return extensible_ioctl_valid(cmd, NS_MNT_GET_NEXT, MNT_NS_INFO_SIZE_VER0); | 
|  | case _IOC_NR(NS_MNT_GET_PREV): | 
|  | return extensible_ioctl_valid(cmd, NS_MNT_GET_PREV, MNT_NS_INFO_SIZE_VER0); | 
|  | } | 
|  |  | 
|  | return false; | 
|  | } | 
|  |  | 
|  | static long ns_ioctl(struct file *filp, unsigned int ioctl, | 
|  | unsigned long arg) | 
|  | { | 
|  | struct user_namespace *user_ns; | 
|  | struct pid_namespace *pid_ns; | 
|  | struct task_struct *tsk; | 
|  | struct ns_common *ns; | 
|  | struct mnt_namespace *mnt_ns; | 
|  | bool previous = false; | 
|  | uid_t __user *argp; | 
|  | uid_t uid; | 
|  | int ret; | 
|  |  | 
|  | if (!nsfs_ioctl_valid(ioctl)) | 
|  | return -ENOIOCTLCMD; | 
|  |  | 
|  | ns = get_proc_ns(file_inode(filp)); | 
|  | switch (ioctl) { | 
|  | case NS_GET_USERNS: | 
|  | return open_related_ns(ns, ns_get_owner); | 
|  | case NS_GET_PARENT: | 
|  | if (!ns->ops->get_parent) | 
|  | return -EINVAL; | 
|  | return open_related_ns(ns, ns->ops->get_parent); | 
|  | case NS_GET_NSTYPE: | 
|  | return ns->ns_type; | 
|  | case NS_GET_OWNER_UID: | 
|  | if (ns->ns_type != CLONE_NEWUSER) | 
|  | return -EINVAL; | 
|  | user_ns = container_of(ns, struct user_namespace, ns); | 
|  | argp = (uid_t __user *) arg; | 
|  | uid = from_kuid_munged(current_user_ns(), user_ns->owner); | 
|  | return put_user(uid, argp); | 
|  | case NS_GET_PID_FROM_PIDNS: | 
|  | fallthrough; | 
|  | case NS_GET_TGID_FROM_PIDNS: | 
|  | fallthrough; | 
|  | case NS_GET_PID_IN_PIDNS: | 
|  | fallthrough; | 
|  | case NS_GET_TGID_IN_PIDNS: { | 
|  | if (ns->ns_type != CLONE_NEWPID) | 
|  | return -EINVAL; | 
|  |  | 
|  | ret = -ESRCH; | 
|  | pid_ns = container_of(ns, struct pid_namespace, ns); | 
|  |  | 
|  | guard(rcu)(); | 
|  |  | 
|  | if (ioctl == NS_GET_PID_IN_PIDNS || | 
|  | ioctl == NS_GET_TGID_IN_PIDNS) | 
|  | tsk = find_task_by_vpid(arg); | 
|  | else | 
|  | tsk = find_task_by_pid_ns(arg, pid_ns); | 
|  | if (!tsk) | 
|  | break; | 
|  |  | 
|  | switch (ioctl) { | 
|  | case NS_GET_PID_FROM_PIDNS: | 
|  | ret = task_pid_vnr(tsk); | 
|  | break; | 
|  | case NS_GET_TGID_FROM_PIDNS: | 
|  | ret = task_tgid_vnr(tsk); | 
|  | break; | 
|  | case NS_GET_PID_IN_PIDNS: | 
|  | ret = task_pid_nr_ns(tsk, pid_ns); | 
|  | break; | 
|  | case NS_GET_TGID_IN_PIDNS: | 
|  | ret = task_tgid_nr_ns(tsk, pid_ns); | 
|  | break; | 
|  | default: | 
|  | ret = 0; | 
|  | break; | 
|  | } | 
|  |  | 
|  | if (!ret) | 
|  | ret = -ESRCH; | 
|  | return ret; | 
|  | } | 
|  | case NS_GET_MNTNS_ID: | 
|  | if (ns->ns_type != CLONE_NEWNS) | 
|  | return -EINVAL; | 
|  | fallthrough; | 
|  | case NS_GET_ID: { | 
|  | __u64 __user *idp; | 
|  | __u64 id; | 
|  |  | 
|  | idp = (__u64 __user *)arg; | 
|  | id = ns->ns_id; | 
|  | return put_user(id, idp); | 
|  | } | 
|  | } | 
|  |  | 
|  | /* extensible ioctls */ | 
|  | switch (_IOC_NR(ioctl)) { | 
|  | case _IOC_NR(NS_MNT_GET_INFO): { | 
|  | struct mnt_ns_info kinfo = {}; | 
|  | struct mnt_ns_info __user *uinfo = (struct mnt_ns_info __user *)arg; | 
|  | size_t usize = _IOC_SIZE(ioctl); | 
|  |  | 
|  | if (ns->ns_type != CLONE_NEWNS) | 
|  | return -EINVAL; | 
|  |  | 
|  | if (!uinfo) | 
|  | return -EINVAL; | 
|  |  | 
