Hacking the Linux Automounter—Current Limitations and Future Directions

نویسندگان

  • Ian Maxwell
  • Jeff Moyer
چکیده

The IT industry is experiencing a considerable shift from proprietary operating systems to Linux. As a result, the features and functionality that people have come to expect of these systems now must be provided for on Linux. An automounter provides a mechanism for automatically mounting file systems upon access, and umounting them when they are no longer referenced. The Linux automounter is not feature-complete and there are cases where Linux autofs is just plain incompatible with implementations from other proprietary vendors. In order to solve the current automounter limitations, we start by developing an understanding of how things work today. We explain the basic configuration of autofs for a client machine using simple examples. Then walk through the the internals for basic operations, such as the mounting, or lookup, of a directory and the umounting, or expiry, of a directory. This includes a description of where autofs fits into the VFS layer. Next we discuss the two main deployment difficulties. The first is that the Linux automounter implements direct mount maps in a way that is incompatible with that of every other implementation. We discuss the desired behavior and compare it with that of the Linux automounter. We will then discuss the current development effort to overcome this by extending autofs and its kernel interface. The second major problem surrounds the use of multi-mount entries for the /net, or -hosts mount maps. Because of the nature of multi-mount maps, the Linux implementation mounts and umounts these directory hierarchies as a single unit. This means that clients mounting exported filesystems from large servers can experience resource starvation, causing failed mounts. The root problem is described and we show how the kernel and Linux automounter can be modified to address this issue also. We conclude with a review of the progress of the work outlined above and give a summary of future directions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Patient Engagement and its Evaluation Tools – Current Challenges and Future Directions; Comment on “Metrics and Evaluation Tools for Patient Engagement in Healthcare Organization- and System-Level Decision-Making: A Systematic Review”

Considering the growing recognition of the importance of patient engagement in healthcare decisions, research and delivery systems, it is important to ensure high quality and efficient patient engagement evaluation tools. In this commentary, we will first highlight the definition and importance of patient engagement. Then we discuss the psychometric properties of the patient engagement evaluati...

متن کامل

A symbol-based fuzzy decision-making approach to evaluate the user satisfaction on services in academic digital libraries

Academic libraries play a significant role in providing core services that include research, teaching and learning. Usersatisfaction is an important indicator for evaluating the performance of library service. This paper develops a methodfor measuring the user satisfaction in a group decision-making environment. First, the performance of service isevaluated by using questionnaire survey. The sc...

متن کامل

Hitchhiker ’ s Guide to GUM

This report documents the process of extending the GUM run-time system (RTS) for Glasgow parallel Haskell (GpH). First, we obtain the sources, set up the environment and build the Glasgow Haskell Compiler (GHC) and GUM RTS. Next, GpH and Evaluation Strategies are briefly introduced, followed by a short discussion of parallelisation, profiling and optimisation. Subsequently, we illustrate how to...

متن کامل

The Risk Propensity and Rationality of Computer Hackers

Issues concerning computer security have received considerable academic attention in recent years and cyber security has become a top priority for many governments, organizations, and industries. Unfortunately, the attention devoted to cyber crime issues has focused primarily on the technical dimension of computer crime. Today, our knowledge about the persons behind the keyboards remains fragme...

متن کامل

Hijacking the Linux Kernel

In this paper, a new method of hijacking the Linux kernel is presented. It is based on analysing the Linux system call handler, where a proper set of instructions is subsequently replaced by a jump to a different function. The ability to change the execution flow in the middle of an existing function represents a unique approach in Linux kernel hacking. The attack is applicable to all kernels f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005