From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pz0-f46.google.com ([209.85.210.46]:45083 "EHLO mail-pz0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755164Ab2F0Ajs convert rfc822-to-8bit (ORCPT ); Tue, 26 Jun 2012 20:39:48 -0400 Received: by dady13 with SMTP id y13so622353dad.19 for ; Tue, 26 Jun 2012 17:39:47 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: References: Date: Wed, 27 Jun 2012 07:39:47 +0700 Message-ID: Subject: Re: System Policy for Filenames From: "Fajar A. Nugraha" To: Aaron Peterson Cc: linux-btrfs@vger.kernel.org Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-btrfs-owner@vger.kernel.org List-ID: On Wed, Jun 27, 2012 at 1:28 AM, Aaron Peterson wrote: > Billy, > > Thank you! I will look into FUSE. > > Ultimately, I want my / to be mounted with these rules,  I will need a > boot loader to be able to handle it. Try looking at how ubuntu live cd works. Last time I check, it can use unionfs-fuse as "/" to make the read-only cd media appear "writable" live session. Something similar should be applicable to your needs. >  I am wondering if filesystem software has hooks for AppArmor or > SELinux, or some other Linux Security Module would be appropriated to > add to filesystem code? Not that I know of. -- Fajar