From owner-freebsd-hackers Thu Jul 22 9:59:20 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from acl.lanl.gov (acl.lanl.gov [128.165.147.1]) by hub.freebsd.org (Postfix) with ESMTP id 451E515374 for ; Thu, 22 Jul 1999 09:59:18 -0700 (PDT) (envelope-from rminnich@acl.lanl.gov) Received: from localhost (rminnich@localhost) by acl.lanl.gov (8.8.8/8.8.5) with ESMTP id KAA129262 for ; Thu, 22 Jul 1999 10:59:18 -0600 (MDT) Date: Thu, 22 Jul 1999 10:59:18 -0600 From: "Ronald G. Minnich" To: freebsd-hackers@FreeBSD.ORG Subject: Re: Filesystem question... In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Fri, 23 Jul 1999, Kris Kennaway wrote: > Well, if you're running it as a kernel module then obviously you need root > permissions to load it. If it's running as a userland process, then > there's no reason why you can't run it as a user. mount presumably > wouldn't care as long as you had access rights to the underlying objects > (mountpoint + stacking layer process). well, you'll have to tell me more. (i have to get my freebsd source tree back :-) ) Are you saying that as an ordinary user I can mount something on top of /tmp, for example? Is the suser() check still in the mount system call? ron To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message