On Sat, 19 Jan 2008, Miklos Szeredi wrote:
>
> But 'fusermount -u /tmp/test' does work, doesn't it?
You're submitting patches to get rid of fusermount, aren't you?
Most users absolutely have no idea what fusermount is and they would
__really__ like to see umount(8) working finally.
> > This is an experimental patch for supporing unprivileged mounts and
> > umounts.
>
> User unmount unfortunately still doesn't work if the kernel doesn't have
> the unprivileged mount support but as we discussed this in last July that
> shouldn't be needed for this case.
>
> % mount -t
On Wed, 16 Jan 2008, Miklos Szeredi wrote:
> This is an experimental patch for supporing unprivileged mounts and
> umounts.
User unmount unfortunately still doesn't work if the kernel doesn't have
the unprivileged mount support but as we discussed this in last July that
shouldn't be needed
On Wed, 16 Jan 2008, Miklos Szeredi wrote:
This is an experimental patch for supporing unprivileged mounts and
umounts.
User unmount unfortunately still doesn't work if the kernel doesn't have
the unprivileged mount support but as we discussed this in last July that
shouldn't be needed
This is an experimental patch for supporing unprivileged mounts and
umounts.
User unmount unfortunately still doesn't work if the kernel doesn't have
the unprivileged mount support but as we discussed this in last July that
shouldn't be needed for this case.
% mount -t ntfs-3g
On Sat, 19 Jan 2008, Miklos Szeredi wrote:
But 'fusermount -u /tmp/test' does work, doesn't it?
You're submitting patches to get rid of fusermount, aren't you?
Most users absolutely have no idea what fusermount is and they would
__really__ like to see umount(8) working finally.
> > This is an experimental patch for supporing unprivileged mounts and
> > umounts. The following features are added:
>
> same feedback as last time ... the cap stuff needs to be made optional and
> proper header checks added to configure ...
Later, sure. For now, I'm concentrating on the
On Wednesday 16 January 2008, Miklos Szeredi wrote:
> This is an experimental patch for supporing unprivileged mounts and
> umounts. The following features are added:
same feedback as last time ... the cap stuff needs to be made optional and
proper header checks added to configure ...
> 1) If
From: Miklos Szeredi <[EMAIL PROTECTED]>
This is an experimental patch for supporing unprivileged mounts and
umounts. The following features are added:
1) If mount/umount are suid, first try without privileges.
This is done by forking, dropping privileges in child, and redirecting
stderr to
From: Miklos Szeredi [EMAIL PROTECTED]
This is an experimental patch for supporing unprivileged mounts and
umounts. The following features are added:
1) If mount/umount are suid, first try without privileges.
This is done by forking, dropping privileges in child, and redirecting
stderr to
On Wednesday 16 January 2008, Miklos Szeredi wrote:
This is an experimental patch for supporing unprivileged mounts and
umounts. The following features are added:
same feedback as last time ... the cap stuff needs to be made optional and
proper header checks added to configure ...
1) If
This is an experimental patch for supporing unprivileged mounts and
umounts. The following features are added:
same feedback as last time ... the cap stuff needs to be made optional and
proper header checks added to configure ...
Later, sure. For now, I'm concentrating on the actual
Mike Frysinger, le Tue 08 Jan 2008 10:31:04 -0500, a écrit :
> with all the non-linux changes that have gone in, does there need to be
> header
> checks here and then have mount.c key off of them ? i'm thinking so ...
Sure!
Samuel
--
To unsubscribe from this list: send the line "unsubscribe
On Tuesday 08 January 2008, Miklos Szeredi wrote:
> --- util-linux-ng.orig/configure.ac 2008-01-07 21:40:22.0 +0100
> +++ util-linux-ng/configure.ac2008-01-07 21:40:50.0 +0100
> @@ -91,6 +92,11 @@ fi
> UTIL_CHECK_LIB(util, openpty)
> UTIL_CHECK_LIB(termcap, tgetnum)
>
>
From: Miklos Szeredi <[EMAIL PROTECTED]>
This is an experimental patch for supporing unprivileged mounts and
umounts. The following features are added:
1) If mount/umount are suid, first try without privileges.
This is done by forking, dropping privileges in child, and redirecting
stderr to
From: Miklos Szeredi [EMAIL PROTECTED]
This is an experimental patch for supporing unprivileged mounts and
umounts. The following features are added:
1) If mount/umount are suid, first try without privileges.
This is done by forking, dropping privileges in child, and redirecting
stderr to
Mike Frysinger, le Tue 08 Jan 2008 10:31:04 -0500, a écrit :
with all the non-linux changes that have gone in, does there need to be
header
checks here and then have mount.c key off of them ? i'm thinking so ...
Sure!
Samuel
--
To unsubscribe from this list: send the line unsubscribe
On Tuesday 08 January 2008, Miklos Szeredi wrote:
--- util-linux-ng.orig/configure.ac 2008-01-07 21:40:22.0 +0100
+++ util-linux-ng/configure.ac2008-01-07 21:40:50.0 +0100
@@ -91,6 +92,11 @@ fi
UTIL_CHECK_LIB(util, openpty)
UTIL_CHECK_LIB(termcap, tgetnum)
18 matches
Mail list logo