Re: [PATCH 2/3] autofs4 - expiring filesystem from under process

2005-04-11 Thread Andrew Morton
[EMAIL PROTECTED] wrote: static inline int autofs4_ispending(struct dentry *dentry) { struct autofs_info *inf = autofs4_dentry_ino(dentry); +int pending; -return (dentry-d_flags DCACHE_AUTOFS_PENDING) || -(inf != NULL inf-flags AUTOFS_INF_EXPIRING);

Active Block I/O Scheduling System (ABISS), version 8

2005-04-11 Thread Werner Almesberger
The Active Block I/O Scheduling System (ABISS) is an extension of the hard-disk storage subsystem of Linux, whose main purpose is to provide a guaranteed reading and (eventually) writing bit rate to applications. ABISS is conducted by Philips Research in Eindhoven, the Netherlands (see

Re: [PATCH 2/3] autofs4 - expiring filesystem from under process

2005-04-11 Thread Ian Kent
On Mon, 11 Apr 2005, Andrew Morton wrote: [EMAIL PROTECTED] wrote: static inline int autofs4_ispending(struct dentry *dentry) { struct autofs_info *inf = autofs4_dentry_ino(dentry); + int pending; - return (dentry-d_flags DCACHE_AUTOFS_PENDING) || - (inf

Re: [PATCH] semi-trivial patches

2005-04-11 Thread Ian Kent
On Mon, 11 Apr 2005, Denis Vlasenko wrote: On Sunday 10 April 2005 16:38, [EMAIL PROTECTED] wrote: Hi all, Here is autofs 4.1.4. Please find three patches attached. Good to see your persistent in keeping your patches upto date. I'll work through this soon as I can fix my mistakes

Re: [PATCH] semi-trivial patches

2005-04-11 Thread Denis Vlasenko
On Monday 11 April 2005 12:14, Ian Kent wrote: I remember applying several of your patches to do with this some time ago. On my development machine (an Ultra 2), the autofs daemon failed completely when trying to log. I mailed you asking about it but received no answer. I decided to return

[RFC] FUSE permission modell (Was: fuse review bits)

2005-04-11 Thread Miklos Szeredi
We're having a bit of a disagreement with Christoph Hellwig about the way FUSE does (or should do) permission checking. Comments (either way) are appreciated. Here's my side of the story: FUSE (filesystem in userspace) is designed to allow mounting an FS by non-privileged users (it can also be

Re: [ANNOUNCE] Important update - autofs4 - updated module build kit and kernel patches

2005-04-11 Thread raven
On Sun, 10 Apr 2005 [EMAIL PROTECTED] wrote: Hi all, I have updated the autofs4 kernel module build kit (kernel 2.4) and kernel patches (2.4 and 2.6). There were a couple of mistakes in the release. The kernel patches have been updated as there were some obvious errors in them. I've uploaded

Re: [ANNOUNCE] Important update - autofs 4.1.4 release

2005-04-11 Thread raven
On Sun, 10 Apr 2005 [EMAIL PROTECTED] wrote: Hi all, Here is autofs 4.1.4. There were a couple of mistakes in the release. The kernel patches have been updated as there were some obvious errors in them. An error in patching of the Debian portion of the init script was corrected. I've uploaded

Re: [RFC] FUSE permission modell (Was: fuse review bits)

2005-04-11 Thread Miklos Szeredi
3) No other user should have access to files under the mount, not even root[5] [5] Obviously root cannot be restricted, but accidental access to private data is still a good idea. E.g. root squashing by NFS servers has a similar affect. Could you explain a little more? I

Re: [PATCH 1/3] autofs4 - expiring filesystem from under process

2005-04-11 Thread Jeff Moyer
== Regarding [PATCH 1/3] autofs4 - expiring filesystem from under process; [EMAIL PROTECTED] adds: raven autofs4-2.6.12-rc1-mm4-wait-order.patch raven It's possible for an event wait request to arive before the event raven requestor. If this happens the daemon never gets notified and autofs

Re: [RFC] FUSE permission modell (Was: fuse review bits)

2005-04-11 Thread Daniel Jacobowitz
On Mon, Apr 11, 2005 at 05:56:09PM +0200, Miklos Szeredi wrote: 3) No other user should have access to files under the mount, not even root[5] [5] Obviously root cannot be restricted, but accidental access to private data is still a good idea. E.g. root squashing by NFS

Re: [RFC] FUSE permission modell (Was: fuse review bits)

2005-04-11 Thread Jamie Lokier
Miklos Szeredi wrote: 1) User must not be able to modify files or directories in a way which he otherwise could not do (e.g. mount a filesystem over /bin) 2) Suid and device semantics should be disabled within the mount 3) No other user should have access to files under

Re: [RFC] FUSE permission modell (Was: fuse review bits)

2005-04-11 Thread Daniel Jacobowitz
On Mon, Apr 11, 2005 at 07:22:57PM +0100, Jamie Lokier wrote: 1) Only allow mount over a directory for which the user has write access (and is not sticky) Seems good - but why not sticky? Mounting a user filesystem in /tmp/user-xxx/my-mount-point seems not unreasonable - provided

Re: [RFC] FUSE permission modell (Was: fuse review bits)

2005-04-11 Thread Miklos Szeredi
Root squashing is actually a much less obnoxious restriction. It means that local uid 0 doesn't automatically correspond to remote uid 0. I don't agree that it's less obnoxious. Root squashing and a restricted directory (-rwx--) would have exactly the same affect: root is

Re: [RFC] FUSE permission modell (Was: fuse review bits)

2005-04-11 Thread Jamie Lokier
Miklos Szeredi wrote: That is exactly the intended effect. If I'm at my work machine (where I'm not an admin unfortunately) and I mount my home machine with sshfs (because FUSE is installed fortunately :), then I bloody well don't want the sysadmin or some automated script of his to go

Re: [RFC] FUSE permission modell (Was: fuse review bits)

2005-04-11 Thread Daniel Jacobowitz
On Mon, Apr 11, 2005 at 09:56:29PM +0200, Miklos Szeredi wrote: Well the sanity check on the server side is always enforced. You can't trick sftp or ftp to not check permissions. So checking on the client side too (where the fuse daemon is running) makes no sense, does it? That argument