Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750757AbWHAXwr (ORCPT ); Tue, 1 Aug 2006 19:52:47 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1750761AbWHAXwq (ORCPT ); Tue, 1 Aug 2006 19:52:46 -0400 Received: from e3.ny.us.ibm.com ([32.97.182.143]:4005 "EHLO e3.ny.us.ibm.com") by vger.kernel.org with ESMTP id S1750757AbWHAXwp (ORCPT ); Tue, 1 Aug 2006 19:52:45 -0400 Subject: [PATCH 00/28] Mount writer count and read-only bind mounts (v5) To: linux-kernel@vger.kernel.org Cc: viro@ftp.linux.org.uk, herbert@13thfloor.at, hch@infradead.org, Dave Hansen From: Dave Hansen Date: Tue, 01 Aug 2006 16:52:40 -0700 Message-Id: <20060801235240.82ADCA42@localhost.localdomain> Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2144 Lines: 51 Tries to incorporate comments from Al: http://article.gmane.org/gmane.linux.kernel/421029 Al wrote: > b) figuring out what (if anything) should be done with > propagation when we have shared subtrees... (not trivial at all) Talked with Ram: Shared subtrees are about having identical views into the filesystem. Changing the mount permissions doesn't affect the view of the filesystem, so it should not be propagated. The things that probably need the heaviest review in here are the i_nlink monitoring patch (including the inode state flag patches 03 and 06) and the new MNT_SB_WRITABLE flag (patch 05). These are against 2.6.18-rc2-mm1. Does anybody have anything against them having some testing in -mm? --- The following series implements read-only bind mounts. This feature allows a read-only view into a read-write filesystem. In the process of doing that, it also provides infrastructure for keeping track of the number of writers to any given mount. In this version, if there are writers on a superblock, the filesystem may not be remounted r/o. The same goes for MS_BIND mounts, and writers on a vfsmount. This has a number of uses. It allows chroots to have parts of filesystems writable. It will be useful for containers in the future and is intended to replace patches that vserver has had out of the tree for several years. It allows security enhancement by making sure that parts of your filesystem read-only, when you don't want to have entire new filesystems mounted, or when you want atime selectively updated. This set makes no attempt to keep the return codes for these r/o bind mounts the same as for a real r/o filesystem or device. It would require significantly more code and be quite a bit more invasive. Using this feature requires two steps: mount --bind /source /dest mount -o remount,ro /dest Signed-off-by: Dave Hansen - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/