From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx1.redhat.com ([209.132.183.28]:57124 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390076AbeIUWmW (ORCPT ); Fri, 21 Sep 2018 18:42:22 -0400 From: David Howells In-Reply-To: <20180921155455.flkf5vdrm3vgn6do@brauner.io> References: <20180921155455.flkf5vdrm3vgn6do@brauner.io> <20180920151214.15484-6-mszeredi@redhat.com> <20180920151214.15484-1-mszeredi@redhat.com> <17157.1537542475@warthog.procyon.org.uk> To: Christian Brauner Cc: dhowells@redhat.com, Miklos Szeredi , Al Viro , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 5/6] fsmount: do not use legacy MS_ flags MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-ID: <20310.1537548756.1@warthog.procyon.org.uk> Date: Fri, 21 Sep 2018 17:52:36 +0100 Message-ID: <20311.1537548756@warthog.procyon.org.uk> Sender: linux-fsdevel-owner@vger.kernel.org List-ID: Christian Brauner wrote: > So from reading the patch I got the impression that superblock mount > options passed via fsconfig() are passed as strings like "ro" and are > translated into approriate objects (e.g. flags etc.) by the kernel. I'm having second throughts about that - at least for "ro": that one is particularly problematic as it governs how source devices are opened. I'm kind of tempted to pass that as a flag to fsopen(). What I'd like to do in btrfs, ext4, etc. is open blockdevs as I get the parameters that enumerate them - but I have to hold the looked-up paths till the validate/get_tree stage so that I know the final ro/rw state before I can do the opening. > That seems like a future proof mechanism to extend mount options for > userspace without having to worry about exceeding any integer types in the > future. Maybe this would make sense for non-superblock options as well? I > can see that this is less performant that checking flags and string parsing > is a thing that is not particularly nice but it would be one option to solve > the running out of flags problem. Al disliked the idea of setting up a separate context to define the mount options. > > mount_setattr(int dfd, const char *path, unsigned int atflags, > > unsigned int attr_values, > > unsigned int attr_mask); > > If we go with the flag arguments wouldn't it make sense to use a larger > integer type? You can't - at least not directly through syscall args. They are 32-bit on a 32-bit system. > > where atflags can potentially include AT_RECURSIVE. > > Very much in favor of having this operate recursively! It gets complicated with propagation. David