cmd/sharefs: opaque setup state
All checks were successful
Test / Create distribution (push) Successful in 43s
Test / Sandbox (push) Successful in 2m25s
Test / Hakurei (push) Successful in 3m29s
Test / ShareFS (push) Successful in 3m29s
Test / Hpkg (push) Successful in 4m25s
Test / Sandbox (race detector) (push) Successful in 4m35s
Test / Hakurei (race detector) (push) Successful in 5m37s
Test / Flake checks (push) Successful in 1m46s
All checks were successful
Test / Create distribution (push) Successful in 43s
Test / Sandbox (push) Successful in 2m25s
Test / Hakurei (push) Successful in 3m29s
Test / ShareFS (push) Successful in 3m29s
Test / Hpkg (push) Successful in 4m25s
Test / Sandbox (race detector) (push) Successful in 4m35s
Test / Hakurei (race detector) (push) Successful in 5m37s
Test / Flake checks (push) Successful in 1m46s
This allows unrestricted use of the type system and prepares setup code for cross-process initialisation. Signed-off-by: Ophestra <cat@gensokyo.uk>
This commit is contained in:
@@ -13,11 +13,8 @@
|
||||
|
||||
/* sharefs_private is populated by sharefs_init and contains process-wide context */
|
||||
struct sharefs_private {
|
||||
int dirfd; /* source dirfd opened during sharefs_init */
|
||||
bool init_failed; /* whether sharefs_init failed */
|
||||
uintptr_t source_handle; /* cgo handle of pathname to open for dirfd, freed during sharefs_init */
|
||||
uintptr_t setuid; /* uid to set by sharefs_init when running as root */
|
||||
uintptr_t setgid; /* gid to set by sharefs_init when running as root */
|
||||
int dirfd; /* source dirfd opened during sharefs_init */
|
||||
uintptr_t setup; /* cgo handle of opaque setup state */
|
||||
};
|
||||
|
||||
int sharefs_getattr(const char *pathname, struct stat *statbuf, struct fuse_file_info *fi);
|
||||
|
||||
Reference in New Issue
Block a user