|| ||Dave Hansen <email@example.com>|
|| ||[PATCH 00/28] Mount writer count and read-only bind mounts (v5)|
|| ||Tue, 01 Aug 2006 16:52:40 -0700|
|| ||firstname.lastname@example.org, email@example.com, firstname.lastname@example.org,
Dave Hansen <email@example.com>|
Tries to incorporate comments from Al:
> b) figuring out what (if anything) should be done with
> propagation when we have shared subtrees... (not trivial at all)
Talked with Ram: Shared subtrees are about having identical views
into the filesystem. Changing the mount permissions doesn't affect
the view of the filesystem, so it should not be propagated.
The things that probably need the heaviest review in here are the
i_nlink monitoring patch (including the inode state flag patches 03
and 06) and the new MNT_SB_WRITABLE flag (patch 05).
These are against 2.6.18-rc2-mm1. Does anybody have anything against
them having some testing in -mm?
The following series implements read-only bind mounts. This feature
allows a read-only view into a read-write filesystem. In the process
of doing that, it also provides infrastructure for keeping track of
the number of writers to any given mount. In this version, if there
are writers on a superblock, the filesystem may not be remounted
r/o. The same goes for MS_BIND mounts, and writers on a vfsmount.
This has a number of uses. It allows chroots to have parts of
filesystems writable. It will be useful for containers in the future
and is intended to replace patches that vserver has had out of the
tree for several years. It allows security enhancement by making
sure that parts of your filesystem read-only, when you don't want
to have entire new filesystems mounted, or when you want atime
This set makes no attempt to keep the return codes for these
r/o bind mounts the same as for a real r/o filesystem or device.
It would require significantly more code and be quite a bit more
Using this feature requires two steps:
mount --bind /source /dest
mount -o remount,ro /dest
Signed-off-by: Dave Hansen <firstname.lastname@example.org>