From owner-freebsd-hackers Thu Jul 22 18:12:32 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from rebel.net.au (rebel.rebel.net.au [203.20.69.66]) by hub.freebsd.org (Postfix) with ESMTP id 1C04214C57 for ; Thu, 22 Jul 1999 18:12:15 -0700 (PDT) (envelope-from kkenn@rebel.net.au) Received: from 203.20.69.79 (dialup-9.rebel.net.au [203.20.69.79]) by rebel.net.au (8.8.5/8.8.4) with ESMTP id KAA00136 for ; Fri, 23 Jul 1999 10:41:25 +0930 Received: (qmail 41837 invoked from network); 23 Jul 1999 01:11:41 -0000 Received: from localhost (kkenn@127.0.0.1) by localhost with SMTP; 23 Jul 1999 01:11:41 -0000 Date: Fri, 23 Jul 1999 10:41:40 +0930 (CST) From: Kris Kennaway Reply-To: kkenn@rebel.net.au To: "Ronald G. Minnich" Cc: freebsd-hackers@FreeBSD.ORG Subject: Re: Filesystem question... In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Thu, 22 Jul 1999, Ronald G. Minnich wrote: > On Fri, 23 Jul 1999, Kris Kennaway wrote: > > Well, if you're running it as a kernel module then obviously you need root > > permissions to load it. If it's running as a userland process, then > > there's no reason why you can't run it as a user. mount presumably > > wouldn't care as long as you had access rights to the underlying objects > > (mountpoint + stacking layer process). > > well, you'll have to tell me more. (i have to get my freebsd source tree > back :-) ) > > Are you saying that as an ordinary user I can mount something on top of > /tmp, for example? If the vfs.usermount sysctl is 1, and you have appropriate access to the thing you're trying to mount (block device, etc). > Is the suser() check still in the mount system call? From vfs_syscalls.c: if (usermount == 0 && (error = suser(p))) return (error); usermount is tuned by the vfs.usermount sysctl and defaults to 0. Kris To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message