From: Josef Sipek <jsipek@fsl.cs.sunysb.edu>
To: Michael Halcrow <mhalcrow@us.ibm.com>
Cc: Andrew Morton <akpm@osdl.org>, Christoph Hellwig <hch@lst.de>,
linux-fsdevel@vger.kernel.org
Subject: Re: ecryptfs
Date: Mon, 7 Aug 2006 13:21:04 -0400 [thread overview]
Message-ID: <20060807172104.GA30519@filer.fsl.cs.sunysb.edu> (raw)
In-Reply-To: <20060807163115.GA4028@us.ibm.com>
On Mon, Aug 07, 2006 at 11:31:15AM -0500, Michael Halcrow wrote:
...
> Here is where I am thinking about going with crossing lower mount
> points. This patch makes sure that there is a 1-to-1 mapping in inode
> numbers between the stacked inodes and the lower inodes. It maintains
> the association by modifying the struct inode to include a back
> pointer from the lower inode to the stacked inode.
Do you maintain the inode numbers across mounts (of ecryptfs)? The patch
doesn't look like it does.
> Note that Unionfs
> has a persistent inode approach that is much more heavy-weight than
> this approach, but it does not need to modify anything in the VFS.
I'd just like to point out, that we'd (Unionfs folks) love to see a solution
at the VFS level.
> I would like the CONFIG_STACK_FS to govern VFS modifications that make
> stackable filesystems more functional. My approach is to allow the kernel
> to be built without any such modifications, but certain features will be
> disabled/degraded in the stacked filesystem.
Makes sense.
> + inode->i_private = NULL;
> +#ifdef CONFIG_STACK_FS
> + inode->i_stacked_inode = NULL;
> +#endif
> inode->i_mapping = mapping;
Hrm. Looking at this made me think...This patch introduces pointers up the
stack in the VFS. Would it make sense to introduce the down pointers as
well, and make ecryptfs, et. al., depend on STACK_FS? This would clean up
some of the use of private data. Of course these pointers (the up & down)
make struct inode grow 8 bytes (on 32-bit systems).
Josef "Jeff" Sipek.
--
Intellectuals solve problems; geniuses prevent them
- Albert Einstein
next prev parent reply other threads:[~2006-08-07 17:22 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20060805140237.2226a9dc.akpm@osdl.org>
[not found] ` <20060807161939.GC2950@us.ibm.com>
2006-08-07 16:31 ` ecryptfs Michael Halcrow
2006-08-07 17:21 ` Josef Sipek [this message]
2006-08-07 22:47 ` ecryptfs Michael Halcrow
2006-08-08 0:13 ` ecryptfs Shaya Potter
2006-08-08 14:31 ` ecryptfs Michael Halcrow
2006-08-08 15:10 ` ecryptfs Shaya Potter
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20060807172104.GA30519@filer.fsl.cs.sunysb.edu \
--to=jsipek@fsl.cs.sunysb.edu \
--cc=akpm@osdl.org \
--cc=hch@lst.de \
--cc=linux-fsdevel@vger.kernel.org \
--cc=mhalcrow@us.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).