>How would you request to make the mountpoint visible from _any_
>program.  It's not acceptable to expect every program to include a
>menu, command, etc. to be able to modify the visibility of
>mountpoints.

OK, I overlooked the problem of having to add commands to the shell and 
everything else.  While there's plenty of precedent for this style 
(current directory, ulimits, umask), I wouldn't like to extend it, even to 
adding a command to Bash.  But it could follow the 'nice' and 'renice' 
model.

>Would it not be better if you could specify the visibility policy when
>mounting?  Something simple like the user-group-other permission
>model would do nicely.  That would also have the advantage of being
>bound to the mountpoint, not the process.

I just don't think that gives you enough policy flexibility.  If processes 
can control visibility on a per-process basis independent from the mount 
action, they can use a much greater variety of policy, and do it in user 
space.

As for user-group-other, let me first point out that this whole namespace 
discussion started when a design based on actual file permission bits, but 
not a true implementation of Unix security (root didn't get carte blanche) 
was found unpalatable by some.  So as you say, it would be something 
_like_ the permission model, not a part of it.

We've been straining against the limitations of user/group/other for 
decades.  Sophisticated systems don't even use them for file permissions. 
So I hesitate to tie anything else to them.

--
Bryan Henderson                          IBM Almaden Research Center
San Jose CA                              Filesystems

-
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to