
These 2 are an actual separate types of syscalls, so let's stop using special flags for bind mounting or re-mounting and instead let userspace calling directly for this kind of actions.
1.3 KiB
1.3 KiB
Name
bindmount - create a bindmount from source_fd
to a target path.
Synopsis
#include <LibCore/System.h>
ErrorOr<void> bindmount(int source_fd, StringView target, int flags);
Description
bindmount()
create a bindmount from source_fd
to a target path target
, with mount flags of flags
.
The following flags
are supported:
MS_NODEV
: Disallow opening any devices from this file system.MS_NOEXEC
: Disallow executing any executables from this file system.MS_NOSUID
: Ignore set-user-id bits on executables from this file system.MS_RDONLY
: Mount the filesystem read-only.MS_WXALLOWED
: Allow W^X protection circumvention for executables on this file system.MS_AXALLOWED
: Allow anonymous executable mappings for executables on this file system.MS_NOREGULAR
: Disallow opening any regular files from this file system.
These flags can be used as a security measure to limit the possible abuses of the mounted file system.
Errors
EINVAL
: Theflags
value contains deprecated flags such asMS_REMOUNT
orMS_BIND
.EPERM
: The current process does not have superuser privileges.ENODEV
: Thesource_fd
is not an open file descriptor to a valid filesystem inode.
All of the usual path resolution errors may also occur.