>How about making namespace's as first class objects with some associated
>name or device in the device tree having owner/permissions etc.  any
>process which forks off a namespace shall create the
>device node for the namespace.  If some other process wants to use
>the same namespace, it can do so by attaching itself to the namespace
>dynamically? Offcourse children processes inherit the same namespace.

For the issues being discussed here, I don't think that's materially 
different from what we started with; it has the same issue concerning 
whether a user should be allowed to change his namespace and whether a 
process' namespace should change automatically when another process does 
something.

Here's one more proposal, kind of a compromise among various previous 
ones.

  - When you mount(), you say whether the names should be visible by 
default or not.  It takes system privilege to make them visible by 
default, but an ordinary user can mount a willing filesystem over a 
directory he's permitted to modify unconditionally, invisible by default

  - A process can explicitly request to see an invisible-by-default 
mounted filesystem.  Anyone can do this, but permissions on the root 
directory of the mount determine if he can actually see anything.

  - A process inherits the parent's namespace (i.e. sees the mounts the 
parent does).

This accomplishes:

  - not much of a philosophical break from where we are now.

  - users can mount their own stuff without system privilege.

  - no one, not even a fully permitted administrative process, sees user 
junk by default.

  - setuid programs see standard files where the system administrator put 
them.

  - setuid programs see user files where the user put them.

  - multiple processes, with or without the same uid, can see user-mounted 
files if they want.

  - a process can opt not to see user-mounted files, even if it has the 
same uid as processes that do.

I'm not saying how I would implement this; there's enough discussion over 
the desired result that I thought we should start there.

--
Bryan Henderson                          IBM Almaden Research Center
San Jose CA                              Filesystems

-
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to