From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([208.118.235.92]:36686) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1SSSVS-00089b-HC for qemu-devel@nongnu.org; Thu, 10 May 2012 08:30:13 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1SSSVM-0007sL-Ch for qemu-devel@nongnu.org; Thu, 10 May 2012 08:30:06 -0400 Received: from mx1.redhat.com ([209.132.183.28]:64599) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1SSSVM-0007s0-4z for qemu-devel@nongnu.org; Thu, 10 May 2012 08:30:00 -0400 Message-ID: <4FABB4C2.3050601@redhat.com> Date: Thu, 10 May 2012 15:29:54 +0300 From: Avi Kivity MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Subject: [Qemu-devel] Idea: fuse-kvm filesystem List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: KVM list , qemu-devel , "Richard W.M. Jones" Currently when you mount a filesystem, you face two issues: - you have to be root - if the media is untrusted, it can exploit your kernel With kvm and fuse, we can have a virtualized kernel mount the filesystem, and re-export to the host, which mounts it using a fuse interface. This solves both problems, at the expense of speed and simplicity. In theory this can be used for mounting untrusted USB sticks (perhaps only for the less well tested filesystems). -- error compiling committee.c: too many arguments to function