|  | if (usize < MNT_NS_INFO_SIZE_VER0) | 
|  | return -EINVAL; | 
|  |  | 
|  | return copy_ns_info_to_user(to_mnt_ns(ns), uinfo, usize, &kinfo); | 
|  | } | 
|  | case _IOC_NR(NS_MNT_GET_PREV): | 
|  | previous = true; | 
|  | fallthrough; | 
|  | case _IOC_NR(NS_MNT_GET_NEXT): { | 
|  | struct mnt_ns_info kinfo = {}; | 
|  | struct mnt_ns_info __user *uinfo = (struct mnt_ns_info __user *)arg; | 
|  | struct path path __free(path_put) = {}; | 
|  | struct file *f __free(fput) = NULL; | 
|  | size_t usize = _IOC_SIZE(ioctl); | 
|  |  | 
|  | if (ns->ns_type != CLONE_NEWNS) | 
|  | return -EINVAL; | 
|  |  | 
|  | if (usize < MNT_NS_INFO_SIZE_VER0) | 
|  | return -EINVAL; | 
|  |  | 
|  | mnt_ns = get_sequential_mnt_ns(to_mnt_ns(ns), previous); | 
|  | if (IS_ERR(mnt_ns)) | 
|  | return PTR_ERR(mnt_ns); | 
|  |  | 
|  | ns = to_ns_common(mnt_ns); | 
|  | /* Transfer ownership of @mnt_ns reference to @path. */ | 
|  | ret = path_from_stashed(&ns->stashed, nsfs_mnt, ns, &path); | 
|  | if (ret) | 
|  | return ret; | 
|  |  | 
|  | CLASS(get_unused_fd, fd)(O_CLOEXEC); | 
|  | if (fd < 0) | 
|  | return fd; | 
|  |  | 
|  | f = dentry_open(&path, O_RDONLY, current_cred()); | 
|  | if (IS_ERR(f)) | 
|  | return PTR_ERR(f); | 
|  |  | 
|  | if (uinfo) { | 
|  | /* | 
|  | * If @uinfo is passed return all information about the | 
|  | * mount namespace as well. | 
|  | */ | 
|  | ret = copy_ns_info_to_user(to_mnt_ns(ns), uinfo, usize, &kinfo); | 
|  | if (ret) | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /* Transfer reference of @f to caller's fdtable. */ | 
|  | fd_install(fd, no_free_ptr(f)); | 
|  | /* File descriptor is live so hand it off to the caller. */ | 
|  | return take_fd(fd); | 
|  | } | 
|  | default: | 
|  | ret = -ENOTTY; | 
|  | } | 
|  |  | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | int ns_get_name(char *buf, size_t size, struct task_struct *task, | 
|  | const struct proc_ns_operations *ns_ops) | 
|  | { | 
|  | struct ns_common *ns; | 
|  | int res = -ENOENT; | 
|  | const char *name; | 
|  | ns = ns_ops->get(task); | 
|  | if (ns) { | 
|  | name = ns_ops->real_ns_name ? : ns_ops->name; | 
|  | res = snprintf(buf, size, "%s:[%u]", name, ns->inum); | 
|  | ns_ops->put(ns); | 
|  | } | 
|  | return res; | 
|  | } | 
|  |  | 
|  | bool proc_ns_file(const struct file *file) | 
|  | { | 
|  | return file->f_op == &ns_file_operations; | 
|  | } | 
|  |  | 
|  | /** | 
|  | * ns_match() - Returns true if current namespace matches dev/ino provided. | 
|  | * @ns: current namespace | 
|  | * @dev: dev_t from nsfs that will be matched against current nsfs | 
|  | * @ino: ino_t from nsfs that will be matched against current nsfs | 
|  | * | 
|  | * Return: true if dev and ino matches the current nsfs. | 
|  | */ | 
|  | bool ns_match(const struct ns_common *ns, dev_t dev, ino_t ino) | 
|  | { | 
|  | return (ns->inum == ino) && (nsfs_mnt->mnt_sb->s_dev == dev); | 
|  | } | 
|  |  | 
|  |  | 
|  | static int nsfs_show_path(struct seq_file *seq, struct dentry *dentry) | 
|  | { | 
|  | struct inode *inode = d_inode(dentry); | 
|  | const struct ns_common *ns = inode->i_private; | 
|  | const struct proc_ns_operations *ns_ops = ns->ops; | 
|  |  | 
