Hmmm. AFAIK, this comes from smbmount and ncpmount being setuid-root,
which in turn comes from mount(2) requiring root privileges. Maybe
this restriction could be relaxed with some additional VFS protocol,
like adding a per-fs function verify_credentials. So the actual mount
would proceed, if
- the current uid is 0 or
- the fs driver in question supports the verify_credentials operation
and calling it returns true and the current user has write permissions
for the mount point.
If this is implemented, smbmount could loose its s-bit, or at least
drop the checks that lead to races.
Regards,
Martin