[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.64.0802081849430.3378@scrub.home>
Date: Fri, 8 Feb 2008 20:20:39 +0100 (CET)
From: Roman Zippel <zippel@...ux-m68k.org>
To: Miklos Szeredi <miklos@...redi.hu>
cc: akpm@...ux-foundation.org, linux-fsdevel@...r.kernel.org,
linux-kernel@...r.kernel.org, sfrench@...ibm.com, lachlan@....com,
jsipek@...sunysb.edu, rmk@....linux.org.uk, dhowells@...hat.com,
raven@...maw.net, rathamahata@...4.ru, kkeil@...e.de,
hpa@...or.com, tytso@....edu, hirofumi@...l.parknet.co.jp,
jdike@...toit.com, mikulas@...ax.karlin.mff.cuni.cz,
wli@...omorphy.com, shaggy@...tin.ibm.com, vandrove@...cvut.cz,
Trond.Myklebust@...app.com, jeffm@...e.com, paulus@...ba.org,
hugh@...itas.com, gorcunov@...il.com, gregkh@...e.de
Subject: Re: [patch 01/26] mount options: add documentation
Hi,
On Wed, 30 Jan 2008, Miklos Szeredi wrote:
> > How does this deal with certain special cases:
> > - chroot: how will mount/df only show the for chroot relevant mounts?
>
> That is a very good question. Andreas Gruenbacher had some patches
> for fixing behavior of /proc/mounts under a chroot, but people are
> paranoid about userspace ABI changes (unwarranted in this case, IMO).
>
> http://lkml.org/lkml/2007/4/20/147
>
> Anyway, if we are going to have a new 'mountinfo' file, this could be
> easily fixed as well.
>
> > - loop: how is the connection between file and loop device maintained?
>
> We also discussed this with Karel, maybe it didn't make it onto lkml.
>
> The proposed solution was to store the "loop" flag separately in a
> file under /var. It could just be an empty file for each such loop
> device:
>
> /var/lib/mount/loops/loop0
>
> This file is created by mount(8) if the '-oloop' option is given. And
> umount(8) automatically tears down the loop device if it finds this
> file.
My question was maybe a little short. I don't doubt that we can shove a
lot into the kernel, the question is rather how much of this will be
unnecessary information, which the kernel doesn't really need itself.
> > Could also please explain why you want to go via user mounts. Other OS use a
> > daemon for that, which e.g. can maintain access controls. How do you want to
> > manage this?
>
> The unprivileged mounts patches do contain a simple form of access
> control. I don't think anything more is needed, but of course, having
> unprivileged mounts in the kernel does not prevent the use of a more
> sophisticated access control daemon in userspace, if that becomes
> necessary.
A "I don't think anything more is needed" lets go off all sorts of warning
lights. Most things start out simple, so IMO it's very worth it to check
where it might go to to know the limits beforehand. The main question here
is why should a kernel based solution be preferable over a daemon based
solution?
If we look for example look at OS X, it has no need for user mounts but
has a daemon instead, which also provides an interesting notification
system for new devices, mounts or unmount requests. All this could also be
done in the kernel, but where would be the advantage in doing so? The
kernel implementation would be either rather limited or only bloat the
kernel. What is the feature that would make user mounts more than just a
cool kernel hack?
bye, Roman
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists