From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([208.118.235.92]:53712) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1SSSuw-00089D-5D for qemu-devel@nongnu.org; Thu, 10 May 2012 08:56:34 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1SSSup-0006YQ-5a for qemu-devel@nongnu.org; Thu, 10 May 2012 08:56:25 -0400 Received: from mx1.redhat.com ([209.132.183.28]:32404) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1SSSuo-0006YA-U1 for qemu-devel@nongnu.org; Thu, 10 May 2012 08:56:19 -0400 Message-ID: <4FABBAE6.2020300@redhat.com> Date: Thu, 10 May 2012 15:56:06 +0300 From: Avi Kivity MIME-Version: 1.0 References: <4FABB4C2.3050601@redhat.com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] Idea: fuse-kvm filesystem List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Alex Bradbury Cc: qemu-devel , KVM list , "Richard W.M. Jones" On 05/10/2012 03:37 PM, Alex Bradbury wrote: > On 10 May 2012 13:29, Avi Kivity wrote: > > Currently when you mount a filesystem, you face two issues: > > - you have to be root > > - if the media is untrusted, it can exploit your kernel > > > > With kvm and fuse, we can have a virtualized kernel mount the > > filesystem, and re-export to the host, which mounts it using a fuse > > interface. This solves both problems, at the expense of speed and > > simplicity. In theory this can be used for mounting untrusted USB > > sticks (perhaps only for the less well tested filesystems). > > Is this not one of the many features of guestfs? At least, I'm not > sure I understand from your description how it's different. > > http://libguestfs.org/guestmount.1.html It is a subset of guestmount, libguestfs rocks. -- error compiling committee.c: too many arguments to function