|  | seq_printf(seq, "%s:[%lu]", ns_ops->name, inode->i_ino); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static const struct super_operations nsfs_ops = { | 
|  | .statfs = simple_statfs, | 
|  | .evict_inode = nsfs_evict, | 
|  | .show_path = nsfs_show_path, | 
|  | }; | 
|  |  | 
|  | static int nsfs_init_inode(struct inode *inode, void *data) | 
|  | { | 
|  | struct ns_common *ns = data; | 
|  |  | 
|  | inode->i_private = data; | 
|  | inode->i_mode |= S_IRUGO; | 
|  | inode->i_fop = &ns_file_operations; | 
|  | inode->i_ino = ns->inum; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static void nsfs_put_data(void *data) | 
|  | { | 
|  | struct ns_common *ns = data; | 
|  | ns->ops->put(ns); | 
|  | } | 
|  |  | 
|  | static const struct stashed_operations nsfs_stashed_ops = { | 
|  | .init_inode = nsfs_init_inode, | 
|  | .put_data = nsfs_put_data, | 
|  | }; | 
|  |  | 
|  | #define NSFS_FID_SIZE_U32_VER0 (NSFS_FILE_HANDLE_SIZE_VER0 / sizeof(u32)) | 
|  | #define NSFS_FID_SIZE_U32_LATEST (NSFS_FILE_HANDLE_SIZE_LATEST / sizeof(u32)) | 
|  |  | 
|  | static int nsfs_encode_fh(struct inode *inode, u32 *fh, int *max_len, | 
|  | struct inode *parent) | 
|  | { | 
|  | struct nsfs_file_handle *fid = (struct nsfs_file_handle *)fh; | 
|  | struct ns_common *ns = inode->i_private; | 
|  | int len = *max_len; | 
|  |  | 
|  | if (parent) | 
|  | return FILEID_INVALID; | 
|  |  | 
|  | if (len < NSFS_FID_SIZE_U32_VER0) { | 
|  | *max_len = NSFS_FID_SIZE_U32_LATEST; | 
|  | return FILEID_INVALID; | 
|  | } else if (len > NSFS_FID_SIZE_U32_LATEST) { | 
|  | *max_len = NSFS_FID_SIZE_U32_LATEST; | 
|  | } | 
|  |  | 
|  | fid->ns_id	= ns->ns_id; | 
|  | fid->ns_type	= ns->ns_type; | 
|  | fid->ns_inum	= inode->i_ino; | 
|  | return FILEID_NSFS; | 
|  | } | 
|  |  | 
|  | static struct dentry *nsfs_fh_to_dentry(struct super_block *sb, struct fid *fh, | 
|  | int fh_len, int fh_type) | 
|  | { | 
|  | struct path path __free(path_put) = {}; | 
|  | struct nsfs_file_handle *fid = (struct nsfs_file_handle *)fh; | 
|  | struct user_namespace *owning_ns = NULL; | 
|  | struct ns_common *ns; | 
|  | int ret; | 
|  |  | 
|  | if (fh_len < NSFS_FID_SIZE_U32_VER0) | 
|  | return NULL; | 
|  |  | 
|  | /* Check that any trailing bytes are zero. */ | 
|  | if ((fh_len > NSFS_FID_SIZE_U32_LATEST) && | 
|  | memchr_inv((void *)fid + NSFS_FID_SIZE_U32_LATEST, 0, | 
|  | fh_len - NSFS_FID_SIZE_U32_LATEST)) | 
|  | return NULL; | 
|  |  | 
|  | switch (fh_type) { | 
|  | case FILEID_NSFS: | 
|  | break; | 
|  | default: | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | scoped_guard(rcu) { | 
|  | ns = ns_tree_lookup_rcu(fid->ns_id, fid->ns_type); | 
|  | if (!ns) | 
|  | return NULL; | 
|  |  | 
|  | VFS_WARN_ON_ONCE(ns->ns_id != fid->ns_id); | 
|  | VFS_WARN_ON_ONCE(ns->ns_type != fid->ns_type); | 
|  |  | 
|  | if (ns->inum != fid->ns_inum) | 
|  | return NULL; | 
|  |  | 
|  | if (!__ns_ref_get(ns)) | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | switch (ns->ns_type) { | 
|  | #ifdef CONFIG_CGROUPS | 
|  | case CLONE_NEWCGROUP: | 
|  | if (!current_in_namespace(to_cg_ns(ns))) | 
|  | owning_ns = to_cg_ns(ns)->user_ns; | 
|  | break; | 
|  | #endif | 
|  | #ifdef CONFIG_IPC_NS | 
|  | case CLONE_NEWIPC: | 
|  | if (!current_in_namespace(to_ipc_ns(ns))) | 
