Allow idmapped mounts for virtiofs.
It's absolutely safe as for virtiofs we have the same
feature negotiation mechanism as for classical fuse
filesystems. This does not affect any existing
setups anyhow.

virtiofsd support:
https://gitlab.com/virtio-fs/virtiofsd/-/merge_requests/245

Cc: Christian Brauner <[email protected]>
Cc: Seth Forshee <[email protected]>
Cc: Miklos Szeredi <[email protected]>
Cc: Vivek Goyal <[email protected]>
Cc: German Maglione <[email protected]>
Cc: Amir Goldstein <[email protected]>
Cc: Bernd Schubert <[email protected]>
Cc: <[email protected]>
Signed-off-by: Alexander Mikhalitsyn <[email protected]>
Reviewed-by: Christian Brauner <[email protected]>
---
v3:
        - this commit added
---
 fs/fuse/virtio_fs.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/fs/fuse/virtio_fs.c b/fs/fuse/virtio_fs.c
index dd5260141615..7e5bbaef6f76 100644
--- a/fs/fuse/virtio_fs.c
+++ b/fs/fuse/virtio_fs.c
@@ -1628,6 +1628,7 @@ static struct file_system_type virtio_fs_type = {
        .name           = "virtiofs",
        .init_fs_context = virtio_fs_init_fs_context,
        .kill_sb        = virtio_kill_sb,
+       .fs_flags       = FS_ALLOW_IDMAP,
 };
 
 static int virtio_fs_uevent(const struct kobject *kobj, struct kobj_uevent_env 
*env)
-- 
2.34.1


Reply via email to