One way around that (with XDM) is to chown /console/* to the user when
chowning the device and remove execute perms on /console so that the
devices would be /console/cdrom, /console/floppy, etc. :)
Then you can get, say, amd to do the tricks of mounting it.
Close your eyes. Now forget what you see. What do you feel? --
My heart. -- Come here. -- Your heart. -- See? We're exactly the same.
Jon Smith -- Senior Math Major @ Purdue
On Tue, 4 Jul 2000, David Malone wrote:
On Mon, Jul 03, 2000 at 04:30:45PM -0700, Crist J. Clark wrote:
The risk I see is does this method let users mount with setuid?
Not by the looks of things - you can also only mount on directories
owned by yourself. It's enforced in the mount syscall.
temp1# sysctl -w vfs.usermount=1
vfs.usermount: 0 -> 1
mount vn0 /mnt
mount: Operation not permitted
mount vn0 blah
mount | fgrep blah
vn0 on /usr/home/dwmalone/blah (ufs, local, nodev, nosuid, mounted by dwmalone,writes: sync 2 async 0, reads: sync 14 async 0)
temp1# sysctl -w vfs.usermount=0
To Unsubscribe: send mail to majo...@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message