mirror of
https://github.com/RGBCube/serenity
synced 2025-10-28 13:12:35 +00:00
These 2 are an actual separate types of syscalls, so let's stop using special flags for bind mounting or re-mounting and instead let userspace calling directly for this kind of actions.
1.3 KiB
1.3 KiB
Name
remount - remount a filesystem with new mount flags
Synopsis
#include <LibCore/System.h>
ErrorOr<void> remount(StringView target, int flags);
Description
remount() mounts a filesystem that is mounted at target with new mount flags of flags.
The following flags are supported:
MS_NODEV: Disallow opening any devices from this file system.MS_NOEXEC: Disallow executing any executables from this file system.MS_NOSUID: Ignore set-user-id bits on executables from this file system.MS_RDONLY: Mount the filesystem read-only.MS_WXALLOWED: Allow W^X protection circumvention for executables on this file system.MS_AXALLOWED: Allow anonymous executable mappings for executables on this file system.MS_NOREGULAR: Disallow opening any regular files from this file system.
These flags can be used as a security measure to limit the possible abuses of the mounted file system.
Errors
EINVAL: Theflagsvalue contains deprecated flags such asMS_REMOUNTorMS_BIND.EPERM: The current process does not have superuser privileges.ENODEV: No mount point was found fortargetpath target.
All of the usual path resolution errors may also occur.