summaryrefslogtreecommitdiff
path: root/Base/usr/share
diff options
context:
space:
mode:
authorLiav A <liavalb@gmail.com>2022-10-21 19:29:50 +0300
committerLinus Groh <mail@linusgroh.de>2022-10-22 19:18:15 +0200
commit07387ec19af987f4ce095197824ef6a2d53533b4 (patch)
treea1ef2f08c2946a20fab83ffd43d03c5eb048a954 /Base/usr/share
parent97f8927da6bcfe6a84fb68b06377eb897cc49446 (diff)
downloadserenity-07387ec19af987f4ce095197824ef6a2d53533b4.zip
Kernel+Base: Introduce MS_NOREGULAR mount flag
This flag doesn't conform to any POSIX standard nor is found in any OS out there. The idea behind this mount flag is to ensure that only non-regular files will be placed in a filesystem, which includes device nodes, symbolic links, directories, FIFOs and sockets. Currently, the only valid case for using this mount flag is for TmpFS instances, where we want to mount a TmpFS but disallow any kind of regular file and only allow other types of files on the filesystem.
Diffstat (limited to 'Base/usr/share')
-rw-r--r--Base/usr/share/man/man2/mount.md1
1 files changed, 1 insertions, 0 deletions
diff --git a/Base/usr/share/man/man2/mount.md b/Base/usr/share/man/man2/mount.md
index 0dd9c99a41..bb6e5a72c4 100644
--- a/Base/usr/share/man/man2/mount.md
+++ b/Base/usr/share/man/man2/mount.md
@@ -39,6 +39,7 @@ The following `flags` are supported:
* `MS_REMOUNT`: Remount an already mounted filesystem (see below).
* `MS_WXALLOWED`: Allow W^X protection circumvention for executables on this file system.
* `MS_AXALLOWED`: Allow anonymous executable mappings for executables on this file system.
+* `MS_NOREGULAR`: Disallow opening any regular files from this file system.
These flags can be used as a security measure to limit the possible abuses of the newly
mounted file system.