Displaying 8 results from an estimated 8 matches for "ms_noexec".
1997 Apr 07
2
amd 920824upl102 ignores the nodev option
amd from the amd-920824upl102-6.i386.rpm file distributed with RedHat
Linux 4.1 does not honor the nodev option for NFS filesystems and probably
other mount types, allowing any user access to the device files in /dev on
a system, provided that they have root access to another linux box on the
network. In addition, the default amd.conf from RH 4.1 maps /net/* to NFS
mounting, which makes the bug in
2012 Mar 08
3
[PATCH 0/3] kinit: Allow mount options
This patch series allows user-specified mount commands to be
sent in via kernel command line ("kinit_mount=...") or via
an embedded /etc/fstab file.
The first patch is a cleanup of a patch sent last November
by San Mehat (http://web.archiveorange.com/archive/v/EazJNBMORV2U7E0coh5h);
the next two are small improvements or bug fixes.
2007 Aug 24
2
[git patch] klibc bzero, mount fixes + random stuff
...t stro.at>
diff --git a/usr/utils/mount_opts.c b/usr/utils/mount_opts.c
index 98f58cf..05d1729 100644
--- a/usr/utils/mount_opts.c
+++ b/usr/utils/mount_opts.c
@@ -21,6 +21,9 @@ static const struct mount_opts options[] = {
{"dirsync", MS_DIRSYNC, MS_DIRSYNC, 0},
{"exec", MS_NOEXEC, 0, MS_NOEXEC},
{"move", MS_TYPE, MS_MOVE, 0},
+ {"nodev", MS_NODEV, MS_NODEV, 0},
+ {"noexec", MS_NOEXEC, MS_NOEXEC, 0},
+ {"nosuid", MS_NOSUID, MS_NOSUID, 0},
{"recurse", MS_REC, MS_REC, 0},
{"remount", MS_TYPE, MS_REMOUNT, 0},
{...
2016 Jan 06
0
[klibc:master] mount: Implement -o defaults
..._mount_options(char *arg, unsigned long rwflag, struct extra_opts *extra)
break;
}
- if (res != 0 && s[0])
- add_extra_option(extra, opt);
+ if (res != 0 && s[0]) {
+ if (!strcmp(opt, "defaults"))
+ rwflag &= ~(MS_RDONLY|MS_NOSUID|MS_NODEV|
+ MS_NOEXEC|MS_SYNCHRONOUS);
+ else
+ add_extra_option(extra, opt);
+ }
}
return rwflag;
2001 Feb 28
2
Samba Compile problems
...`MS_NOSUID' redefined
/usr/include/sys/mount.h:39: warning: this is the location of the previous
definition
/usr/include/linux/fs.h:87: warning: `MS_NODEV' redefined
/usr/include/sys/mount.h:41: warning: this is the location of the previous
definition
/usr/include/linux/fs.h:88: warning: `MS_NOEXEC' redefined
/usr/include/sys/mount.h:43: warning: this is the location of the previous
definition
/usr/include/linux/fs.h:89: warning: `MS_SYNCHRONOUS' redefined
/usr/include/sys/mount.h:45: warning: this is the location of the previous
definition
/usr/include/linux/fs.h:90: warning: `MS_R...
2011 Jun 05
1
another missing link in febootstrap; failing tests for libguestfs
...IL: test-symlinkat
-Hilko
diff --git a/helper/init.c b/helper/init.c
index 50ed19e..8f3834f 100644
--- a/helper/init.c
+++ b/helper/init.c
@@ -181,6 +181,12 @@ main ()
chdir ("/");
mount_proc ();
+ if (mount ("tmpfs", "/run", "tmpfs",
+ MS_NOEXEC|MS_NOSUID, "size=10%,mode=0755") == -1) {
+ perror ("mount: /run");
+ exit (EXIT_FAILURE);
+ }
+y mkdir ("/run/lock", 01777);
print_uptime ();
/* Run /init from ext2 filesystem. */
2016 Jan 06
3
[PATCH klibc 0/3] Changes to support initramfs-tools 0.117
initramfs-tools version 0.117 requires 'readlink -f' and
'mount -o defaults' to work.
The first two patches were previously submitted but not applied.
Ben.
Ben Hutchings (3):
Implement realpath()
readlink: Add -f option
mount: Implement -o defaults
usr/include/stdlib.h | 2 ++
usr/klibc/Kbuild | 2 +-
usr/klibc/realpath.c | 49
2003 Dec 01
0
No subject
...rstand all flags that mount understands (including
UW> options that mount considers standard). To change permissions you need to
UW> set them with the fmask/dmask options.
Aha! Trying.... It works! Thanks!!!
UW> smbmount should understand noexec and pass it to the mount syscall as
UW> MS_NOEXEC. But it doesn't, and that's a bug.
Adding samba mailing list addr to CC :-)
UW> Note that noexec does not affect the permissions, it simply makes it
UW> impossible to actually execute things. The files can still have execute
UW> permissions.
Aha. But NT exec permissions are usua...