From owner-freebsd-hackers Sat Jul 24 22:14:26 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from peach.ocn.ne.jp (peach.ocn.ne.jp [210.145.254.87]) by hub.freebsd.org (Postfix) with ESMTP id 7A9B514BFF for ; Sat, 24 Jul 1999 22:14:14 -0700 (PDT) (envelope-from dcs@newsguy.com) Received: from newsguy.com by peach.ocn.ne.jp (8.9.1a/OCN) id OAA26986; Sun, 25 Jul 1999 14:12:35 +0900 (JST) Message-ID: <379A9CAE.F697F68C@newsguy.com> Date: Sun, 25 Jul 1999 14:12:14 +0900 From: "Daniel C. Sobral" X-Mailer: Mozilla 4.6 [en] (Win98; I) X-Accept-Language: en,pt-BR,ja MIME-Version: 1.0 To: Mark Newton Cc: "Ronald G. Minnich" , freebsd-hackers@FreeBSD.ORG Subject: Re: Filesystem question... References: <199907250237.MAA21069@gizmo.internode.com.au> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Content-Transfer-Encoding: 7bit Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Mark Newton wrote: > > > But thanks for the note. I just now realized that if I add a private name > > space to v9fs (which is easy), and then turn on user mounts, user > > processes can have private name spaces on freebsd! > > I can't wait to see the security problems that causes when setuid executables > assume that they only need to be worrying about one filesystem namespace. > :-) Yeah... it would be interesting to have a user-fs in which all executables where automatically chown to root, and setuid. :-) -- Daniel C. Sobral (8-DCS) dcs@newsguy.com dcs@freebsd.org "Your usefulness to my realm ended the day you made it off Hustaing alive." -- Sun Tzu Liao to his ex-finacee, Isis Marik To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message