search for: ms_noexec

Displaying 8 results from an estimated 8 matches for "ms_noexec".

1997 Apr 07
2
amd 920824upl102 ignores the nodev option
amd from the amd-920824upl102-6.i386.rpm file distributed with RedHat Linux 4.1 does not honor the nodev option for NFS filesystems and probably other mount types, allowing any user access to the device files in /dev on a system, provided that they have root access to another linux box on the network. In addition, the default amd.conf from RH 4.1 maps /net/* to NFS mounting, which makes the bug in
2012 Mar 08
3
[PATCH 0/3] kinit: Allow mount options
This patch series allows user-specified mount commands to be sent in via kernel command line ("kinit_mount=...") or via an embedded /etc/fstab file. The first patch is a cleanup of a patch sent last November by San Mehat (http://web.archiveorange.com/archive/v/EazJNBMORV2U7E0coh5h); the next two are small improvements or bug fixes.
2007 Aug 24
2
[git patch] klibc bzero, mount fixes + random stuff
...t stro.at> diff --git a/usr/utils/mount_opts.c b/usr/utils/mount_opts.c index 98f58cf..05d1729 100644 --- a/usr/utils/mount_opts.c +++ b/usr/utils/mount_opts.c @@ -21,6 +21,9 @@ static const struct mount_opts options[] = { {"dirsync", MS_DIRSYNC, MS_DIRSYNC, 0}, {"exec", MS_NOEXEC, 0, MS_NOEXEC}, {"move", MS_TYPE, MS_MOVE, 0}, + {"nodev", MS_NODEV, MS_NODEV, 0}, + {"noexec", MS_NOEXEC, MS_NOEXEC, 0}, + {"nosuid", MS_NOSUID, MS_NOSUID, 0}, {"recurse", MS_REC, MS_REC, 0}, {"remount", MS_TYPE, MS_REMOUNT, 0}, {...
2016 Jan 06
0
[klibc:master] mount: Implement -o defaults
..._mount_options(char *arg, unsigned long rwflag, struct extra_opts *extra) break; } - if (res != 0 && s[0]) - add_extra_option(extra, opt); + if (res != 0 && s[0]) { + if (!strcmp(opt, "defaults")) + rwflag &= ~(MS_RDONLY|MS_NOSUID|MS_NODEV| + MS_NOEXEC|MS_SYNCHRONOUS); + else + add_extra_option(extra, opt); + } } return rwflag;
2001 Feb 28
2
Samba Compile problems
...`MS_NOSUID' redefined /usr/include/sys/mount.h:39: warning: this is the location of the previous definition /usr/include/linux/fs.h:87: warning: `MS_NODEV' redefined /usr/include/sys/mount.h:41: warning: this is the location of the previous definition /usr/include/linux/fs.h:88: warning: `MS_NOEXEC' redefined /usr/include/sys/mount.h:43: warning: this is the location of the previous definition /usr/include/linux/fs.h:89: warning: `MS_SYNCHRONOUS' redefined /usr/include/sys/mount.h:45: warning: this is the location of the previous definition /usr/include/linux/fs.h:90: warning: `MS_R...
2011 Jun 05
1
another missing link in febootstrap; failing tests for libguestfs
...IL: test-symlinkat -Hilko diff --git a/helper/init.c b/helper/init.c index 50ed19e..8f3834f 100644 --- a/helper/init.c +++ b/helper/init.c @@ -181,6 +181,12 @@ main () chdir ("/"); mount_proc (); + if (mount ("tmpfs", "/run", "tmpfs", + MS_NOEXEC|MS_NOSUID, "size=10%,mode=0755") == -1) { + perror ("mount: /run"); + exit (EXIT_FAILURE); + } +y mkdir ("/run/lock", 01777); print_uptime (); /* Run /init from ext2 filesystem. */
2016 Jan 06
3
[PATCH klibc 0/3] Changes to support initramfs-tools 0.117
initramfs-tools version 0.117 requires 'readlink -f' and 'mount -o defaults' to work. The first two patches were previously submitted but not applied. Ben. Ben Hutchings (3): Implement realpath() readlink: Add -f option mount: Implement -o defaults usr/include/stdlib.h | 2 ++ usr/klibc/Kbuild | 2 +- usr/klibc/realpath.c | 49
2003 Dec 01
0
No subject
...rstand all flags that mount understands (including UW> options that mount considers standard). To change permissions you need to UW> set them with the fmask/dmask options. Aha! Trying.... It works! Thanks!!! UW> smbmount should understand noexec and pass it to the mount syscall as UW> MS_NOEXEC. But it doesn't, and that's a bug. Adding samba mailing list addr to CC :-) UW> Note that noexec does not affect the permissions, it simply makes it UW> impossible to actually execute things. The files can still have execute UW> permissions. Aha. But NT exec permissions are usua...