Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2231428imm; Tue, 10 Jul 2018 16:02:07 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcQ98uTumfc9/zdyD2jnzqhXjYDvFgBswXPUp0AURtxO4qiYv7V+l65mI958uiKhcH63tKY X-Received: by 2002:a62:4308:: with SMTP id q8-v6mr27978528pfa.86.1531263727659; Tue, 10 Jul 2018 16:02:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531263727; cv=none; d=google.com; s=arc-20160816; b=FdwQzcvL7Ej/V+BPkE84Q1Sr66tmxmSZWa+1/2IYv92jPnJEkUxaCe2uXVDabG1sxl VSwIHH6hQKFwp8aM/qa5FHTgd7wuI/JApqE0sXpZKYapnf4BWv/vz6BbTK6FUiuN5Vhn pUbI0OjHjKcjdp6wJu6itlU+oq+ODagONhO4EkG2zNrwHZQxNvcYSAlW+5IzDOeC/B4I AbusEzNnw2p1HZc3hvHQPcoyYi2l7SfhDAzIexGlhsScquBiscG+/6TvnMagq+Z74Yi4 3hWsYiyunWPtBerknQQIHbrLMTRxoHtoApFmOG4N/qmw0fmxZ1Hm1C8rlYu5HQ7xO3Zl aAYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature:arc-authentication-results; bh=DqREegzBZb9ouBcwAq1ghPvABiKBW6GSPywXXSW9nuU=; b=pqEIe/jr9ND4Tksx3wO+Ku+yIXgFSEmTdenJ9tWJeFsT0sSMBD414joq3vQvF/y3uh +W2URvrZIN8SsTft+qeeX6AIkYPFbZqDMudVYfNMYZ9moAWEREISUVV8pEvZIHhk+cul 6rF/FG+Kmztegx9TwWQndlWI/pmKtNq+MwI2O3Wwus9ucjOgA8ODsnf5Vb4vr4yhKz43 mm0P2Vm/c+PjQ4cjSPwsdK46pRwsufBY0ZMJQ8C8bb6YosgdMNzDcIIyo5TZMVFYsLDG wrqcgefIzIYz2LzOr7gwjPXO8juWCat/2QUH/DTRmFH/p+HeGSJEHL1XZtHdMUpov25X sI/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=google header.b=MGtDx8tR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j193-v6si16967236pge.689.2018.07.10.16.01.52; Tue, 10 Jul 2018 16:02:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=google header.b=MGtDx8tR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732321AbeGJXCg (ORCPT + 99 others); Tue, 10 Jul 2018 19:02:36 -0400 Received: from mail-it0-f66.google.com ([209.85.214.66]:53272 "EHLO mail-it0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732280AbeGJXCg (ORCPT ); Tue, 10 Jul 2018 19:02:36 -0400 Received: by mail-it0-f66.google.com with SMTP id a195-v6so1056809itd.3; Tue, 10 Jul 2018 16:01:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux-foundation.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=DqREegzBZb9ouBcwAq1ghPvABiKBW6GSPywXXSW9nuU=; b=MGtDx8tRWrI+ujPQNO5xept0CeTgXP7SMOy+ebnqNy5dCnu0jTEK0JGUvHoV+sfzmC fixQiD/Nej2T+MxWrDBW0HcWIDlO60kIgXSOGMyev6P4VdPGGVj/iMpbB4foucSM6v9M qZPUMXk5hP4EgKk2vNU6TJvS6wkMe8cB8LyPs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=DqREegzBZb9ouBcwAq1ghPvABiKBW6GSPywXXSW9nuU=; b=lvCAxfl4H/e0wOQzJyM04mkNhRkvy16ImfzscbxKblj/tz7rn0qXYGVWBZfBAKO/Pp 5udAmz+2NtyNr8mMzO8fizVsIvQWuFeQHmPUmtF72O5a/c434Bjtlh8Ub/3/ofCBevnm pAuqfjiovPDgC20nQiPz1wlnomYdIZiu5ZkoWW8x9OnuPW2WPjaQ14Ktb2sE736YTRbe bVPkR7QZbSRKY1AYLUU0O8omP1KI3TY5pkpqecBHS167NZ30Xb7hCqrZhVoFvGzOL/E9 Dc8Ckm32KOn4aTWOmyREej99BvB2sTLInfdECe1WW4mBPMGgF9NtvHwhnZPNvWHLL/44 3p7w== X-Gm-Message-State: APt69E0YxXdWd9SqvRUVg65RX60eHoV/tdSnZkD1/ZzMVdz9rDS7juqr Fz8t4SlqBU1ze9Xpc1Jm+JcqrV71/x7FfH9KdOs= X-Received: by 2002:a24:d0d7:: with SMTP id m206-v6mr20289456itg.1.1531263677445; Tue, 10 Jul 2018 16:01:17 -0700 (PDT) MIME-Version: 1.0 References: <153126248868.14533.9751473662727327569.stgit@warthog.procyon.org.uk> In-Reply-To: <153126248868.14533.9751473662727327569.stgit@warthog.procyon.org.uk> From: Linus Torvalds Date: Tue, 10 Jul 2018 16:01:06 -0700 Message-ID: Subject: Re: [PATCH 00/32] VFS: Introduce filesystem context [ver #9] To: David Howells Cc: Al Viro , linux-fsdevel , Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 10, 2018 at 3:41 PM David Howells wrote: > > Here are a set of patches to create a filesystem context prior to setting > up a new mount, populating it with the parsed options/binary data, creati= ng > the superblock and then effecting the mount. This is also used for remou= nt > since much of the parsing stuff is common in many filesystems. > > This allows namespaces and other information to be conveyed through the > mount procedure. > > This also allows Mikl=C3=B3s Szeredi's idea of doing: > > fd =3D fsopen("nfs"); > write(fd, "option=3Dval", ...); > mfd =3D fsmount(fd, MS_NODEV); > move_mount(mfd, "", AT_FDCWD, "/mnt", MOVE_MOUNT_F_EMPTY_PATH); > > that he presented at LSF-2017 to be implemented (see the relevant patches > in the series). All your documentation (both commit logs, man-pages and in-kernel actual docs you add) only talk about "what". They don't talk about _why_. I can imagine why's. But I think that the "why" is actually way mnore important than the what. At no point did I see a "this is the current interface, and it doesn't work for xyz, so here's the new interface that allows us to do stuff". When you have a diffstat like this: 171 files changed, 7147 insertions(+), 1805 deletions(-) I sure want to see an explanation for *WHY* it adds 5000+ lines of core cod= e. Also, I want to hear about sane security models. One of the things people really want to do is have users do their own mounts. We've had security issues in that area. Why does this improve on it, or make it even worse? And by "secuyrity models" I absolutely do not mean "here's how you can do complex smack rules for it". Linus