>It would still not work for ftp-server style programs,

True.  Users might want the mounts to show up to an ftp or not, and this 
handles only "not."

>If used in conjuction with CLONE_NEWNS it would have all the needed
>flexibility.

I don't see how.  What if my policy is that processes with a certain 
process name (command) see the mount?  What if my policy is that users in 
a certain filesystem ACL can see it?  That's the kind of flexibility you 
can't get if the policy is set up via the mount() system call.

>But the non-sophisticated case is by far the most abundant.  And for
>that the traditional UNIX permission modell is not only good enough,
>it is in fact _better_ than any sophisticated access control mechanism
>because of it's _simplicity_.

Absolutely.  And that's why I speak of flexibility.  Let the simple users 
have their simple U-G-0 and the more creative ones do something more 
complex.

I'm not opposed, by the way, to an implementation that just does U-G-O (or 
even just U) if it's done in a way amenable to future extension.

--
Bryan Henderson                          IBM Almaden Research Center
San Jose CA                              Filesystems

-
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to