|  | owning_ns = to_ipc_ns(ns)->user_ns; | 
|  | break; | 
|  | #endif | 
|  | case CLONE_NEWNS: | 
|  | if (!current_in_namespace(to_mnt_ns(ns))) | 
|  | owning_ns = to_mnt_ns(ns)->user_ns; | 
|  | break; | 
|  | #ifdef CONFIG_NET_NS | 
|  | case CLONE_NEWNET: | 
|  | if (!current_in_namespace(to_net_ns(ns))) | 
|  | owning_ns = to_net_ns(ns)->user_ns; | 
|  | break; | 
|  | #endif | 
|  | #ifdef CONFIG_PID_NS | 
|  | case CLONE_NEWPID: | 
|  | if (!current_in_namespace(to_pid_ns(ns))) { | 
|  | owning_ns = to_pid_ns(ns)->user_ns; | 
|  | } else if (!READ_ONCE(to_pid_ns(ns)->child_reaper)) { | 
|  | ns->ops->put(ns); | 
|  | return ERR_PTR(-EPERM); | 
|  | } | 
|  | break; | 
|  | #endif | 
|  | #ifdef CONFIG_TIME_NS | 
|  | case CLONE_NEWTIME: | 
|  | if (!current_in_namespace(to_time_ns(ns))) | 
|  | owning_ns = to_time_ns(ns)->user_ns; | 
|  | break; | 
|  | #endif | 
|  | #ifdef CONFIG_USER_NS | 
|  | case CLONE_NEWUSER: | 
|  | if (!current_in_namespace(to_user_ns(ns))) | 
|  | owning_ns = to_user_ns(ns); | 
|  | break; | 
|  | #endif | 
|  | #ifdef CONFIG_UTS_NS | 
|  | case CLONE_NEWUTS: | 
|  | if (!current_in_namespace(to_uts_ns(ns))) | 
|  | owning_ns = to_uts_ns(ns)->user_ns; | 
|  | break; | 
|  | #endif | 
|  | default: | 
|  | return ERR_PTR(-EOPNOTSUPP); | 
|  | } | 
|  |  | 
|  | if (owning_ns && !ns_capable(owning_ns, CAP_SYS_ADMIN)) { | 
|  | ns->ops->put(ns); | 
|  | return ERR_PTR(-EPERM); | 
|  | } | 
|  |  | 
|  | /* path_from_stashed() unconditionally consumes the reference. */ | 
|  | ret = path_from_stashed(&ns->stashed, nsfs_mnt, ns, &path); | 
|  | if (ret) | 
|  | return ERR_PTR(ret); | 
|  |  | 
|  | return no_free_ptr(path.dentry); | 
|  | } | 
|  |  | 
|  | static int nsfs_export_permission(struct handle_to_path_ctx *ctx, | 
|  | unsigned int oflags) | 
|  | { | 
|  | /* nsfs_fh_to_dentry() performs all permission checks. */ | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static struct file *nsfs_export_open(const struct path *path, unsigned int oflags) | 
|  | { | 
|  | return file_open_root(path, "", oflags, 0); | 
|  | } | 
|  |  | 
|  | static const struct export_operations nsfs_export_operations = { | 
|  | .encode_fh	= nsfs_encode_fh, | 
|  | .fh_to_dentry	= nsfs_fh_to_dentry, | 
|  | .open		= nsfs_export_open, | 
|  | .permission	= nsfs_export_permission, | 
|  | }; | 
|  |  | 
|  | static int nsfs_init_fs_context(struct fs_context *fc) | 
|  | { | 
|  | struct pseudo_fs_context *ctx = init_pseudo(fc, NSFS_MAGIC); | 
|  | if (!ctx) | 
|  | return -ENOMEM; | 
|  | ctx->ops = &nsfs_ops; | 
|  | ctx->eops = &nsfs_export_operations; | 
|  | ctx->dops = &ns_dentry_operations; | 
|  | fc->s_fs_info = (void *)&nsfs_stashed_ops; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static struct file_system_type nsfs = { | 
|  | .name = "nsfs", | 
|  | .init_fs_context = nsfs_init_fs_context, | 
|  | .kill_sb = kill_anon_super, | 
|  | }; | 
|  |  | 
|  | void __init nsfs_init(void) | 
|  | { | 
|  | nsfs_mnt = kern_mount(&nsfs); | 
|  | if (IS_ERR(nsfs_mnt)) | 
|  | panic("can't set nsfs up\n"); | 
|  | nsfs_mnt->mnt_sb->s_flags &= ~SB_NOUSER; | 
|  | nsfs_root_path.mnt = nsfs_mnt; | 
|  | nsfs_root_path.dentry = nsfs_mnt->mnt_root; | 
|  | } |