Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755405AbYCQWzX (ORCPT ); Mon, 17 Mar 2008 18:55:23 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752398AbYCQWzG (ORCPT ); Mon, 17 Mar 2008 18:55:06 -0400 Received: from namei.org ([69.55.235.186]:48579 "EHLO us.intercode.com.au" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753286AbYCQWzE (ORCPT ); Mon, 17 Mar 2008 18:55:04 -0400 Date: Tue, 18 Mar 2008 09:51:10 +1100 (EST) From: James Morris X-X-Sender: jmorris@us.intercode.com.au To: Miklos Szeredi cc: Andrew Morton , Christoph Hellwig , serue@us.ibm.com, viro@zeniv.linux.org.uk, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, Stephen Smalley , Eric Paris , linux-security-module@vger.kernel.org Subject: Re: [patch 00/11] mount ownership and unprivileged mount syscall (v9) In-Reply-To: <20080317200053.447640802@szeredi.hu> Message-ID: References: <20080317200053.447640802@szeredi.hu> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 612 Lines: 17 Something to consider down the track would be how to possibly allow this with SELinux, which only knows about normal mounts. We might need a user_mount hook which is called once the core kernel code determines that it is a a valid unprivileged mount (although the sb_mount hook will already have been called, IIUC). - James -- James Morris -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/