Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759110AbaDJTQC (ORCPT ); Thu, 10 Apr 2014 15:16:02 -0400 Received: from mail-pb0-f44.google.com ([209.85.160.44]:44029 "EHLO mail-pb0-f44.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753794AbaDJTP5 (ORCPT ); Thu, 10 Apr 2014 15:15:57 -0400 Message-ID: <5346EDE8.2060004@amacapital.net> Date: Thu, 10 Apr 2014 12:15:52 -0700 From: Andy Lutomirski User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0 MIME-Version: 1.0 To: Colin Walters , tytso@mit.edu CC: David Herrmann , linux-kernel@vger.kernel.org, Hugh Dickins , Alexander Viro , Matthew Wilcox , Karol Lewandowski , Kay Sievers , Daniel Mack , Lennart Poettering , Kristian@thunk.org, john.stultz@linaro.org, Greg Kroah-Hartman , Tejun Heo , Johannes Weiner , dri-devel@lists.freedesktop.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, Andrew Morton , Linus Torvalds , Ryan Lortie , mtk.manpages@gmail.com Subject: Re: [PATCH 0/6] File Sealing & memfd_create() References: <1395256011-2423-1-git-send-email-dh.herrmann@gmail.com> <20140320153250.GC20618@thunk.org> <1397141388.16343.10@mail.messagingengine.com> In-Reply-To: <1397141388.16343.10@mail.messagingengine.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/10/2014 07:45 AM, Colin Walters wrote: > On Thu, Mar 20, 2014 at 11:32 AM, tytso@mit.edu wrote: >> >> Looking at your patches, and what files you are modifying, you are >> enforcing this in the low-level file system. > > I would love for this to be implemented in the filesystem level as > well. Something like the ext4 immutable bit, but with the ability to > still make hardlinks would be *very* useful for OSTree. And anyone else > that uses hardlinks as a data source. The vserver people do something > similiar: > http://linux-vserver.org/util-vserver:Vhashify > > At the moment I have a read-only bind mount over /usr, but what I really > want is to make the individual objects in the object store in > /ostree/repo/objects be immutable, so even if a user or app navigates > out to /sysroot they still can't mutate them (or the link targets in the > visible /usr). COW links can do this already, I think. Of course, you'll have to use a filesystem that supports them. --Andy -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/