Private name spaces were first introduced into LINUX during the 2.5 kernel series. Their use has been limited due to name space manipulation being considered a privileged operation. Giving users and applications the ability to create private name spaces as well as the ability to mount and bind resources is the key to unlocking the full potential of this technology. There are serious performance, security and stability issues involved with user-controlled dynamic private name spaces in LINUX. This paper proposes mechanisms and policies for maintaining system integrity while unlocking the power of dynamic name spaces for normal users. It discusses relevant potential applications of this technology including its use with
FILESYSTEM IN USERSPACE,
V9FS (the LINUX port of the PLAN 9 resource sharing protocol) and
PLAN 9 FROM USER SPACE (the PLAN 9 application suite including user space synthetic file servers ported to UNIX variants).