mirror of
https://github.com/RGBCube/serenity
synced 2025-10-27 15:32:07 +00:00
These 2 are an actual separate types of syscalls, so let's stop using special flags for bind mounting or re-mounting and instead let userspace calling directly for this kind of actions.
1.3 KiB
1.3 KiB
Name
bindmount - create a bindmount from source_fd to a target path.
Synopsis
#include <LibCore/System.h>
ErrorOr<void> bindmount(int source_fd, StringView target, int flags);
Description
bindmount() create a bindmount from source_fd to a target path target, with mount flags of flags.
The following flags are supported:
MS_NODEV: Disallow opening any devices from this file system.MS_NOEXEC: Disallow executing any executables from this file system.MS_NOSUID: Ignore set-user-id bits on executables from this file system.MS_RDONLY: Mount the filesystem read-only.MS_WXALLOWED: Allow W^X protection circumvention for executables on this file system.MS_AXALLOWED: Allow anonymous executable mappings for executables on this file system.MS_NOREGULAR: Disallow opening any regular files from this file system.
These flags can be used as a security measure to limit the possible abuses of the mounted file system.
Errors
EINVAL: Theflagsvalue contains deprecated flags such asMS_REMOUNTorMS_BIND.EPERM: The current process does not have superuser privileges.ENODEV: Thesource_fdis not an open file descriptor to a valid filesystem inode.
All of the usual path resolution errors may also occur.