Re: userns mount and metacopy redirects (Was: Re: [PATCH v3 0/6] Composefs: an opportunistically sharing verified image filesystem)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Jan 26, 2023 at 07:26:49AM +0200, Amir Goldstein wrote:
> [spawning overlayfs sub-topic]
> 
> On Wed, Jan 25, 2023 at 10:29 PM Amir Goldstein <amir73il@xxxxxxxxx> wrote:
> >
> > On Wed, Jan 25, 2023 at 10:23 PM Amir Goldstein <amir73il@xxxxxxxxx> wrote:
> > >
> > > On Wed, Jan 25, 2023 at 9:45 PM Giuseppe Scrivano <gscrivan@xxxxxxxxxx> wrote:
> > > >
> > > > Amir Goldstein <amir73il@xxxxxxxxx> writes:
> > > >
> > > > >> >> I previously mentioned my wish of using it from a user namespace, the
> > > > >> >> goal seems more challenging with EROFS or any other block devices.  I
> 
> For those who are starting to read here, the context is userns mounting
> of overlayfs with a lower EROFS layer containing metacopy references to
> lower data blobs in another fs (a.k.a the composefs model).
> 
> IMO, mounting a readonly image of whatever on-disk format
> is a very high risk for userns mount.
> A privileged mount helper that verifies and mounts the EROFS
> layer sounds like a more feasible solution.

Very much agreed. This filesystem specific userns mountable stuff where
filesystems with any kind of on-disk format guarantees the safety is not
something we should support.

I'm starting to think about how to make it possible for a privileged
process to delegate/allow a filesystem mount to an unprivileged one. The
policy belongs in userspace. Something which I've talked about before a
few years ago but now I actually have time to work on this.



[Index of Archives]     [Linux Filesystems Devel]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux