diff options
author | Liav A <liavalb@gmail.com> | 2022-10-21 19:29:50 +0300 |
---|---|---|
committer | Linus Groh <mail@linusgroh.de> | 2022-10-22 19:18:15 +0200 |
commit | 07387ec19af987f4ce095197824ef6a2d53533b4 (patch) | |
tree | a1ef2f08c2946a20fab83ffd43d03c5eb048a954 /Base/usr/share | |
parent | 97f8927da6bcfe6a84fb68b06377eb897cc49446 (diff) | |
download | serenity-07387ec19af987f4ce095197824ef6a2d53533b4.zip |
Kernel+Base: Introduce MS_NOREGULAR mount flag
This flag doesn't conform to any POSIX standard nor is found in any OS
out there. The idea behind this mount flag is to ensure that only
non-regular files will be placed in a filesystem, which includes device
nodes, symbolic links, directories, FIFOs and sockets. Currently, the
only valid case for using this mount flag is for TmpFS instances, where
we want to mount a TmpFS but disallow any kind of regular file and only
allow other types of files on the filesystem.
Diffstat (limited to 'Base/usr/share')
-rw-r--r-- | Base/usr/share/man/man2/mount.md | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/Base/usr/share/man/man2/mount.md b/Base/usr/share/man/man2/mount.md index 0dd9c99a41..bb6e5a72c4 100644 --- a/Base/usr/share/man/man2/mount.md +++ b/Base/usr/share/man/man2/mount.md @@ -39,6 +39,7 @@ The following `flags` are supported: * `MS_REMOUNT`: Remount an already mounted filesystem (see below). * `MS_WXALLOWED`: Allow W^X protection circumvention for executables on this file system. * `MS_AXALLOWED`: Allow anonymous executable mappings for executables on this file system. +* `MS_NOREGULAR`: Disallow opening any regular files from this file system. These flags can be used as a security measure to limit the possible abuses of the newly mounted file system. |